close
1.

電子ブック

EB
Colin Walls
出版情報: Elsevier ScienceDirect Books , Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
How Software Influences Hardware Design / 4:
Migrating your Software to a New Processor Architecture / 5:
Embedded Software for Transportation Applications / 6:
How to Choose a CPU for Your SoC Design / 7:
An Introduction to USB Software / 8:
Towards USB 3.0 / 9:
What Makes an Embedded Application Tick? / 1:
Memory in Embedded Systems / 2:
Memory Architectures / 3:
2.

電子ブック

EB
Catherine Mulligan, Magnus Olsson
出版情報: Elsevier ScienceDirect Books , Academic Press, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
List of Abbreviations
Introduction - Background and Vision of EPC / Part I:
Mobile Broadband and the Core Network Evolution / Chapter 1:
A Global Standard / 1.1:
Origins of the Evolved Packet Core / 1.2:
3GPP Radio Access Technologies / 1.2.1:
3GPP2 Radio Access Technologies / 1.2.2:
SAE - Building Bridges Between Different Networks / 1.2.3:
A Shifting Value Chain / 1.3:
Terminology Used in This Book / 1.4:
Overview of EPS / Part II:
Architecture Overview / Chapter 2:
EPS Architecture / 2.1:
Basic LP Connectivity Over LTE Access / 2.1.1:
Adding More Advanced Functionality for LTE Access / 2.1.2:
Interworking Between LTE and GSM/GPRS or WCDMA/HSPA / 2.1.3:
Support for 3GPP Voice Services / 2.1.4:
Interworking Between LTE and CDMA Networks / 2.1.5:
Interworking Between 3GPP Access Technologies and Non-3GPP Access Technologies / 2.1.6:
Support for Broadcasting in Cellular Networks / 2.1.7:
Positioning Services / 2.1.8:
Optimizations for Small Cells and Local Access / 2.1.9:
Miscellaneous Features / 2.1.10:
Summary of the Architecture Overview / 2.1.11:
Mobile Network Radio Technologies / 2.2:
Overview of Radio Networks for Mobile Services / 2.2.1:
Radio Network Functionality / 2.2.2:
GSM / 2.2.3:
WCDMA / 2.2.4:
LTE / 2.2.5:
EPS Deployment Scenarios and Operator Cases / Chapter 3:
Scenario 1: Existing GSM/GPRS and/or WCDMA/HSPA Operators Deploying LTE/EPC / 3.1:
First Phase - Initial EPC Deployment / 3.1.1:
Second Phase - Integration with Existing Packet Core / 3.1.2:
Third Phase - Further Optimizations Towards the Common Core / 3.1.3:
Scenario 2: Existing CDMA Operators Deploying LTE/EPC / 3.2:
Scenario 3: New Operators Deploying LTE/EPC / 3.3:
Data Services in EPS / Chapter 4:
Messaging Services / 4.1:
Machine Type Communication / 4.2:
Industrial and Corporate Uses / 4.2.1:
Societal - M2M and Sustainable Development / 4.2.2:
Voice Services in EPS / Chapter 5:
Realization of Voice Over LTE / 5.1:
Voice Services Using IMS Technology / 5.2:
Single-Radio Voice Call Continuity (SRVCC) / 5.3:
Circuit-Switched Fallback / 5.4:
Comparing MMTel/SRVCC and CSFB / 5.5:
IMS Emergency Calls and Priority Services / 5.6:
Key Concepts and Services / Part III:
Session Management and Mobility / Chapter 6:
IP Connectivity and Session Management / 6.1:
The LP Connection / 6.1.1:
Session Management, Bearers, and QoS Aspects / 6.2:
General / 6.2.1:
The EPS Bearer for E-UTRAN Access / 6.2.2:
Session Management for EPS and GERAN/UTRAN Accesses / 6.2.3:
Session Management for Other Accesses / 6.2.4:
Subscriber Identifiers and Corresponding Legacy Identities / 6.3:
Permanent Subscriber Identifiers / 6.3.1:
Temporary Subscriber Identifiers / 6.3.2:
Relation to Subscription Identifiers in 2G/3G / 6.3.3:
Mobility Principles / 6.4:
Mobility within 3GPP Family of Accesses / 6.4.1:
Idle-Mode Signaling Reduction (ISR) / 6.4.3:
Closed Subscriber Group / 6.4.4:
Mobility Between E-UTRAN and HRPD / 6.4.5:
Generic Mobility Between 3GPP and Non-3GPP Accesses / 6.4.6:
Access Network Discovery and Selection / 6.4.7:
Interworking with Managed WLAN Networks / 6.5:
Pooling, Overload Protection, and Congestion Control / 6.6:
Security / Chapter 7:
Introduction / 7.1:
Security Services / 7.2:
Security Domains / 7.2.1:
Network Access Security / 7.3:
Access Security in E-UTRAN / 7.3.1:
Interworking with GERAN/UTRAN / 7.3.2:
Special Consideration for IMS Emergency Calls / 7.3.3:
Trusted and Untrusted Non-3GPP Accesses / 7.3.4:
Access Security in Trusted Non-3GPP Accesses / 7.3.5:
Access Security in Untrusted Non-3GPP Access / 7.3.6:
Special Considerations for Host-Based Mobility DSMIPv6 / 7.3.7:
Network Domain Security / 7.4:
User Domain Security / 7.5:
Security Aspects of Home eNBs and Home NBs / 7.6:
H(e)NB Security Architecture / 7.6.1:
Closed Subscriber Groups / 7.6.2:
Device Authentication / 7.6.3:
Hosting Party Authentication / 7.6.4:
Backhaul Link Security / 7.6.5:
Location Verification / 7.6.6:
Lawful Intercept / 7.7:
Quality of Service, Charging, and Policy Control / Chapter 8:
Quality of Service / 8.1:
QoS in E-UTRAN / 8.1.1:
QoS Aspects When Interworking with Other Accesses / 8.1.2:
Policy and Charging Control / 8.2:
The PCC Architecture / 8.2.1:
Basic PCC Concepts / 8.2.2:
Network vs. Terminal-Initiated QoS Control / 8.2.3:
PCC and Roaming / 8.2.4:
Additional PCC Features Developed Since Release 8 / 8.2.5:
PCC Support for Fixed Broadband Access / 8.2.6:
Charging / 8.3:
Selection Functions / Chapter 9:
Architecture Overview for Selection Functions / 9.1:
Selection of MME, SGSN, Serving GW, and PDN GW / 9.2:
Selection Procedure at a Glance / 9.2.1:
Use of DNS Infrastructure / 9.2.2:
MME Selection / 9.2.3:
SGSN Selection Function for EPS / 9.2.4:
GW Selection Overview / 9.2.5:
PDN GW Selection Function / 9.2.6:
Serving GW Selection Function / 9.2.7:
Handover (Non-3GPP Access) and PDN GW Selection / 9.2.8:
PCRF Selection / 9.3:
Subscriber Data Management. / Chapter 10:
Home Subscriber Server (HSS) / 10.1:
Subscriber Profile Repository (SPR) / 10.2:
User Data Convergence (UDC) / 10.3:
UDC Overall Description / 10.3.1:
Front-Ends and User Data Repository / 10.3.2:
Voice and Emergency Services / Chapter 11:
Voice Services Based on Circuit-Switched Technology / 11.1:
Voice Services with IMS Technology / 11.2:
MMTel / 11.3:
MMTel Architecture / 11.3.1:
VoLTE / 11.4:
T-ADS / 11.5:
Ensuring Service Coverage / 11.5.1:
Single Radio Voice Call Continuity (SRVCC) / 11.6:
Entities with Additional Functions to Support SRVCC / 11.6.1:
IMS Centralized Services (ICS) / 11.7:
Service Centralization and Continuity Application Server (SCC-AS) / 11.7.1:
SRVCC from E-UTRAN to GERAN or UTRAN / 11.7.2:
SRVCC from E-UTRAN to CDMA 1×RTT / 11.8:
Migration Paths and Coexistence of Circuit-Switched and VoLTE / 11.9:
EPS Emergency Bearer Service for IMS Emergency / 11.11:
Multimedia Priority Service (MPS) / 11.12:
LTE Broadcasting / Chapter 12:
Background and Main Concepts / 12.1:
MBMS Solution Overview / 12.2:
MBMS User Services / 12.3:
Associated Delivery Procedures / 12.3.1:
Mobile Network Architecture for MBMS / 12.4:
Interfaces / 12.4.1:
MBMS Bearer Services / 12.5:
Session Start / 12.5.1:
