Mobile phone technology Books

54 products


  • The One Device

    Transworld Publishers Ltd The One Device

    1 in stock

    Book SynopsisThe secret history of the invention that changed everything and became the most profitable product in the world.Odds are that as you read this, an iPhone is within reach. But before Steve Jobs introduced us to ''the one device'', as he called it, a mobile phone was merely what you used to make calls on the go.How did the iPhone transform our world and turn Apple into the most valuable company ever? Veteran technology journalist Brian Merchant reveals the inside story you won''t hear from Cupertino - based on his exclusive interviews with the engineers, inventors and developers who guided every stage of the iPhone''s creation.This deep dive takes you from inside 1 Infinite Loop to nineteenth-century France to WWII America, from the driest place on earth to a Kenyan pit of toxic e-waste, and even deep inside Shenzhen''s notorious ''suicide factories''. It''s a first-hand look at how the cutting-edge tech that makes the world work - touch screens, Trade ReviewA road map for design and engineering genius, an anthropology of the modern age and an unprecedented view into one of the most secretive companies in history. * Financial Times *Merchant tells a far richer story than I — having covered Apple for years as a journalist — have seen before. -- Lev Grossman * New York Times *The best account of the contemporary world’s single greatest technological miracle. * Bloomberg, Must Reads of 2017 *Brian Merchant is a lovely writer... formidable... fascinating. -- Hugo Rifkind * The Times *A remarkable tale... the story it tells is compelling, even addictive - almost as addictive as the iPhone itself * The Wall Street Journal *Delivers its quota of compelling anecdotes... Merchant's investigations have great depth... I have no doubt this book will fly off the shelves. * Evening Standard *A deep dive into the decisions and breakthroughs behind the development of the historic smartphone. * Business Insider, Best Business Books of 2017 *Brian Merchant’s The One Device dives deep into the making of Apple’s iPhone on its 10th anniversary, and [analyses] the implications of this worldchanging innovation. -- Andrew Hill * FT Business Book of the Year 2017 *Apple's culture of reverence and secrecy is no match for Brian Merchant in The One Device. * New York Times Book Review *In terms of breath and depth of research, The One Device is impressive. * Irish Times *A wild ride * San Francisco Chronicle *The One Device is a tour de force. Brian Merchant has dug into the iPhone like no other reporter before him, travelling the world to find the untold stories behind the device’s creation and to uncover the very real human costs that come with making the iPhone. Packed with vivid detail, the book carries the reader from one unexpected revelation to the next with a fast-paced edge and heaps of analytical insight. -- Ashlee Vance, New York Times bestselling author of Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future

    1 in stock

    £11.69

  • AAA and Network Security for Mobile Access

    John Wiley & Sons Inc AAA and Network Security for Mobile Access

    15 in stock

    Book SynopsisAAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations. AAA and Network Security for Mobile Access: Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment. Discusses public key infrastructures and provides practical tips on certificates management. Introduces Diameter, a state-of-the-art AAA protocol designed to meet today's reliability, security and robustneTrade Review"…serves to provide planners and researchers in both academic and professional capacities a way in which to completely access pertinent data in a logical and clearly defined manner." (Electric Review, September/October 2006)Table of ContentsForeword xv Preface xvii About the Author xxi Chapter 1 The 3 “A”s: Authentication, Authorization, Accounting 1 1.1 Authentication Concepts 1 1.1.1 Client Authentication 2 1.1.2 Message Authentication 4 1.1.3 Mutual Authentication 5 1.1.4 Models for Authentication Messaging 6 1.1.5 AAA Protocols for Authentication Messaging 7 1.2 Authorization 8 1.2.1 How is it Different from Authentication? 8 1.2.2 Administration Domain and Relationships with the User 9 1.2.3 Standardization of Authorization Procedures 10 1.3 Accounting 13 1.3.1 Accounting Management Architecture 13 1.3.2 Models for Collection of Accounting Data 15 1.3.3 Accounting Security 17 1.3.4 Accounting Reliability 17 1.3.5 Prepaid Service: Authorization and Accounting in Harmony 19 1.4 Generic AAA Architecture 19 1.4.1 Requirements on AAA Protocols Running on NAS 21 1.5 Conclusions and Further Resources 23 1.6 References 23 Chapter 2 Authentication 25 2.1 Examples of Authentication Mechanisms 25 2.1.1 User Authentication Mechanisms 26 2.1.2 Example of Device Authentication Mechanisms 31 2.1.3 Examples of Message Authentication Mechanisms 33 2.2 Classes of Authentication Mechanisms 36 2.2.1 Generic Authentication Mechanisms 41 2.3 Further Resources 44 2.4 References 45 Chapter 3 Key Management Methods 47 3.1 Key Management Taxonomy 47 3.1.1 Key Management Terminology 47 3.1.2 Types of Cryptographic Algorithms 49 3.1.3 Key Management Functions 50 3.1.4 Key Establishment Methods 51 3.2 Management of Symmetric Keys 54 3.2.1 EAP Key Management Methods 54 3.2.2 Diffie–Hellman Key Agreement for Symmetric Key Generation 58 3.2.3 Internet Key Exchange for Symmetric Key Agreement 61 3.2.4 Kerberos and Single Sign On 62 3.2.5 Kerberized Internet Negotiation of Keys (KINK) 66 3.3 Management of Public Keys and PKIs 67 3.4 Further Resources 68 3.5 References 69 Chapter 4 Internet Security and Key Exchange Basics 71 4.1 Introduction: Issues with Link Layer-Only Security 71 4.2 Internet Protocol Security 73 4.2.1 Authentication Header 74 4.2.2 Encapsulating Security Payload 74 4.2.3 IPsec Modes 75 4.2.4 Security Associations and Policies 77 4.2.5 IPsec Databases 78 4.2.6 IPsec Processing 78 4.3 Internet Key Exchange for IPsec 79 4.3.1 IKE Specifications 79 4.3.2 IKE Conversations 81 4.3.3 ISAKMP: The Backstage Protocol for IKE 83 4.3.4 The Gory Details of IKE 86 4.4 Transport Layer Security 91 4.4.1 TLS Handshake for Key Exchange 93 4.4.2 TLS Record Protocol 95 4.4.3 Issues with TLS 96 4.4.4 Wireless Transport Layer Security 96 4.5 Further Resources 96 4.6 References 97 Chapter 5 Introduction on Internet Mobility Protocols 99 5.1 Mobile IP 99 5.1.1 Mobile IP Functional Overview 102 5.1.2 Mobile IP Messaging Security 107 5.2 Shortcomings of Mobile IP Base Specification 109 5.2.1 Mobile IP Bootstrapping Issues 110 5.2.2 Mobile IP Handovers and Their Shortcomings 113 5.3 Seamless Mobility Procedures 117 5.3.1 Candidate Access Router Discovery 118 5.3.2 Context Transfer 120 5.4 Further Resources 125 5.5 References 126 Chapter 6 Remote Access Dial-In User Service (RADIUS) 127 6.1 RADIUS Basics 127 6.2 RADIUS Messaging 128 6.2.1 Message Format 129 6.2.2 RADIUS Extensibility 130 6.2.3 Transport Reliability for RADIUS 130 6.2.4 RADIUS and Security 131 6.3 RADIUS Operation Examples 135 6.3.1 RADIUS Support for PAP 135 6.3.2 RADIUS Support for CHAP 136 6.3.3 RADIUS Interaction with EAP 138 6.3.4 RADIUS Accounting 139 6.4 RADIUS Support for Roaming and Mobility 141 6.4.1 RADIUS Support for Proxy Chaining 142 6.5 RADIUS Issues 143 6.6 Further Resources 144 6.6.1 Commercial RADIUS Resources 144 6.6.2 Free Open Source Material 145 6.7 References 145 Chapter 7 Diameter: Twice the RADIUS? 147 7.1 Election for the Next AAA Protocol 147 7.1.1 The Web of Diameter Specifications 148 7.1.2 Diameter Applications 151 7.1.3 Diameter Node Types and their Roles 152 7.2 Diameter Protocol 153 7.2.1 Diameter Messages 153 7.2.2 Diameter Transport and Routing Concepts 157 7.2.3 Capability Negotiations 159 7.2.4 Diameter Security Requirements 160 7.3 Details of Diameter Applications 162 7.3.1 Accounting Message Exchange Example 162 7.3.2 Diameter-Based Authentication, NASREQ 163 7.3.3 Diameter Mobile IP Application 167 7.3.4 Diameter EAP Support 167 7.4 Diameter Versus RADIUS: A Factor 2? 168 7.4.1 Advantages of Diameter over RADIUS 168 7.4.2 Issues with Use of Diameter 170 7.4.3 Diameter-RADIUS Interactions (Translation Agents) 171 7.5 Further Resources 172 7.6 References 172 Chapter 8 AAA and Security for Mobile IP 175 8.1 Architecture and Trust Model 177 8.1.1 Timing Characteristics of Security Associations 178 8.1.2 Key Delivery Mechanisms 181 8.1.3 Overview of Use of Mobile IP-AAA in Key Generation 182 8.2 Mobile IPv4 Extensions for Interaction with AAA 184 8.2.1 MN-AAA Authentication Extension 184 8.2.2 Key Generation Extensions (IETF work in progress) 186 8.2.3 Keys to Mobile IP Agents? 187 8.3 AAA Extensions for Interaction with Mobile IP 187 8.3.1 Diameter Mobile IPv4 Application 188 8.3.2 Radius and Mobile IP Interaction: A CDMA2000 Example 196 8.4 Conclusion and Further Resources 200 8.5 References 201 Chapter 9 PKI: Public Key Infrastructure: Fundamentals and Support for IPsec and Mobility 203 9.1 Public Key Infrastructures: Concepts and Elements 204 9.1.1 Certificates 204 9.1.2 Certificate Management Concepts 205 9.1.3 PKI Elements 209 9.1.4 PKI Management Basic Functions 210 9.1.5 Comparison of Existing PKI Management Protocols 212 9.1.6 PKI Operation Protocols 221 9.2 PKI for Mobility Support 222 9.2.1 Identity Management for Mobile Clients: No IP Addresses! 222 9.2.2 Certification and Distribution Issues 225 9.3 Using Certificates in IKE 227 9.3.1 Exchange of Certificates within IKE 229 9.3.2 Identity Management for ISAKMP: No IP Address, Please! 231 9.4 Further Resources 232 9.5 References 232 9.6 Appendix A PKCS Documents 233 Chapter 10 Latest Authentication Mechanisms, EAP Flavors 235 10.1 Introduction 235 10.1.1 EAP Transport Mechanisms 237 10.1.2 EAP over LAN (EAPOL) 237 10.1.3 EAP over AAA Protocols 238 10.2 Protocol Overview 239 10.3 EAP-XXX 242 10.3.1 EAP-TLS (TLS over EAP) 244 10.3.2 EAP-TTLS 248 10.3.3 EAP-SIM 257 10.4 Use of EAP in 802 Networks 259 10.4.1 802.1X Port-Based Authentication 259 10.4.2 Lightweight Extensible Authentication Protocol (LEAP) 260 10.4.3 PEAP 262 10.5 Further Resources 262 10.6 References 263 Chapter 11 AAA and Identity Management for Mobile Access: The World of Operator Co-Existence 265 11.1 Operator Co-existence and Agreements 265 11.1.1 Implications for the User 266 11.1.2 Implications for the Operators 267 11.1.3 Bilateral Billing and Trust Agreements and AAA Issues 269 11.1.4 Brokered Billing and Trust Agreements 272 11.1.5 Billing and Trust Management through an Alliance 274 11.2 A Practical Example: Liberty Alliance 275 11.2.1 Building the Trust Network: Identity Federation 276 11.2.2 Support for Authentication/Sign On/Sign Off 279 11.2.3 Advantages and Limitations of the Liberty Alliance 282 11.3 IETF Procedures 283 11.4 Further Resources 285 11.5 References 285 Index 287

    15 in stock

    £91.76

  • GSM  Architecture Protocols and Services

    John Wiley & Sons Inc GSM Architecture Protocols and Services

    15 in stock

    Book SynopsisA comprehensive updated overview on the current status and future of GSM. Fills the need for a revised edition that covers the advances made in the technology in this time. Focuses on recent developments in high speed circuit switched data service (HSCD), enhanced data rates for GSM revolution (EDGE) technologies and new services e.g.Table of ContentsPreface. 1. Introduction. 1.1. The idea of unbounded communication. 1.2. The success of GSM. 1.3. Classification of mobile communication systems 1.4. Some history of statistics of GSM. 1.5. Overview of the book. 2. The mobile radio channel and the cellular principle. 2.1. Characteristics of the mobile radio channel. 2.2. Separation of directions and duplex transmission. 2.3. Multiple access. 2.4. Cellular principle. 3. System architecture and addressing. 3.1. System architecture. 3.2. The SIM concept. 3.3. Addressing. 3.4. Registers and subscriber data. 3.5. Network interfaces and configurations. 4. Air interface - physical layer. 4.1. Logical channels. 4.2. Physical channels. 4.3. Synchronization. 4.4. Mapping of logical onto physical channels. 4.5. Radio subsystem link control. 4.6. Channel coding, source coding and speech processing. 4.7. Source coding and speech processing. 4.8. Channel coding. 4.9. Power-up scenario. 5. Protocols. 5.1. Protocols architrecutre planes. 5.2. Protocol architecture of the user plane. 5.3. Protocol architecture of the signaling plane. 5.4. Signaling at the air interface (Um). 5.5. Signaling at the A and Abis interfaces. 5.6. Security-related network functions: authentication and encryption. 5.7. Signaling at the user interface. 6. Roaming an handover. 6.1. Mobile application part interfaces. 6.2. Location registration and location update. 6.3. Connection estalishment and termination. 6.4. Handover. 7. Services. 7.1. Classical GSM services. 7.2. Popular GSM services: SMS and MMS. 7.3. Overviwe of GSM services in Phase 2+. 7.4. Bearer and teleservices of GSM Phase 2+. 7.5. Supplementary services in GSM Phase 2+. 7.6. Service platforms. 7.7. Wireless application protocol. 8. Improved data services in GSM: GPRS, HSCSD and EDGE. 8.1. GPRS. 8.2. HSCSD. 8.3. EDGE. 9. Beyond GSM and MTS: 4G Appendices. A. Data communication and networking. B. Aspects of network operation. C. GSM Addresses. D. List of Acronyms. References. Index.

    15 in stock

    £89.06

  • The 3g IP Multimedia Subsystem Ims

    John Wiley & Sons Inc The 3g IP Multimedia Subsystem Ims

    15 in stock

    Book SynopsisThird edition of this best-selling guide to IMS: fully revised, and updated with brand new material The IMS (IP Multimedia Subsystem) is the technology that merges the Internet with the cellular world. It makes Internet technologies such as the web, email, instant messaging, presence, and videoconferencing available nearly everywhere at any time. The third edition of this bestselling book is fully updated and provides comprehensively expanded content, including new chapters on emergency calls and on Voice Call Continuity (VCC). As well as this, The 3G IP Multimedia Subsystem (IMS) presents updated material including a comprehensive picture of Session Initiation Protocol (SIP) as well as its applicability to IMS. As most of the protocols have been designed in the IETF, this book explains how the IETF developed these protocols and describes how these protocols are used in the IMS architecture. This is an indispensable guide for engineers, programmers, business maTable of ContentsForeword by Stephen Hayes. Foreword by Allison Mankin and Jon Peterson. Preface to the Third Edition. Preface to the Second Edition. Preface to the First Edition. Acknowledgements. Part I Introduction to the IMS. IMS Vision: Where Do We Want to Go? 1.1 The Internet. 1.2 The Cellular World. 1.3 Why do we need the IMS? 1.4 Relation between IMS and non-IMS Services. 2 The History of the IMS Standardization. 2.1 Relations between IMS-related Standardization Bodies. 2.3 Third Generation Partnership Project. 2.4 Third Generation Partnership Project 2. 2.5 IETF-3GPP/3GPP2 Collaboration. 2.6 Open Mobile Alliance. 3 General Principles of the IMS Architecture. 3.1 From Circuit-switched to Packet-switched. 3.2 IMS Requirements. 3.3 Overview of Protocols used in the IMS. 3.4 Overview of IMS Architecture. 3.5 Identification in the IMS. 3.6 SIM, USIM, and ISIM in 3GPP. 3.7 Next Generation Networks (NGN). Part II The Signaling Plane in the IMS. 4 Session Control on the Internet. 4.1 SIP Functionality. 4.2 SIP Entities. 4.3 Message Format. 4.4 The Start Line in SIP Responses: the Status Line. 4.5 The Start Line in SIP Requests: the Request Line. 4.6 Header Fields. 4.7 Message Body. 4.8 SIP Transactions. 4.9 Message Flow for Session Establishment. 4.10 SIP Dialogs. 4.11 Extending SIP. 4.12 Caller Preferences and User Agent Capabilities. 4.13 Reliability of Provisional Responses. 4.14 Preconditions. 4.15 Event Notification. 4.16 Signaling Compression. 4.17 Content Indirection. 4.18 The REFER Method. 4.19 Globally Routable User- Agent URIs (GRUU). 4.20 NAT Traversal. 5 Session Control in the IMS. 5.1 Prerequisites for Operation in the IMS. 5.2 IPv4 and IPv6 in the IMS. 5.3 IP Connectivity Access Network. 5.4 P-CSCF Discovery. 5.5 IMS-level Registration. 5.6 Subscription to the reg Event State. 5.7 Basic Session Setup. 5.8 Application Servers: Providing Services to Users. 5.9 Changes due to Next Generation Networks (NGN). 5.10 Interworking. 5.11 Combinational Services. 5.12 Basic Sessions not Requiring Resource Reservation. 5.13 Globally Routable User-Agent URI (GRUU) in IMS. 5.14 IMS Communication Services Identification (ICSI). 5.15 IMS Application Reference Identifier (IARI). 5.16 NAT Traversal in the IMS. 6 AAA on the Internet. 6.1 Authentication, Authorization, and Accounting. 6.2 AAA Framework on the Internet. 6.3 The Diameter Protocol. 7 AAA in the IMS. 7.1 Authentication and Authorization in the IMS. 7.2 he Cx and Dx Interfaces. 7.3 The Sh Interface. 7.4 Accounting. 8 Policy and Charging Control in the IMS. 8.1 PCC Architecture. 8.2 Charging Architecture. 8.3 Offline Charging Architecture. 8.4 Online Charging Architecture. 9 Quality of Service on the Internet. 9.1 Integrated Services. 9.2 Differentiated Services. 10 Quality of Service in the IMS. 10.1 Policy Control and QoS. 10.2 Instructions to Perform Resource Reservations. 10.3 Reservations by the Terminals. 10.4 QoS in the Network. 11 Security on the Internet. 11.1 HTTP Digest Access Authentication. 11.2 Certificates. 11.3 TLS. 11.4 S/MIME. 11.5 Authenticated Identity Body. 11.6 IPsec. 11.7 Privacy. 11.8 Encrypting Media Streams. 12 Security in the IMS. 12.1 Access Security. 12.2 Network Security. 13 Emergency Calls on the Internet. 13.1 Introduction. 13.2 Location Acquisition. 13.3 Identifying Emergency Calls. 13.4 Locating the closest PSAP. 14 Emergency Calls in the IMS. 14.1 Architecture for Supporting Emergency Calls in IMS. 14.2 Establishing an Emergency Call in IMS. 14.3 IMS Registration for Emergency Calls. 14.4 Call back from PSAP to user. 14.5 Anonymous calls. 14.6 Emergency Calls in Fixed Broadband Accesses. Part III The Media Plane in the IMS. 15 Media Encoding. 15.1 Speech Encoding. 15.2 Video Encoding. 15.3 Text Encoding. 15.4 Mandatory Codecs in the IMS. 16 Media Transport. 16.1 Reliable Media Transport. 16.2 Unreliable Media Transport. 16.3 Media Transport in the IMS. Part IV Building Services with the IMS. 17 Service Configuration on the Internet. 17.1 The XML Configuration Access Protocol (XCAP). 17.2 An Overview of XML. 17.3 HTTP URIs that Identify XCAP Resources. 17.4 XCAP operations. 17.5 Entity Tags and Conditional Operations. 17.6 Subscriptions to Changes in XML Documents. 17.7 XML Patch Operations. 18 Service Configuration in the IMS. 18.1 XDM architecture. 18.2 Downloading an XML document, attribute, or element. 18.3 Directory Retrieval. 18.4 Data Search with XDM. 18.5 Subscribing to Changes in XML Documents. 19 The Presence Service on the Internet. 19.1 Overview of the Presence Service. 19.2 The Presence Life Cycle. 19.3 Presence Subscriptions and Notifications. 19.4 Presence Publication. 19.5 Presence Information Data Format (PIDF). 19.6 The Presence Data Model for SIP. 19.7 Mapping the SIP Presence Data Model to the PIDF. 19.8 Rich Presence Information Data Format. 19.9 CIPID. 19.10 Timed Presence Extension to the PIDF. 19.11 Presence Capabilities. 19.12 Geographical Location in Presence. 19.13 Watcher Information. 19.14 Watcher Authorization: Presence Authorization Rules. 19.15 URI-list Services and Resource Lists. 19.16 Presence Optimizations. 20 The Presence Service in the IMS. 20.1 The Foundation of Services. 20.2 Presence Architecture in the IMS. 20.3 Presence Publication. 20.4 Watcher Subscription. 20.5 Watcher Information and Authorization of Watchers. 20.6 Presence Optimizations. 20.7 OMA extensions to PIDF. 21 Instant Messaging on the Internet. 21.1 The im URI. 21.2 Modes of Instant Messages. 21.3 Pager-mode Instant Messaging. 21.4 Session-based Instant Messaging. 21.5 The “isComposing” Indication. 21.6 Messaging Multiple Parties. 21.7 File Transfer. 22 The Instant Messaging Service in the IMS. 22.1 Pager-mode Instant Messaging in the IMS. 22.2 Pager-mode Instant Messaging to Multiple Recipients. 22.3 Session-based Instant Messaging in the IMS. 22.4 File Transfer. 23 Conferencing on the Internet. 23.1 Conferencing Standardization at the IETF. 23.2 The SIPPING Conferencing Framework. 23.3 The XCON Conferencing Framework. 23.4 The Binary Floor Control Protocol (BFCP). 24 Conferencing in the IMS. 24.1 The IMS Conferencing Service. 24.2 Relation with the work in TISPAN and OMA. 25 Push-to-Talk over Cellular. 25.1 PoC Standardization. 25.2 IETF Work Relevant to PoC. 25.3 Architecture. 25.4 Registration. 25.5 PoC Server Roles. 25.6 PoC Session Types. 25.7 Adding Users to a PoC Session. 25.8 Group Advertisements. 25.9 Session Establishment Types. 25.10 Answer Modes. 25.11 Right-to-send-media Indication Types. 25.12 Participant Information. 25.13 Barring and Instant Personal Alerts. 25.14 Full Duplex Call Follow on. 25.15 The User Plane. 25.16 Simultaneous PoC Sessions. 25.17 Charging in PoC. 26 Multimedia Telephony Services: PSTN/ISDN Simulation Services. 26.1 Providing Audible Announcements. 26.2 Communication Diversion (CDIV). 26.3 Communication Diversion Notification (CDIVN). 26.4 Conference (CONF). 26.5 Message Waiting Indication (MWI). 26.6 OIP and OIR. 26.7 TIP and TIR. 26.8 ACRACR and CB. 26.9 Advice of Charge (AoC). 26.10 CCBS and CCNR. 26.11 Malicious Communication Identification (MCID). 26.12 Communication Hold (HOLD). 26.13 Explicit Communication Transfer (ECT). 26.14 User Settings in PSTN/ISDN Simulation Services. 27 Voice Call Continuity (VCC). 27.1 Overview of Voice Call Continuity. 27.2 VCC architecture. 27.3 Registration. 27.4 Call origination and anchoring. 27.5 Call termination and anchoring. 27.6 Domain Transfer. Appendix A List of IMS-related Specifications. A.1 Introduction. A.2 3GPP Specifications. A.3 ETSI NGN Specifications. A.4 OMA Specifications. References. Index.

