You are previewing Communicating Embedded Systems: Networks Applications.
O'Reilly logo
Communicating Embedded Systems: Networks Applications

Book Description

Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and networks constitute the main sector of embedded systems.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. General Introduction
  5. Chapter 1: Introduction to Embedded Systems
    1. 1.1. Introduction
    2. 1.2. Embedded system: a definition
    3. 1.3. Properties of an embedded system
    4. 1.4. The significance of Moore’s Law
    5. 1.5. Embedded systems and the system on silicon
    6. 1.6. Embedded systems and communications
    7. 1.7. Embedded systems and security
    8. 1.8. Embedded systems and time constraints
    9. 1.9. Embedded systems and free software
    10. 1.10. Embedded systems and their design
    11. 1.11. An example of multimedia embedded system design
    12. 1.12. Conclusion
    13. 1.13. Bibliography
  6. Chapter 2: Quality-of-Service Routing in Mobile Ad Hoc Networks
    1. 2.1. Introduction
    2. 2.2. Mobile ad hoc networks: concepts, characteristics, challenges
    3. 2.3. QoS routing: general considerations
    4. 2.4. Best-effort routing protocols in MANETs
    5. 2.5. QoS routing in MANETs
    6. 2.6. Conclusion
    7. 2.7. Bibliography
  7. Chapter 3: Self-Management of Ad Hoc Sensor Networks
    1. 3.1. Introduction
    2. 3.2. Wireless sensor networks
    3. 3.3. Autonomic sensor networks
    4. 3.4. An example of self-configuration
    5. 3.5. Conclusion
    6. 3.6. Bibliography
  8. Chapter 4: RFID Technology
    1. 4.1. Introduction
    2. 4.2. Automatic identification systems
    3. 4.3. The components of an RFID system
    4. 4.4. The different types of RFID systems
    5. 4.5. RF ranges
    6. 4.6. Information security
    7. 4.7. Standards in force
    8. 4.8. Examples of implementations
    9. 4.9. Conclusion
    10. 4.10. Bibliography
  9. Chapter 5: Hardware Security in Embedded Systems
    1. 5.1. Introduction
    2. 5.2. Embedded systems and their security issues
    3. 5.3. Security of the system and its data
    4. 5.4. Secured hardware architectures for embedded systems
    5. 5.5. Conclusion
    6. 5.6. Bibliography
  10. Chapter 6: Communications Security in Embedded Systems
    1. 6.1. Introduction
    2. 6.2. Communications security
    3. 6.3. Communications security in embedded systems
    4. 6.4. Conclusion
    5. 6.5. Bibliography
  11. Chapter 7: Cross-Layer Adaptation for Multimedia Services in 802.11-Type Embedded Communications Systems
    1. 7.1. Introduction
    2. 7.2. Limits of layered structuring
    3. 7.3. The XL concept
    4. 7.4. Conclusion
    5. 7.5. Bibliography
  12. Chapter 8: Relevance of the DTN Architecture to Mobile Ad Hoc Networks
    1. 8.1. Introduction
    2. 8.2. Mobile ad hoc networks
    3. 8.3. Challenged networks
    4. 8.4. Delay-tolerant networks
    5. 8.5. Relevance of DTNs to ad hoc mobile networks
    6. 8.6. Conclusion
    7. 8.7. Bibliography
  13. Chapter 9: Intelligent Interfaces and Mobile Communications
    1. 9.1. Introduction
    2. 9.2. Assisting the user with access to new internet services
    3. 9.3. Modeling user behavior
    4. 9.4. Synthesis of mobile and wireless networks
    5. 9.5. References for intelligent interfaces for access to mobile networks
    6. 9.6. Conclusion
    7. 9.7. Bibliography
  14. Chapter 10: Routing and Mobility Management in Personal Networks
    1. 10.1. Introduction
    2. 10.2. Personal environments
    3. 10.3. Routing in personal environments
    4. 10.4. Gateway discovery
    5. 10.5. Mobility management
    6. 10.6. Conclusion
    7. 10.7. Bibliography
  15. List of Authors
  16. Index