Communicating Embedded Systems: Networks Applications [NOOK Book]

Overview

Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded...
See more details below
Communicating Embedded Systems: Networks Applications

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$85.99
BN.com price
(Save 42%)$150.00 List Price
Note: This NOOK Book can be purchased in bulk. Please email us for more information.

Overview

Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and networks constitute the main sector of embedded systems.
Read More Show Less

Product Details

  • ISBN-13: 9781118618714
  • Publisher: Wiley
  • Publication date: 3/4/2013
  • Series: ISTE
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • File size: 4 MB

Table of Contents

General Introduction xi

Chapter 1. Introduction to Embedded Systems 1
Patrice KADIONIK

1.1. Introduction 1

1.2. Embedded system: a definition 3

1.3. Properties of an embedded system 4

1.4. The significance of Moore’s Law 6

1.5. Embedded systems and the system on silicon 9

1.6. Embedded systems and communications 12

1.7. Embedded systems and security 13

1.8. Embedded systems and time constraints 14

1.9. Embedded systems and free software 17

1.10. Embedded systems and their design 19

1.11. An example of multimedia embedded system design 20

1.12. Conclusion 25

1.13. Bibliography 26

Chapter 2. Quality-of-Service Routing in Mobile Ad Hoc Networks 29
Zoubir MAMMERI

2.1. Introduction 29

2.2. Mobile ad hoc networks: concepts, characteristics, challenges 31

2.3. QoS routing: general considerations 37

2.4. Best-effort routing protocols in MANETs 47

2.5. QoS routing in MANETs 56

2.6. Conclusion 71

2.7. Bibliography 74

Chapter 3. Self-Management of Ad Hoc Sensor Networks 81
Francine KRIEF

3.1. Introduction 81

3.2. Wireless sensor networks 82

3.3. Autonomic sensor networks 94

3.4. An example of self-configuration 102

3.5. Conclusion 109

3.6. Bibliography 110

Chapter 4. RFID Technology 113
Vincent GUYOT

4.1. Introduction 113

4.2. Automatic identification systems 113

4.3. The components of an RFID system 116

4.4. The different types of RFID systems 118

4.5. RF ranges 120

4.6. Information security 120

4.7. Standards in force 124

4.8. Examples of implementations 127

4.9. Conclusion 136

4.10. Bibliography 136

Chapter 5. Hardware Security in Embedded Systems 139
Lilian BOSSUET and Guy GOGNIAT

5.1. Introduction 139

5.2. Embedded systems and their security issues 140

5.3. Security of the system and its data 147

5.4. Secured hardware architectures for embedded systems 155

5.5. Conclusion168

5.6. Bibliography 169

Chapter 6. Communications Security in Embedded Systems 175
Mohamed Aymen CHALOUF

6.1. Introduction 175

6.2. Communications security 176

6.3. Communications security in embedded systems 195

6.4. Conclusion 204

6.5. Bibliography 204

Chapter 7. Cross-Layer Adaptation for Multimedia Services in 802.11-Type Embedded Communications Systems 207
Ismaïl DJAMA

7.1. Introduction 207

7.2. Limits of layered structuring 209

7.3. The XL concept 219

7.4. Conclusion 231

7.5. Bibliography 231

Chapter 8. Relevance of the DTN Architecture to Mobile Ad Hoc Networks 235
Olfa SAMET

8.1. Introduction 235

8.2. Mobile ad hoc networks 236

8.3. Challenged networks 239

8.4. Delay-tolerant networks 241

8.5. Relevance of DTNs to ad hoc mobile networks 263

8.6. Conclusion 266

8.7. Bibliography 266

Chapter 9. Intelligent Interfaces and Mobile Communications 267
Badr BENMAMMAR and Zeina EL-FERKH JRAD

9.1. Introduction 267

9.2. Assisting the user with access to new internet services 269

9.3. Modeling user behavior 272

9.4. Synthesis of mobile and wireless networks 276

9.5. References for intelligent interfaces for access to mobile networks 285

9.6. Conclusion 294

9.7. Bibliography 294

Chapter 10. Routing and Mobility Management in Personal Networks 301
Usman JAVAID and Francine KRIEF

10.1. Introduction 301

10.2. Personal environments 303

10.3. Routing in personal environments 306

10.4. Gateway discovery 311

10.5. Mobility management 314

10.6. Conclusion 319

10.7. Bibliography 319

List of Authors 321

Index 323

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)