Session Stop / 12.5.2:
Session Update / 12.5.3:
Positioning / Chapter 13:
Positioning Solutions / 13.1:
Positioning Architecture and Protocols / 13.2:
Positioning Methods / 13.3:
Position-Reporting Formats / 13.4:
EPS Positioning Entities and Interfaces / 13.5:
GMLC / 13.5.1:
E-SMLC / 13.5.2:
SLP / 13.5.3:
Le Interface / 13.5.4:
SLg Interface / 13.5.5:
SLs Interface / 13.5.6:
LTE Positioning Protocol (LPP) / 13.5.7:
LTE Positioning Protocol Annex (LPPa) / 13.5.8:
Positioning Procedure / 13.6:
Offload Functions and Simultaneous Multi-Access / Chapter 14:
Offloading the 3GPP RAN - Simultaneous Multi-Access / 14.1:
Multi-Access PDN Connectivity (MAPCON) / 14.2.1:
LP Flow Mobility (LFOM) / 14.2.2:
Non-Seamless WLAN Offloading (NSWO) / 14.2.3:
Offloading the Core and Transport Network - Selected IP Traffic Offload (SLPTO) / 14.3:
Access to Local Networks - Local LP Access (LLPA) / 14.4:
The Nuts and Bolts of EPC / Part IV:
EPS Network Entities and Interfaces / Chapter 15:
Network Entities / 15.1:
eNodeB / 15.1.1:
Mobility Management Entity / 15.1.2:
Serving GW / 15.1.3:
PDN GW / 15.1.4:
Policy and Charging Rules Function / 15.1.5:
Home eNodeB Subsystem and Related Entities / 15.1.6:
Control Plane Between UE, eNodeB, and MME / 15.2:
S1-MME / 15.2.1:
GTP-Based Interfaces / 15.3:
Control Plane / 15.3.1:
MME↔MME(SIO) / 15.3.2:
MME↔Serving GW(S 11) / 15.3.3:
Serving GW↔PDN GW (S5/S8) / 15.3.4:
SGSN↔MME (S3) / 15.3.5:
SGSN↔Serving GW (S4) / 15.3.6:
SGSN↔SGSN (S16) / 15.3.7:
Trusted WLAN Access Network ↔ PDN GW (S2a) / 15.3.8:
ePDG PDN GW (S2b) / 15.3.9:
User Plane / 15.3.10:
eNodeB Serving GW (S1-U) / 15.3.11:
UE ↔ eNodeB Serving GW PDN GW (GTP-TJ) / 15.3.12:
UE ↔ BSS ↔ SGSN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.13:
UE ↔ UTRAN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.14:
UE ↔ UTRAN ↔ SGSN Serving GW ↔ PDN GW (GTP-U) / 15.3.15:
UE ↔ Trusted WLAN Access Network ↔ PDN GW (GTP-U) / 15.3.16:
UE ↔ ePDG ↔ PDN GW (GTP-U) / 15.3.17:
PMLP-Based Interfaces / 15.4:
Serving GW-PDN GW (S5/S8) / 15.4.1:
Trusted Non-3GPP IP Access-PDN GW (S2a) / 15.4.2:
ePDG-PDN GW (S2b) / 15.4.3:
DSMLPv6-Based Interfaces / 15.5:
UE-PDN GW (S2c) / 15.5.1:
HSS-Related Interfaces and Protocols / 15.6:
MME-HSS (S6a) and SGSN-HSS (S6d) / 15.6.1:
AAA-Related Interfaces / 15.7:
AAA Server-HSS (SWx) / 15.7.1:
Trusted Non-3GPP Access-3GPP AAA Server/Proxy (STa) / 15.7.3:
Untrusted Non-3GPP BP Access-3GPP AAA Server/Proxy (SWa) / 15.7.4:
ePDG-3GPP AAA Server/Proxy (SWm) / 15.7.5:
PDN GW-3GPP AAA Server/Proxy (S6b) / 15.7.6:
3GPP AAA Proxy-3GPP AAA Server/Proxy (SWd) / 15.7.7:
PCC-Related Interfaces / 15.8:
PCEF-PCRF (Gx) / 15.8.1:
BBERF-PCRF (Gxa/Gxc) / 15.8.3:
PCRF-AE (Rx) / 15.8.4:
TDF-PCRF (Sd) / 15.8.5:
OCS-PCRF (Sy) / 15.8.6:
PCRF-PCRF (S9) / 15.8.7:
BPCF-PCRF (S9a) / 15.8.8:
SPR-PCRF(Sp) / 15.8.9:
EIR-Related Interfaces / 15.9:
MME-EIR and SGSN-EIR Interfaces (S13 and S13') / 15.9.1:
I-WLAN-Related Interfaces / 15.10:
UE-ePDG (SWu) / 15.10.1:
ANDSF-Related Interfaces / 15.11:
ISMP Policy Node / 15.11.1:
Discovery Information Node / 15.11.2:
UE Location Node / 15.11.3:
ISRP Node / 15.11.4:
Ext Node / 15.11.5:
HRPD IW-Related Interfaces / 15.12:
Optimized Handover and Related Interfaces (S101 and S103) / 15.12.1:
MME ↔ eHRPD Access Network (S101) / 15.12.2:
Serving GW ↔ HSGW (S103) / 15.12.3:
Interface to External Networks / 15.13:
Functions / 15.13.1:
CSS Interface / 15.14:
MME-CSS Interface (S7a) / 15.14.1:
Protocols / Chapter 16:
GPRS Tunneling Protocol Overview / 16.1:
Protocol Structure / 16.2.1:
Control Plane (GTPv2-C) / 16.2.2:
User Plane (GTPv1-U) / 16.2.3:
Protocol Format / 16.2.4:
Mobile IP / 16.3:
Host-Based and Network-Based Mobility Mechanisms / 16.3.1:
Basic Principles of Mobile IP / 16.3.3:
Mobile IPv6 Security / 16.3.4:
Packet Format / 16.3.5:
Dual-Stack Operation / 16.3.6:
Additional MLPv6 Features - Route Optimization / 16.3.7:
Proxy Mobile IPv6 / 16.4:
Basic Principles / 16.4.1:
PMLPv6 Security / 16.4.3:
PMLPv6 Packet Format / 16.4.4:
Diameter / 16.4.5:
Background / 16.5.1:
Diameter Nodes / 16.5.2:
Diameter Sessions, Connections, and Transport / 16.5.4:
Diameter Request Routing / 16.5.5:
Peer Discovery / 16.5.6:
Diameter Message Format / 16.5.7:
Generic Routing Encapsulation / 16.6:
Basic Protocol Aspects / 16.6.1:
GRE Packet Format / 16.6.3:
S1-AP / 16.7:
Non-Access Stratum (NAS) / 16.8:
EPS Mobility Management / 16.8.1:
EPS Session Management / 16.8.2:
Message Structure / 16.8.3:
Security-Protected NAS Messages / 16.8.4:
Message Transport / 16.8.5:
Future Extensions and Backward Compatibility / 16.8.6:
IP Security / 16.9:
Encapsulated Security Payload and Authentication Header / 16.9.1:
Internet Key Exchange / 16.9.3:
IKEv2 Mobility and Multi-Homing / 16.9.4:
Extensible Authentication Protocol / 16.10:
Overview / 16.10.1:
Protocol / 16.10.2:
Stream Control Transmission Protocol / 16.11:
Basic Protocol Features / 16.11.1:
Multi-Steaming / 16.11.3:
Multi-Homing / 16.11.4:
Packet Structure / 16.11.5:
Procedures / Chapter 17:
Attachment and Detachment for E-UTRAN / 17.1:
Attachment Procedure for E-UTRAN / 17.1.1:
Detachment Procedure for E-UTRAN / 17.1.2:
Tracking Area Update for E-UTRAN / 17.2:
Tracking Area Update Procedure / 17.2.1:
TA Update with MME Change / 17.2.2:
Service Request for E-UTRAN / 17.3:
UE Triggered Service Request / 17.3.1:
Network Triggered Service Request / 17.3.2:
Intra- and Inter-3GPP Access Handover / 17.4:
Phases of the Handover Procedures / 17.4.1:
Handover Cases in EPS for 3GPP Accesses / 17.4.2:
Handover within E-UTRAN Access / 17.4.3:
Handover between E-UTRAN and Other 3GPP Accesses (GERAN, UTRAN) with S4-SGSN / 17.4.4:
Handover for Gn/Gp-Based SGSN / 17.4.5:
Handover between GERAN and UTRAN Access Using S4 SGSN and GTP/PMTP Protocol / 17.4.6:
Bearer and QoS-Related Procedures / 17.5:
Bearer Procedures for E-UTRAN / 17.5.1:
Bearer Procedures for GERAN/UTRAN / 17.5.2:
Attachment and Detachment for Non-3GPP Accesses / 17.6:
Attachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.1:
Detachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.2:
Attachment Procedure in Untrusted Non-3GPP Access Using PMJPv6 (S2b) / 17.6.3:
Detachment Procedure in Untrusted Non-3GPP Access Using PMIPv6 (S2b) / 17.6.4:
Attachment Procedure in Trusted Non-3GPP Access Using DSMTPv6 (S2c) / 17.6.5:
Detachment Procedure in Trusted Non-3GPP Access Using DSMJPv6 (S2c) / 17.6.6:
Intersystem Handover Between 3GPP and Non-3GPP Accesses / 17.7:
Details of Handover in EPS with Non-3GPP Accesses / 17.7.1:
QoS-Related Procedures in Non-3GPP Accesses / 17.8:
Conclusion and Future of EPS / Part V:
Conclusions and Looking Ahead / Chapter 18:
Standards Bodies Associated with EPS / Appendix A:
References
Index
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
3.

