Muutke küpsiste eelistusi

E-raamat: Communicating Embedded Systems: Networks Applications

Edited by
  • Formaat: PDF+DRM
  • Ilmumisaeg: 04-Mar-2013
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781118618516
  • Formaat - PDF+DRM
  • Hind: 171,60 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: PDF+DRM
  • Ilmumisaeg: 04-Mar-2013
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781118618516

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Embedded systems are becoming increasingly complex, and as they become more widespread, more capable, and more densely integrated in everyday consumer, household, industrial, and more specialized products, the design and use in applications of such systems requires knowledge of several different disciplines such as electronics, data processing, telecommunications, and networks.

Without detailing all aspects of electronics, circuit design, and computer architecture related to the design of embedded systems, this book, written by expert specialists in electronics, data processing and telecommunications and networks, gives important insights into the communication techniques and problems encountered in embedded systems. The book focuses on applications in the area of telecommunications and networks because the vast majority of embedded systems are deployed in communications systems and equipment, and it therefore makes an excellent field-wide case study.
General Introduction xi
Introduction to Embedded Systems
1(28)
Patrice Kadionik
Introduction
1(2)
Embedded system: a definition
3(1)
Properties of an embedded system
4(2)
The significance of Moore's Law
6(3)
Embedded systems and the system on silicon
9(3)
Embedded systems and communications
12(1)
Embedded systems and security
13(1)
Embedded systems and time constraints
14(3)
Embedded systems and free software
17(2)
Embedded systems and their design
19(1)
An example of multimedia embedded system design
20(5)
Conclusion
25(1)
Bibliography
26(3)
Quality-of-Service Routing in Mobile Ad Hoc Networks
29(52)
Zoubir Mammeri
Introduction
29(2)
Mobile ad hoc networks: concepts, characteristics, challenges
31(6)
Concepts and basic principles
31(2)
Limits and challenges
33(2)
MAC protocols for ad hoc networks
35(1)
Node mobility and location
36(1)
QoS routing: general considerations
37(10)
Functions of routing protocols
38(2)
Classification of routing protocols
40(3)
Expected routing protocol properties
43(1)
QoS routing problems
44(3)
Best-effort routing protocols in MANETs
47(9)
Criteria for routing protocol classification
47(5)
Presentation of routing protocols
52(4)
QoS routing in MANETs
56(15)
Approaches for QoS routing
57(2)
Resource reservation
59(1)
Examples of reservation methods
60(5)
Estimation models
65(5)
Presentation of the main QoS routing protocols
70(1)
Conclusion
71(3)
Bibliography
74(7)
Self-Management of Ad Hoc Sensor Networks
81(32)
Francine Krief
Introduction
81(1)
Wireless sensor networks
82(12)
Fields of application for sensor networks
82(1)
The principal components in a sensor
83(2)
Importance of energy in sensor networks
85(1)
Transmission technologies
85(1)
Routing algorithms
86(5)
Main commercial offerings
91(1)
Key issues
92(1)
Projects on sensor networks
93(1)
Autonomic sensor networks
94(8)
Autonomic networking
94(1)
Self-configuration of sensor networks
95(1)
Self-healing of sensor networks
96(2)
Self-optimization of sensor networks
98(1)
Self-protection of sensor networks
98(3)
Projects relating to autonomy in sensor networks
101(1)
An example of self-configuration
102(7)
Energy optimization and automatic classification
102(3)
The LEA2C energy optimization algorithm
105(1)
Performance evaluation of the LEA2C algorithm
106(2)
Improvements to the LEA2C algorithm
108(1)
Conclusion
109(1)
Bibliography
110(3)
RFID Technology
113(26)
Vincent Guyot
Introduction
113(1)
Automatic identification systems
113(3)
Barcodes
113(1)
Optical character recognition (OCR) systems
114(1)
Biometric identification
114(1)
Microchip cards
115(1)
RFID systems
116(1)
The components of an RFID system
116(2)
The different types of RFID systems
118(2)
Bottom of the range RFID systems
118(1)
Mid-range RFID systems
119(1)
Top of the range RFID systems
119(1)
RF ranges
120(1)
Information security
120(4)
Symmetric mutual authentication
121(2)
Authentication with derived keys
123(1)
Transfer encryption
123(1)
Standards in force
124(3)
Animal identification
