- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and networks constitute the main sector of embedded systems.…mehr
Andere Kunden interessierten sich auch für
- Krzysztof IniewskiEmbedded Systems185,99 €
- Unmanned Aerial Vehicles207,99 €
- Dominique ParetFlexray and Its Applications139,99 €
- Pong P. ChuEmbedded SoPC Design with Nios II Processor and Verilog Examples166,99 €
- Pong P. ChuEmbedded Sopc Design with Nios II Processor and VHDL Examples159,99 €
- V. Daniel HuntRFID111,99 €
- Sam FullerRapidio164,99 €
-
-
-
Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks.
Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and networks constitute the main sector of embedded systems.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and networks constitute the main sector of embedded systems.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- ISTE
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 320
- Erscheinungstermin: 22. Februar 2010
- Englisch
- Abmessung: 234mm x 157mm x 23mm
- Gewicht: 648g
- ISBN-13: 9781848211445
- ISBN-10: 1848211449
- Artikelnr.: 28708026
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- ISTE
- Verlag: Wiley & Sons
- 1. Auflage
- Seitenzahl: 320
- Erscheinungstermin: 22. Februar 2010
- Englisch
- Abmessung: 234mm x 157mm x 23mm
- Gewicht: 648g
- ISBN-13: 9781848211445
- ISBN-10: 1848211449
- Artikelnr.: 28708026
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Francine Krief is Professor at the University of Bordeaux, France.
General Introduction xi
Chapter 1. Introduction to Embedded Systems 1
Patrice KADIONIK
1.1. Introduction 1
1.2. Embedded system: a definition 3
1.3. Properties of an embedded system 4
1.4. The significance of Moore's Law 6
1.5. Embedded systems and the system on silicon 9
1.6. Embedded systems and communications 12
1.7. Embedded systems and security 13
1.8. Embedded systems and time constraints 14
1.9. Embedded systems and free software 17
1.10. Embedded systems and their design 19
1.11. An example of multimedia embedded system design 20
1.12. Conclusion 25
1.13. Bibliography 26
Chapter 2. Quality-of-Service Routing in Mobile Ad Hoc Networks 29
Zoubir MAMMERI
2.1. Introduction 29
2.2. Mobile ad hoc networks: concepts, characteristics, challenges 31
2.3. QoS routing: general considerations 37
2.4. Best-effort routing protocols in MANETs 47
2.5. QoS routing in MANETs 56
2.6. Conclusion 71
2.7. Bibliography 74
Chapter 3. Self-Management of Ad Hoc Sensor Networks 81
Francine KRIEF
3.1. Introduction 81
3.2. Wireless sensor networks 82
3.3. Autonomic sensor networks 94
3.4. An example of self-configuration 102
3.5. Conclusion 109
3.6. Bibliography 110
Chapter 4. RFID Technology 113
Vincent GUYOT
4.1. Introduction 113
4.2. Automatic identification systems 113
4.3. The components of an RFID system 116
4.4. The different types of RFID systems 118
4.5. RF ranges 120
4.6. Information security 120
4.7. Standards in force 124
4.8. Examples of implementations 127
4.9. Conclusion 136
4.10. Bibliography 136
Chapter 5. Hardware Security in Embedded Systems 139
Lilian BOSSUET and Guy GOGNIAT
5.1. Introduction 139
5.2. Embedded systems and their security issues 140
5.3. Security of the system and its data 147
5.4. Secured hardware architectures for embedded systems 155
5.5. Conclusion168
5.6. Bibliography 169
Chapter 6. Communications Security in Embedded Systems 175
Mohamed Aymen CHALOUF
6.1. Introduction 175
6.2. Communications security 176
6.3. Communications security in embedded systems 195
6.4. Conclusion 204
6.5. Bibliography 204
Chapter 7. Cross-Layer Adaptation for Multimedia Services in 802.11-Type
Embedded Communications Systems 207
Ismaïl DJAMA