    15 in stock

    £91.76

  • IP Telephony

    John Wiley & Sons Inc IP Telephony

    10 in stock

    Book SynopsisAll you need to know about deploying VoIP protocols in one comprehensive and highly practical reference - Now updated with coverage on SIP and the IMS infrastructure This book provides a comprehensive and practical overview of the technology behind Internet Telephony (IP), providing essential information to Network Engineers, Designers, and Managers who need to understand the protocols. Furthermore, the author explores the issues involved in the migration of existing telephony infrastructure to an IP - based real time communication service. Assuming a working knowledge of IP and networking, it addresses the technical aspects of real-time applications over IP. Drawing on his extensive research and practical development experience in VoIP from its earliest stages, the author provides an accessible reference to all the relevant standards and cutting-edge techniques in a single resource. Key Features: Updated with a chapter on SIP and theTrade Review Table of ContentsContents Abbreviations Glossary Preface 1 Voice over multimedia 1.1Transporting voice, fax and video over a packet network 1.2Encoding media streams 2 H.323: Packet-based Multimedia Communications Systems 2.1 Introduction 2.2 H.323 step by step 2.3 Optimizing and enhancing H.323 2.4 Conferencing with H.323 2.5 Directories and numbering 2.6 H.323 security 2.7 Supplementary services 2.8Future work on H.323 3 Session Initiation Protocol 3.1. The origin and purpose of SIP 3.2. From RFC 2543 To RFC 3261 3.3. Overview of a simple SIP call 3.4. Call handling services with SIP 3.5. SIP security 3.6. Instant messaging (IM) and presence 4 The 3GPP IP Multimedia Subsystem (IMS) architecture 4.1. Introduction 4.2. Overview of the IMS architecture 4.3. The IMS CSCFs 4.4. The full picture : 3GPP release 8, TISPAN 5 The Media Gateway to Media Controller Protocol (MGCP) 5.1Introduction:why MGCP? 5.2 MGCP 1.0 5.3 Sample MGCP call flows 5.4 The future of MGCP 6 Advanced Topics: Call Redirection 6.1CallredirectioninVoIPnetworks 7 Advanced Topics: NAT Traversal 7.1 Introduction to Network AddressTranslation343 7.2 Workarounds for VoIP when the network cannot be controlled 7.3 Recommended network design for service providers 7.4 Conclusion Index

    10 in stock

    £78.80

  • Radio Access Networks for UMTS Principles and

    John Wiley & Sons Inc Radio Access Networks for UMTS Principles and

    15 in stock

    Book SynopsisProvides a detailed description of the Radio Access Network for UMTS (3G). Focuses on the subjects most relevant to today's network deployments, including HSDPA, HSUPA and the Iub transport network. Combines the protocol stack with signalling flows and network planning guidelines to provide a comprehensive treatment of the RAN for UMTS.Table of ContentsPreface. Acknowledgements. Abbreviations. 1 INTRODUCTION. 1.1 NETWORK ARCHITECTURE. 1.2 RADIO ACCESS TECHNOLOGY. 1.3 STANDARDISATION. 2 FLOW OF DATA. 2.1 RADIO INTERFACE PROTOCOL STACKS. 2.2 RRC LAYER. 2.3 RLC LAYER. 2.4 MAC LAYER. 2.5 FRAME PROTOCOL LAYER. 2.6 PHYSICAL LAYER. 3 CHANNEL TYPES. 3.1 LOGICAL CHANNELS. 3.2 TRANSPORT CHANNELS. 3.3 PHYSICAL CHANNELS. 4 NON-ACCESS STRATUM. 4.1 CONCEPTS. 4.2 MOBILITY MANAGEMENT. 4.3 CONNECTION MANAGEMENT. 4.4 PLMN SELECTION. 5 IUB TRANSPORT NETWORK. 5.1 PROTOCOL STACKS. 5.2 ARCHITECTURE. 5.3 OVERHEADS. 5.4 SERVICE CATEGORIES. 6 HSDPA. 6.1 CONCEPT. 6.2 HSDPA BIT RATES. 6.3 PDCP LAYER. 6.4 RLC LAYER. 6.5 MAC-D ENTITY. 6.6 FRAME PROTOCOL LAYER. 6.7 IUB TRANSPORT. 6.8 MAC-HS ENTITY. 6.9 PHYSICAL CHANNELS. 6.10 MOBILITY. 7. HSUPA. 7.1 CONCEPT. 7.2 HSUPA BIT RATES. 7.3 PDCP LAYER. 7.4 RLC LAYER. 7.5 MAC-D ENTITY. 7.6 MAC-ES/E ENTITY (UE). 7.7 PHYSICAL CHANNELS. 7.8 MAC-E ENTITY (NODE B). 7.9 FRAME PROTOCOL LAYER. 7.10 MAC-ES ENTITY (RNC). 7.11 MOBILITY. 8 SIGNALING PROCEDURES. 8.1 RRC CONNECTION ESTABLISHMENT. 8.2 SPEECH CALL CONNECTION ESTABLISHMENT. 8.3 VIDEO CALL CONNECTION ESTABLISHMENT. 8.4 SHORT MESSAGE SERVICE (SMS). 8.5 PS DATA CONNECTION ESTABLISHMENT. 8.6 SOFT HANDOVER. 8.7 INTER-SYSTEM HANDOVER. 9 PLANNING. 9.1 LINK BUDGETS. 9.2 RADIO NETWORK PLANNING. 9.3 SCRAMBLING CODE PLANNING. 9.4 NEIGHBOUR PLANNING. 9.5 ANTENNA SUB-SYSTEMS. 9.6 CO-SITING. 9.7 MICROCELLS. 9.8 INDOOR SOLUTIONS. 10 REFERENCES. Index

    15 in stock

    £104.36

  • Radio Technologies and Concepts for IMTAdvanced

    John Wiley & Sons Inc Radio Technologies and Concepts for IMTAdvanced

    10 in stock

    Book SynopsisRadio Technologies and Concepts for IMT-Advanced presents the findings of the Wireless World Initiative New Radio (WINNER) project, a discussion of future consumer expectations and requirements.Table of ContentsAbout the Editors. Preface. Acknowledgements. Abbreviations. List of Contributors. 1 Introduction. 1.1 Development and Status of Mobile and Wireless Communications. 1.2 Expectations of Data Traffic Growth. 1.3 Development Towards IMT-Advanced. 1.4 Global Research Activities. 1.5 WINNER Project. 1.6 Future Work. References. 2 Usage Scenarios and Technical Requirements. 2.1 Introduction. 2.2 Key Scenario Elements. 2.3 Service Classes and Service Requirements. 2.4 Requirements for System Capabilities. 2.5 Terminal Requirements. 2.6 Performance Requirements. 2.7 Spectrum Requirements. 2.8 Dependency of Requirements. 2.9 Conclusion. Acknowledgements. References. 3 WINNER II Channel Models. 3.1 Introduction. 3.2 Modelling Considerations. 3.3 Channel-Modelling Approach. 3.4 Channel Models and Parameters. 3.5 Channel Model Usage. 3.6 Conclusion. Acknowledgements. References. 4 System Concept and Architecture. 4.1 Introduction. 4.2 Design Principles and Main Characteristics. 4.3 Logical Node Architecture. 4.4 Protocol and Service Architecture. 4.5 Conclusion. Acknowledgements. References. 5 Modulation and Coding Techniques. 5.1 Introduction. 5.2 Basic Modulation and Coding Scheme. 5.3 Coding Schemes. 5.4 Link Adaptation. 5.5 Link Level Aspects of H-ARQ. 5.6 Conclusions. References. 6 Link Level Procedures. 6.1 Introduction. 6.2 Pilot Design. 6.3 Channel Estimation. 6.4 Radio Frequency Impairments. 6.5 Measurements and Signalling. 6.6 Link Level Synchronisation. 6.7 Network Synchronisation. 6.8 Conclusion. Acknowledgements. References. 7 Advanced Antennas Concept for 4G. 7.1 Introduction. 7.2 Multiple Antennas Concept. 7.3 Spatial Adaptation. 7.4 Spatial Schemes. 7.5 Interference Mitigation. 7.6 Pilots, Feedback and Measurements. 7.7 MIMO Aspects in Relaying. 7.8 Conclusion. Acknowledgements. References. 8 Layer-2 Relays for IMT-Advanced Cellular Networks. 8.1 Introduction. 8.2 Motivation for Layer-2 Relays and Prior Work. 8.3 Relay-based Deployments. 8.4 Design Choices for Relay-based Cellular Networks. 8.5 System and Network Aspects. 8.6 System-level Performance Evaluation. 8.7 Conclusion. Acknowledgements. References. 9 Multiple Access Schemes and Inter-cell Interference Mitigation Techniques. 9.1 Introduction. 9.2 Multiple Access Schemes. 9.3 Inter-cell Interference Mitigation Schemes. 9.4 Conclusion. Acknowledgements. References. 10 Radio Resource Control and System Level Functions. 10.1 Introduction. 10.2 IPCL Layer. 10.3 Radio Resource Control. 10.4 Centralised, Distributed and Hybrid RRM Architecture. 10.5 System-Level Performance Results. 10.6 Conclusion. Acknowledgements. References. 11 Sharing and Flexible Spectrum Use Capabilities. 11.1 Introduction. 11.2 Spectrum Technologies Framework. 11.3 Detailed Design of a Spectrum Assignment Negotiation Mechanism. 11.4 Spectrum Assignment Enabling Mechanisms. 11.5 WINNER Sharing with FSS. 11.6 Performance Evaluation of Spectrum Assignment Mechanisms. 11.7 Conclusion. Acknowledgements. References. 12 ITU-R Spectrum Demand Calculation for IMT-Advanced. 12.1 Introduction. 12.2 ITU-R Work on Spectrum Requirements of IMT-Advanced. 12.3 ITU-R Spectrum Calculation Methodology. 12.4 Software Implementation of Methodology. 12.5 Estimated Spectrum Requirements of IMT-Advanced. 12.6 Conclusion. Acknowledgements. References. 13 System Model, Test Scenarios, and Performance Evaluation. 13.1 Introduction. 13.2 Performance Assessment of Wireless Networks. 13.3 Interface between Link and System Simulations. 13.4 Test Scenarios. 13.5 Spectral Efficiency and Number of Satisfied Users under QoS Constraints. 13.6 End-to-End Performance Evaluation. 13.7 Conclusion. Acknowledgements. References. 14 Cost Assessment and Optimisation for WINNER Deployments. 14.1 Introduction. 14.2 Cost Assessment Framework and Assumptions. 14.3 Cost Components. 14.4 Cost Assessment Models. 14.5 Reference Deployment Scenarios and Cost Assessments. 14.6 Conclusion. Acknowledgements. References. Index.

    10 in stock

    £124.40

  • Wireless Multimedia

    John Wiley & Sons Inc Wireless Multimedia

    15 in stock

    Book SynopsisWireless Multimedia: A Handbook to the IEEE 802.15.3 Standard clarifies the IEEE 802.15.3 standard for individuals who are implementing compliant devices and shows how the standard can be used to develop wireless multimedia applications. The 802.15.3 standard addresses an untapped market that does beyond 802.11 and Bluetooth wireless technologies. The standard addresses the consumer need for low-cost, high data-rate, ad-hoc wireless connections. Some of these applications include: wireless keyboards and printers, personal video and digital cameras, cordless telephones and intercoms, digital audio players and headphones, gaming (including interactive gaming, multiplayer consoles, handheld multiplayer gaming, digital music, video, and image uploads to handheld games), home theater system and stereo system components, video conferencing, and more! Navigating through the IEEE 802.15.3 standard to find the required information can be a difficult task for anyone who has not spent a coTable of ContentsIntroduction xv Acronyms and Abbreviations xvii Chapter 1 Background and History 1 What is an IEEE standard? 1 The 802.15 family 2 Why 802.15.3? 4 History of 802.15.3 6 Chapter 2 802.15.3 applications 13 The high-rate WPAN theme 13 Still image applications 14 Telephone quality audio applications 16 High quality audio applications 17 Gaming applications 18 Video and multimedia applications 19 Chapter 3 Overview of the IEEE 802.15.3 standard 23 Elements of the 802.15.3 piconet 25 PHY overview 28 Starting a piconet 31 The superframe 32 Joining and leaving a piconet 34 Connecting with other devices 35 Dependent piconets 36 Obtaining information 39 Power management 40 System changes 43 Implementation cost and complexity 44 Chapter 4 MAC functionality 47 MAC terminology in IEEE Std 802.15.3 47 Frame formats 49 Piconet timing and superframe structure 51 Interframe spacings 53 Contention access period (CAP) 55 Channel time allocation period (CTAP) 56 Comparing the contention access methods 60 Guard time 63 The role of the PNC 66 Starting a piconet 66 Handing over control 66 Ending a piconet 72 Joining and leaving the piconet 73 Association 74 Broadcasting piconet information 77 Disassociation 78 Assigning DEVIDs 80 Managing bandwidth 81 Acknowledgements 81 Asynchronous data 87 Stream connections 92 Fragmentation/defragmentation 96 Retransmissions and duplicate detection 99 Power management 100 Common characteristics of the SPS modes 104 Analyzing power save efficiencies 107 Switching PM modes 110 Managing SPS sets 114 DSPS mode 118 Allocating channel time for DSPS DEVs 119 PSPS mode 124 APS mode 126 Changing piconet parameters 128 Beacon announcements 129 Dynamic channel selection 132 Changing the PNID or BSID 134 Moving the beacon or changing the superframe duration 136 Finding information 138 Probe 139 Announce 143 PNC Information 145 Channel status 148 PNC channel scanning 150 Remote scan 152 Piconet services 154 Other capabilities 157 Transmit power control 157 Multirate capabilities 159 Extensibility of the standard 160 Example of the life cycle of a DEV 162 Chapter 5 Dependent piconets 165 Introduction 165 Starting a dependent piconet 168 Parent PNC ceasing operations with dependent piconets 174 Parent PNC stopping a dependent piconet 176 Handing over PNC responsibilities in a dependent piconet 177 Chapter 6 Security 187 Introduction and history 187 Security modes and policies 190 Security services provided in mode 1 191 Security policies 193 Symmetric key security suite 195 Overview of AES CCM 195 Key distribution 197 Security information 199 Chapter 7 2.4 GHz PHY 203 Overview 203 General PHY requirements 205 Channel plan 205 Timing issues 206 Miscellaneous PHY requirements 213 PHY frame format 213 Stuff bits and tail symbols 214 Frame format 215 PHY preamble 217 Data size restrictions 219 Modulation 220 Receiver performance 224 Transmitter performance 228 Regulatory and requirements 233 Delay spread performance 234 Mitigating the effects of delay spread 236 Fading channel model used for 802.15.3 237 Defining delay spread performance 239 Delay spread measurements 240 Radio architectures 244 Superheterodyne 245 Direct conversion 248 Walking IF 250 Low IF 253 Summary of radio architectures 256 Chapter 8 2.4 Interfacing to 802.15.3 257 The PIBs and their interface 261 MLME SAP 262 PLME SAP 265 MAC SAP 265 PHY SAP 266 The FCSL 268 Chapter 9 2.4 Coexistence mechanisms 271 Introduction 271 Coexistence techniques in 802.15.3 271 Passive scanning 273 The ability to request channel quality information 273 Dynamic channel selection 273 Link quality and RSSI 274 Channel plan that minimizes channel overlap 274 Transmit power control 275 Lower impact transmit spectral mask 275 Neighbor piconet capability 276 Coexistence results 278 Assumptions for coexistence simulations 278 BER calculations 280 802.11b and 802.15.3 282 802.15.1 and 802.11 FHSS overlapping with 802.15.3 288 Summary 291 References 295 Glossary 299 Index 305

    15 in stock

    £61.16

  • The Undersea Network

    Duke University Press The Undersea Network

    15 in stock

    Book SynopsisIn our 'wireless' world it is easy to take the importance of the undersea cable systems for granted, but the stakes of their successful operation are huge, as they are responsible for carrying almost all transoceanic Internet traffic. In The Undersea Network Nicole Starosielski follows these cables from the ocean depths to their landing zones on the sandy beaches of the South Pacific, bringing them to the surface of media scholarship and making visible the materiality of the wired network. In doing so, she charts the cable network''s cultural, historical, geographic and environmental dimensions. Starosielski argues that the environments the cables occupy are historical and political realms, where the network and the connections it enables are made possible by the deliberate negotiation and manipulation of technology, culture, politics and geography. Accompanying the book is an interactive digital mapping project, where readers can trace Trade Review“Starosielski offers a crucial intervention into theoretical conceptualizations of communications infrastructure. . . . This rich text also has profound implications for how citizens in an always-networked society and economy understand our lived realities. The Undersea Network makes us reconsider the ‘wirelessness’ of our world by admonishing us consider it in terms of its peculiar and ongoing connectedness to geographies, cultures, and politics.” -- Sara Rodrigues * PopMatters *“[A] fascinating book that is part history, part travelogue and part socio-economic memoir. . . . Starosielski’s account makes for fascinating reading, drawing together the varied threads of history, technical complexity, economic power and political will that have shaped the world’s cable networks. Despite the scale of the infrastructure under discussion, the narrative remains intensely personal, and one to be enjoyed." -- John Gilbey * Times Higher Education *“The Undersea Network is a fascinating interdisciplinary look at the infrastructure that lets us communicate instantly across oceans…. [T]his book is a good read for anyone broadly interested in geography or communications.” -- Eva Amsen * Hakai Magazine *“A fascinating cultural assessment of global undersea cable networks that carry most of the world's trans-ocean Internet traffic. … Great stuff!” -- Christopher Sterling * Communication Booknotes Quarterly *"Overall, the book brilliantly brings together the global metanarrative of mass communication with the local, material, and relatively immobile specificities of this undersea network.... Starosielski is extremely successful in rewiring our wireless imaginaries of a networked world. The depth and breadth of the fieldwork conducted is noteworthy as is the production of the book itself, which contains a plethora of images, graphics, and maps." -- Rachael Squire * Transfers *"The multistranded analysis developed in the book provides a rewarding account that blends cultural history with investigative ethnography and along the way takes us to remote sites in Hawaii, Tahiti and Guam. Most importantly, Starosielski brings the infrastructure of undersea cable systems back into visibility, showing us in vivid ways what makes global communications possible." * European Journal of Communication *"The Undersea Network succeeds in introducing an environmental consciousness into one’s imagination of digital networks and the ecological, political, financial, place-based contingencies that support, interfere with and maintain our global telecommunications system. It makes cables salient. ... The Undersea Network is required reading for students of media and network archaeology, communication educators, political and environmental scientists, the history of technology discipline, and readers within the cable industries and government." -- Emily Goodmann * International Journal of Media & Cultural Politics *"If you have ever wondered why infrastructure has suddenly become a buzzword in cultural anthropology and science and technology studies, then follow the signal. That is precisely what The Undersea Network does, brilliantly redeeming the promise of multi-sited fieldwork methods to highlight the connections and disconnection–historical and present-day–among far-flung people and places.... For anyone with an interest in Pacific studies, this book has plenty to ponder." -- Robert J. Foster * Journal of Pacific History *"[A]n enthralling read for anybody with an interest in telecoms infrastructure and the way that it is presented in the media." -- Mike Conradi * Telecommunications Policy *"This is a fascinating and deeply geographical piece of media scholarship.Starosielski’s book is remarkably successful in demonstrating that the unstable materiality of the infrastructures it describes matters in all kinds of sometimes contradictory ways to those who construct these infrastructures, to those they connect, and to those who remain at a distance from their connective capacities." -- Derek P. McCormack * Cultural Geographies *Table of ContentsPreface. Edges ix Acknowledgments xv Introduction. Against Flow 1 1. Circuitous Routes. From Topology to Topography 26 2. Short-Circuiting Discursive Infrastructure: From Connection to Transmission 64 3. Gateway: From Cable Colony to Network Operations Center 94 4. Pressure Point: Turbulent Ecologies of the Cable Landing 138 5. A Network of Islands: Interconnecting the Pacific 170 6. Cabled Depths: The Aquatic Afterlives of Signal Traffic 198 Conclusion. Surfacing 225 Notes 235 Bibliography 263 Index 281

    15 in stock

    £20.69

  • Solutions Manual Fundamentals of Communication Systems

    15 in stock

    £11.64

  • Software Defined Radio using MATLAB  Simulink and the RTLSDR

    Strathclyde Academic Media Software Defined Radio using MATLAB Simulink and the RTLSDR

