Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010132705 | TK5105.78 W574 2007 | Open Access Book | Book | Searching... |
Searching... | 30000010088526 | TK5105.78 W574 2007 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common tools for many people, and it is predicted that wearable sensor networks will greatly improve everyday life as we know it.
By integrating these technologies into a pervasive system, we can access information and use computing resources anytime, anywhere, and with any device. Wireless Ad Hoc Networking: Personal-Area, Local-Area, and the Sensory-Area Networks covers these key technologies used in wireless ad hoc networks. The book is divided into three parts, each providing self-contained chapters written by international experts. Topics include networking architectures and protocols, cross-layer architectures, localization and location tracking, time synchronization, QoS and real-time, security and dependability, applications, modeling and performance evaluation, implementation and experience, and much more.
The book is novel in its single source presentation of ad hoc networking and related key technologies and applications over the platforms of personal area, sensory area, and local area networks. It is a valuable resource for those who work in or are interested in learning about the pervasive computing environment.
Author Notes
Shih-Lin Wu, Yu-Chee Tseng
Table of Contents
Part I Wireless Personal-Area and Sensory-Area Networks | |
1 Coverage and Connectivity of Wireless Sensor Networks | p. 3 |
1.1 Introduction | p. 3 |
1.2 Computing Coverage of a Wireless Sensor Network | p. 4 |
1.3 Coverage and Scheduling | p. 14 |
1.4 Coverage and Connectivity | p. 20 |
1.5 Conclusions | p. 23 |
2 Communication Protocols | p. 25 |
2.1 Introduction | p. 25 |
2.2 Similarities and Differences between WSNs and MANETs | p. 28 |
2.3 Communication Patterns in Wireless Sensor Networks | p. 30 |
2.4 Routing Protocols in WSNs | p. 39 |
2.5 Comparative Studies | p. 53 |
2.6 Conclusions and Future Research Directions | p. 56 |
3 FireFly: A Time-Synchronized Real-Time Sensor Networking Platform | p. 65 |
3.1 Introduction | p. 65 |
3.2 The FireFly Sensor Node | p. 67 |
3.3 RT-Link: A TDMA Link Layer Protocol for Multihop Wireless Networks | p. 71 |
3.4 Nano-RK: A Resource-Centric RTOS for Sensor Networks | p. 87 |
3.5 Coal Mine Safety Application | p. 98 |
3.6 Summary and Concluding Remarks | p. 102 |
4 Energy Conservation in Sensor and Sensor-Actuator Networks | p. 107 |
4.1 Introduction | p. 107 |
4.2 Localized Algorithms Save Energy | p. 110 |
4.3 Minimum-Energy Broadcasting and Multicasting | p. 113 |
4.4 Power-Aware Routing | p. 115 |
4.5 Controlled Mobility for Power-Aware Localized Routing | p. 116 |
4.6 Power-Efficient Neighbor Communication and Discovery for Asymmetric Links | p. 118 |
4.7 Challenges of Power-Aware Routing with a Realistic Physical Layer | p. 119 |
4.8 A Localized Coordination Framework for Wireless Sensor and Actuator Networks | p. 121 |
4.9 Localized Movement Control Algorithms for Realization of Fault Tolerant Sensor and Sensor-Actuator Networks | p. 128 |
4.10 Conclusion | p. 130 |
5 Security in Wireless Sensor Networks | p. 135 |
5.1 Introduction | p. 136 |
5.2 Physical Layer Security | p. 136 |
5.3 Key Management | p. 140 |
5.4 Link Layer Security | p. 155 |
5.5 Network Layer Security | p. 157 |
5.6 Application Layer Security | p. 159 |
6 Autonomous Swarm-Bot Systems for Wireless Sensor Networks | p. 167 |
6.1 Introduction | p. 167 |
6.2 The System Architecture | p. 168 |
6.3 Cooperative Localization Algorithm | p. 169 |
6.4 Foraging and Gathering | p. 172 |
6.5 Minimap Integration | p. 178 |
6.6 The Collaborative Path Planning Algorithm | p. 181 |
6.7 Conclusion | p. 184 |
7 A Smart Blind Alarm Surveillance and Blind Guide Network System on Wireless Optical Communication | p. 191 |
7.1 Introduction | p. 191 |
7.2 The Manufacture of Wireless Optical Transceiver | p. 193 |
7.3 The Design of Wireless Optical Network | p. 196 |
7.4 Smart Wireless Optical Blind-Guidance Cane and Blind-Guidance Robot | p. 199 |
7.5 The Design of a Smart Guide System with Wireless Optical Blind-Guidance Cane and a Blind-Guidance Robot | p. 203 |
7.6 Smart Wireless Optical Communication of Blind Alarm Surveillance System | p. 210 |
7.7 The Design and Implementation of a Smart Wireless Blind-Guidance Alarm Surveillance System | p. 214 |
Part II Wireless Local-Area Networks | |
8 Opportunism in Wireless Networks: Principles and Techniques | p. 223 |
8.1 Opportunism: Avenues and Basic Principles | p. 223 |
8.2 Source Opportunism | p. 227 |