電子ブック

EB
David Kleidermacher, Mike Kleidermacher
出版情報: Elsevier ScienceDirect Books , Burlington : Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Acknowledgements
Introduction to Embedded Systems Security / Chapter 1:
What is Security? / 1.1:
What is an Embedded System? / 1.2:
Embedded Security Trends / 1.3:
Embedded Systems Complexity / 1.3.1:
Network Connectivity / 1.3.2:
Reliance on Embedded Systems for Critical Infrastructure / 1.3.3:
Sophisticated Attackers / 1.3.4:
Processor Consolidation / 1.3.5:
Security Policies / 1.4:
Perfect Security / 1.4.1:
Confidentiality, Integrity, and Availability / 1.4.2:
Isolation / 1.4.3:
Information Flow Control / 1.4.4:
Physical Security Policies / 1.4.5:
Apphcation-Specific Policies / 1.4.6:
Security Threats / 1.5:
Case Study: VxWorks Debug Port Vulnerability / 1.5.1:
Wrap-up / 1.6:
Key Points / 1.7:
Bibliography and Notes / 1.8:
Systems Software Considerations / Chapter 2:
The Role of the Operating System / 2.1:
Multiple Independent Levels of Security / 2.2:
Information Flow / 2.2.1:
Data Isolation / 2.2.2:
Damage Limitation / 2.2.3:
Periods Processing / 2.2.4:
Always Invoked / 2.2.5:
Tamper Proof / 2.2.6:
Evaluable / 2.2.7:
Microkernel versus Monolith / 2.3:
Case Study: The Duqu Virus / 2.3.1:
Core Embedded Operating System Security Requirements / 2.4:
Memory Protection / 2.4.1:
Virtual Memory / 2.4.2:
Fault Recovery / 2.4.3:
Guaranteed Resources / 2.4.4:
Virtual Device Drivers / 2.4.5:
Impact of Determinism / 2.4.6:
Secure Scheduling / 2.4.7:
Access Control and Capabilities / 2.5:
Case Study: Secure Web Browser / 2.5.1:
Granularity versus Simplicity of Access Controls / 2.5.2:
Whitelists versus Blacklists / 2.5.3:
Confused Deputy Problem / 2.5.4:
Capabilities versus Access Control Lists / 2.5.5:
Capability Confinement and Revocation / 2.5.6:
Secure Design Using Capabilities / 2.5.7:
Hypervisors and System Virtualization / 2.6:
Introduction to System Virtualization / 2.6.1:
Applications of System Virtualization / 2.6.2:
Environment Sandboxing / 2.6.3:
Virtual Security Appliances / 2.6.4:
Hypervisor Architectures / 2.6.5:
Paravirtualization / 2.6.6:
Leveraging Hardware Assists for Virtualization / 2.6.7:
Hypervisor Security / 2.6.8:
I/O Virtualization / 2.7:
The Need for Shared I/O / 2.7.1:
Emulation / 2.7.2:
Pass-through / 2.7.3:
Shared IOMMU / 2.7.4:
IOMMUs and Virtual Device Drivers / 2.7.5:
Secure I/O Virtualization within Microkernels / 2.7.6:
Remote Management / 2.8:
Security Implications / 2.8.1:
Assuring Integrity of the TCB / 2.9:
Trusted Hardware and Supply Chain / 2.9.1:
Secure Boot / 2.9.2:
Static versus Dynamic Root of Trust / 2.9.3:
Remote Attestation / 2.9.4:
Secure Embedded Software Development / 2.10:
Introduction to PHASE-Principles of High-Assurance Software Engineering / 3.1:
Minimal Implementation / 3.2:
Component Architecture / 3.3:
Runtime Componentization / 3.3.1:
A Note on Processes versus Threads / 3.3.2:
Least Privilege / 3.4:
Secure Development Process / 3.5:
Change Management / 3.5.1:
Peer Reviews / 3.5.2:
Development Tool Security / 3.5.3:
Secure Coding / 3.5.4:
Software Testing and Verification / 3.5.5:
Development Process Efficiency / 3.5.6:
Independent Expert Validation / 3.6:
Common Criteria / 3.6.1:
Case Study: Operating System Protection Profiles / 3.6.2:
Case Study: HAWS-High-Assurance Web Server / 3.7:
Model-Driven Design / 3.7.1:
Introduction to MDD / 3.8.1:
Executable Models / 3.8.2:
Modeling Languages / 3.8.3:
Types of MDD Platforms / 3.8.4:
Case Study: A Digital Pathology Scanner / 3.8.5:
Selecting an MDD Platform / 3.8.6:
Using MDD in Safety-and Security-Critical Systems / 3.8.7:
Embedded Cryptography / 3.9:
Introduction / 4.1:
U.S. Government Cryptographic Guidance / 4.2:
NSA Suite B / 4.2.1:
The One-Time Pad / 4.3:
Cryptographic Synchronization / 4.3.1:
Cryptographic Modes / 4.4:
Output Feedback / 4.4.1:
Cipher Feedback / 4.4.2:
OFB with CFB Protection / 4.4.3:
Traffic Flow Security / 4.4.4:
Counter Mode / 4.4.5:
Block Ciphers / 4.5:
Additional Cryptographic Block Cipher Modes / 4.5.1:
Authenticated Encryption / 4.6:
CCM / 4.6.1:
Galois Counter Mode / 4.6.2:
Public Key Cryptography / 4.7:
RSA / 4.7.1:
Equivalent Key Strength / 4.7.2:
Trapdoor Construction / 4.7.3:
Key Agreement / 4.8:
Man-in-the-Middle Attack on Diffie-Hellman / 4.8.1:
Public Key Authentication / 4.9:
Certificate Types / 4.9.1:
Elliptic Curve Cryptography / 4.10:
Elliptic Curve Digital Signatures / 4.10.1:
Elliptic Curve Anonymous Key Agreement / 4.10.2:
Cryptographic Hashes / 4.11:
Secure Hash Algorithm / 4.11.1:
MMO / 4.11.2:
Message Authentication Codes / 4.12:
Random Number Generation / 4.13:
True Random Number Generation / 4.13.1:
Pseudo-Random Number Generation / 4.13.2:
Key Management for Embedded Systems / 4.14:
Case Study: The Walker Spy Case / 4.14.1:
Key Management-Generalized Model / 4.14.2:
Key Management Case Studies / 4.14.3:
Cryptographic Certifications / 4.15:
FIPS 140-2 Certification / 4.15.1:
NSA Certification / 4.15.2:
Data Protection Protocols for Embedded Systems / 4.16:
Data-in-Motion Protocols / 5.1:
Generalized Model / 5.2.1:
Choosing the Network Layer for Security / 5.2.2:
Ethernet Security Protocols / 5.2.3:
BPsec versus SSL / 5.2.4:
IPsec / 5.2.5:
SSL/TLS / 5.2.6:
Embedded VPN Clients / 5.2.7:
DTLS / 5.2.8:
SSH / 5.2.9:
Custom Network Security Protocols / 5.2.10:
Application of Cryptography within Network Security Protocols / 5 2.11:
Secure Multimedia Protocols / 5.2.12:
Broadcast Security / 5.2.13:
Data-at-Rest Protocols / 5.3:
Choosing the Storage Layer for Security / 5.3.1:
Symmetric Encryption Algorithm Selection / 5.3.2:
Managing the Storage Encryption Key / 5 3 3:
Advanced Threats to Data Encryption Solutions / 5.3.4:
Emerging Applications / 5.4:
Embedded Network Transactions / 6.1:
Anatomy of a Network Transaction / 6.1.1:
State of Insecurity / 6.1.2:
Network-based Transaction Threats / 6 1 3:
Modern Attempts to Improve Network Transaction Security / 6.1.4:
Trustworthy Embedded Transaction Architecture / 6.1.5:
Automotive Security / 6.2:
Vehicular Security Threats and Mitigations / 6.2.1:
Secure Android / 6.3:
Android Security Retrospective / 6.3.1:
Android Device Rooting / 6.3.2:
Mobile Phone Data Protection: A Case Study of Defense-in-Depth / 6.3.3:
Android Sandboxing Approaches / 6.3.4:
Next-Generation Software-Defined Radio / 6.4:
Red-Black Separation / 6.4.1:
Software-Defined Radio Architecture / 6.4.2:
Enter Linux / 6.4.3:
Multi-Domain Radio / 6.4.4:
Index / 6.5:
Foreword
Preface
Acknowledgements
4.

