BN.com Gift Guide

Wireless Sensor Networks: Technology, Protocols, and Applications / Edition 1

Hardcover (Print)
Buy New
Buy New from BN.com
$106.76
Used and New from Other Sellers
Used and New from Other Sellers
from $34.62
Usually ships in 1-2 business days
(Save 73%)
Other sellers (Hardcover)
  • All (11) from $34.62   
  • New (7) from $34.57   
  • Used (4) from $34.71   

Overview

Infrastructure for Homeland Security Environments

Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way towards a large plethora of new applications in such areas as infrastructure protection and security, healthcare, energy, food safety, RFID, ZigBee, and processing.

Unlike other books on wireless sensor networks that focus on limited topics in the field, this book is a broad introduction that covers all the major technology, standards, and application topics. It contains everything readers need to know to enter this burgeoning field, including current applications and promising research and development; communication and networking protocols; middleware architecture for wireless sensor networks; and security and management.

The straightforward and engaging writing style of this book makes even complex concepts and processes easy to follow and understand. In addition, it offers several features that help readers grasp the material and then apply their knowledge in designing their own wireless sensor network systems:
*

Examples illustrate how concepts are applied to the development and application of
*

wireless sensor networks
*

Detailed case studies set forth all the steps of design and implementation needed to solve real-world problems
*

Chapter conclusions that serve as an excellent review by stressing the chapter's key concepts
*

References in each chapter guide readers to in-depth discussions of individual topics

This book is ideal for networking designers and engineers who want to fully exploit this new technology and for government employees who are concerned about homeland security. With its examples, it is appropriate for use as a coursebook for upper-level undergraduates and graduate students.

Read More Show Less

Editorial Reviews

From the Publisher
"…the best-written book in its subject area…a must-have volume for anyone interested in the potential of wireless sensor networks." (RFID Journal Online, August 20, 2007)

"…a valuable contribution to the WSN literature…it will occupy a conspicuous place in the reader's library." (Computing Reviews.com, October 8, 2007)

Read More Show Less

Product Details

  • ISBN-13: 9780471743002
  • Publisher: Wiley
  • Publication date: 4/6/2007
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 328
  • Product dimensions: 6.44 (w) x 9.39 (h) x 0.85 (d)

Meet the Author

Kazem Sohraby, PhD, is Professor of Electrical Engineering in the College of Engineering at the University of Arkansas. Dr. Sohraby has also served as head of the university's Department of Computer Science and Computer Engineering, and as Director of Telecommunications Management Department at Stevens Institute of Technology, Hoboken, New Jersey. Prior to his university appointment, Dr. Sohraby spent much of his career at Bell Labs Advanced Communication Technologies Center. His work resulted in more than twenty new patents for Bell Labs.

Daniel Minoli has worked and published extensively in the field of IT security, with more than thirty years of hands-on experience in IT, telecommunications, wireless, and networking. He has helped develop systems and solutions for such organizations as Advanced Research Projects Agency (ARPA) think tanks, Bell Telephone Laboratories, ITT, Prudential Securities, Telcordia (Bell Communications Research), AT&T, Leading Edge Networks, Capital One Financial, SES Americom, New York University, Rutgers University, Stevens Institute of Technology, and Société Générale de Financement du Québec. His columns have been published in Computerworld, Network World, and Network Computing.

Taieb Znati, PhD, is a Professor in the Department of Computer Science at the University of Pittsburgh. Dr. Znati's recent work focuses on the design and analysis of network protocols for wired and wireless communications, sensor networks, network security, agent-based technology with collaborative environments, and middleware.