    15 in stock

    15 in stock

    £52.25

  • LTE Security

    John Wiley & Sons Inc LTE Security

    15 in stock

    Book SynopsisThis book explains in detail the security mechanisms employed in LTE and gives an overview of the ones in GSM and 3G, which LTE security substantially extends.Table of ContentsPreface xiii Foreword to the First Edition xv Acknowledgements xix Copyright Acknowledgements xix 1 Overview of the Book 1 2 Background 5 2.1 Evolution of Cellular Systems 5 2.2 Basic Security Concepts 10 2.3 Basic Cryptographic Concepts 13 2.4 Introduction to LTE Standardization 21 2.5 Notes on Terminology and Specification Language 26 3 GSM Security 29 3.1 Principles of GSM Security 29 3.2 The Role of the SIM 30 3.3 Mechanisms of GSM Security 31 3.4 GSM Cryptographic Algorithms 34 4 Third-Generation Security (UMTS) 37 4.1 Principles of Third-Generation (3G) Security 37 4.2 Third-Generation Security Mechanisms 40 4.3 Third-Generation Cryptographic Algorithms 49 4.4 Interworking between GSM and 3G Security 55 4.5 Network Domain Security 59 4.6 Architectures with RNCs in Exposed Locations 65 5 3G–WLAN Interworking 67 5.1 Principles of 3G–WLAN Interworking 67 5.2 Security Mechanisms of 3G–WLAN Interworking 75 5.3 Cryptographic Algorithms for 3G–WLAN Interworking 81 6 EPS Security Architecture 83 6.1 Overview and Relevant Specifications 83 6.2 Requirements and Features of EPS Security 89 6.3 Design Decisions for EPS Security 97 6.4 Platform Security for Base Stations 103 7 EPS Authentication and Key Agreement 109 7.1 Identification 109 7.2 The EPS Authentication and Key Agreement Procedure 112 7.3 Key Hierarchy 123 7.4 Security Contexts 129 8 EPS Protection for Signalling and User Data 133 8.1 Security Algorithms Negotiation 133 8.2 NAS Signalling Protection 136 8.3 AS Signalling and User Data Protection 138 8.4 Security on Network Interfaces 141 8.5 Certificate Enrolment for Base Stations 143 8.6 Emergency Call Handling 151 9 Security in Intra-LTE State Transitions and Mobility 155 9.1 Transitions to and from Registered State 156 9.2 Transitions between Idle and Connected States 157 9.3 Idle State Mobility 158 9.4 Handover 161 9.5 Key Change on the Fly 169 9.6 Periodic Local Authentication Procedure 170 9.7 Concurrent Run of Security Procedures 171 10 EPS Cryptographic Algorithms 175 10.1 Null Algorithms 176 10.2 Ciphering Algorithms 177 10.3 Integrity Algorithms 180 10.4 Key Derivation Algorithms 180 11 Interworking Security between EPS and Other Systems 183 11.1 Interworking with GSM and 3G Networks 183 11.2 Interworking with Non-3GPP Networks 193 12 Security for Voice over LTE 215 12.1 Methods for Providing Voice over LTE 215 12.2 Security Mechanisms for Voice over LTE 220 12.3 Rich Communication Suite and Voice over LTE 230 13 Security for Home Base Station Deployment 233 13.1 Security Architecture, Threats and Requirements 234 13.2 Security Features 241 13.3 Security Procedures Internal to the Home Base Station 244 13.4 Security Procedures between Home Base Station and Security Gateway 247 13.5 Security Aspects of Home Base Station Management 261 13.6 Closed Subscriber Groups and Emergency Call Handling 275 13.7 Support for Subscriber Mobility 277 14 Relay Node Security 281 14.1 Overview of Relay Node Architecture 281 14.2 Security Solution 284 15 Security for Machine-Type Communications 293 15.1 Security for MTC at the Application Level 294 15.2 Security for MTC at the 3GPP Network Level 301 15.3 Security for MTC at the Credential Management Level 306 16 Future Challenges 309 16.1 Near-Term Outlook 309 16.2 Far-Term Outlook 314 Abbreviations 319 References 327 Index 337

    15 in stock

    £84.56

  • An Introduction to LTE

    John Wiley & Sons Inc An Introduction to LTE

    15 in stock

    Book SynopsisFollowing on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works. It assumes no more than a basic knowledge of mobile telecommunication systems, and the reader is not expected to have any previous knowledge of the complex mathematical operations that underpin LTE.Table of ContentsPreface xxi Acknowledgements xxiii List of Abbreviations xxv 1 Introduction 1 1.1 Architectural Review of UMTS and GSM 1 1.1.1 High-Level Architecture 1 1.1.2 Architecture of the Radio Access Network 2 1.1.3 Architecture of the Core Network 4 1.1.4 Communication Protocols 5 1.2 History of Mobile Telecommunication Systems 6 1.2.1 From 1G to 3G 6 1.2.2 Third Generation Systems 7 1.3 The Need for LTE 8 1.3.1 The Growth of Mobile Data 8 1.3.2 Capacity of a Mobile Telecommunication System 9 1.3.3 Increasing the System Capacity 10 1.3.4 Additional Motivations 11 1.4 From UMTS to LTE 11 1.4.1 High-Level Architecture of LTE 11 1.4.2 Long-Term Evolution 12 1.4.3 System Architecture Evolution 13 1.4.4 LTE Voice Calls 14 1.4.5 The Growth of LTE 15 1.5 From LTE to LTE-Advanced 16 1.5.1 The ITU Requirements for 4G 16 1.5.2 Requirements of LTE-Advanced 16 1.5.3 4G Communication Systems 16 1.5.4 The Meaning of 4G 17 1.6 The 3GPP Specifications for LTE 17 References 19 2 System Architecture Evolution 21 2.1 High-Level Architecture of LTE 21 2.2 User Equipment 21 2.2.1 Architecture of the UE 21 2.2.2 UE Capabilities 22 2.3 Evolved UMTS Terrestrial Radio Access Network 23 2.3.1 Architecture of the E-UTRAN 23 2.3.2 Transport Network 24 2.3.3 Small Cells and the Home eNB 25 2.4 Evolved Packet Core 25 2.4.1 Architecture of the EPC 25 2.4.2 Roaming Architecture 27 2.4.3 Network Areas 28 2.4.4 Numbering, Addressing and Identification 28 2.5 Communication Protocols 30 2.5.1 Protocol Model 30 2.5.2 Air Interface Transport Protocols 31 2.5.3 Fixed Network Transport Protocols 31 2.5.4 User Plane Protocols 32 2.5.5 Signalling Protocols 33 2.6 Example Signalling Flows 34 2.6.1 Access Stratum Signalling 34 2.6.2 Non-Access Stratum Signalling 35 2.7 Bearer Management 36 2.7.1 The EPS Bearer 36 2.7.2 Default and Dedicated Bearers 37 2.7.3 Bearer Implementation Using GTP 38 2.7.4 Bearer Implementation Using GRE and PMIP 39 2.7.5 Signalling Radio Bearers 39 2.8 State Diagrams 40 2.8.1 EPS Mobility Management 40 2.8.2 EPS Connection Management 40 2.8.3 Radio Resource Control 41 2.9 Spectrum Allocation 43 References 45 3 Digital Wireless Communications 49 3.1 Radio Transmission and Reception 49 3.1.1 Carrier Signal 49 3.1.2 Modulation Techniques 50 3.1.3 The Modulation Process 51 3.1.4 The Demodulation Process 53 3.1.5 Channel Estimation 55 3.1.6 Bandwidth of the Modulated Signal 55 3.2 Radio Transmission in a Mobile Cellular Network 56 3.2.1 Multiple Access Techniques 56 3.2.2 FDD and TDD Modes 56 3.3 Impairments to the Received Signal 58 3.3.1 Propagation Loss 58 3.3.2 Noise and Interference 58 3.3.3 Multipath and Fading 58 3.3.4 Inter-symbol Interference 60 3.4 Error Management 61 3.4.1 Forward Error Correction 61 3.4.2 Automatic Repeat Request 62 3.4.3 Hybrid ARQ 63 References 65 4 Orthogonal Frequency Division Multiple Access 67 4.1 Principles of OFDMA 67 4.1.1 Sub-carriers 67 4.1.2 The OFDM Transmitter 68 4.1.3 The OFDM Receiver 70 4.1.4 The Fast Fourier Transform 72 4.1.5 Block Diagram of OFDMA 72 4.1.6 Details of the Fourier Transform 73 4.2 Benefits and Additional Features of OFDMA 75 4.2.1 Orthogonal Sub-carriers 75 4.2.2 Choice of Sub-carrier Spacing 75 4.2.3 Frequency-Specific Scheduling 77 4.2.4 Reduction of Inter-symbol Interference 78 4.2.5 Cyclic Prefix Insertion 79 4.2.6 Choice of Symbol Duration 80 4.2.7 Fractional Frequency Re-use 81 4.3 Single Carrier Frequency Division Multiple Access 82 4.3.1 Power Variations From OFDMA 82 4.3.2 Block Diagram of SC-FDMA 83 References 85 5 Multiple Antenna Techniques 87 5.1 Diversity Processing 87 5.1.1 Receive Diversity 87 5.1.2 Closed Loop Transmit Diversity 88 5.1.3 Open Loop Transmit Diversity 89 5.2 Spatial Multiplexing 90 5.2.1 Principles of Operation 90 5.2.2 Open Loop Spatial Multiplexing 92 5.2.3 Closed Loop Spatial Multiplexing 94 5.2.4 Matrix Representation 96 5.2.5 Implementation Issues 99 5.2.6 Multiple User MIMO 99 5.3 Beamforming 101 5.3.1 Principles of Operation 101 5.3.2 Beam Steering 102 5.3.3 Downlink Multiple User MIMO Revisited 103 References 104 6 Architecture of the LTE Air Interface 105 6.1 Air Interface Protocol Stack 105 6.2 Logical, Transport and Physical Channels 107 6.2.1 Logical Channels 107 6.2.2 Transport Channels 107 6.2.3 Physical Data Channels 108 6.2.4 Control Information 109 6.2.5 Physical Control Channels 110 6.2.6 Physical Signals 111 6.2.7 Information Flows 111 6.3 The Resource Grid 111 6.3.1 Slot Structure 111 6.3.2 Frame Structure 113 6.3.3 Uplink Timing Advance 115 6.3.4 Resource Grid Structure 116 6.3.5 Bandwidth Options 117 6.4 Multiple Antenna Transmission 118 6.4.1 Downlink Antenna Ports 118 6.4.2 Downlink Transmission Modes 119 6.5 Resource Element Mapping 119 6.5.1 Downlink Resource Element Mapping 119 6.5.2 Uplink Resource Element Mapping 121 References 123 7 Cell Acquisition 125 7.1 Acquisition Procedure 125 7.2 Synchronization Signals 126 7.2.1 Physical Cell Identity 126 7.2.2 Primary Synchronization Signal 127 7.2.3 Secondary Synchronization Signal 128 7.3 Downlink Reference Signals 128 7.4 Physical Broadcast Channel 129 7.5 Physical Control Format Indicator Channel 130 7.6 System Information 131 7.6.1 Organization of the System Information 131 7.6.2 Transmission and Reception of the System Information 133 7.7 Procedures after Acquisition 133 References 134 8 Data Transmission and Reception 135 8.1 Data Transmission Procedures 135 8.1.1 Downlink Transmission and Reception 135 8.1.2 Uplink Transmission and Reception 137 8.1.3 Semi Persistent Scheduling 139 8.2 Transmission of Scheduling Messages on the PDCCH 139 8.2.1 Downlink Control Information 139 8.2.2 Resource Allocation 140 8.2.3 Example: DCI Format 1 141 8.2.4 Radio Network Temporary Identifiers 142 8.2.5 Transmission and Reception of the PDCCH 143 8.3 Data Transmission on the PDSCH and PUSCH 144 8.3.1 Transport Channel Processing 144 8.3.2 Physical Channel Processing 146 8.4 Transmission of Hybrid ARQ Indicators on the PHICH 148 8.4.1 Introduction 148 8.4.2 Resource Element Mapping of the PHICH 148 8.4.3 Physical Channel Processing of the PHICH 149 8.5 Uplink Control Information 149 8.5.1 Hybrid ARQ Acknowledgements 149 8.5.2 Channel Quality Indicator 150 8.5.3 Rank Indication 151 8.5.4 Precoding Matrix Indicator 151 8.5.5 Channel State Reporting Mechanisms 151 8.5.6 Scheduling Requests 152 8.6 Transmission of Uplink Control Information on the PUCCH 153 8.6.1 PUCCH Formats 153 8.6.2 PUCCH Resources 154 8.6.3 Physical Channel Processing of the PUCCH 155 8.7 Uplink Reference Signals 155 8.7.1 Demodulation Reference Signal 155 8.7.2 Sounding Reference Signal 156 8.8 Power Control 157 8.8.1 Uplink Power Calculation 157 8.8.2 Uplink Power Control Commands 158 8.8.3 Downlink Power Control 159 8.9 Discontinuous Reception 159 8.9.1 Discontinuous Reception and Paging in RRC_IDLE 159 8.9.2 Discontinuous Reception in RRC_CONNECTED 159 References 161 9 Random Access 163 9.1 Transmission of Random Access Preambles on the PRACH 163 9.1.1 Resource Element Mapping 163 9.1.2 Preamble Sequence Generation 165 9.1.3 Signal Transmission 165 9.2 Non-Contention-Based Procedure 166 9.3 Contention-Based Procedure 167 References 169 10 Air Interface Layer 2 171 10.1 Medium Access Control Protocol 171 10.1.1 Protocol Architecture 171 10.1.2 Timing Advance Commands 173 10.1.3 Buffer Status Reporting 173 10.1.4 Power Headroom Reporting 173 10.1.5 Multiplexing and De-multiplexing 174 10.1.6 Logical Channel Prioritization 174 10.1.7 Scheduling of Transmissions on the Air Interface 175 10.2 Radio Link Control Protocol 176 10.2.1 Protocol Architecture 176 10.2.2 Transparent Mode 177 10.2.3 Unacknowledged Mode 177 10.2.4 Acknowledged Mode 178 10.3 Packet Data Convergence Protocol 180 10.3.1 Protocol Architecture 180 10.3.2 Header Compression 180 10.3.3 Prevention of Packet Loss during Handover 182 References 183 11 Power-On and Power-Off Procedures 185 11.1 Power-On Sequence 185 11.2 Network and Cell Selection 187 11.2.1 Network Selection 187 11.2.2 Closed Subscriber Group Selection 187 11.2.3 Cell Selection 188 11.3 RRC Connection Establishment 189 11.3.1 Basic Procedure 189 11.3.2 Relationship with Other Procedures 190 11.4 Attach Procedure 191 11.4.1 IP Address Allocation 191 11.4.2 Overview of the Attach Procedure 192 11.4.3 Attach Request 192 11.4.4 Identification and Security Procedures 194 11.4.5 Location Update 195 11.4.6 Default Bearer Creation 196 11.4.7 Attach Accept 197 11.4.8 Default Bearer Update 198 11.5 Detach Procedure 199 References 200 12 Security Procedures 203 12.1 Network Access Security 203 12.1.1 Security Architecture 203 12.1.2 Key Hierarchy 204 12.1.3 Authentication and Key Agreement 205 12.1.4 Security Activation 207 12.1.5 Ciphering 208 12.1.6 Integrity Protection 209 12.2 Network Domain Security 210 12.2.1 Security Protocols 210 12.2.2 Security in the Evolved Packet Core 210 12.2.3 Security in the Radio Access Network 211 References 212 13 Quality of Service, Policy and Charging 215 13.1 Policy and Charging Control 215 13.1.1 Quality of Service Parameters 215 13.1.2 Service Data Flows 217 13.1.3 Charging Parameters 218 13.1.4 Policy and Charging Control Rules 219 13.2 Policy and Charging Control Architecture 219 13.2.1 Basic PCC Architecture 219 13.2.2 Local Breakout Architecture 220 13.2.3 Architecture Using a PMIP Based S5/S8 220 13.2.4 Software Protocols 221 13.3 Session Management Procedures 222 13.3.1 IP-CAN Session Establishment 222 13.3.2 Mobile Originated SDF Establishment 223 13.3.3 Server Originated SDF Establishment 224 13.3.4 Dedicated Bearer Establishment 225 13.3.5 PDN Connectivity Establishment 226 13.3.6 Other Session Management Procedures 228 13.4 Data Transport in the Evolved Packet Core 228 13.4.1 Packet Handling at the PDN Gateway 228 13.4.2 Data Transport Using GTP 229 13.4.3 Differentiated Services 230 13.4.4 Multiprotocol Label Switching 231 13.4.5 Data Transport Using GRE and PMIP 231 13.5 Charging and Billing 231 13.5.1 High Level Architecture 231 13.5.2 Offline Charging 232 13.5.3 Online Charging 233 References 234 14 Mobility Management 237 14.1 Transitions between Mobility Management States 237 14.1.1 S1 Release Procedure 237 14.1.2 Paging Procedure 239 14.1.3 Service Request Procedure 239 14.2 Cell Reselection in RRC_IDLE 241 14.2.1 Objectives 241 14.2.2 Measurement Triggering on the Same LTE Frequency 241 14.2.3 Cell Reselection to the Same LTE Frequency 242 14.2.4 Measurement Triggering on a Different LTE Frequency 243 14.2.5 Cell Reselection to a Different LTE Frequency 244 14.2.6 Fast Moving Mobiles 244 14.2.7 Tracking Area Update Procedure 245 14.2.8 Network Reselection 246 14.3 Measurements in RRC_CONNECTED 247 14.3.1 Objectives 247 14.3.2 Measurement Procedure 247 14.3.3 Measurement Reporting 248 14.3.4 Measurement Gaps 249 14.4 Handover in RRC_CONNECTED 250 14.4.1 X2 Based Handover Procedure 250 14.4.2 Handover Variations 252 References 253 15 Inter-operation with UMTS and GSM 255 15.1 System Architecture 255 15.1.1 Architecture of the 2G/3G Packet Switched Domain 255 15.1.2 S3/S4-Based Inter-operation Architecture 257 15.1.3 Gn/Gp-Based Inter-operation Architecture 258 15.2 Power-On Procedures 259 15.3 Mobility Management in RRC_IDLE 259 15.3.1 Cell Reselection 259 15.3.2 Routing Area Update Procedure 260 15.3.3 Idle Mode Signalling Reduction 262 15.4 Mobility Management in RRC_CONNECTED 262 15.4.1 RRC Connection Release with Redirection 262 15.4.2 Measurement Procedures 264 15.4.3 Optimized Handover 265 References 268 16 Inter-operation with Non-3GPP Technologies 271 16.1 Generic System Architecture 271 16.1.1 Network-Based Mobility Architecture 271 16.1.2 Host-Based Mobility Architecture 273 16.1.3 Access Network Discovery and Selection Function 274 16.2 Generic Signalling Procedures 275 16.2.1 Overview of the Attach Procedure 275 16.2.2 Authentication and Key Agreement 276 16.2.3 PDN Connectivity Establishment 278 16.2.4 Radio Access Network Reselection 280 16.3 Inter-Operation with cdma2000 HRPD 280 16.3.1 System Architecture 280 16.3.2 Preregistration with cdma2000 281 16.3.3 Cell Reselection in RRC_IDLE 282 16.3.4 Measurements and Handover in RRC_CONNECTED 283 References 286 17 Self-Optimizing Networks 289 17.1 Self-Configuration of an eNB 289 17.1.1 Automatic Configuration of the Physical Cell Identity 289 17.1.2 Automatic Neighbour Relations 290 17.1.3 Random Access Channel Optimization 291 17.2 Inter-Cell Interference Coordination 292 17.3 Mobility Management 292 17.3.1 Mobility Load Balancing 292 17.3.2 Mobility Robustness Optimization 293 17.3.3 Energy Saving 295 17.4 Radio Access Network Information Management 295 17.4.1 Introduction 295 17.4.2 Transfer of System Information 296 17.4.3 Transfer of Self-Optimization Data 297 17.5 Drive Test Minimization 297 References 298 18 Enhancements in Release 9 301 18.1 Multimedia Broadcast/Multicast Service 301 18.1.1 Introduction 301 18.1.2 Multicast/Broadcast over a Single Frequency Network 302 18.1.3 Implementation of MBSFN in LTE 302 18.1.4 Architecture of MBMS 304 18.1.5 Operation of MBMS 305 18.2 Location Services 306 18.2.1 Introduction 306 18.2.2 Positioning Techniques 306 18.2.3 Location Service Architecture 307 18.2.4 Location Service Procedures 308 18.3 Other Enhancements in Release 9 309 18.3.1 Dual Layer Beamforming 309 18.3.2 Commercial Mobile Alert System 310 References 310 19 LTE-Advanced and Release 10 313 19.1 Carrier Aggregation 313 19.1.1 Principles of Operation 313 19.1.2 UE Capabilities 314 19.1.3 Scheduling 316 19.1.4 Data Transmission and Reception 316 19.1.5 Uplink and Downlink Feedback 317 19.1.6 Other Physical Layer and MAC Procedures 317 19.1.7 RRC Procedures 317 19.2 Enhanced Downlink MIMO 318 19.2.1 Objectives 318 19.2.2 Downlink Reference Signals 318 19.2.3 Downlink Transmission and Feedback 320 19.3 Enhanced Uplink MIMO 321 19.3.1 Objectives 321 19.3.2 Implementation 321 19.4 Relays 322 19.4.1 Principles of Operation 322 19.4.2 Relaying Architecture 323 19.4.3 Enhancements to the Air Interface 324 19.5 Heterogeneous Networks 324 19.5.1 Introduction 324 19.5.2 Enhanced Inter-Cell Interference Coordination 325 19.5.3 Enhancements to Self-Optimizing Networks 326 19.6 Traffic Offload Techniques 326 19.6.1 Local IP Access 326 19.6.2 Selective IP Traffic Offload 327 19.6.3 Multi-Access PDN Connectivity 327 19.6.4 IP Flow Mobility 329 19.7 Overload Control for Machine-Type Communications 330 References 331 20 Releases 11 and 12 333 20.1 Coordinated Multipoint Transmission and Reception 333 20.1.1 Objectives 333 20.1.2 Scenarios 334 20.1.3 CoMP Techniques 335 20.1.4 Standardization 336 20.1.5 Performance 337 20.2 Enhanced Physical Downlink Control Channel 337 20.3 Interference Avoidance for in Device Coexistence 338 20.4 Machine-Type Communications 339 20.4.1 Device Triggering 339 20.4.2 Numbering, Addressing and Identification 340 20.5 Mobile Data Applications 340 20.6 New Features in Release 12 341 20.6.1 Proximity Services and Device to Device Communications 341 20.6.2 Dynamic Adaptation of the TDD Configuration 342 20.6.3 Enhancements for Machine-Type Communications and Mobile Data 344 20.6.4 Traffic Offloading Enhancements 344 20.7 Release 12 Studies 345 20.7.1 Enhancements to Small Cells and Heterogeneous Networks 345 20.7.2 Elevation Beamforming and Full Dimension MIMO 346 References 346 21 Circuit Switched Fallback 349 21.1 Delivery of Voice and Text Messages over LTE 349 21.1.1 The Market for Voice and SMS 349 21.1.2 Third Party Voice over IP 350 21.1.3 The IP Multimedia Subsystem 351 21.1.4 VoLGA 351 21.1.5 Dual Radio Devices 352 21.1.6 Circuit Switched Fallback 353 21.2 System Architecture 353 21.2.1 Architecture of the 2G/3G Circuit Switched Domain 353 21.2.2 Circuit Switched Fallback Architecture 354 21.3 Attach Procedure 355 21.3.1 Combined EPS/IMSI Attach Procedure 355 21.3.2 Voice Domain Preference and UE Usage Setting 356 21.4 Mobility Management 357 21.4.1 Combined Tracking Area/Location Area Update Procedure 357 21.4.2 Alignment of Tracking Areas and Location Areas 357 21.4.3 Cell Reselection to UMTS or GSM 358 21.5 Call Setup 359 21.5.1 Mobile-Originated Call Setup using RRC Connection Release 359 21.5.2 Mobile Originated Call Setup using Handover 361 21.5.3 Signalling Messages in the Circuit Switched Domain 362 21.5.4 Mobile-Terminated Call Setup 363 21.5.5 Returning to LTE 364 21.6 SMS over SGs 365 21.6.1 System Architecture 365 21.6.2 SMS Delivery 365 21.7 Circuit Switched Fallback to cdma2000 1xRTT 366 21.8 Performance of Circuit Switched Fallback 367 References 368 22 VoLTE and the IP Multimedia Subsystem 371 22.1 Introduction 371 22.1.1 The IP Multimedia Subsystem 371 22.1.2 VoLTE 372 22.1.3 Rich Communication Services 372 22.2 Hardware Architecture of the IMS 373 22.2.1 High-Level Architecture 373 22.2.2 Call Session Control Functions 374 22.2.3 Application Servers 375 22.2.4 Home Subscriber Server 375 22.2.5 User Equipment 375 22.2.6 Relationship with LTE 376 22.2.7 Border Control Functions 377 22.2.8 Media Gateway Functions 378 22.2.9 Multimedia Resource Functions 379 22.2.10 Security Architecture 380 22.2.11 Charging Architecture 380 22.3 Signalling Protocols 381 22.3.1 Session Initiation Protocol 381 22.3.2 Session Description Protocol 382 22.3.3 Other Signalling Protocols 382 22.4 Service Provision in the IMS 382 22.4.1 Service Profiles 382 22.4.2 Media Feature Tags 383 22.4.3 The Multimedia Telephony Service for IMS 383 22.5 VoLTE Registration Procedure 384 22.5.1 Introduction 384 22.5.2 LTE Procedures 384 22.5.3 Contents of the REGISTER Request 385 22.5.4 IMS Registration Procedure 387 22.5.5 Routing of SIP Requests and Responses 388 22.5.6 Third-Party Registration with Application Servers 389 22.5.7 Subscription for Network-Initiated Deregistration 389 22.6 Call Setup and Release 390 22.6.1 Contents of the INVITE Request 390 22.6.2 Initial INVITE Request and Response 391 22.6.3 Acceptance of the Initial INVITE 393 22.6.4 Establishment of a Call to a Circuit Switched Network 396 22.6.5 Call Release 396 22.7 Access Domain Selection 397 22.7.1 Mobile-Originated Calls 397 22.7.2 Mobile-Terminated Calls 398 22.8 Single Radio Voice Call Continuity 398 22.8.1 Introduction 398 22.8.2 SRVCC Architecture 399 22.8.3 Attach, Registration and Call Setup Procedures 400 22.8.4 Handover Preparation 400 22.8.5 Updating the Remote Leg 401 22.8.6 Releasing the Source Leg 403 22.8.7 Handover Execution and Completion 403 22.8.8 Evolution of SRVCC 404 22.9 IMS Centralized Services 405 22.10 IMS Emergency Calls 406 22.10.1 Emergency Call Architecture 406 22.10.2 Emergency Call Setup Procedure 407 22.11 Delivery of SMS Messages over the IMS 408 22.11.1 SMS Architecture 408 22.11.2 Access Domain Selection 409 References 410 23 Performance of LTE and LTE-Advanced 413 23.1 Peak Data Rates of LTE and LTE-Advanced 413 23.1.1 Increase of the Peak Data Rate 413 23.1.2 Limitations on the Peak Data Rate 415 23.2 Coverage of an LTE Cell 416 23.2.1 Uplink Link Budget 416 23.2.2 Downlink Link Budget 418 23.2.3 Propagation Modelling 419 23.2.4 Coverage Estimation 420 23.3 Capacity of an LTE Cell 421 23.3.1 Capacity Estimation 421 23.3.2 Cell Capacity Simulations 422 23.4 Performance of Voice over IP 424 23.4.1 AMR Codec Modes 424 23.4.2 Transmission of AMR Frames on the Air Interface 425 23.4.3 Transmission of AMR Frames in the Fixed Network 426 References 427 Bibliography 429 Index 431

