Atjaunināt sīkdatņu piekrišanu

E-grāmata: Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks

Edited by (National Chiao-Tung University, Hsin-Chu, Taiwan), Edited by
  • Formāts: 664 pages
  • Izdošanas datums: 28-Mar-2007
  • Izdevniecība: Auerbach
  • Valoda: eng
  • ISBN-13: 9781420013825
  • Formāts - PDF+DRM
  • Cena: 71,37 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 664 pages
  • Izdošanas datums: 28-Mar-2007
  • Izdevniecība: Auerbach
  • Valoda: eng
  • ISBN-13: 9781420013825

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it.

By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more.

The book is novel in its single source presentation of ad hoc networking and related key technologies and applications over the platforms of personal area, sensory area, and local area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.
PART I: WIRELESS PERSONAL-AREA AND SENSORY-AREA NETWORKS
1 Coverage and Connectivity of Wireless Sensor Networks
3
1.1 Introduction
3
1.2 Computing Coverage of a Wireless Sensor Network
4
1.3 Coverage and Scheduling
14
1.4 Coverage and Connectivity
20
1.5 Conclusions
23
2 Communication Protocols
25
2.1 Introduction
25
2.2 Similarities and Differences between WSNs and MANETs
28
2.3 Communication Patterns in Wireless Sensor Networks
30
2.4 Routing Protocols in WSNs
39
2.5 Comparative Studies
53
2.6 Conclusions and Future Research Directions
56
3 FireFly: A Time-Synchronized Real-Time Sensor Networking Platform
65
3.1 Introduction
65
3.2 The FireFly Sensor Node
67
3.3 RT-Link: A TDMA Link Layer Protocol for Multihop Wireless Networks
71
3.4 Nano-RK: A Resource-Centric RTOS for Sensor Networks
87
3.5 Coal Mine Safety Application
98
3.6 Summary and Concluding Remarks
102
4 Energy Conservation in Sensor and Sensor-Actuator Networks
107
4.1 Introduction
107
4.2 Localized Algorithms Save Energy
110
4.3 Minimum-Energy Broadcasting and Multicasting
113
4.4 Power-Aware Routing
115
4.5 Controlled Mobility for Power-Aware Localized Routing
116
4.6 Power-Efficient Neighbor Communication and Discovery for Asymmetric Links
118
4.7 Challenges of Power-Aware Routing with a Realistic Physical Layer
119
4.8 A Localized Coordination Framework for Wireless Sensor and Actuator Networks
121
4.9 Localized Movement Control Algorithms for Realization of Fault Tolerant Sensor and Sensor-Actuator Networks
128
4.10 Conclusion
130
5 Security in Wireless Sensor Networks
135
5.1 Introduction
136
5.2 Physical Layer Security
136
5.3 Key Management
140
5.4 Link Layer Security
155
5.5 Network Layer Security
157
5.6 Application Layer Security
159
6 Autonomous Swarm-Bot Systems for Wireless Sensor Networks
167
6.1 Introduction
167
6.2 The System Architecture
168
6.3 Cooperative Localization Algorithm
169
6.4 Foraging and Gathering
172
6.5 Min imap Integration
178
6.6 The Collaborative Path Planning Algorithm
181
6.7 Conclusion
184
7 A Smart Blind Alarm Surveillance and Blind Guide Network System on Wireless Optical Communication
191
7.1 Introduction
191
7.2 The Manufacture of Wireless Optical Transceiver
193
7.3 The Design of Wireless Optical Network
196
7.4 Smart Wireless Optical Blind-Guidance Cane and Blind-Guidance Robot
199
7.5 The Design of a Smart Guide System with Wireless Optical Blind-Guidance Cane and a Blind-Guidance Robot
203
7.6 Smart Wireless Optical Communication of Blind Alarm Surveillance System
210
7.7 The Design and Implementation of a Smart Wireless Blind-Guidance Alarm Surveillance System
214
PART II: WIRELESS LOCAL-AREA NETWORKS
8 Opportunism in Wireless Networks: Principles and Techniques
223
8.1 Opportunism: Avenues and Basic Principles
223
8.2 Source Opportunism
227
8.3 Spatio-Temporal Opportunism over a Single Link
234
8.4 Spatio-Temporal Opportunism in Ad Hoc Networks
241
