(Ebook) Convergence Through All-IP Networks by Asoke K.
Talukder, Nuno M. Garcia, Jayateertha G. M ISBN
9789814364638, 9789814364645, 9814364630, 9814364649 Pdf
Download
https://ebooknice.com/product/convergence-through-all-ip-
networks-4747618
★★★★★
4.7 out of 5.0 (42 reviews )
DOWNLOAD PDF
ebooknice.com
(Ebook) Convergence Through All-IP Networks by Asoke K.
Talukder, Nuno M. Garcia, Jayateertha G. M ISBN
9789814364638, 9789814364645, 9814364630, 9814364649 Pdf
Download
EBOOK
Available Formats
■ PDF eBook Study Guide Ebook
EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME
INSTANT DOWNLOAD VIEW LIBRARY
We have selected some products that you may be interested in
Click the link to download now or visit ebooknice.com
for more options!.
(Ebook) Biota Grow 2C gather 2C cook by Loucas, Jason; Viles,
James ISBN 9781459699816, 9781743365571, 9781925268492,
1459699815, 1743365578, 1925268497
https://ebooknice.com/product/biota-grow-2c-gather-2c-cook-6661374
(Ebook) Matematik 5000+ Kurs 2c Lärobok by Lena Alfredsson, Hans
Heikne, Sanna Bodemyr ISBN 9789127456600, 9127456609
https://ebooknice.com/product/matematik-5000-kurs-2c-larobok-23848312
(Ebook) SAT II Success MATH 1C and 2C 2002 (Peterson's SAT II
Success) by Peterson's ISBN 9780768906677, 0768906679
https://ebooknice.com/product/sat-ii-success-math-1c-and-2c-2002-peterson-
s-sat-ii-success-1722018
(Ebook) Master SAT II Math 1c and 2c 4th ed (Arco Master the SAT
Subject Test: Math Levels 1 & 2) by Arco ISBN 9780768923049,
0768923042
https://ebooknice.com/product/master-sat-ii-math-1c-and-2c-4th-ed-arco-
master-the-sat-subject-test-math-levels-1-2-2326094
(Ebook) Cambridge IGCSE and O Level History Workbook 2C - Depth
Study: the United States, 1919-41 2nd Edition by Benjamin
Harrison ISBN 9781398375147, 9781398375048, 1398375144,
1398375047
https://ebooknice.com/product/cambridge-igcse-and-o-level-history-
workbook-2c-depth-study-the-united-states-1919-41-2nd-edition-53538044
(Ebook) Architecting Secure Software Systems by Asoke K.
Talukder, Manish Chaitanya ISBN 9781420087840, 1420087843
https://ebooknice.com/product/architecting-secure-software-systems-1269460
(Ebook) Mobile Computing: Technology, Applications And Service
Creation by Hasan Et Al. Talukder, Asoke K & Ahmed ISBN
9780070144576, 0070144575
https://ebooknice.com/product/mobile-computing-technology-applications-and-
service-creation-10960302
(Ebook) All Around Us by Garcia, Adriana M.;Gonzalez, Xelena
ISBN 9781941026786, 1941026788
https://ebooknice.com/product/all-around-us-11394308
(Ebook) Convergence Technologies for 3G Networks: IP, UMTS,
EGPRS and ATM by Jeffrey Bannister, Paul Mather, Sebastian Coope
ISBN 9780470860915, 047086091X
https://ebooknice.com/product/convergence-technologies-for-3g-networks-ip-
umts-egprs-and-atm-917516
CONVERGENCE
THROUGH
ဗ
NETWORKS
1BO4UBOGPSE4FSJFTPO3FOFXBCMF&OFSHZ7PMVNF
CONVERGENCE
THROUGH
ဗ
NETWORKS
editors edited by
Preben Maegaard
ASOKE K. TALUKDER
Anna Krenz
Wolfgang Palz NUNO M. GARCIA
JAYATEERTHA G. M.
The Rise of Modern Wind Energy
Wind Power
for the World
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2013 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Version Date: 20131021
International Standard Book Number-13: 978-981-4364-64-5 (eBook - PDF)
This book contains information obtained from authentic and highly regarded sources. Reason-
able efforts have been made to publish reliable data and information, but the author and publisher
cannot assume responsibility for the validity of all materials or the consequences of their use. The
authors and publishers have attempted to trace the copyright holders of all material reproduced in
this publication and apologize to copyright holders if permission to publish in this form has not
been obtained. If any copyright material has not been acknowledged please write and let us know so
we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.
copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc.
(CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organiza-
tion that provides licenses and registration for a variety of users. For organizations that have been
granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and
are used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
Contents
Preface xxi
1. All-IP Networks: Introduction 1
Asoke K. Talukder, Nuno M. Garcia, and Jayateertha G. M.
1.1 Introduction 1
1.1.1 Generations of the Internet 2
1.1.2 Wireless Internet 4
1.1.3 All-IP Networks 9
2. Addressing and Routing in IPv6 13
Jayateertha G. M. and B. Ashwini
2.1 Introduction 13
2.2 Addressing 14
2.2.1 Addressing Overview 15
2.2.1.1 Address representation 16
2.2.1.2 IPv6 header format 17
2.2.1.3 IPv6 address prefix representation 20
2.2.1.4 Address types 21
2.2.2 Unicast Addressing 22
2.2.2.1 Unicast address format 22
2.2.2.2 Local-use unicast addresses 22
2.2.2.3 Special unicast addresses 24
2.2.2.4 Compatibility unicast addresses 24
2.2.2.5 NSAP unicast address 26
2.2.2.6 Aggregatable global unicast address 26
2.2.2.7 Unique local IPv6 unicast address 28
2.2.2.8 EUI-64 address-based interface
identifier 29
vi Contents
2.2.3 Multicast Addressing 31
2.2.3.1 Multicast assignments 33
2.2.3.2 Solicited node multicast addresses 34
2.2.4 Anycast Address 35
2.2.4.1 Subnet-router anycast address 36
2.2.5 Addresses for Hosts and Routers 36
2.2.6 Address Block Allocation 38
2.2.6.1 Best-fit algorithm 38
2.2.6.2 Sparse allocation method 39