    15 in stock

    £54.86

  • Design and Optimization for 5G Wireless

    John Wiley & Sons Inc Design and Optimization for 5G Wireless

    2 in stock

    Book SynopsisThis book offers a technical background to the design and optimization of wireless communication systems, covering optimization algorithms for wireless and 5G communication systems design. The book introduces the design and optimization systems which target capacity, latency, and connection density; including Enhanced Mobile Broadband Communication (eMBB), Ultra-Reliable and Low Latency Communication (URLL), and Massive Machine Type Communication (mMTC). The book is organized into two distinct parts: Part I, mathematical methods and optimization algorithms for wireless communications are introduced, providing the reader with the required mathematical background. In Part II, 5G communication systems are designed and optimized using the mathematical methods and optimization algorithms.Table of ContentsPreface xi List of Abbreviations xiii Part I Mathematical Methods and Optimization Theories for Wireless Communications 1 1 Historical Sketch of Cellular Communications and Networks 3 1.1 Evolution of Cellular Communications and Networks 3 1.2 Evolution to 5G Networks 9 References 11 2 5G Wireless Communication System Parameters and Requirements 13 2.1 5G Requirements 13 2.2 Trade-off of 5G System Metrics 16 Problems 19 References 20 3 Mathematical Methods for Wireless Communications 21 3.1 Signal Spaces 21 3.2 Approximation and Estimation in Signal Spaces 32 3.2.1 Approximation Problems 32 3.2.2 Least Squares Estimation 35 3.2.3 Minimum Mean-Squared Error Estimation 45 3.2.4 Maximum Likelihood and Maximum A Posteriori Estimation 65 3.3 Matrix Factorization 71 3.3.1 LU Decomposition 71 3.3.2 Cholesky Decomposition 76 3.3.3 QR Decomposition 77 3.3.4 SVD Decomposition 85 Problems 92 References 95 4 Mathematical Optimization Techniques for Wireless Communications 97 4.1 Introduction 97 4.2 Mathematical Modeling and Optimization Process 99 4.3 Linear Programming 108 4.4 Convex Optimization 120 4.4.1 Barrier Method 124 4.4.2 Primal-Dual Interior Point Method 130 4.5 Gradient Descent Method 138 Problems 146 References 149 5 Machine Learning 151 5.1 Artificial Intelligence, Machine Learning, and Deep Learning 152 5.2 Supervised and Unsupervised Learning 153 5.3 Reinforcement Learning 177 Problems 191 References 193 Part II Design and Optimization for 5G Wireless Communications and Networks 195 6 Design Principles for 5G Communications and Networks 197 6.1 New Design Approaches and Key Challenges of 5G Communications and Networks 198 6.1.1 5G Frequency Bands 198 6.1.2 Low Latency 199 6.1.3 More Efficient Radio Resource Utilization 201 6.1.4 Small Cells and Ultra-Dense Networks 202 6.1.5 Higher Flexibility 202 6.1.6 Virtualization 203 6.1.7 Distributed Network Architecture 204 6.1.8 Device-Centric Communications 205 6.1.9 New Air Interfaces 206 6.1.10 Big Data Management 206 6.2 5G New Radio 207 6.2.1 5G Radio Access Network Architecture 207 6.2.2 5G NR Deployment Scenarios 208 6.2.3 Frame Structure 209 6.2.4 5G Logical, Transport, and Physical Channels 213 6.2.5 5G Protocol Layers 217 6.2.6 5G NR Physical Layer Processing 220 6.2.7 5G Initial Access Procedure and Beam Management 222 6.3 5G Key Enabling Techniques 226 6.3.1 5GWaveforms 226 6.3.2 5G Multiple Access Schemes 227 6.3.3 Channel Coding Schemes 228 6.3.4 MIMO 230 6.3.5 mmWAVE 231 6.3.6 Network Slicing 232 6.3.7 Multi-access Edge Computing 232 Problems 235 References 237 7 Enhanced Mobile Broadband Communication Systems 239 7.1 Introduction 239 7.2 Design Approaches of eMBB Systems 240 7.3 MIMO 242 7.3.1 Capacity of MIMO Channel 243 7.3.2 Space–Time Coding Design 251 7.3.3 Spatial Multiplexing Design 262 7.3.4 Massive MIMO 268 7.4 5G Multiple Access Techniques 271 7.4.1 OFDM System Design 271 7.4.2 FBMC, GFDM, and UFMC 280 7.5 5G Channel Coding and Modulation 284 7.5.1 LDPC Codes 285 7.5.2 Coding and Modulation for High Spectral Efficiency 291 Problems 299 References 300 8 Ultra-Reliable and Low Latency Communication Systems 303 8.1 Design Approaches of URLLC Systems 304 8.2 Short Packet Transmission 306 8.3 Latency Analysis 317 8.4 Multi-Access Edge Computing 328 Problems 339 References 340 9 Massive Machine Type Communication Systems 343 9.1 Introduction 343 9.2 Design Approaches of mMTC Systems 344 9.3 Robust Optimization 351 9.4 Power Control and Management 362 9.4.1 Linear Programming for Power Control in Distributed Networks 363 9.4.2 Power Control Problem Formulations 366 9.4.3 Beamforming for Transmit Power Minimization 370 9.5 Wireless Sensor Networks 376 Problems 392 References 393 Index 397

    2 in stock

    £98.96

  • Massive Connectivity

    John Wiley & Sons Inc Massive Connectivity

    15 in stock

    Book SynopsisMassive Connectivity Learn to support more devices and sensors in Internet of Things applications through NOMA and machine-type communication Non-orthogonal multiple access (NOMA) has held much interest due to its ability to provide a higher spectral efficiencysuch as more bits per unit bandwidth in Hertzthan other, orthogonal multiple access schemes. The majority of this research focuses on the application of NOMA to downlink channels (from base station to users) in cellular systems as its use for uplink (users to base station) is somewhat circumscribed. However, NOMA has recently been employed in contention-based uplink access, which has shown an improvement in performance that allows an increase in the number of users that can be supported. As a result, NOMA is promising for machine-type communication (MTC) in 5G systems and beyond, making it a key enabler of the Internet of Things (IoT). Massive Connectivity provides an in-depth, comprehensive view of Table of ContentsPreface xiii 1 Introduction 1 1.1 Machine-Type Communication 1 1.2 Non-Orthogonal Multiple Access 3 1.3 NOMA for MTC 4 1.4 An Overview of Probability and Random Processes 6 1.4.1 Review of Probability 6 1.4.2 Random Variables 7 1.4.3 Random Processes 14 1.4.4 Markov Chains 15 2 Single-User and Multiuser Systems 19 2.1 A Single-User System 19 2.1.1 Signal Representation 20 2.1.2 Transmission of Signal Sequences 21 2.1.3 ML Decoding 23 2.1.4 ML Decoding over Fading Channels 26 2.1.5 Achievable Rate 28 2.2 Multiuser Systems 33 2.2.1 Broadcast Channels 34 2.2.2 Multiple Access Channels 37 2.3 Further Reading 41 3 OMA and NOMA 43 3.1 Orthogonal Multiple Access 43 3.1.1 Time Division Multiple Access 43 3.1.2 Frequency Division Multiple Access 46 3.1.3 Orthogonal Frequency Division Multiple Access 47 3.2 Non-Orthogonal Multiple Access 51 3.2.1 Downlink NOMA 52 3.2.2 Uplink NOMA 57 3.3 Power and Rate Allocation 60 3.3.1 System with Known Instantaneous CSI 60 3.3.2 System with Unknown Instantaneous CSI 67 3.4 Code Division Multiple Access 73 3.4.1 DS-CDMA 74 3.4.2 Multiuser Detection Approaches 78 3.5 Further Reading 84 4 Random Access Systems 87 4.1 ALOHA Systems 88 4.1.1 Single Channel Random Access 88 4.1.2 Multi-Channel S-ALOHA 90 4.2 Throughput Analysis 91 4.2.1 Pure ALOHA 91 4.2.2 Slotted ALOHA 92 4.2.3 Multichannel ALOHA 94 4.3 Analysis with a Finite Number of Users 98 4.3.1 A Markov Chain 98 4.3.2 Drift Analysis 100 4.4 Analysis with an In_nite Number of Users 102 4.4.1 Constant Re-transmission Probability 102 4.4.2 Adaptive Re-transmission Probability 104 4.5 Fast Retrial 107 4.6 Multiuser Detection 108 4.6.1 Compressive Random Access 108 4.6.2 Throughput Analysis 110 4.7 Further Reading 114 5 NOMA-based Random Access 117 5.1 NOMA to Random Access 117 5.1.1 S-ALOHA with NOMA 118 5.1.2 More Power Levels 122 5.2 Multichannel ALOHA with NOMA 127 5.2.1 Multichannel ALOHA with NOMA and Throughput Analysis 128 5.2.2 Channel-Dependent Selection 132 5.3 Opportunistic NOMA 137 5.3.1 System Model 137 5.3.2 Throughput Analysis 140 5.3.3 Opportunistic NOMA for Channel Selection 147 5.4 NOMA-based Random Access with Multiuser Detection 152 5.4.1 Compressive Random Access 152 5.4.2 Layered CRA 154 5.4.3 Performance under Realistic Conditions 159 5.5 Further Reading 161 6 Application of NOMA to MTC in 5G 163 6.1 Machine-Type Communication 163 6.1.1 IoT Connectivity 163 6.1.2 Random Access Schemes for MTC 164 6.2 A Model with Massive MIMO 168 6.2.1 Massive MIMO 168 6.2.2 Two-step Random Access with Massive MIMO 173 6.2.3 Throughput Analysis 174 6.3 NOMA for High-Throughput MTC 177 6.3.1 Co-existing Preambles and Data Packets 178 6.3.2 Maximum Throughput Comparison 180 6.3.3 Limitations 184 6.4 Layered Preambles for Heterogeneous Devices 185 6.4.1 Heterogeneous Devices in MTC 185 6.4.2 Design of Layered Preambles 187 6.4.3 Performance Analysis 189 6.5 Further Reading 195 7 Game-Theoretic Perspective of NOMA-based Random Access 197 7.1 Background of Game Theory 197 7.1.1 Normal-Form Games 198 7.1.2 Nash Equilibrium 200 7.1.3 Mixed Strategies 200 7.2 Random Access Game 202 7.2.1 Normal-Form and NE 203 7.2.2 Mixed Strategies 204 7.3 NOMA-ALOHA Game 204 7.3.1 Single-Channel NOMA-ALOHA Game 205 7.3.2 Multichannel NOMA-ALOHA Game 216 7.4 Fictitious Play 221 7.4.1 A Model for Fictitious Play 221 7.4.2 Convergence 223 7.5 Evolutionary Game Theory and Its Application 227 7.5.1 Population Games 227 7.5.2 Replicator Dynamics and Evolutionary Stable State 228 7.5.3 Stability of the Replicator Dynamics 231 7.5.4 Application to NOMA 232 7.6 Further Reading 234 Index 247