電子ブック

EB
Wenji Mao, Fei-Yue Wang, FeiYue Wang
出版情報: Elsevier ScienceDirect Books , Burlington : Academic Press, 2012
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
Research Methodology and Frameworks for ISI / 1.1:
The ACP Approach / 1.2:
Modeling with Artificial Societies / 1.2.1:
Analysis with Computational Experiments / 1.2.2:
Control Through Parallel Execution / 1.2.3:
Foundations in Philosophy and Physics / 1.2.4:
Outline of Chapters / 1.3:
Agent Modeling of Terrorist Organization Behavior / Chapter 2:
Modeling Organizational Behavior / 2.1:
Action Extraction from the Web / 2.2:
Action Data Collection / 2.2.1:
Raw Action Extraction / 2.2.2:
Action Elimination / 2.2.3:
Action Refinement / 2.2.4:
Extracting Causal Knowledge from the Web / 2.3:
Construction of Action Hierarchy / 2.4:
Designing, Causal Scenarios / 2.5:
Case Study on Terrorist Organization / 2.6:
Conclusion / 2.7:
Security Story Generation for Computational Experiments / Chapter 3:
Story Generation Systems / 3.1:
System Workflow and Narrative Structure / 3.2:
Story Extraction Approach / 3.3:
Text Processing with Domain Knowledge / 3.3.1:
Event Detection and Event Element Extraction / 3.3.2:
Design and Organization of Patterns / 3.3.3:
Event Element Standardization / 3.3.4:
Evaluation of Event Relations / 3.3.5:
Experiment / 3.4:
Forecasting Croup Behavior via Probabilistic Plan Inference / 3.5:
Review of Plan-Based Inference / 4.1:
Probabilistic Plan Representation / 4.2:
Probabilistic Reasoning Approach / 4.3:
Notation / 4.3.1:
Computation / 4.3.2:
Case Study in Security Informatics / 4.4:
Construction of Plan Library / 4.4.1:
The Test Set / 4.4.2:
Experimental Results / 4.4.3:
Forecasting Complex Croup Behavior via Multiple Plan Recognition / 4.5:
Multiple Plan Recognition for Behavior Prediction / 5.1:
The MPR Problem Definition / 5.2:
The Proposed MPR Approach / 5.3:
Constructing the Explanation Graph / 5.3.1:
Computing Probability of an Explanation / 5.3.2:
Finding the Best Explanation / 5.3.3:
Algorithm and Complexity Analysis / 5.3.4:
Discussion / 5.3.5:
Experimental Design / 5.4:
Results / 5.4.2:
Social Computing in ISI: A Synthetic View / 5.5:
Social Computing / 6.1:
Theoretical and Infrastructure Underpinnings / 6.1.1:
Major Application Areas / 6.1.2:
A Social Computing-Based ISI Research Framework / 6.2:
Control and Management Through Parallel Execution / 6.2.1:
Main Issues in the ACP-Based ISI Research Framework / 6.3:
Modeling Cyber-Physical Societies / 6.3.1:
Scenario-Based Computational Experiment and Evaluation / 6.3.2:
Interactive Co-Evolution of Artificial and Actual Systems / 6.3.3:
Social Media Information Processing and Standardization / 6.3.4:
ISI Research Platform / 6.3.5:
Summary / 6.4:
Cyber-Enabled Social Movement Organizations / Chapter 7:
Studies on Social Movement Organizations: A Review / 7.1:
A New Research Framework for CeSMOs / 7.2:
CeSMO Research Questions / 7.2.1:
A Social Computing-Based CeSMO Research Framework / 7.2.2:
Case Study: Wenchuan Earthquake / 7.3:
Discussions on CeSMO Research Issues / 7.4:
CeSMO Behavior Modeling / 7.4.1:
CeSMO Network Analysis / 7.4.2:
CeSMO Social and Cultural Information Modeling and Analysis / 7.4.3:
CeSMO Behavior Prediction / 7.4.4:
Cultural Modeling for Behavior Analysis and Prediction / 7.5:
Modeling Cultural Data in Security Informatics / 8.1:
Major Machine Learning Methods / 8.2:
Naive Bayesian (NB) / 8.2.1:
Support Vector Machines (SVMs) / 8.2.2:
Artificial Neural Networks / 8.2.3:
k-Nearest Neighbor (kNN) / 8.2.4:
Decision Trees / 8.2.5:
Random Forest (RF) / 8.2.6:
Associative Classification (AC) / 8.2.7:
Experiment and Analysis / 8.3:
Datasets / 8.3.1:
Evaluation Measures / 8.3.2:
Observations and Analysis / 8.3.3:
Discussions on Cultural Modeling Research Issues / 8.4:
Cultural Datasets Construction / 8.4.1:
Attribute Selection / 8.4.2:
Best Performance of Classifiers / 8.4.3:
Handling the Class Imbalance Problem / 8.4.4:
Model Interpretability / 8.4.5:
Incorporation of Domain Knowledge / 8.4.6:
Cultural and Social Dynamics of Behavioral Patterns / 8.4.7:
Index / 8.5:
Preface
Acknowledgements
Intelligence and Security Informatics: Research Frameworks / Chapter 1:
5.

