توضیحاتی در مورد کتاب Principles of Ad–hoc Networking
نام کتاب : Principles of Ad–hoc Networking
ویرایش : 1
عنوان ترجمه شده به فارسی : اصول شبکه های Ad-hoc
سری :
نویسندگان : Michel Barbeau, Evangelos Kranakis
ناشر : Wiley
سال نشر : 2007
تعداد صفحات : 277
ISBN (شابک) : 0470032901 , 9780470032909
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 1 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Principles of Ad Hoc Networking
Contents
Preface
Glossary
1 Wireless Data Communications
1.1 Signal representation
1.2 Analog to digital conversion
1.3 Digital to analog conversion
1.4 Architecture of an SDR application
1.5 Quadrature modulation and demodulation
1.6 Spread spectrum
1.7 Antenna
1.8 Propagation
1.9 Ultrawideband
1.10 Energy management
1.11 Exercises
2 Medium Access Control
2.1 Fundamentals of probability and statistics
2.1.1 General concepts
2.1.2 Random variables and distributions
2.1.3 Counting processes
2.2 Modeling traffic
2.2.1 Delay models
2.2.2 Queuing models
2.2.3 Birth–death processes
2.2.4 M/M/1/∞ queuing system
2.2.5 M/M/m/∞ queue: m servers
2.2.6 Queues for channel allocation
2.2.7 Queues with reserved channels for handoffs
2.3 Multiple access
2.3.1 Uncoordinated access
2.3.2 Contention-based access
2.4 Demand assigned multiple access
2.4.1 Bit-map
2.4.2 Binary countdown
2.4.3 Splitting algorithms
2.5 Carrier sense multiple access in IEEE 802.11
2.5.1 Persistence
2.5.2 Collision avoidance
2.6 Medium access control in ad hoc networks
2.6.1 Neighbor aware contention resolution
2.6.2 Multiple access protocols
2.6.3 Throughput analysis of NAMA
2.7 Bibliographic comments
2.8 Exercises
3 Ad Hoc Wireless Access
3.1 Management of Bluetooth networks
3.1.1 Architecture
3.1.2 The Bluetooth asymmetric protocol
3.1.3 Bluetooth protocol architecture (IEEE 802.15)
3.2 Model for node discovery in Bluetooth
3.2.1 Avoiding collisions
3.2.2 Details of the node discovery model
3.2.3 Protocols for node discovery
3.2.4 Multiple nodes competing for air-time
3.3 Bluetooth formation algorithms
3.3.1 Bluetooth topology construction protocol
3.3.2 Bluetree
3.3.3 Tree scatternet
3.3.4 Bluenet
3.3.5 Scatternet formation algorithm
3.3.6 Loop scatternet
3.3.7 Bluestar
3.4 Mesh mode of WiMAX/802.16
3.4.1 Scheduling
3.4.2 Management messages
3.4.3 Mesh network
3.4.4 Sleep mode
3.5 Bibliographic comments
3.6 Exercises
4 Wireless Network Programming
4.1 Structure of information
4.2 Socket
4.3 Parameters and control
4.4 Receiving frames
4.5 Sending frames
4.6 Exercises
5 Ad Hoc Network Protocols
5.1 Normal IP routing
5.2 The reactive approach
5.3 The proactive approach
5.4 The hybrid approach
5.4.1 Neighbor discovery protocol
5.4.2 Intrazone Routing Protocol
5.4.3 Interzone routing protocol
5.5 Clustering
5.6 Quality of service
5.7 Sensor Network Protocols
5.7.1 Flat routing
5.7.2 Hierarchical routing
5.7.3 Zigbee
5.8 Exercises
6 Location Awareness
6.1 Geographic proximity
6.1.1 Neighborhood graphs
6.1.2 Relation between the neighborhood graphs
6.2 Constructing spanners of ad hoc networks
6.2.1 Gabriel test
6.2.2 Morelia test
6.2.3 Half-space proximal test
6.2.4 Spanner for nodes with irregular transmission ranges
6.3 Information dissemination
6.3.1 Compass routing in undirected planar graphs
6.3.2 Face routing in undirected planar graphs
6.3.3 Traversal of quasi-planar graphs
6.3.4 Routing in eulerian directed planar graphs
6.3.5 Routing in outerplanar graphs
6.4 Geographic location determination
6.4.1 Radiolocation techniques
6.4.2 Computing the geographic location
6.4.3 Three/two neighbor algorithm
6.4.4 Beyond distance one neighborhood
6.5 Random unit disc graphs
6.5.1 Poisson distribution in the plane
6.5.2 Connectivity and k-connectivity
6.5.3 EuclideanMST
6.5.4 NNG and k-NNG
6.5.5 Delaunay triangulations
6.6 Coverage and connectivity with directional sensors
6.6.1 Covering circles with sensors
6.6.2 Achieving coverage
6.7 Bibliographic comments
6.8 Exercises
7 Ad Hoc Network Security
7.1 Authentication techniques
7.1.1 Signatures, authentication and hashing
7.1.2 Signatures in networking
7.1.3 Distribution of keys
7.2 Physical layer attacks
7.3 Security of application protocols
7.3.1 WiFi/802.11 confidentiality
7.3.2 ZigBee security
7.4 Biometrics-based key establishment
7.5 Routing security
7.5.1 Routing attacks
7.5.2 Preventing malicious packet dropping
7.5.3 Secure ad hoc distance vector routing protocol
7.6 Broadcast security
7.6.1 Issues and challenges
7.6.2 BiBa broadcast authentication
7.7 Secure location verification
7.7.1 Simple echo protocol
7.7.2 Echo protocol
7.8 Security in directional antenna systems
7.8.1 Wormhole attacks and their impact on routing protocols
7.8.2 Zoning with directional sensors
7.8.3 Protocols for securing neighbor discovery
7.9 Bibliographic comments
7.10 Exercises
Bibliography
Index