Read More Show Less

Table of Contents

Preface xi

About the Authors xiii

1 Introduction and Overview of Wireless Sensor Networks 1

1.1 Introduction, 1

1.1.1 Background of Sensor Network Technology, 2

1.1.2 Applications of Sensor Networks, 10

1.1.3 Focus of This Book, 12

1.2 Basic Overview of the Technology, 13

1.2.1 Basic Sensor Network Architectural Elements, 15

1.2.2 Brief Historical Survey of Sensor Networks, 26

1.2.3 Challenges and Hurdles, 29

1.3 Conclusion, 31

References, 31

2 Applications of Wireless Sensor Networks 38

2.1 Introduction, 38

2.2 Background, 38

2.3 Range of Applications, 42

2.4 Examples of Category 2 WSN Applications, 50

2.4.1 Home Control, 51

2.4.2 Building Automation, 53

2.4.3 Industrial Automation, 56

2.4.4 Medical Applications, 57

2.5 Examples of Category 1 WSN Applications, 59

2.5.1 Sensor and Robots, 60

2.5.2 Reconfigurable Sensor Networks, 62

2.5.3 Highway Monitoring, 63

2.5.4 Military Applications, 64

2.5.5 Civil and Environmental Engineering Applications, 67

2.5.6 Wildfire Instrumentation, 68

2.5.7 Habitat Monitoring, 68

2.5.8 Nanoscopic Sensor Applications, 69

2.6 Another Taxonomy of WSN Technology, 69

2.7 Conclusion, 71

References, 71

3 Basic Wireless Sensor Technology 75

3.1 Introduction, 75

3.2 Sensor Node Technology, 76

3.2.1 Overview, 76

3.2.2 Hardware and Software, 78

3.3 Sensor Taxonomy, 80

3.4 WN Operating Environment, 84

3.5 WN Trends, 87

3.6 Conclusion, 91

References, 91

4 Wireless Transmission Technology and Systems 93

4.1 Introduction, 93

4.2 Radio Technology Primer, 94

4.2.1 Propagation and Propagation Impairments, 94

4.2.2 Modulation, 101

4.3 Available Wireless Technologies, 103

4.3.1 Campus Applications, 105

4.3.2 MAN/WAN Applications, 120

4.4 Conclusion, 131

Appendix A: Modulation Basics, 131

References, 139

5 Medium Access Control Protocols for Wireless Sensor Networks 142

5.1 Introduction, 142

5.2 Background, 143

5.3 Fundamentals of MAC Protocols, 144

5.3.1 Performance Requirements, 145

5.3.2 Common Protocols, 148

5.4 MAC Protocols for WSNs, 158

5.4.1 Schedule-Based Protocols, 161

5.4.2 Random Access-Based Protocols, 165

5.5 Sensor-MAC Case Study, 167

5.5.1 Protocol Overview, 167

5.5.2 Periodic Listen and Sleep Operations, 168

5.5.3 Schedule Selection and Coordination, 169

5.5.4 Schedule Synchronization, 170

5.5.5 Adaptive Listening, 171

5.5.6 Access Control and Data Exchange, 171

5.5.7 Message Passing, 172

5.6 IEEE 802.15.4 LR-WPANs Standard Case Study, 173

5.6.1 PHY Layer, 176

5.6.2 MAC Layer, 178

5.7 Conclusion, 192

References, 193

6 Routing Protocols for Wireless Sensor Networks 197

6.1 Introduction, 197

6.2 Background, 198

6.3 Data Dissemination and Gathering, 199

6.4 Routing Challenges and Design Issues in Wireless Sensor Networks, 200

6.4.1 Network Scale and Time-Varying Characteristics, 200

6.4.2 Resource Constraints, 201

6.4.3 Sensor Applications Data Models, 201

6.5 Routing Strategies in Wireless Sensor Networks, 202

6.5.1 WSN Routing Techniques, 203

6.5.2 Flooding and Its Variants, 203

6.5.3 Sensor Protocols for Information via Negotiation, 206

6.5.4 Low-Energy Adaptive Clustering Hierarchy, 210

6.5.5 Power-Efficient Gathering in Sensor Information Systems, 213