電子ブック

EB
Tammy Noergaard
出版情報: Elsevier ScienceDirect Books , Newnes, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Acknowledgments
About the Author
Introduction to Embedded Systems / Section I:
A Systems Engineering Approach to Embedded Systems Design / Chapter 1:
Know Your Standards / Chapter 2:
Embedded Hardware / Section II:
Embedded Hardware Building Blocks and the Embedded Board / Chapter 3:
Embedded Processors / Chapter 4:
Board Memory / Chapter 5:
Board I/O (Input/Output) / Chapter 6:
Board Buses / Chapter 7:
Embedded Software Introduction / Section III:
Device Drivers / Chapter 8:
Embedded Operating Systems / Chapter 9:
Middleware and Application Software / Chapter 10:
Putting It All Together: Design and Development / Section IV:
Defining the System-Creating the Architecture and Documenting the Design / Chapter 11:
The Final Phases of Embedded Design: Implementation and Testing / Chapter 12:
Projects and Exercises / Appendix A:
Schematic Symbols / Appendix B:
Acronyms and Abbreviations / Appendix C:
Glossary / Appendix D:
Index
What's on the CD-ROM
Foreword
Acknowledgments
About the Author
6.

電子ブック

EB
Catherine Mulligan, Magnus Olsson
出版情報: Elsevier ScienceDirect Books , Academic Press, 2012
所蔵情報: loading…
目次情報: 続きを見る
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
List of Abbreviations
Introduction - Background and Vision of EPC / Part I:
Mobile Broadband and the Core Network Evolution / Chapter 1:
A Global Standard / 1.1:
Origins of the Evolved Packet Core / 1.2:
3GPP Radio Access Technologies / 1.2.1:
3GPP2 Radio Access Technologies / 1.2.2:
SAE - Building Bridges Between Different Networks / 1.2.3:
A Shifting Value Chain / 1.3:
Terminology Used in This Book / 1.4:
Overview of EPS / Part II:
Architecture Overview / Chapter 2:
EPS Architecture / 2.1:
Basic LP Connectivity Over LTE Access / 2.1.1:
Adding More Advanced Functionality for LTE Access / 2.1.2:
Interworking Between LTE and GSM/GPRS or WCDMA/HSPA / 2.1.3:
Support for 3GPP Voice Services / 2.1.4:
Interworking Between LTE and CDMA Networks / 2.1.5:
Interworking Between 3GPP Access Technologies and Non-3GPP Access Technologies / 2.1.6:
Support for Broadcasting in Cellular Networks / 2.1.7:
Positioning Services / 2.1.8:
Optimizations for Small Cells and Local Access / 2.1.9:
Miscellaneous Features / 2.1.10:
Summary of the Architecture Overview / 2.1.11:
Mobile Network Radio Technologies / 2.2:
Overview of Radio Networks for Mobile Services / 2.2.1:
Radio Network Functionality / 2.2.2:
GSM / 2.2.3:
WCDMA / 2.2.4:
LTE / 2.2.5:
EPS Deployment Scenarios and Operator Cases / Chapter 3:
Scenario 1: Existing GSM/GPRS and/or WCDMA/HSPA Operators Deploying LTE/EPC / 3.1:
First Phase - Initial EPC Deployment / 3.1.1:
Second Phase - Integration with Existing Packet Core / 3.1.2:
Third Phase - Further Optimizations Towards the Common Core / 3.1.3:
Scenario 2: Existing CDMA Operators Deploying LTE/EPC / 3.2:
Scenario 3: New Operators Deploying LTE/EPC / 3.3:
Data Services in EPS / Chapter 4:
Messaging Services / 4.1:
Machine Type Communication / 4.2:
Industrial and Corporate Uses / 4.2.1:
Societal - M2M and Sustainable Development / 4.2.2:
Voice Services in EPS / Chapter 5:
Realization of Voice Over LTE / 5.1:
Voice Services Using IMS Technology / 5.2:
Single-Radio Voice Call Continuity (SRVCC) / 5.3:
Circuit-Switched Fallback / 5.4:
Comparing MMTel/SRVCC and CSFB / 5.5:
IMS Emergency Calls and Priority Services / 5.6:
Key Concepts and Services / Part III:
Session Management and Mobility / Chapter 6:
IP Connectivity and Session Management / 6.1:
The LP Connection / 6.1.1:
Session Management, Bearers, and QoS Aspects / 6.2:
General / 6.2.1:
The EPS Bearer for E-UTRAN Access / 6.2.2:
Session Management for EPS and GERAN/UTRAN Accesses / 6.2.3:
Session Management for Other Accesses / 6.2.4:
Subscriber Identifiers and Corresponding Legacy Identities / 6.3:
Permanent Subscriber Identifiers / 6.3.1:
Temporary Subscriber Identifiers / 6.3.2:
Relation to Subscription Identifiers in 2G/3G / 6.3.3:
Mobility Principles / 6.4:
Mobility within 3GPP Family of Accesses / 6.4.1:
Idle-Mode Signaling Reduction (ISR) / 6.4.3:
Closed Subscriber Group / 6.4.4:
Mobility Between E-UTRAN and HRPD / 6.4.5:
Generic Mobility Between 3GPP and Non-3GPP Accesses / 6.4.6:
Access Network Discovery and Selection / 6.4.7:
Interworking with Managed WLAN Networks / 6.5:
Pooling, Overload Protection, and Congestion Control / 6.6:
Security / Chapter 7:
Introduction / 7.1:
Security Services / 7.2:
Security Domains / 7.2.1:
Network Access Security / 7.3:
Access Security in E-UTRAN / 7.3.1:
Interworking with GERAN/UTRAN / 7.3.2:
Special Consideration for IMS Emergency Calls / 7.3.3:
Trusted and Untrusted Non-3GPP Accesses / 7.3.4:
