| List of Figures | p. xi |
| List of Tables | p. xv |
| Preface | p. xvii |
| Contributing Authors | p. xxi |
| The Role of Satellite Networks in the 21st Century | p. 1 |
| Introduction | p. 1 |
| Internet over Satellite Architecture | p. 3 |
| The Roles of Satellite Network in the Internet | p. 4 |
| The Role of Satellite in the Satellite Network | p. 5 |
| Common Applications | p. 7 |
| Visions for the Future | p. 9 |
| Commercial Market | p. 9 |
| The DARPA NGI Vision | p. 10 |
| Challenges | p. 11 |
| Satellite Constellation Networks | p. 13 |
| Introduction | p. 13 |
| Benefits of Going to LEO | p. 15 |
| Describing the Systems | p. 17 |
| Geometry, Topology and Delay | p. 19 |
| Delay | p. 23 |
| Handover | p. 26 |
| Networking Design | p. 28 |
| Simulators | p. 31 |
| Summary | p. 32 |
| Medium Access Control Protocols for Satellite Communications | p. 35 |
| Introduction | p. 35 |
| Polling Based Access Protocols | p. 41 |
| Fixed Assignment Multiple Access (FAMA) Protocols | p. 41 |
| Frequency Division Multiple Access (FDMA) | p. 42 |
| Time Division Multiple Access (TDMA) | p. 43 |
| Code Division Multiple Access (CDMA) | p. 45 |
| Random Access Protocols | p. 46 |
| Asynchronous Random Access Protocols | p. 47 |
| Aloha | p. 47 |
| Selective-Reject Aloha (SREJ-Aloha) | p. 49 |
| Synchronous Random Access Protocols | p. 50 |
| Carrier Sense Multiple Access (CSMA) | p. 52 |
| Demand Assignment Multiple Access (DAMA) Protocols | p. 52 |
| Demand Assignment Based on FDMA | p. 56 |
| Making Reservations by Contention Based Access | p. 57 |
| Reservation Aloha (R-Aloha) | p. 57 |
| Priority-Oriented Demand Assignment (PODA) | p. 58 |
| Split-Channel Reservation Multiple Access (SRMA) | p. 62 |
| The Time-of-Arrival Collision Resolution Algorithm (CRA) | p. 63 |
| Packet-Demand Assignment Multiple Access (PDAMA) | p. 67 |
| Hybrid Protocols | p. 69 |
| Round-Robin Reservations (RRR) | p. 69 |
| Interleaved Frame Flush-Out (IFFO) | p. 71 |
| Split-Channel Reservation Upon Collision (SRUC) | p. 74 |
| Announced Retransmission Random Access (ARRA) | p. 75 |
| Scheduled-Retransmission Multiple Access (SRMA) | p. 77 |
| Response Initiated Multiple Access (RIMA) | p. 81 |
| Combined Free/Demand Assignment Multiple Access | p. 83 |
| Fixed Boundary Integrated Access Scheme (FBIA) | p. 85 |
| Combined Random/Reservation Multiple Access (CRRMA) | p. 87 |
| Conclusions and Summary | p. 90 |
| Direct Broadcast Satellites and Asymmetric Routing | p. 95 |
| Introduction | p. 95 |
| Problems with Dynamic Asymmetric Routing | p. 96 |
| Unicast | p. 96 |
| Multicast | p. 98 |
| Tunneling: A Practical Solution | p. 98 |
| Demonstration of Tunneling Approach | p. 100 |
| RFC 3077: The IETF Standard | p. 103 |
| Topology and Requirements | p. 104 |
| Tunneling Mechanism Details | p. 105 |
| Dynamic Tunnel Configuration | p. 107 |
| Tunneling Protocol | p. 109 |
| Current Status | p. 110 |
| Limitations and Long-Term Solutions | p. 111 |
| Using Satellite Links in the Delivery of Terrestrial Multicast Traffic | p. 115 |
| Introduction | p. 115 |
| Overview of Multicast Deployment | p. 117 |
| Satellite Delivery of Multicast | p. 118 |
| Integrating Satellite and Terrestrial Networks | p. 118 |
| Using Satellite Paths for Multicast Sessions | p. 120 |
| Motivation and Metrics | p. 120 |
| Methodology | p. 122 |
| Results | p. 122 |
| When to Use Satellites? | p. 128 |
| TCP Performance over Satellite Channels | p. 131 |
| Introduction | p. 131 |
| Transmission Control Protocol (TCP) Overview | p. 132 |
| Basic TCP Operation | p. 132 |
