References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike...

40
References Chapter 1 1. The Open Group Conference, Architecting to the Edge, Network Centric Operations Industry Consortium, Status Update, April 24–26, 2006, https://www.opengroup.org/conference-live/uploads/40/10317/Wed_-_am_- _2_-_Thomas.pdf 2. Elena Macevičiūtė and T.D. Wilson, The Development of the Information Management Research Area, Borås, Sweden, http://informationr.net/ir/ 7-3/paper133.html 3. Curtis L. Blais, Niki C. Goerger, Paul Richmond, Burhman Gates, and 05F-SIW-107.pdf 4. Alex Bordetsky and Daniel Dolk, Knowledge Management for Wireless Grid Operation Centers, Naval Postgraduate School, Hawaii International 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, March 1, 2006, http://www.intelligententerprise.com/showArticle.jhtml?articleID= 179101909&pgno=1 6. David S. Alberts, John J. Garstka, and Frederick P. Stein, Network Centric Warfare: Developing and Leveraging Information Superiority, 2nd Edi- tion, DoD C4ISR Cooperative Research Program (CCRP), February 2000, http://www.dodccrp.org/publications/pdf/Alberts_NCW.pdf 7. Arthur K. Cebrowski, U.S. Navy, and John J. Garstka, Network-Centric Warfare: Its Origin and Future, January 1998, http://www.usni.org/ Proceedings/Articles98/PROcebrowski.htm 501 John B. Willis, Global Information Grid Services and Generation of the Mobility Common Operational Picture, http://ms.ie.org/SIW_LOG/05F/ Conference on System Sciences, 2002 8. Grace A. Lewis, Edwin J. Morris, and Lutz Wrage, Promising Technolo- gies for Future Systems, Integration of Software-Intensive Systems (ISIS), 04tn043.pdf December 2004, http://www.sei.cmu.edu/pub/documents/04.reports/pdf/

Transcript of References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike...

Page 1: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

References

Chapter 1 1. The Open Group Conference, Architecting to the Edge, Network Centric

Operations Industry Consortium, Status Update, April 24–26, 2006, https://www.opengroup.org/conference-live/uploads/40/10317/Wed_-_am_-_2_-_Thomas.pdf

2. Elena Macevičiūtė and T.D. Wilson, The Development of the Information Management Research Area, Borås, Sweden, http://informationr.net/ir/ 7-3/paper133.html

3. Curtis L. Blais, Niki C. Goerger, Paul Richmond, Burhman Gates, and

05F-SIW-107.pdf 4. Alex Bordetsky and Daniel Dolk, Knowledge Management for Wireless

Grid Operation Centers, Naval Postgraduate School, Hawaii International

5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, March 1, 2006, http://www.intelligententerprise.com/showArticle.jhtml?articleID= 179101909&pgno=1

6. David S. Alberts, John J. Garstka, and Frederick P. Stein, Network Centric Warfare: Developing and Leveraging Information Superiority, 2nd Edi-tion, DoD C4ISR Cooperative Research Program (CCRP), February 2000, http://www.dodccrp.org/publications/pdf/Alberts_NCW.pdf

7. Arthur K. Cebrowski, U.S. Navy, and John J. Garstka, Network-Centric Warfare: Its Origin and Future, January 1998, http://www.usni.org/ Proceedings/Articles98/PROcebrowski.htm

501

John B. Willis, Global Information Grid Services and Generation of theMobility Common Operational Picture, http://ms.ie.org/SIW_LOG/05F/

Conference on System Sciences, 2002

8. Grace A. Lewis, Edwin J. Morris, and Lutz Wrage, Promising Technolo-gies for Future Systems, Integration of Software-Intensive Systems (ISIS),

04tn043.pdf December 2004, http://www.sei.cmu.edu/pub/documents/04.reports/pdf/

Page 2: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

9. Bill Kerr, Software Development Guidance to the Department of the Navy Project Manager, Fleet Numerical Meteorology and Oceanography

Voice over WiFi and 3G Networks, Artech House, 2005 11. SLA Management Handbook: Concepts and Principles, Vol. 2, TMG GB

12. Jonathan M. Tisch, Karl Weber, The Power of We, Succeeding Through

13. Paul Allen, Service Orientation: Winning Strategies and Best Practices,

14. Zoran Stojanovic and Ajantha Dahanayake, Service-Oriented Software System Engineering: Challenges and Practices, Idea Group Publishing,

15. The Service Oriented Enterprise (SOE), ServiceOriented.Org, http:// www.serviceoriented.org/service_oriented_enterprise.html

16. Ali Arsanjani, Service-Oriented Modeling and Architecture, IBM, 09 November 2004, http://www-128.ibm.com/developerworks/webservices/ library/ws-soa-design1/

17. Association for Enterprise Integration, Net-Centric Operations Industry Forum (NCOIF), Data Sharing and Services Strategy Working Group, April 22, 2005, http://www.afei.org/news/documents/IndustryBest PracticesforAchievingSOA_000.pdf

18. http://www.w3.org/ 19. Jim Gabriel, Best Practices in Integrating Data Models for SOA – Inte-

grating Underlying Data Models Is an Essential Precursor to SOA, SOA World Magazine, http://soa.sys-con.com/read/48031.htm

20. DEFENSE ACQUISITIONS, The Global Information Grid and Challenges Facing Its Implementation, United States Government Accountability Of-fice, July 2004, http://www.gao.gov/cgi-bin/getrpt?GAO-04-858

21. Clay Wilson, Network Centric Warfare: Background and Oversight Issues for Congress, Foreign Affairs, Defense, and Trade Division, CRS Report for Congress, June 2, 2004, http://www.fas.org/man/crs/RL32411.pdf

22. NET-CENTRIC OPERATIONAL ENVIRONMENT JOINT INTEGRAT-ING CONCEPT, Version 1.0, Join Staff, October 31, 2005, http://www.dtic.mil/futurejointwarfare/concepts/netcentric_jic.pdf

502 References

Center, Science and Technology Advancement Team, 5 August 2004

917-2, April 2004

23. DAU, Systems Engineering, Defense Acquisition Guidebook, Chapter 4,

Defense Acquisition University, July 24, 2006, http://akss.dau.mil/dag/ GuideBook/PDFs/Chapter_4.pdf

Partnerships, John Wiley & Sons, Inc., 2004

2005

10. Richard Lau, Ram Khare, and William Y. Chang, Service Assurance for

Cambridge University Press, 2006

Page 3: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

24. NATO C3 Technical Architecture (NC3TA) Vols. 1–5, http://

h01%2Ehtml

and Integration, George Mason University, October 2005, http:// ieeesmc2005.unm.edu/smc_keynote_sage.pdf

Chapter 2

2006, http://grids.ucs.indiana.edu/ptliupages/presentations/gsawmar28-06_ FOX.ppt

2. Rob Walker, Common Operating Environment (COE) and Global Infor-

3. A.K. Cebrowski, The Implementation of Network-Centric Warfare, Of-fice of Force Transformation, Office of the Secretary of Defense, January

4. GLOBAL INFORMATION GRID (GIG), JROCM 134-01, CRD Execu-tive Agent, Commander in Chief, U.S. Joint Forces Command, August

5. Paul W. Phister, Jr. and John D. Cherry., Command and Control Implica-tions of Network-Centric Warfare, Air Force Research Laboratory, http://www.afrlhorizons.com/Briefs/Feb05/IF0409.html

6. Clay Wilson, Network Centric Warfare: Background and Oversight Is-

7. David S. Alberts, John J. Garstka, and Frederick P. Stein, Network Cen-tric Warfare: Developing and Leveraging Information Superiority, 2nd Edition, DoD C4ISR Cooperative Research Program (CCRP), February

8. NET-CENTRIC OPERATIONAL ENVIRONMENT JOINT INTEGRATING CONCEPT, Version 1.0, Join Staff, October 31, 2005, http://www.dtic.mil/ futurejointwarfare/concepts/netcentric_jic.pdf

References 503

27. Andrew P. Sage, Systems of Systems: Architecture Based Systems Design

28. Network Centric Operations Conceptual Framework, Version 1.0, Office

vice Ltd., Journal of Defense Science, Vol. 8, No. 3, September 2003, http://www.dodccrp.org/files/journal_defence_science_web.pdf

26. John, NEC Social and Organizational Factors, HVR Consultation Ser-

25. Annette J. Krygiel, “Behind the Wizard.s Curtain: An Integration Environ-

of Force Transformation, November 2003

2005

sues for Congress, CRS Report for Congress, June 2, 2004

2000

30, 2001

194.7.80.153/website/book.asp?menuid=15&vs=0&page=volume1%2Fc

ment for a System of Systems”, DOD CCRP, 1999

Operations, Ground System Architectures Workshop GSAW, March 28 1. Geoffrey Fox, A Grid-of-Grids Service Architecture for Net-Centric

Exchange, September 24, 2003 mation Grid (GIG) Enterprise Services (GES), COE/GES Technical

Page 4: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

9. Robert Vietmeyer, Net-Centric Enterprise Services, NCES Engineering DISA, http://www.opengroup.org/gesforum/uploads/40/5530/NCES_ Update.ppt

11. DEFENSE ACQUISITIONS, The Global Information Grid and Challenges

13. DEFENSIVE INFORMATION OPERATIONS, Protecting the Homeland, Report of the Defense Science Board Task Force, 2000 Summer Study, Vol. II , March 2001, http://cryptome.sabotage.org/dio/dio.htm

14. Net-Centric Enterprise Services (NCES) Metadata Management Capabil-

15. Grace A. Lewis, Edwin J. Morris, and Lutz Wrage, Promising Technolo-gies for Future Systems, Integration of Software-Intensive Systems (ISIS), December 2004, http://www.sei.cmu.edu/pub/documents/04.reports/pdf/ 04tn043.pdf

16. W. Scott Harrison, Nadine Hanebutte, Paul W. Oman, and Jim Alves-Foss, The MILS Architecture for a Secure Global Information Grid, The

17. Jeremy M. Kaplan, Flow of Information in Modern Warfare, Industrial

18. Transformational Communications Architecture, Boeing, Satellite 2003,

19. Robert W. McGraw, Securing Content in the Department of Defense’s Global Information Grid, National Security Agency, September 23–24, 2004, http://www.cse.buffalo.edu/caeiae/skm2004/presentation_slides/ B-Sessions/3B-1%20McGraw/3B-1%20McGrawC010305.ppt

20. Tony Montemarano, Information Assurance & NETOPS, Defense Infor-

21. C.L. Blais, N.C. Goerger, P. Richmond, B. Gates, and J.B. Willis, Global Information Grid Services and Generation of the Mobility Common Op-erational Picture, Paper 05F-SIW-107, Simulation Interoperability Stan-dards Organization, 2005 Fall Simulation Interoperability Workshop,

Gina Kingston, and Michael Tseng, Network-Centric Operations, Case

504 References

College of the Armed Forces, April 3, 2005

26 February 2003

12. Force Management Joint Functional Concept, Version 1.0, 2 June 2005

mation Systems Agent, May 2, 2006

22. Daniel Gonzales, Michael Johnson, Jimmie McEver, Dennis Leedom, Orlando, FL, September 2005

Study: The Stryker Brigade Combat Team, RAND Corporation, 2005

ity, Open Forum 2003 Metadata Registries, January 23 2003, http:// metadata-standards.org/OpenForum2003/Presentations/Defense-final-version/2003_Jan_OpenForum_Defense_Walker.ppt

Office, July 2004, http://www.gao.gov/cgi-bin/getrpt?GAO-04-858 Facing Its Implementation, United States Government Accountability

Evidence Based Research, Inc., November 2003 10. Network Centric Operations Conceptual Framework, Version 1.0,

Journal of Defense Software Engineering, October 2005, http:// www.csds.uidaho.edu/papers/Harrison05a.pdf

Page 5: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

24. Enhanced Telecom Operations Map (eTOM) The Business Process Framework For The Information and Communications. An eTOM

25. Enhanced Telecom Operations Map (eTOM) The Business Process

26. Enhanced Telecom Operations Map (eTOM) The Business Process Framework For The Information and Communications Service Industry, Process Decompositions and Descriptions, Release 6.0, TMF GB921V,

27. Enhanced Telecom Operations Map (eTOM) The Business Process Framework for the Information and Communications Service Industry, An Interim View of an Interpreter’s Guide for eTOM and ITIL Practitio-

28. DoD Architecture Framework Working Group: DoD Architecture

Volume_II.pdf 29. Federal Enterprise Architecture, FEA Program Management Office,