    15 in stock

    £92.70

  • Open RAN

    John Wiley & Sons Inc Open RAN

    15 in stock

    Book SynopsisOpen RAN A comprehensive survey of Open RAN technology and its ecosystem In Open RAN: The Definitive Guide, a team of distinguished industry leaders deliver an authoritative guide to all four principles of the Open RAN vision: openness, virtualization, intelligence, and interoperability. Written by the industry experts currently defining the specifications, building the systems, and testing and deploying the networks, the book covers O-RAN architecture, the fronthaul interface, security, cloudification, virtualization, intelligence, certification, badging, and standardization. This critical reference on Open RAN explains how and why an open and disaggregated, intelligent, and fully virtualized network is the way networks should be designed and deployed moving forward. Readers will also find: A thorough introduction from key industry players, including AT&T, Telefonica, Mavenir, VMWare, Google and VIAVI Comprehensive explorations of Open X-Table of ContentsList of Contributors xiii Foreword xv Preface xvii About the Authors xix Definitions / Acronyms xxi 1 The Evolution of RAN 1 Sameh M. Yamany 1.1 Introduction 1 1.2 RAN Architecture Evolution 4 1.2.1 The 2G RAN 5 1.2.2 The 3G RAN 6 1.2.3 The 4G/LTE RAN 6 1.2.4 The 5G RAN 9 1.3 The Case for Open RAN 11 1.4 6G and the Road Ahead 11 1.5 Conclusion 13 Bibliography 13 2 Open RAN Overview 14 Rittwik Jana 2.1 Introduction 14 2.1.1 What is Open RAN and Why is it Important? 17 2.1.2 How Does Open RAN Accelerate Innovation? 17 2.1.3 What are the major challenges that Open RAN can help to address? 18 2.2 Open RAN Architecture 18 2.3 Open RAN Cloudification and Virtualization 19 2.4 RAN Intelligence 20 2.5 Fronthaul Interface and Open Transport 20 2.6 Securing Open RAN 21 2.7 Open Source Software 21 2.8 RAN Automation and Deployment with CI/CD 22 2.9 Open RAN Testing 22 2.10 Industry Organizations 23 2.11 Conclusion 23 Bibliography 23 3 O-RAN Architecture Overview 24 Rajarajan Sivaraj and Sridhar Rajagopal 3.1 Introduction 24 3.1.1 General Description of O-RAN Functions 24 3.1.1.1 Centralized Unit – Control Plane and User Plane Functions (CU-CP and CU-UP) 26 3.1.1.2 Distributed Unit Function (DU) 26 3.1.1.3 Radio Unit Function (RU) 26 3.1.1.4 Evolved Node B (eNB) 27 3.1.2 RAN Intelligent Controller (RIC) and Service Management and Orchestration (SMO) Functions 28 3.1.3 Interfaces 29 3.2 Near-RT RIC Architecture 30 3.2.1 Standard Functional Architecture Principles 30 3.2.2 E2 Interface Design Principles 32 3.2.3 xApp API Design Architecture 34 3.3 Non-RT RIC Architecture 37 3.3.1 Standard Functional Architecture Principles 38 3.3.2 A1 Interface Design Principles 38 3.3.3 R1 API Design Principles for rApps 41 3.4 SMO Architecture 47 3.4.1 Standard Functional Architecture Principles 47 3.4.2 O1 Interface Design Principles 48 3.4.3 Open M-Plane Fronthaul Design Principles 51 3.4.4 O2 Interface Design Principles 52 3.5 Other O-RAN Functions and Open Interfaces 54 3.5.1 O-RAN compliant Centralized Unit Control Plane (O-CU-CP) 54 3.5.1.1 Control Plane Procedures 54 3.5.1.2 Management Plane Procedures 54 3.5.2 O-CU-UP 54 3.5.2.1 Control Plane Procedures 55 3.5.2.2 User Plane Procedures 55 3.5.2.3 Management Plane Procedures 55 3.5.3 O-DU 55 3.5.3.1 Control Plane Procedures 55 3.5.3.2 User Plane Procedures 55 3.5.3.3 Management Plane Procedures 55 3.5.4 O-eNB 56 3.5.5 O-RU 56 3.6 Conclusion 57 Bibliography 57 4 Cloudification and Virtualization 59 Padma Sudarsan and Sridhar Rajagopal 4.1 Virtualization Trends 59 4.2 Openness and Disaggregation with vRAN 59 4.3 Cloud Deployment Scenarios 61 4.3.1 Private, Public, and Hybrid Cloud 61 4.3.2 Telco Features Required for “Any Cloud” Deployment 62 4.3.3 On Premise, Far Edge, Edge, and Central Deployments 63 4.3.4 Classical, Virtual Machines (VMs), Containers, and Hybrid Deployments 64 4.4 Unwinding the RAN Monolith 64 4.4.1 Adapting Cloud-Native Principles 66 4.4.2 Architectural Patterns 67 4.4.3 Software Architecture Portability and Refactoring Considerations 68 4.4.4 Compute Architecture Consideration 69 4.5 Orchestration, Management, and Automation as Key to Success 70 4.5.1 Acceleration Abstraction Layer 73 4.5.2 Cloud Deployment Workflow Automation 75 4.6 Summary 76 Bibliography 76 5 RAN Intelligence 77 Dhruv Gupta, Rajarajan Sivaraj, and Rittwik Jana 5.1 Introduction 77 5.2 Challenges and Opportunities in Building Intelligent Networks 77 5.3 Background on Machine Learning Life Cycle Management 78 5.4 ML-Driven Intelligence and Analytics for Non-RT RIC 80 5.5 ML-Driven Intelligence and Analytics for Near-RT RIC 82 5.6 E2 Service Models for Near-RT RIC 83 5.6.1 E2SM-KPM 84 5.6.2 E2SM-RC 84 5.6.3 Other E2SMs 85 5.7 ml Algorithms for Near-RT RIC 86 5.7.1 Reinforcement Learning Models 87 5.8 Near-RT RIC Platform Functions for AI/ML Training 88 5.9 RIC Use Cases 89 5.10 Conclusion 90 Bibliography 90 6 The Fronthaul Interface 91 Aditya Chopra 6.1 The Lower-Layer Split RAN 91 6.1.1 Lower Layer Fronthaul Split Options 92 6.2 Option 8 Split – CPRI and eCPRI 93 6.3 Option 6 Split – FAPI and nFAPI 94 6.3.1 Subinterfaces 97 6.3.2 Architecture Agnostic Deployment 97 6.4 Option 7 Split – O-RAN Alliance Open Fronthaul 97 6.4.1 Control (C) and User (U) Plane 98 6.4.2 Management (M) Plane 98 6.4.3 Synchronization (S) Plane 100 6.4.4 Key Features 100 6.4.4.1 Fronthaul Compression 100 6.4.4.2 Delay Management 102 6.4.4.3 Beamforming 102 6.4.4.4 Initial Access 103 6.4.4.5 License Assisted Access and Spectrum Sharing 104 6.5 Conclusions 104 Bibliography 104 7 Open Transport 105 Reza Vaez-Ghaemi and Luis Manuel Contreras Murillo 7.1 Introduction 105 7.2 Requirements 105 7.2.1 Fronthaul Requirements 106 7.2.2 Midhaul Requirements 106 7.2.3 Backhaul Requirements 107 7.2.4 Synchronization Requirements 107 7.3 WDM Solutions 108 7.3.1 Passive WDM 109 7.3.2 Active WDM 109 7.3.3 Semiactive WDM 110 7.4 Packet-Switched Solutions 111 7.4.1 Technology Overview 112 7.4.2 Deployment Patterns 112 7.4.3 Connectivity Service and Protocols 113 7.4.4 Quality of Service (QoS) 114 7.5 Management and Control Interface 114 7.5.1 Control and Management Architecture 114 7.5.2 Interaction with O-RAN Management 116 7.6 Synchronization Solutions 117 7.6.1 Synchronization Baseline 117 7.6.2 Synchronization Accuracy and Limits 118 7.7 Testing 118 7.8 Conclusion 119 Bibliography 120 8 O-RAN Security 121 Amy Zwarico 8.1 Introduction 121 8.2 Zero Trust Principles 121 8.3 Threats to O-RAN 122 8.3.1 Stakeholders 122 8.3.2 Threat Surface and Threat Actors 122 8.3.3 Overall Threats 123 8.3.4 Threats Against the Lower Layer Split (LLS) Architecture and Open Fronthaul Interface 123 8.3.5 Threats Against O-RU 124 8.3.6 Threats Against Near- and Non-Real-Time RICs, xApps, and rApps 124 8.3.7 Threats Against Physical Network Functions (PNFs) 124 8.3.8 Threats Against SMO 125 8.3.9 Threats Against O-Cloud 125 8.3.10 Threats to the Supply Chain 125 8.3.11 Physical Threats 126 8.3.12 Threats Against 5G Radio Networks 126 8.3.13 Threats to Standards Development 126 8.4 Protecting O-RAN 126 8.4.1 Securing the O-RAN-Defined Interfaces 126 8.4.1.1 A1 127 8.4.1.2 O1 127 8.4.1.3 O2 128 8.4.1.4 E2 128 8.4.1.5 Open Fronthaul 128 8.4.1.6 R1 130 8.4.1.7 3GPP Interfaces 131 8.4.2 Securing the O-Cloud 131 8.4.3 Container Security 131 8.4.4 O-RAN Software Security 131 8.4.5 Software Bill of Materials (SBOM) 132 8.5 Recommendations for Vendors and MNOs 132 8.6 Conclusion 134 Bibliography 134 9 Open RAN Software 137 David Kinsey, Padma Sudarsan, and Rittwik Jana 9.1 Introduction 137 9.2 O-RAN Software Community (OSC) 138 9.2.1 OSC Projects 138 9.2.2 The Service Management and Orchestration (SMO) Framework 138 9.2.3 Near-RT RIC (RIC) 139 9.2.4 O-CU-CP and O-CU-UP 140 9.2.5 O-DU Project 140 9.2.6 O-RU 140 9.2.7 O-Cloud 140 9.2.8 The AI/ML Framework 141 9.2.9 Support Projects 141 9.3 Open Network Automation Platform (ONAP) 141 9.3.1 Netconf/YANG Support 141 9.3.2 Configuration Persistence 142 9.3.3 VES Support 142 9.3.4 A1 Support 142 9.3.5 Optimization Support 142 9.4 Other Open-Source Communities 143 9.5 Conclusion 144 Bibliography 144 10 Open RAN Deployments 145 Sidd Chenumolu 10.1 Introduction 145 10.2 Network Architecture 146 10.2.1 Network Components 147 10.2.1.1 Antenna 147 10.2.1.2 O-RAN – Radio Unit 148 10.2.1.3 O-RAN-Distributed Unit (O-DU) 150 10.2.1.4 O-RAN-Centralized Unit (O-CU) 150 10.2.1.5 RAN Intelligent Controller (RIC) 150 10.2.2 Traditional vs. O-RAN Deployment 151 10.2.3 Typical O-RAN Deployment 152 10.2.4 Spectrum and Regulatory 153 10.3 Network Planning and Design 153 10.3.1 Cell Site Design 154 10.3.2 Network Function Placement 155 10.3.3 Dimensioning 155 10.3.3.1 Application Dimensioning 155 10.3.3.2 Platform Dimensioning 156 10.3.4 Virtualization Impact 156 10.3.4.1 Non-Uniform Memory Access 157 10.3.4.2 Hyper-Threading 157 10.3.4.3 CPU Pinning 157 10.3.4.4 Huge Page 157 10.3.4.5 Single Root Input/Output Virtualization 158 10.3.4.6 PCI Passthrough 158 10.3.4.7 Data Plane Development Kit 158 10.3.4.8 Resource Director Technology 158 10.3.4.9 Cache Allocation Technology 158 10.3.4.10 Resource Overcommitment 159 10.3.4.11 Operating System 159 10.3.4.12 K8S Impact 159 10.3.5 Networking Hardware 159 10.3.6 Hardware Type 160 10.3.7 Reliability and Availability 160 10.3.8 Impact of Network Slicing 161 10.4 Network Deployment 162 10.4.1 DU Deployment 162 10.4.1.1 DU Deployed at a Centralized Data Center 162 10.4.1.2 Timing Design When DU is at the dc 163 10.4.1.3 DU Deployed at Cell Site 164 10.4.2 CU Deployment 165 10.4.3 Radio Unit Instantiation 165 10.4.4 Radio Unit Management 166 10.4.4.1 Hierarchical Management Architecture Model 166 10.4.4.2 Hybrid Management Architecture Model 166 10.4.5 Network Management 166 10.4.6 Public Cloud Provider Overview 167 10.4.6.1 Native Services 167 10.4.6.2 CD Pipeline 167 10.4.6.3 Cluster Creation and Management 168 10.4.6.4 Transport Design 168 10.4.7 Life Cycle Management of NFs 168 10.4.8 Network Monitoring and Observability 169 10.4.8.1 Prometheus 169 10.4.8.2 Jaeger 169 10.4.8.3 Fluentd and Fluentbit 169 10.4.8.4 Probing 169 10.4.9 Network Inventory 169 10.4.10 Building the Right Team 170 10.5 Conclusion 170 Bibliography 170 11 Open RAN Test and Integration 172 Ian Wong, Ph.D. 11.1 Introduction 172 11.2 Testing Across the Network Life Cycle 174 11.3 O-RAN ALLIANCE Test and Integration Activities 175 11.3.1 Test Specifications 175 11.3.2 Conformance Test Specifications 176 11.3.2.1 A1 Interface Test Specification (O-RAN.WG2.A1TS) 178 11.3.2.2 E2 Interface Test Specification (O-RAN.WG3.E2TS) 179 11.3.2.3 Open Fronthaul Conformance Test Specification (O-RAN.WG4.CONF) 180 11.3.2.4 Xhaul Transport Testing (O-RAN.WG9.XTRP-Test.0) 181 11.3.2.5 Security Test Specifications (O-RAN.SFG.Security-Test-Specifications) 181 11.3.3 Interoperability Test Specifications 181 11.3.3.1 Fronthaul Interoperability Test Specification (O-RAN.WG4.IOT.0-09.00) 182 11.3.3.2 Open F1/W1/E1/X2/Xn Interoperability Test Specification (O-RAN.WG5.IOT.0) 183 11.3.3.3 Stack Interoperability Test Specification (O-RAN.WG8.IOT) 183 11.3.4 End-to-End Test Specifications 185 11.3.5 O-RAN Certification and Badging 186 11.3.6 Open Test and Integration Centers 187 11.3.7 O-RAN Global PlugFests 189 11.4 Conclusion 189 Bibliography 189 12 Other Open RAN Industry Organizations 191 Aditya Chopra, Manish Singh, Prabhakar Chitrapu, Luis Lopes, and Diane Rinaldo 12.1 Telecom Infra Project 191 12.1.1 Organizational Structure 192 12.1.2 Core Activities 194 12.2 Trials and Deployments 194 12.3 Small Cell Forum 195 12.3.1 A History of Openness at SCF 196 12.3.2 Alignment with the 3GPP and O-RAN Alliance Solutions 196 12.4 3rd Generation Partnership Project 197 12.5 Open RAN Policy Coalition 199 12.6 Conclusion 200 Bibliography 200 Index 201

    15 in stock

    £91.80

  • 6G and Onward to Next G

    John Wiley & Sons Inc 6G and Onward to Next G

    15 in stock

    Book SynopsisThis book weaves emerging themes in future 6G and Next G networks carefully together. It points to three spheres of contexts with different narratives for the year 2030 and beyond, in which the coming Metaverse as the precursor of the future Multiverse can be embedded naturally. The book aims at providing the reader with new cross-disciplinary research material, ranging from communication and computer science to cognitive science, social sciences, and behavioral economics, for building a deeper Metaverse. It will be instrumental in helping the reader find and overcome some of the most common 6G and Next G blind spots. Modern networks are more than communication and computer science. They may be better viewed as techno-social systems that exhibit complex adaptive system behavior and resemble biological superorganisms. 6G and especially Next G should go beyond continuing the linear incremental 6G=5G+1G mindset of past generations of mobile networks. To this end, the book: Helps readerTable of ContentsAbout the Author xiv Preface xv Acknowledgments xvii Acronyms xviii Chapter 1 Introduction 1 1.1 Toward 6G: A New Era of Convergence 1 1.2 Fusion of Digital and Real Worlds: Multiverse vs. Metaverse 5 1.2.1 The Multiverse: An Architecture of Advanced XR Experiences 7 1.2.2 Metaverse: The Next Big Thing? 9 1.3 The Big Picture: Narratives for 2030 and Beyond 11 1.3.1 From IoT-Based Industry 4.0 to Human-Centric Cyber–Physical–Social Systems 11 1.3.2 Human-Centric Industry 5.0 12 1.3.3 Society 5.0 13 1.4 Purpose and Outline of Book 17 1.4.1 Embedding the Multiverse and Metaverse in Meta Narrative Society 5.0 19 1.4.2 The Art of 6G and Next G: How To Wire Society 5.0 22 1.4.2.1 Next G: Beyond Incremental 6G = 5G + 1G Mindset 23 1.4.2.2 Society 5.0: Exodus to the Virtual World? 25 1.4.3 Finding Your 6G/Next G Blind Spot 26 1.4.4 Outline 27 References 33 Chapter 2 Metaverse: The New North Star 37 2.1 Origins 38 2.1.1 Avatars and Daemons 38 2.1.2 Hypercard and Language of Nature 39 2.1.3 Sumerian Creation Myth: The Nam-Shub of Enki – A Neurolinguistic Virus 40 2.1.4 Metaverse: At Once Brand New and Very Ancient 43 2.2 Early Deployments 44 2.2.1 Metaverse Components, Applications, and Open Challenges 44 2.2.2 Nissan’s Invisible-to-Visible (I2V) Connected-Car Technology Concept 46 2.2.3 Internet of No Things: Making the Internet Disappear and “See the Invisible” 48 2.3 Key Enabling Technologies 49 2.3.1 Metaverse Roadmap of 6G Communications and Networking Technologies 49 2.3.2 CPSS-Based Sustainable and Smart Societies: Integrated Human, Artificial, Natural, and Organizational Intelligence 52 2.3.3 NFTs: Tulip Mania or Digital Renaissance? 54 2.3.3.1 What Is an NFT? 55 2.3.3.2 How Do NFTs Work? 55 2.4 Definition(s) of the Metaverse 56 2.4.1 Confusion and Uncertainty as Features of Disruption 57 2.4.2 Blockchains, Cryptocurrencies, and Tokens: The First Digitally Native Payment Rail 58 2.4.3 Social DAOs 60 2.4.4 Metaversal Existence: Life, Labor, and Leisure 62 2.4.5 Gaming on the Blockchain 63 2.5 Metaverse Economy and Community: Gamified Experiences 64 References 66 Chapter 3 The Multiverse: Infinite Possibility 67 3.1 Experience Innovation on the Digital Frontier 67 3.2 The Multiverse 69 3.2.1 Realms of Experience 69 3.2.2 Experience Design Canvas 73 3.3 Beyond the Metaverse Origins: Into the Future 74 3.3.1 Limitless Mind 75 3.3.2 Realm of the Infinite: The Eternal 75 References 75 Chapter 4 6G Vision and Next G Alliance Roadmap 77 4.1 6G Vision: Recent Progress and State of the Art 79 4.1.1 6G Paradigm Shifts 79 4.1.2 Value-Creation-and-Capture Problem 81 4.1.3 Perceptive Mobile Networks (PMNs) 81 4.1.4 Quantum-Enabled 6G Wireless Networks 82 4.1.5 From Softwarized to Blockchainized Mobile Networks 83 4.1.6 AI-Native 6G Networks 84 4.1.6.1 From 5G AI4Net to 6G Net4AI 84 4.1.6.2 Intelligence-Endogenous Network (IEN) 86 4.1.6.3 Native Edge AI: Mimicking Nature Through Brain-Inspired Stigmergy 87 4.1.7 THz Communications: An Old Problem Revisited 89 4.1.8 Comparison between NG-OANs and 6G RANs 90 4.1.9 6G Standardization Roadmap 91 4.2 NSF: Next G Research 92 4.3 Next G Alliance Roadmap 93 4.3.1 Six Audacious Goals 93 4.3.2 Societal and Economic Needs 95 4.3.3 The Four Fundamental Areas for 6G Applications and Use Cases 96 References 98 Chapter 5 6G Post-Smartphone Era: XR and Hybrid-Augmented Intelligence 101 5.1 XR in the 6G Post-Smartphone Era 101 5.1.1 Internet of No Things: The Gadget-Free Internet 103 5.1.2 Extended Reality (XR): Unleashing Its Full Potential 104 5.1.3 Invisible-to-Visible (I2V) Technologies 105 5.1.4 Extrasensory Perception (ESP) 107 5.1.5 Mimicking the Quantum Realm: Nonlocal Awareness of Space and Time 108 5.1.5.1 Precognition 109 5.1.5.2 Eternalism 110 5.2 Hybrid-Augmented Intelligence 114 5.2.1 Ethereum: The DAO 116 5.2.2 DAO Use Case: Decentralizing Technosocial Systems 117 5.2.2.1 The Tactile Internet: Key Principles 118 5.2.2.2 FiWi-enhanced Mobile Networks: Spreading Ownership 119 5.2.2.3 Decentralizing the Tactile Internet: AI-Enhanced MEC and Crowdsourcing 120 5.2.3 From AI to Human Intelligence Amplification (IA) 124 5.2.3.1 Cognitive Assistance 124 5.2.3.2 Hybrid-Augmented Intelligence 125 5.2.3.3 Decentralized Self-Organizing Cooperative 125 5.2.4 Collective Intelligence: Nudging via Smart Contract 126 References 128 Chapter 6 Web3 and Token Engineering 131 6.1 Emerging Web3 Token Economy 131 6.2 Backend Revolution 132 6.3 Technology-Enabled Social Organisms 132 6.4 Tokens 133 6.4.1 Tokenization: Creation of Tokenized Digital Twins 133 6.4.2 Token Contract 134 6.4.3 Fungible Tokens vs. Non-Fungible Tokens (NFTs) 134 6.4.4 Purpose-Driven Tokens 136 6.4.4.1 Public Goods and Externalities 136 6.4.4.2 Club Goods and Tech-Driven Public Goods 137 6.5 Mechanism Design and Token Engineering 138 References 140 Chapter 7 From Robonomics to Tokenomics 141 7.1 Robonomics 141 7.2 Blockchain Oracles and On-Chaining 142 7.3 Blockchain-Enabled Trust Game 143 7.3.1 Open Research Challenges 144 7.3.2 Blockchain-Enabled Implementation 146 7.3.2.1 Experimenter Smart Contract 146 7.3.2.2 Blockchain Mechanism Deposit 147 7.3.2.3 Experimental Validation 148 7.4 On-Chaining Oracle for Networked N-Player Trust Game 150 7.4.1 Architecture of Oracle 151 7.4.2 On-Chaining of Voting-Based Decisions 153 7.4.3 Experimental Validation 153 7.5 Playing the N-Player Trust Game with Persuasive Robots 155 7.6 Tokenomics 161 References 162 Chapter 8 Society 5.0: Internet As If People Mattered 165 8.1 Human Nature: Bounded Rationality and Predictable Irrationality 166 8.2 Society 5.0: Human-Centeredness 167 8.3 The Path (DAO) to a Human-Centered Society 168 8.3.1 Token Engineering DAO Framework for Society 5.0 168 8.3.2 The Human Use of Human Beings: Cybernetics and Society 170 8.4 From Biological Superorganism to Stigmergic Society 171 8.4.1 Stigmergy Enhanced Society 5.0: Toward the Future Stigmergic Society 172 8.4.2 Implementation 173 8.4.3 Experimental Results 175 8.5 Biologization: Exiting the Anthropocene and Entering the Symbiocene 176 References 178 Chapter 9 Metahuman: Unleashing the Infinite Potential of Humans 179 9.1 Becoming Human: The Biological Uniqueness of Humans 179 9.1.1 Social Cognition 180 9.1.2 Coordinated Decision-Making 180 9.1.3 Uniquely Human Sociality 182 9.1.4 How Evolution Makes Us Smarter and More Social 183 9.2 Implications of Biological Human Uniqueness for Metaverse 185 9.3 MetaHuman Creator: Building a More Realistic Virtual World 189 9.3.1 Crossing the Uncanny Valley 189 9.3.2 Infinite Reality: Embodied Avatars and Eternal Life 190 9.3.2.1 Embodied Avatars 191 9.3.2.2 Eternal Life: Virtual Immortality 192 9.4 The Case Against Reality: Why Evolution Hid the Truth from Our Eyes 193 9.4.1 Cognitive Science: From Token Economy to the World as a Network of Conscious Agents 193 9.4.2 The Fitness-Beats-Truth Theorem 194 9.5 Simulated Reality: The Simulation Hypothesis 195 9.6 Metareality and Metahuman 196 9.6.1 The Human Condition 197 9.6.2 Deus Ex Machina 197 References 198 Chapter 10 Opportunities vs. Risks 201 10.1 The “New New Normal” and Upcoming T Junction 202 10.2 Opportunities 207 10.2.1 An Inconvenient Truth for Everything: Earth Inc. vs. Global Mind 207 10.2.2 The Social Singularity 209 10.2.2.1 Social Physics and Human Hive Mind 209 10.2.2.2 Ethereum: The World Computer 210 10.2.2.3 Extended Stigmergy in Dynamic Media 210 10.2.3 6G, Next G, and the Metaverse: Toward the Peak-Experience Machine 211 10.2.3.1 The Experience Machine 212 10.2.3.2 Toward Peak-Experiences 212 10.2.3.3 Deus Ex Machina Technologies 214 10.3 Risks 215 10.3.1 Ray Kurzweil’s Age of Spiritual Machines 216 10.3.2 Platform Capitalism: Uberworked and Underpaid 217 10.3.3 BUMMER Machine 2.0 218 10.4 Team Human: From Communications to Communitas 220 10.4.1 Self-Refuting Tech Prophecy 221 10.4.2 The Human Strategy 221 10.4.3 Understanding Thinking: From Silicon Valley and Computation to Human Reasoning and Intelligence 222 10.4.4 Communitas: Fusion of Self and World 225 10.4.4.1 Transcendent Experiences 225 10.4.4.2 Communitas: Jumping the Gap into the Future 226 10.4.5 Team Human: Are We in the Midst of the Next Renaissance? 228 References 230 Chapter 11 Conclusion and Outlook 233 11.1 Today’s Life in “Parallel Universes” 233 11.2 The Road Ahead to the Future Multiverse: 6G, Next G, and the Metaverse 235 11.2.1 Metaverse: Mirror of Real World Rather than Virtual Escape Hatch 235 11.2.2 Overcoming 6G and Next G Blind Spots 237 11.2.3 Super Smart Society 5.0: From Galileo’s Telescope to Metaverse’s Telóscope 242 11.3 Age of Discovery: Navigating the Risks and Rewards of Our New Renaissance 247 11.3.1 The Formula for Mass Flourishing 248 11.3.2 Cognitive Blind Spots: Social Complexity vs. Cognitive Capacity 250 References 252 Epilogue 253 Index 257

