Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Wireless Personal-Area and Sensory-Area Networks | |
Coverage and Connectivity of Wireless Sensor Networks | p. 3 |
Introduction | p. 3 |
Computing Coverage of a Wireless Sensor Network | p. 4 |
Coverage and Scheduling | p. 14 |
Coverage and Connectivity | p. 20 |
Conclusions | p. 23 |
Communication Protocols | p. 25 |
Introduction | p. 25 |
Similarities and Differences between WSNs and MANETs | p. 28 |
Communication Patterns in Wireless Sensor Networks | p. 30 |
Routing Protocols in WSNs | p. 39 |
Comparative Studies | p. 53 |
Conclusions and Future Research Directions | p. 56 |
FireFly: A Time-Synchronized Real-Time Sensor Networking Platform | p. 65 |
Introduction | p. 65 |
The FireFly Sensor Node | p. 67 |
RT-Link: A TDMA Link Layer Protocol for Multihop Wireless Networks | p. 71 |
Nano-RK: A Resource-Centric RTOS for Sensor Networks | p. 87 |
Coal Mine Safety Application | p. 98 |
Summary and Concluding Remarks | p. 102 |
Energy Conservation in Sensor and Sensor-Actuator Networks | p. 107 |
Introduction | p. 107 |
Localized Algorithms Save Energy | p. 110 |
Minimum-Energy Broadcasting and Multicasting | p. 113 |
Power-Aware Routing | p. 115 |
Controlled Mobility for Power-Aware Localized Routing | p. 116 |
Power-Efficient Neighbor Communication and Discovery for Asymmetric Links | p. 118 |
Challenges of Power-Aware Routing with a Realistic Physical Layer | p. 119 |
A Localized Coordination Framework for Wireless Sensor and Actuator Networks | p. 121 |
Localized Movement Control Algorithms for Realization of Fault Tolerant Sensor and Sensor-Actuator Networks | p. 128 |
Conclusion | p. 130 |
Security in Wireless Sensor Networks | p. 135 |
Introduction | p. 136 |
Physical Layer Security | p. 136 |
Key Management | p. 140 |
Link Layer Security | p. 155 |
Network Layer Security | p. 157 |
Application Layer Security | p. 159 |
Autonomous Swarm-Bot Systems for Wireless Sensor Networks | p. 167 |
Introduction | p. 167 |
The System Architecture | p. 168 |
Cooperative Localization Algorithm | p. 169 |
Foraging and Gathering | p. 172 |
Minimap Integration | p. 178 |
The Collaborative Path Planning Algorithm | p. 181 |
Conclusion | p. 184 |
A Smart Blind Alarm Surveillance and Blind Guide Network System on Wireless Optical Communication | p. 191 |
Introduction | p. 191 |
The Manufacture of Wireless Optical Transceiver | p. 193 |
The Design of Wireless Optical Network | p. 196 |
Smart Wireless Optical Blind-Guidance Cane and Blind-Guidance Robot | p. 199 |
The Design of a Smart Guide System with Wireless Optical Blind-Guidance Cane and a Blind-Guidance Robot | p. 203 |
Smart Wireless Optical Communication of Blind Alarm Surveillance System | p. 210 |
The Design and Implementation of a Smart Wireless Blind-Guidance Alarm Surveillance System | p. 214 |
Wireless Local-Area Networks | |
Opportunism in Wireless Networks: Principles and Techniques | p. 223 |
Opportunism: Avenues and Basic Principles | p. 223 |
Source Opportunism | p. 227 |
Spatio-Temporal Opportunism over a Single Link | p. 234 |
Spatio-Temporal Opportunism in Ad Hoc Networks | p. 241 |
Spatiotemporal-Spectral Opportunism in Ad Hoc Networks | p. 247 |
Conclusions | p. 250 |
Localization Techniques for Wireless Local Area Networks | p. 255 |
Introduction | p. 255 |
Nondedicated Localization Techniques | p. 256 |
Location Tracking | p. 272 |
Conclusion | p. 274 |
Channel Assignment in Wireless Local Area Networks | p. 277 |
Introduction | p. 277 |
Preliminaries | p. 280 |
Rings | p. 282 |
Grids | p. 285 |
Interval Graphs | p. 288 |
Trees | p. 292 |
