Machine-to-Machine Communications - Architectures, Technology, Standards, and Applications

Machine-to-Machine Communications - Architectures, Technology, Standards, and Applications

von: Vojislav B. Misic, Jelena Misic

Taylor and Francis, 2014

ISBN: 9781466561243

Format: PDF

Kopierschutz: DRM

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's

Preis: 146,09 EUR

Mehr zum Inhalt

Machine-to-Machine Communications - Architectures, Technology, Standards, and Applications


 

With the number of machine-to-machine (M2M)-enabled devices projected to reach 20 to 50 billion by 2020, there is a critical need to understand the demands imposed by such systems. Machine-to-Machine Communications: Architectures, Technology, Standards, and Applications offers rigorous treatment of the many facets of M2M communication, including its integration with current technology.Presenting the work of a different group of international experts in each chapter, the book begins by supplying an overview of M2M technology. It considers proposed standards, cutting-edge applications, architectures, and traffic modeling and includes case studies that highlight the differences between traditional and M2M communications technology.Details a practical scheme for the forward error correction code designInvestigates the effectiveness of the IEEE 802.15.4 low data rate wireless personal area network standard for use in M2M communicationsIdentifies algorithms that will ensure functionality, performance, reliability, and security of M2M systemsIllustrates the relationship between M2M systems and the smart power gridPresents techniques to ensure integration with and adaptation of existing communication systems to carry M2M trafficProviding authoritative insights into the technologies that enable M2M communications, the book discusses the challenges posed by the use of M2M communications in the smart grid from the aspect of security and proposes an efficient intrusion detection system to deal with a number of possible attacks. After reading this book, you will develop the understanding required to solve problems related to the design, deployment, and operation of M2M communications networks and systems.