    15 in stock

    £65.25

  • Laser InterSatellite Links Technology

    John Wiley & Sons Inc Laser InterSatellite Links Technology

    15 in stock

    Book SynopsisLASER INTER-SATELLITE LINKS TECHNOLOGY State of the art resource covering key technologies and related theories of inter-satellite links Laser Inter-Satellite Links Technology explores satellite networking as a growing topic in the field of communication technology, introducing the definition, types, and working frequency bands of inter-satellite links, discussing the number of orbital elements of the spacecraft motion state under two-body motion and their conversion relationship, and establishing the basic demand model for inter-satellite link network, chain topology model, and transmission protocol model. The book focuses on the analysis and introduction of the principles and error sources of microwave and laser inter-satellite ranging, including the basic composition, workflow, and constraints of the laser inter-satellite link, and related design principles of the inter-satellite laser transmitter and receivers. Later chapters also discuss theories andTable of ContentsAuthor Biography xi Preface xiii 1 Introduction 1 1.1 Connotation of Inter-Satellite Link 1 1.2 Types of Inter-Satellite Links 5 1.3 Band Selection of Inter-Satellite Link 7 1.3.1 Selection of Link Band 7 1.3.2 Selection of Working Frequency 8 1.4 Microwave Inter-Satellite Link 10 1.4.1 Frequency Selection 10 1.4.2 Microwave Inter-Satellite Link Data Transmission System 12 1.5 Laser Inter-Satellite Link 14 1.5.1 Technical Characteristics of Laser Inter-Satellite Link 14 1.5.2 Future Requirements for Laser Inter-Satellite Links 15 1.5.3 Development Trend of Laser Inter-Satellite Links 16 1.5.3.1 The Development of Laser Communication Technology from Technical Verification to Engineering Application Stage 16 1.5.3.2 The Communication Rate Develops from Low Code Rate to High Code Rate 16 1.5.3.3 Deep Space Will Become an Important Place for Laser Communication Applications 17 1.5.3.4 Combined Use of Laser Communication and Laser Ranging 18 1.5.3.5 Integration and Miniaturization of Laser Communication Terminals 18 1.5.3.6 Networking of Laser Inter-Satellite Links 19 References 19 2 Development History of Laser Inter-Satellite Link 21 2.1 Development Stage of Laser Inter-Satellite Link 21 2.2 Development Status of Laser Inter-Satellite Link Technology in Various Countries 22 2.2.1 United States 22 2.2.1.1 Lunar Laser Communication Demonstration 26 2.2.1.2 Relay Laser Communication Demonstration (LCRD) (GEO-Ground) 27 2.2.1.3 Integrated Laser Communication Terminal (ILLUMA-T) 30 2.2.1.4 Deep Space Optical Communication (DSOC) Project Terminal Reaches Level 6 Technology Maturity 30 2.2.1.5 Ultra-Light and Small Communication Terminal (OSCD) 33 2.2.2 Europe 33 2.2.2.1 Semiconductor Laser Inter-Satellite Link Experiment 33 2.2.2.2 European Data Relay Satellite System Project (EDRS) 34 2.2.2.3 Micro Laser Communication Terminal (OPTEL-μ) 35 2.2.3 Japan 36 2.2.3.1 Japanese Data Relay Satellite 37 2.2.3.2 High-Speed Communication of Advanced Laser Instruments 38 2.2.3.3 Miniaturized Laser Communication Terminal (SOTA) 39 2.3 Experience and Inspiration 39 2.3.1 Strengthen the Research on New Laser Inter-Satellite Links and Enhance the Innovation of Technology Research and Development 40 2.3.2 Strengthen the On-Orbit Verification of New Technologies and Improve the Engineering Level of New Technologies 40 2.3.3 Simplify the Product Spectrum and Promote the Construction of Product Pipelines 40 2.3.4 Respond to Commercial Product Demand and Reduce Product Cost 41 2.3.5 The Key Development Direction of Low-Orbit Laser Inter-Satellite Link Engineering Demonstration Work 41 References 41 3 Spacecraft Orbits and Application 45 3.1 Overview 45 3.2 Kepler’s Laws 46 3.2.1 Kepler’s First Law 46 3.2.2 Kepler’s Second Law 47 3.2.3 Kepler’s Third Law 47 3.3 Two-Body Motion and Orbital Parameters 47 3.3.1 Two-Body Movement 47 3.3.2 Track Parameters 49 3.4 Near-Earth Space Orbits and Applications 53 3.4.1 Track Type 54 3.4.2 Sub-Satellite Point Trajectory 54 3.4.3 Several Commonly Used Tracks 55 3.4.3.1 Sun-Synchronous Orbit 55 3.4.3.2 Return to the Track 56 3.4.3.3 Geosynchronous Orbit 57 3.4.3.4 Freeze the Track 58 3.4.4 Overlay 59 3.4.4.1 Coverage Area 59 3.4.4.2 Minimum Observation Angle 60 References 61 4 Basic Model of Constellation Inter-Satellite Link Networking 63 4.1 Application Requirements of Satellite Navigation Inter-Satellite Links 63 4.1.1 Constellation Precise Orbit Determination and Time Synchronization 64 4.1.2 Data Communication 64 4.1.3 Autonomous Operation 65 4.1.4 Extended Service 65 4.2 Basic Requirement Model of Inter-Satellite Link Network Application 66 4.2.1 Basic Configuration of Constellations 66 4.2.2 Inter-Satellite Transmission Network Based on STDMA 67 4.2.3 Antenna Solution 71 4.2.4 Inter-Satellite Link Application Mode 72 4.3 Inter-Satellite Link Network Chain Topology Model 74 4.3.1 Analysis of Topological Attribute of Inter-Satellite Links 74 4.3.2 Inter-Satellite Visibility Analysis 74 4.3.3 Inter-Satellite Link Topology Cost 77 4.3.3.1 Path Loss 78 4.3.3.2 Transmission Loss 79 4.3.3.3 Protocol Overhead 82 4.4 Inter-Satellite Link Network Protocol Model 83 4.4.1 Inter-Satellite Network Protocol Model 83 4.4.2 Transport Layer Protocol 84 References 85 5 Principles of Laser Inter-Satellite Ranging 87 5.1 Principle of Inter-Satellite Ranging 87 5.2 Inter-Satellite Ranging Accuracy 88 5.3 Principle of Microwave Inter-Satellite Ranging 89 5.3.1 Principle of Pseudo-Range Two-Way Ranging 89 5.3.2 Analysis of Error Sources in Microwave Ranging 91 5.3.2.1 Antenna Phase Center Error 91 5.3.2.2 Device Circuit Delay Error 93 5.3.2.3 Multipath Effect Error 93 5.3.2.4 Ionospheric Delay Error 93 5.3.2.5 Relativistic Effect Error 94 5.4 Principle of Laser Inter-Satellite Ranging 95 5.4.1 Principle of Laser Pulse Ranging 95 5.4.2 Analysis of Error Sources in Laser Ranging 96 References 97 6 Composition of Laser Inter-Satellite Link 99 6.1 Basic Structure of Laser Inter-Satellite Link 99 6.1.1 Optical Transmitting Subsystem 99 6.1.2 Light Receiving Subsystem 100 6.1.3 Align, Capture, Track Subsystem (PAT) 101 6.2 Workflow of Laser Inter-Satellite Link 101 6.3 Constraints 103 6.3.1 Satellite Orbit 103 6.3.2 Satellite Attitude 104 6.3.3 Uncertain Angle of Pre-Cover 105 6.3.4 Satellite Vibration Problem 106 6.3.5 Dynamic Coupling Problem 107 6.3.6 Influence of Background Stray Light 107 6.4 Transmitter Design 110 6.4.1 Choice of Laser 110 6.4.2 Wavelength Selection 111 6.4.3 Selection of the Diameter of the Transmitting Antenna 112 6.4.4 Calculation of Transmitting Antenna Gain 112 6.5 Receiver Design 113 6.5.1 Selection of Receiver Detector 113 6.5.2 Selection of Receiving Antenna Aperture 114 6.5.3 Calculation of Receiving Antenna Gain 114 6.5.4 Calculation of Received Power 115 References 115 7 Inter-Satellite Laser Capture, Aiming, and Tracking System 117 7.1 Introduction 117 7.2 Acquisition 119 7.2.1 Capture Scheme 120 7.2.1.1 Stare-Scan 120 7.2.1.2 Scan-Scan 121 7.2.2 Capture Path 122 7.3 Pointing 123 7.4 Tracking 124 7.4.1 Analysis of Tracking System Beacon Beam Divergence 124 7.4.2 The Role of the Tracking System in the APT System 126 7.5 APT System Terminal Structure 128 7.5.1 Coarse Sight Subsystem Design 129 7.5.1.1 Coarse Sight Subsystem Composition 129 7.5.1.2 Coarse Aiming Control Subsystem Design 132 7.5.2 Design of Precision Sighting Subsystem 133 7.5.2.1 The Composition of the Precision Aiming Subsystem 133 7.5.2.2 Design of Precision Aiming Control System 135 References 136 8 Inter-Satellite Laser Link Tracking Error 139 8.1 Definition of Alignment Error 139 8.2 Alignment Error Model and Factor Analysis 140 8.2.1 Mathematical Modeling of Alignment Errors 140 8.2.2 Factors Causing Alignment Errors 143 8.2.3 Influence of Tracking Error on Beam Distribution at Receiver 144 8.2.3.1 The Effect of Tracking Error on the Beam Intensity at the Receiving End 145 8.2.3.2 Influence of Tracking Error on Beam Power at Receiver 146 8.2.4 Influence of Tracking and Pointing Error on Communication Error Rate 147 8.3 Analysis of Tracking and Pointing Error Sources of Inter-Satellite Laser Communication System 149 8.3.1 Satellite Platform Vibration 151 8.3.2 Detector Noise 152 8.3.2.1 Characteristics and Types of Detector Noise 152 8.3.2.2 Effect of Detector Noise on System Performance 155 8.4 Satellite Platform Vibration Suppression Scheme 157 8.4.1 Satellite Platform Vibration Suppression Scheme 157 8.4.1.1 Passive Vibration Isolation 157 8.4.1.2 Active Control 158 8.4.2 Feedforward Vibration Suppression Algorithm 159 8.4.2.1 Influence of Satellite Platform Vibration on Precision Aiming Control System 159 8.4.2.2 Analysis of Feedforward Vibration Suppression Algorithm 161 References 165 9 Inter-Satellite Link Laser Modulation Mode 167 9.1 Block Diagram of Inter-Satellite Link Optical Communication System 167 9.2 Typical Incoherent Optical Modulation (IM/DD) 168 9.2.1 On-Off Key Control 169 9.2.2 Pulse Position Modulation 169 9.2.3 Differential Pulse Position Modulation 169 9.2.4 Digital Pulse Interval Modulation 171 9.2.5 Double Head Pulse Interval Modulation 171 9.3 Coherent Optical Communication Modulator and Modulation Principle 172 9.3.1 Optical Modulator 173 9.3.2 Coherent Optical Communication Modulation Format 174 9.3.2.1 Binary Phase Shift Keying 174 9.3.2.2 Quaternary Phase Shift Keying 175 9.3.2.3 8psk 176 9.3.2.4 8qam 178 9.4 Comparison of Communication Performance of Laser Modulation Schemes 179 9.4.1 Average Transmit Power 179 9.4.1.1 OOK 179 9.4.1.2 PPM 179 9.4.1.3 DPPM 179 9.4.1.4 DPIM 180 9.4.1.5 DH-PIM 180 9.4.1.6 Coherent PSK 180 9.4.2 Transmission Bandwidth 180 9.4.2.1 PPM 180 9.4.2.2 DPPM 181 9.4.2.3 DPIM 181 9.4.2.4 DH-PIM 181 9.4.2.5 Coherent PSK 181 9.4.3 Bit Error Rate 181 9.4.3.1 OOK 182 9.4.3.2 PPM 182 9.4.3.3 DPPM 182 9.4.3.4 DPIM 183 9.4.3.5 DH-PIM 183 9.4.3.6 BPSK 183 9.4.4 Summary 183 References 184 Index 187

    15 in stock

    £91.80

  • LTE Advanced

    John Wiley & Sons Inc LTE Advanced

    15 in stock

    Book SynopsisExamining the main technical enhancements brought by LTE-Advanced (LTE-A), this book thoroughly covers 3GPP R10 and R11 specifications. Using illustrations, graphs and real-life scenarios, the authors systematically lead readers through this cutting-edge topic to provide an outlook on existing technologies as well as possible future developments.Table of ContentsList of Contributors xiii Preface xv Acknowledgements xvii List of Abbreviations xix 1 Introduction 1Harri Holma and Antti Toskala 1.1 Introduction 1 1.2 Radio Technology Convergence Towards LTE 1 1.3 LTE Capabilities 3 1.4 Underlying Technology Evolution 4 1.5 Traffic Growth 4 1.6 LTE-Advanced Schedule 6 1.7 LTE-Advanced Overview 6 1.8 Summary 7 2 LTE-Advanced Standardization 8Antti Toskala 2.1 Introduction 8 2.2 LTE-Advanced and IMT-Advanced 8 2.3 LTE-Advanced Requirements 9 2.4 LTE-Advanced Study and Specification Phases 10 2.5 Further LTE-Advanced 3GPP Releases 11 2.6 LTE-Advanced Specifications 11 2.7 Conclusions 12 References 12 3 LTE Release 8 and 9 Overview 14Antti Toskala 3.1 Introduction 14 3.2 Physical Layer 14 3.3 Architecture 22 3.4 Protocols 23 3.5 EPC and IMS 26 3.6 UE Capability and Differences in Release 8 and 9 27 3.7 Conclusions 28 References 29 4 Downlink Carrier Aggregation 30Mieszko Chmiel and Antti Toskala 4.1 Introduction 30 4.2 Carrier Aggregation Principle 30 4.3 Protocol Impact from Carrier Aggregation 33 4.4 Physical Layer Impact from Carrier Aggregation 38 4.5 Performance 42 4.6 Band Combinations for Carrier Aggregation 46 4.7 Conclusions 48 Reference 49 5 Uplink Carrier Aggregation 50Jari Lindholm, Claudio Rosa, Hua Wang and Antti Toskala 5.1 Introduction 50 5.2 Uplink Carrier Aggregation Principle 50 5.3 Protocol Impacts from Uplink Carrier Aggregation 51 5.4 Physical Layer Impact from Uplink Carrier Aggregation 52 5.5 Performance 56 5.6 Band Combinations for Carrier Aggregation 61 5.7 Conclusions 62 References 62 6 Downlink MIMO 63Timo Lunttila, Peter Skov and Antti Toskala 6.1 Introduction 63 6.2 Downlink MIMO Enhancements Overview 63 6.3 Protocol Impact from Downlink MIMO Enhancements 64 6.4 Physical Layer Impact from Downlink MIMO 65 6.5 Performance 70 6.6 Conclusions 73 References 74 7 Uplink MIMO 75Timo Lunttila, Kari Hooli, YuYu Yan and Antti Toskala 7.1 Introduction 75 7.2 Uplink MIMO Enhancements Overview 75 7.3 Protocol Impacts from Uplink MIMO 76 7.4 Physical Layer Impacts from Uplink MIMO 77 7.4.1 Uplink Reference Signal Structure 77 7.4.2 MIMO Transmission for Uplink Data 79 7.4.3 MIMO Transmission for Uplink Control Signalling 82 7.4.4 Multi-User MIMO Transmission in the Uplink 82 7.5 Performance 83 7.6 Conclusions 84 References 85 8 Heterogeneous Networks 86Harri Holma, Patrick Marsch and Klaus Pedersen 8.1 Introduction 86 8.2 Base Station Classes 87 8.3 Traffic Steering and Mobility Management 89 8.3.1 Traffic Steering and Mobility Management in Idle State 90 8.3.2 Traffic Steering and Mobility Management in the Connected State 91 8.3.3 Traffic Steering and Mobility Management with Femto Cells 91 8.3.4 WiFi Offloading 92 8.4 Interference Management 94 8.4.1 Static Interference Avoidance through Frequency Reuse Patterns 96 8.4.2 Dynamic Interference Coordination in the Frequency Domain 97 8.4.3 Dynamic Interference Coordination in the Time Domain 98 8.4.4 Dynamic Interference Coordination in the Power Domain 101 8.5 Performance Results 101 8.5.1 Macro and Outdoor Pico Scenarios 102 8.5.2 Macro and Femto Scenarios 105 8.6 Local IP Access (LIPA) 107 8.7 Summary 108 References 108 9 Relays 110Harri Holma, Bernhard Raaf and Simone Redana 9.1 Introduction 110 9.2 General Overview 111 9.3 Physical Layer 112 9.3.1 Inband and Outband Relays 112 9.3.2 Sub-frames 113 9.3.3 Retransmissions 115 9.3.4 Relays Compared to Repeaters 116 9.3.5 Relays in TD-LTE 118 9.4 Architecture and Protocols 118 9.4.1 Sub-frame Configuration with Relay Nodes 118 9.4.2 Bearer Usage with Relay Nodes 119 9.4.3 Packet Header Structure in the Relay Interface 120 9.4.4 Attach Procedure 121 9.4.5 Handovers 121 9.4.6 Autonomous Neighbour Relations 122 9.5 Radio Resource Management 124 9.6 Coverage and Capacity 125 9.6.1 Coverage Gain 126 9.6.2 User Throughput Gains 128 9.6.3 Cost Analysis 129 9.7 Relay Enhancements 130 9.8 Summary 132 References 132 10 Self-Organizing Networks (SON) 135Cinzia Sartori and Harri Holma 10.1 Introduction 135 10.2 SON Roadmap in 3GPP Releases 135 10.3 Self-Optimization 137 10.3.1 Mobility Robustness Optimization 137 10.3.2 Mobility Load Balancing 142 10.3.3 Minimization of Drive Tests 142 10.3.4 MDT Management and Reporting 144 10.3.5 Energy Savings 145 10.3.6 eNodeB Overlay 146 10.3.7 Capacity-Limited Network 147 10.3.8 Capacity and Coverage Optimization 148 10.4 Self-Healing 150 10.4.1 Cell Outage Compensation 150 10.5 SON Features in 3GPP Release 11 151 10.6 Summary 151 References 152 11 Performance Evaluation 153Harri Holma and Klaus Pedersen 11.1 Introduction 153 11.2 LTE-Advanced Targets 154 11.2.1 ITU Evaluation Environments 155 11.3 LTE-Advanced Performance Evaluation 156 11.3.1 Peak Data Rates 156 11.3.2 UE Categories 157 11.3.3 ITU Efficiency Evaluation 158 11.3.4 3GPP Efficiency Evaluation 160 11.4 Network Capacity and Coverage 163 11.5 Summary 165 References 165 12 Release 11 and Outlook Towards Release 12 166Timo Lunttila, Rapeepat Ratasuk, Jun Tan, Amitava Ghosh and Antti Toskala 12.1 Introduction 166 12.2 Release 11 LTE-Advanced Content 166 12.3 Advanced LTE UE Receiver 168 12.3.1 Overview of MMSE-MRC and MMSE-IRC Methods 169 12.3.2 Performance of UE Receiver using IRC and its Comparison to MRC Receiver for Various DL Transmit Modes 170 12.4 Machine Type Communications 172 12.5 Carrier Aggregation Enhancements 177 12.6 Enhanced Downlink Control Channel 179 12.7 Release 12 LTE-Advanced Outlook 181 12.8 Conclusions 183 References 183 13 Coordinated Multipoint Transmission and Reception 184Harri Holma, Kari Hooli, Pasi Kinnunen, Troels Kolding, PatrickMarsch and Xiaoyi Wang 13.1 Introduction 184 13.2 CoMP Concept 184 13.3 Radio Network Architecture Options 187 13.4 Downlink CoMP Transmission 190 13.4.1 Enablers for Downlink CoMP in 3GPP 191 13.4.2 Signal Processing and RRM for CoMP 192 13.4.3 Other Implementation Aspects 194 13.5 Uplink CoMP Reception 194 13.6 Downlink CoMP Gains 198 13.7 Uplink CoMP Gains 201 13.8 CoMP Field Trials 204 13.9 Summary 205 References 205 14 HSPA Evolution 206Harri Holma and Karri Ranta-aho 14.1 Introduction 206 14.2 Multicarrier Evolution 206 14.3 Multiantenna Evolution 208 14.4 Multiflow Transmission 211 14.5 Small Packet Efficiency 213 14.6 Voice Evolution 215 14.6.1 Adaptive Multirate Wideband (AMR-WB) Voice Codec 215 14.6.2 Voice Over IP (VoIP) 215 14.6.3 CS Voice Over HSPA (CSoHSPA) 215 14.6.4 Single Radio Voice Call Continuity (SR-VCC) 215 14.7 Advanced Receivers 215 14.7.1 Advanced UE Receivers 215 14.7.2 Advanced NodeB Receivers 216 14.8 Flat Architecture 217 14.9 LTE Interworking 218 14.10 Summary 218 References 219 Index 221

