Mobile, Wireless, and Sensor Networks: Technology, Applications, and Future DirectionsRajeev Shorey, A. Ananda, Mun Choon Chan, Wei Tsang Ooi John Wiley & Sons, 2006. gada 31. marts - 456 lappuses This publication represents the best thinking and solutions to a myriad of contemporary issues in wireless networks. Coverage includes wireless LANs, multihop wireless networks, and sensor networks. Readers are provided with insightful guidance in tackling such issues as architecture, protocols, modeling, analysis, and solutions. The book also highlights economic issues, market trends, emerging, cutting-edge applications, and new paradigms, such as middleware for RFID, smart home design, and "on-demand business" in the context of pervasive computing. Mobile, Wireless, and Sensor Networks is divided into three distinct parts: * Recent Advances in Wireless LANs and Multihop Wireless Networks * Recent Advances and Research in Sensor Networks * Middleware, Applications, and New Paradigms In developing this collected work, the editors have emphasized two objectives: * Helping readers bridge the gap and understand the relationship between practice and theory * Helping readers bridge the gap and understand the relationships and common links among different types of wireless networks Chapters are written by an international team of researchers and practitioners who are experts and trendsetters in their fields. Contributions represent both industry and academia, including IBM, National University of Singapore, Panasonic, Intel, and Seoul National University. Students, researchers, and practitioners who need to stay abreast of new research and take advantage of the latest techniques in wireless communications will find this publication indispensable. Mobile, Wireless, and Sensor Networks provides a clear sense of where the industry is now, what challenges it faces, and where it is heading. |
Saturs
1 | |
PART II RECENT ADVANCES AND RESEARCH IN SENSOR NETWORKS | 141 |
PART III MIDDLEWARE APPLICATIONS AND NEW PARADIGMS | 309 |
INDEX | 409 |
Citi izdevumi - Skatīt visu
Mobile, Wireless, and Sensor Networks: Technology, Applications, and Future ... Rajeev Shorey,A. Ananda,Mun Choon Chan,Wei Tsang Ooi Priekšskatījums nav pieejams - 2006 |
Mobile, Wireless, and Sensor Networks: Technology, Applications, and Future ... Rajeev Shorey,A. Ananda,Mun Choon Chan,Wei Tsang Ooi Priekšskatījums nav pieejams - 2006 |
Bieži izmantoti vārdi un frāzes
access points algorithm AODV applications approach assume attacks authentication binding update bit error rate channel access chapter communication Computer Conf correspondent node cost coverage data packets deployed deployment detection devices distributed EDCA efficient energy consumption energy-efficient exposure path Figure function global graph grid hoc networks IEEE increases InfoCom interface Internet layer lifetime middleware mobile node monitoring multihop multiple neighbors on-demand business operating optimal option parameters performance problem Proc processing public key public key certificate quantized queries queue received retransmissions RFID routing protocols RREP RREQ message scheme Section sensing field sensor nodes smart environment sniffer SNMP storage management subnet syslog tags target TCP flows throughput tion topology tracking traffic transmission power transmit users VoIP VoIP sessions wireless LANs wireless network wireless sensor networks WLAN
Populāri fragmenti
69. lappuse - Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Medium Access Control (MAC) Enhancements for Quality of Service (QoS),
280. lappuse - I. Stoica, R. Morris, D. Liben-Nowell, DR Karger, MF Kaashoek, F. Dabek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup protocol for Internet applications.
103. lappuse - S.-L. Wu, Y.-C. Tseng, and J.-P. Sheu. Intelligent medium access for mobile ad hoc networks with busy tones and power control.
101. lappuse - S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu. The broadcast storm problem in a mobile ad hoc network.
349. lappuse - ... predicting the next action, by only performing prediction for events known to be part of a common pattern. We demonstrate the ability of ED to perform the third task, improving the accuracy of prediction algorithms, by adding the mined results as a preprocessor to two simple prediction algorithms. Action sequences are first filtered by the mined sequences. If a sequence is considered significant by the mining algorithm, then predictions can be made for events within the sequence window. To test...
102. lappuse - M. Takai. J. Martin. A. Ren. and R. Bagrodia. "Directional Virtual Carrier Sensing for Directional Antennas in Mobile Ad Hoc Networks.
306. lappuse - J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister. System architecture directions for networked sensors.
103. lappuse - H. Woesner. J.-P. Ebert. M. Schlager. and A. Wolisz. "Power-saving mechanisms in emerging standards for wireless LANs: The MAC level perspective.
128. lappuse - ... a RREP back to the source. Otherwise, it rebroadcasts the RREQ. Nodes keep track of the RREQ's source IP address and broadcast ID. If they receive a RREQ, which they have already processed, they discard the RREQ and do not forward it. As the RREP propagates back to the source, nodes set up forward pointers to the destination. Once the source node receives the RREP, it may begin to forward data packets to the destination. If the source later receives a RREP containing a greater sequence number...