| Connection Establishment and Release | p. 132 |
| Basic Loss Recovery and Congestion Avoidance | p. 134 |
| Enhanced Loss Recovery and Congestion Avoidance | p. 135 |
| TCP Performance Problems over Satellite Links | p. 136 |
| Enhancing TCP Performance using Standard Mechanisms | p. 138 |
| Window scale | p. 138 |
| Path MTU discovery | p. 139 |
| Error correction | p. 139 |
| Further loss recovery enhancements | p. 140 |
| Research Issues | p. 142 |
| Connection startup | p. 143 |
| Shared TCP state and TCP pacing | p. 146 |
| Link asymmetry | p. 147 |
| Experimental loss recovery techniques | p. 148 |
| Implementation details | p. 149 |
| TCP fairness | p. 149 |
| Using multiple data connections | p. 151 |
| Header compression | p. 152 |
| TCP Performance Enhancement Proxy | p. 152 |
| Additional protocols | p. 153 |
| Summary | p. 154 |
| TCP Performance Enhancement Proxy | p. 159 |
| Introduction | p. 159 |
| The Motivation | p. 161 |
| The Slow-Start Problem | p. 161 |
| The Window Size Problem | p. 162 |
| The Practical Solution | p. 163 |
| Basic Architecture | p. 164 |
| Example: Deployment in HNS DirecPC | p. 166 |
| Alternative Architecture and Mechanisms | p. 168 |
| The Big Argument | p. 170 |
| The End-to-end Reliability Issue | p. 170 |
| The Fate Sharing Issue | p. 171 |
| The "Show Stopper"? | p. 172 |
| Conflicts between IPsec and TCPPEP | p. 172 |
| The End-to-end Security Issue | p. 174 |
| Researches on Resolving the Conflicts with IPsec | p. 176 |
| Conclusion | p. 177 |
| Performance Evaluation of TCP splitting over Satellite | p. 181 |
| Introduction | p. 181 |
| Model-based Analysis | p. 185 |
| Network Model | p. 185 |
| Lossless Links | p. 186 |
| Delay Models | p. 187 |
| Links with Random Losses | p. 190 |
| The Server-Proxy Link is lossless | p. 190 |
| Random Losses on Both Links | p. 192 |
| Discussion | p. 193 |
| Initial Window Size | p. 193 |
| Slow or Congested Proxy | p. 195 |
| File Size | p. 197 |
| Connection With Asymmetric Segments | p. 197 |
| The Experiment System | p. 199 |
| Measurement-based Analysis | p. 201 |
| Effect of File Size and Caching | p. 201 |
| Effect of congestion and packet losses | p. 205 |
| Effect of embedded objects and persistent connection | p. 211 |
| Implications on System Design | p. 215 |
| Conclusion | p. 216 |
| Scheduling Data Broadcast | p. 221 |
| Introduction | p. 221 |
| The Basic Model | p. 223 |
| Persistent User Model | p. 223 |
| Impatient User Model | p. 224 |
| Theoretical Results | p. 224 |
| On-line Scheduling Algorithm | p. 225 |
| Performance Evaluation | p. 226 |
| Validation of algorithm | p. 227 |
| Persistent user case | p. 228 |
| Impatient user case | p. 229 |
| Conclusions | p. 230 |
| Deriving the Mean Access Time and the Variance of Access Time | p. 231 |
| Minimizing the Variance of Access Time | p. 233 |
| Deriving the Service Ratio | p. 234 |
| Maximizing the service ratio | p. 235 |
| Deriving The Mean Tuning Time | p. 236 |
| Information Dissemination Applications | p. 239 |
| Introduction | p. 240 |
| IIDS architecture | p. 242 |
| Mobile User Profiling | p. 243 |
| Dynamic User Profile Clustering and Aggregation | p. 246 |
| Incremental Clustering Framework | p. 247 |
| Adaptive Re-clustering | p. 249 |
| Evaluation | p. 250 |
| Data Dissemination techniques | p. 254 |
| Predictive Dissemination and Caching | p. 254 |
| Bandwidth-Aware Filtering | p. 255 |
| Reliable Multicast-based Dissemination | p. 256 |
| Implementation and Demonstration | p. 257 |
| Conclusions | p. 257 |
| Index | p. 261 |
| Table of Contents provided by Ingram. All Rights Reserved. |