2 392 kr
Beställningsvara. Skickas inom 11-20 vardagar. Fri frakt över 249 kr.
Beskrivning
Produktinformation
- Utgivningsdatum:2007-12-27
- Mått:161 x 241 x 25 mm
- Vikt:640 g
- Format:Inbunden
- Språk:Engelska
- Antal sidor:352
- Förlag:ISTE Ltd and John Wiley & Sons Inc
- ISBN:9781848210035
Utforska kategorier
Mer om författaren
Houda Labiod received a PhD degree in Computer Science from theUniversity of Versailles Saint-Quentin-en-Yvelines, France in 1998. From 1999 to 2000, she worked as an assistant researcher at Eurecom Institute in Sophia-Antipolis (France) in the Mobile Communications Unit. Since September 2000, she is an associate professor at ENST (Ecole Nationale Supérieure des Télécommunications) in the INFRES (Computer Science and Network) department. She is an author of a book titled "De Wi-Fi à Bluetooth" (Hermès Editions, 2004). Her main research interests include optimization of mobile and wireless networking and mobile ad hoc networks (unicast routing, multicast routing, security, QoS routing).
Recensioner i media
"This book will provide a very useful reference on the architectural aspects of ad-hoc sensor networks to both students and practioners working in the area." (Computing Reviews, November 19, 2008) "What makes this book worth reading from cover to cover is the successful juxtaposition of state-of-the-art descriptions and concrete research projects related to wireless ad hoc and sensor networks. While many aspects of the study of wireless ad hoc sensor networks are still in flux, the book succeeds in presenting 'a global, realistic, and critical vision of the evolution of spontaneous and autonomous network.' Thus, the book is long on solid scientific research and short on speculation." (Computing Reviews, October 23, 2008)
Innehållsförteckning
- Chapter 1. Introduction 1Houda LABIODChapter 2. Ad Hoc Networks: Principles and Routing 7Stéphane UBÉDA2.1. Introduction 72.2. Hertzian connection 122.2.1. Physical layer impact 122.2.2. Shared access to medium 152.2.3. Flooding 192.3. Routing 212.3.1. Dynamic source routing (DSR) 232.3.2. Ad hoc on-demand distance vector (AODV) 252.3.3. Optimized link state routing (OLSR) 262.3.4. Topology based on reverse-path forwarding (TBRPF) 282.3.5. Zone-based hierarchical link state routing protocol (ZRP) 292.3.6. Location-aided routing (LAR) 302.4. Conclusion 322.5. Bibliography 33Chapter 3. Quality of Service Support in MANETs 35Pascale MINET3.1. Introduction to QoS 353.1.1. Different QoS requirements 363.1.2. Chapter structure 363.2. Mobile ad hoc networks and QoS objectives 373.2.1. Characteristics of mobile ad hoc networks and QoS 373.2.2. Routing in mobile ad hoc networks 403.2.3. Realistic QoS objectives 483.3. QoS architecture and relative QoS state of the art 493.3.1. Different QoS components 493.3.2. QoS models 513.3.3. QoS signaling 533.3.4. QoS routing 563.4. An example of QoS support: QoS OLSR 573.4.1. Description of QoS OLSR 583.4.2. Performance evaluation 593.5. Conclusion 613.5.1. Summary 613.5.2. Perspectives 623.6. Bibliography 62Chapter 4. Multicast Ad Hoc Routing 65Houda LABIOD4.1. Introduction 654.2. Multicast routing in MANETs: a brief state of the art 664.2.1. Classification 664.2.2. Summary 684.3. SRMP 694.3.1. Description 694.3.2. Operation 724.3.3. Maintenance procedures 734.4. Properties 754.5. Simulation results and analysis 764.6. Conclusion 774.7. Bibliography 77Chapter 5. Self-organization of Ad Hoc Networks: Concepts and Impacts 81Fabrice THEOLEYRE and Fabrice VALOIS5.1. Introduction 815.2. Self-organization: definition and objectives 825.2.1. Definition 825.2.2. Principles and objectives 825.2.3. Local or distributed decisions? 845.3. Some key points for self-organization 855.3.1. Emergence of global behavior from local rules 855.3.2. Local interactions and node coordination 865.3.3. Minimizing network state information 865.3.4. Dynamic environment adaptation 875.4. Self-organization: a state of the art 875.4.1. Classification 875.4.2. Virtual backbone 885.4.3. Cauterization techniques 945.5. Case study and proposition of a solution 945.5.1. Motivations 945.5.2. Construction of virtual topology 955.5.3. Maintenance of virtual topology 985.5.4. Virtual topology properties 1015.6. Contribution of self-organization 1015.6.1. Energy saving 1025.6.2. Influence of self-organization on routing 1035.7. Conclusion 1065.8. Bibliography 107Chapter 6. Approaches to Ubiquitous Computing 111Mohamed BAKHOUYA and Jaafar GABER6.1. Introduction 1116.2. Structured service discovery systems 1146.2.1. Systems based on an indexing mechanism 1146.2.2. Systems based on distributed hash 1196.3. Unstructured service discovery systems 1206.3.1. Flooding-based mechanism 