Access Security in Trusted Non-3GPP Accesses / 7.3.5:
Access Security in Untrusted Non-3GPP Access / 7.3.6:
Special Considerations for Host-Based Mobility DSMIPv6 / 7.3.7:
Network Domain Security / 7.4:
User Domain Security / 7.5:
Security Aspects of Home eNBs and Home NBs / 7.6:
H(e)NB Security Architecture / 7.6.1:
Closed Subscriber Groups / 7.6.2:
Device Authentication / 7.6.3:
Hosting Party Authentication / 7.6.4:
Backhaul Link Security / 7.6.5:
Location Verification / 7.6.6:
Lawful Intercept / 7.7:
Quality of Service, Charging, and Policy Control / Chapter 8:
Quality of Service / 8.1:
QoS in E-UTRAN / 8.1.1:
QoS Aspects When Interworking with Other Accesses / 8.1.2:
Policy and Charging Control / 8.2:
The PCC Architecture / 8.2.1:
Basic PCC Concepts / 8.2.2:
Network vs. Terminal-Initiated QoS Control / 8.2.3:
PCC and Roaming / 8.2.4:
Additional PCC Features Developed Since Release 8 / 8.2.5:
PCC Support for Fixed Broadband Access / 8.2.6:
Charging / 8.3:
Selection Functions / Chapter 9:
Architecture Overview for Selection Functions / 9.1:
Selection of MME, SGSN, Serving GW, and PDN GW / 9.2:
Selection Procedure at a Glance / 9.2.1:
Use of DNS Infrastructure / 9.2.2:
MME Selection / 9.2.3:
SGSN Selection Function for EPS / 9.2.4:
GW Selection Overview / 9.2.5:
PDN GW Selection Function / 9.2.6:
Serving GW Selection Function / 9.2.7:
Handover (Non-3GPP Access) and PDN GW Selection / 9.2.8:
PCRF Selection / 9.3:
Subscriber Data Management. / Chapter 10:
Home Subscriber Server (HSS) / 10.1:
Subscriber Profile Repository (SPR) / 10.2:
User Data Convergence (UDC) / 10.3:
UDC Overall Description / 10.3.1:
Front-Ends and User Data Repository / 10.3.2:
Voice and Emergency Services / Chapter 11:
Voice Services Based on Circuit-Switched Technology / 11.1:
Voice Services with IMS Technology / 11.2:
MMTel / 11.3:
MMTel Architecture / 11.3.1:
VoLTE / 11.4:
T-ADS / 11.5:
Ensuring Service Coverage / 11.5.1:
Single Radio Voice Call Continuity (SRVCC) / 11.6:
Entities with Additional Functions to Support SRVCC / 11.6.1:
IMS Centralized Services (ICS) / 11.7:
Service Centralization and Continuity Application Server (SCC-AS) / 11.7.1:
SRVCC from E-UTRAN to GERAN or UTRAN / 11.7.2:
SRVCC from E-UTRAN to CDMA 1×RTT / 11.8:
Migration Paths and Coexistence of Circuit-Switched and VoLTE / 11.9:
EPS Emergency Bearer Service for IMS Emergency / 11.11:
Multimedia Priority Service (MPS) / 11.12:
LTE Broadcasting / Chapter 12:
Background and Main Concepts / 12.1:
MBMS Solution Overview / 12.2:
MBMS User Services / 12.3:
Associated Delivery Procedures / 12.3.1:
Mobile Network Architecture for MBMS / 12.4:
Interfaces / 12.4.1:
MBMS Bearer Services / 12.5:
Session Start / 12.5.1:
Session Stop / 12.5.2:
Session Update / 12.5.3:
Positioning / Chapter 13:
Positioning Solutions / 13.1:
Positioning Architecture and Protocols / 13.2:
Positioning Methods / 13.3:
Position-Reporting Formats / 13.4:
EPS Positioning Entities and Interfaces / 13.5:
GMLC / 13.5.1:
E-SMLC / 13.5.2:
SLP / 13.5.3:
Le Interface / 13.5.4:
SLg Interface / 13.5.5:
SLs Interface / 13.5.6:
LTE Positioning Protocol (LPP) / 13.5.7:
LTE Positioning Protocol Annex (LPPa) / 13.5.8:
Positioning Procedure / 13.6:
Offload Functions and Simultaneous Multi-Access / Chapter 14:
Offloading the 3GPP RAN - Simultaneous Multi-Access / 14.1:
Multi-Access PDN Connectivity (MAPCON) / 14.2.1:
LP Flow Mobility (LFOM) / 14.2.2:
Non-Seamless WLAN Offloading (NSWO) / 14.2.3:
Offloading the Core and Transport Network - Selected IP Traffic Offload (SLPTO) / 14.3:
Access to Local Networks - Local LP Access (LLPA) / 14.4:
The Nuts and Bolts of EPC / Part IV:
EPS Network Entities and Interfaces / Chapter 15:
Network Entities / 15.1:
eNodeB / 15.1.1:
Mobility Management Entity / 15.1.2:
Serving GW / 15.1.3:
PDN GW / 15.1.4:
Policy and Charging Rules Function / 15.1.5:
Home eNodeB Subsystem and Related Entities / 15.1.6:
Control Plane Between UE, eNodeB, and MME / 15.2:
S1-MME / 15.2.1:
GTP-Based Interfaces / 15.3:
Control Plane / 15.3.1:
MME↔MME(SIO) / 15.3.2:
MME↔Serving GW(S 11) / 15.3.3:
Serving GW↔PDN GW (S5/S8) / 15.3.4:
SGSN↔MME (S3) / 15.3.5:
SGSN↔Serving GW (S4) / 15.3.6:
SGSN↔SGSN (S16) / 15.3.7:
Trusted WLAN Access Network ↔ PDN GW (S2a) / 15.3.8:
ePDG PDN GW (S2b) / 15.3.9:
User Plane / 15.3.10:
eNodeB Serving GW (S1-U) / 15.3.11:
UE ↔ eNodeB Serving GW PDN GW (GTP-TJ) / 15.3.12:
UE ↔ BSS ↔ SGSN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.13:
UE ↔ UTRAN ↔ Serving GW ↔ PDN GW (GTP-U) / 15.3.14:
UE ↔ UTRAN ↔ SGSN Serving GW ↔ PDN GW (GTP-U) / 15.3.15:
UE ↔ Trusted WLAN Access Network ↔ PDN GW (GTP-U) / 15.3.16:
UE ↔ ePDG ↔ PDN GW (GTP-U) / 15.3.17:
PMLP-Based Interfaces / 15.4:
Serving GW-PDN GW (S5/S8) / 15.4.1:
Trusted Non-3GPP IP Access-PDN GW (S2a) / 15.4.2:
