top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2003 NASA/DoD Conference on Evolvable Hardware : proceedings : 9-11 July, 2003, Chicago, Illinois, USA
2003 NASA/DoD Conference on Evolvable Hardware : proceedings : 9-11 July, 2003, Chicago, Illinois, USA
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2003
Disciplina 621.39/8
Soggetto topico Computer input-output equipment - Design and construction
Computers - Circuits
Evolutionary programming (Computer science)
Genetic algorithms
Electrical & Computer Engineering
Engineering & Applied Sciences
Electrical Engineering
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996210894703316
[Place of publication not identified], : IEEE Computer Society, 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2003 NASA/DoD Conference on Evolvable Hardware : proceedings : 9-11 July, 2003, Chicago, Illinois, USA
2003 NASA/DoD Conference on Evolvable Hardware : proceedings : 9-11 July, 2003, Chicago, Illinois, USA
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2003
Disciplina 621.39/8
Soggetto topico Computer input-output equipment - Design and construction
Computers - Circuits
Evolutionary programming (Computer science)
Genetic algorithms
Electrical & Computer Engineering
Engineering & Applied Sciences
Electrical Engineering
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910872553803321
[Place of publication not identified], : IEEE Computer Society, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2005 NASA/DoD Conference on Evolvable Hardware : (EH-2005) : proceedings : June 29-July 1, 2005, Washington, D.C
2005 NASA/DoD Conference on Evolvable Hardware : (EH-2005) : proceedings : June 29-July 1, 2005, Washington, D.C
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2005
Disciplina 621.39/8
Soggetto topico Computer input-output equipment - Design and construction
Computers - Circuits
Evolutionary programming (Computer science)
Genetic algorithms
Electrical & Computer Engineering
Engineering & Applied Sciences
Electrical Engineering
ISBN 1-5386-0078-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996202409503316
[Place of publication not identified], : IEEE Computer Society, 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2005 NASA/DoD Conference on Evolvable Hardware : (EH-2005) : proceedings : June 29-July 1, 2005, Washington, D.C
2005 NASA/DoD Conference on Evolvable Hardware : (EH-2005) : proceedings : June 29-July 1, 2005, Washington, D.C
Pubbl/distr/stampa [Place of publication not identified], : IEEE Computer Society, 2005
Disciplina 621.39/8
Soggetto topico Computer input-output equipment - Design and construction
Computers - Circuits
Evolutionary programming (Computer science)
Genetic algorithms
Electrical & Computer Engineering
Engineering & Applied Sciences
Electrical Engineering
ISBN 9781538600788
1538600781
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910146534303321
[Place of publication not identified], : IEEE Computer Society, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Digital communications with emphasis on data modems : theory, analysis, design, simulation, testing, and applications / / Richard W. Middlestead
Digital communications with emphasis on data modems : theory, analysis, design, simulation, testing, and applications / / Richard W. Middlestead
Autore Middlestead Richard W.
Pubbl/distr/stampa Hoboken : , : Wiley, , 2015
Descrizione fisica 1 online resource (827 pages) : illustrations, tables
Disciplina 621.39/8
Soggetto topico Digital modulation
Digital communications
Data transmission systems
ISBN 1-119-01185-X
1-119-01184-1
1-119-01186-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Preface xxi / /Acknowledgments xxv / /Summary of Notations xxvii / /About the Cover xxix / /About the Companion Website xxxi / /1 Mathematical Background and Analysis Techniques 1 / /1.1 Introduction 1 / /1.2 The Fourier Transform and Fourier Series 5 / /1.3 Pulse Distortion with Ideal Filter Models 16 / /1.4 Correlation Processing 19 / /1.5 Random Variables and Probability 20 / /1.6 Random Processes 41 / /1.7 The Matched Filter 44 / /1.8 The Likelihood and Log-Likelihood Ratios 46 / /1.9 Parameter Estimation 47 / /1.10 Modem Configurations and Automatic Repeat Request 55 / /1.11 Windows 57 / /1.12 Matrices Vectors and Related Operations 66 / /1.13 Often Used Mathematical Procedures 70 / /1.14 Often Used Mathematical