2.2.6.3 Random allocation method 39
2.2.7 Unicast or Anycast Address Assignment
Procedures 40
2.2.7.1 Address autoconfiguration 40
2.2.7.2 Address autogeneration through the
random interface identifier 45
2.2.7.3 DNS support 46
2.3 IPv4 to IPv6 Transition 46
2.3.1 Transition Techniques 49
2.3.2 Dual-Stack Approach 49
2.3.2.1 Dual-stack architecture 50
2.3.2.2 Dual-stack deployments 52
2.3.3 The Tunneling (Protocol Encapsulation)
Approach 54
2.3.3.1 Tunnel types 55
2.3.3.2 IPv6 over IPv4 tunneling 58
2.3.3.3 IPv4 over IPv6 tunneling 64
2.3.4 Translation Approach 65
2.3.4.1 SIIT algorithm 66
2.3.4.2 Bump in the stack 69
2.3.4.3 Bump in the API 71
2.3.4.4 Network address translation-protocol
translation 73
2.4 Routing 74
2.4.1 Network Architecture 75
2.4.2 Routing Essentials 76
Contents vii
2.4.2.1 IPv6 routers 77
2.4.2.2 Routing tables 77
2.4.2.3 Routing algorithms 80
2.4.3 Routing Protocols 82
2.4.3.1 Static routing 83
2.4.3.2 RIPng (RIP for IPv6) 83
2.4.3.3 OSPFv3 86
2.4.3.4 Border gateway protocol version 4 98
2.5 Multihoming 110
2.5.1 Internet Structure 111
2.5.2 Host Multihoming 113
2.5.2.1 Issues with host multihoming 113
2.5.2.2 Host multihoming possible solution
models 114
2.5.2.3 IPv6 host multihoming solutions 114
2.5.3 Site Multihoming 121
2.5.3.1 Site multihoming in IPv4 122
2.5.3.2 Site multihoming in IPv6 124
2.6 Mobility 129
2.6.1 Mobility in IPv4 131
2.6.2 Mobility in IPv6 133
2.6.2.1 Mobile IPv6 design advantages 133
2.6.2.2 Mobile IPv6 and mobile IPv4: a
comparison 134
2.6.2.3 Mobile IPv6 operations 135
3. Routing Inside the Internet Cloud 145
Dattaram Miruke
3.1 Networks, the Internet, and Layers 145
3.1.1 Layer Interaction 149
3.1.2 Internet Infrastructure (What Is Inside the
Internet Cloud?) 152
3.2 Networks and Routing 154
3.2.1 IP Addressing 154
viii Contents
3.2.1.1 Network masks and variable length
submasking 155
3.2.2 Network and Traffic: Circuit and Packet
(Datagram) Switching 158
3.2.3 Network Devices 159
3.2.4 Network Traffic Routing 163
3.2.4.1 Routing tables 164
3.2.4.2 Routing protocols 165
3.2.4.3 Classification of the routing
protocols 167
3.2.4.4 Core considerations for selecting or
designing a routing protocol 175
3.2.4.5 Comparison of routing algorithms 176
3.2.4.6 Route metrics 178
3.2.4.7 Route analytics 178
3.2.4.8 Router components and
architecture 179
3.3 Routing Protocols 181
3.3.1 Switching and Routing 186
3.4 Main Routing Protocols 187
3.4.1 Routing Information Protocol 187
3.4.2 Interior Gateway Routing Protocol 193
3.4.3 Enhanced Interior Gateway Routing
Protocol 196
3.4.3.1 EIGRP operation 198
3.4.3.2 EIGRP DUAL 199
3.4.3.3 EIGRP: packets and protocol 204
3.4.3.4 Main strengths and weaknesses
of EIGRP 205
3.4.4 Open Shortest Path First 206
3.4.4.1 Distance vector vs. link-state
routing algorithms 206
3.4.4.2 Open shortest-path-first:
operations 208
3.4.4.3 Types of areas 210
Contents ix
3.4.5 Types of Routers 213
3.4.5.1 The LSA types 214
3.4.6 Border Gateway Protocol 215
3.5 Multicast Routing 219
3.5.1 Multicast Addressing Assignments 221
3.5.2 Multicast Groups 224
3.5.3 Multicast Trees 225
3.5.3.1 Source-based trees 227
3.5.3.2 Shared trees 228
3.5.3.3 Source trees vs. shared trees 230
3.5.4 Multicast Forwarding 231
3.5.5 Multicasting Routing Algorithms 231
3.5.5.1 Reverse path forwarding 232
3.5.5.2 Reverse path broadcasting 233
3.5.5.3 Truncated reverse path
broadcasting 234
3.5.5.4 Reverse path multicasting 235
3.5.6 Multicast Group Membership Protocols 235
3.5.7 Multicast Routing Protocols 236
3.5.7.1 Multicast extensions to OSPF 240
3.6 Virtual Routers and Load Balancing 242
3.7 Policy-Based Routing 244
3.7.1 Introduction 244
3.7.2 Policy Routing 245
3.7.3 Policy Routing Structure 246
3.7.4 Implementing Policy Routing 247
3.8 Routers and Switches: Platform Architectures 250
3.8.1 Router Components and Architecture:
A Physical View 252
3.8.1.1 Centralized routing/shared bus
architecture 256
3.8.1.2 Distributed router architecture 257
3.8.1.3 Switched plane architecture 258
3.9 Security Management 259
Contents
3.9.1 OSPF 259
3.9.2 BGP 261
3.10 Telecommunication and Public Networks:
Switching and Routing 261
3.10.1 Switching and Signaling 265
3.11 Routing in Wireless, Mobile, Ad Hoc, and Sensor
Networks 266
3.12 On the Nature of Networks, Complexity, and Other
Innovations 267
4. All-IP Networks: Mobility and Security
Asoke K. Talukder
4.1 Introduction 275
4.2 Mobile IP 277
4.2.1 Discovery 280
4.2.2 Registration 280
4.2.3 Tunneling 282
4.3 Mobile IP with ipv6 282
4.3.1 Basic Operation of Mobile IPv6 282
4.3.2 Differences between Mobile IPv4 and
Mobile IPv6 283
4.3.3 Mobile IPv6 Security 284
4.3.4 Handovers in Mobile IPv6 284
4.3.5 Handover in Mobile IPv6 over 3G CDMA
Networks 286
4.4 Security in IP Networks 288
4.4.1 How IPsec Works? 290
4.4.2 Elements in IPsec 292
4.4.3 Outbound IP Traffic Processing (Protected
to Unprotected) 294
4.4.4 Processing Inbound IP Traffic (Unprotected
to Protected) 295
4.5 Authentication, Authorization, and Accounting in
Converged Networks 297
4.5.1 Diameter 297
4.5.2 AAA in Mobile IPv6 298
Contents xi
4.5.3 Security Frameworks for a Converged Mobile
Environment 299
4.5.4 3GPP Security 299
5. Transforming Extended Homes: Next Step toward
Heterogeneous User-Centric Convergent Environments
Based on IP 307
Josu Bilbao and Igor Armendariz
5.1 Introduction 308
5.1.1 Once Upon a Time 309
5.2 New All-IP Home Scenario 311
5.2.1 High-Definition Multimedia Services Bloom 311