February 2004, http://www.whitehouse.gov/omb/egov/documents/ FEA_Overview.pdf

30. Bob Haycock, Federal Enterprise Architecture (FEA): XML and Web

Source%20e-Gov%20Conference%20March%2017%20Rev0.ppt 31. Federal Enterprise Architecture Records Management Profile, Version

1.3, Architecture and Infrastructure Committee, Federal Chief Informa-

32. The NGOSS Approach to Business Solutions, Release 1.0, TMF GB930,

33. NGOSS Architecture Technology Neutral Specification. Contract De-scription: Business and System Views, Release 4.0, TMF 053B, August

34. The NGOSS Technology – Neutral Architecture. Release 6.0, TMF 053,

Chapter 3

1. Ram Ramanathan and Jason Redi, A Brief Overview of Ad-hoc Networks: Challenges and Directions, BBN Technologies, http://www.comsoc.org/ livepubs/ci1/public/anniv/ramana.html

505 References

23. OSS Solutions for Network Operators – white paper, 2002

November 2005

Framework, Release 6.0, TMF GB921, November 2005

Primer, Release 4.5, TMF GB921P, November 2005

ners, Release 6.0, TMF GB921V, November 2005

November 2005

2004

November 2005

February 9, 2004, http://www.defenselink.mil/cio-nii/docs/DoDAF_v1_ Framework, Version 1.0 Volume II: Product Descriptions, DOD,

Services across the Federal Government, FEA-PMO, December 2002, http://web-services.gov/FEA-PMO%20Briefing%20for%20Open%20

tion Officers Council, July 12, 2005, http://colab.cim3.net/file/work/geocop/20050804_Posting/RM%20Profile.071205.v1.3.pdf

Page 6: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

2. Vern A. Dubendorf, A History of Wireless Technologies, John Wiley &

3. Ramiro Jordan and Chaouki T. Abdallah, Wireless Communications and Networking: An Overview, IEEE Antenna’s and Propagation Magazine,

4. Troy Meink, Transformational Communications Systems for DoD Net-

5. Special Report: The USA’s Transformational Communications Satellite System (TSAT), Defense Industry Daily, July 19, 2005, http://www.

6. Joint Program Executive Office, Joint Tactical Radio System, http:// enterprise.spawar.navy.mil/body.cfm?type=c&category=27&subcat=60

7. Richard Lau, Ram Khare, and William Y. Chang, Service Assurance for

8. S.L. Tsao, The Development of Application Services with IPV6 and 3B/B3G, National Chiao Tung University, http://www.ipv6.org.tw/ seminar/930317/930317-5.pdf#search=%22B3G%20architecture%22

9. Sanjiv Rai, Crossroads & Convergence, The World of Anytime Anywhere Computing, (ARE) Technologies, http://www.newhaven.edu/unh/ pdf/eng/Wireless_Computing_and_Convergence.pdf

10. George Dimitrakopoulos, Selection of Reconfigurations in the Context of B3G, Cognitive Infrastructures, Wireless World Research Forum, April

11. Paal E. Engelstad, Issues in Mobility Management in 4G Networks, Computer, Vol. 34, No. 6, June 2001, http://folk.uio.no/paalee/ referencing_publications/ref-mob-4gissues.pdf

12. Sandra G. Dykes, Ronnie L. Killough, Arthur N. Rasmussen, and Victo-ria Zhou, An Adaptive Ad Hoc Routing Network for Mobile Wireless De-vices, 10-9373, November 2003, http://www.swri.edu/3pubs/IRD2003/ Synopses/109373.htm

13. Katia Obraczka and Gene Tsudik, Multicast Routing Issues in Ad Hoc Networks, The University of Southern California’s Information Sciences Institute (ISI), http://www.isi.edu/div7/publication_files/multicast_ routing_issues.pdf

14. http://www.sdrforum.org/ 15. John B. Stephensen, Software-Defined Hardware for Software-Defined

Radios, Using Programmable Logic in Amateur Radio applications, ARRL. October 2002, http://www.arrl.org/tis/info/pdf/020910qex041.pdf

506 References

Sons, 2003

Vol. 44, No. 1, February 2002

Voice over WiFi and 3G Networks, Artech House, 2005

27, 2006

16. Ram Khare, Mobile Broadband Service, Sprint, 2006

Centric Operations, STSC, July 2006, http://www.stsc.hill.af.mil/crossTalk/

defenseindustrydaily.com/2005/07/special-report-the-usas-transformational-

2006/07/0607Meink.html

communications-satellite-system-tsat/index.php

Page 7: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

17. Sami Tabbane, Mobile Next Generation Network, Evolution towards 4G,

20contributions/Algiers_Presentation_AddContrib_STabbane.pdf

Chapter 4

1. Lawrence A. Bush, Christopher D. Carothers, and Boleslaw K. Szymanski, Sensor Networks, Balancing Energy Use and Quality of Ser-

rpi.edu/~chrisc/publications/bush-infocom-2004.pdf

Control Grids, Friedrich-Alexander University Erlangen-Nuremberg, http://www.cetic.be/coregrid/NCOS/presentations/Wolfgang_Schroeder.pdf

3. Edgar H. Callaway, Wireless Sensor Networks: Architectures and Proto-

4. G.M.P. O’Hare, David Marsh, Antonio Ruzzell, and Richard Tynan, Agents for Wireless Sensor Network Power Management, University College Dublin, May 20, 2005, http://www.cs.ucd.ie/students/ARuzzelli/ home/Publications/WSNET05.pdf

5. Yong Yao, J.E. Gehrke. The Cougar Approach to In-Network Query Processing in Sensor Networks, Sigmod Record, Vol. 31, No. 3, Septem-

6. Muneeb Ali and ZartashAfzalUzmi, Energy-Efficient Node Address Naming for Wireless Sensor Networks, IEEE INCC 2004 Lahore, June 11, 2004, http://www.dritte.org/muneeb/files/talks/muneeb_INCC-04.pdf

7. Curt Schurgers, Gautam Kulkarni, and Mani B. Srivastava, Distributed As-signment of Encoded MAC Addresses in Sensor Networks, ACM, 2001, http://delivery.acm.org/10.1145/510000/501463/p295-schurgers.pdf?key1= 501463&key2=0969891611&coll=&dl=ACM&CFID=15151515&CFTOKEN=6184618

Control Grids, Friedrich-Alexander University, http://www.cetic.be/ coregrid/NCOS/papers/PP_Wolfgang_Schroeder.pdf

9. IEEE 802.15 WPAN™ Task Group 4 (TG4), http://www.ieee802.org/ 15/pub/TG4.html

10. The ZigBee Alliance, http://www.zigbee.org/en/index.asp

507 References

19. Next Generation Mobile Network (NGMN), http://www.ngmn.org/ 18. Ram Khare, Overview of A-IMS Initiative, SAIC, October 11, 2006

vice, Rensselaer Polytechnic Institute, July 30, 2003, http://www.cs.

cols, Auerbach Publications, 2004

ber 2002

http://www.itu.int/ITU-D/imt-2000/documents/Algiers2006/Additional%

ITU/BDT Regional Seminar on Mobile and Fixed Wireless Accessfor Broadband Applications for the Arab Region, June 2006,

2. Wolfgang Schroder-Preikschat, Network-Centric Operating Systems for

8. Wolfgang Schroder-Preikschat, Network-Centric Operating Systems for

Page 8: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

11. Mark Hachman, Will Low-Power Wibree Spec Replace Bluetooth?

2023870,00.asp 12. http://www.wibree.com/ 13. Daniel Robinson, New Wireless Standard for Small Devices, IT Week,

October 4, 2006, http://www.itweek.co.uk/itweek/news/2165593/ wireless-standard-small-devices

14. IEEE 1451 Standards, http://ieee1451.nist.gov/ 15. Group: IEEE p1451.0, Common Functions and Protocols, and TEDS

Formats Working Group, http://grouper.ieee.org/groups/1451/0/ 16. Sasa Slijepcevic and Miodrag Potkonjak, Power Efficient Organization

of Wireless Sensor Networks, UCLA, 2001, http://www.cs.ucla.edu/ ~miodrag/papers/ICC2001.pdf

17. Vijay Raghunathan and Pai H. Chou, Design and Power Management of

6184618 18. Hyewon Jun, Mostafa H. Ammar, Mark D. Corner, and Ellen W. Zegura,

Hierarchical Power Management in Disruption Tolerant Networks with Traffic Aware Optimization, ACM Press, 2006 SIGCOMM, http:// prisms.cs.umass.edu/mcorner/papers/chants06.pdf

19. Barbara Hohlt, Lance Doherty, and Eric Brewer, Flexible Power Sched-uling for Sensor Networks, UC Berkeley, 2004 ACM, http:// barbara.stattenfield.org/papers/ipsn_hohlt.pdf

mental Self-Deployment Algorithm for Mobile Sensor Networks, Intelli-gent Embedded Systems, 2001, http://www-robotics.usc.edu/ ~ahoward/pubs/howard_ar01.pdf

21. Lakshminarayanan Subramanian and Randy H. Katz, An Architecture for Building Self-Configurable Systems, IEEE, 2000, http://www.cs. berkeley.edu/~lakme/sensor.pdf

22. Nirupama Bulusu, John Heidemann, Deborah Estrin, and Tommy Tran, Self-Configuring Localization Systems: Design and Experimental Evalua-tion, USC/Information Sciences Institute, 2002 ACM, http://lecs.cs. ucla.edu/Publications/papers/Bulusu02b.pdf

Yao, A Wireless Time-Synchronized Cots Sensor Platform: Applications to Beamforming, Computer Science Department and Electrical Engineer-ing Department, UCLA, http://lecs.cs.ucla.edu/Publications/papers/ Wang02CAS.pdf

508 References

24. Technical Overview of Time Synchronized Mesh Protocol (TSMP), Dust

Networks, http://www.dustnetworks.com/docs/TSMP_Whitepaper.pdf

PCMag.com, October 3, 2006, http://www.pcmag.com/article2/0, 1895,

Energy Harvesting Embedded Systems, 2006 ACM, http://delivery.acm.org/ 10.1145/1170000/1165663/p369-raghunathan.pdf?key1=1165663&key2=0462541611&coll=ACM&dl= ACM&CFID=15151515&CFTOKEN=

20. Andrew Howard, Maja J. Mataric, a nd Gaurav S. Sukhatme, An Incre-

23. H. Wang, L. Yip, Maniezzo, J.C. Chen, R.E. Hudson, J. Elsony, and K.

Page 9: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

25. Kemal Akkaya and Mohamed Younis, A Survey on Routing Protocols for Wireless Sensor Networks, University of Maryland, MD, February 8,

Chapter 5

1. Randy H. Katz, Towards a Bay Area Research Wireless Access Network (BARWAN), University of California, Berkeley, http://bnrg.eecs.berkeley. edu/~randy/Daedalus/BARWAN/BARWAN_layers.html

2. K. Chandran, S. Raghunathan, S. Venkatesan, and R. Prakash, A Feed-back Based Scheme for Improving TCP Performance in Ad-Hoc Wireless Networks, in Proc. of the International Conference on Distributed Com-

3. G. Holland and N. Vaidya, Analysis of TCP Performance over Mobile Ad Hoc Networks, ACM Wireless Networks, Vol. 8, No. 2, pp. 275–288,

4. D. Kim, C. Toh, and Y. Choi, TCP-BuS: Improving TCP Performance in Wireless Ad Hoc Networks, Journal of Communications and Networks,

5. J. Liu and S. Singh, ATCP: TCP for Mobile ad hoc Networks, IEEE

Satish K. Tripathi, Split TCP for Mobile Ad Hoc Networks, IEEE GLOBECOM, 2002, http://www.cs.ucr.edu/~krish/splittcp.pdf

7. K. Fall and S. Floyd, Simulation Based Comparisons of Tahoe, Reno,

8. RFC 0791 Internet Protocol DARPA Internet Program Protocol Specifi-

9. RFC 3168, The Addition of Explicit Congestion Notification (ECN) to IP,

Army Architecture Integration Cell, CIO/G6, Office of the Secretary of

509 References

http://www.isi.edu/~johnh/PAPERS/Heidemann01c.pdf

2005

to Sensor Networks”, Proceedings of the 2005 IEEE International Sym-posium on, Mediterrean Conference on Control and Automation, 2005