Relationships 71 / /2 Digital Signal Processing and Modem Design Considerations 81 / /2.1 Introduction 81 / /2.2 Discrete Amplitude Sampling 81 / /2.3 Discrete-Time Sampling 87 / /2.4 Signal Reconstruction Following Discrete-Time Sampling 91 / /2.5 Baseband Sampling 92 / /2.6 Bandpass Sampling 92 / /2.7 Corrections for Nonideal Modulators and Demodulators 99 / /2.8 Multirate Signal Processing and Interpolation 106 / /Appendix 2A Amplitude Quantization Function Subprogram 121 / /Appendix 2B Hilbert Transform Parameters 122 / /Appendix 2C Derivation of Parabolic Interpolation Error 126 / /3 Digital Communications 133 / /3.1 Introduction 133 / /3.2 Digital Data Modulation and Optimum Demodulation Criteria 135 / /3.3 Information and Channel Capacity 139 / /3.4 Bit-Error Probability Bound on Memoryless Channel 148 / /3.5 Probability Integral and the Error Function 150 / /4 Phase Shift Keying (PSK) Modulation Demodulation and Performance 153 / /4.1 Introduction 153 / /4.2 Constant Envelope Phase-Modulated Waveforms 154 / /4.3 Non-Constant Envelope Phase-Modulated Waveforms 175 / /4.4 Phase-Modulated Waveform Spectrums and Performance 178 / /5 Frequency Shift Keying (FSK) Modulation Demodulation and Performance 207 / /5.1 Introduction 207 / /5.2 Coherent Detection of BFSK - Known Frequency and Phase 207 / /5.3 Noncoherent Detection of BFSK - Known Frequency and Unknown Phase 210 / /5.4 Case Studies: Coherent and Noncoherent BFSK Performance Simulation 211 / /5.5 Noncoherent Detection of BFSK - Unknown Frequency and Phase 214 / /5.6 BFSK Spectral Density with Arbitrary Modulation Index 219 / /6 Amplitude Shift Keying Modulation Demodulation and Performance 227 / /6.1 Introduction 227 / /6.2 Amplitude Shift Keying (ASK) 227 / /6.3 Quadrature Amplitude Modulation (QAM) 234 / /6.4 Alternate QAM Waveform Constellations 236 / /6.5 Case Study: 16-ary QAM Performance Evaluation 236 / /6.6 Partial Response Modulation 237 / /7 M-ary Coded Modulation 251 / /7.1 Introduction 251 / /7.2 Coherent Detection of Orthogonal Coded Waveforms 252 / /7.3 Noncoherent Detection of M-ary Orthogonal Waveforms 253 / /7.4 Coherent Detection of M-ary Biorthogonal Waveforms 256 / /8 Coding for Improved Communications 261 / /8.1 Introduction 261 / /8.2 Pulse Code Modulation 261 / /8.3 Gray Coding 268 / /8.4 Differential Coding 269 / /8.5 Pseudo-Random Noise Sequences 270 / /8.6 Binary Cyclic Codes 273 / /8.7 Cyclic Redundancy Check Codes 274 / /8.8 Data Randomizing Codes 276 / /8.9 Data Interleaving 277 / /8.10 Wagner Coding and Decoding 279 / /8.11 Convolutional Codes 283 / /8.12 Turbo and Turbo-Like Codes 299 / /8.13 LDPC Code and TPC 313 / /8.14 Bose-Chaudhuri-Hocquenghem Codes 315 / /Appendix 8A 328 / /Appendix 8B 329 / /9 Forward Error Correction Coding Without Bandwidth Expansion 339 / /9.1 Introduction 339 / /9.2 Multi-h M-ary CPM 340 / /9.3 Case Study: 2-h 4-ary 1REC CPM 350 / /9.4 Multiphase Shift Keying Trellis-Coded Modulation 362 / /9.5 Case Study: Four-State 8PSK-TCM Performance Over Satellite Repeater 367 / /10 Carrier Acquisition and Tracking 375 / /10.1 Introduction 375 / /10.2 Bandpass Limiter 377 / /10.3 Baseband Phaselock Loop Implementation 378 / /10.4 Phase-Error Generation 378 / /10.5 First-Order Phaselock Loop 380 / /10.6 Second-Order Phaselock Loop 380 / /10.7 Third-Order Phaselock Loop 390 / /10.8 Optimum Phase Tracking Algorithms 396 / /10.9 Squaring Loss Evaluation 406 / /10.10 Case Study: BPSK and QPSK Phaselock Loop Performance 408 / /10.11 Case Study: BPSK Phase Tracking Performance of a Disadvantaged Transmit Terminal 410 / /11 Waveform Acquisition 413 / /11.1 Introduction 413 / /11.2 CW Preamble Segment Signal Processing 416 / /11.3 Symbol Synchronization Preamble Segment 432 / /11.4 Start-of-Message (SOM) Preamble segment 452 / /11.5 Signal-to-Noise Ratio Estimation 452 / /12 Adaptive Systems 463 / /12.1 Introduction 463 / /12.2 Optimum Filtering - Wiener's Solution 464 / /12.3 Finite Impulse Response-Adaptive Filter Estimation 465 / /12.4 Intersymbol Interference and Multipath Equalization 469 / /12.5 Interference and Noise Cancellation 472 / /12.6 Recursive Least Square (RLS) Equalizer 473 / /12.7 Case Study: LMS Linear Feedforward Equalization 474 / /12.8 Case Study: Narrowband Interference Cancellation 474 / /12.9 Case Study: Recursive Least Squares Processing 480 / /13 Spread-Spectrum Communications 485 / /13.1 Introduction 485 / /13.2 Spread-Spectrum Waveforms and Spectrums 487 / /13.3 Jammer and Interceptor Encounters 499 / /13.4 Communication Interceptors 502 / /13.5 Bit-Error Performance of DSSS Waveforms with Jamming 504 / /13.6 Performance of MFSK with Partial-Band Noise Jamming 512 / /13.7 Performance of DCMPSK with Partial-Band Noise Jamming 514 / /13.8 FHSS Waveforms with Multitone Jamming 515 / /13.9 Approximate Performance with Jammer Threats 521 / /13.10 Case Study: Terrestrial Jammer Encounter and Link-Standoff Ratio 522 / /14 Modem Testing Modeling and Simulation 531 / /14.1 Introduction 531 / /14.2 Statistical Sampling 532 / /14.3 Computer Generation of Random Variables 539 / /14.4 Baseband Waveform Description 545 / /14.5 Sampled Waveform Characterization 547 / /14.6 Case Study: BPSK Monte Carlo Simulation 548 / /14.7 System Performance Evaluation Using Quadrature Integration 550 / /14.8 Case Study: BPSK Bit-Error Evaluation with PLL Tracking 551 / /14.9 Case Study: QPSK Bit-Error Evaluation with PLL Tracking 553 / /15 Communication Range Equation and Link Analysis 557 / /15.1 Introduction 557 / /15.2 Receiver and System Noise Figures and Temperatures 560 / /15.3 Antenna Gain and Patterns 568 / /15.4 Rain Loss 571 / /15.5 Electric Field Wave Polarization 573 / /15.6 Phase-Noise Loss 578 / /15.7 Scintillation Loss 583 / /15.8 Multipath Loss 583 / /15.9 Interface Mismatch Loss 584 / /15.10 Miscellaneous System Losses 585 / /15.11 Nonlinear Power Amplifier Analysis and Simulation 585 / /15.12 Computer Modeling of TWTA and SSPA Nonlinearities 588 / /15.13 Establishing Signal Levels for Simulation Modeling 590 / /15.14 Case Study: Performance Simulation of SRRC-QPSK with SSPA Nonlinearity 592 / /15.15 Link Budget Analysis 596 / /16 Satellite Orbits 603 / /16.1 Introduction 603 / /16.2 Satellite Orbits 606 / /16.3 Earth Stations 607 / /16.4 Path Loss Doppler and Doppler-rate 609 / /16.5 Satellite Viewing 609 / /16.6 Satellite Orbit Selection 610 / /16.7 Satellite Orbit Position Estimation From Parameter Measurements 611 / /16.8 Case Study: Example Satellite Encounters 612 / /17 Communications Through Bandlimited Time-Invariant Linear Channels 617 / /17.1 Introduction 617 / /17.2 Inphase and Quadrature Channel Response 618 / /17.3 Inphase and Quadrature Channel Response to Arbitrary Signal 619 / /17.4 Pulse Modulated Carrier Signal Characteristics 621 / /17.5 Channel Response to a Pulsed Modulated Waveform 622 / /17.6 Example Performance Simulations 623 / /17.7 Example of Channel Amplitude and Phase Responses 624 / /17.8 Example Channel Amplitude Phase and Delay Functions 627 / /18 Communications in Fading Environments 633 / /18.1 Introduction 633 / /18.2 Ricean Fading Channels 634 / /18.3 Ricean Cumulative Distribution 635 / /18.4 Application of Ricean Channel Model 635 / /18.5 Performance of Several Binary Modulation
Waveforms with Ricean Fading 636 / /18.6 Generation of Ricean Random Variables 639 / /18.7 Relationships Between Fading Channel Parameters 641 / /18.8 Diversity Techniques for Fading Channels 643 / /19 Atmospheric Propagation 649 / /19.1 Introduction 649 / /19.2 Communication Link Geometry for Curved Earth 650 / /19.3 Reflection 652 / /19.4 Case Study: LEO Satellite Multipath Propagation 654 / /19.5 Refraction 656 / /19.6 Diffraction 660 / /19.7 Longley-Rice Propagation Loss Model 661 / /19.8 Urban Suburban and Rural Environment Propagation Loss Models 663 / /19.9 Land Mobile Satellite Propagation Loss Models 665 / /19.10 Impulsive Noise Channel 667 / /19.11 Ocean Wind Wave Channel 676 / /19.12 Laser Communications Using Photomultiplier Detector 684 / /20 Ionospheric Propagation 699 / /20.1 Introduction 699 / /20.2 Electron Densities: Natural Environment 700 / /20.3 Electron Densities: Nuclear-Disturbed Environment 703 / /20.4 The Refractive Index and Signal Propagation 704 / /20.5 Signal Propagation in Severe Scintillation Environment 706 / /20.6 Propagation Disturbances Following Severe Absorption 712 / /20.7 Rayleigh Scintillation Channel Model 715 / /20.8 Scintillation Mitigation Techniques 721 / /20.9 Case Study: BPSK and DCBPSK Performance in Rayleigh Fading Channel 722 / /Appendix 20A 727 / /Appendix A: Classical Filters and Applications 733 / /Appendix B: Digital Filter Design and Applications 747 / /Appendix C: Detection of Signals in Noise 755 / /Index 769.
Record Nr. UNINA-9910271051103321
Middlestead Richard W.  