ePDG-PDN GW (S2b) / 15.4.3:
DSMLPv6-Based Interfaces / 15.5:
UE-PDN GW (S2c) / 15.5.1:
HSS-Related Interfaces and Protocols / 15.6:
MME-HSS (S6a) and SGSN-HSS (S6d) / 15.6.1:
AAA-Related Interfaces / 15.7:
AAA Server-HSS (SWx) / 15.7.1:
Trusted Non-3GPP Access-3GPP AAA Server/Proxy (STa) / 15.7.3:
Untrusted Non-3GPP BP Access-3GPP AAA Server/Proxy (SWa) / 15.7.4:
ePDG-3GPP AAA Server/Proxy (SWm) / 15.7.5:
PDN GW-3GPP AAA Server/Proxy (S6b) / 15.7.6:
3GPP AAA Proxy-3GPP AAA Server/Proxy (SWd) / 15.7.7:
PCC-Related Interfaces / 15.8:
PCEF-PCRF (Gx) / 15.8.1:
BBERF-PCRF (Gxa/Gxc) / 15.8.3:
PCRF-AE (Rx) / 15.8.4:
TDF-PCRF (Sd) / 15.8.5:
OCS-PCRF (Sy) / 15.8.6:
PCRF-PCRF (S9) / 15.8.7:
BPCF-PCRF (S9a) / 15.8.8:
SPR-PCRF(Sp) / 15.8.9:
EIR-Related Interfaces / 15.9:
MME-EIR and SGSN-EIR Interfaces (S13 and S13') / 15.9.1:
I-WLAN-Related Interfaces / 15.10:
UE-ePDG (SWu) / 15.10.1:
ANDSF-Related Interfaces / 15.11:
ISMP Policy Node / 15.11.1:
Discovery Information Node / 15.11.2:
UE Location Node / 15.11.3:
ISRP Node / 15.11.4:
Ext Node / 15.11.5:
HRPD IW-Related Interfaces / 15.12:
Optimized Handover and Related Interfaces (S101 and S103) / 15.12.1:
MME ↔ eHRPD Access Network (S101) / 15.12.2:
Serving GW ↔ HSGW (S103) / 15.12.3:
Interface to External Networks / 15.13:
Functions / 15.13.1:
CSS Interface / 15.14:
MME-CSS Interface (S7a) / 15.14.1:
Protocols / Chapter 16:
GPRS Tunneling Protocol Overview / 16.1:
Protocol Structure / 16.2.1:
Control Plane (GTPv2-C) / 16.2.2:
User Plane (GTPv1-U) / 16.2.3:
Protocol Format / 16.2.4:
Mobile IP / 16.3:
Host-Based and Network-Based Mobility Mechanisms / 16.3.1:
Basic Principles of Mobile IP / 16.3.3:
Mobile IPv6 Security / 16.3.4:
Packet Format / 16.3.5:
Dual-Stack Operation / 16.3.6:
Additional MLPv6 Features - Route Optimization / 16.3.7:
Proxy Mobile IPv6 / 16.4:
Basic Principles / 16.4.1:
PMLPv6 Security / 16.4.3:
PMLPv6 Packet Format / 16.4.4:
Diameter / 16.4.5:
Background / 16.5.1:
Diameter Nodes / 16.5.2:
Diameter Sessions, Connections, and Transport / 16.5.4:
Diameter Request Routing / 16.5.5:
Peer Discovery / 16.5.6:
Diameter Message Format / 16.5.7:
Generic Routing Encapsulation / 16.6:
Basic Protocol Aspects / 16.6.1:
GRE Packet Format / 16.6.3:
S1-AP / 16.7:
Non-Access Stratum (NAS) / 16.8:
EPS Mobility Management / 16.8.1:
EPS Session Management / 16.8.2:
Message Structure / 16.8.3:
Security-Protected NAS Messages / 16.8.4:
Message Transport / 16.8.5:
Future Extensions and Backward Compatibility / 16.8.6:
IP Security / 16.9:
Encapsulated Security Payload and Authentication Header / 16.9.1:
Internet Key Exchange / 16.9.3:
IKEv2 Mobility and Multi-Homing / 16.9.4:
Extensible Authentication Protocol / 16.10:
Overview / 16.10.1:
Protocol / 16.10.2:
Stream Control Transmission Protocol / 16.11:
Basic Protocol Features / 16.11.1:
Multi-Steaming / 16.11.3:
Multi-Homing / 16.11.4:
Packet Structure / 16.11.5:
Procedures / Chapter 17:
Attachment and Detachment for E-UTRAN / 17.1:
Attachment Procedure for E-UTRAN / 17.1.1:
Detachment Procedure for E-UTRAN / 17.1.2:
Tracking Area Update for E-UTRAN / 17.2:
Tracking Area Update Procedure / 17.2.1:
TA Update with MME Change / 17.2.2:
Service Request for E-UTRAN / 17.3:
UE Triggered Service Request / 17.3.1:
Network Triggered Service Request / 17.3.2:
Intra- and Inter-3GPP Access Handover / 17.4:
Phases of the Handover Procedures / 17.4.1:
Handover Cases in EPS for 3GPP Accesses / 17.4.2:
Handover within E-UTRAN Access / 17.4.3:
Handover between E-UTRAN and Other 3GPP Accesses (GERAN, UTRAN) with S4-SGSN / 17.4.4:
Handover for Gn/Gp-Based SGSN / 17.4.5:
Handover between GERAN and UTRAN Access Using S4 SGSN and GTP/PMTP Protocol / 17.4.6:
Bearer and QoS-Related Procedures / 17.5:
Bearer Procedures for E-UTRAN / 17.5.1:
Bearer Procedures for GERAN/UTRAN / 17.5.2:
Attachment and Detachment for Non-3GPP Accesses / 17.6:
Attachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.1:
Detachment Procedure in Trusted WLAN Access Network (TWAN) Using GTPv2 on S2a / 17.6.2:
Attachment Procedure in Untrusted Non-3GPP Access Using PMJPv6 (S2b) / 17.6.3:
Detachment Procedure in Untrusted Non-3GPP Access Using PMIPv6 (S2b) / 17.6.4:
Attachment Procedure in Trusted Non-3GPP Access Using DSMTPv6 (S2c) / 17.6.5:
Detachment Procedure in Trusted Non-3GPP Access Using DSMJPv6 (S2c) / 17.6.6:
Intersystem Handover Between 3GPP and Non-3GPP Accesses / 17.7:
Details of Handover in EPS with Non-3GPP Accesses / 17.7.1:
QoS-Related Procedures in Non-3GPP Accesses / 17.8:
Conclusion and Future of EPS / Part V:
Conclusions and Looking Ahead / Chapter 18:
Standards Bodies Associated with EPS / Appendix A:
References
Index
Foreword / Dr. Kalyani Bogineni
Preface / Dr. Ulf Nilsson
Acknowledgements
7.