7.1. Introduction 207
7.2. Limits of layered structuring 209
7.3. The XL concept 219
7.4. Conclusion 231
7.5. Bibliography 231
Chapter 8. Relevance of the DTN Architecture to Mobile Ad Hoc Networks 235
Olfa SAMET
8.1. Introduction 235
8.2. Mobile ad hoc networks 236
8.3. Challenged networks 239
8.4. Delay-tolerant networks 241
8.5. Relevance of DTNs to ad hoc mobile networks 263
8.6. Conclusion 266
8.7. Bibliography 266
Chapter 9. Intelligent Interfaces and Mobile Communications 267
Badr BENMAMMAR and Zeina EL-FERKH JRAD
9.1. Introduction 267
9.2. Assisting the user with access to new internet services 269
9.3. Modeling user behavior 272
9.4. Synthesis of mobile and wireless networks 276
9.5. References for intelligent interfaces for access to mobile networks
285
9.6. Conclusion 294
9.7. Bibliography 294
Chapter 10. Routing and Mobility Management in Personal Networks 301
Usman JAVAID and Francine KRIEF
10.1. Introduction 301
10.2. Personal environments 303
10.3. Routing in personal environments 306
10.4. Gateway discovery 311
10.5. Mobility management 314
10.6. Conclusion 319
10.7. Bibliography 319
List of Authors 321
Index 323
Chapter 1. Introduction to Embedded Systems 1
Patrice KADIONIK
1.1. Introduction 1
1.2. Embedded system: a definition 3
1.3. Properties of an embedded system 4
1.4. The significance of Moore's Law 6
1.5. Embedded systems and the system on silicon 9
1.6. Embedded systems and communications 12
1.7. Embedded systems and security 13
1.8. Embedded systems and time constraints 14
1.9. Embedded systems and free software 17
1.10. Embedded systems and their design 19
1.11. An example of multimedia embedded system design 20
1.12. Conclusion 25
1.13. Bibliography 26
Chapter 2. Quality-of-Service Routing in Mobile Ad Hoc Networks 29
Zoubir MAMMERI
2.1. Introduction 29
2.2. Mobile ad hoc networks: concepts, characteristics, challenges 31
2.3. QoS routing: general considerations 37
2.4. Best-effort routing protocols in MANETs 47
2.5. QoS routing in MANETs 56
2.6. Conclusion 71
2.7. Bibliography 74
Chapter 3. Self-Management of Ad Hoc Sensor Networks 81
Francine KRIEF
3.1. Introduction 81
3.2. Wireless sensor networks 82
3.3. Autonomic sensor networks 94
3.4. An example of self-configuration 102
3.5. Conclusion 109
3.6. Bibliography 110
Chapter 4. RFID Technology 113
Vincent GUYOT
4.1. Introduction 113
4.2. Automatic identification systems 113
4.3. The components of an RFID system 116
4.4. The different types of RFID systems 118
4.5. RF ranges 120
4.6. Information security 120
4.7. Standards in force 124
4.8. Examples of implementations 127
4.9. Conclusion 136
4.10. Bibliography 136
Chapter 5. Hardware Security in Embedded Systems 139
Lilian BOSSUET and Guy GOGNIAT
5.1. Introduction 139
5.2. Embedded systems and their security issues 140
5.3. Security of the system and its data 147
5.4. Secured hardware architectures for embedded systems 155
5.5. Conclusion168
5.6. Bibliography 169
Chapter 6. Communications Security in Embedded Systems 175
Mohamed Aymen CHALOUF
6.1. Introduction 175
6.2. Communications security 176
6.3. Communications security in embedded systems 195
6.4. Conclusion 204
6.5. Bibliography 204
Chapter 7. Cross-Layer Adaptation for Multimedia Services in 802.11-Type
Embedded Communications Systems 207
Ismaïl DJAMA
7.1. Introduction 207
7.2. Limits of layered structuring 209
7.3. The XL concept 219
7.4. Conclusion 231
7.5. Bibliography 231
Chapter 8. Relevance of the DTN Architecture to Mobile Ad Hoc Networks 235
Olfa SAMET
8.1. Introduction 235
8.2. Mobile ad hoc networks 236
8.3. Challenged networks 239
8.4. Delay-tolerant networks 241
8.5. Relevance of DTNs to ad hoc mobile networks 263
8.6. Conclusion 266