Hoboken : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of serial communications interfaces : a comprehensive compendium of serial digital input/output (I/O) standards / / Louis E. Frenzel Jr
Handbook of serial communications interfaces : a comprehensive compendium of serial digital input/output (I/O) standards / / Louis E. Frenzel Jr
Autore Frenzel Louis E., Jr.
Edizione [1st edition]
Pubbl/distr/stampa Oxford, UK : , : Elsevier Science, , [2016]
Descrizione fisica 1 online resource (338 p.)
Disciplina 621.39/8
Soggetto topico Serial communications
ISBN 0-12-800671-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Handbook of Serial Communications Interfaces; Copyright Page; Contents; Preface; 1. Introduction to Serial I/O Communications; Rationale; Approach; 2. Serial I/O Primer: A Short Course in Data Communications and Networking; Serial versus Parallel Transfer; Serial Data Rate; Data Rate versus Bandwidth; Line Coding; OSI Model; Topology; Balanced versus Unbalanced Configurations; Transmission Medium; Asynchronous versus Synchronous Transmission; Clock and Data Recovery; Protocols; Error Detection and Correction; Access Methods; Duplexing; Miscellaneous Serial Techniques
Serial to Parallel and Parallel to Serial ConversionGearbox Operations; Equalization; Bit Banging; Fieldbuses; 3. Selecting an Appropriate Interface; Important Note; I. Low-Speed Interfaces (0-10 Mb/s); 4. 1-Wire; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 5. Actuator Sensor Interface (AS-i); Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 6. BITBUS
ApplicationsSource; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 7. C-Bus; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Connectors; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 8. Controller Area Network (CAN); Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Connector; Range; Network Configuration; Logic Levels; Protocol; Protocol Variations; IC Sources; 9. DMX512; Applications
SourceNational or International Standard; Key Features; Data Rate; Cable Medium; Connectors; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 10. FlexRay; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 11. Foundation Fieldbus; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Connectors; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 12. Highway Addressable Remote Transducer Protocol (HART)
ApplicationsSource; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 13. Inter-Integrated Circuit (I2C) Bus; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; Interface and Protocol Variations; IC Sources; 14. IO-Link; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources
15. Inter-IC Sound (I2S) Bus
Record Nr. UNINA-9910797578203321
Frenzel Louis E., Jr.  
Oxford, UK : , : Elsevier Science, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Handbook of serial communications interfaces : a comprehensive compendium of serial digital input/output (I/O) standards / / Louis E. Frenzel Jr
Handbook of serial communications interfaces : a comprehensive compendium of serial digital input/output (I/O) standards / / Louis E. Frenzel Jr
Autore Frenzel Louis E., Jr.
Edizione [1st edition]
Pubbl/distr/stampa Oxford, UK : , : Elsevier Science, , [2016]
Descrizione fisica 1 online resource (338 p.)
Disciplina 621.39/8
Soggetto topico Serial communications
ISBN 0-12-800671-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Handbook of Serial Communications Interfaces; Copyright Page; Contents; Preface; 1. Introduction to Serial I/O Communications; Rationale; Approach; 2. Serial I/O Primer: A Short Course in Data Communications and Networking; Serial versus Parallel Transfer; Serial Data Rate; Data Rate versus Bandwidth; Line Coding; OSI Model; Topology; Balanced versus Unbalanced Configurations; Transmission Medium; Asynchronous versus Synchronous Transmission; Clock and Data Recovery; Protocols; Error Detection and Correction; Access Methods; Duplexing; Miscellaneous Serial Techniques
Serial to Parallel and Parallel to Serial ConversionGearbox Operations; Equalization; Bit Banging; Fieldbuses; 3. Selecting an Appropriate Interface; Important Note; I. Low-Speed Interfaces (0-10 Mb/s); 4. 1-Wire; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 5. Actuator Sensor Interface (AS-i); Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 6. BITBUS
ApplicationsSource; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 7. C-Bus; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Connectors; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 8. Controller Area Network (CAN); Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Connector; Range; Network Configuration; Logic Levels; Protocol; Protocol Variations; IC Sources; 9. DMX512; Applications
SourceNational or International Standard; Key Features; Data Rate; Cable Medium; Connectors; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 10. FlexRay; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 11. Foundation Fieldbus; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Connectors; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 12. Highway Addressable Remote Transducer Protocol (HART)
ApplicationsSource; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources; 13. Inter-Integrated Circuit (I2C) Bus; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; Interface and Protocol Variations; IC Sources; 14. IO-Link; Applications; Source; National or International Standard; Key Features; Data Rate; Cable Medium; Range; Network Configuration; Logic Levels; Protocol; IC Sources
15. Inter-IC Sound (I2S) Bus
Record Nr. UNINA-9910810483403321
Frenzel Louis E., Jr.  
Oxford, UK : , : Elsevier Science, , [2016]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
M2M communications : a systems approach / / editors, David Boswarthick, Omar Elloumi, Olivier Hersent
M2M communications : a systems approach / / editors, David Boswarthick, Omar Elloumi, Olivier Hersent
Edizione [1st edition]
Pubbl/distr/stampa Chichester, West Sussex, U.K. : , : Wiley, , 2012
Descrizione fisica 1 online resource (334 p.)
