| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910827010803321 |
|
|
Titolo |
M2M communications : a systems approach / / editors, David Boswarthick, Omar Elloumi, Olivier Hersent |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chichester, West Sussex, U.K. : , : Wiley, , 2012 |
|
[Piscataqay, New Jersey] : , : IEEE Xplore, , [2012] |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-280-58851-9 |
9786613618344 |
1-119-97403-8 |
1-119-97404-6 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (334 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
BoswarthickDavid |
ElloumiOmar |
HersentOlivier |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Machine-to-machine communications |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Foreword -- List of Contributors -- List of Acronyms -- 1 Introduction to M2M -- 1.1 What is M2M? -- 1.2 The Business of M2M -- 1.3 Accelerating M2M Maturity -- 1.3.1 High-Level M2M Frameworks -- 1.3.2 Policy and Government Incentives -- 1.4 M2M Standards -- 1.4.1 Which Standards for M2M? -- 1.5 Roadmap of the Book -- References -- Part I M2M CURRENT LANDSCAPE -- 2 The Business of M2M -- 2.1 The M2M Market -- 2.1.1 Healthcare -- 2.1.2 Transportation -- 2.1.3 Energy -- 2.2 The M2M Market Adoption: Drivers and Barriers -- 2.3 The M2M Value Chain -- 2.4 Market Size Projections -- 2.5 Business Models -- 2.5.1 Network Operator- or CSP-Led Model -- 2.5.2 MVNO-Led Model -- 2.5.3 Corporate Customer-Led Model -- 2.6 M2M Business Metrics -- 2.7 Market Evolution -- Reference -- 3 Lessons Learned from Early M2M Deployments -- 3.1 Introduction -- 3.2 Early M2M Operational Deployments -- 3.2.1 Introduction -- 3.2.2 Early M2M Operational Deployment Examples -- 3.2.3 Common Questions in Early M2M Deployments -- 3.2.4 Possible Optimization of M2M Deployments -- 3.3 Chapter Conclusion -- Reference -- Part II M2M |
|
|
|
|
|
|
|
|
|
ARCHITECTURE AND PROTOCOLS -- 4 M2M Requirements and High-Level Architectural Principles -- 4.1 Introduction -- 4.2 Use-Case-Driven Approach to M2M Requirements -- 4.2.1 What is a Use Case? -- 4.2.2 ETSI M2M Work on Use Cases -- 4.2.3 Methodology for Developing Use Cases -- 4.3 Smart Metering Approach in ETSI M2M -- 4.3.1 Introduction -- 4.3.2 Typical Smart Metering Deployment Scenario -- 4.4 eHealth Approach in ETSI M2M -- 4.4.1 Introduction -- 4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments -- 4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design -- 4.6.1 Why Focus on Wireless Networks? -- 4.7 Description of M2M Market Segments/Applications -- 4.7.1 Automotive -- 4.7.2 Smart Telemetry -- 4.7.3 Surveillance and Security -- 4.7.4 Point of Sale (PoS) -- 4.7.5 Vending Machines. |
4.7.6 eHealth -- 4.7.7 Live Video -- 4.7.8 Building Automation -- 4.7.9 M2M Industrial Automation -- 4.8 M2M Traffic Characterization -- 4.8.1 Detailed Traffic Characterization for Smart Metering -- 4.8.2 Global Traffic Characterization -- 4.9 High-Level Architecture Principles for M2M Communications -- 4.10 Chapter Conclusions -- References -- 5 ETSI M2M Services Architecture -- 5.1 Introduction -- 5.2 High-Level System Architecture -- 5.3 ETSI TC M2M Service Capabilities Framework -- 5.4 ETSI TC M2M Release 1 Scenarios -- 5.5 ETSI M2M Service Capabilities -- 5.5.1 Reachability, Addressing, and Repository Capability (xRAR) -- 5.5.2 Remote Entity Management Capability (x REM) -- 5.5.3 Security Capability (xSEC) -- 5.6 Introducing REST Architectural Style for M2M -- 5.6.1 Introduction to REST -- 5.6.2 Why REST for M2M? -- 5.6.3 REST Basics -- 5.6.4 Applying REST to M2M -- 5.6.5 Additional Functionalities -- 5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures -- 5.7.1 Introduction -- 5.7.2 Definitions Used in this Section -- 5.7.3 Resource Structure -- 5.7.4 Interface Procedures -- 5.8 Chapter Conclusion -- References -- 6 M2M Optimizations in Public Mobile Networks -- 6.1 Chapter Overview -- 6.2 M2M over a Telecommunications Network -- 6.2.1 Introduction -- 6.2.2 M2M Communication Scenarios -- 6.2.3 Mobile or Fixed Networks -- 6.2.4 Data Connections for M2M Applications -- 6.3 Network Optimizations for M2M -- 6.3.1 Introduction -- 6.3.2 3GPP Standardization of Network Improvements for Machine Type Communications -- 6.3.3 Cost Reduction -- 6.3.4 M2M Value-Added Services -- 6.3.5 Numbering, Identifiers, and Addressing -- 6.3.6 Triggering Optimizations -- 6.3.7 Overload and Congestion Control -- References -- 7 The Role of IP in M2M -- 7.1 Introduction -- 7.1.1 IPv6 in Brief -- 7.1.2 Neighbor Discovery Protocol -- 7.2 IPv6 for M2M -- 7.3 6LoWPAN -- 7.3.1 Framework -- 7.3.2 Header Compression -- 7.3.3 Neighbor Discovery -- 7.4 Routing Protocol for Low-Power and Lossy Networks (RPL). |