6.5.6 Directed Diffusion, 215

6.5.7 Geographical Routing, 219

6.6 Conclusion, 225

References, 225

7 Transport Control Protocols for Wireless Sensor Networks 229

7.1 Traditional Transport Control Protocols, 229

7.1.1 TCP (RFC 793), 231

7.1.2 UDP (RFC 768), 233

7.1.3 Mobile IP, 233

7.1.4 Feasibility of Using TCP or UDP for WSNs, 234

7.2 Transport Protocol Design Issues, 235

7.3 Examples of Existing Transport Control Protocols, 237

7.3.1 CODA (Congestion Detection and Avoidance), 237

7.3.2 ESRT (Event-to-Sink Reliable Transport), 237

7.3.3 RMST (Reliable Multisegment Transport), 239

7.3.4 PSFQ (Pump Slowly, Fetch Quickly), 239

7.3.5 GARUDA, 239

7.3.6 ATP (Ad Hoc Transport Protocol), 240

7.3.7 Problems with Transport Control Protocols, 240

7.4 Performance of Transport Control Protocols, 241

7.4.1 Congestion, 241

7.4.2 Packet Loss Recovery, 242

7.5 Conclusion, 244

References, 244

8 Middleware for Wireless Sensor Networks 246

8.1 Introduction, 246

8.2 WSN Middleware Principles, 247

8.3 Middleware Architecture, 248

8.3.1 Data-Related Functions, 249

8.3.2 Architectures, 252

8.4 Existing Middleware, 253

8.4.1 MiLAN (Middleware Linking Applications and Networks), 253

8.4.2 IrisNet (Internet-Scale Resource-Intensive Sensor Networks Services), 254

8.4.3 AMF (Adaptive Middleware Framework), 255

8.4.4 DSWare (Data Service Middleware), 255

8.4.5 CLMF (Cluster-Based Lightweight Middleware Framework), 256

8.4.6 MSM (Middleware Service for Monitoring), 256

8.4.7 Em*, 256

8.4.8 Impala, 257

8.4.9 DFuse, 257

8.4.10 DDS (Device Database System), 258

8.4.11 SensorWare, 258

8.5 Conclusion, 259

References, 259

9 Network Management for Wireless Sensor Networks 262

9.1 Introduction, 262

9.2 Network Management Requirements, 262

9.3 Traditional Network Management Models, 263

9.3.1 Simple Network Management Protocol, 263

9.3.2 Telecom Operation Map, 264

9.4 Network Management Design Issues, 264

9.5 Example of Management Architecture: MANNA, 267

9.6 Other Issues Related to Network Management, 268

9.6.1 Naming, 269

9.6.2 Localization, 269

9.7 Conclusion, 270

References, 270

10 Operating Systems for Wireless Sensor Networks 273

10.1 Introduction, 273

10.2 Operating System Design Issues, 274

10.3 Examples of Operating Systems, 276

10.3.1 TinyOS, 276

10.3.2 Mate, 277

10.3.3 MagnetOS, 278

10.3.4 MANTIS, 278

10.3.5 OSPM, 279

10.3.6 EYES OS, 279

10.3.7 SenOS, 280

10.3.8 EMERALDS, 280

10.3.9 PicOS, 281

10.4 Conclusion, 281

References, 281

11 Performance and Traffic Management 283

11.1 Introduction, 283

11.2 Background, 283

11.3 WSN Design Issues, 286

11.3.1 MAC Protocols, 286

11.3.2 Routing Protocols, 286

11.3.3 Transport Protocols, 287

11.4 Performance Modeling of WSNs, 288

11.4.1 Performance Metrics, 288

11.4.2 Basic Models, 289

11.4.3 Network Models, 292

11.5 Case Study: Simple Computation of the System Life Span, 294

11.5.1 Analysis, 296

11.5.2 Discussion, 298

11.6 Conclusion, 300

References, 300

Index 303

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted February 16, 2009

    Very Good Book

    This is one of the most comprehensive and interesting books I have read on this topic

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)