Communicating Embedded Systems Networks Applications

Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in el...

Descripción completa

Detalles Bibliográficos
Autor principal: Krief, Francine (-)
Otros Autores: Krief, Francine, editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Somerset : Wiley 2013.
Edición:1st edition
Colección:Iste
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628898506719
Tabla de Contenidos:
  • ""Title Page""; ""Copyright""; ""General Introduction""; ""Chapter 1: Introduction to Embedded Systems""; ""1.1. Introduction""; ""1.2. Embedded system: a definition""; ""1.3. Properties of an embedded system""; ""1.4. The significance of Moore's Law""; ""1.5. Embedded systems and the system on silicon""; ""1.6. Embedded systems and communications""; ""1.7. Embedded systems and security""; ""1.8. Embedded systems and time constraints""; ""1.9. Embedded systems and free software""; ""1.10. Embedded systems and their design""; ""1.11. An example of multimedia embedded system design""
  • ""1.12. Conclusion""""1.13. Bibliography""; ""Chapter 2: Quality-of-Service Routing in Mobile Ad Hoc Networks""; ""2.1. Introduction""; ""2.2. Mobile ad hoc networks: concepts, characteristics, challenges""; ""2.3. QoS routing: general considerations""; ""2.4. Best-effort routing protocols in MANETs""; ""2.5. QoS routing in MANETs""; ""2.6. Conclusion""; ""2.7. Bibliography""; ""Chapter 3: Self-Management of Ad Hoc Sensor Networks""; ""3.1. Introduction""; ""3.2. Wireless sensor networks""; ""3.3. Autonomic sensor networks""; ""3.4. An example of self-configuration""; ""3.5. Conclusion""
  • ""3.6. Bibliography""""Chapter 4: RFID Technology""; ""4.1. Introduction""; ""4.2. Automatic identification systems""; ""4.3. The components of an RFID system""; ""4.4. The different types of RFID systems""; ""4.5. RF ranges""; ""4.6. Information security""; ""4.7. Standards in force""; ""4.8. Examples of implementations""; ""4.9. Conclusion""; ""4.10. Bibliography""; ""Chapter 5: Hardware Security in Embedded Systems""; ""5.1. Introduction""; ""5.2. Embedded systems and their security issues""; ""5.3. Security of the system and its data""
  • ""5.4. Secured hardware architectures for embedded systems""""5.5. Conclusion""; ""5.6. Bibliography""; ""Chapter 6: Communications Security in Embedded Systems""; ""6.1. Introduction""; ""6.2. Communications security""; ""6.3. Communications security in embedded systems""; ""6.4. Conclusion""; ""6.5. Bibliography""; ""Chapter 7: Cross-Layer Adaptation for Multimedia Services in 802.11-Type Embedded Communications Systems""; ""7.1. Introduction""; ""7.2. Limits of layered structuring""; ""7.3. The XL concept""; ""7.4. Conclusion""; ""7.5. Bibliography""
  • ""Chapter 8: Relevance of the DTN Architecture to Mobile Ad Hoc Networks""""8.1. Introduction""; ""8.2. Mobile ad hoc networks""; ""8.3. Challenged networks""; ""8.4. Delay-tolerant networks""; ""8.5. Relevance of DTNs to ad hoc mobile networks""; ""8.6. Conclusion""; ""8.7. Bibliography""; ""Chapter 9: Intelligent Interfaces and Mobile Communications""; ""9.1. Introduction""; ""9.2. Assisting the user with access to new internet services""; ""9.3. Modeling user behavior""; ""9.4. Synthesis of mobile and wireless networks""
  • ""9.5. References for intelligent interfaces for access to mobile networks""