Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking & Distributed Systems) Review
Average Reviews:
(More customer reviews)Working on Voice over IP (VoIP) and peer-to-peer (P2P) got me interested in HIP for NAT traversal, for IPv4 to IPv6 transition, for mobility for multi-homing and for enhanced security; a quite complex list of challenges that can be met using HIP in Internet endpoints.
The book on HIP by Andrei Gurtov addresses all these topics in a comprehensive and comprehensible way. It is written for students, engineers and researchers interested both in the theory, code samples and measurements where applicable.
It should also help managers, analysts and marketers in making business decisions on using HIP in their products.
The clarity of the book indicates the teaching experience of Prof. Gurtov.
Last but not least, this book on HIP provides true enjoyable reading.
It is worth the quality time of its readers.
Henry Sinnreich
Richardson, Texas
USA
Jan 5, 2010
Click Here to see more reviews about: Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking & Distributed Systems)
"Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it." - Jari Arkko, Internet Area Director, IETF
One of the challenges facing the current Internet architecture is the incorporation of mobile and multi-homed terminals (hosts), and an overall lack of protection against Denial-of-Service attacks and identity spoofing. The Host Identity Protocol (HIP) is being developed by the Internet Engineering Task Force (IETF) as an integrated solution to these problems. The book presents a well-structured, readable and compact overview of the core protocol with relevant extensions to the Internet architecture and infrastructure. The covered topics include the Bound End-to-End Tunnel Mode for IPsec, Overlay Routable Cryptographic Hash Identifiers, extensions to the Domain Name System, IPv4 and IPv6 interoperability, integration with SIP, and support for legacy applications.
Unique features of the book:
All-in-one source for HIP specifications
Complete coverage of HIP architecture and protocols
Base exchange, mobility and multihoming extensions
Practical snapshots of protocol operation
IP security on lightweight devices
Traversal of middleboxes, such as NATs and firewalls
Name resolution infrastructure
Micromobility, multicast, privacy extensions
Chapter on applications, including HIP pilot deployment in a Boeing factory
HOWTO for HIP on Linux (HIPL) implementation
An important compliment to the official IETF specifications, this book will be a valuable reference for practicing engineers in equipment manufacturing companies and telecom operators, as well as network managers, network engineers, network operators and telecom engineers. Advanced students and academics, IT managers, professionals and operating system specialists will also find this book of interest.
0 comments:
Post a Comment