    15 in stock

    £71.96

  • Mobile and Wireless Communications for

    John Wiley & Sons Inc Mobile and Wireless Communications for

    10 in stock

    Book SynopsisA timely addition to the understanding of IMT-Advanced, this book places particular emphasis on the new areas which IMT-Advanced technologies rely on compared with their predecessors. These latest areas include Radio Resource Management, Carrier Aggregation, improved MIMO support and Relaying. Each technique is thoroughly described and illustrated before being surveyed in context of the LTE-Advanced standards. The book also presents state-of-the-art information on the different aspects of the work of standardization bodies (such as 3GPP and IEEE), making global links between them. Explores the latest research innovations to assess the future of the LTE standard Covers the latest research techniques for beyond IMT-Advanced such as Coordinated multi-point systems (CoMP), Network Coding, Device-to-Device and Spectrum Sharing Contains key information for researchers from academia and industry, engineers, regulators and decision makers working on LTE-AdvanTrade Review"The book is up with the latest thinking and standards, and as such provides a particularly useful coverage of the way in which cellular telecommunications is moving. It would be a valuable addition to the library of any individual or company that is serious about keeping up with the latest LTE technology." (Radio-Electronics.com, 1 January 2012) Table of ContentsAbout the Editors xiii Preface xv Acknowledgements xvii List of Abbreviations xix List of Contributors xxv 1 Introduction 1 1.1 Market and Technology Trends 1 1.2 Technology Evolution 3 1.3 Development of IMT-Advanced and Beyond 6 References 8 2 Radio Resource Management 11 2.1 Overview of Radio Resource Management 11 2.2 Resource Allocation in IMT-Advanced Technologies 13 2.2.1 Main IMT-Advanced Characteristics 13 2.2.2 Scheduling 16 2.2.3 Interference Management 16 2.2.4 Carrier Aggregation 18 2.2.5 MBMS Transmission 18 2.3 Dynamic Resource Allocation 19 2.3.1 Resource Allocation and Packet Scheduling Using Utility Theory 19 2.3.2 Resource Allocation with Relays 22 2.3.3 Multiuser Resource Allocation Maximizing the UE QoS 24 2.3.4 Optimization Problems and Performance 26 2.4 Interference Coordination in Mobile Networks 26 2.4.1 Power Control 27 2.4.2 Resource Partitioning 28 2.4.3 MIMO Busy Burst for Interference Avoidance 33 2.5 Efficient MBMS Transmission 35 2.5.1 MBMS Transmission 36 2.5.2 Performance Assessment 37 2.6 Future Directions of RRM Techniques 39 References 40 3 Carrier Aggregation 43 3.1 Basic Concepts 43 3.2 ITU-R Requirements and Implementation in Standards 45 3.3 Evolution Towards Future Technologies 48 3.3.1 Channel Coding 48 3.3.2 Scheduling 51 3.3.3 Channel Quality Indicator 53 3.3.4 Additional Research Directions 54 3.4 Cognitive Radio Enabling Dynamic/Opportunistic Carrier Aggregation 55 3.4.1 Spectrum Sharing and Opportunistic Carrier Aggregation 56 3.4.2 Spectrum Awareness 58 3.4.3 Cognitive Component Carrier Identification, Selection and Mobility 59 3.5 Implications for Signaling and Architecture 59 3.6 Hardware and Legal Limitations 60 References 61 4 Spectrum Sharing 63 4.1 Introduction 63 4.2 Literature Overview 64 4.2.1 Spectrum Sharing from a Game Theoretic Perspective 66 4.2.2 Femtocells 67 4.3 Spectrum Sharing with Game Theory 68 4.3.1 Noncooperative Case 68 4.3.2 Hierarchical Case 69 4.4 Spectrum Trading 70 4.4.1 Revenue and Cost Function for the Offering Operator 73 4.4.2 Numerical Results 74 4.5 Femtocells and Opportunistic Spectrum Usage 75 4.5.1 Femtocells and Standardization 77 4.5.2 Self-Organized Femtocells 79 4.5.3 Beacon-Based Femtocells 81 4.5.4 Femtocells with Intercell Interference Coordination 82 4.5.5 Femtocells with Game Theory 83 4.6 Conclusion, Discussion and Future Research 84 4.6.1 Future Research 85 References 86 5 Multiuser MIMO Systems 89 5.1 MIMO Fundamentals 89 5.1.1 System Model 91 5.1.2 Point-to-Point MIMO Communications 92 5.1.3 Multiuser MIMO Communications 96 5.1.4 MIMO with Interference 100 5.2 MIMO in LTE-Advanced and 802.16m 101 5.2.1 LTE-Advanced 102 5.2.2 WiMAX Evolution 104 5.3 Generic Linear Precoding with CSIT 104 5.3.1 Transmitter–Receiver Design 105 5.3.2 Transceiver Design with Interference Nulling 110 5.4 CSI Acquisition for Multiuser MIMO 112 5.4.1 Limited Feedback 112 5.4.2 CSI Sounding 113 5.5 Future Directions of MIMO Techniques 114 References 115 6 Coordinated Multi Point (CoMP) Systems 121 6.1 Overview of CoMP 121 6.1.1 CoMP Types 122 6.1.2 Architectures and Clustering 123 6.1.3 Theoretical Performance Limits and Implementation Constraints 126 6.2 CoMP in the Standardization Bodies 129 6.2.1 Overview of CoMP Studies 129 6.2.2 Design Choices for a CoMP Functionality 131 6.3 Generic System Model for Downlink CoMP 133 6.3.1 SINR for Linear Transmissions 133 6.3.2 Compact Matricial Model 134 6.4 Joint Processing Techniques 134 6.4.1 State of the Art 135 6.4.2 Potential of Joint Processing 136 6.4.3 Dynamic Joint Processing 137 6.4.4 Uplink Joint Processing 141 6.5 Coordinated Beamforming and Scheduling Techniques 142 6.5.1 State of the Art 142 6.5.2 Decentralized Coordinated Beamforming 143 6.5.3 Coordinated Scheduling via Worst Companion Reporting 145 6.6 Practical Implementation of CoMP in a Trial Environment 147 6.6.1 Setup and Scenarios 149 6.6.2 Measurement Results 149 6.7 Future Directions 151 References 152 7 Relaying for IMT-Advanced 157 7.1 An Overview of Relaying 157 7.1.1 Relay Evolution 158 7.1.2 Relaying Deployment Scenarios 159 7.1.3 Relaying Protocol Strategies 160 7.1.4 Half Duplex and Full Duplex Relaying 162 7.1.5 Numerical Example 162 7.2 Relaying in the Standard Bodies 164 7.2.1 Relay Types in LTE-Advanced Rel-10 164 7.2.2 Relay Nodes in IEEE 802.16m 166 7.3 Comparison of Relaying and CoMP 166 7.3.1 Protocols and Resource Management 167 7.3.2 Simulation Results 169 7.4 In-band RNs versus Femtocells 171 7.5 Cooperative Relaying for Beyond IMT-Advanced 173 7.6 Relaying for beyond IMT-Advanced 176 7.6.1 Multihop RNs 176 7.6.2 Mobile Relay 177 7.6.3 Network Coding 177 References 177 8 Network Coding in Wireless Communications 181 8.1 An Overview of Network Coding 181 8.1.1 Historical Background 182 8.1.2 Types of Network Coding 183 8.1.3 Applications of Network Coding 183 8.2 Uplink Network Coding 188 8.2.1 Detection Strategies 188 8.2.2 User Grouping 190 8.2.3 Relay Selection 191 8.2.4 Performance 192 8.2.5 Integration in IMT-Advanced and Beyond 194 8.3 Nonbinary Network Coding 194 8.3.1 Nonbinary NC based on UE Cooperation 195 8.3.2 Nonbinary NC for Multiuser and Multirelay 196 8.3.3 Performance 197 8.3.4 Integration in IMT-Advanced and Beyond 198 8.4 Network Coding for Broadcast and Multicast 199 8.4.1 Efficient Broadcast Network Coding Scheme 200 8.4.2 Performance 201 8.5 Conclusions and Future Directions 202 References 203 9 Device-to-Device Communication 207 9.1 Introduction 207 9.2 State of the Art 208 9.2.1 In Standards 208 9.2.2 In Literature 210 9.3 Device-to-Device Communication as Underlay to Cellular Networks 211 9.3.1 Session Setup 212 9.3.2 D2D Transmit Power 214 9.3.3 Multiantenna Techniques 215 9.3.4 Radio Resource Management 220 9.4 Future Directions 225 References 228 10 The End-to-end Performance of LTE-Advanced 231 10.1 IMT-Advanced Evaluation: ITU Process, Scenarios and Requirements 231 10.1.1 ITU-R Process for IMT-Advanced 232 10.1.2 Evaluation Scenarios 234 10.1.3 Performance Requirements 235 10.2 Short Introduction to LTE-Advanced Features 238 10.2.1 The WINNER+ Evaluation Group Assessment Approach 238 10.3 Performance of LTE-Advanced 239 10.3.1 3GPP Self-evaluation 239 10.3.2 Simulative Performance Assessment by WINNER+ 241 10.3.3 LTE-Advanced Performance in the Rural Indian Open Area Scenario 243 10.4 Channel Model Implementation and Calibration 243 10.4.1 IMT-Advanced Channel Model 243 10.4.2 Calibration of Large-Scale Parameters 246 10.4.3 Calibration of Small-Scale Parameters 247 10.5 Simulator Calibration 248 10.6 Conclusion and Outlook on the IMT-Advanced Process 249 References 250 11 Future Directions 251 11.1 Radio Resource Allocation 252 11.2 Heterogeneous Networks 252 11.3 MIMO and CoMP 253 11.4 Relaying and Network Coding 254 11.5 Device-to-Device Communications 254 11.6 Green and Energy Efficiency 255 References 256 Appendices 259 Appendix A Resource Allocation 261 A.1 Dynamic Resource Allocation 261 A.1.1 Utility Predictive Scheduler 261 A.1.2 Resource Allocation with Relays 261 A.2 Multiuser Resource Allocation 263 A.2.1 PHY/MAC Layer Model 263 A.2.2 APP Layer Model 263 A.2.3 Optimization Problem 264 A.2.4 Simulation Results 265 A.3 Busy Burst Extended to MIMO 266 A.4 Efficient MBMS Transmission 267 A.4.1 Service Operation 267 A.4.2 Frequency Division Multiplexing (FDM) Performance 268 Appendix B Spectrum Awareness 269 B.1 Spectrum Sensing 269 B.2 Geo-Location Databases 270 B.3 Beacon Signaling 270 Appendix C CoordinatedMultiPoint (CoMP) 271 C.1 Joint Processing Methods 271 C.1.1 Partial Joint Processing 271 C.1.2 Dynamic Base Station Clustering 271 C.2 Coordinated Beamforming and Scheduling 273 C.2.1 Decentralized Coordinated Beamforming 273 C.2.2 Coordinated Scheduling via Worst Companion Reporting 276 C.3 Test-Bed: Distributed Realtime Implementation 276 Appendix D Network Coding 281 D.1 Nonbinary NC based on UE Cooperation 281 D.2 Multiuser and Multirelay Scenario 282 Appendix E LTE-Advanced Analytical Performance and Peak Spectral Efficiency 285 E.1 Analytical and Inspection Performance Assessment by WINNER+ 285 E.1.1 Analytical Evaluation 285 E.1.2 Inspection 286 E.2 Peak Spectral Efficiency Calculation 287 E.2.1 FDD Mode Downlink Direction 287 E.2.2 FDD Mode Uplink Direction 288 E.2.3 TDD Mode Downlink Direction 289 E.2.4 TDD Mode Uplink Direction 291 E.2.5 Comparison with Self-Evaluation 292 References 292 Index 295

    10 in stock

    £103.50

  • Hay House Inc EMFD

    4 in stock

    Book SynopsisTrade Review“Dr. Mercola’s groundbreaking new book on the health effects of EMFs is both a sobering tale and an effective call to action. Dr. Mercola carefully lays out the history and evidence for the deleterious effects of EMF exposure and gives you real time, concrete steps to take to mitigate the damage for you and your family. As a result of reading this important book, I am redoubling my efforts to protect my family and patients from the harmful effects of EMFs, especially in light of the 5G rollout. This is a fight that involves us all, and Dr. Mercola’s book can help to light the way in this important struggle.” — Thomas Cowan, M.D., author of Human Heart, Cosmic Heart; Vaccines, Autoimmunity, and the Changing Nature of Childhood Illness; and Cancer and the New Biology of Water“Ten years ago, my declining health improved overnight after one simple change to my electrical exposures. If I had known about the health effects of wireless and electrical exposures fifteen years ago, it would have saved over a decade of deep personal pain and suffering. Please read this book and share what you have learned to protect yourself and the ones you love.” — Peter Sullivan, founder of Clear Light Ventures“Want to know how EMFs impact your health? This book gives a masterful account of why our lives and our planet are becoming EMF*D up and what we can do about it. Readable and balanced, it’s a must-read for anyone truly interested in safeguarding their health.” — Lloyd Burrell, author of EMF Practical Guide and founder of ElectricSense.com“5G technology holds the promise for faster connections, greater bandwidth, low latency, a massive internet-of-things, and smart cities. What’s not to like about that? Dr. Mercola has written an easy-to-read and comprehensive book explaining what we know about the potential adverse biological effects of a massive increase in our exposure to EMFs if/when 5G becomes widely available. Even if you don’t use the technology, you can’t opt out because it will be everywhere. This book is the go-to place if you want to become informed about the dangers of EMFs.” — Stephanie Seneff, Ph.D., senior research scientist, MIT Computer Science and Artificial Intelligence Laboratory“Dr. Joseph Mercola’s latest book—EMF*D—introduces the reader to the concept that electronic and wireless technology emits frequencies in the form of dirty electricity and microwave radiation that can harm and are harming our health. This books comes at an interesting time when governments around the world are racing to roll out 5G, 5th generation, wireless technology, without any testing of thebiological and health effects of long-term exposure. As we are increasingly exposed to more radiation via smart meters, smart appliances, Wi-Fi in schools, and now 5G small cell antennas placed on lamp posts every 100 meters or so, a growing number of people are asking, ‘Why the rush to 5G?’ and ‘Do we really need this technology?’ It is no longer enough for us to eat organic, drink purified water, inhale fresh air, exercise, and get plenty of sleep to stay healthy. We must also minimize our exposure to the harmful effects of electromagnetic pollution. Learn how to reduce your exposure and how to repair EMF-related damage by reading Dr. Mercola’s book, EMF*D. You won’t be disappointed!” — Dr. Magda Havas, B.Sc., Ph.D., Professor Emerita, Trent University, Canada“Dr. Joseph Mercola has written the definitive book on electromagnetic fields, with a particular emphasis on how they affect our health. This is an invaluable resource with many practical solutions, especially for those who are EMF-sensitive. For those who don’t yet know about EMFs or who refuse to take them seriously, it will be harder to ignore them after reading this book. Everyone needs to know about the dangers of EMFs. This comprehensive manual will help accomplish that.” — Oram Miller, certified building biology environmental consultant and electromagnetic radiation specialist

    4 in stock

    £15.29

  • A Telephone for the World

    Johns Hopkins University Press A Telephone for the World

    15 in stock

    Book SynopsisIn a postCold War world, the Iridium satellite network revealed a new age of globalization. Winner of the William and Joyce Middleton Electrical Engineering History Award by the IEEEIn June 1990, Motorola publicly announced an ambitious business venture called Iridium. The project's signature feature was a constellation of 77 satellites in low-Earth orbit which served as the equivalent of cellular towers, connecting to mobile customers below using wireless hand-held phones. As one of the founding engineers noted, the constellation bathed the planet in radiation, enabling a completely global communications system. Focusing on the Iridium venture, this book explores the story of globalization at a crucial period in US and international history. As the Cold War waned, corporations and nations reoriented toward a new global order in which markets, neoliberal ideology, and the ideal of a borderless world predominated. As a planetary-scale technological system, the project became emblematiTrade ReviewCollins examines the historical development of Motorola's Iridium global telecommunications project, which sought to provide cellular voice service to any point on Earth using a network of 77 low-orbiting satellites... Iridium's Apollo-like saga will capture the interest of general readers in engineering, science, history, sociology, and business, and will serve as an excellent capstone case study. Technical discussions are easy to understand, and the extensive endnotes and bibliography will satisfy the most rigorous scholar.—R. Dupont, Louisiana State University Alexandria, ChoiceThis is an ambitious book that connects technology, capitalism, and globalization. It is all that more audacious because it uses a failed communications platform and business model to make these connections . . . Although Iridium was a business failure, its legacy continues to be a set of cultural, social, and political expectations about global flows of information and capital. As Collins forcefully reminds us, globalization is not a given, but was (and continues to be) "actively fashioned" by those who seek "to project market values, power, and control over the totality of the planet."—David Hochfelder, University at Albany, Journal of American HistoryEngaging, informative, and thought provoking, A Telephone for the World should prove to be of particular interest to business and economic historians skeptical of neoliberal pieties about innovation, to media and communications historians intrigued by the evolution of spectrum management, and to cultural and political historians fascinated by the zeitgeist of the 1990s.—Richard R. John, Columbia University, American Historical ReviewTable of ContentsPrefaceIntroduction1. Iridium and the Global Age2. The Global and the Engineers3. The Global and Iridium the Business4. "Freedom to Communicate"5. From "It's a bird, it's a phone" to "Edsels in the sky"ConclusionNotesBibliographyIndex

    15 in stock

    £39.00

  • Basic Sensors in iOS

    O'Reilly Media Basic Sensors in iOS

    1 in stock

    Book SynopsisModern mobile platforms, such as Apple's iPhone and iPad, come with a growing range of sensors; GPS, accelerometers, magnetometers and gyroscopes. This book guides you through how to make use of these sensors, giving you the necessary tools and experience to develop applications that makes best use of the hardware.

    1 in stock

    £13.59

  • Mobile Marketing In A Week

    John Murray Press Mobile Marketing In A Week

    15 in stock

    Book SynopsisUnderstand mobile marketing fast, without cutting cornersAn understanding of mobile marketing is essential for anyone who wants to reach the growing market of on-the-go consumers. In this short, accessible book, Nick Smith shares a lifetime of hard-earned wisdom and practical advice, giving you, in straightforward language, all the mobile marketing expertise you need to run successful mobile campaigns. The ''in a week'' structure explains the essentials of mobile marketing over just 7 days:Sunday: Why the future is mobileMonday: Basic mobile traffic getting tacticsTuesday: Social mobile marketingWednesday: Mobile pay per click (PPC) marketingThursday: Mobile apps for SMEsFriday: SMS marketingSaturday: Building the ultimate mobile marketing systemAt the end there are questions to ensure you have taken it all in and cartoons, diagrams and visual aids throughout help make Mobile Marketing In A Week an enjoyable and effective lea

    15 in stock

    £8.54

  • The Platform Economy: How Japan Transformed the

    University of Minnesota Press The Platform Economy: How Japan Transformed the

    15 in stock

    Book SynopsisOffering a deeper understanding of today’s internet media and the management theory behind itPlatforms are everywhere. From social media to chat, streaming, credit cards, and even bookstores, it seems like almost everything can be described as a platform. In The Platform Economy, Marc Steinberg argues that the “platformization” of capitalism has transformed everything, and it is imperative that we have a historically precise, robust understanding of this widespread concept. Taking Japan as the key site for global platformization, Steinberg delves into that nation’s unique technological and managerial trajectory, in the process systematically examining every facet of the elusive word platform. Among the untold stories revealed here is that of the 1999 iPhone precursor, the i-mode: the world’s first widespread mobile internet platform, which became a blueprint for Apple and Google’s later dominance of the mobile market. Steinberg also charts the rise of social gaming giants GREE and Mobage, chat tools KakaoTalk, WeChat, and LINE, and video streaming site Niconico Video, as well as the development of platform theory in Japan, as part of a wider transformation of managerial theory to account for platforms as mediators of cultural life. Analyzing platforms’ immense impact on contemporary media such as video streaming, music, and gaming, The Platform Economy fills in neglected parts of the platform story. In narrating the rise and fall of Japanese platforms, and the enduring legacy of Japanese platform theory, this book sheds light on contemporary tech titans like Facebook, Google, Apple, and Netflix, and their platform-mediated transformation of contemporary life—it is essential reading for anyone wanting to understand what capitalism is today and where it is headed.Trade Review"By relocating the origins of the platform economy to Japan’s consumer technology industries of the 1990s, Marc Steinberg offers a powerful intervention into current debates about platformization. This is a book that challenges us to think differently about the business and culture of digital media."—Ramon Lobato, author of Netflix Nations: The Geography of Digital Distribution"Phenomenal. Marc Steinberg rewrites the history of the platform economy. Moving beyond an exclusive focus on Silicon Valley, he demonstrates that a crucial part of this history can be found in 1990s Japan. Steinberg deftly traces the emergence of platform theory and practices around Docomo’s i-mode, exploring intersections with U.S. and French discourse, and ending with the global markets forged by iOS and Android."—Thomas Poell, coauthor of The Platform Society: Public Values in a Connective World"The American tech giants monopolize our attention in daily life; they also tend to hog the attention in technology criticism. Marc Steinberg offers a more expansive and nuanced analysis, showing that the ‘platform’ story did not begin in Silicon Valley and is not likely to end there. A rigorous, illuminating book."—Rebecca Tuhus-Dubrow, author of Personal Stereo"The impressive feat of Steinberg’s book is that it allows both interpretations of platformization to emerge: a fairer crediting of Japanese theories and practices as well as a fuller questioning of global media industry dominance."—Film Quarterly"Readers in many disciplines seeking to better understand how the Android and Apple iOS, Netflix, Amazon, and myriad other everyday commercial experiences have come to be, and how they may change or adapt in ways that Silicon Valley will not necessarily lead, can look to The Platform Economy for global insights and a nuanced analysis of the way words and worlds have been formed, in part, through Japanese iterations of platforms and contents."—The Journal of Popular Culture"The Platform Economy adds a significant dimension to the study of platforms and urges us to think deeply about platformization, as well as the multidirectionality of cultural circulation more broadly."—Critical Inquiry"An important contribution for recapitulating certain concepts in management theory and reconstructing the discursive formation of the term ‘platform.’"—Journal of Japanese Studies Table of ContentsContentsIntroduction1. Contents Discourse: A Platform Prelude2. Platform Typology: From Hardware to Contents3. The Japanese Genesis of Transactional Platform Theory4. Docomo’s i-mode and the Formatting of the Mobile Internet5. Platforms after i-mode: Dwango’s Niconico VideoConclusion: The Platformization of Regional Chat AppsAcknowledgmentsNotesBibliographyIndex

    15 in stock

    £77.60

  • The Platform Economy: How Japan Transformed the

    University of Minnesota Press The Platform Economy: How Japan Transformed the

    15 in stock

    Book SynopsisOffering a deeper understanding of today’s internet media and the management theory behind itPlatforms are everywhere. From social media to chat, streaming, credit cards, and even bookstores, it seems like almost everything can be described as a platform. In The Platform Economy, Marc Steinberg argues that the “platformization” of capitalism has transformed everything, and it is imperative that we have a historically precise, robust understanding of this widespread concept. Taking Japan as the key site for global platformization, Steinberg delves into that nation’s unique technological and managerial trajectory, in the process systematically examining every facet of the elusive word platform. Among the untold stories revealed here is that of the 1999 iPhone precursor, the i-mode: the world’s first widespread mobile internet platform, which became a blueprint for Apple and Google’s later dominance of the mobile market. Steinberg also charts the rise of social gaming giants GREE and Mobage, chat tools KakaoTalk, WeChat, and LINE, and video streaming site Niconico Video, as well as the development of platform theory in Japan, as part of a wider transformation of managerial theory to account for platforms as mediators of cultural life. Analyzing platforms’ immense impact on contemporary media such as video streaming, music, and gaming, The Platform Economy fills in neglected parts of the platform story. In narrating the rise and fall of Japanese platforms, and the enduring legacy of Japanese platform theory, this book sheds light on contemporary tech titans like Facebook, Google, Apple, and Netflix, and their platform-mediated transformation of contemporary life—it is essential reading for anyone wanting to understand what capitalism is today and where it is headed.Trade Review"By relocating the origins of the platform economy to Japan’s consumer technology industries of the 1990s, Marc Steinberg offers a powerful intervention into current debates about platformization. This is a book that challenges us to think differently about the business and culture of digital media."—Ramon Lobato, author of Netflix Nations: The Geography of Digital Distribution"Phenomenal. Marc Steinberg rewrites the history of the platform economy. Moving beyond an exclusive focus on Silicon Valley, he demonstrates that a crucial part of this history can be found in 1990s Japan. Steinberg deftly traces the emergence of platform theory and practices around Docomo’s i-mode, exploring intersections with U.S. and French discourse, and ending with the global markets forged by iOS and Android."—Thomas Poell, coauthor of The Platform Society: Public Values in a Connective World"The American tech giants monopolize our attention in daily life; they also tend to hog the attention in technology criticism. Marc Steinberg offers a more expansive and nuanced analysis, showing that the ‘platform’ story did not begin in Silicon Valley and is not likely to end there. A rigorous, illuminating book."—Rebecca Tuhus-Dubrow, author of Personal Stereo"The impressive feat of Steinberg’s book is that it allows both interpretations of platformization to emerge: a fairer crediting of Japanese theories and practices as well as a fuller questioning of global media industry dominance."—Film Quarterly"Readers in many disciplines seeking to better understand how the Android and Apple iOS, Netflix, Amazon, and myriad other everyday commercial experiences have come to be, and how they may change or adapt in ways that Silicon Valley will not necessarily lead, can look to The Platform Economy for global insights and a nuanced analysis of the way words and worlds have been formed, in part, through Japanese iterations of platforms and contents."—The Journal of Popular Culture"The Platform Economy adds a significant dimension to the study of platforms and urges us to think deeply about platformization, as well as the multidirectionality of cultural circulation more broadly."—Critical Inquiry"An important contribution for recapitulating certain concepts in management theory and reconstructing the discursive formation of the term ‘platform.’"—Journal of Japanese Studies Table of ContentsContentsIntroduction1. Contents Discourse: A Platform Prelude2. Platform Typology: From Hardware to Contents3. The Japanese Genesis of Transactional Platform Theory4. Docomo’s i-mode and the Formatting of the Mobile Internet5. Platforms after i-mode: Dwango’s Niconico VideoConclusion: The Platformization of Regional Chat AppsAcknowledgmentsNotesBibliographyIndex