8.7. Bibliography 266
Chapter 9. Intelligent Interfaces and Mobile Communications 267
Badr BENMAMMAR and Zeina EL-FERKH JRAD
9.1. Introduction 267
9.2. Assisting the user with access to new internet services 269
9.3. Modeling user behavior 272
9.4. Synthesis of mobile and wireless networks 276
9.5. References for intelligent interfaces for access to mobile networks
285
9.6. Conclusion 294
9.7. Bibliography 294
Chapter 10. Routing and Mobility Management in Personal Networks 301
Usman JAVAID and Francine KRIEF
10.1. Introduction 301
10.2. Personal environments 303
10.3. Routing in personal environments 306
10.4. Gateway discovery 311
10.5. Mobility management 314
10.6. Conclusion 319
10.7. Bibliography 319
List of Authors 321
Index 323
General Introduction xi
Chapter 1. Introduction to Embedded Systems 1
Patrice KADIONIK
1.1. Introduction 1
1.2. Embedded system: a definition 3
1.3. Properties of an embedded system 4
1.4. The significance of Moore's Law 6
1.5. Embedded systems and the system on silicon 9
1.6. Embedded systems and communications 12
1.7. Embedded systems and security 13
1.8. Embedded systems and time constraints 14
1.9. Embedded systems and free software 17
1.10. Embedded systems and their design 19
1.11. An example of multimedia embedded system design 20
1.12. Conclusion 25
1.13. Bibliography 26
Chapter 2. Quality-of-Service Routing in Mobile Ad Hoc Networks 29
Zoubir MAMMERI
2.1. Introduction 29
2.2. Mobile ad hoc networks: concepts, characteristics, challenges 31
2.3. QoS routing: general considerations 37
2.4. Best-effort routing protocols in MANETs 47
2.5. QoS routing in MANETs 56
2.6. Conclusion 71
2.7. Bibliography 74
Chapter 3. Self-Management of Ad Hoc Sensor Networks 81
Francine KRIEF
3.1. Introduction 81
3.2. Wireless sensor networks 82
3.3. Autonomic sensor networks 94
3.4. An example of self-configuration 102
3.5. Conclusion 109
3.6. Bibliography 110
Chapter 4. RFID Technology 113
Vincent GUYOT
4.1. Introduction 113
4.2. Automatic identification systems 113
4.3. The components of an RFID system 116
4.4. The different types of RFID systems 118
4.5. RF ranges 120
4.6. Information security 120
4.7. Standards in force 124
4.8. Examples of implementations 127
4.9. Conclusion 136
4.10. Bibliography 136
Chapter 5. Hardware Security in Embedded Systems 139
Lilian BOSSUET and Guy GOGNIAT
5.1. Introduction 139
5.2. Embedded systems and their security issues 140
5.3. Security of the system and its data 147
5.4. Secured hardware architectures for embedded systems 155
5.5. Conclusion168
5.6. Bibliography 169
Chapter 6. Communications Security in Embedded Systems 175
Mohamed Aymen CHALOUF
6.1. Introduction 175
6.2. Communications security 176
6.3. Communications security in embedded systems 195
6.4. Conclusion 204
6.5. Bibliography 204
Chapter 7. Cross-Layer Adaptation for Multimedia Services in 802.11-Type
Embedded Communications Systems 207
Ismaïl DJAMA
7.1. Introduction 207
7.2. Limits of layered structuring 209
7.3. The XL concept 219
7.4. Conclusion 231
7.5. Bibliography 231
Chapter 8. Relevance of the DTN Architecture to Mobile Ad Hoc Networks 235
Olfa SAMET
8.1. Introduction 235
8.2. Mobile ad hoc networks 236
8.3. Challenged networks 239
8.4. Delay-tolerant networks 241
8.5. Relevance of DTNs to ad hoc mobile networks 263
8.6. Conclusion 266
8.7. Bibliography 266
Chapter 9. Intelligent Interfaces and Mobile Communications 267
Badr BENMAMMAR and Zeina EL-FERKH JRAD
9.1. Introduction 267
9.2. Assisting the user with access to new internet services 269
9.3. Modeling user behavior 272
9.4. Synthesis of mobile and wireless networks 276
9.5. References for intelligent interfaces for access to mobile networks