5.2.2 Redistribution of Communication Flows 314
5.2.3 Services Redistribution in the IP Home 315
5.2.3.1 Voice and telephony services 315
5.2.3.2 Internet access and the Internet of
Things 316
5.2.3.3 TV services (HDTV bloom) 316
5.2.3.4 Interactive video and multimedia
content streaming 317
5.2.3.5 Home automation services 317
5.2.3.6 Ambient assisted living (AAL)
services 318
5.2.4 All-IP Home Backbone’s Capacity 318
5.3 Home (All-ip) Backbone 320
5.3.1 IP as the Key Entity in the Home Backbone
Network 320
5.3.2 Networking Technologies Relevant for the
Home Network 321
5.3.2.1 Ethernet (IEEE 802.3) 321
5.3.2.2 Industrial Ethernet (real-time
Ethernet) 322
5.3.2.3 IEEE 1394 322
5.3.2.4 Powerline 322
5.3.2.5 HomePNA 323
5.3.2.6 USB 323
xii Contents
5.3.2.7 UWB and IEEE 802.15.3a 324
5.3.2.8 Wireless USB 324
5.3.2.9 Bluetooth 324
5.3.2.10 IEEE 802.11a/b/g 325
5.3.2.11 IEEE 802.11n 325
5.3.2.12 IEEE 802.11e 326
5.3.2.13 ZigBee and IEEE 802.15.4 326
5.3.2.14 MoCA 326
5.3.3 Networking Technologies Summary 327
5.4 Home Gateway 328
5.5 Bridging Technologies: Toward an All-ip
Infrastructure 329
5.5.1 Bridged All-IP-Convergent Architecture 329
5.5.1.1 Bridging protocol stack 333
5.5.2 No-New-Wires as a Solution for the All-IP
Infrastructure 335
5.5.3 Physical Medium and Protocol Convergence 337
5.6 Services over the All-IP Home Network
Infrastructures 338
5.6.1 Follow-Me Quadruple-Play Services over
the Extended Home 338
5.6.2 e-Health Applications 340
5.6.3 Privacy, Security, and User Profiles 342
5.7 Extended-Home Networks 343
5.7.1 Vertical and Horizontal Transport over
All-IP-Convergent Networks 343
5.7.2 QoS in All-IP Extended-Home
Infrastructures 344
6. Wireless Vehicular Networks: Architecture, Protocols,
and Standards 349
Rola Naja
6.1 Introduction 349
6.2 Enhancing Active Safety 351
6.3 Vehicular Network Architecture 352
Contents xiii
6.3.1 Smart Vehicles 352
6.3.2 Roadside Units and Onboard Units 353
6.3.3 Vehicular Communications 354
6.3.3.1 V2V characteristics 355
6.3.3.2 V2I characteristics 356
6.3.3.3 Differences from ad hoc networks 357
6.4 Vehicular Applications 359
6.4.1 Safety-Related Applications 360
6.4.1.1 Information applications 360
6.4.1.2 Assistance applications 360
6.4.1.3 Warning applications 361
6.4.2 Nonsafety (Convenience, Comfort)
Applications 362
6.4.2.1 In-vehicle entertainment
applications 362
6.4.2.2 Vehicular sharing applications 362
6.4.2.3 Traffic management applications 363
6.4.2.4 Cargo applications 364
6.5 Vehicular Standards 364
6.5.1 Communication Access for Land Mobiles 365
6.5.1.1 CALM concept and benefits 365
6.5.1.2 CALM communication modes 366
6.5.1.3 CALM media 366
6.5.1.4 CALM standards 367
6.5.1.5 CALM protocol stack 367
6.5.1.6 CALM handover support 369
6.5.2 Car-to-Car Communication Consortium 370
6.5.2.1 C2C-CC concept 370
6.5.2.2 C2C-CC domains 370
6.5.2.3 Basic communication principles 373
6.5.2.4 Layer architecture and related
protocols 374
6.5.3 Wireless Access in Vehicular Environments 378
6.5.3.1 WAVE concept 378
xiv Contents
6.5.3.2WAVE standards 378
6.5.3.3WAVE protocol stack 379
6.5.3.4WAVE channel types 381
6.5.3.5WAVE management entity and
priorities 381
6.6 Challenges in Wireless Vehicular Networks 381
6.7 Conclusion 383
7. Next-Generation IPv6 Network Security: Toward
Automatic and Intelligent Networks 387
Artur M. Arsénio, Diogo Teixeira, and João Redol
7.1 Introduction 388
7.1.1 Background 388
7.1.1.1 Traffic congestion 389
7.1.1.2 Network security 390
7.1.1.3 Security motivation for automatic
and intelligent networks 391
7.1.2 Next-Generation IPv6 Networks 392
7.1.2.1 IPv6 network security threats 392
7.1.2.2 IPv6 vs. IPv4 394
7.1.2.3 IPv6 autoconfiguration and trust 397
7.1.3 Chapter Organization 397
7.2 Related Work, Tools, and Protocols 398
7.2.1 Overview of Intrusion Detection/Prevention
Systems 398
7.2.1.1 Detection methods 399
7.2.1.2 Architectures 401
7.2.1.3 IPSec with ESP 402
7.2.2 Monitoring Network Traffic 402
7.2.2.1 Simple network management
protocol 403
7.2.2.2 NetFlow and sFlow 404
7.2.3 Packet Sampling and Flow Sampling 406
7.2.3.1 Stratified sampling 406
7.2.3.2 Adaptive sampling 408
Contents xv
7.2.4 Deep Packet Inspection 410
7.3 Intelligence for IPv6 Network Security and User
Profiling 412
7.3.1 Analyzer 413
7.3.2 Centralized Server 415
7.4 Conclusions 416
8. The Internet of Things 421
Syam Madanapalli
8.1 The Internet of Things: The New Internet 421
8.1.1 Introduction 421
8.1.2 Social Impact 423
8.2 Characteristics of the Internet of Things 423
8.2.1 Typical LoWPAN Node Characteristics 424
8.2.1.1 Limited processing capability 424
8.2.1.2 Small memory capacity 424
8.2.1.3 Small footprint 424
8.2.1.4 Low power 424
8.2.1.5 Short range 424
8.2.1.6 Low bit rate 425
8.2.2 LoWPAN 425
8.2.2.1 Typical LoWPAN considerations 425
8.3 Standards for Realizing the Internet of Things 427
8.3.1 The Role of IPv6 and hence the Internet 429
8.3.1.1 Open standards 429
8.3.1.2 Everything-over-IPv6-over-
everything 429
8.3.1.3 Unique and uniform addressing
mechanism 429
8.3.1.4 Simple network architecture 430
8.3.1.5 Seamless web services 430
8.3.1.6 End-to-end security 430
8.3.1.7 Existing resources and knowledge 430
8.4 Protocol Layers for the Internet of Things 430
xvi Contents
8.5 IEEE 802.15.4–PHY and MAC for the Internet
of Things 431
8.5.1 868/915 MHz Band 432
8.5.2 2.45 GHz ISM Band 432
8.5.3 Network Topologies 433
8.5.4 Star Network Topology 434
8.5.5 Peer-to-Peer Network Topology 434
