Basic Communication Protocols and Application Areas
De som köpt den här boken har ofta också köpt The Anxious Generation av Jonathan Haidt (inbunden).
Köp båda 2 för 1796 krHUNG-YU WEI, PhD, is Associate Professor in the Department of Electrical Engineering and Graduate Institute of Communication Engineering at National Taiwan University. He is an active participant in the IEEE 802.16 and 3GPP standardization. JAROGNIEW RYKOWSKI, PhD, is an Associate Professor in the Department of Information Technology at Poznan University of Economics in Poland. SUDHIR DIXIT, PhD, is the Director of Hewlett-Packard Laboratories India, an Adjunct Professor of Computer Science at the University of California, Davis (2009-2012), and a Docent in Broadband Mobile Communications for Emerging Economies at the University of Oulu in Finland. He is a Fellow of the IEEE, IET, and IETE.
Foreword xi Preface xiii About the Authors xvii List of Figures xix List of Tables xxv 1 Introduction 1 2 Architectural Requirements for Multi-hop and Ad-Hoc Networking 9 2.1. When and Where Do We Need Ad-Hoc Networking? 9 2.2. When Do We Need Multi-hop? How Many Hops Are Sufficient/Necessary? 12 2.3. Anonymity versus Authorization and Authentication 13 2.4. Security and Privacy in Ad-Hoc Networks 17 2.5. Security and Privacy in Multi-hop Networks 18 2.6. Filtering the Traffic in Ad-Hoc Networking and Multi-hop Relaying 20 2.7. QoS 23 2.8. Addressability 24 2.9. Searchability 28 2.10. Ad-Hoc Contexts for Next-Generation Searching 29 2.11. Personalization Aspects in Ad-Hoc Information Access 31 2.12. Multi-hop Networking: Technical Aspects 32 2.13. Summary 34 2.13.1. Do We Really Need Ad-Hoc and Multi-hop Networking? If So, When and Where? 35 2.13.2. When and Where Do We Need Ad-Hoc Networking? 35 2.13.3. How Do We Effectively Combine Anonymity/Privacy with Safety/Security? 36 2.13.4. How Do We Personalize Network Access, Including User-Oriented Information Filtering? 37 2.13.5. How Do We Access Places/Devices/Information in a Highly Dynamic Environment of an Ad-Hoc and Multi-hop Network Affecting Addressability, Searchability, and Accessibility of Data? 37 2.13.6. How Do We Support Frequently Dis- and Reconnected Users, Including Efficient Propagation of Important Information to Newcomers? 38 2.13.7. How Many Hops Are Allowed/Effective for a Typical Multi-hop Information Exchange? Is Relaying Affected with the Security/Privacy Issues? 38 3 Application Areas for Multi-hop and Ad-Hoc Networking 42 3.1. Telematics 42 3.1.1. Introduction to Telematics Applications 42 3.1.2. Ad-Hoc Enhanced Navigation Support 44 3.1.3. Traffic Lights Assistance 52 3.1.4. CB-Net Application 56 3.1.5. City-Transportation Integrated Support 62 3.2. E-Ticket Applications 67 3.3. Telemedicine 69 3.4. Environment Protection 71 3.5. Public Safety 73 3.5.1. Ad-Hoc Monitoring for Public Safety Applications 74 3.5.2. Broadcasting Public Safety Information 81 3.6. Groupware 84 3.7. Personal, Targeted, Contextual Marketing and Shopping Guidance 85 3.8. Intelligent Building 87 3.8.1. "Intelligent Hospital" Idea 90 3.8.2. "Interactive Museum" Idea 92 3.8.3. Intelligent Ad-Hoc Cooperation at a Workplace 93 3.9. Business Aspects of Multi-hop and Ad-Hoc Networking 94 3.9.1. Monetary Unit for Ad-Hoc and Multi-hop Services 94 3.9.2. Which Ad-Hoc and Multi-hop Functionality Should Be Paid For? 96 3.9.3. Quality-of-Service and Trustability 97 3.9.4. Pay-per-Access Mode and Subscriptions 98 3.9.5. Legal Regulations 100 3.9.6. Ad-Hoc and Multi-hop Networking versus Commercial Networks and Network Providers 100 3.10. Summary 102 4 Mesh Networking Using IEEE 802.11 Wireless Technologies 109 4.1. IEEE 802.11 110 4.1.1. WiFi and IEEE 802.11 Wireless LAN 111 4.1.2. IEEE 802.11 Mesh Network Architectures 113 4.2. IEEE 802.11s: Standard for WLAN Mesh Networking 116 4.2.1. Additional Functions in 802.11s 120 4.2.2. WiFi Certification and Deployments of IEEE 802.11s 120 4.3. Summary 121 5 Wireless Relay Networking Using IEEE 802.16 WiMAX Technologies 122 5.1. IEEE 802.16 Overview and Architecture 122 5.2. IEEE 802.16j Relay System Overview 123 5.2.1. Nontransparent Relay versus Transparent Relay 124 5.2.2. Connection Types 125 5.2.3. MAC PDU Transmission Mode 126 5.2.4. Relay MAC PDU 128 5.2.5. Subheaders in Relay MAC PDU 131 5.3. IEEE 802.16j Frame Structure 132 5.3.1. Frame Structure in Nontransparent Mode 135 5.3.2. Frame Structure in Transparent Mode 137 5.4. Path Management in 802.16j Relay 139 5.4.1. Explicit Path Management 140 5.4.2. Implicit Path Management 142 5.4.3. Contiguous Integer Block CID Assignment for Implicit Path Management 143 5.4.4. Bit Partition CID Assignment for Implicit Path Manageme