internetboekhandel.nl
buttons Home pagina Kassa pagina, Winkelwagentje Contact info Email ons
leeg Home pagina Kassa pagina, Winkelwagentje Contact info Email ons Home pagina Gogh
Gogh
Gogh Home pagina Home pagina Kassa pagina, Winkelwagentje Contact info Email ons Besteller 60
 
Nederlands Buitenlands   Alles  Titel  Auteur  ISBN        
Technische wetenschappen
Technische wetenschappen algemeen
Levertijd: 5 tot 11 werkdagen


Misic, Jelena

Wireless Personal Area Networks

Performance, Interconnection, and Security with IEEE 802.15.4

€ 150.95

Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802. 15. 4 provides an in depth analysis of the recent IEEE 802. 15. 4 standard for low data rate wireless personal area networks (LR WPANs), including suggestions to improve performance and comparisons with the related 802. 15. 1 (Bluetooth) standard.


Taal / Language : English

Inhoudsopgave:
About the Series Editors xi
List of Figures
xiii
List of Tables
xvii
Preface xix
Part I WPANS and 802.15.4
1(38)
Prologue: Wireless Personal Area Networks
3(14)
Wireless Ad Hoc Networks
3(1)
Design Goals for the MAC Protocol
4(2)
Classification of MAC Protocols for Ad Hoc Networks
6(3)
Contention-Based MAC Protocols
9(3)
New Kinds of Ad Hoc Networks
12(1)
Sensor Networks
12(5)
Operation of the IEEE 802.15.4 Network
17(22)
Physical Layer Characteristics
17(3)
Star Topology and Beacon Enabled Operation
20(2)
Slotted CSMA-CA Medium Access
22(2)
Acknowledging Successful Transmissions
24(1)
Downlink Communication in Beacon Enabled Mode
25(3)
Guaranteed Time Slots
28(1)
Peer-to-Peer Topology and Non-Beacon Enabled Operation
29(2)
Device Functionality and Cluster Formation
31(4)
Format of the PHY and MAC frames
35(4)
Part II Single-Cluster Networks
39(106)
Cluster with Uplink Traffic
41(30)
The System Model -- Preliminaries
41(3)
Superframe with an Active Period Only
44(7)
Superframe with Both Active and Inactive Periods
51(6)
Probability Distribution of the Packet Service Time
57(2)
Probability Distribution of the Queue Length
59(2)
Access Delay
61(4)
Performance Results
65(6)
Cluster with Uplink and Downlink Traffic
71(24)
The System Model
71(13)
Modeling the Behavior of the Medium
84(2)
Probability Distribution for the Packet Service Time
86(5)
Performance of the Cluster with Bidirectional Traffic
91(4)
MAC Layer Performance Limitations
95(16)
Congestion of Packets Deferred to the Next Superframe
95(3)
Congestion after the Inactive Period
98(1)
Congestion of Uplink Data Requests
99(1)
Blocking of Uplink Data and Data Requests
100(2)
Possible Remedies
102(9)
Activity Management through Bernoulli Scheduling
111(20)
The Need for Activity Management
111(1)
Analysis of Activity Management
112(4)
Analysis of the Impact of MAC and PHY Layers
116(5)
Controlling the Event Sensing Reliability
121(2)
Activity Management Policy
123(8)
Admission Control Issues
131(14)
The Need for Admission Control
131(2)
Performance under Asymmetric Packet Arrival Rates
133(2)
Calculating the Admission Condition
135(4)
Performance of Admission Control
139(6)
Part II Summary and Further Reading
143(2)
Part III Multi-cluster Networks
145(108)
Cluster Interconnection with Master-Slave Bridges
147(40)
Analysis of Bridge Operation
149(9)
Markov Chain Model for a Single Node
158(7)
Performance of the Network
165(1)
Network with a Single Source Cluster/Bridge
166(7)
Network with Two Source Clusters/Bridges
173(6)
Modeling the Transmission Medium and Packet Service Times
179(8)
Equalization of Cluster Lifetimes
187(16)
Modeling the Clusters
187(3)
Distributed Activity Management
190(4)
Energy Consumption in Interconnected Clusters
194(4)
Performance of Activity Management
198(5)
Cluster Interconnection with Slave-Slave Bridges
203(50)
Operation of the SS Bridge
205(12)
Markov Chain Model for the SS Bridge
217(7)
Markov Chain for Non-Bridge Nodes
224(6)
Performance Evaluation
230(1)
To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge
231(3)
Thou Shalt Not Acknowledge: The GTS Bridge
234(6)
Modeling the Transmission Medium and Packet Service Times
240(13)
Part III Summary and Further Reading
251(2)
Part IV Security
253(36)
Security in 802.15.4 Specification
255(10)
Security Services
256(1)
Auxiliary Security Header
257(1)
Securing and Unsecuring Frames
258(2)
Attacks
260(5)
The Cost of Secure and Reliable Sensing
265(24)
Analytical Model of a Generic Key Update Algorithm
267(6)
Analysis of the Node Buffer
273(3)
Success Probabilities
276(2)
Key Update in a Multi-Cluster Network
278(2)
Cluster Lifetime
280(3)
Evaluation of Lifetimes and Populations
283(6)
Part IV Summary and Further Reading
287(2)
Appendices
289(13)
Appendix A An Overview of ZigBee
291(10)
ZigBee Functionality
291(1)
Device Roles
292(1)
Network Topologies and Routing
293(2)
Security
295(6)
Appendix B Probability Generating Functions and Laplace Transforms
301(1)
Bibliography 302(9)
Index 311
Extra informatie: 
Hardback
336 pagina's
Januari 2008
748 gram
254 x 171 x 25 mm
Wiley-Blackwell us

Levertijd: 5 tot 11 werkdagen