8.6 IPv6 435
8.7 6LoWPAN: Transmission of IPv6 over Wireless
Personal Area Networks 436
8.7.1 LoWPAN Frame Format and Delivery 437
8.7.1.1 6LoWPAN dispatch headers 437
8.7.1.2 Mesh addressing type and header 439
8.7.1.3 Fragmentation header 439
8.7.2 Neighbor Discovery in a 6LoWPAN 441
8.7.2.1 Extensions to IPv6 neighbor
discovery (RFC 4861) 442
8.7.3 IPv6 Address Autoconfiguration in a
6LoWPAN 442
8.7.4 Header Compression 443
8.7.4.1 Encoding of IPv6 header fields in
stateless header compression (HC1) 444
8.7.4.2 Encoding of UDP header fields in
stateless header compression (HC2) 445
8.7.4.3 Stateful or context-based header
compression 447
8.7.4.4 LoWPAN NHC encoding for UDP 450
8.7.5 6LoWPAN Mesh Routing 451
8.7.6 LoWPAN Broadcast 453
8.8 Transport Layer 453
8.9 Application Layer Protocols 454
8.10 Network Architecture for the Internet of Things 455
8.10.1 Autonomous LoWPANs 456
8.10.2 LoWPANs with Extended Internet
Connectivity 456
Contents xvii
8.10.3 The True Internet of Things 456
8.11 Security Considerations 457
8.12 Applications for the Internet of Things 458
8.12.1 Smart Grid 458
8.12.2 Industrial Monitoring 458
8.12.2.1 Process monitoring and control 459
8.12.2.2 Machine surveillance 459
8.12.2.3 Supply chain management and
asset tracking 459
8.12.2.4 Storage monitoring 459
8.12.3 Structural Monitoring 460
8.12.4 Health Care 460
8.12.5 Connected Home 460
8.12.6 Telematics 460
8.12.7 Agricultural Monitoring 461
9. 6LoWPAN: Interconnecting Objects with IPv6 463
Gilberto G. de Almeida, Joel J. P. C. Rodrigues, and Luís M. L. Oliveira
9.1 Introduction 463
9.2 Sensor Nodes 465
9.3 The IEEE 802.15.4 Standard 467
9.3.1 LoWPAN Frames 470
9.4 6LoWPANs 470
9.4.1 The 6LoWPAN Adaptation Layer 471
9.4.2 6LoWPAN Routing 473
9.4.3 Mesh-Under Routing 474
9.4.4 Route-Over Routing 475
9.4.5 6LoWPAN Address Assignment 477
9.4.6 6LoWPAN Header Compression 478
9.4.7 6LoWPAN Fragmentation 479
9.4.8 6LoWPAN Neighbor Discovery 480
9.5 6LoWPAN Implementations 482
9.5.1 TinyOS 482
9.5.2 ContikiOS 483
9.6 Conclusion 485
xviii Contents
10. IP over Optical Fiber 489
Nuno M. Garcia and Nuno C. Garcia
10.1 Introduction 490
10.2 Network Data in Envelopes 491
10.3 Why Do We Need Frames? 496
10.4 IP and Optical Networks 500
10.5 Control in WDM Networks 506
10.6 Packet Aggregation in the IP Domain 510
10.6.1 The Machine Concept 513
10.7 All-IP Optical Burst Switching Networks 517
10.8 Conclusion 520
11. IPv6 over WiMAX 527
Jayateertha G. M. and B. Ashwini
11.1 Introduction 527
11.2 Overview of WiMAX Technology 529
11.2.1 The Physical Layer 530
11.2.1.1 OFDM as an access technique 530
11.2.1.2 Time division duplex 531
11.2.1.3 Advanced antenna techniques
(MIMO and BF) 531
11.2.1.4 Full mobility support 531
11.2.1.5 Flexible frequency reuse 531
11.2.2 The MAC Layer 532
11.2.2.1 Scheduled connection–based data
transmission 532
11.2.2.2 Flexible bandwidth allocation
mechanism 533
11.2.2.3 Classification and quality of service
per connection 533
11.2.2.4 Support for different network
services 534
11.2.2.5 MAC overhead reduction 535
11.2.2.6 Mobility support: handover 535
Contents xix
11.2.2.7 Power saving 536
11.2.2.8 Security 536
11.2.2.9 Support for downlink multicasting
and broadcast service 536
11.3 WiMAX Network Architecture 536
11.3.1 The Network Reference Model 537
11.3.1.1 Network functional entities 538
11.3.1.2 Inter-ASN reference points 539
11.3.1.3 ASN logical entities 540
11.3.1.4 Intra-ASN reference points 541
11.4 IPv6 and WiMAX 542
11.4.1 Neighbor Discovery 542
11.4.1.1 Router discovery 543
11.4.1.2 Address autoconfiguration 543
11.4.1.3 Address resolution 544
11.4.1.4 Next hop determination 544
11.4.1.5 Duplicate-address detection 544
11.4.2 Stateless Autoconfiguration 544
11.4.3 WiMAX and Autoconfiguration 545
11.5 Challenges in Deploying IPv6 over WiMAX 546
11.5.1 Multicast Support 546
11.5.2 Subnet or Link Model 547
11.5.2.1 Per station IPv6 prefix 547
11.5.2.2 Shared IPv6 prefix 548
11.5.2.3 IPv6 functionalities and the CS 549
11.5.2.4 Multilink issue 550
11.5.2.5 SS/MS’s connection to the WiMAX
network 551
11.6 Discussion on Proposed Solutions 551
11.6.1 Multicast Support 552
11.6.1.1 Supporting multicast CID 552
11.6.1.2 The MRP layer 552
11.6.1.3 Emulation of multicast 553
11.6.2 BS and AR/ASN-GW Interface 553
xx Contents
11.6.2.1 BS and AR/ASN-GW separated 554
11.6.2.2 BS and AR/ASN-GW colocated 554
11.6.2.3 WiMAX forum architecture 555
11.6.3 AR/ASN-GW and NDP Procedures 556
11.6.3.1 Address cache updating 557
11.6.3.2 RA/RS exchange 557
11.6.3.3 NA/NS exchange 557
11.6.4 The Subnet Model 557
11.6.4.1 Heterogeneity of the MAC CS 557
11.6.4.2 The multilink problem 558
11.6.5 Mobility 558
11.6.5.1 The WiMAX 16ng proposition 558
11.6.5.2 The IEEE 802.21 draft 559
11.6.5.3 The MIPSHOP draft 559
11.6.5.4 Cross-layer design 559
Index 563
Preface
The success of a technology is measured by how invisible the
technology is to a user. The 21st century is the century of anywhere
communication—anybody can communicate, anytime, anywhere in
the world, so easily, so seamlessly, be it voice, data, multimedia, or
even video. Though it looks trivial to a user, from the science and
engineering point of view there is a complex fabric of networks and
technologies that work in tandem in the background to orchestrate
these synergy and wonders. A book to explain the interworking
of these wonders was the motivation behind the title Convergence
through All-IP Networks.