7.4.1 RPL Topology -- 7.5 CoRE -- 7.5.1 Message Formats -- 7.5.2 Transport Protocol -- 7.5.3 REST Architecture -- References -- 8 M2M Security -- 8.1 Introduction -- 8.1.1 Security Characteristics of Cellular M2M -- 8.2 Trust Relationships in the M2M Ecosystem -- 8.3 Security Requirements -- 8.3.1 Customer/M2M Device User -- 8.3.2 Access Network Provider -- 8.3.3 M2M Service Provider -- 8.3.4 Application Provider -- 8.3.5 Bootstrapping Requirements -- 8.4 Which Types of Solutions are Suitable? -- 8.4.1 Approaches Against Hijacking -- 8.4.2 Public Key Solutions -- 8.4.3 Smart Card-Based Solutions -- 8.4.4 Methods Based on Pre-Provisioned Symmetric Keys -- 8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based Encryption -- 8.4.6 Security for Groups of M2M Devices -- 8.5 Standardization Efforts on Securing M2M and MTC Communications -- 8.5.1 ETSI M2M Security |
|
|
|
|
|
|
|
|
|
-- 8.5.2 3GPP Security Related to Network Improvements for Machine Type Communications -- References -- 9 M2M Terminals and Modules -- 9.1 M2M Module Categorization -- 9.1.1 Access Technology -- 9.1.2 Physical Form Factors -- 9.2 Hardware Interfaces -- 9.2.1 Power Interface -- 9.2.2 USB (Universal Serial Bus) Interface -- 9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface -- 9.2.4 Antenna Interface -- 9.2.5 UICC (Universal Integrated Circuit Card) Interface -- 9.2.6 GPIO (General-Purpose Input/Output Port) Interface -- 9.2.7 SPI (Serial Peripheral Interface) Interface -- 9.2.8 I2C (Inter-Integrated Circuit Bus) Interface -- 9.2.9 ADC (Analog-to-Digital Converter) Interface -- 9.2.10 PCM (Pulse Code Modulation) Interface -- 9.2.11 PWM (Pulse Width Modulation) Interface -- 9.2.12 Analog Audio Interface -- 9.3 Temperature and Durability -- 9.4 Services -- 9.4.1 Application Execution Environment -- 9.4.2 Connectivity Services -- 9.4.3 Management Services -- 9.4.4 Application Services -- 9.5 Software Interface -- 9.5.1 AT Commands -- 9.5.2 SDK Interface -- 9.6 Cellular Certification -- 9.6.1 Telecom Industry Certification. |
9.6.2 MNO Certification -- 10 Smart Cards in M2M Communication -- 10.1 Introduction -- 10.2 Security and Privacy Issues in M2M Communication -- 10.3 The Grounds for Hardware-Based Security Solutions -- 10.4 Independent Secure Elements and Trusted Environments -- 10.4.1 Trusted Environments in M2M Devices -- 10.4.2 Trusting Unknown Devices: The Need for Security Certification -- 10.4.3 Advantages of the Smart Card Model -- 10.5 Specific Smart Card Properties for M2M Environments -- 10.5.1 Removable Smart Cards versus Embedded Secure Elements -- 10.5.2 UICC Resistance to Environmental Constraints -- 10.5.3 Adapting the Card Application Toolkit to Unattended Devices -- 10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands -- 10.5.5 Confidential Remote Management of Third-Party Applications -- 10.6 Smart Card Future Evolutions in M2M Environments -- 10.6.1 UICC-Based M2M Service Identity Module Application -- 10.6.2 Internet Protocol Integration of the UICC -- 10.7 Remote Administration of M2M Secure Elements -- 10.7.1 Overview -- 10.7.2 Late Personalization of Subscription -- 10.7.3 Remote Management of Subscriptions on the Field -- References -- Part III BOOK CONCLUSIONS AND FUTURE VISION -- 11 Conclusions -- Index. |
|
|
|
|
|
|
Sommario/riassunto |
|
A comprehensive introduction to M2M Standards and systems architecture, from concept to implementation Focusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic. It provides a systems perspective on machine-to-machine services and the major telecommunications relevant technologies. It provides a focus on the latest standards currently in progress by ETSI and 3GPP, the leading standards entities in telecommunication networks and solutions. The structure of the book is inspired by ongoing standards developments and uses a systems-based approach for describing the problems which may be encountered when considering M2M, as well as offering proposed solutions from the latest developments in industry and standardization. The authors provide comprehensive technical information on M2M architecture, protocols and applications, especially examining M2M service architecture, access and core network optimizations, and M2M area networks technologies. It also considers dominant M2M application domains such as Smart Metering, Smart Grid, and eHealth. Aimed as an advanced introduction to this complex technical field, the book will provide an essential end-to-end overview of M2M for professionals working in the industry and advanced students. Key features: . First |
|
|
|
|
|
|
|
|
|
|
|
|
|
technical book emerging from a standards perspective to respond to this highly specific technology/business segment . Covers the main challenges facing the M2M industry today, and proposes early roll-out scenarios and potential optimization solutions . Examines the system level architecture and clearly defines the methodology and interfaces to be considered . Includes important information presented in a logical manner essential for any engineer or business manager involved in the field of M2M and Internet of Things . Provides a cross-over between vertical and horizontal M2M concepts and a possible evolution path between the two . Written by experts involved at the cutting edge of M2M developments. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910495228803321 |
|
|
Titolo |
Epitranscriptomics / / edited by Stefan Jurga, Jan Barciszewski |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2021.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 632 p. 90 illus., 84 illus. in color.) |
|
|
|
|
|
|
Collana |
|
RNA Technologies, , 2197-9758 ; ; 12 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Epigenetics |
RNA - Metabolism |
Biochemistry |
Bioinformatics |
RNA Metabolism |
Biological Chemistry |
Transcripció genètica |
Epigenètica |
Llibres electrònics |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Epitranscriptomic Modifications and How to Find them -- Epitranscriptomic Signature in Neural Development and Disease -- The |
|
|
|
|
|
|
|
|
|
|
|
Emerging Neuroepitranscriptome -- Epitranscriptomics and Diseases -- Epitranscriptomic Marks and Systems Involved in Gene Regulation, Development and Disease -- Experimental Approaches and Computational Workflows for Systematic Mapping and Functional Interpretation of RNA Modifications -- RNA Modifications: The Mediator Between Cellular Stresses and Biological Effects -- Computational Prediction and Experimental Validation of Specific Modified RNA Sites -- Regulation of RNA Stability Utilizing RNA Modification -- Dynamic RNA Modification Upon Extracellular Stimulus -- RNA Methylation in Cancer -- Regulation of RNA Methylation yy TET Enzymes -- RNA N6-Methyladenosine and G-Quadruplex Structures in Bacteria -- RNA N6-Methyladenosine Chemical Modification as a Therapeutic Target -- Cap-Adjacent m6Am and its Effects On mRNA -- N6-Methyladenosine in The Heart -- The m6a RNA Methylation Regulates Oncogenic Signaling Pathways Driving Cell Transformation and Carcinogenesis -- Psivar: A Database of Functional Variants Involved in Pseudouridylation (Ψ) with Implications for Disease Pathogenesis -- C-to-U RNA Editing by Mammalian APOBEC Enzymes -- The Powerful Mechanism of RNA Editing and its Therapeutic Potentials -- Noncanonical Caps in RNA -- Mass Spectrometry-Based Methods for Characterization of Hypomodifications in tRNA -- Dynamic mRNA Modifications in Plants -- The Mammalian Mitochondrial Epitranscriptome -- Epitranscriptomics Modifications of Micrornas: Classes, Detection, Impact on their Functionality and Next Frontiers -- “Look Before You Leap” when Editing the Introns, or the Secrets Behind the Intronic Post-Transcriptional Modification -- Functional Links Between the Internal N6-Methyl Adenosine Modifications in mRNAs and Human Diseases -- RNA Modifications in Neurodevelopment and Neurodegenerations -- Conventional and Advanced Techniques for Methyl-6-Adenosine Modification Mapping in Transcripts -- Mechanisms and Therapeutic Applications of RNA-Guided RNA Pseudouridylation -- Epitranscriptomic Modifications in lnRNA and miRNA in Cancer and Other Diseases -- RNA m6A and Adipogenesis. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book reviews a novel and exciting field of cellular and molecular biology called epitranscriptomics, which focuses on changes in an organism’s cells resulting from the posttranscriptional modification of cellular RNA. RNA-binding proteins (RBPs) play a crucial role in these posttranscriptional modifications and also support several cellular processes necessary for maintaining RNA homeostasis. Exploring the mechanisms underlying RNA modifications and RBP function is an emerging area of biomedical research, taking the study of gene regulation a step beyond epigenetics. This book reveals that the RNA molecule is not just an information-carrying molecule with some secondary structures. Accordingly, how RNA is modified, regulated, packaged, and controlled is an important aspect. Leading experts address questions such as where the over 170 distinct posttranscriptional RNA modifications are located on the genome, what percentage of mRNAs and noncoding RNAs these modifications include, and how an RNA modification impacts a person’s biology. In closing, the book reviews the role of RNA modifications and RBPs in a variety of diseases and their pathogenesis. Addressing some of the most exciting challenges in epitranscriptomics, this book provides a valuable and engaging resource for researchers in academia and industry studying the phenomena of RNA modification. |
|
|
|
|
|
|
|
| |