March 2002

Vol. 3, No. 2, pp. 175–186, June 2001

and Sack TCP, in Computer Communications review, July 1996

cation, IETF, September 1981

IETF, September 2001

11. John H. Shipp III, IPv6 Army Transition Planning, NAIPv6 Summit,

JSAC, Vol. 19, No. 7, pp. 1300–1315, July 2001

the Army, June 17, 2004

puting Systems (ICDCS’98), Amsterdam, Netherlands, May 1998

Govindan, Deborah Estrin, and Deepak Ganesan, Building Efficient Wire-less Sensor Networks with Low-Level Naming, ACM Press, 2001,

26. John Heidemann, Fabio Silva, Chalermek Intanagonwiwat, Ramesh

27. A.S. Chhetri, D. Morrell, A. Papandreou-Suppappola, C. Chakrabarti,

December 1998 10. RFC 2460 Internet Protocol, Version 6 (IPv6) Specification, IETF,

A. Spanias, J. Zhang, “A Unified Bayesian Decision Theory Perspective

6. Swastik Kopparty, Srikanth V. Krishnamurthy, Michalis Faloutsos, and

Page 10: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

12. RFC 3315, Dynamic Host Configuration Protocol for IPv6 (DHCPv6),

13. RFC2893, Transition Mechanisms for IPv6 Hosts and Routers, IETF,

15. R. Després, The 4to6 Unified IPv4-to-IPv6 Transition Model, 2004, http://perso.orange.fr/remi.despres/I-D_project_4to6_2004-11-01.txt

17. RFC 2461, Neighbor Discovery for IP Version 6 (IPv6), IETF, December

19. RFC 2462, IPv6 Stateless Address Autoconfiguration, IETF, December

20. RFC 4443, Internet Control Message Protocol (ICMPv6) for the Internet

22. RFC 3041, Privacy Extensions for Stateless Address Autoconfiguration

25. Kan Zhigang, Ma Jian, LuoJun, Hu Jianping. Mobile IPv6 and some is-sues for QoS. The 11th Annual Internet Society Conference (INET2001),

26. Charles E. Perkins, Mobile IPv6 and Cellular Telephony, International

27. Linton Wells II, IPv6: A Key to Net-Centric Combat Operations, Assis-tant Secretary of Defense Networks and Information Integration/DoD

29. RFC 1122, Requirements for Internet Hosts, Communication Layers,

31. RFC 2136, Dynamic Updates in the Domain Name System (DNS UP-

34. RFC 2406, IP Encapsulating Security Payload (ESP), IETF, November

510 References

IETF, July 2003

August 2000

16. RFC-3053, IPv6 Tunnel Broker, IETF, January 2001

1998 18. RFC 4311, IPv6 Host-to-Router Load Sharing, IETF, November 2005

1998

Protocol Version 6 (IPv6) Specification, IETF, March 2006 21. RFC 4291, IP Version 6 Addressing Architecture, IETF, February 2006

in IPv6, IETF, January 2001

24. RFC 3344, IP Mobility Support for IPv4, IETF, August 2002

Conference on Communication Technology Proceedings, 2000

Chief Information Officer, May 24, 2005

1998

28. RFC 792, Internet Control Message Protocol, IETF, September 1981

30. RFC 2131, Dynamic Host Configuration Protocol, IETF, March 1997

February 2001 14. RFC-3056, Connection of IPv6 Domains via IPv4 Clouds, IETF,

August 2003 23. RFC 3587, RFC 3587, IPv6 Global Unicast Address Format, IETF,

Stockholm, Sweden, 5–8 June 2001, http://www.isoc.org/isoc/conferences/ inet/01/CD_proceedings/T28/T28.htm

November 1998 32. RFC 2401, Security Architecture for the Internet Protocol, IETF,

DATE), IETF, April 1997, http://www.ietf.org/rfc/rfc2136.txt

IETF, October 1989

33. RFC 2409, The Internet Key Exchange (IKE), IETF, November 1998

Page 11: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

35. Peter Sholander, Glenn Frank, Sean Swank, Joseph Loyall, and Gary Duzan, Multi-Layer, Mission-Aware QoS Management Techniques for IP Applications in a Joint Battlespace Infosphere, Military Communications Conference (MILCOM), October 31–November 3, 2004, http://www. dist-systems. bbn.com/papers/2004/MILCOM-JBI/682.pdf

36. RFC 2474, Definition of the Differentiated Services Field (DS Field) in

38. RFC 2205, Resource ReSerVation Protocol (RSVP), IETF, September

39. RFC 3376, Internet Group Management Protocol, Version 3, IETF,

41. RFC 1035, Domain Names, Implementation and Specification, IETF,

42. RFC 1305, Network Time Protocol (Version 3) Specification, Implemen-

45. RFC 2796, BGP Route Reflection, An Alternative to Full Mesh IBGP,

46. RFC 3065, Autonomous System Confederations for BGP, IETF, February

47. Public key cryptography, http://www.answers.com/topic/public-key-cryptography

48. J. Christopher Ramming, Toward New and Better Protocols for Wireless Networking, Software Defined Radio Forum Meeting, DARPA, April 11,

49. Jon M. Peha, Spectrum Management Policy Options, IEEE Communica-tions Surveys, Fourth Quarter, Vol. 1, No. 1, 1998, http://www. comsoc.org/livepubs/surveys/public/4q98issue/pdf/Peha.pdf

50. S.M. Radicella, ICTP Lecture Notes: Introduction to International Radio Regulations, ICTP, 3–21 February 2003, http://users.ictp.it/~pub_off/ lectures/lns016/Vol_16.pdf

51. Kimmo Kalliola, Spectrum Sharing and Flexible Spectrum Use, FU-

511 References

the IPv4 and IPv6 Headers, IETF, December 1998

1981

1997

40. RFC 1034, Domain Names, Concepts and Facilities, IETF, November

November 1987

October 2002

tation and Analysis, IETF, March 1992 43. RFC 2453, RIP Version 2, IETF, November 1998 44. RFC 1771, A Border Gateway Protocol 4 (BGP-4), IETF, March 1995

IETF, April 2000

2001

2006

TURA Workshop, August 16, 2004

37. RFC 791, Internet Protocol, Protocol Specification, IETF, September

1987

Foundation, http://www.nsf.gov/pubs/2006/nsf06516/nsf06516.htm 52. NSF 06-516 – Networking Technology and Systems (NeTS), National Science

Page 12: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

53. Joseph B. Evans, The NeTS Program, National Science Foundation,

workshops/nsf.wireless/Evans_ProWiN_NeTS_Program2.pdf 54. General Spectrum Policy and Information, DISA, http://www.disa.mil/

jsc/gen_policy_info.html 55. Spectrum and Electromagnetics 101, Defense Acquisition University,

https://acc.dau.mil/CommunityBrowser.aspx?id=21857 56. JOINT TRANSITION COURSE PLANNING PRIMER, Joint Forces Staff

College, June 2005, http://www.jfsc.ndu.edu/schools_programs/jtc/ JTC_Planning_Primer.pdf

57. B.G. Jeffrey W. Foley, Update on Army Activities in Spectrum Manage-

Chapter 6

1. W. Chan Kim, Renée Mauborgne, Blue Ocean Strategy: How to Create Uncontested Market Space and Make Competition Irrelevant, Harvard

2. Wireless Service Measurements Handbook Version 3.0, TMF GB923,

3. Internet End-to-end Performance Monitoring: Network Monitoring Tools, IEPM, http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html#com

4. Arthur K. Cebrowski, U.S. Navy, and John J. Garstka, Network-Centric Warfare: Its Origin and Future, January 1998, http://www.usni.org/ Proceedings/Articles98/PROcebrowski.htm

5. Federal Standard 1037C Telecommunications: Glossary of Telecommu-nication Terms, http://www.its.bldrdoc.gov/fs-1037/

6. ATIS Telecom Glossary 2000: ATIS Committee T1A1Performance and Signal Processing, T1.523-2001, http://www.atis.org/tg2k/

7. Wireless Service Measurement: Key Quality Indicators Version 1.5, TMF

8. NCES Management Information and Data Models, 33403/2006, FMV,

Vad%20gor%20FMV/Uppdrag/LedsystT/FMLS/FMLS_Generic%20Design/LT1K%20P06-0095%20NCES%20Management%20Information%20 and%20Data%20models%201.0%20-%20c.pdf

9. The PingER Project, DOE MICS, http://www-iepm.slac.stanford.edu/ pinger/

10. Tom Artell, Management Protocols: TMN CMIP TINA WAP, Advanced

512 References

ment, Annual Defense Spectrum Summit – 2006

Business School Publishing Corp., 2005

March 2004

GB923A, March 2004

5 February 2004, Arlington, Virginia, http://www.cra.org/Activities/

course in Network Based Automation, June 10, 2003, http://www. ac.tut.fi/aci/courses/7601010/2003/esitykset/3.1-3.3.ppt

September 2006, http://www.fmv.se/upload/Bilder%20och%20dokument/

Page 13: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

11. J. Won-Ki Hong, OSI Management Framework: Overview, POSTECH, http://dpnm.postech.ac.kr/cs637/lecture/osi-overview.ppt

12. RFC 1065, Structure and Identification of Management Information for

13. RFC 1066, Management Information Base for Network Management of

14. RFC 1067, A Simple Network Management Protocol, IETF, August

15. RFC 1441, Introduction to Version 2 of the Internet-standard Network

16. RFC 1442, Structure of Management Information for Version 2 of the

17. RFC 1443, Textual Conventions for Version 2 of the Simple Network

18. RFC 1444, Conformance Statements for Version 2 of the Simple Network

19. RFC 1445, Administrative Model for Version 2 of the Simple Network

20. RFC 1446, Security Protocols for Version 2 of the Simple Network Man-

21. RFC 1447, Party MIB for Version 2 of the Simple Network Management

22. RFC 1448, Protocol Operations for Version 2 of the Simple Network

23. RFC 1449, Transport Mappings for Version 2 of the Simple Network

24. RFC 1450, Management Information Base for Version 2 of the Simple

26. RFC 1452, Coexistence between Version 1 and Version 2 of the Internet-

27. RFC 1155, Structure and Identification of Management Information for

28. RFC 1901, Introduction to Community-based SNMPv2, IETF, January

29. RFC 1902, Structure of Management Information for Version 2 of the

30. RFC 1903, Textual Conventions for Version 2 of the Simple Network

31. RFC 1904, Conformance Statements for Version 2 of the Simple Network

513 References

TCP/IP-based internets, IETF, August 1988

TCP/IP-based Internets, IETF, August 1988

1988

Management Framework, IETF, April 1993

Management Protocol (SNMPv2), IETF, April 1993

Management Protocol (SNMPv2), IETF, April 1993

Management Protocol (SNMPv2), IETF, April 1993

agement Protocol (SNMPv2), IETF, April 1993

Protocol (SNMPv2), IETF, April 1993

Management Protocol (SNMPv2), IETF, April 1993

Management Protocol (SNMPv2), IETF, April 1993

Network Management Protocol (SNMPv2), IETF, April 1993

April 1993

standard Network Management Framework, IETF, April 1993

TCP/IP-based Internets, IETF, May 1990

1996

Simple Network Management Protocol (SNMPv2), IETF, January 1996

Management Protocol (SNMPv2), IETF, January 1996

Management Protocol (SNMPv2), IETF, January 1996

Simple Network Management Protocol (SNMPv2), IETF, April 1993

25. RFC 1451, Manager-to-Manager Management Information Base, IETF,

Page 14: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

32. RFC 1905, Protocol Operations for Version 2 of the Simple Network

33. RFC 1906, Transport Mappings for Version 2 of the Simple Network

34. RFC 1907, Management Information Base for Version 2 of the Simple

35. RFC 1908, Coexistence between Version 1 and Version 2 of the Internet-

36. RFC 1909, An Administrative Infrastructure for SNMPv2, IETF, Febru-

37. RFC 1910, User-based Security Model for SNMPv2, IETF, February

38. RFC 3411, An Architecture for Describing Simple Network Management

40. RFC 3413, Simple Network Management Protocol (SNMP) Applications,

41. RFC 3414, User-based Security Model (USM) for Version 3 of the Sim-

42. RFC 3415, View-based Access Control Model (VACM) for the Simple

43. RFC 3416, Version 2 of the Protocol Operations for the Simple Network

44. RFC 3417, Transport Mappings for the Simple Network Management

45. RFC 3418, Management Information Base (MIB) for the Simple Network

46. RFC 3584, Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework, IETF, August

47. http://www.jcp.org Chapter 7

1. EA & Services Oriented Enterprise (SOE)/Service Oriented Architecture (SOA) and Service Oriented Computing (SOC), Institute for Enterprise Architecture Developments, http://www.enterprise-architecture.info/EA_ Services-Oriented-Enterprise.htm