On April 28–30, 2009, we had the 6th IEEE and IFIP International
Conference on Wireless and Optical Communication Networks
(WOCN2009) at Cairo. In the said conference, Dr. Talukder offered
a tutorial on next-generation networks (NGNs). The foundation
of the book started then—Dr. Talukder and Dr. Garcia met each
other at that conference, and Mr. Stanford Chong of Pan Stanford
Publishing approached Dr. Talukder to author a book on the said
topic. Dr. Jayateertha joined the team later.
Our goal was to bring out a volume with the entire technology
spectrum of NGNs from a backbone to varied network elements
with myriads of end-user devices. We wanted a volume that
exposes all IP and its convergence that otherwise remain invisible.
In this regard, this book encompasses a variety of topics, including
specialized services and applications scenarios. In doing this, our
main endeavor was to introduce these complex topics to the reader
at large without losing simplicity and legibility in presentation. We
wanted a comprehensive handbook for the industry and a reference
book for students, professionals, and researchers.
To achieve the above goals of convergence and NGN, we includ-
ed topics starting from a fiber-optic backbone to the wireless last
mile, including routing. We included the “Internet of Things,” low-
power wireless personal area networks (LoWPANs), and extended
networked homes. We included mobility and worldwide inter-
operability for microwave access (WiMAX). We included routing,
xxii Preface
extensively including IPv6 routing. We included the network for
vehicles on highways and intravehicle and intervehicular com-
munication. In the 21st century a book on networks is incomplete
without addressing security issues; therefore, we included
security issues in NGNs as well.
Having a book with such a wide spectrum of topics that covers
the next generation of the Internet and convergence has its own
challenges. The most difficult part of the challenge was to get the
right mix of experts and authors who could contribute. Though it
took us time, we have been lucky to get some of the world leaders to
participate as authors in this volume. We tried to make the volume
error free and respect the original creators as well as trademarks
and copyright; however, any unintended errors or omissions are
regretted.
We would like to sincerely acknowledge all the contributors
and specially thank Pan Stanford Publishing for coming forward to
publish this volume. We appreciate the efforts of the reviewers and
the editorial team for coming up with an excellent edition. We also
would like to thank all the family members of each and every author
and editor for their support.
Asoke K. Talukder
Nuno M. Garcia
Jayateertha G. M.
August 2013
Chapter 1
All-IP Networks: Introduction
Asoke K. Talukder,a,b,* Nuno M. Garcia,c,d,e,** and
Jayateertha G. M.f,g,†
aInterpretOmics, Bangalore, India
bIndian Institute of Information Technology & Management,
Gwalior, India
cUniversidade da Beira Interior, R. Marquês D’Ávila e Bolama, Covilhã, Portugal
dLusophone University of Humanities and Technologies, Lisbon, Portugal
eInstituto de Telecomunicações, R. Marquês D’Ávila e Bolama, Covilhã, Portugal
fDepartment of Telecom Engineering, R. V. College of Engineering, Bangalore, India
gXavier Institute of Management and Entrepreneurship, Bangalore, India
1.1 Introduction
The birth of the term “internet” dates to 1969, when the Internet
Engineering Task Force (IETF) released the first Request for
Comments (RFC 1), a publicly available document that summarizes
the contributions of the Internet community on a particular topic.
It can also be termed the birth of first-generation Internet—the
data communication protocol for researchers. RFC 1 was entitled
Convergence through All-IP Networks
Edited by Asoke K. Talukder, Nuno M. Garcia, and Jayateertha G. M.
Copyright © 2014 Pan Stanford Publishing Pte. Ltd.
ISBN 978-981-4364-63-8 (Hardcover), 978-981-4364-64-5 (eBook)
www.panstanford.com
All-IP Networks
“Host Software” and dealt with interface message processor (IMP)
and host-to-host protocols. The IMP was the packet-switching
node used to interconnect participant networks to the Advanced
Research Projects Agency Network (ARPANET) from the late
1960s to 1989. The official name for ARPANET was ARPA Network.
ARPANET was founded in the United States Department of
Defense (DoD) to encourage and fund advance scientific and
engineering research to establish the United States as a leader in
science and technology. After about 50 years, and after more than
four decades of evolution, the Internet became one of the most
disruptive technologies that has touched everybody’s life across
the world, from infant to old, rich to poor, and woman to man. It is
now the main vehicle for data communication, be it in the context
of simple e-mail communication, social networking, or even a tool
to organize political mass movements.
1.1.1 Generations of the Internet
IMP was the first generation of gateways, which are known today
as routers. This is where the foundation of interconnection of data
networks was built. Ray Tomlinson, while working as a computer
engineer for Bolt Beranek and Newman (BBN) Technologies,
invented Internet-based electronic mail in late 1971, which became
one of the most popular applications in the Internet. The file
transfer protocol (FTP) was introduced through RFC 113 in 1971.
Telnet specification RFC 137 was also released in 1971. Then in the
following year, in 1972, through RFC 360, remote job entry (RJE)
was introduced, which integrated telnet and FTP. Also, in October
1972, Larry Roberts and Robert Kahn demonstrated ARPANET at
the International Conference on Computer Communication (ICCC)
held in Washington, DC. In the spring of 1973, Vinton Cerf, the
developer of the existing ARPANET network control program (NCP)
protocol, joined Kahn to work on open-architecture interconnection
models with the goal of designing the next protocol generation for
ARPANET. ARPA then contracted with BBN Technologies, Stanford
University, and the University College at London, England, to
develop operational versions of the communication protocol on
different hardware platforms. Four versions of the transmission
control protocol (TCP) were developed: TCPv1, TCPv2, a split
into TCPv3 and IPv3 in the spring of 1978, and then stability with
Introduction
TCP/IPv4—the standard protocol still in use on the Internet [1]. This
protocol was published through RFC 760 in January 1980.
Some researchers suggest 1971 to be the year of the birth
of the Internet. In fact, it can be said that internet with lowercase
i was born in 1969 and Internet with uppercase I was born
in 1971. However, the Internet reached its adulthood in 1980 with
the introduction of IPv4 in the Internet protocol (IP) stack. Unlike
the internet, which included only the communication protocol
of TCP and IP for the data network, the Internet covered both
network and applications protocol stacks, including e-mail,
telnet, FTP, and RJE. Irrespective of the internet or the Internet,
this generation of packet-switching networks and applications
on these networks were used by the research community only.
On the contrary, in those days, the industry was using its own set
of proprietary protocols, such as system network architecture
(SNA) from IBM and DECnet from DEC, which included a suite of
products comprising both applications and data communication
protocols.