Conclusion | p. 296 |
MultiChannel MAC Protocols for Mobile Ad Hoc Networks | p. 301 |
Introduction | p. 301 |
Design Issues of Multichannel Protocols | p. 302 |
Multichannel Protocols | p. 303 |
Comparison of Multichannel MAC Protocols | p. 320 |
Open Issues | p. 321 |
Conclusions | p. 322 |
Enhancing Quality of Service for Wireless Ad Hoc Networks | p. 325 |
Introduction | p. 326 |
Background | p. 327 |
The Proposed EDCF-DM Protocol | p. 331 |
Performance Evaluation | p. 334 |
Conclusions | p. 340 |
QoS Routing Protocols for Mobile Ad Hoc Networks | p. 343 |
Introduction | p. 343 |
Reviews of the QoS Routing Protocols | p. 345 |
Our QoS Routing Protocol | p. 348 |
Simulation Results | p. 360 |
Conclusions | p. 367 |
Energy Conservation Protocols for Wireless Ad Hoc Networks | p. 371 |
Introduction | p. 371 |
Power Management | p. 371 |
Power Control | p. 382 |
Topology Control Protocols | p. 387 |
Summary | p. 397 |
Wireless LAN Security | p. 399 |
WEP and Its Security Weaknesses | p. 399 |
802.1X Security Measures | p. 405 |
IEEE 802.11i Security | p. 410 |
Summary | p. 417 |
Temporal Key Integrity Protocol and Its Security Issues in IEEE 802.11i | p. 419 |
Introduction | p. 419 |
Wired Equivalent Privacy and Its Weakness | p. 420 |
Wi-Fi Protected Access | p. 421 |
Temporal Key Integrity Protocol | p. 423 |
Fragility of Michael | p. 430 |
TKIP Countermeasures | p. 431 |
Key Handshake Procedure | p. 433 |
Conclusions | p. 434 |
Integrated Systems | |
Wireless Mesh Networks: Design Principles | p. 439 |
Introduction | p. 439 |
Generic Architecture and Basic Requirements of Wireless Mesh Networks | p. 439 |
Network-Planning Techniques | p. 442 |
Self-Configuring Techniques | p. 448 |
Conclusions | p. 458 |
Wireless Mesh Networks: Multichannel Protocols and Standard Activities | p. 461 |
Introduction | p. 461 |
Multichannel MAC Protocols | p. 462 |
Multichannel Routing Protocols | p. 473 |
Standard Activities of Mesh Networks | p. 478 |
Conclusions | p. 481 |
Integrated Heterogeneous Wireless Networks | p. 483 |
Introduction | p. 483 |
Integration of Infrastructure-Based Heterogeneous Wireless Networks | p. 485 |
Heterogeneous Wireless Multihop Networks | p. 492 |
Research Issues for Heterogeneous Wireless Networks | p. 500 |
Conclusions | p. 502 |
Intrusion Detection for Wireless Network | p. 505 |
Introduction | p. 505 |
Background on Intrusion Detection | p. 505 |
Intrusion Detection for Mobile Ad Hoc Networks | p. 506 |
Intrusion Detection for Wireless Sensor Networks | p. 519 |
Conclusion | p. 530 |
Security Issues in an Integrated Cellular Network-WLAN and MANET | p. 535 |
Introduction | p. 535 |
Architecture of the Integrated Network | p. 537 |
Security Impacts from the Unique Network Characteristics | p. 540 |
Potential Security Threats | p. 542 |
An Investigation and Analysis of Security Protocols | p. 554 |
New Security Issues and Challenges | p. 564 |
Conclusion | p. 566 |
Fieldbus for Distributed Control Applications | p. 571 |
Introduction | p. 571 |
Review on Distributed Control | p. 577 |
Fundamental Aspects of DCS | p. 578 |
Standards, Frequency Bands, and Issues | p. 580 |
Some of the Major Wireless Fieldbuses | p. 583 |
Selecting a Fieldbus | p. 590 |
Discussion and Conclusions | p. 591 |
Supporting Multimedia Communication in the Integrated WCDMA/WLAN/Ad Hoc Networks | p. 595 |
Introduction | p. 595 |
Multiple Accesses in CDMA Uplink | p. 599 |
Multiple Accesses in CDMA Downlink | p. 605 |
Mobility Management | p. 613 |
Design Integration with Ad Hoc Networks | p. 620 |
Index | p. 629 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.