1206.3.2. Random walk-based mechanism 1236.4. Comparison between structured and unstructured systems 1246.5. Self-organizing and self-adaptive approach 1256.5.1. Server community construction approach 1266.5.2. Request resolution 1296.6. Simulation results 1356.7. Conclusion 1376.8. Bibliography 137Chapter 7. Service Discovery Protocols for MANETs 143Abdellatif OBAID and Azzedine KHIR7.1. Introduction 1437.2. Service discovery protocols 1467.2.1. Service discovery protocols in wired networks 1467.2.2. Service discovery in ad hoc networks1507.2.3. Service discovery with routing 1527.3. Conclusion 1627.4. Bibliography 162Chapter 8. Distributed Clustering in Ad Hoc Networks and Applications 165Romain MELLIER and Jean-Frédéric MYOUPO8.1. Introduction 1658.2. State of the art 1668.2.1. Clustering in two hop clusters 1678.2.2. Clustering at more than two hops 1818.3. Clustering in networks where mobile devices may have the same weight 1838.4. Applications 1848.4.1. Initialization problem in k hop networks 1858.4.2. Mutual exclusion in k hop networks 1858.5. Conclusion 1908.6. Bibliography 191Chapter 9. Security for Ad Hoc Routing and Forwarding 195Sylvie LANIEPCE9.1. Introduction 1959.2. Reminders on routing protocols in ad hoc networks1969.2.1. Reactive protocols 1969.2.2. Proactive protocol 1989.3. Routing threat model in ad hoc networks 1999.3.1. Ad hoc network characterization for security 1999.3.2. Classification of attack objectives 2009.3.3. Basic attacks and security counter measures 2009.4. Routing security 2029.4.1. SRP: secure routing for mobile ad hoc networks 2029.4.2. Secure ad hoc on-demand distance vector (SAODV) routing 2049.4.3. Ariadne 2059.4.4. ARAN: authenticated routing protocol for ad hoc networks 2099.4.5. Secure dynamic source routing (SDSR) 2109.4.6. EndairA 2129.5. IP datagram forwarding security 2139.5.1. Monitoring-based techniques 2139.5.2. Technique based on packet acknowledgement 2199.5.3. Cooperative incentive techniques based on virtual money 2209.6. Conclusion 2209.7. Acknowledgements 2219.8. Bibliography 221Chapter 10. Fault-Tolerant Distributed Algorithms for Scalable Systems 225Sébastien TIXEUIL10.1. Introduction 22510.2. Distributed algorithms and wireless communications 22610.3. Fault-tolerant distributed algorithms 22810.3.1. Fault taxonomy in distributed systems 22810.3.2. Fault-tolerant algorithm categories 23010.4. The limits and problems caused by a large-scale system 23210.4.1. Hypotheses about the system 23210.4.2. Hypotheses on the applications 23510.5. Solutions for large-scale self-stabilization 23810.5.1. Restricting the nature of the faults 23810.5.2. Limiting the geographic extent of faults 24210.5.3. Classification 24610.5.4. Limiting the classes of problems to solve 24710.6. Conclusion 25110.7. Bibliography 251Chapter 11. Code Mobility in Sensor Networks 257Fabrício A. SILVA, Linnyer B. RUIZ, José M. NOGUEIRA, Thais R. BRAGA and Antonio A.F. LOUREIRO11.1. Introduction 25711.2. Concepts linked to code mobility 25811.2.1. Process and object migration 25911.2.2. Code mobility 25911.2.3. Wireless sensor networks and code mobility 26011.3. Project paradigms of code mobility systems 26111.3.1. Client/server 26111.3.2. Remote evaluation 26211.3.3. Code on demand 26211.3.4. Mobile agent 26311.4. Mobile agents 26311.4.1. Mobile agent components 26511.4.2. Mobile agent system models 26611.5. Modeling mobile agent systems for wireless sensor networks 26811.5.1. Agent model 26811.5.2. Life cycle model 26811.5.3. Computing model 26911.5.4. Security model 26911.5.5. Communication model 27011.5.6. Navigation model 27011.6. State of the art 27111.6.1. Remote and single hop reprogramming 27111.6.2. Multihop reprogramming 27211.6.3. Virtual machine reprogramming 27411.6.4. Mobile target location application 27511.7. Case study: mobile agents in WSN management 27611.7.1. Objectives 27611.7.2. Models 27711.7.3. Evaluation 27811.8. Conclusion 28211.9. Bibliography 282Chapter 12. Vehicle-to-Vehicle Communications: Applications and Perspectives 285Rabah MERAIHI, Sidi-Mohammed SENOUCI, Djamal-Eddine MEDDOUR and Moez JERBI12.1. Introduction 28512.2. Properties and applications 28712.2.1. Properties of VANETs 28712.2.2. VANET applications 28912.3. State of the art and study of the existing situation 29212.3.1. Projects and consortiums 29212.3.2. Study of the existing situation 29412.4. Conclusion 30312.5. Bibliography 304List of Authors 309Index 313
Du kanske också är intresserad av
Wi-Fi™, Bluetooth™, Zigbee™ and WiMax™
Houda Labiod, Hossam Afifi, Costantino de Santis
1 795 kr
Wi-Fi™, Bluetooth™, Zigbee™ and WiMax™
Houda Labiod, Hossam Afifi, Costantino de Santis
1 269 kr
- Signerad!
- Nyhet
- -30%
- -19%
- Nyhet