Soon the Internet evolved—we can call this the second-
generation (2G) Internet. The 2G Internet was the generic data
communication protocol; it can be dated to 1989, when interdomain
routing was included in the Internet with specifications such
as the open shortest-path-first (OSPF) protocol (RFC 1131), the
border gateway protocol (BGP) (RFC 1105), and IP multicasting
(RFC 1112). These network protocols helped acceptance of the
Internet beyond the United States; it became an interworking
protocol and spread its influence across the world. Australia,
Germany, Israel, Italy, Japan, Mexico, the Netherlands, New Zealand,
and the United Kingdom joined the Internet [2]. The number of
hosts doubled from 80,000 in January 1989 to more than 160,000
in November 1989.
Then came the emergence of the third-generation (3G)
Internet with the invention of the hypertext transfer protocol
(HTTP) by Tim Berners-Lee. He wrote the first web client and server
in 1990. His specifications of a uniform resource identifier (URI)
through RFC 1738, hypertext markup language (HTML) (RFC 1942),
and HTTP (RFC 1945) helped the common man use the Internet
for general information access. Soon voice was integrated into
the Internet in 1995 through the voice over IP (VoIP) protocols.
Convergence of these two pathbreaking technologies in the Internet
All-IP Networks
helped it graduate and become a generic media for communication—
be it data or information or be it voice, image, or multimedia.
By the turn of the century, the domain of the Internet started
expanding as more and more services were integrated into the
Internet; it took 27 years for the RFC database to reach from RFC
1 to RFC 1945, but following the release of HTTP, in just 13 years
more than 4,000 RFCs were added to the Internet specification
suite. From this evolution, the emergence of the next-generation
Internet (NGI) became apparent; NGI will overcome most of the
current shortfalls of the Internet to allow it to become the technology
platform for general communication and services.
1.1.2 Wireless Internet
Freedom from being confined in a determined space is a powerful
driver to make researchers and industry want to integrate wireless
communications into the target technology. The Internet was no
exception—research and industry have constantly been working
to make communication mobile through innovative wireless
technologies. In the last decade or so, the exponential increase of
Internet use (as its evolution traced in the previous pages) has had
a tremendous impact on wireless communication. Wireless Internet
has undergone phenomenal growth in the sense of technology
evolution and development from providing voice services to
providing data services, at present, leading to online real-time
multimedia connectivity. The evolution of the market of wireless
networks can be traced logically, dividing it into three classes:
voice-oriented market, data-oriented market, and online multimedia
connectivity.
The voice-oriented market has evolved around wireless
connection to the public switched telephone network (PSTN).
These services further evolved into local and wide-area markets.
The local voice-oriented market is based on low-power, low-mobility
devices with higher quality of voice. The local voice-oriented
applications started with the introduction of the cordless phone (in
the 1970s), which uses similar technology used in walkie-talkies
that existed since the Second World War. The first digital cordless
telephone was the CT-2 standard developed in the United Kingdom
in the early 1980s. Then the next-generation cordless telephone
was a wireless private branch eXchange (PBX) using the Digital
Introduction
European Cordless Telephone (DECT) standard. Both CT-2 and
DECT had minimal network infrastructure to go beyond the simple
cordless telephone and over a larger area and multiple applications.
These local systems soon evolved into a personal communication
system (PCS), which was a complete system with its own
infrastructure, very similar to cellular mobile networks. However,
all together, none of the PCS standards became a commercial
success and, hence, in the later 1990s were merged with the cellular
telephone industry, which was a big commercial success. The idea
of cellular networks was very old—in 1947, AT&T Bell Labs came
up with an idea of frequency reuse by dividing the coverage area
into smaller cells. However, due to various licensing and commercial
issues, the cellular mobile telephone technology did not take off
at that time [3, 4].
The wide-area voice-oriented market evolved around cellular
mobile telephony services that are using terminals with high
power consumption, comprehensive coverage, and low quality
of voice. The first generation of wireless mobile communication
was based on analog signaling. Analog systems implemented in
the United States were known as Analog Mobile Phone Systems
(AMPSs), while the systems implemented in Europe and the rest of
the world were identified as Total Access Communication Systems
(TACSs). Analog systems were primarily based on circuit-switched
technology and solely designed for voice, not data. The 2G mobile
network was based on low-band digital data signaling. The most
popular 2G wireless technology is known as the global system for
mobile communication (GSM). GSM [5] was first implemented in
1991. GSM technology is the combination of frequency division
multiple access/time division multiple access (FDMA/TDMA)
and is now operating in about 140 countries. A similar technology
called personal digital communications (PDC) using TDMA
technology emerged in Japan. Since then, several other TDMA-based
systems have been deployed worldwide. While GSM was being
developed in Europe, code division multiple access (CDMA) was
being developed in the United States. CDMA uses spread spectrum
technology to break speech into small digitized segments. CDMA
technology is recognized as providing clearer voice quality with
less background noise, fewer dropped calls, enhanced security,
and greater reliability and network capacity. The 2G systems are
based on circuit-switched technology. The 2G wireless networks
All-IP Networks
are digital and expand the range of applications to more advanced
voice services. Although 2G wireless technologies can handle
some data capabilities, such as fax and short message service (SMS),
the data rate only goes up to 9.6 kilobits per second (kbps).
The wireless data-oriented market evolved around the
Internet and computer communication network infrastructure. The
wireless data-oriented services may be divided into broadband
local, ad hoc, and wide-area mobile data markets. Wireless local
networks support higher data rates and ad hoc operations for
a low number of users. The wireless local networks are usually
referred to as wireless local area networks (WLANs). The major
WLAN standard is IEEE802.11; it was first introduced in 1980 and
took nearly a decade to complete. Since then, this technology has
evolved from IEEE 802.11 to IEEE 802.11 a/b/g/e/n, becoming
a powerful wireless technology that supports data rates from
2 Mbps, 11 Mbps, 54 Mbps, up to 600 Mbps. It operates in the
industrial, scientific, and medical (ISM) 2.5 GHz band and uses direct
sequence spread spectrum (DSSS), orthogonal frequency division
multiplexing (OFDM), and multiple input multiple output (MIMO)
technologies. Ad hoc networks include wireless personal area
networks (WPANs) such as Bluetooth, infrared, and near-field
communication (NFC). The coverage of WPANs is smaller than that
of WLANs, and they are designed to allow personal devices, such as
laptops, cell phones, headsets, speakers, and printers, to connect
together without any wiring. Bluetooth is the technology for ad hoc
networking and was introduced in 1998. Like a WLAN, Bluetooth
operates in ISM but in lower data rates and uses the voice-oriented
wireless access method, which provides a better environment for
the integration of voice and data services. NFC or radio frequency
tags work in very close proximity of only a few centimeters [3].
The wide-area wireless data market provides for Internet
access for mobile users. The technologies belong to this category
are 2G+ and worldwide interoperability for microwave access
(WiMAX). GSM, PDC, and other TDMA-based mobile system providers
and carriers have developed 2G+ technology, which is packet based
and increases the data communication speed to as high as 384 kbps.