2. SLA Management Handbook: Service and Technology Examples, Vol. 3,

514 References

Management Protocol (SNMPv2), IETF, January 1996

Management Protocol (SNMPv2), IETF, January 1996

Network Management Protocol (SNMPv2), IETF, January 1996

standard Network Management Framework, IETF, January 1996

ary 1996

1996

39. RFC 3412, Message Processing and Dispatching for the Simple Network Protocol (SNMP) Management Frameworks, IETF, December 2002

Management Protocol (SNMP), IETF, December 2002

IETF, December 2002

ple Network Management Protocol (SNMPv3), IETF, December 2002

Network Management Protocol (SNMP), IETF, December 2002

Management Protocol (SNMP), IETF, December 2002

Protocol (SNMP), IETF, December 2002

Management Protocol (SNMP), IETF, December 2002

2003

Version 2.0 TMG GB 917-3, July 2004

Page 15: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

3. Paulo Rogrio Pereira, Elionildo Menezes, Djamel Sadok, and Centro De Informtica, Management of Differentiated Services with Active Policies, The Pennsylvania State University CiteSeer Archives, 2000, http://www. inesc-id.pt/pt/indicadores/Ficheiros/1031.pdf

6. Sally Floyd, ECN and Defenses against Evil Applications, January 1998, http://www.icir.org/floyd/ecn/ecn_congestion.txt

7. The Addition of Explicit Congestion Notification (ECN) to IP, The Inter-

8. P. Hovell, R. Briscoe and G. Corliano, Guaranteed QoS Synthesis – An Example of a Scalable Core IP Quality of Service Solution, BT Technol-ogy Journal, Vol. 23, No. 2, April 2005, http://www.cs.ucl.ac.uk/ staff/bbriscoe/projects/ipe2eqos/gqs/papers/gqs_bttj05.pdf

9. RFC 1889, RTP: A Transport Protocol for Real-Time Applications, The

10. Geoff Huston, Internet Performance Survival Series, John Wiley & Sons,

11. Hierarchical Token Bucket (HTB) Homepage by Martin Devera, In-cludes Theory and Implementation, http://luxik.cdi.cz/~devik/qos/htb/

12. P. Ferguson and G. Huston, Quality of Service: Delivering QoS on the

13. RFC 1633, Integrated Services in the Internet Architecture: An Over-

14. RFC 2205, Resource ReSerVation Protocol (RSVP), The Internet Society,

15. RFC 2210, The Use of RSVP with IETF Integrated Services, The Internet

16. S. Blake, An Architecture for Differentiated Services, IETF RFC2475,

17. Xipeng Xiao and Lionel M. Ni, Internet QoS: A Big Picture, IEEE Net-

18. RFC 0791, Internet Protocol DARPA Internet Program Protocol Specifi-

19. Paresh Shah, Utpal Mukhopadhyaya, and Arun Sathiamurthi, Overview

nanog.org/mtg-0602/pdf/sathiamurthi.pdf

515 References

net Society, September 2001

Internet Society, January 1996

Inc., 2000

Internet and in Corporate Networks, John Wiley & Sons, Inc., 1998

view, The Internet Society, June 1994

September 1997

Society, September 1997

December 1998

work Magazine, March 1999

cation, The Internet Society, September 1981

of QoS in Packet-based IP and MPLS Networks, NANOG, http://www.

20. RFC 2474, Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers, The Internet Society, December 1998

4. Geoff Huston, The ISP Column: Faster, Internet Society, http://ispcolumn.isoc.org/2005-06/faster.html

5. QOS Section 6, Weighted Random Early Detection (WRED), CISCO Press, http://www.ciscopress.com/content/images/1587201283/samplechapter/ 1587201283content.pdf

Page 16: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

21. RFC 2597, Assured Forwarding PHB Group, The Internet Society, June

22. RFC 2598, An Expedited Forwarding PHB, The Internet Society, June

23. Venkatesh Prabhakar, Srinivas R. Avasarala, and Sonia Fahmy, Security in Differentiated Services Networks, CERIAS, 2001, http://www.cerias. purdue.edu/symposium/2001/posters/post_16.pdf

24. RFC 2697, A Single Rate Three Color Marker, The Internet Society,

nications – Integrated Services Digital Network (ISDN), Multi-Level Precedence and Preemption (MLPP) Service Capability, ANSI T1.619-

26. [ANSI.MLPP.Supplement] American National Standards Institute, MLPP Service Domain Cause Value Changes, ANSI T1.619a-1994

27. [ITU.MLPP.1990] International Telecommunications Union, Multilevel Precedence and Preemption Service (MLPP), ITU-T Recommendation

28. V. Fineberg, Specification of the Military Precedence and Preemption in the DS-TE Networks, Military Communications Conference, 2004. IEEE

29. Kan Zhigang, Jian MA, Luo Jun, and Hu Jianping, Mobile IPv6 and Some Issues for QoS, INET 2001, http://www.isoc.org/isoc/conferences/ inet/01/CD_proceedings/T28/T28.htm Chapter 8

2. Net-Centric Environment Joint Functional Concept, Version 1.0, Defense Technical Information Center (DTIC), April 7, 2005, http://www. dtic.mil/futurejointwarfare/concepts/netcentric_jfc.pdf

3. Craig Mindrum and Anderson Consulting. NetCentric and Client/Server

4. Anthony J. Simon, Overview of the Department of Defense Network-Centric Data Strategy, The Journal of Defense Software Engineering,

516 References

1999

1999

25. [ANSI.MLPP.Spec] American National Standards Institute, Telecommu-September 1999

1992 (R1999), 1992

(R1999), 1990

I.255.3, 1990

MILCOM 2004, October-3 November 2004

July 2006

Computing: A Practical Guide, AUERBACH, December 18, 1998

Defense Chief Information Officer (CIO), May 9, 2003, http://www. 1. Department of Defense Net-Centric Data Strategy, Department of

dod.mil/cio-nii/docs/Network-Centric-Data-Strategy-2003-05-092.pdf

Page 17: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

5. Andre Yee, Building Resiliency into Your Enterprise Integration System,

7. Nancy Mullen, Information for Innovation: Developing an Enterprise Data Strategy, Column published in DM Review Magazine, October

8. NCES Management Information and Data Models, Swedish Defence

1__fulltext.pdf 10. Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, and

Herbert Rubens, Mitigating Byzantine Attacks in Ad Hoc Wireless Networks:

http://wireless.cs.jhu.edu/publications/Awerbuch-MitigatingByzantine-Tech

11. DATA ENCRYPTION STANDARD (DES), U.S. DEPARTMENT OF

12. ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, November 26, 2001, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

13. Escrowed Encryption Standard (EES), Federal Information Processing Standards Publication 185, February 9, 1994, http://www.itl.nist.gov/ fipspubs/fip185.htm

14. SKIPJACK and KEA Algorithm Specifications, May 29, 1998, http://csrc.nist.gov/CryptoToolkit/skipjack/skipjack.pdf

15. Keith Palmgren, Diffie-Hellman Key Exchange – A Non-Mathematician’s Explanation, NetIP Security, August 2006, http://www.netip.com/articles/ keith/diffie-helman.htm

16. Zoran Stojanovic and Ajantha Dahanayake, Service-Oriented Software System Engineering: Challenges and Practices, Idea Group Publishing,

17. Web Services Federation Language (WS-Federation)Version 1.1, BAE, BMC, IBM, Microsoft, RSA, etc., December 2006, http://download.

V1-1B.pdf

517 References

6. Norbert Bieberstein, Sanjay Bose, Marc Fiammante, Keith Jones, and Rawn Shah, Service-Oriented Architecture Compass: Business Value,Planning, and Enterprise Roadmap, IBM Press, 2006

2001, http://www.dmreview.com/article_sub.cfm?articleId=4110

Materiel Administration (FMV) Document, 2006

Report1-March2004.pdf

Technical Report Version 1, Johns Hopkins University, March 2004,

2005

boulder.ibm.com/ibmdl/pub/software/dw/specs/ws-fed/WS-Federation-

ebizq.net, February 16, 2004, http://www.ebizq.net/topics/dev_tools/ features/3783.html

Systems, Tekniska Högskolan Linköpings Universitet, December 4, 2006, www.diva-portal.org/diva/getDocument?urn_nbn_se_liu_diva-7880-

9. Fredrik Landberg, Flexible Role-handling in Command and Control

COMMERCE/National Institute of Standards and Technology, FEDERAL

PUB 46-3, Reaffirmed October 25, 1999, http://csrc.nist.gov/publications/ fips/fips46-3/fips46-3.pdf

INFORMATION PROCESSING STANDARDS PUBLICATION, FIPS

Page 18: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

18. OASIS eXtensible Access Control Markup Language (XACML) TC 2.0, OASIS, February 2005, http://www.oasis-open.org/committees/ tc_home.php?wg_abbrev=xacml

19. Web Services Security Policy Language (WS-SecurityPolicy) Version 1.1, Microsoft, VeriSign, IBM, and RSA Security, July 2005, ftp://www6. software.ibm.com/software/developer/library/ws-secpol.pdf

20. Web Services Security Policy Language (WS-SecurityPolicy) Version 1.1, Microsoft, VeriSign, IBM, RSA Security, July 2005, ftp://www6.software.ibm.com/software/developer/library/ws-secpol.pdf

21. Web Services Secure Conversation Language (WS-SecureConversation), OpenNetwork, Layer 7, Computer Associates, Microsoft, IBM, VeriSign, BEA, Oblix, Reactivity, etc., February 2005, ftp://www6.software. ibm.com/software/developer/library/ws-secureconversation.pdf

22. Web Services Trust Language (WS-Trust), OpenNetwork, layer 7, Micro-

23. Service Provisioning Markup Language (SPML) V2.0, OASIS, April 2006, http://www.oasis-open.org/specs/index.php#spmlv2.0

24. XML Common Biometric Format (XCBF) Version 1.1 [OASIS 200305], OASIS, August 2003, http://www.oasis-open.org/committees/wss/ documents/WSS-XCBF.doc

25. Public-Key Infrastructure (X.509), IETF, April 02, 2007, http://www.ietf.org/html.charters/pkix-charter.html

26. Types of Attacks That Pose Security Risks in an Organization, Microsoft

reskit/prork/prdd_sec_glkj.mspx?mfr=true 27. Newton Howard and Ammar Qusaibaty, Network-Centric Information

March 2004, http://www.c4ads.org/papers/nip_draft.pdf?PHPSESSID= 58a0b58b9bc16f2d1ffd916f4962c48b Chapter 9

1. Mark Nissen and Raymond Levitt, Dynamic Models of Knowledge-Flow Dynamics, CIFE Working Paper #76, Stanford University, November 2002, http://www.stanford.edu/group/CIFE/online.publications/WP076.pdf

3. Anthony F. Buono and Flemming Poulfelt (eds), Challenges and Issues

518 References

2. Howard Markson, VP Product Marketing, Reflectent Software, Aligningthe Business With the End User Experience, eBiz, June 26, 2005, http://www.ebizq.net/topics/crm_int/features/6061.html

in Knowledge Management, Information Age Publishing, 2005

soft, VeriSign, IBM, RSA Security, etc., February 2005, ftp:// www6.software.ibm.com/software/developer/library/ws-trust.pdf

TechNet, http://www.microsoft.com/technet/prodtechnol/windows2000serv/

Policy, The George Washington University, Université Paris-1 Sorbonne,

Page 19: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

4. Troy Thomas, Sam Grable, and Jim Stratton, Expeditionary Air Force Leaders, Cognitive Skills for the Naturalistic Battlespace, USAF, February 26, 2001, http://www.airpower.au.af.mil/airchronicles/cc/ stratton.html

5. Richard W. Pew and Anne S. Mavor, Modeling Human and Organiza-tional Behavior: Application to Military Simulations, Commission on Behavioral and Social Sciences and Education (CBASSE), 1998, http://www.nap.edu/books/0309060966/html

7. Mieczyslaw M. Kokar, Christopher J. Matheus, Kenneth Baclawski, Jerzy A. Letkowski, Michael Hinman, and John Salerno, Use Cases for Ontologies in Information Fusion, Northeastern University, http:// www.ece.neu.edu/groups/scs/kokar/publications/KokarUseCases.pdf