285
9.6. Conclusion 294
9.7. Bibliography 294
Chapter 10. Routing and Mobility Management in Personal Networks 301
Usman JAVAID and Francine KRIEF
10.1. Introduction 301
10.2. Personal environments 303
10.3. Routing in personal environments 306
10.4. Gateway discovery 311
10.5. Mobility management 314
10.6. Conclusion 319
10.7. Bibliography 319
List of Authors 321
Index 323
Chapter 1. Introduction to Embedded Systems 1
Patrice KADIONIK
1.1. Introduction 1
1.2. Embedded system: a definition 3
1.3. Properties of an embedded system 4
1.4. The significance of Moore's Law 6
1.5. Embedded systems and the system on silicon 9
1.6. Embedded systems and communications 12
1.7. Embedded systems and security 13
1.8. Embedded systems and time constraints 14
1.9. Embedded systems and free software 17
1.10. Embedded systems and their design 19
1.11. An example of multimedia embedded system design 20
1.12. Conclusion 25
1.13. Bibliography 26
Chapter 2. Quality-of-Service Routing in Mobile Ad Hoc Networks 29
Zoubir MAMMERI
2.1. Introduction 29
2.2. Mobile ad hoc networks: concepts, characteristics, challenges 31
2.3. QoS routing: general considerations 37
2.4. Best-effort routing protocols in MANETs 47
2.5. QoS routing in MANETs 56
2.6. Conclusion 71
2.7. Bibliography 74
Chapter 3. Self-Management of Ad Hoc Sensor Networks 81
Francine KRIEF
3.1. Introduction 81
3.2. Wireless sensor networks 82
3.3. Autonomic sensor networks 94
3.4. An example of self-configuration 102
3.5. Conclusion 109
3.6. Bibliography 110
Chapter 4. RFID Technology 113
Vincent GUYOT
4.1. Introduction 113
4.2. Automatic identification systems 113
4.3. The components of an RFID system 116
4.4. The different types of RFID systems 118
4.5. RF ranges 120
4.6. Information security 120
4.7. Standards in force 124
4.8. Examples of implementations 127
4.9. Conclusion 136
4.10. Bibliography 136
Chapter 5. Hardware Security in Embedded Systems 139
Lilian BOSSUET and Guy GOGNIAT
5.1. Introduction 139
5.2. Embedded systems and their security issues 140
5.3. Security of the system and its data 147
5.4. Secured hardware architectures for embedded systems 155
5.5. Conclusion168
5.6. Bibliography 169
Chapter 6. Communications Security in Embedded Systems 175
Mohamed Aymen CHALOUF
6.1. Introduction 175
6.2. Communications security 176
6.3. Communications security in embedded systems 195
6.4. Conclusion 204
6.5. Bibliography 204
Chapter 7. Cross-Layer Adaptation for Multimedia Services in 802.11-Type
Embedded Communications Systems 207
Ismaïl DJAMA
7.1. Introduction 207
7.2. Limits of layered structuring 209
7.3. The XL concept 219
7.4. Conclusion 231
7.5. Bibliography 231
Chapter 8. Relevance of the DTN Architecture to Mobile Ad Hoc Networks 235
Olfa SAMET
8.1. Introduction 235
8.2. Mobile ad hoc networks 236
8.3. Challenged networks 239
8.4. Delay-tolerant networks 241
8.5. Relevance of DTNs to ad hoc mobile networks 263
8.6. Conclusion 266
8.7. Bibliography 266
Chapter 9. Intelligent Interfaces and Mobile Communications 267
Badr BENMAMMAR and Zeina EL-FERKH JRAD
9.1. Introduction 267
9.2. Assisting the user with access to new internet services 269
9.3. Modeling user behavior 272
9.4. Synthesis of mobile and wireless networks 276
9.5. References for intelligent interfaces for access to mobile networks
285
9.6. Conclusion 294
9.7. Bibliography 294
Chapter 10. Routing and Mobility Management in Personal Networks 301
Usman JAVAID and Francine KRIEF
10.1. Introduction 301
10.2. Personal environments 303
10.3. Routing in personal environments 306
10.4. Gateway discovery 311
10.5. Mobility management 314
10.6. Conclusion 319
10.7. Bibliography 319
List of Authors 321
Index 323