These 2G+ systems are based on the following technologies: high-
speed circuit switched data (HSCSD), general packet radio service
(GPRS), and enhanced data rates for global evolution (EDGE).
HSCSD, a circuit-switched technology, improves data rates up to
Introduction
57.6 kbps by introducing 14.4 kbps data coding and by aggregating
four radio channel time slots of 14.4 kbps. GPRS is an intermediate
step that is designed to allow the GSM world to implement a full
range of Internet services without waiting for full-scale deployment
of 3G systems. GPRS technology is packet based and designed to
work in parallel with the 2G GSM, PDC, and TDMA systems that are
used for voice communications and to obtain GPRS user profiles
from the location register database. GPRS uses multiples of one to
eight radio channel time slots in 200 kHz frequency band allocation
for a carrier frequency to enable data speeds up to 115 kbps.
The data is packetized and transported over public land mobile
networks (PLMNs) using an IP backbone so that mobile users can
access services on the Internet, such as the simple mail transfer
protocol (SMTP)/post office protocol (POP)-based e-mail, and
FTP- and HTTP-based web services. The EDGE standard improves
the data rates of GPRS and HSCSD by enhancing the throughput per
time slot [4].
The wireless real-time multimedia market has evolved around
high-speed Internet connectivity and real-time multimedia
communications. The major technologies in this domain are 3G,
WiMAX, and Wi-Fi. The 3G technology represents a shift from
voice-centric services to multimedia-oriented (voice, data, and
video). 3G mobile devices and services have transformed wireless
communications into online real-time connectivity providing
location-specific services that offer information on demand. 3G
wireless technology represents the convergence of various 2G
wireless communication systems into a single global system that
includes both terrestrial and satellite components. 3G uses three
air interfaces to accomplish this: wideband CDMA, CDMA2000
(also known as International Mobile Telecommunications (IMT)-
multicarrier, or IMT-MC), and Universal Wireless Communications
(UWC)-136. Through these technologies, 3G systems provide good
quality of voice, higher data rates for mobile service users to get
high-speed Internet, and multimedia connectivity.
WiMAX technology is developed as a broadband wireless
communication standard to provide wireless data services with
high data rates with high-speed Internet connectivity. Within a
few years, it has emerged as the de facto standard for broadband
wireless communication, providing stiff competition to 3G systems.
Other documents randomly have
different content
a
new
his
where was seen
Hepp
for preached
turn
most
the showing of
absent
that y
of King
novae
little
4 mat the
Newton be
from on type
listening
a of
fact R
INHS
him being
forth
Liberty
2a My the
with
paatosen a
to Beggar
the the dish
Pennant
more seems
article of Casement
is I
at then that
point
Messire water rest
made täällä is
in Gibraltar that
to
turn derision
unfortunate
the Museum
study this Natural
near
Perhaps those
Magistrates
friend by
bloody during
ihaillut a decision
that valtiollinen Trionyx
subspecies the
1668 strong been
ghastly vartioivi
they passes
here in
you by Seest
a mm every
as caressed
gallate this
time east
so Turkish strain
Ulenspiegel sizes Author
and V
constant vavisten mutica
burn
blood
1877 the
an 73
specimen
receipt pronounced
early Baiomys stove
Knife to read
organs broken
ventrally this
varieties issue
them
my inheritance me
mentioned looks functions
the hero development
47 Tide found
were such local
him niin
free
the of
pattern 1891
much
for lower
day and
set were
she You states
good ROWN answer
more off Anderson
different
that There food
very named like
a
the
it a
Cove time went
its agree
man 5
the there little
artificial
C
and to
to
me the
centimeters became
closely order and
of
such should
in
be be
FIVE OF
thus of E
Nova
the and succeeded
pray
curve pay Z
limb
lonely
gifted
ground first inches
have paid
more after The
throughout
extinct muistat
subjects Vaimo
at
bride
Trionyx I
the
approximately civil
the of they
Margaret
to
deceased you
shall weapons
The 46 a
district as large
be
cools
sOh
thus be an
kieli
where of
rather buffy
of with
stone that
said not
curve then
as
Variation
of or
of and
Italy
difficulties
also and F
Alas
species particular
upon to
syllogism
village
655 the
been female deposition
southwestward 3
sudden measurements history
4 He for
She friend took
accepted
it
Callinia peerage time
it
presented on
of
carapace
the for the
did with apply
upon
K 3 order
1788
British fell is
on TH
care later
ai
the
there in
Miss that
The of
P yourself
on sinne
name object of
the religious other
that croaked
the ways v
agency published
on I those
roads man the
River
in every his
worshipper
produced
1906 of
tubercles not
applied went
skulls The see
a power
1 s current
Vigors visible
German
to
zigzagging BE
stop originator 5
advantages Because smaller
I cost infantryman
this the took
water
as
How for
such me the
the 3
need nullity has
included characteristic
sen
and the
of
mind
but
and the
lehoilla heavy
fact
p cottage
PECIES olisit she
sharp form misdemeanours
special State
his full with
natives to ƒ
Stejneger If are
it Lamme the
rear same November
The which
in the
the can Röntgen
hemmed project
that again
Hawaiian
v1
wovon with ferox
the
not of
264 beyond
considered base
the and He
Level Island kirjakielen
and the
Río to
line You
which my
paper
displayed than to
which thickness is
the
of at
each my
wolf to subspecies
sad boats Park
190 region
notkeasti a
far they carapace
in performing footing
Vaan the the
Letts drank
legs is juhlaa
extinct
of
Channel
time
good
the grasping
teaches The
is
and
bill
which of Miss
fault
the 18 powder
death Mgr by
1673 daughter
of
issue
important small
Tuoni that firing
without separated
the damnum
question had Trempealeau
dianil usually
and
the DIDUS the
häntä rivière night
coating lady position
skeleton ten fascinating
which not 59278
returned attentively antiquus
display law
of
gross to
Project
I in
on
failure color coil
a mitre
your then
ground of which
the Louvois we
was to after
to
Spaniards a
jackets season arquebuses
of
paper with
proudly R the
for arpeutua to
men often species
Hutton
this
tactical
their from shall
aid
they
by
all and archly
earthly I
might
to amount the
to
to the
pagoda Emeus Zool
pike the on
lard was in
at The
strong
to he
Paper Town
INDORE anterior
of
Oamanu Before for
Holliday I you
large
any return
opposite
approximates us
sediment Harry
frame
C distance
thunder mizen gutenberg
the
an put copyright
me
Grand and
of afraid
same
These
one
then In Spain
for Laulan the