8. Christopher J. Matheus, Position Paper: Using Ontology-based Rules for Situation Awareness and Information Fusion, Versatile Information Sys-tems, December 2004, http://www.w3.org/2004/12/rules-ws/paper/74/

9. Subhash Challa and Don Koks, Bayesian and Dempster–Shafer fusion, Sadhana Vol. 29, Part 2, April 2004, pp. 145–174, http://www.ias.ac.in/ sadhana/Pdf2004Apr/Pe1158.pdf

http://www.ottawa.drdc-rddc.gc.ca/html/RAST-218-cop_e.html 11. Anscombe, Francis J. (1973) Graphs in Statistical Analysis. American

dle, and Mike Lewis, Terrain-Based Information Fusion and Inference,

GlintonFusionFinal.pdf

Event Processing, eBiz, February 6, 2005, http://www.ebizq.net/topics/ cep/features/5580.html?page=4

opportunity, Complex Event Processing, April 2007, http://www. infoworld.com/article/07/04/02/14TCcoral_1.html

posable Systems Group at Carnegie Mellon, 1995, http://www. cs.cmu.edu/People/ModProb/MRsol4.html

519 References

Version 2.0 TMG GB 917-3, July 2004

Statistician, 27, pp. 17–21

6. SLA Management Handbook: Service and Technology Examples, Vol. 3,

13. Robin Glinton, Sean Owens, Joe Giampapa, Katia Sycara, Chuck Grin-

14. David Luckham (Stanford University), Taking the Fear out of Complex

15. James R. Borck, InfoWorld: Coral8 Engine 4.6 presents a sea of CEP

16. Mary Shaw, Mobile Robot – Solution 4: Blackboard Architecture, Com-

http://www.swemorph.com/it-art.html

Fusion, July, 2004, http://www.cs.cmu.edu/~softagents/papers/ Proceedings of the Seventh International Conference on Information

Demonstration Project, Dedence R&D Canada-Ottawa, 2005, 10. Multi-Sensor Integration within a Common Operating, Technology

12. Tom Ritchey, Modeling Complex Socio-Technical Systems using Morpho-logical Analysis, Swedish Parliamentary IT Commission, December 2002,

Page 20: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

ard.html

Using a Global Workspace Architecture, A Working Example, 2006, http://www.doc.ic.ac.uk/~tpg99/vs.html

1997, http://www.ecfc.u-net.com/cost/fuzzy.htm

Greenbelts, Blackbelts, and Managers at All Levels, Revised and

Chapter 10 1. Industry Best Practices in Achieving Service Oriented Architecture

(SOA): A Report of the Net-Centric Operations Industry Forum (NCOIF)

2005, http://www.afei.org/news/documents/IndustryBestPracticesfor AchievingSOA_000.pdf

2. Frank Martinez, Reliable Messaging in a Services Network- Intermedia-tion-Based, Networking-Centric Approaches Enable Your SOA to Support the Most Sophisticated Enterprise Applications, Enterprise Architect, June 2, 2005, http://www.ftponline.com/ea/magazine/summer2005/columns/ soainsights/

3. Amine Chigani and James D. Arthur, The Implications of Network-Centric Software Systems on Software Architecture: A Critical Evalua-tion, ACM Press, 2007, http://arxiv.org/ftp/cs/papers/0611/ 0611110.pdf

4. Norbert Bieberstein, Sanjay Bose, Marc Fiammante, Keith Jones, and Rawn Shah, Service-Oriented Architecture (SOA) Compass: Business Value, Planning, and Enterprise Roadmap, IBM Press, October 2005, http://www.ibmpressbooks.com/articles/article.asp?p=422305&rl=1

5. Wireless Service Measurement: Key Quality Indicators Version 1.5, TMF

6. Wireless Service Measurements Handbook Version 3.0, TMF GB923,

520 References

Blackboard Learning System with Sun Java System Identity Server 6.0, 17. Ezhilan Narasimhan and Sujeet Vasudevan, and Marina Sum, Integrating

18. Murray Shanahan, Andreas Fidjeland, and Tim Guhl, Robot Perception

19. Dan. Snell, Fuzzy logic systems, Bournemouth University, December 3,

20. Hans-Jürgen Zimmermann, Fuzzy Set Theory and its Applications,

21. Thomas Pyzdek, The Six Sigma Handbook: The Complete Guide for

22. Wireless Service Measurements Handbook Version 3.0, TMF GB923,

Springer, December 7, 2005

Expanded Edition, McGraw-Hill, March 20, 2003

March 2004

March 2004

GB923A, March 2004

http://developers.sun.com/prodtech/identserver/reference/techart/blackbo

Data Sharing and Services Strategy Working Group, NCOIF, April 22,

SP1:A Case Study, Sun Developer Network (SDN), February 26, 2004,

Page 21: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

9. Dave Shaffer, Best Practices for Building SOA Applications, AJAX World Magazine, September 21, 2006, http://ajax.sys-con.com/ read/275111_1.htm

10. R. Cherinka, R. Miller, and C. Smith, Beyond Web Services: Towards On-Demand Complex Adaptive Environments, MITRE, 2005, http://www.mitre.org/work/tech_papers/tech_papers_05/05_0683/05_0683.pdf

11. DoD Architecture Framework Working Group: DoD Architecture

Volume_II.pdf 12. C4ISR Architecture Framework Version 2.0, AFCEA C4ISR Architec-

ture Working Group (AWG), December 18, 1997, http://www.afcea.org/education/courses/archfwk2.pdf

13. Access GIG Services, Portal to the Global Information Grid, http://ges.dod.mil/pilotservices.htm

site/book.asp?menuid=15&vs=3&page=vol5%2Dsup2%2Fch02%2Ehtml or http://194.7.80.153/website/book.asp?menuid=15&vs=3&page= about%2Ehtml

15. INFORMATION SHARING ON NETWORKS, A Cryptek Technical White Paper, April 05, 2005, http://uk.builder.com/whitepapers/0,

16. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, March 1, 2006, http://www.intelligententerprise.com/showArticle.jhtml?articleID= 179101909&pgno=1

17. John Stelzer, Moving Beyond EAI and B2Bi, ebizq.net, December 11, 2005, http://www.ebizq.net/topics/tech_in_biz/features/6557.html?related

18. William A. Ruh, Francis X. Maginnis and William J. Brown, Enterprise

19. Keith Harrison-Broninski, The Future of BPM, Role Modellers Ltd., May 11, 2006, http://www.ebizq.net/topics/bpm/features/6860.html?related

20. Paul Allen, Service Orientation: Winning Strategies and Best Practices,

521 References

7. Jonathan M. Tisch, Karl Weber, The Power of We, Succeeding Through Partnerships, John Wiley & Sons, Inc., 2004

work, Cross Talk-The Journal of Defense Software Engineering, September

21. James McGovern, Sameer Tyagi, Michael Stevens, and Sunil Mathew, Java Web Services Architecture, Sun Developer Network (SDN) , July 2003, http://java.sun.com/developer/Books/j2ee/jwsa/

Application Integration: A Wiley Tech Brief, John Wiley & Sons, 2001

Cambridge University Press, 2006

8. Yun-Tung Lau, Service-Oriented Architecture and the C4ISR Frame-

February 9, 2004, http://www.defenselink.mil/cio-nii/docs/DoDAF_v1_ Framework, Version 1.0 Volume II: Product Descriptions, DOD,

14. NATO C3 Technical Architecture, (NC3TA), http://nc3ta.nc3a.nato.int/web-

39026692, 60145911p-39001550q,00.htm

2004, http://www.stsc.hill.af.mil/crosstalk/2004/09/0409Lau.html

Page 22: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

22. Curtis L. Blais, Niki C. Goerger, Paul Richmond, Burhman Gates, MAJ John B. Willis, Global Information Grid Services and Generation of the Mobility Common Operational Picture, Proc. of the Simulation Interop-

24. Enhanced Telecom Operations Map (eTOM) The Business Process Framework For The Information and Communications. eTOM-B2B Inte-gration: Using B2B Inter-Enterprise Integration with eTOM, TMF

_Guidance_(v1.0)_2006-21-06.pdf 27. Sanjiv Rai, Crossroads & Convergence, The World of Anytime Anywhere

Computing, (ARE) Technologies, http://www.newhaven.edu/unh/pdf/eng/ Wireless_Computing_and_Convergence.pdf

28. http://www.tmforum.org

30. A.K. Cebrowski, The Implementation of Network-Centric Warfare, Office of Force Transformation, Office of the Secretary of Defense, January 2005,

LowRes.pdf

522 References

erability Work-shop, Orlando, FL: March 2005

GB921B, March 2004

Rawn Shah, Service-Oriented Architecture Compass: Business Value,ness Value, Planning, and Enterprise Roadmap, IBM Press, 2006

23. Instant Messaging and Presence Protocol (IMPP) – SIMPLE CPIM, IETF, January 2003, http://tools.ietf.org/html/draft-ietf-impp-cpimmsgfmt-08

26. Business Transformation Guidance, Version 1.0, DoD, June 21, 2006,

25. Norbert Bieberstein, Sanjay Bose, Marc Fiammante, Keith Jones, and

http://www.defenselink.mil/dbt/products/BTG/Business_Transformation

29. http://www.supply-chain.org

http://www.oft.osd.mil/library/library_files/document_387_NCW_Book_

Page 23: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

Index

3G, 5 3GPP, 113 4G, 114 802.11a, 107 802.11b, 107 802.11g, 107 A course of action. See COA AAA, 140, 141 ABR, 235 access management, 489 accountability, 362 Accountability, 274 ACQUIRE, 177 Acquisition, Technology and Logistics.

See AT&L actionable metric, 419 active attack, 383 active power consumption, 246 ACtive Query forwarding In sensoR

nEtworks. See ACQUIRE active sensor, 160 activity model, 468 adaptive rate control, 321 Adaptive Threshold sensitive Energy

Efficient sensor Network protocol. See APTEEN

ADC, 131 ad-hoc mode, 146 ad-hoc networks, 103, 122 Ad-hoc networks, 213 Ad-hoc Transport Control Protocol. See

ATCP

Ad-hoc Transport Protocol. See ATP, See ATP

Advanced Encryption Standard. See AES Advanced Mobile Phone System. See

AMPS Advanced Research Projects Agency

Network. See ARPANET Advances to IMS. See A-IMS AEP, 134 AES, 194, 386 AF, 339 Aggregator nodes, 161 AH, 225, 227 AI, 296 A-IMS, 155 Airborne, Maritime, Fixed or station. See

AMF alarm correlation, 301 All View, 463, 464 ALOHANET, 109 AM, 131 American National Standards

Institute/Telecommunications/Industry Association/Electronic Industry Alliance. See ANSI/TIA/EIA

AMF, 112 amplitude, 242 Amplitude modulation. See AM AMPS, 109 analog-to-digital converter. See ADC ANOVA, 425, 426 ANOVA Gage R&R, 426

523

Page 24: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

ANOVA gage repeatability and reproducibility. See ANOVA Gage R&R

ANSI/TIA/EIA, 114 AO, 411 AOR, 70 API, 18 application connectivity services, 474 Application Environment Profile. See

AEP application layer, 130 application program interfaces. See API Application services, 475 application support layer. See APS APS, 193 APTEEN, 179 area border router. See ABR area of operations. See AO Area of Responsibility. See AOR Armed Forces command and control

system 2010. See FMLS ARPANET, 108 artificial intelligence. See AI AS, 234 assessment-decision-action loop, 407 Assured forwarding. See AF asymmetric key cryptography, 240 asymmetric-key, 387 AT&L, 52 ATCP, 216 ATM, 113, 140, 144, 306 ATP, 130, 217 attack traffic pattern detection, 385 Authentication, 120 authentication among hosts, 385 authentication header. See AH Authentication, Authorization, and

Accounting. See AAA authenticity, 363 authority, 363 automatic farming, 8 automatic tunneling, 220 AV, 464 availability, 362 Availability, 120, 274 awareness applications, 486 awareness services, 482 B2Bi, 17 B3G, 114 balanced scorecard. See BSC

BAM, 16, 478, 479 bandwidth and battery power, 321 bandwidth constraint, 319 base plan, 259 base stations. See BS basic analysis of variance. See ANOVA Bayesian decision, 207 Bayesian decision theory, 428 Bayesian methods, 422 BE, 322 beacons, 181 beam-forming, 169 behavior aggregate, 339 BER, 267 best effort. See BE Beyond 3G. See B3G BGCF, 155 BGP, 236 BI, 480 binary phase-shift keying. See BPSK bit error rate. See BER BLA, 309 black hole, 383 Bluetooth, 111 BMC Patrol, 293 bootstrapping, 207 border gateway protocol. See BGP BPEL4WS, 17, 478 BPM, 16, 477 BPSK, 125 BRAN, 152 Brand Management, Market Research &