Disciplina 621.39/8
Altri autori (Persone) BoswarthickDavid
ElloumiOmar
HersentOlivier
Soggetto topico Machine-to-machine communications
ISBN 1-280-58851-9
9786613618344
1-119-97403-8
1-119-97404-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- List of Contributors -- List of Acronyms -- 1 Introduction to M2M -- 1.1 What is M2M? -- 1.2 The Business of M2M -- 1.3 Accelerating M2M Maturity -- 1.3.1 High-Level M2M Frameworks -- 1.3.2 Policy and Government Incentives -- 1.4 M2M Standards -- 1.4.1 Which Standards for M2M? -- 1.5 Roadmap of the Book -- References -- Part I M2M CURRENT LANDSCAPE -- 2 The Business of M2M -- 2.1 The M2M Market -- 2.1.1 Healthcare -- 2.1.2 Transportation -- 2.1.3 Energy -- 2.2 The M2M Market Adoption: Drivers and Barriers -- 2.3 The M2M Value Chain -- 2.4 Market Size Projections -- 2.5 Business Models -- 2.5.1 Network Operator- or CSP-Led Model -- 2.5.2 MVNO-Led Model -- 2.5.3 Corporate Customer-Led Model -- 2.6 M2M Business Metrics -- 2.7 Market Evolution -- Reference -- 3 Lessons Learned from Early M2M Deployments -- 3.1 Introduction -- 3.2 Early M2M Operational Deployments -- 3.2.1 Introduction -- 3.2.2 Early M2M Operational Deployment Examples -- 3.2.3 Common Questions in Early M2M Deployments -- 3.2.4 Possible Optimization of M2M Deployments -- 3.3 Chapter Conclusion -- Reference -- Part II M2M ARCHITECTURE AND PROTOCOLS -- 4 M2M Requirements and High-Level Architectural Principles -- 4.1 Introduction -- 4.2 Use-Case-Driven Approach to M2M Requirements -- 4.2.1 What is a Use Case? -- 4.2.2 ETSI M2M Work on Use Cases -- 4.2.3 Methodology for Developing Use Cases -- 4.3 Smart Metering Approach in ETSI M2M -- 4.3.1 Introduction -- 4.3.2 Typical Smart Metering Deployment Scenario -- 4.4 eHealth Approach in ETSI M2M -- 4.4.1 Introduction -- 4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments -- 4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design -- 4.6.1 Why Focus on Wireless Networks? -- 4.7 Description of M2M Market Segments/Applications -- 4.7.1 Automotive -- 4.7.2 Smart Telemetry -- 4.7.3 Surveillance and Security -- 4.7.4 Point of Sale (PoS) -- 4.7.5 Vending Machines.
4.7.6 eHealth -- 4.7.7 Live Video -- 4.7.8 Building Automation -- 4.7.9 M2M Industrial Automation -- 4.8 M2M Traffic Characterization -- 4.8.1 Detailed Traffic Characterization for Smart Metering -- 4.8.2 Global Traffic Characterization -- 4.9 High-Level Architecture Principles for M2M Communications -- 4.10 Chapter Conclusions -- References -- 5 ETSI M2M Services Architecture -- 5.1 Introduction -- 5.2 High-Level System Architecture -- 5.3 ETSI TC M2M Service Capabilities Framework -- 5.4 ETSI TC M2M Release 1 Scenarios -- 5.5 ETSI M2M Service Capabilities -- 5.5.1 Reachability, Addressing, and Repository Capability (xRAR) -- 5.5.2 Remote Entity Management Capability (x REM) -- 5.5.3 Security Capability (xSEC) -- 5.6 Introducing REST Architectural Style for M2M -- 5.6.1 Introduction to REST -- 5.6.2 Why REST for M2M? -- 5.6.3 REST Basics -- 5.6.4 Applying REST to M2M -- 5.6.5 Additional Functionalities -- 5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures -- 5.7.1 Introduction -- 5.7.2 Definitions Used in this Section -- 5.7.3 Resource Structure -- 5.7.4 Interface Procedures -- 5.8 Chapter Conclusion -- References -- 6 M2M Optimizations in Public Mobile Networks -- 6.1 Chapter Overview -- 6.2 M2M over a Telecommunications Network -- 6.2.1 Introduction -- 6.2.2 M2M Communication Scenarios -- 6.2.3 Mobile or Fixed Networks -- 6.2.4 Data Connections for M2M Applications -- 6.3 Network Optimizations for M2M -- 6.3.1 Introduction -- 6.3.2 3GPP Standardization of Network Improvements for Machine Type Communications -- 6.3.3 Cost Reduction -- 6.3.4 M2M Value-Added Services -- 6.3.5 Numbering, Identifiers, and Addressing -- 6.3.6 Triggering Optimizations -- 6.3.7 Overload and Congestion Control -- References -- 7 The Role of IP in M2M -- 7.1 Introduction -- 7.1.1 IPv6 in Brief -- 7.1.2 Neighbor Discovery Protocol -- 7.2 IPv6 for M2M -- 7.3 6LoWPAN -- 7.3.1 Framework -- 7.3.2 Header Compression -- 7.3.3 Neighbor Discovery -- 7.4 Routing Protocol for Low-Power and Lossy Networks (RPL).
