December 25, 2009
Ebook – Evolution of 3G Networks
source : http://www.springerlink.com/content/978-3-211-09439-6
Table of Content :
- Mobile Networks Evolution
- Architectre of The Evolved 3GPP System
- Main Concepts
- Functions and Procedures of the Evolved 3GPP System
- Protocol Environment
December 18, 2009
Source : http://www.wsnblog.com/2009/12/09/lecture-slides-for-6lowpan-released/
The companion lecture slides for 6LoWPAN: The Wireless Embedded Internet have now been released on The Book page of 6lowpan.net. This first part of the book’s course material includes a suggested course syllabus, and 115 of lecture slides in both PowerPoint and PDF formats. This overview of the book is a good tool for lecturers, students and professionals alike. The slides have been released under a creative commons by-nc-sa license to encourage re-use. The companion exercise slides for Contiki are planned for release in the near future.
July 23, 2009
Although my research focus on IEEE 802.15.4, this book is a good reference to understand ZigBee.
source : http://www.sciencedirect.com
This book is designed to be read from cover-to-cover, tutorial style. Each chapter introduces concepts that are used in later chapters. However, the reader is encouraged to skip ahead if the concepts of any section are already familiar. To keep the reader oriented in each section, some overlap is necessary.
While it is not required, it is helpful to have the ZigBee and IEEE 802.15.4 specifications available when reading this book. I’ll sometimes refer to a section or a concept in those specifications for further reading.
To obtain the ZigBee specification, go to http://www.zigbee.org and click on “Download the Specification.” It is free, and comes in PDF format.
Go to http://standards.ieee.org/getieee802/802.15.html and select “IEEE 802.15.2-2003” to obtain the 802.15.4 standard in PDF format. There is a new draft standard, IEEE 802.15.2-2006, but ZigBee does not currently use that specification.
Read the rest of this entry »
June 7, 2007
The computer hacker has been depicted in the popular press as a socially maladjusted teenager whose goal is to wreak malicious havoc on unsuspecting computer users. In the culture of the computer programmer however, the hacker takes on a far different aspect. The true hacker is raised to heroic status with tales of amazing feats circulated through computer networks in the form of stories and legends. In this paper I discuss the persona of the true hacker, illustrated using hacker legends collected from the Internet.
June 7, 2007
Originally, a hacker was someone who makes furniture with an axe. In those days, nails were hard to come by (they had to be made, one by one, by a blacksmith), screws did not exist, and saws were only used to slice trees into beams and planks. A carpenter would use an axe to hack wood in to table legs or so, and to shape the parts in such a way that they could be joint together with glue. This takes quite some skill.
When I was working in Azerbaidjan in 1997, there was a carpenter, Ali, who stll worked that way, and the beds, tables and cabinets he made were better, stronger than those of his younger colleagues, who used more modern techniques. They also had a rough kind of beauty to them. Ali was a hacker.
Hacking is about skill, competence, excellence. The term ‘hacker’ got a new meaning when computer technology began to evolve. It dates back to the first time-sharing minicomputers and the earliest ARPAnet experiments. (The ARPAnet was the seed from which the internet grew.) Hackers built the Internet. Hackers made the Unix operating system what it is today. Hackers make the World Wide Web work.
Read More :