8.3 Spatio-Temporal Opportunism over a Single Link | p. 234 |
8.4 Spatio-Temporal Opportunism in Ad Hoc Networks | p. 241 |
8.5 Spatiotemporal-Spectral Opportunism in Ad Hoc Networks | p. 247 |
8.6 Conclusions | p. 250 |
9 Localization Techniques for Wireless Local Area Networks | p. 255 |
9.1 Introduction | p. 255 |
9.2 Nondedicated Localization Techniques | p. 256 |
9.3 Location Tracking | p. 272 |
9.4 Conclusion | p. 274 |
10 Channel Assignment in Wireless Local Area Networks | p. 277 |
10.1 Introduction | p. 277 |
10.2 Preliminaries | p. 280 |
10.3 Rings | p. 282 |
10.4 Grids | p. 285 |
10.5 Interval Graphs | p. 288 |
10.6 Trees | p. 292 |
10.7 Conclusion | p. 296 |
11 MultiChannel MAC Protocols for Mobile Ad Hoc Networks | p. 301 |
11.1 Introduction | p. 301 |
11.2 Design Issues of Multichannel Protocols | p. 302 |
11.3 Multichannel Protocols | p. 303 |
11.4 Comparison of Multichannel MAC Protocols | p. 320 |
11.5 Open Issues | p. 321 |
11.6 Conclusions | p. 322 |
12 Enhancing Quality of Service for Wireless Ad Hoc Networks | p. 325 |
12.1 Introduction | p. 326 |
12.2 Background | p. 327 |
12.3 The Proposed EDCF-DM Protocol | p. 331 |
12.4 Performance Evaluation | p. 334 |
12.5 Conclusions | p. 340 |
13 QoS Routing Protocols for Mobile Ad Hoc Networks | p. 343 |
13.1 Introduction | p. 343 |
13.2 Reviews of the QoS Routing Protocols | p. 345 |
13.3 Our QoS Routing Protocol | p. 348 |
13.4 Simulation Results | p. 360 |
13.5 Conclusions | p. 367 |
14 Energy Conservation Protocols for Wireless Ad Hoc Networks | p. 371 |
14.1 Introduction | p. 371 |
14.2 Power Management | p. 371 |
14.3 Power Control | p. 382 |
14.4 Topology Control Protocols | p. 387 |
14.5 Summary | p. 397 |
15 Wireless LAN Security | p. 399 |
15.1 WEP and Its Security Weaknesses | p. 399 |
15.2 802.1X Security Measures | p. 405 |
153 IEEE 802.11i Security | p. 410 |
15.4 Summary | p. 417 |
16 Temporal Key Integrity Protocol and Its Security Issues in IEEE 802.11i | p. 419 |
16.1 Introduction | p. 419 |
16.2 Wired Equivalent Privacy and Its Weakness | p. 420 |
16.3 Wi-Fi Protected Access | p. 421 |
16.4 Temporal Key Integrity Protocol | p. 423 |
16.5 Fragility of Michael | p. 430 |
16.6 TKIP Countermeasures | p. 431 |
16.7 Key Handshake Procedure | p. 433 |
16.8 Conclusions | p. 434 |
Part III Integrated Systems | |
17 Wireless Mesh Networks: Design Principles | p. 439 |
17.1 Introduction | p. 439 |
17.2 Generic Architecture and Basic Requirements of Wireless Mesh Networks | p. 439 |
17.3 Network-Planning Techniques | p. 442 |
17.4 Self-Configuring Techniques | p. 448 |
17.5 Conclusions | p. 458 |
18 Wireless Mesh Networks: Multichannel Protocols and Standard Activities | p. 461 |
18.1 Introduction | p. 461 |
18.2 Multichannel MAC Protocols | p. 462 |
18.3 Multichannel Routing Protocols | p. 473 |
18.4 Standard Activities of Mesh Networks | p. 478 |
18.5 Conclusions | p. 481 |
19 Integrated Heterogeneous Wireless Networks | p. 483 |
19.1 Introduction | p. 483 |
19.2 Integration of Infrastructure-Based Heterogeneous Wireless Networks | p. 485 |
19.3 Heterogeneous Wireless Multihop Networks | p. 492 |
19.4 Research Issues for Heterogeneous Wireless Networks | p. 500 |
19.5 Conclusions | p. 502 |
20 Intrusion Detection for Wireless Network | p. 505 |
20.1 Introduction | p. 505 |
20.2 Background on Intrusion Detection | p. 505 |
20.3 Intrusion Detection for Mobile Ad Hoc Networks | p. 506 |
20.4 Intrusion Detection for Wireless Sensor Networks | p. 519 |
20.5 Conclusion | p. 530 |
21 Security Issues in an Integrated Cellular Network-WLAN and MANET | p. 535 |
21.1 Introduction | p. 535 |
21.2 Architecture of the Integrated Network | p. 537 |
21.3 Security Impacts from the Unique Network Characteristics | p. 540 |
21.4 Potential Security Threats | p. 542 |
21.5 An Investigation and Analysis of Security Protocols | p. 554 |
21.6 New Security Issues and Challenges | p. 564 |
21.7 Conclusion | p. 566 |
22 Fieldbus for Distributed Control Applications | p. 571 |
22.1 Introduction | p. 571 |
22.2 Review on Distributed Control | p. 577 |
22.3 Fundamental Aspects of DCS | p. 578 |
22.4 Standards, Frequency Bands, and Issues | p. 580 |
22.5 Some of the Major Wireless Fieldbuses | p. 583 |
22.6 Selecting a Fieldbus | p. 590 |
22.7 Discussion and Conclusions | p. 591 |
23 Supporting Multimedia Communication in the Integrated WCDMA/WLAN/Ad Hoc Networks | p. 595 |
23.1 Introduction | p. 595 |
23.2 Multiple Accesses in CDMA Uplink | p. 599 |
23.3 Multiple Accesses in CDMA Downlink | p. 605 |
23.4 Mobility Management | p. 613 |
23.5 Design Integration with Ad Hoc Networks | p. 620 |
Index | p. 629 |