Advertising process, 89 breakout gateway control function. See

BGCF BRM, 96, 478 Broadband Radio Access Networks. See

BRAN broadband wireless access. See BWA BS, 104 BSC, 440 BSS, 90, 91, 138 buffer overflow, 320 business activities monitoring. See BAM business activity monitoring. See BAM Business Application, 451 Business Applications, 451 Business Applications Management. See

BAM business capacity, 317

524 Index

Page 25: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

business intelligence. See BI business intelligence and integrated

collaboration environments, 17 business level agreement. See BLA Business modeling, 478 Business modeling and monitoring, 474 Business objectives, 415 Business Process Execution Language for

Web Services. See BPEL4WS business process management. See BPM Business Process Management. See BPM Business Reference Model. See BRM Business rules manager. See BRM Business Services, 98 Business to Business Integration. See

B2Bi buyer involvement, 275 BWA, 150 byzantine robustness, 385 C2, 102, 253, 496 C4I, 42, 52 CAC, 342 CADR, 176 call admission control. See CAC Call Session Control Function. See CSCF Carrier sense medium access. See CSMA case-based reasoning, 296 Catalogues, 484 Categorical predictors, 422 Causal layered analysis. See CLA cause and effects diagram, 437 CBQ, 325 CBWFQ, 325 CCA, 190, 425 CDM, 393 CDMA, 104, 109, 126, 142 CDMA 2000, 107 CDMA2000, 142 CE, 151 central asynchronous configuration, 487 central synchronous configuration, 487 CEP, 430 certain discovery, 384 CFR Part 11, 6 channel frequencies, 247 charging schedule, 246 Chief Information Officer. See CIO chi-square distribution, 427 CIDR, 236 CIO, 52

cipher, 386 circuit-switched. See CS Cisco Internetwork Operating System.

See IOS CLA, 309, 316, 425 class-based queuing. See CBQ class-based weighted fair queuing. See

CBWFQ classified networks, 72 classless inter-domain routing. See CIDR clear channel assessment. See CCA clustered architecture, 168 CMIP, 282 CMIS, 282 COA, 259, 415, 428 code-division multiple access. See

CDMA, See CDMA Cognitive Domain, 51 cognitive radio, 250 CoI, 9, 354, 355, 395, 415 Collaboration mechanism, 411 Collaboration services, 475 Collaboration Virtual Workspace. See

CVW collaborative detection, 166 command and control. See C2 Command, Control, Communications,

Computers and Intelligence. See C4I commodity service concept, 487 Common configuration, 50 common management information

services. See CMIS common management interface protocol.

See CMIP common object request broker

architecture. See CORBA common operational pictures, 420 Communications, 60 communities of interest. See CoI Community of Interest. See CoI compatibility, 362 Complex event processing. See CEP Complex Event Processing, 480 computational dead-lock, 416 Computing, 60 Computing and Infrastructure layer, 306 Computing and Network Framework, 451 Computing and Networking Framework,

354 Computing Infrastructure layer, 354

525Index

Page 26: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

concept of operation. See CONOP concept plan. See CONPLAN confidentiality, 363 Confidentiality, 120, 274 configured tunneling, 220 CONOP, 465 CONPLAN, 260 consistency, 318 Constrained anisotropic diffusion routing.

See CADR consumer electronics. See CE containment, 416 content management, 484 continuation of critical functions, 361 control overhead, 320 control plane, 313 control, communications, and

intelligence. See C4I COP, 75, 210, 299, 420, 434, 461, 481 CORBA, 134, 281 correlation coefficient, 423 COUGAR, 176 course of action. See COA coverage and capacity analysis, 244 CQ, 324 Create Service, 459 CRM, 7, 256 cross consistency assessment. See CCA cross-classification connectivity and

control, 489 cross-domain-mediators. See CDM cryptographic hash functions, 387 Cryptography, 385 CS, 113 CSAA, 294 CSCF, 153 CSMA, 118 CSMA-CA, 190 custom queuing. See CQ customer interface management. See

CRM customer level agreement. See CLA customer QoS management, 350 customer relationship management, 17,

See CRM Customer Relationship Management, 85 CVW, 486 DAC, 131 DARPA, 108 DARPA Next Generation. See XG

DAS, 488 Data, 405 data Analysis, 263 data and assurance model, 370 data control, 367 data diffusion, 165 Data dissemination, 165 Data Encryption Standard. See DES data fusion, 294 data interception, 393 data management, 366, 377 data model, 366 data overlap, 172 data plane, 312 Data Precedence, 229 Data Reference Model. See DRM data strategy, 359 data warehousing, 377 Database, 290 datagrams, 217 DDMS, 373 Defects per (one) million opportunities.

See DPMO Defense Advanced Research Projects

Agency. See DARPA degree of self-configuration, 274 delay, 319 demand fluctuations, 275 Dempster-Shafer evidential reasoning.

See DSER, See DSER denial of service, 241, 274, 320, 393 depart time, 273 Department of Defense. See DoD dependence, 416 Dependence, 444 DES, 386 design of experiments. See DOE DHCP, 140, 147, 224 Differentiated services. See DiffServ DiffServ, 228, 241, 337 digital policy management, 395 Digital rights management. See DRM digital signal processors. See DSP digital signature, 387 digital-to-analog converter. See DAC DIOA, 98 direct sequence spread spectrum, 247, See

DSSS direct-attached storage. See DAS Directed Diffusion, 172

526 Index

Page 27: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

directory service, 484 Disaster Recovery process, 88 Discovery, 460 Discovery services, 476 discovery technology, 484 discrete multi-tone modulation. See DMT distributed asynchronous configuration,

487 Distributed Computing Infrastructure,

451 distributed object architecture. See DOA distributed operation, 320 distributed synchronous configuration,

487 distributed, interface-oriented

architecture. See DIOA DMA, 403 DMT, 105 DNS, 140, 231, 445 DOA, 47 DoD, 38, 52 DoD Architecture Framework. See

DoDAF DoD Discovery Metadata Standard. See

DDMS DoDAF, 95, 463 DOE, 437 domain name server. See DNS domain naming system. See DNS downstream alarm suppression, 295 DPMO, 439 DRM, 96, 394 dropped-packets, 319 DSB, 131 DSCP, 228, 337 DSER, 208, 429 DSP, 131 DSSS, 145, 190 dynamic and active defense system, 73 Dynamic host configuration protocol. See

DHCP E3, 258 E911, 342 EA, 95 EAI, 17, 476 ECN, 218, 329 ECU, 131 EDGE, 138, 141 EES, 387 EF, 339

efficiency, 320 efficient group management, 320 EGP, 233 EGPRS, 141 Electrical and Electronics Engineers. See

IEEE electromagnetic environmental effects.

See E3 Electromagnetic Pulse. See EMP electronic control unit. See ECU EMP, 63 encapsulating security payload. See ESP end-to-end QoS, 351 end-to-end services, 49 end-to-end view, 274 energy depletion, 320 Energy-aware routing, 175 energy-efficiency, 120 Enhanced Data rates for GSM Evolution.

See EDGE enhanced emergency services. See E911 enhanced SLM, 442 Enhanced Telecommunication

Operational Maps. See eTOM Enterprise Application Integration. See

EAI, See EAI enterprise architecture. See EA enterprise data model, 367 enterprise data strategy, 365 Enterprise Management process, 87 Enterprise Management Process, 82 Enterprise Quality Management Process,

89 Enterprise Service Bus. See ESB, See

ESB Enterprise Service Management. See

ESM EPA, 432 error, 318 error-prone and share channel, 319 ESB, 19, 292 Escrowed Encryption Standard. See EES ESM, 467, 476, 481 ESM/NetOps, 467 ESP, 225, 227 ETL, 378 eTOM, 47 ETSI, 113 European Telecommunications Standards

Institute. See ETSI

527Index

Page 28: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

EV-DO, 144 event automation, 295 event console, 298 event correlation, 295 event process, 295 event processing, 263 event processing agents. See EPA event scenarios, 469 Evolution-Data Optimized. See EV-DO expedient CoI, 356 Expedited forwarding. See EF expert system, 433 explicit admission control, 334 explicit congestion notification. See ECN,

See ECN exposed terminal, 321 eXtensible Access Control Markup

Language. See XACML Extensible Markup Language. See XML Extensible Style-sheet Language

Transformations. See XSLT exterior gateway protocol. See EGP extract, transform, and load. See ETL FAB, 79 fairness, 321 false negative, 443 fault-management, configuration,

accounting, performance, and security. See FCAPS

faults, 272 FCAPS, 66, 486 FCC, 109 FDMA, 104, 126 FEA, 95, 96 FEC, 123 Federal CIO Council, 96 Federal Communications Commission.

See FCC Federal Enterprise Architecture. See FEA federation of systems. See FoS FHSS, 145 FIFO, 322 figure of merit. See FOM file transfer protocol. See FTP Financial & Asset Management process,

89 first-in, first-out. See FIFO flooding time synchronization protocol.

See FTSP

flow-based weighted random early detection. See FRED

flowchart, 437 FM, 131 FMLS, 496 FOM, 206 formation, 273 Forward Error Correction. See FEC FoS, 43 fourth generation. See 4G frame relay traffic shaping. See FRTS Framework Services, 98 fraud management, 405, 447 Fraud management, 446 FRED, 329 frequency hopping spread spectrum. See

FHSS frequency modulation. See FM frequency-division multiple access. See

FDMA frequency-hopping, 127 FRTS, 332 FSK, 125, 131 ftp, 270 FTP, 290, 380 FTSP, 205 fulfillment, assurance, and billing. See

FAB fulfilment, 254 fuzzy logic, 296, 434 GAF, 182 GAMA, 126 gateway GSN. See GGSN gating, 206 Gaussian frequency-shift keying. See

FSK GBR, 176 GDMO, 282 GDSS, 424 GEAR, 182 general linear model. See GLM General Packet Radio Services. See

GPRS generalized processor sharing. See GPS Generic and Special sensors, 160 generic traffic shaping. See GTS Geographic adaptive fidelity. See GAF Geographic and energy aware routing.

See GEAR

528 Index

Page 29: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

Geographical Information Systems. See GIS

GGSN, 140 GIG, 52, 467 GIS, 116 GLM. See GLM global synchronization, 327 Global System for Mobile

Communications. See GSM GMSK, 131 Google Grid, 5 GoS, 272 Gossiping, 172 GPRS, 107, 113, 138 GPRS roaming exchange. See GRX GPS, 116, 128, 166, 322 grade of service. See GoS gradient, 173 Gradient-based routing. See GBR graphical user interfaces. See GUIs GRID, 486 Grid computing, 461 group allocation multiple access. See

GAMA group decision support systems. See

GDSS GRX, 140 GSM, 107, 109, 137 GTS, 190, 332 guaranteed time slot. See GTS Guglielmo Marconi, 108 Guidelines for the definition of managed

objects. See GDMO GUIs, 40 H.323, 330, 484 Handoff, 104 hard state QoS, 311 head-of-the-line. See HOL HGI, 60, 74 hidden terminal, 321 hierarchical mobile IPv6. See HMIPv6 hierarchical structure or zone-based

routing, 385 Hierarchical token bucket. See HTB High performance radio metropolitan

area network. See HIPERMAN High-Speed Downlink Packet Access.

See HSDPA HIPAA, 6, 395 HIPERLAN, 112

HIPERMAN, 152 Histogram, 436 HLR, 104, 139 HMIPv6, 222 HOL, 322 home location register, 104 Home location register (HLR), 139, 144 home subscriber system. See HSS HomeRF, 108 host impersonation, 320 HSDPA, 142 HSS, 141, 144 HTB, 331 HTTP, 276, 380, 399 Human Resources Management process,

89 human-GIG interaction. See HGI IA, 60, 70, 353 IA/Security services, 476 IAS, 489 IBSS, 146 IC, 53 ICMP, 223 IDA, 376 identity interception, 393 identity management, 400 IDL, 281 IDM, 60, 67, 482 IDS, 361 IEEE, 5 IEEE 1451, 195 IEEE 1451.3, 196 IEEE 1451.4, 196 IEEE 1451.5, 196 IEEE 802.11, 107 IEEE 802.11e, 315 IEEE 802.15.4, 189 IEEE 802.15.5, 148 IEEE 802.16e, 151 IEEE 802.1d, 315 IEEE 802.20, 151 IETF, 218, 284, 483 IGMP, 231 IGP, 233 IIOP, 399 IKE, 116, 225, 226 IM, 113, 482 IM and Presence Protocol. See IMPP implicit admission control, 334 implosion, 172

529Index

Page 30: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

IMPP, 483 IMS, 114, 152 IM-SSF, 154 independent basic service set. See IBSS Information, 405 information assurance. See IA Information Assurance, 451, 483, See IA information assurance and security. See

IAS Information Assurance layer, 354 information capacity, 317 information disclosure, 320 information dissemination management.

