본문 바로가기
장바구니0

Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802. 15. 4 > 무선통신

도서간략정보

Wireless Personal Area Networks: Performance, Interconnection, and Security with IEEE 802. 15. 4
판매가격 15,000원
저자 Misic
도서종류 외국도서
출판사 Wiley
발행언어 영어
발행일 2008-03-07
페이지수 336
ISBN 9780470518472
도서구매안내 온, 온프라인 서점에서 구매 하실 수 있습니다.

구매기능

보조자료 다운
  • 도서 정보

    도서 상세설명

    About the Series Editors.

    List of Figures.

    List of Tables.

    Preface.

    I: WPANs and 802.15.4 1.

    1. Prologue: Wireless Personal Area Networks.

    1.1 Wireless Ad Hoc Networks.

    1.2 Design Goals for the MAC Protocol.

    1.3 Classification of MAC Protocols For Ad Hoc Networks.

    1.4 Contention-Based MAC Protocols.

    1.5 New Kinds of Ad Hoc Networks.

    1.6 Sensor Networks.

    2. Operation of the IEEE 802.15.4 network.

    2.1 Physical Layer Characteristics.

    2.2 Star Topology and Beacon Enabled Operation.

    2.3 Slotted CSMA-CA Medium Access.

    2.4 Acknowledging Successful Transmissions.

    2.5 Downlink Communication in Beacon Enabled Mode.

    2.6 Guaranteed Time Slots.

    2.7 Peer-to-Peer Topology and Non-Beacon Enabled Operation.

    2.8 Device Functionality and Cluster Formation.

    2.9 Format of the PHY and MAC frames.

    Part II. Single-Cluster Networks.

    3. Cluster with Uplink Traffic.

    3.1 The System Model – Preliminaries.

    3.2 Superframe With an Active Period Only.

    3.3 Superframe With Both Active and Inactive Periods.

    3.4 Probability Distribution of the Packet Service Time.

    3.5 Probability Distribution of the Queue Length.

    3.6 Access Delay.

    3.7 Performance Results.

    4. Cluster With Uplink And Downlink Traffic.

    4.1 The System Model.

    4.2 Modeling the Behavior of the Medium.

    4.3 Probability Distribution For the Packet Service Time.

    4.4 Performance of the Cluster With Bidirectional Traffic.

    5. MAC Layer Performance Limitations.

    5.1 Congestion of Packets Deferred to The Next Superframe.

    5.2 Congestion After The Inactive Period.

    5.3 Congestion of Uplink Data Requests.

    5.4 Blocking of Uplink Data and Data Requests.

    5.5 Possible Remedies.

    6. Activity Management Through Bernoulli Scheduling.

    6.1 The Need For Activity Management.

    6.2 Analysis of Activity Management.

    6.3 Analysis of the Impact of MAC and PHY Layers.

    6.4 Controlling the Event Sensing Reliability.

    6.5 Activity Management Policy.

    7. Admission Control Issues.

    7.1 The Need for Admission Control.

    7.2 Performance Under Asymmetric Packet Arrival Rates.

    7.3 Calculating the Admission Condition.

    7.4 Performance of Admission Control.

    Part II. Summary and Further Reading.

    Part III. Multi-Cluster Networks.

    8. Cluster InterconnectionWith Master-Slave Bridges.

    8.1 Analysis of Bridge Operation.

    8.2 Markov Chain Model for A Single Node.

    8.3 Performance of the Network.

    8.4 Network with a Single Source Cluster/Bridge.

    8.5 Network with Two Source Clusters/Bridges.

    8.6 Modeling the Transmission Medium and Packet Service Times.

    9. Equalization of Cluster Lifetimes.

    9.1 Modeling the Clusters.

    9.2 Distributed Activity Management.

    9.3 Energy Consumption in Interconnected Clusters.

    9.4 Performance of activity management.

    10. Cluster Interconnection with Slave-Slave Bridges.

    10.1 Operation of the SS Bridge.

    10.2 Markov Chain Model for the SS Bridge.

    10.3 Markov Chain for Non-Bridge Nodes.

    10.4 Performance Evaluation.

    10.5 To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge.

    10.6 Thou Shalt Not Acknowledge: The GTS Bridge.

    10.7 Modeling the Transmission Medium and Packet Service Times.

    Part III. Summary and Further Reading.

    Part IV. Security.

    11. Security in 802.15.4 Specification.

    11.1 Security Services.

    11.2 Auxiliary Security Header.

    11.3 Securing and Unsecuring Frames.

    11.4 Attacks.

    12. The Cost of Secure and Reliable Sensing.

    12.1 Analytical Model of a Generic Key Update Algorithm.

    12.2 Analysis of the Node Buffer.

    12.3 Success Probabilities.

    12.4 Key Update in a Multi-Cluster Network.

    12.5 Cluster Lifetime.

    12.6 Evaluation of Lifetimes and Populations.

    Part IV. Summary and Further Reading.

    Appendices.

    Appendix A. An Overview of ZigBee.

    A.1 ZigBee Functionality.

    A.2 Device Roles.

    A.3 Network Topologies and Routing.

    A.4 Security.

    Appendix B. Probability generating functions and Laplace transforms.

    Bibliography.

    Index.
  • 사용후기

    사용후기가 없습니다.

  • 배송/교환정보

    배송정보

    배송 안내 입력전입니다.

    교환/반품

    교환/반품 안내 입력전입니다.

선택하신 도서가 장바구니에 담겼습니다.

계속 둘러보기 장바구니보기
회사소개 개인정보 이용약관
Copyright © 2001-2019 도서출판 홍릉. All Rights Reserved.
상단으로