7.4.1 RPL Topology -- 7.5 CoRE -- 7.5.1 Message Formats -- 7.5.2 Transport Protocol -- 7.5.3 REST Architecture -- References -- 8 M2M Security -- 8.1 Introduction -- 8.1.1 Security Characteristics of Cellular M2M -- 8.2 Trust Relationships in the M2M Ecosystem -- 8.3 Security Requirements -- 8.3.1 Customer/M2M Device User -- 8.3.2 Access Network Provider -- 8.3.3 M2M Service Provider -- 8.3.4 Application Provider -- 8.3.5 Bootstrapping Requirements -- 8.4 Which Types of Solutions are Suitable? -- 8.4.1 Approaches Against Hijacking -- 8.4.2 Public Key Solutions -- 8.4.3 Smart Card-Based Solutions -- 8.4.4 Methods Based on Pre-Provisioned Symmetric Keys -- 8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based Encryption -- 8.4.6 Security for Groups of M2M Devices -- 8.5 Standardization Efforts on Securing M2M and MTC Communications -- 8.5.1 ETSI M2M Security -- 8.5.2 3GPP Security Related to Network Improvements for Machine Type Communications -- References -- 9 M2M Terminals and Modules -- 9.1 M2M Module Categorization -- 9.1.1 Access Technology -- 9.1.2 Physical Form Factors -- 9.2 Hardware Interfaces -- 9.2.1 Power Interface -- 9.2.2 USB (Universal Serial Bus) Interface -- 9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface -- 9.2.4 Antenna Interface -- 9.2.5 UICC (Universal Integrated Circuit Card) Interface -- 9.2.6 GPIO (General-Purpose Input/Output Port) Interface -- 9.2.7 SPI (Serial Peripheral Interface) Interface -- 9.2.8 I2C (Inter-Integrated Circuit Bus) Interface -- 9.2.9 ADC (Analog-to-Digital Converter) Interface -- 9.2.10 PCM (Pulse Code Modulation) Interface -- 9.2.11 PWM (Pulse Width Modulation) Interface -- 9.2.12 Analog Audio Interface -- 9.3 Temperature and Durability -- 9.4 Services -- 9.4.1 Application Execution Environment -- 9.4.2 Connectivity Services -- 9.4.3 Management Services -- 9.4.4 Application Services -- 9.5 Software Interface -- 9.5.1 AT Commands -- 9.5.2 SDK Interface -- 9.6 Cellular Certification -- 9.6.1 Telecom Industry Certification.
9.6.2 MNO Certification -- 10 Smart Cards in M2M Communication -- 10.1 Introduction -- 10.2 Security and Privacy Issues in M2M Communication -- 10.3 The Grounds for Hardware-Based Security Solutions -- 10.4 Independent Secure Elements and Trusted Environments -- 10.4.1 Trusted Environments in M2M Devices -- 10.4.2 Trusting Unknown Devices: The Need for Security Certification -- 10.4.3 Advantages of the Smart Card Model -- 10.5 Specific Smart Card Properties for M2M Environments -- 10.5.1 Removable Smart Cards versus Embedded Secure Elements -- 10.5.2 UICC Resistance to Environmental Constraints -- 10.5.3 Adapting the Card Application Toolkit to Unattended Devices -- 10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands -- 10.5.5 Confidential Remote Management of Third-Party Applications -- 10.6 Smart Card Future Evolutions in M2M Environments -- 10.6.1 UICC-Based M2M Service Identity Module Application -- 10.6.2 Internet Protocol Integration of the UICC -- 10.7 Remote Administration of M2M Secure Elements -- 10.7.1 Overview -- 10.7.2 Late Personalization of Subscription -- 10.7.3 Remote Management of Subscriptions on the Field -- References -- Part III BOOK CONCLUSIONS AND FUTURE VISION -- 11 Conclusions -- Index.
Record Nr. UNINA-9910141291603321
Chichester, West Sussex, U.K. : , : Wiley, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
M2M communications : a systems approach / / editors, David Boswarthick, Omar Elloumi, Olivier Hersent
M2M communications : a systems approach / / editors, David Boswarthick, Omar Elloumi, Olivier Hersent
Edizione [1st edition]
Pubbl/distr/stampa Chichester, West Sussex, U.K. : , : Wiley, , 2012
Descrizione fisica 1 online resource (334 p.)