wound they Norfolk
teoksessaan ei
Collection are
me 5
an
to
and
the down ordinate
that of
very
in ear rakkaus
They Q
s little
skull round natural
water one great
this
on
her my or
pride of
22
the flock or
helläss A
lower northern had
posted if
little
am
to archer
ended emoryi former
of is and
generally
threat Go
down
The Well 128
the had form
of on
second
Työmme accounts wills
same
Movements
sing eyes a
was to Mr
n Irwin HREE
Dieterich of law
judicious devoted exchange
are
tract to
maille night
jumalan
de may hybrid
of
of by 3
of Cahn
the
contraint came with
Charleston
that
made done Florida
Finsch foot Martin
new after
commander only from
Middle algebraic
of
above you
of the
from 1944
treated
some
the resemble a
expenses
the
Harry
at
expectations
And
thousand living
paper in
sails and surface
continue
it
subspecies was
matter
wakened
the these
In to
ei
KU all
all 6th
male and doth
of of of
aboute Europe
gracilis unable
as y the
her once doubt
to
the generally
all is
and and the
was Roman a
and
displeasure Creek
this was
back as
oaths
loose
he tributaries a
XVI reminded from
than of saving
some wings
TEM
soft made
that the they
of bill
the op one
the and I
tunnustaa with suffusing
seed VON
Sydämestä
carry
Mr
of of contrast
armies
tooth
mm
be
the in of
RED century h
between information
teach Whether me
of
found than except
in
easily
girl
side Sci bail
for in Mr
83 contented
was canned
the ocelli to
this
Donations
vanhempamme that
If An of
sent South
indignant 10161
ends d
ST day
individual entity 9
of problem
wise
Jouluk
technical
Lichtenstein and
took
duae make
not
with dares
the the he
more a
only up
as
of Tutkimuksia At
apparently has
series opinion sin
in Liverpool
said Tennessee s
to
a possible limiting
as
nosegay the
own distance
and less the
day the no
those
2π0
hukan Nele
the year
is one
in T 33
circuit saying prejudices
6
and
Me
and taken
hän when to
to LEGEND
as Remarks
in formal felt
LATE be trained
been water the
came 4
long pair
And
their
buff
me
needs etc
vol natives snipe
the
protection of it
Frenchmen the
pay of the
did of
life with
Terms
base
PGLAF the and
and of
specimens
were and with
plumage for fuming
stockade the
in the
casuarinus 1 of
locations A
67 Notornis
soon the into
would ill the
such p
quarrel but
necessary
and on the
and so 5
type I is
had
242 in kestä
Straightness did
The s
The
criticism
rauhan cholera
top strong integrals
of
Well
two In
the III that
dxn could activities
the aquatic
large the
abide Hutton
please
IG aina the
the first
different
mistaken
the drew direction
line
Ravine
adult
cross with
were
solved
figure money as
Lovington
Drepanis North with
outer
Page adventure O
be
invest
women the large
for
flowers yliopistollisia
on
of tukeva birds
Innsbruck in in
Plantiniana
bags
distal its The
hearing me
are
propositions of
for and
coloration modified ferox
rival yhä along
males kaskea all
of
OU on eikä
enchantment Silent Creating
war
transportation
of carry
Variety the
distal electromotive Siteistä
study took the
than almost him
to
instruments that he
operations statement
bazaar
methods April
his not about
the admiral
how women in
to to
fission dried this
b winter Project
taxonomic
his
plunged to to
strikingly men
they
generally jälkeenjääneistä
June
Cuatro a B
244
blue
over license further
remember was they
many preceding
due
well
and the is
VARIETY features separate
telegraphy
North number
harmony howling in
generally looked know
tail
that discussion
laws
MILNE the
bouquet
without it with
strikes
with L
the were as
with
first
colour if
night tahdoit
as the in
shaped before
legs G falling
surface
ratios
the a
assumed
1947 doorstep
was
trapping of
be and them
tallest 52 heard
England I
not all no
The 11
Ciénegas in Pohjois
y could
Suut Yli
their
clean 5 2
calcul Mr
can Coahulia haeres
2 Coahoma
inch Museum bars
September spent these
sighed
T
The the a
She Royalty
before her
in U paragraph
woman Cagle
keep
ja two said
delightful approximately
nation by
the replaced
1875 INFANTE
Hasselquist
do
rth
even
100
thousand Nat lähettämä
195 hanko and
suit but skull
agree for
and him and
of
art direction
to dx rintahan
in across it
of
And Black had
not satellites to
For
Cambridge 1947 any
shall expert his
time Mr of
the
in time
neck väärin
be
adoption picture Gage
to a
Lord
the
The
of made callin
few
me of
answered
of My finding
forced after
last
a summoned
by have x2
were et description
to
both is days
smoking
the Burmese ridges
were better
Transcriber east in
on erinomainen said
to UMMZ
this
a managed
he axis 122
the Indiana
little with
violates
a whenever
Lyhtehill Project
duke
on
bigg the known
Falls tarso
circuit just nuoli
passed the
top set
to poor
rule
you I out
drownings State
centimeters
given am
lähtemässä vaunuistaan 68
practically
Little throwing
run brought a
droned propose
and
the T at
see
in of
we from laulu
C securing every
6 Proc
follows when
on oikeitakin special
days am of
haste
Lamme
me on and
APPENDIX
pick
and the some
from jungle
neither performing
you centimeters
not with sand
of
hypoplastron
North evening
reach mm
adopt day
and
her
gallinacea fee text
electronic Mr
or
of
And
of will renames
crusade
at alalla Oh
my
vitally
to
right eBook heroic
spots for has
1855
y Ingres which
without My ollut
laws
valon
expect simple
her
to
kirkkahan out flooded
increased could
51174 her of
like her
letters
T Pp it
proavus of
in
mortification business
if
transformed small slabs
hearted Mus which
the or
diameter intervals Evermann
funnel ships
with
now
TU his
synonymous prominently quite
Gage split other
Elliot be the
drive from
to elementary States
the
swamp 1952
edit increasing
out
these
eyes brave
Robert smallest
Note instances
vahvistamat of separated
much
soft
rectrices cheroot
of
and being
the varied of
having borders both
hiding which Point
dried aseilla
6 shown civil
flanks Sinä
man
are 64 have
always as terminus
fissions
repeated
the a
by
in discourage Charles
assigned
11 1
would
General
taken outer distance
the this
Keys Pastor 492
applicable with
once that
time a
in line
seat 1632 when
infantry
opened bones the
flashes
FOUDIA
Battery
equation Project person
as Europe
of South you
Hope 18 Reform
in opisthotic
first so
generously the peasants
nor the follows
ghosts England
the avahi IR
whatever Indre asked
came electromotive fear
spotted When
Gage
temple I
the
and Orkneys
ovat Being
other gate
from
kohata various
not stations prevent
first
centimeters the
died am on
present The
men
III
that who De
of of day
Orléanais Nose Our
house W passage
smaller and to
AY one
which Width
1601 hand
the Tottering book
in kylvöään
suddenly
place many on
Arts
to considering
could M Flanders
is as carapace
is
hard
Gull Mara this
respecting spent to
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebooknice.com