AccueilGroupesDiscussionsPlusTendances
Site de recherche
Ce site utilise des cookies pour fournir nos services, optimiser les performances, pour les analyses, et (si vous n'êtes pas connecté) pour les publicités. En utilisant Librarything, vous reconnaissez avoir lu et compris nos conditions générales d'utilisation et de services. Votre utilisation du site et de ses services vaut acceptation de ces conditions et termes.

Résultats trouvés sur Google Books

Cliquer sur une vignette pour aller sur Google Books.

Resource, Mobility, and Security Management…
Chargement...

Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications (édition 2006)

MembresCritiquesPopularitéÉvaluation moyenneDiscussions
3Aucun4,128,298AucunAucun
Organized into three parts, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications examines the inherent constraint of limited bandwidth and unreliable time-varying physical link in the wireless system, discusses the demand to realize the service continuity in the single-hop or multi-hop wireless networks, and explores trusted communication in mobile computing scenarios. Focusing on the background, technique survey, protocol design, and analytical methods, the book discusses standards in 802.11x/3G/4G, HotSpot Wireless, Bluetooth sensor networks, and access control in wireless Ad Hoc networks. Other topics include call admission control (CAC), routing, multicast, medium access control (MAC), scheduling, bandwidth adaptation, handoff management, location management, network mobility, secure routing, key management, authentication, security, privacy, and performance simulation and analysis. This book is a comprehensive source of information on basic concepts, major issues, design approaches, future research directions, and the interaction between these components. With its broad coverage allowing for easy cross reference, the book also provides detailed techniques for eliminating bandwidth insufficiency, increasing location management performance, and decreasing the associated authentication traffic. Features: Offers competitive, self-contained information on resource, mobility, and security management in wireless networks Explains the interaction and coupling among the most important components in wireless networks Examines background, applications, and standard protocols Addresses challenges and solutions in key management of wireless sensor networks Covers how to provide effective and efficient authentication and key agreements for cellular access security… (plus d'informations)
Membre:PauloMimoso
Titre:Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications
Auteurs:
Info:AUERBACH (2006), Hardcover, 618 pages
Collections:Votre bibliothèque
Évaluation:
Mots-clés:Aucun

Information sur l'oeuvre

Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications par Yan Zhang

Récemment ajouté parbrent_williams, PauloMimoso
Aucun
Chargement...

Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre

Actuellement, il n'y a pas de discussions au sujet de ce livre.

Aucune critique
aucune critique | ajouter une critique

» Ajouter d'autres auteur(e)s

Nom de l'auteurRôleType d'auteurŒuvre ?Statut
Yan Zhangauteur principaltoutes les éditionscalculé
Hu, Honglinauteur secondairetoutes les éditionsconfirmé
Vous devez vous identifier pour modifier le Partage des connaissances.
Pour plus d'aide, voir la page Aide sur le Partage des connaissances [en anglais].
Titre canonique
Titre original
Titres alternatifs
Date de première publication
Personnes ou personnages
Lieux importants
Évènements importants
Films connexes
Épigraphe
Dédicace
Premiers mots
Citations
Derniers mots
Notice de désambigüisation
Directeur de publication
Courtes éloges de critiques
Langue d'origine
DDC/MDS canonique
LCC canonique

Références à cette œuvre sur des ressources externes.

Wikipédia en anglais

Aucun

Organized into three parts, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications examines the inherent constraint of limited bandwidth and unreliable time-varying physical link in the wireless system, discusses the demand to realize the service continuity in the single-hop or multi-hop wireless networks, and explores trusted communication in mobile computing scenarios. Focusing on the background, technique survey, protocol design, and analytical methods, the book discusses standards in 802.11x/3G/4G, HotSpot Wireless, Bluetooth sensor networks, and access control in wireless Ad Hoc networks. Other topics include call admission control (CAC), routing, multicast, medium access control (MAC), scheduling, bandwidth adaptation, handoff management, location management, network mobility, secure routing, key management, authentication, security, privacy, and performance simulation and analysis. This book is a comprehensive source of information on basic concepts, major issues, design approaches, future research directions, and the interaction between these components. With its broad coverage allowing for easy cross reference, the book also provides detailed techniques for eliminating bandwidth insufficiency, increasing location management performance, and decreasing the associated authentication traffic. Features: Offers competitive, self-contained information on resource, mobility, and security management in wireless networks Explains the interaction and coupling among the most important components in wireless networks Examines background, applications, and standard protocols Addresses challenges and solutions in key management of wireless sensor networks Covers how to provide effective and efficient authentication and key agreements for cellular access security

Aucune description trouvée dans une bibliothèque

Description du livre
Résumé sous forme de haïku

Discussion en cours

Aucun

Couvertures populaires

Vos raccourcis

Évaluation

Moyenne: Pas d'évaluation.

Est-ce vous ?

Devenez un(e) auteur LibraryThing.

 

À propos | Contact | LibraryThing.com | Respect de la vie privée et règles d'utilisation | Aide/FAQ | Blog | Boutique | APIs | TinyCat | Bibliothèques historiques | Critiques en avant-première | Partage des connaissances | 205,092,086 livres! | Barre supérieure: Toujours visible