Disciplina 621.39/8
Altri autori (Persone) BoswarthickDavid
ElloumiOmar
HersentOlivier
Soggetto topico Machine-to-machine communications
ISBN 1-280-58851-9
9786613618344
1-119-97403-8
1-119-97404-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- List of Contributors -- List of Acronyms -- 1 Introduction to M2M -- 1.1 What is M2M? -- 1.2 The Business of M2M -- 1.3 Accelerating M2M Maturity -- 1.3.1 High-Level M2M Frameworks -- 1.3.2 Policy and Government Incentives -- 1.4 M2M Standards -- 1.4.1 Which Standards for M2M? -- 1.5 Roadmap of the Book -- References -- Part I M2M CURRENT LANDSCAPE -- 2 The Business of M2M -- 2.1 The M2M Market -- 2.1.1 Healthcare -- 2.1.2 Transportation -- 2.1.3 Energy -- 2.2 The M2M Market Adoption: Drivers and Barriers -- 2.3 The M2M Value Chain -- 2.4 Market Size Projections -- 2.5 Business Models -- 2.5.1 Network Operator- or CSP-Led Model -- 2.5.2 MVNO-Led Model -- 2.5.3 Corporate Customer-Led Model -- 2.6 M2M Business Metrics -- 2.7 Market Evolution -- Reference -- 3 Lessons Learned from Early M2M Deployments -- 3.1 Introduction -- 3.2 Early M2M Operational Deployments -- 3.2.1 Introduction -- 3.2.2 Early M2M Operational Deployment Examples -- 3.2.3 Common Questions in Early M2M Deployments -- 3.2.4 Possible Optimization of M2M Deployments -- 3.3 Chapter Conclusion -- Reference -- Part II M2M ARCHITECTURE AND PROTOCOLS -- 4 M2M Requirements and High-Level Architectural Principles -- 4.1 Introduction -- 4.2 Use-Case-Driven Approach to M2M Requirements -- 4.2.1 What is a Use Case? -- 4.2.2 ETSI M2M Work on Use Cases -- 4.2.3 Methodology for Developing Use Cases -- 4.3 Smart Metering Approach in ETSI M2M -- 4.3.1 Introduction -- 4.3.2 Typical Smart Metering Deployment Scenario -- 4.4 eHealth Approach in ETSI M2M -- 4.4.1 Introduction -- 4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments -- 4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design -- 4.6.1 Why Focus on Wireless Networks? -- 4.7 Description of M2M Market Segments/Applications -- 4.7.1 Automotive -- 4.7.2 Smart Telemetry -- 4.7.3 Surveillance and Security -- 4.7.4 Point of Sale (PoS) -- 4.7.5 Vending Machines.
4.7.6 eHealth -- 4.7.7 Live Video -- 4.7.8 Building Automation -- 4.7.9 M2M Industrial Automation -- 4.8 M2M Traffic Characterization -- 4.8.1 Detailed Traffic Characterization for Smart Metering -- 4.8.2 Global Traffic Characterization -- 4.9 High-Level Architecture Principles for M2M Communications -- 4.10 Chapter Conclusions -- References -- 5 ETSI M2M Services Architecture -- 5.1 Introduction -- 5.2 High-Level System Architecture -- 5.3 ETSI TC M2M Service Capabilities Framework -- 5.4 ETSI TC M2M Release 1 Scenarios -- 5.5 ETSI M2M Service Capabilities -- 5.5.1 Reachability, Addressing, and Repository Capability (xRAR) -- 5.5.2 Remote Entity Management Capability (x REM) -- 5.5.3 Security Capability (xSEC) -- 5.6 Introducing REST Architectural Style for M2M -- 5.6.1 Introduction to REST -- 5.6.2 Why REST for M2M? -- 5.6.3 REST Basics -- 5.6.4 Applying REST to M2M -- 5.6.5 Additional Functionalities -- 5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures -- 5.7.1 Introduction -- 5.7.2 Definitions Used in this Section -- 5.7.3 Resource Structure -- 5.7.4 Interface Procedures -- 5.8 Chapter Conclusion -- References -- 6 M2M Optimizations in Public Mobile Networks -- 6.1 Chapter Overview -- 6.2 M2M over a Telecommunications Network -- 6.2.1 Introduction -- 6.2.2 M2M Communication Scenarios -- 6.2.3 Mobile or Fixed Networks -- 6.2.4 Data Connections for M2M Applications -- 6.3 Network Optimizations for M2M -- 6.3.1 Introduction -- 6.3.2 3GPP Standardization of Network Improvements for Machine Type Communications -- 6.3.3 Cost Reduction -- 6.3.4 M2M Value-Added Services -- 6.3.5 Numbering, Identifiers, and Addressing -- 6.3.6 Triggering Optimizations -- 6.3.7 Overload and Congestion Control -- References -- 7 The Role of IP in M2M -- 7.1 Introduction -- 7.1.1 IPv6 in Brief -- 7.1.2 Neighbor Discovery Protocol -- 7.2 IPv6 for M2M -- 7.3 6LoWPAN -- 7.3.1 Framework -- 7.3.2 Header Compression -- 7.3.3 Neighbor Discovery -- 7.4 Routing Protocol for Low-Power and Lossy Networks (RPL).
