Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.
E-BookPDF1 - PDF WatermarkE-Book
194 Seiten
Englisch
Springer International Publishingerschienen am12.04.20241st ed. 2024
Verfügbare Formate
BuchGebunden
EUR80,24
E-BookPDF1 - PDF WatermarkE-Book
EUR80,24

Produkt

Details
Weitere ISBN/GTIN9783031478666
ProduktartE-Book
EinbandartE-Book
FormatPDF
Format Hinweis1 - PDF Watermark
FormatE107
Erscheinungsjahr2024
Erscheinungsdatum12.04.2024
Auflage1st ed. 2024
Seiten194 Seiten
SpracheEnglisch
IllustrationenXVIII, 195 p. 56 illus., 42 illus. in color.
Artikel-Nr.14122250
Rubriken
Genre9200

Inhalt/Kritik

Inhaltsverzeichnis
I Foundations of Opportunistic Networks.- 1 Mobility of Opportunistic Networks.- 1.1 Scale and density .- 1.2 Collecting mobility traces .- 1.3 From mobility traces to location information.- 1.4 From mobility traces to contact information.- 1.4.1 Converting GPS traces into contact traces.- 1.4.2 Direct gathering of contact traces.- 1.5 Mobility metrics.- 1.6 Large-Scale Mobility Characteristics in OppNets.- 1.7 Impact of mobility on opportunistic networks.- 1.8 Chapter summary.- Problems.- 2 Data Dissemination in Opportunstic Networks.- 2.1 Terms and metrics.- 2.2 Optimal dissemination.- 2.3 Flooding protocols.- 2.3.1 Epidemic Routing.- 2.3.2 Spray and Wait.- 2.3.3 Optimal Stopping Theory.- 2.4 Mobility based protocols.- 2.4.1 Geocasting protocols.- 2.4.2 Speed/direction based protocols.- 2.4.3 Encounter based protocols.- 2.5 Social awareness based protocols.- 2.6 Data content based protocols.- 2.7 Network coding based protocols.- 2.8 Caching in Opportunistic Networks.- 2.9 Chapter summary.- Problems.- 3 Security in Opportunistic Networks.- 3.1 Overview.- 3.2 Types of Attacks.- 3.2.1 Masquerade.- 3.2.2 Eavesdropping ..- 3.2.3 Sabotage.- 3.2.4 Data Manipulation.- 3.2.5 Physical Attacks.- 3.2.6 Free-riding.- 3.3 Attacks Evaluation.- 3.3.1 Evaluation Methodology and Setup.- 3.3.2 Effects of the Attacks.- 3.4 Chapter summary.- Problems.- Part II Evaluation of Opportunistic Networks 4 Overview of Evaluation of Opportunistic Networks.- 4.1 Overview .- 4.2 Methods for evaluating Opportunistic Networks.- 4.3 Metrics for evaluating Opportunistic Networks.- 4.4 Chapter summary.- Problems .- 5 Theoretical Models for Opportunistic Networks.- 5.1 General assumptions and their validity.- 5.2 Markov Chain Models.- 5.2.1 Modeling epidemic diffusion in OppNet.- 5.2.2 Limitations and applications of Markov Chain Models.- 5.3 Compartmental models.- 5.3.1 Basic epidemic model.- 5.3.2 Epidemic model for an open area.- 5.3.3 Limitations and applicationsof Compartmental Models.- 5.4 Other methods.- 5.5 Chapter summary.- Problems.- 6 Simulation models for Opportunistic Networks.- 6.1 Simulation model stack for opportunistic networks.- 6.4 Mobility Models and Contact Traces.- 6.4.1 Terminology.- 6.4.2 Properties of mobility models.- 6.4.3 Contact traces.- 6.4.4 Discussion of mobility models.- 6.5 Simulation Speedup.- 6.6 Chapter summary.- Problems .- 7 Simulation tools for Opportunistic Networks.- 7.1 Discrete event-based simulation.- 7.2 OMNeT++ and the Opportunistic Network Simulator (OPS).- 7.3 The ONE.- 7.4 Network Simulator 3 (ns-3).- 7.5 Comparison of simulators.- 7.6 Mobility tools .- 7.7 Chapter summary .- Problems .- 8 Benchmarking Opportunistic Networks.- 8.1 Benchmarks for OppNets.- 8.2 Metrics for comparing opportunistic protocols.- 8.3 Comparing opportunistic protocols.- 8.4 Chapter summary.- Problems.- Part III Implementation of Opportunistic Networks 9 Connectivity Technologies for OpportunisticNetworks.- 9.1 Mobile Ad Hoc Networks.- 9.2 Communication Technologies.- 9.2.1 LoRa.- 9.2.2 Radio Frequency Identification (RFID).- 9.2.3 Bluetooth Low Energy (BLE).- 9.2.4 Wi-Fi Direct.- 9.2.5 ZigBee.- 9.2.6 802.11p.- 9.2.7 Satellite communication.- 9.3 Toward 5G and 6G Networks.- 9.4 Related software and libraries.- 9.4.1 Exposure Notifications System (ENS).- 9.4.2 Apple Multipeer Connectivity.mehr

Autor