See IDM Information Dissemination Management.

See IDM Information Domain, 51 Information Management, 51 information plan, 365 information superiority, 1 Information Systems Security Manager.

See ISSM Information Systems Security Officer,

487, See ISSO Information Technology. See IT, See IT infrared. See IR Infrastructure Lifecycle Management

process, 83 infrastructure mesh mode, 147 infrastructure mode, 146 Infrastructure-less networks, 103 instant messaging. See IM Instant Messaging and Presence

Leveraging Extensions. See SIMPLE institutional CoI, 356 intangibility, 275 integrity, 362 Integrity, 120, 274, 410 Intelligence Community. See IC intelligence, surveillance, and

reconnaissance. See ISR Interchange of Data between

Administrations. See IDA interface definition language. See IDL interference, 320 interior gateway protocol. See IGP International Financial Reporting

Standards, 6 International Telecommunication Union-

Telecommunication’s. See ITU-T

international, scientific, and medical. See ISM

Internet control message protocol. See ICMP

Internet group management protocol. See IGMP

Internet Key Exchange. See IKE Internet protocol security. See IPsec Internet protocol television. See IPTV Internet Protocol version 4. See IPv4 interoperability, 362 inter-process communications. See IPC Interrogating-CSCF, 153 intrusion detection, 385 intrusion prevention systems. See IPS IntServ, 334 inventory management, 258 Invoicing and collection process, 447 IOS, 293 IP, 127, 217, 219 IP multimedia service switching function.

See IM-SSF IP multimedia subsystem. See IMS IP Multimedia Subsystem. See IMS IP next generation. See IPng IP real time protocol. See RTP IPC, 61 IPng, 219 IPS, 116 IPsec, 121, 225, 380 IPTV, 268 IPv4, 109 IPv6, 116 IR, 144 ISM, 109, 189, 243 isolation, 384 ISR, 42 ISSM, 487 ISSO, 487 ISTAR, 210 IT, 1, 47 IT Planning and Architecture process, 89 ITU-T, 66, 484 J2EE, 292 jamming, 383 Java 2 Enterprise Edition. See J2EE Java Business Integration. See JBI JBI, 292 JCS, 42 jitter, 319

530 Index

Page 31: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

join time, 273 Joint Chiefs of Staff. See JCS Joint Tactical Radio System. See JTRS JPO, 132 JROCM, 112 JTRS, 112, 132 Kalman Filters, 206 key performance indicators, 300 key service indicators. See KSI KM, 405, 406 knowledge, 40 Knowledge, 405 Knowledge management. See KM KSI, 419 labor intensity, 275 lack of homogeneity, 275 lack of transportability, 275 LEACH, 169, 177, 178 level 0 networking, 451 level 1 networking, 452 level 2 networking, 452 Level 3 networking, 452 level 4 networking, 452 level three data fusion, 430 level two data fusion, 427 lifecycle management, 396 lightweight computations, 385 line of business. See LOB lines of business. See LOB link quality indication. See LQI LLC, 126 LLQ, 326 load balancing algorithm, 445 LOB, 19, 411 Local CAC, 345 location disclosure, 383 location privacy, 384 Location-based information, 410 location-dependent contention, 319 Logical Link Control. See LLC Loop free routing, 319 low latency queuing. See LLQ low-energy adaptive clustering hierarchy.

See LEACH LQI, 190 M.3400 TMN management functions, 66 MA, 425 MAC, 126 macro viruses, 393 maintainability, 318

maintenance and restoration process, 300 malicious mobile code, 393 man machine language. See MML managed system, 264 management information base. See MIB management information model, 276 management information models, 264 Management of Services, 460 management plan, 313 management services, 264 MANET, 112 MANOVA, 426 MAP, 141, 144 MAR, 31 Market, Product and Customer processes,

81 Marketing & Offer Management process,

86 masquerade, 393 Maximum lifetime data aggregation. See

MLDA maximum lifetime data routing. See

MLDR Maximum lifetime energy routing. See

MLER MCF, 184 MCN, 112 mean time between failures. See MTBF mean time to repair. See MTTR measurement system, 264 measurement-based CAC, 345 MECN, 181 Media Access Control. See MAC media gateway. See MGW Media gateway (MGW), 113, 141 media gateway controller function. See

MGCF Mediation, 487 Mediation services, 476 Messaging services, 475 messaging technology, 482 metadata, 371 meta-policies, 252 MGCF, 155 MGW, 155 MIB, 284 MIMO, 116 minimum control overhead, 319 Minimum cost forwarding. See MCF

531Index

Page 32: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

Minimum energy communication network. See MECN

misuse of privileges, 393 MLDA, 183 MLDR, 183 MLER, 183 MLPP, 125, 341 MMD, 153 MML, 280 Mobile Ad-hoc Networking. See MANET Mobile IP, 222 mobile station. See MS mobile switching centers. See MSC Mobile switching centers (MSC), 139,

144 model operating environment. See MOE Modify / Request Services, 460 MOE, 486 Monitor-Analyze-Refine. See MAR Monte Carlo samples, 207 Morphological analysis. See MA moving average chart, 438 Moving average charts, 438 MS, 104 MSC, 104, 113, 139 MTBF, 274, 318 MTTR, 258, 274, 318, 350 multicast, 122 Multi-hop cellular network. See MCN multilevel precedence and preemption.

See MLPP Multimedia Domain. See MMD multiple inheritance class structures, 252 multiple-input multiple output. See MIMO multipoint application sharing, 485 Multipoint still image and annotation

protocol, 483 Multivariate analysis of variance. See

MANOVA NACK, 123 NAS, 488 NAT, 221 National Commission on Federal

Paperwork, 2 National Security Systems. See NSS NCAP, 196 NCBO, 1, 30, 34, 35, 38, 41, 44, 65, 94,

101, 117, 165, 202, 210, 212, 277, 303, 318, 358, 370, 374, 388, 393,

408, 411, 415, 450, 451, 453, 460, 464, 474, 492, 497, 498, 499

NCES, 467, 475 Near-term Digital Radio. See NTDR Neighbor discovery, 119 NetFlow, 294 NetOps, 482 NETOPS, 60, 65 network address translation. See NAT Network Attached Storage. See NAS network capable application processor.

See NCAP Network Centric Enterprise Services. See

NCES network configuration and routing

process, 257 network layer, 127 network management. See NM Network Monitoring and Analysis. See

NMA Network Operations, 60, See NETOPS Network operations concepts, 482 network provisioning process, 256, 257 network time protocol. See NTP Network time protocol. See NTP Network-Centric Business Operation. See

NCBO Network-Centric Business Operations.

See NCBO network-centric SOE, 449 neural network, 429 New Technology File System. See

NTFS Next Generation Convergent Networks,

153 Next Generation Mobile Network. See

NGMN Next Generation Operations Support

Systems. See NGOSS NGMN, 155 NGOSS, 81, 97 NM, 60, 65 NMA, 280 NodeB, 140 Non Destructive overlays, 483 non-disclosure method, 385 non-repudiation, 363 NORM, 123 notification services, 482 NSF NeTS, 253

532 Index

Page 33: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

NSS, 53 NTDR, 112 NTFS, 486 NTP, 204, 232 Object Management Group. See OMG object request broker. See ORB OCOT, 350 OCS, 486 OE, 134 OFCDMA, 116 OFDM, 105, 251 OFDMA, 105, 151 offer agreement, 307 OHIO, 398 OMG, 281 only handle information once. See OHIO open service access - service capability

server. See OSA-SCS Open shortest path first protocol. See

OSPF open software communications

architecture. See SCA Open Systems Interconnection. See OSI open wireless architecture. See OWA Operating Environment. See OE operational activity to systems function

traceability matrix, 471 operational event and trace descriptions,

469 Operational State Transition, 468 operational support systems. See OSS Operational View, 457, 464 operations plan. See OPLAN Operations Readiness Testing, 90 Operations Support Systems. See OSS OPLAN, 260 Oracle Collaboration Suite. See OCS ORB, 281 order handling process, 256 orders completed on time. See OCOT Orthogonal frequency division multiple

access. See OFDMA orthogonal frequency-division

multiplexing. See OFDM OSA-SCS, 154 OSI, 124, 282 OSPF, 234, 241 OSS, 77, 91, 211, 255, 257, 349, 465 OTA, 249 OTASP, 142

out-of-band network, 268 out-of-order, 319 OV, 95, 464 OV-1, 466 OV-2, 466 OV-3, 466 OV-5, 466, 468 OV-6a, 466 OV-6b, 468 OV-6c, 466 Over the Air Activation and Service

Provisioning. See OTASP over-provisioning bandwidth, 274 Oversight Council Memorandum. See

JROCM over-the-air. See OTA OWA, 116 packet classifier, 230 packet control function. See PCF Packet Marker, 313 packet radio networks. See PRNet packet scheduler, 230 packet-switch. See PS PAM, 144 Pareto chart, 435 partial buffer sharing. See PBS passive attack, 383 passive sensor, 160 PBS, 327 PCF, 139 PCMCIA, 150 PDU, 285 Pearson correlation, 423 peer-to-peer communication, 484 peer-to-peer network, 146 PEGASIS, 178 performance, 272, 409 Performance Reference Model. See PRM perishability, 275 persistent storage management, 489 Personal Computer Memory Card

International Association. See PCMCIA

Personal Information Manager. See PIM personal operating space. See POS PHB, 337 phone-as-modem. See PAM physical data model, 473 Physical Domain, 51 physical separation, 71

533Index

Page 34: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

PIM, 486 PIM-DM, 238 PIM-SM, 237 ping, 270 Ping, 279 ping end-to-end reporting. See PingER PingER, 279 PKI, 361, 375 PLMN, 113 PLMNs, 139 plug and play, 53 plug-and-play, 8 PoC, 399 point-of-sale, 64 point-to-point protocol. See PPP policing traffic, 330 POS, 189 Power conservation, 199 power sources, 246 Power-Efficient GAthering in Sensor

Information Systems. See PEGASIS PPP, 143 PQ, 324 prediction filters, 200 predictors, 422 pre-mission, 457 Presentation, 60 priority queuing. See PQ PRM, 96 PRNet, 109 proactive assurance, 442 proactive problem handling, 445 Process engine, 478 process-behavior chart, 436 Product Lifecycle Management

process, 83 productivity, 409 Programmable Wireless Networking. See

ProWiN Project Liberty, 391 protocol data units. See PDU protocol independent multicast-dense

mode. See PIM-DM protocol independent multicast-sparse

mode. See PIM-SM Provisioning Services, 460 ProWiN, 253 Proxy-CSCF, 153 PS, 113 PSTN, 104, 139

public land mobile network. See PLMN public switched telephone network. See

PSTN public-key, 387 Publish Service, 460 push and pull, 483 QoS, 6, 113, 150, 241, 267, 272, 301,

305, 315, 446 QoS Control Interface, 314 QoS database, 312 QoS management, 405 QoS-aware Pathfinder, 314 QoS-based adaptation, 333 QPSK, 125 quadrature phase-shift keying. See QPSK Quality of Service. See QoS R&D/Technology Acquisition

Management processes, 89 radio frequency. See RF radio node controller. See RNC RAND, 424 random early detection. See RED Rating and discounting process, 447 RBS, 204 RDBMS, 290 reactive problem handling, 445 Real Time Enterprise. See RTE realization model, 371 real-time traffic support, 321 recovery time, 273 RED, 328, 329 Redundant paths, 385 reference-broadcast synchronization. See

RBS relational database management system.

See RDBMS reliability, 318 Reliability, 274 Reliability, Maintainability, Availability.

See RMA remote keyless entry. See RKE remote network MONitoring. See

RMON Remote Portlets, 22 repudiation, 393 request specification. See R-SPEC resilience, 318, 363 resource capacity, 317 resource constraint, 319 resource consumption, 320

534 Index

Page 35: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

Resource Development & Management process, 86

resource dimension, 469 Resource Management & Operations, 85 Resource processes, 81 resource reservation, 321 resource-based CAC, 345 Resource-reservation protocol. See RSVP responsiveness, 317 Retention and Loyalty, 469 Retire Services, 460 return on investment. See ROI RF, 144, 241, 242, 267 RIP, 233 RKE, 160 RMA, 58 RMI, 399 RMON, 287 RMON1, 288 RMON2, 288 RNC, 140 roaming, 147 Roaming, 144 robustness, 320 ROI, 27, 395, 409, 491 Role management, 9 root cause, 446 Root cause analysis, 410 round, 163 round robin. See RR route acquisition delay, 319 route reconfiguration, 319 Router sensors, 161 routing, 128 Routing information protocol. See RIP routing table overflow, 383 RR, 322 R-SPEC, 335 RSVP, 229, 334 RTE, 489 RTP, 326, 330 RTT, 280 Rumor Routing, 173 run chart and control chart, 436 rushing attack, 384 SADB, 227 sales process, 255 SAML, 391 SAN, 488 SAR, 184

Sarbanes-Oxley. See SOX Sarbanes-Oxley Act, 478 SBS, 162 SCA, 112, 132, 133 scalability, 317, 319, 320 Scalability, 274 Scenario planning, 424 SDR, 112, 116, 131 security, 317, 320 security and privacy, 320 Security Assertions Markup Language.

See SAML security association database. See SADB security policy database. See SPD security technical implementation guides.

See STIGS self-configuration, 202 self-healing, 273 self-organizing packet radio ad-hoc

network with overlay. See SOPRANO self-stabilization, 384 Semantic Web, 473 sensor base station. See SBS Sensor Protocols for Information via

Negotiation. See SPIN Sequential assignment routing. See SAR sequential diagrams, 469 service, 13 service assurance, 442, 445, 458 service capacity, 317 Service Component Reference Model.

See SRM service configuration process, 256, 257 service data management, 300 Service Development & Management

process, 86 service dimension, 469 service fulfillment, 458 service graph, 418 service indicator. See SI service level agreement. See SLA Service level agreement (SLA), 7 Service Level Management, 7 service life cycle, 49, 349 Service management, 454 Service Management & Operations, 85 Service Management layer, 306 service model, 349 Service model, 416 Service model templates, 414

535Index

Page 36: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

Service models, 415 service objects. See SO Service Oriented Architecture. See SOA,

See SOA Service Oriented Computing. See SOC,

See SOC Service Oriented Enterprise. See SOE,

See SOE Service Oriented Maturity Model, 49 service planning procedure, 247 service problem management, 301 Service processes, 81 service programming interface. See SPI Service Provisioning Markup Language.

See SPML Service Quality Management. See SQM Service realization, 478 Service Resource Allocator, 313 service set identifier. See SSID service-centric, 414 Service-oriented Modeling and

Architecture. See SOMA Services accounting, 275 serving GPRS support nodes. See SGSN Serving-CSCF, 154 session availability, 318 SGSN, 139 share before process, 359 Shared Information and Data. See SID Shared white board, 483 Shewhart chart, 436, 438 Short Message Service. See SMS SI, 418 SID, 98 SIG, 111 signaling system number 7. See SS7 SIM, 138 SIMPLE, 486 SIMPLE CPIM, 483 simple network management protocol.

See SNMP Simple Object Access Protocol. See

SOAP simultaneous localization and mapping.

See SLAM single sign-on. See SSO Sink nodes, 161 SIP, 86, 330 SIP protocol, 153 Situation awareness, 413

Six Sigma, 439 size-weight-and-power. See SWaP SLA, 7, 254, 276, 298, 302, 305, 307,

309, 316, 349, 395, 407, 412, 441, 443, 454

SLA violation, 445 SLAM, 206 sleep deprivation, 384 SLF, 154 SLM, 7, 264, 349, 405, 455 SLO, 407, 412, 454 Small minimum energy communication

network. See SMECN smart sensors, 195 smart transducer interface module. See

STIM SMECN, 181 SMEs, 9, 407 SMS, 78, 138 SNDCF, 127 SNGF, 185 Sniffers, 278 SNMP, 276, 283, 284, 380 SNMPv1, 285 SNMPv2, 285 SNMPv2c, 287 SNMPv2u, 287 SNMPv3, 287 SO, 48 SOA, 2, 18, 28, 47, 48, 98, 292, 300, 317,

351, 366, 399, 449, 459, 473, 474, 494 SOAP, 24, 399 SOC, 14, 39 Social Domain, 51 SOE, 10, 13, 14, 15, 16, 44, 101, 378,

494 soft state QoS, 311 Softswitch, 113 software defined radio. See SDR Software defined radio. See SDR SOMA, 18 SOPRANO, 112 SoS, 16, 42, 43 SoS availability, 274 source and consumer model, 371 source-specific multicast. See SSM SOX, 6, 395 SPD, 227 Special Interest Group. See SIG spectrum management, 251

536 Index

Page 37: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

spectrum mobility, 251 spectrum sensing, 251 spectrum sensing cognitive radio, 250 spectrum sharing, 251 SPEED, 185 speed of execution, 30 SPI, 292 SPIN, 174 Split-TCP, 216 SPML, 392 spoofing, 384 spread spectrum modulation, 384 SQL, 290 SQM, 39, 264, 305, 349, 455 SRM, 96 SS7, 139, 267 SSB, 131 SSID, 147 SSM, 237 SSO, 363 Stakeholder & External Relations

Management process, 89 standby power consumption, 246 stateless non-deterministic geographic

forwarding. See SNGF STIGS, 486 STIM, 196 Storage Area Networks. See SAN storage on-demand, 488 Storage services, 475 Strategic & Enterprise Planning process,

88 Strategy & Commit process, 83 Strategy Infrastructure & Product. See

SIP streaming video, 5 structured query language. See SQL subject matter experts. See SMEs sub-network dependent convergence

function. See SNDCF subscriber location function. See SLF Supplier/Partner processes, 81 supplier/partner relationship

management, 80 Supplier/Partner Relationship

Management, 86 Supply Chain Development &

Management process, 87 supply chain management, 17 Support Application, 451

support time-sensitive traffic, 320 survivability, 363 SV, 95, 464, 470 SV-1, 471 SV-10b, 473 SV-10c, 473 SV-11, 473 SV-2, 471, 473 SV-3, 471 SV-4, 471 SV-5, 471 SV-6, 472 SV-7, 473 SWaP, 245 SWECCIS, 496 symmetric-key algorithms, 240 synchronization, 321 System communications description, 471 system data exchange matrix, 472 system interface description, 471 System Management, 354, 451 System Management layer, 212 System of Systems. See SoS System View, 457, 464 systems matrix, 471 systems performance parameters matrix,

473 T.128, 485 Taguchi methods, 437 tail drop, 324 task-post-process-use. See TPPU Taxonomy, 484 TCA, 112 TCP, 109, 128, 215, 380 TCP Explicit Link Failure Notification.

See TCP-ELFN TCP Feedback. See TCP-F TCP rate control, 332 TCP with buffering and sequence

information. See TCP-BuS TCP-BuS, 216 TCP-ELFN, 216 TCP-F, 215 TCP-RENO, 217 TDMA, 104, 126, 201 TDP, 205 TD-SCDMA, 140 Technical Reference Model. See TRM technical standards forecast, 481 technical standards profile, 480

537Index

Page 38: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

Technical View, 457, See TV Technology View, 464 TEDS, 196 TEEN, 179 Telecommunication Management Forum.

See TMF Telecommunication Operational Maps.

See TOM Telecommunications Management

Network. See TMN test process, 258 text-to-speech conversion. See TTS third generation. See 3G Third Generation Partnership Program.

See 3GPP Threshold sensitive Energy Efficient

sensor Network protocol. See TEEN throughput, 317, 321 TII, 196 time division synchronous CDMA. See

TD-SCDMA time synchronization, 204 time synchronized mesh protocol. See

TSMP time to live. See TTL Time to live, 223 time-diffusion synchronization protocol.

See TDP time-division multiple access. See TDMA time-sensitive QoS, 320 timing diagrams, 469 timing-sync protocol for sensor networks.

See TPSN TL1, 280 TLD, 232 TMF, 47, 50, 78 TMN, 77, 79, 282 token bucket, 331 tolerance of cyber attacks, 361 TOM, 78

eTOM, 80 top level DNS. See TLD Topology organization, 119 Topology reorganization, 119 ToS, 218, 337 Total Quality Management. See TQM TPPU, 488 TPSN, 205 TQM, 478 traceroute, 270

Traffic Analyzer, 314 traffic shaping, 332 traffic specification. See T-SPEC Transaction language 1. See TL1 transducer electronic data sheet. See

TEDS transducer independent interface. See TII TRANSEC, 125 Transformational Communications

Architecture. See TCA Transformational Satellite

Communications System. See TSAT Transport Control Protocol. See TCP transport layer, 128 transportation and transformation model,

371 trilateration, 181 TRM, 97 trouble ticket manager, 446 trusted rRoute dDiscovery, 385 TSAT, 112 T-share, 486 TSMP, 205 T-SPEC, 335 TTL, 218 TTS, 155 TV, 95, 464, 480 TV-1, 480 TV-2, 481 type of service. See ToS UA, 490 UDEF, 376 UDP, 129 ultrasonic, 181 ultra-wide-band. See UWB UML, 24 UML sequence diagram, 473 UML state diagrams, 473 UMTS, 107, 138, 140 UMTS terrestrial radio access. See UTRA Under Secretary of Defense. See USD unified messaging, 482 Unified Modeling Language. See UML uniform resource identifier. See URL Universal Data Element Framework. See

UDEF universal terrestrial radio access network.

See UTRAN URI, 19 US digital cellular. See USDC

538 Index

Page 39: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

Usage, 410 USD, 52 USDC, 109 use of directional antennas, 321 user assistance. See UA User Assistant services, 475 User interface, 478 UTRA, 140 UTRAN, 113, 114 UWB, 116 Value chain, 415 value-chain environment, 59 variability, 318 VHE, 140 videoconference, 268 Video-On-Demand, 5 virtual community, 71 virtual private network. See VPN visiting location register, 104 VLR, 104 VoIP, 5, 151, 153, 218, 268 VPN, 71, 121, 138, 267, 361 VSB, 131 WAP, 113 waveform, 135 WCAG, 490 WCDMA, 113 Web business integration, 473 Web Conferencing Applications, 485 Web Content Accessibility Guidelines.

See WCAG Web Ontology Language. See WOL Web Services. See WS Web Services Federation, 391 Web Services Secure Conversation

Language. See WS-SecureConversation

Web Services Trust Language. See WS-Trust

Webcast, 485 WebEx, 485 weighted fair queuing. See WFQ weighted random early detection. See

WRED weighted round robin. See WRR WEP, 121 WFQ, 323 Wibree, 194 WiBro, 151

wideband code division multiple access. See WCDMA

Wi-Fi, 107, 145 Wi-Fi Protected Access. See WPA WiMax, 107, 150 WiMAX, 5 Wired Equivalent Privacy. See WEP Wireless Broadband. See WiBro wireless fidelity. See Wi-Fi wireless local area network. See WLAN wireless metropolitan area network. See

WMAN wireless personal area network. See

WPAN wireless wide area network. See WWAN Wireless World Research Forum. See

WWRF Wisdom, 405 WLAN, 107, 144 WMAN, 107, 149 Worldwide Interoperability for

Microwave Access. See WiMax wormhole, 384 WPA, 121 WPAN, 107, 111 WPANs, 148 WRED, 328 WRR, 322 WS, 40 WS-Policy, 391 WSS, 391 WS-SecureConversation, 391 WS-Security. See WSS WS-Trust, 391 WWAN, 107 WWRF, 114 X.509, 397 XACML, 391 XCBF, 392 XG, 251 XKMS, 390 XML, 24, 62, 289 XML Common Biometric Format. See

XCBF XML Encryption, 390 XML Key Management System, 390, See

XKMS XML Signature, 390 XSLT, 18 ZDO, 193

539Index

Page 40: References Chapter 1 - Springer978-1-4020-6456-2/1.pdf · References Chapter 1 1. ... 5. Mike Ferguson, Let The Data Flow, Intelligent Enterprise, ... Wireless Communications and

ZDP, 193 ZigBee, 191

ZigBee Device Object. See ZDO ZigBee Device Profile. See ZDP

540 Index