7.4.1 RPL Topology -- 7.5 CoRE -- 7.5.1 Message Formats -- 7.5.2 Transport Protocol -- 7.5.3 REST Architecture -- References -- 8 M2M Security -- 8.1 Introduction -- 8.1.1 Security Characteristics of Cellular M2M -- 8.2 Trust Relationships in the M2M Ecosystem -- 8.3 Security Requirements -- 8.3.1 Customer/M2M Device User -- 8.3.2 Access Network Provider -- 8.3.3 M2M Service Provider -- 8.3.4 Application Provider -- 8.3.5 Bootstrapping Requirements -- 8.4 Which Types of Solutions are Suitable? -- 8.4.1 Approaches Against Hijacking -- 8.4.2 Public Key Solutions -- 8.4.3 Smart Card-Based Solutions -- 8.4.4 Methods Based on Pre-Provisioned Symmetric Keys -- 8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based Encryption -- 8.4.6 Security for Groups of M2M Devices -- 8.5 Standardization Efforts on Securing M2M and MTC Communications -- 8.5.1 ETSI M2M Security -- 8.5.2 3GPP Security Related to Network Improvements for Machine Type Communications -- References -- 9 M2M Terminals and Modules -- 9.1 M2M Module Categorization -- 9.1.1 Access Technology -- 9.1.2 Physical Form Factors -- 9.2 Hardware Interfaces -- 9.2.1 Power Interface -- 9.2.2 USB (Universal Serial Bus) Interface -- 9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface -- 9.2.4 Antenna Interface -- 9.2.5 UICC (Universal Integrated Circuit Card) Interface -- 9.2.6 GPIO (General-Purpose Input/Output Port) Interface -- 9.2.7 SPI (Serial Peripheral Interface) Interface -- 9.2.8 I2C (Inter-Integrated Circuit Bus) Interface -- 9.2.9 ADC (Analog-to-Digital Converter) Interface -- 9.2.10 PCM (Pulse Code Modulation) Interface -- 9.2.11 PWM (Pulse Width Modulation) Interface -- 9.2.12 Analog Audio Interface -- 9.3 Temperature and Durability -- 9.4 Services -- 9.4.1 Application Execution Environment -- 9.4.2 Connectivity Services -- 9.4.3 Management Services -- 9.4.4 Application Services -- 9.5 Software Interface -- 9.5.1 AT Commands -- 9.5.2 SDK Interface -- 9.6 Cellular Certification -- 9.6.1 Telecom Industry Certification.
9.6.2 MNO Certification -- 10 Smart Cards in M2M Communication -- 10.1 Introduction -- 10.2 Security and Privacy Issues in M2M Communication -- 10.3 The Grounds for Hardware-Based Security Solutions -- 10.4 Independent Secure Elements and Trusted Environments -- 10.4.1 Trusted Environments in M2M Devices -- 10.4.2 Trusting Unknown Devices: The Need for Security Certification -- 10.4.3 Advantages of the Smart Card Model -- 10.5 Specific Smart Card Properties for M2M Environments -- 10.5.1 Removable Smart Cards versus Embedded Secure Elements -- 10.5.2 UICC Resistance to Environmental Constraints -- 10.5.3 Adapting the Card Application Toolkit to Unattended Devices -- 10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands -- 10.5.5 Confidential Remote Management of Third-Party Applications -- 10.6 Smart Card Future Evolutions in M2M Environments -- 10.6.1 UICC-Based M2M Service Identity Module Application -- 10.6.2 Internet Protocol Integration of the UICC -- 10.7 Remote Administration of M2M Secure Elements -- 10.7.1 Overview -- 10.7.2 Late Personalization of Subscription -- 10.7.3 Remote Management of Subscriptions on the Field -- References -- Part III BOOK CONCLUSIONS AND FUTURE VISION -- 11 Conclusions -- Index.
Record Nr. UNINA-9910827010803321
Chichester, West Sussex, U.K. : , : Wiley, , 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Next generation wireless LANs : 802.11n, 802.11ac, and Wi-Fi direct / / Eldad Perahia, Intel Corporation, Robert Stacey, Apple Inc [[electronic resource]]
Next generation wireless LANs : 802.11n, 802.11ac, and Wi-Fi direct / / Eldad Perahia, Intel Corporation, Robert Stacey, Apple Inc [[electronic resource]]
Autore Perahia Eldad <1967->
Edizione [Second edition.]
Pubbl/distr/stampa Cambridge : , : Cambridge University Press, , 2013
Descrizione fisica 1 online resource (xxviii, 452 pages) : digital, PDF file(s)
Disciplina 621.39/8
Soggetto topico Wireless LANs
ISBN 1-107-23519-7
1-107-34779-3
1-139-06140-2
1-107-34529-4
1-107-34154-X
1-107-34890-0
1-107-34404-2
1-107-01676-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: 1. Introduction; 2. Orthogonal frequency division multiplexing; 3. MIMO/SDM basics; 4. PHY interoperability with 11a/g legacy OFDM devices; 5. High throughput; 6. Robust performance; 7. Very high throughput PHY; 8. Media access control; 9. MAC throughput enhancements; 10. Advanced channel access techniques; 11. Interoperability and coexistence; 12. MAC frame formats; 13. Transmit beamforming; 14. Multi-user MIMO; 15. Fast link adaptation.
Record Nr. UNINA-9910464666903321
Perahia Eldad <1967->  
Cambridge : , : Cambridge University Press, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui