Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Looking to rent a book? Rent Principles of Ad-hoc Networking [ISBN: 9780470032909] for the semester, quarter, and short term or search our site for other textbooks by Barbeau, Michel; Kranakis, Evangelos. Renting a textbook can save you up to 90% from the cost of buying.
Evangelos Kranakis is Professor in the School of Computer Science at Carleton University, which he joined in 1991. He is currently CNS (Communication, Networks, and Security) Theme Leader in the MITACS NCE. He has published in the area of the analysis of algorithms, bioinformatics, communication and data (ad hoc and wireless) networks, computational and combinatorial geometry, distributed computing, network security.
Preface | |
Glossary | |
Wireless Data Communications | |
Signal Representation | |
Analog to Digital Conversion | |
Digital to Analog Conversion | |
Architecture of an SDR Application | |
Quadrature Modulation and Demodulation | |
Spread Spectrum | |
Antenna | |
Propagation | |
Ultrawideband | |
Energy Management | |
Exercise | |
Medium Access Control | |
Fundamentals of Probability and Statistics | |
Modeling Traffic | |
Multiple Access | |
Demand Assigned Multiple Access | |
Carrier Sense Multiple Access in IEEE 802.11 | |
Medium Access Control in ad hov Networks | |
Bibliographic Comments | |
Exercises | |
Ad Hov Wireless Access | |
Management of Bluetooth Networks | |
Model for Node Discovery in Bluetooth | |
Bluetooth Formation Algorithms | |
Mesh Mode of WiMAX/802.16 | |
Bibliographic Comments | |
Exercises | |
Wireless Network Programming | |
Structure of Information | |
Socket | |
Parameters and Control | |
Receiving Frames | |
Sending Frames | |
Exercises | |
Ad Hov Networks Protocols | |
Normal IP Routing | |
The Reactive Approach | |
The Proactive Approach | |
The Hybrid Approach | |
Clustering | |
Quality of Service | |
Sensor Network Protocols | |
Exercises | |
Location Awareness | |
Geographic Proximity | |
Constructing Spanners of ad hov Networks | |
Information Dissemination | |
Geographic Location Determination | |
Random Unit Disc Graphs | |
Coverage and Connectivity with Directional Sensors | |
Bibliographic Comments | |
Exercises | |
Ad Hov Networks Security | |
Authentication Techniques | |
Physical Layer Attacks | |
Security of Application Protocols | |
Biometrics-based Key Establishment | |
Routing Security | |
Broadcast Security | |
Secure Location Verification | |
Security in Directional Antenna Systems | |
Bibliographic Comments | |
Exercises | |
Bibliography | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.