電子ブック

EB
Hubregt J. Visser
出版情報: Wiley Online Library Online Books , Hoboken : John Wiley & Sons, 2012
所蔵情報: loading…
目次情報: 続きを見る
Preface
Acknowledgements
List of Abbreviations
Introduction / 1:
The Early History of Antennas / 1.1:
Antennas and Electromagnetic Radiation / 1.2:
Electromagnetic Radiation / 1.2.1:
Short Wire Dipole Radiation / 1.2.2:
The Modern History of Antennas / 1.3:
Frequency Spectrum and Antenna Types / 1.4:
Dipole Antennas / 1.4.1:
Loop Antennas / 1.4.2:
Aperture Antennas / 1.4.3:
Reflector Antennas / 1.4.4:
Array Antennas / 1.4.5:
Modem Antennas / 1.4.6:
Organization of the Book / 1.5:
Problems / 1.6:
References
Antenna System-Level Performance Parameters / 2:
Radiation Pattern / 2.1:
Field Regions / 2.1.1:
Three-Dimensional Radiation Pattern / 2.1.2:
Planar Cuts / 2.1.3:
Power Patterns / 2.1.4:
Directivity and Gain / 2.1.5:
Antenna Beamwidth / 2.1.6:
Antenna Impedance and Bandwidth / 2.2:
Polarization / 2.3:
Elliptical Polarization / 2.3.1:
Circular Polarization / 2.3.2:
Linear Polarization / 2.3.3:
Axial Ratio / 2.3.4:
Antenna Effective Area and Vector Effective Length / 2.4:
Effective Area / 2.4.1:
Vector Effective Length / 2.4.2:
Radio Equation / 2.5:
Radar Equation / 2.6:
Radar Cross-Section / 2.6.1:
Vector Analysis / 2.7:
Addition and Subtraction / 3.1:
Products / 3.2:
Scalar Product or Dot Product / 3.2.1:
Vector Product or Cross Product / 3.2.2:
Triple Product / 3.2.3:
Differentiation / 3.3:
Gradient / 3.3.1:
Divergence / 3.3.2:
Curl / 3.3.3:
Radiated Fields / 3.4:
Maxwell Equations / 4.1:
Vector Potential / 4.2:
Far-Field Approximations / 4.3:
Magnetic Field / 4.3.1:
Electric Field / 4.3.2:
Reciprocity / 4.4:
Lorentz Reciprocity Theorem / 4.4.1:
Antenna Reciprocity / 4.4.2:
Elementary Dipole / 4.5:
Radiation / 5.1.1:
Input Impedance / 5.1.2:
Non-Infinitesimal Dipole Antenna / 5.2:
Printed Monopole and Inverted-F Antennas / 5.2.1:
Application of Theory / 5.3.1:
Planar Monopole Antenna Design / 5.3.2:
Printed UWB Antenna Design / 5.3.3:
Miniature Monopole with Cable Current Suppression / 5.3.4:
Inverted-F Antenna Design / 5.3.5:
General Constant Current Loop / 5.4:
Small Loop Antenna / 6.1.1:
Comparison of Short Dipole and Small Loop Antenna / 6.1.4:
Printed Loop Antenna / 6.2:
Design of a Printed Loop Antenna / 6.2.1:
Magnetic Sources / 6.3:
Uniqueness Theorem / 7.2:
Equivalence Principle / 7.3:
Uniform Distribution in a Rectangular Aperture / 7.4:
Uniform Distribution in a Circular Aperture / 7.6:
Microstrip Antennas / 7.7:
Design of a Linearly Polarized Microstrip Antenna / 7.7.1:
Design of a Circularly Polarized Microstrip Antenna / 7.7.3:
A Linear Array of Non-Isotropic Point-Source Radiators / 7.8:
Array Factor / 8.2:
Side Lobes and Grating Lobes / 8.3:
Side-Lobe Level / 8.3.1:
Grating Lobes / 8.3.2:
Linear Phase Taper / 8.4:
Special Topics / 8.5:
Mutual Coupling / 8.6.1:
Antenna Diversity / 8.6.2:
Sequential Rotation and Phasing / 8.6.3:
Array Antenna Design / 8.7:
Theory / 8.7.1:
A Linear Microstrip Patch Array Antenna / 8.7.2:
Effective Aperture and Directivity / 8.8:
Vector Formulas / Appendix B:
Complex Analysis / Appendix C:
Complex Numbers / C.1:
Use of Complex Variables / C.2:
Physical Constants and Material Parameters / Appendix D:
Two-Port Network Parameters / Appendix E:
Transmission Line Theory / Appendix F:
Distributed Parameters / F.1:
Guided Waves / F.2:
VSWR and Reflection Factor / F.2.1:
Impedance and Relative Impedance / F.2.2:
Input Impedance of a Transmission Line / F.3:
Terminated Lossless Transmission Line / F.4:
Matched Load / F.4.1:
Short Circuit / F.4.2:
Open Circuit / F.4.3:
Imaginary Unit Termination / F.4.4:
Real Termination / F.4.5:
Quarter Wavelength Impedance Transformer / F.5:
Coplanar Waveguide (CPW) / Appendix G:
Index
Preface
Acknowledgements
List of Abbreviations
8.

電子ブック

EB
Gautam Shroff
出版情報: Cambridge University Press Online Books , Leiden : Cambridge University Press, 2010
所蔵情報: loading…
目次情報: 続きを見る
Preface
Computing Platforms / Part I:
Enterprise computing: a retrospective / 1:
The internet as a platform / 2:
Software as a service and cloud computing / 3:
Enterprise architecture: role and evolution / 4:
Cloud Platforms / Part II:
Cloud computing platforms / 5:
Cloud computing economics / 6:
Cloud Technologies / Part III:
Web services, AJAX and mashups / 7:
Virtualization technology / 8:
Multi-tenant software / 9:
Cloud Development / Part IV:
Data in the cloud / 10:
MapReduce and extensions / 11:
Dev 2.0 platforms / 12:
Software Architecture / Part V:
Enterprise software: ERP, SCM, CRM / 13:
Custom enterprise applications and Dev 2.0 / 14:
Workflow and business processes / 15:
Enterprise analytics and search / 16:
Enterprise Cloud Computing / Part VI:
Enterprise cloud computing ecosystem / 17:
Roadmap for enterprise cloud computing / 18:
List of abbreviations
References
Index
Preface
Computing Platforms / Part I:
Enterprise computing: a retrospective / 1:
9.

電子ブック

EB
Tammy Noergaard
出版情報: Elsevier ScienceDirect Books Complete , Newnes, 2013
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Acknowledgments
About the Author
Introduction to Embedded Systems / Section I:
A Systems Engineering Approach to Embedded Systems Design / Chapter 1:
Know Your Standards / Chapter 2:
Embedded Hardware / Section II:
Embedded Hardware Building Blocks and the Embedded Board / Chapter 3:
Embedded Processors / Chapter 4:
Board Memory / Chapter 5:
Board I/O (Input/Output) / Chapter 6:
Board Buses / Chapter 7:
Embedded Software Introduction / Section III:
Device Drivers / Chapter 8:
Embedded Operating Systems / Chapter 9:
Middleware and Application Software / Chapter 10:
Putting It All Together: Design and Development / Section IV:
Defining the System-Creating the Architecture and Documenting the Design / Chapter 11:
The Final Phases of Embedded Design: Implementation and Testing / Chapter 12:
Projects and Exercises / Appendix A:
Schematic Symbols / Appendix B:
Acronyms and Abbreviations / Appendix C:
Glossary / Appendix D:
Index
What's on the CD-ROM
Foreword
Acknowledgments
About the Author
10.

電子ブック

EB
Bruno Clerckx, Claude Oestges
出版情報: Elsevier ScienceDirect Books Complete , Academic Press, 2013
所蔵情報: loading…
目次情報: 続きを見る
Introduction to multi-antenna communications / Chapter 1:
From Multi-Dimensional Propagation to Multi-Link MIMO Channels / Chapter 2:
Analytical MIMO Channel Representations For System Design / Chapter 3:
Physical MIMO Channel Models For Performance Simulation / Chapter 4:
Mutual information and capacity of real-world random MIMO channels / Chapter 5:
Space-time coding over i.i.d. Rayleigh flat fading channels / Chapter 6:
MIMO Detection Fundamentals / Chapter 7:
Error probability in real-world MIMO channels / Chapter 8:
Space-time coding over real-world MIMO channels with no transmit channel knowledge / Chapter 9:
Space-time coding with Partial transmit channel knowledge / Chapter 10:
Space-time coding for frequency selective channels / Chapter 11:
Multi-user MIMO / Chapter 12:
Cooperative Multi-Cell MIMO: an Overview / Chapter 13:
Cooperative Multi-Cell MIMO with no Data Sharing / Chapter 14:
Cooperative Multi-Cell MIMO with Data Sharing / Chapter 15:
MIMO in LTE and WiMAX / Chapter 16:
MIMO System Level Evaluation / Chapter 17:
Introduction to multi-antenna communications / Chapter 1:
From Multi-Dimensional Propagation to Multi-Link MIMO Channels / Chapter 2:
Analytical MIMO Channel Representations For System Design / Chapter 3:
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