8.5 Spatiotemporal-Spectral Opportunism in Ad Hoc Networks
247
8.6 Conclusions
250
9 Localization Techniques for Wireless Local Area Networks
255
9.1 Introduction
255
9.2 Nondedicated Localization Techniques
256
9.3 Location Tracking
272
9.4 Conclusion
274
10 Channel Assignment in Wireless Local Area Networks
277
10.1 Introduction
277
10.2 Preliminaries
280
10.3 Rings
282
10.4 Grids
285
10.5 Interval Graphs
288
10.6 Trees
292
10.7 Conclusion
296
11 MultiChannel MAC Protocols for Mobile Ad Hoc Networks
301
11.1 Introduction
301
11.2 Design Issues of Multichannel Protocols
302
11.3 Multichannel Protocols
303
11.4 Comparison of Multichannel MAC Protocols
320
11.5 Open Issues
321
11.6 Conclusions
322
12 Enhancing Quality of Service for Wireless Ad Hoc Networks
325
12.1 Introduction
326
12.2 Background
327
12.3 The Proposed EDCF-DM Protocol
331
12.4 Performance Evaluation
334
12.5 Conclusions
340
13 QoS Routing Protocols for Mobile Ad Hoc Networks
343
13.1 Introduction
343
13.2 Reviews of the QoS Routing Protocols
345
13.3 Our QoS Routing Protocol
348
13.4 Simulation Results
360
13.5 Conclusions
367
14 Energy Conservation Protocols for Wireless Ad Hoc Networks
371
14.1 Introduction
371
14.2 Power Management
371
14.3 Power Control
382
14.4 Topology Control Protocols
387
14.5 Summary
397
15 Wireless LAN Security
399
15.1 WEP and Its Security Weaknesses
399
15.2 802.1X Security Measures
405
15.3 IEEE 802.11i Security
410
15.4 Summary
417
16 Temporal Key Integrity Protocol and Its Security Issues in IEEE 802.11i
419
16.1 Introduction
419
16.2 Wired Equivalent Privacy and Its Weakness
420
16.3 Wi-Fi Protected Access
421
16.4 Temporal Key Integrity Protocol
423
16.5 Fragility of Michael
430
16.6 TKIP Countermeasures
431
16.7 Key Handshake Procedure
433
16.8 Conclusions
434
PART III: INTEGRATED SYSTEMS
17 Wireless Mesh Networks: Design Principles
439
17.1 Introduction
439
17.2 Generic Architecture and Basic Requirements of Wireless Mesh Networks
439
17.3 Network-Planning Techniques
442
17.4 Self-Configuring Techniques
448
17.5 Conclusions
458
18 Wireless Mesh Networks: Multichannel Protocols and Standard Activities
461
18.1 Introduction
461
18.2 Multichannel MAC Protocols
462
18.3 Multichannel Routing Protocols
473
18.4 Standard Activities of Mesh Networks
478
18.5 Conclusions
481
19 Integrated Heterogeneous Wireless Networks
483
19.1 Introduction
483
19.2 Integration of Infrastructure-Based Heterogeneous Wireless Networks
485
19.3 Heterogeneous Wireless Multihop Networks
492
19.4 Research Issues for Heterogeneous Wireless Networks
500
19.5 Conclusions
502
20 Intrusion Detection for Wireless Network
505
20.1 Introduction
505
20.2 Background on Intrusion Detection
505
20.3 Intrusion Detection for Mobile Ad Hoc Networks
506
20.4 Intrusion Detection for Wireless Sensor Networks
519
20.5 Conclusion
530
21 Security Issues in an Integrated Cellular Network—WLAN and MANET
535
21.1 Introduction
535
21.2 Architecture of the Integrated Network
537
21.3 Security Impacts from the Unique Network Characteristics
540
21.4 Potential Security Threats
542
21.5 An Investigation and Analysis of Security Protocols
554
21.6 New Security Issues and Challenges
564
21.7 Conclusion
566
22 Fieldbus for Distributed Control Applications
571
22.1 Introduction
571
22.2 Review on Distributed Control
577
22.3 Fundamental Aspects of DCS
578
22.4 Standards, Frequency Bands, and Issues
580
22.5 Some of the Major Wireless Fieldbuses
583
22.6 Selecting a Fieldbus
590
22.7 Discussion and Conclusions
591
23 Supporting Multimedia Communication in the Integrated WCDMA/WLAN/Ad Hoc Networks
595
23.1 Introduction
595
23.2 Multiple Accesses in CDMA Uplink
599
23.3 Multiple Accesses in CDMA Downlink
605
23.4 Mobility Management
613
23.5 Design Integration with Ad Hoc Networks
620
Index 629


Shih-Lin Wu, Yu-Chee Tseng