125(1)
Contactless chip cards
125(1)
Container identification
126(1)
Merchandise management
126(1)
Examples of implementations
127(9)
Contactless chip cards
127(1)
Access to public transport
128(2)
Access to ski slopes
130(1)
Access control
130(2)
Transportation systems
132(2)
Animal identification
134(1)
Sporting events
135(1)
Conclusion
136(1)
Bibliography
136(3)
Hardware Security in Embedded Systems
139(36)
Lilian Bossuet
Guy Gogniat
Introduction
139(1)
Embedded systems and their security issues
140(7)
Design constraints in embedded systems
141(1)
Security issues in embedded systems
142(2)
The main security threats
144(3)
Security of the system and its data
147(8)
The principle of deep security (ICTER project)
147(2)
Properties of a secured embedded hardware system
149(1)
Hardware security solutions
150(5)
Secured hardware architectures for embedded systems
155(13)
Software and embedded data protection architectures
156(4)
Architectures for protection of intellectual property
160(4)
Crypto-architecture for protecting communications and security applications
164(2)
Case study: SANES, a reconfigurable, secured hardware architecture
166(2)
Conclusion
168(1)
Bibliography
169(6)
Communications Security in Embedded Systems
175(32)
Mohamed Aymen Chalouf
Introduction
175(1)
Communications security
176(19)
Security attacks
176(2)
Security services
178(1)
Cryptographic concepts
179(6)
Security techniques
185(10)
Communications security in embedded systems
195(9)
Properties of embedded systems
195(1)
Problems encountered in security implementation in the embedded system
196(2)
Adapting security techniques to embedded systems
198(3)
A mini web server implementing SSL/TLS
201(2)
An example of SSL/TLS usage in an embedded system
203(1)
Conclusion
204(1)
Bibliography
204(3)
Cross-Layer Adaptation for Multimedia Services in 802.11-Type Embedded Communications Systems
207(28)
Ismail Djama
Introduction
207(2)
Limits of layered structuring
209(10)
The network access layer
210(4)
The network layer
214(2)
The transport layer
216(1)
The application layer
217(2)
The XL concept
219(12)
Bottom-up approaches
220(3)
Top-down approaches
223(2)
Mixed approaches
225(6)
Conclusion
231(1)
Bibliography
231(4)
Relevance of the DTN Architecture to Mobile Ad Hoc Networks
235(32)
Olfa Samet
Introduction
235(1)
Mobile ad hoc networks
236(3)
Definition
236(1)
Characteristics of mobile ad hoc networks
237(1)
Constraints of mobile ad hoc networks
237(2)
Challenged networks
239(2)
Transmission links
239(1)
Network architecture
240(1)
User terminals
240(1)
Communication protocols
241(1)
Delay-tolerant networks
241(22)
Definition and objectives
241(2)
Specifics of the DTN architecture
243(9)
Protocol model of a DTN network
252(2)
Routing in a DTN network
254(9)
Relevance of DTNs to ad hoc mobile networks
263(3)
Links with long delays
264(1)
Solution to the problems relating to high loss rates
265(1)
Conclusion
266(1)
Bibliography
266(1)
Intelligent Interfaces and Mobile Communications
267(34)
Badr Benmammar
Zeina El-Ferkh Jrad
Introduction
267(2)
Assisting the user with access to new internet services
269(3)
Intelligent user interfaces
270(1)
General characteristics of an intelligent interface
270(2)
Modeling user behavior
272(4)
Determining the contextual data of a profile
273(1)
General definition of pertinent characteristics
274(2)
Synthesis of mobile and wireless networks
276(9)
WiMAX technology
278(3)
WiMAX and QoS
281(1)
Mobile WiMAX and 4G
282(3)
References for intelligent interfaces for access to mobile networks
285(9)
Predicting the mobility of users
285(3)
Negotiating the QoS for a mobile user
288(6)
Conclusion
294(1)
Bibliography
294(7)
Routing and Mobility Management in Personal Networks
301(20)
Usman Javaid
Francine Krief
Introduction
301(2)
Personal environments
303(3)
Personal networks
303(1)
Personal federation
304(1)
Personal ubiquitous environment
305(1)
Routing in personal environments
306(5)
Specificities of personal networks
306(2)
PNRP routing protocol
308(2)
Simulation
310(1)
Gateway discovery
311(3)
Gateway discovery in multi-hop networks
311(1)
The ADD protocol
312(1)
Simulations
313(1)
Mobility management
314(5)
Mobility management in personal networks
314(1)
Mobility management architecture
314(2)
Seamless multi-hop handover
316(3)
Conclusion
319(1)
Bibliography
319(2)
List of Authors 321(2)
Index 323
Francine Krief is Professor at the University of Bordeaux, France.