    15 in stock

    £20.69

  • Africa 2.0: Inside a Continent’s Communications

    Manchester University Press Africa 2.0: Inside a Continent’s Communications

    2 in stock

    Book SynopsisAfrica 2.0 provides an important history of how two technologies – mobile calling and internet – were made available to millions of sub-Saharan Africans, and the impact they have had on their lives. The book deals with the political challenges of liberalisation and privatisation that needed to be in place in order for these technologies to be built. It analyses how the mobile phone fundamentally changed communications in sub-Saharan Africa and the ways Africans have made these technologies part of their lives, opening up a very different future. The book offers a critical examination of the impact these technologies have had on development practices, and the key role development actors played in accelerating regulatory reform, fibre roll-out and mobile money. Southwood shows how corruption in the industry is a prism through which patronage relationships in government can be understood, and argues that the arrival of a start-up ecosystem in the region has the potential to change this. A vital overview of the changes of the last three decades, Africa 2.0 examines the transformative effects of mobile and internet technologies, and the very different future they have opened out for sub-Saharan Africa.Table of ContentsIntroductionPart I: Technology diffusion: the spread of mobile calling and internetPrologue (1986–2004)1 Mobile voice calling booms (1993–2004)2 Bandwidth as the digital economy’s fuel: getting sub-Saharan Africa connected (1991–2015)3 Cheaper mobile internet and low-cost smartphones come together with apps sub-Saharan Africans want to use (2005–18)Part II: Technology influences: uses, behaviours and abuses4 Mobile money: from transferring cash by SMS to a digital payments ecosystem (2000–20)5 Sub-Saharan Africans start to live the digital life (2000–20)6 Sprinkling on the magic dust: digital’s impact on development (1982–2020)7 The ugly underbelly of the communications revolutions: corruption, cronyism, regulation and government (1999–2020)Part III: Taking the long view: start-up innovation and complex behaviour change8 Sub-Saharan African start-ups: getting beyond the hype to address deep market challenges (1995–2020)9 Doing complexity: making sense of what has happened over thirty-five yearsAppendix A: GlossaryAppendix B: List of those interviewedSelect bibliographyIndex

    2 in stock

    £23.74

  • Text & Beyond: Issues in the Mobile Marketplace

    Nova Science Publishers Inc Text & Beyond: Issues in the Mobile Marketplace

    1 in stock

    Book SynopsisMobile devices, once associated only with voice telephone service, have become the launching pads for new data-driven technologies and services. Today, consumers use their mobile devices for myriad purposes including "chatting" through text messaging, taking pictures, browsing the Web, making purchases, listening to music, viewing videos, playing games across cyberspace, and keeping track of friends and relatives. This book addressed the mobile marketplace in the U.S., including the contours of the mobile market place and factors affecting the adoption of new mobile applications. Furthermore, in November 2001, wireless service providers began to connect their networks for text messaging, allowing subscribers on different networks to exchange text messages. Since then, the number of text messages in the U.S. has grown to over 48 billion messages every month. In this book, the discussion of the current mobile market in the U.S. was focused on three general areas: 1) text messaging; 2) ringtones and ringbacks; and 3)Internet access, mobile television, and new and emerging services.

    1 in stock

    £46.49

  • Contraband Cell Phones in Prisons: Technology

    Nova Science Publishers Inc Contraband Cell Phones in Prisons: Technology

    2 in stock

    Book Synopsis

    2 in stock

    £189.74

  • Cell Phone Use & Health Risks: Assessments &

    Nova Science Publishers Inc Cell Phone Use & Health Risks: Assessments &

    1 in stock

    Book SynopsisMobile phone use in the United States has risen dramatically over the last 20 years, and Americans increasingly rely on mobile phones as their sole or primary means of telephone communication. The rapid adoption of mobile phones has occurred amidst controversy over whether the technology poses a risk to human health. Like other devices that transmit radio signals, mobile phones emit radio-frequency (RF) energy. At high power levels, RF energy can heat biological tissue and cause damage. Though mobile phones operate at power levels well below the level at which this thermal effect occurs, the question of whether long-term exposure to RF energy emitted from mobile phones can cause other types of adverse health effects, such as cancer, has been the subject of research and debate. This book examines what is known about the health effects of RF energy from mobile phones, with a focus on the FCC and FDA''s regulatory responsibilities; and other scientific research.

    1 in stock

    £73.49

  • Mobile Device Security: Threats & Controls

    Nova Science Publishers Inc Mobile Device Security: Threats & Controls

    1 in stock

    Book Synopsis

    1 in stock

    £63.74

  • Embracing Interference in Wireless Systems

    Morgan & Claypool Publishers Embracing Interference in Wireless Systems

    15 in stock

    Book SynopsisThe wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.

    15 in stock

    £51.00

  • Assessing the Digital Nation: Broadband Adoption,

    Nova Science Publishers Inc Assessing the Digital Nation: Broadband Adoption,

    1 in stock

    Book SynopsisResearchers and policymakers recognise that availability and use of high-speed Internet services -- a range of connection technologies collectively known as broadband -- are essential to economic growth. The United States has made considerable progress towards ubiquitous broadband access, with more than 93 percent of the population living in areas offering wired broadband service, and about 98 percent having access to either wired or terrestrial wireless connectivity at speeds of at least 3 Mbps download and 768 Kbps upload. The Internet has rapidly grown from an academic network into a resource that is now integral to the lives of most Americans. In 2000, only 4 percent of homes used broadband Internet service. By 2011, 69 percent were online at speeds greater than dial-up. By connecting every corner of our country to the digital age, we can help our businesses become more competitive, our students become more informed and our citizens become more engaged. Additionally, our nation''s technology industry leads the way in revolutionising the nature of Internet use through mobile devices. Smartphones -- driven by American-made operating systems and applications -- now lead the mobile market. Over one billion smartphone users world-wide carry the global network in their pockets, including the 46 percent of Americans currently using these devices -- now surpassing the 41 percent who use traditional mobile phones. Mobile broadband is vital to our future. This book examines online activities, broadband adoption, and reasons some do not go online at home which provide key factual underpinnings for the development of sound policies for increasing broadband adoption in the United States.

    1 in stock

    £119.99

  • From LTE to LTE-Advanced Pro and 5G

    Artech House Publishers From LTE to LTE-Advanced Pro and 5G

    2 in stock

    Book SynopsisThis book examines the new features of LTE technologies and how they integrate into existing LTE networks. The authors provide an in-depth coverage of how the air interface is structured at the physical level and how the related link protocols are designed and work. It contains detailed chapters on the end-to-end data transfer optimization mechanisms based on the TCP. Readers will find information about OFDMA, and how DFT is used to implement it, SON specifications and realization and potential 5G solutions, as considered in releases 14 and beyond, the migration paths, and the challenges involved with the latest updates and standardization process. The book gives an insight into core network architecture, including the protocols and signaling used for both data and voice services, parameter estimations, and network planning and sizing.Trade ReviewA well written book providing network design practitioners a comprehensive summary with practical details of the standards and technologies behind 4G LTE, LTE-Advanced (-Pro) and 5G. This network design handbook is a must have for Policy Makers, CTO's, radio- and core network engineers of cellular telecom operators to implement optimal current and future LTE networks. -- Werner Noz * Trend Communications International *Clear concise description of components and features which form the LTE solution, and how these entities will evolve as we move from LTE towards 5G. -- Robert Ivers * TfL London *Table of ContentsThe Underlying DFT Concepts and Formulations; The Air Interface Architecture and Operation; The Coverage-Capacity Planning and Analysis; Pre-Launch Parameter Planning and Resource Allocation; Radio Resource Control and Mobility Management; Inter-Cell Interference Management in LTE; SON Technologies in LTC; EPC Network Architecture, Planning and Dimensioning Guideline; LTE_Advanced Main Enhancements; Optimization for TCP Operation in 4G and Other Networks; Voice over LTE (VOLTE); LTE-Advance Pro-Enhanced LTE Features; Towards 5G

    2 in stock

    £108.00

  • Wi-Fi 6 Protocol and Network

    Artech House Publishers Wi-Fi 6 Protocol and Network

    4 in stock

    Book SynopsisWith more than 15 billion Wi-Fi enabled devices, Wi-Fi has proven itself as a technology that has successfully evolved over the past 25 years. The need for high-speed connectivity is growing, as Wi-Fi has evolved into a fundamental utility that is expected to be available everywhere. This comprehensive resource covers six generations of Wi-Fi standards including protocol, implementation, and network deployment for both residential and enterprise environments. It will provide readers with a new understanding of how to approach and debug basic Wi-Fi problems, and will grant those wondering whether to pick 5G or Wi-Fi 6 for their product the clarity needed to make an informed decision. Readers will find in-depth coverage of Wi-Fi encryption and authentication methods, including explorations of recently uncovered security vulnerabilities and how to fix them. This book also provides detailed information on the implementation of Wi-Fi, including common regulatory and certification requirements, as well its associated challenges. This book also provides direction on the placement of Wi-Fi access points in indoor locations. It introduces the most recent Wi-Fi 6E certification, which defines requirements for devices operating on the newly opened 6 GHz band. Wi-Fi 6 is then compared with 5G technology, and this resource provides insight into the benefits of each as well as how these two technologies can be used to complement each other.Table of ContentsIntroduction; Wi-Fi 1 to 5 Overview; Wi-Fi 6; Wi-Fi Security; Wi-Fi Implementation; Wi-Fi 6E; Wi-Fi Deployment; 5G Overview and Wi-Fi Comparison; Conclusion.

    4 in stock

    £98.10

  • America's Embrace of the Mobile Internet:

    Nova Science Publishers Inc America's Embrace of the Mobile Internet:

    1 in stock

    Book SynopsisThe rise of sophisticated mobile devices and high-speed wireless networks is transforming the Internet and how our society interacts with it. Americans are rapidly embracing mobile technologies and the opportunities they create. This book examines data from the 2012 Current Population Survey (CPS) describing Americans'' use of computers and the Internet. Data from this survey depict the accelerating popularity of mobile phone-based Internet use across demographic groups. The book also reveals the explosion in mobile Internet use accompanied by narrowing but persistent disparities in computer ownership and Internet use overall. This book''s insights will allow policymakers, in cooperation with private partners, to make decisions that will improve America''s productivity, ingenuity, world competitiveness, and standard of living.

    1 in stock

    £122.99

  • Android Programming For Beginners: The Ultimate Android App Developer's Guide

    15 in stock

    £11.63

  • The Art and Science of NFC Programming

    ISTE Ltd and John Wiley & Sons Inc The Art and Science of NFC Programming

    15 in stock

    Book SynopsisNFC is a world standard since 2004 which is now within every smartphone on the market. Such a standard enables us to do mobile transactions (mobile payment) in a secure way along with many other information- based tap’n play operations. This book has a double role for computer scientists (from bachelor students in CS to IT professionals).Table of ContentsForeword vii Preface xi Introduction xv Chapter 1. State-of-the-Art of NFC1 1.1. Future mobiquitous digital services 2 1.1.1. The era of mobiquity 3 1.1.2. Toward a world of contactless communicating objects 6 1.2. NFC equipment 7 1.2.1. NFC tag 7 1.2.2. NFC smart card 8 1.2.3. NFC smartphone 13 1.2.4. Reader/encoder: NFC transaction terminals 14 1.2.5. “Smart cities” and sustainable development 14 1.2.6. Cashless payment with NFC 15 1.3. NFC standards 16 1.3.1. Analog signal and NFC digital transposition 18 1.3.2. The three standardized modes of NFC 21 1.3.3. NFC forum standards 25 1.3.4. GlobalPlatform (GP) 36 1.3.5. SIMAlliance and open mobile API 42 Chapter 2. Developing NFC Applications with Android 45 2.1. Introduction to Android programming using Eclipse 46 2.1.1. Android in a nutshell 46 2.1.2. Android in Eclipse IDE 49 2.1.3. Intents and Android context 60 2.1.4. The Activity class of Android 61 2.1.5. Android graphical interface: “layout” files 64 2.1.6. Compiling and testing an Android application 67 2.2. Implementing NFC with Android 70 2.2.1. Android manifest declarations 71 2.2.2. Implementing the NFC reader/writer mode 71 2.2.3. Implementing the NFC P2P mode with Android 83 2.2.4. Implementing the NFC card emulation mode with Android 87 2.2.5. Developing NFC services with Android HCE 97 Chapter 3. NFC Use Cases 107 3.1. Usage of the NFC reader/writer mode 107 3.1.1. Use case: management of equipment loans 108 3.2. Usage of the NFC P2P mode 112 3.2.1. Use case: NFC pairing 112 3.3. Usage of NFC card emulation mode 114 3.3.1. Use case: digital wallet in the SE 115 3.4. Usage of the HCE mode 118 3.4.1. Use case: SE in the Cloud with HCE 119 Conclusion 121 Bibliography 125 Index 129

    15 in stock

    £125.06

  • LTE Advanced Pro: Towards the 5G Mobile Network

    ISTE Ltd and John Wiley & Sons Inc LTE Advanced Pro: Towards the 5G Mobile Network

    15 in stock

    Book SynopsisThis book presents LTE evolution towards 5G mobile communication and the emergence of new requirements for MBB, MTC and LLC services. As LTE technologies evolve, LTE Advanced Pro dramatically increases cell capacity and user data rates for the MBB unicast service. Such requirements are obtained using full-dimension MIMO, carrier aggregation (on either licensed or unlicensed frequency bands) and dual connectivity. To improve the efficiency of same-content delivery to multiple users, 3GPP proposes a group communications service over LTE and defines mission critical push-to-talk (MCPTT) for dedicated public safety services. Complementary low-cost and low-power modems with enhanced coverage and massive connectivity are emerging. Thus, this book also discusses the need for LTE to support low-rate transmission and high-latency communication for MTC services. Table of ContentsList of Abbreviations xi Introduction xxix Chapter 1. MBB Service – Network Architecture 1 1.1. Initial architecture 1 1.1.1. Functional architecture 1 1.1.2. Protocol architecture 6 1.2. CUPS architecture 13 1.3. Heterogeneous networks 15 1.3.1. HeNB station 16 1.3.2. Relay node 19 1.3.3. RRH module 23 1.3.4. Dual connectivity 25 Chapter 2. MBB Service – Spatial Multiplexing 29 2.1. Multiplexing techniques 29 2.1.1. MIMO mechanism 29 2.1.2. Beamforming 31 2.1.3. Antenna configurations 31 2.2. Antenna ports 33 2.2.1. Downlink 33 2.2.2. Uplink 35 2.3. UCI 36 2.4. Transmission modes 38 2.4.1. Downlink 38 2.4.2. Uplink 41 2.5. FD-MIMO mechanism 41 2.6. eFD-MIMO mechanism 46 Chapter 3. MBB Service – Carrier Aggregation 49 3.1. Functional architecture 49 3.2. LTE aggregation 50 3.2.1. Radio channels 50 3.2.2. PDCCH physical channel 52 3.2.3. MAC layer 54 3.2.4. Mobile categories 54 3.3. LAA aggregation 57 3.3.1. Frame structure 57 3.3.2. Access to the radio channel 60 3.3.3. Discovery reference signal (DRS) 61 3.4. LWA aggregation 62 3.4.1. Protocol architecture 62 3.4.2. Procedures 63 3.5. LWIP aggregation 67 3.5.1. Protocol architecture 67 3.5.2. Tunnel establishment 69 Chapter 4. Wi-Fi Integration – Network Architecture 71 4.1. Functional architecture 71 4.1.1. Architecture based on the S2a interface 71 4.1.2. Architecture based on the S2b interface 74 4.1.3. Architecture based on the S2c interface 76 4.2. Tunnel establishment 78 4.2.1. Architecture based on the S2a interface 78 4.2.2. Architecture based on the S2b interface 82 4.2.3. Architecture based on the S2c interface 83 4.3. DIAMETER protocol 84 4.3.1. AAA server interfaces 85 4.3.2. PCRF interfaces 89 Chapter 5. Wi-Fi Integration – Procedures 91 5.1. Mutual authentication 91 5.1.1. EAP-AKA method 91 5.1.2. Mutual authentication procedure 92 5.1.3. Procedure for rapid renewal of authentication 95 5.1.4. Application to the MIPv4 FA mechanism 96 5.2. SWu tunnel establishment 97 5.2.1. IPSec mechanism 97 5.2.2. SWu tunnel establishment procedure 98 5.2.3. Procedure for rapid renewal of authentication 101 5.3. S2a/S2b tunnel establishment 102 5.3.1. PMIPv6 mechanism 102 5.3.2. GTPv2 mechanism 107 5.3.3. MIPv4 FA mechanism 109 5.4. S2c tunnel establishment 113 5.4.1. Trusted Wi-Fi access 114 5.4.2. Untrusted Wi-Fi access 115 Chapter 6. Wi-Fi Integration – Network Discovery and Selection 117 6.1. Mechanisms defined by 3GPP organization 117 6.1.1. ANDSF function 117 6.1.2. RAN assistance 125 6.2. Mechanisms defined by IEEE and WFA organizations 125 6.2.1. Information elements provided by the beacon 127 6.2.2. Information elements provided by the ANQP server 128 Chapter 7. LLC Service – Proximity Communications 133 7.1. Introduction 133 7.2. Functional architecture 135 7.2.1. D2D communication 135 7.2.2. V2X communication 139 7.3. Direct discovery 141 7.4. Radio interface 142 7.4.1. Radio interface structure 142 7.4.2. Physical resources 145 Chapter 8. LLC Service – Group Communications 151 8.1. Introduction 151 8.2. Transport architecture 152 8.2.1. Functional architecture 152 8.2.2. Protocol architecture 154 8.3. Service architecture 155 8.3.1. Functional architecture 155 8.3.2. Protocol architecture 158 8.4. Radio interface 159 8.4.1. MBSFN-RS 160 8.4.2. PMCH 162 8.4.3. RRC messages 166 8.5. Procedures 170 8.5.1. Mutual authentication. 170 8.5.2. Mobile registration 171 8.5.3. Multicast bearer establishment 172 Chapter 9. LLC Service – GCSE and MCPTT Functions 175 9.1. Introduction 175 9.2. GCSE function 176 9.2.1. Functional architecture 176 9.2.2. Protocol architecture 177 9.3. MCPTT function 178 9.3.1. Functional architecture 178 9.3.2. Protocol architecture 182 9.4. Procedures 186 9.4.1. Group creation 186 9.4.2. Group affiliation 187 9.4.3. Session pre-establishment 188 9.4.4. Group call 190 9.4.5. Private call 191 9.4.6. Floor 194 Chapter 10. MTC Service – Network Architecture 197 10.1. Functional architecture 197 10.1.1. MTC-IWF entity 198 10.1.2. MTC-AAA entity 199 10.1.3. SCEF entity 199 10.1.4. IWF-SCEF entity 200 10.2. Network optimization 200 10.2.1. RRC state Suspend 202 10.2.2. RRC state Resume 203 10.3. Congestion control 204 10.4. Procedures 206 10.4.1. Triggering procedure 206 10.4.2. Group message delivery 207 10.4.3. Event monitoring configuration 209 10.4.4. NIDD transfer 213 Chapter 11. MTC Service – Radio Interfaces 219 11.1. Introduction 219 11.2. Special features 220 11.2.1. PSM feature 220 11.2.2. eDRX feature 221 11.2.3. Coverage extension 221 11.3. LTE-M interface 221 11.3.1. Radio channel 221 11.3.2. Guard time 222 11.3.3. Physical channels 223 11.4. NB-IoT interface 226 11.4.1. Radio channel 226 11.4.2. Resource block 227 11.4.3. Physical signals and channels 228 Chapter 12. MBB Service – 5G Integration 237 12.1. Deployment options 237 12.2. Functional architecture 239 12.3. Protocol architecture 240 12.3.1. Radio interface 240 12.3.2. F1 interface 243 12.4. Procedures 245 12.4.1. Adding a secondary node 245 12.4.2. Changing a secondary node 247 12.4.3. Removing a secondary node 249 12.5. Transmission chain 250 12.5.1. Frequency bands 250 12.5.2. Waveform 251 12.5.3. Time frame 253 12.5.4. Error correction codes 254 12.5.5. Reference signals 254 12.5.6. PSS, SSS and PBCH 254 References 259 Index 265

    15 in stock

    £125.06

  • Queues Applied to Telecoms: Courses and Exercises

    ISTE Ltd and John Wiley & Sons Inc Queues Applied to Telecoms: Courses and Exercises

    15 in stock

    Book SynopsisFrom queues to telecoms. Queues are, of course, omnipresent in our world, at the bank, the supermarket, the shops, on the road... and yes, they also exist in the domain of telecoms. Queues Applied to Telecoms studies the theoretical aspect of these queues, from Poisson processes, Markov chains and queueing systems to queueing networks. The study of the use of their resources is addressed by the theory of teletraffic. This book also outlines the basic ideas in the theory of teletraffic, presenting the teletraffic of loss systems and waiting systems. However, some applications and explanations are more oriented towards the field of telecommunications, and this book contains lectures and more than sixty corrected exercises to cover these topics. On your marks....Table of ContentsNotations xi Preface xxi Part 1 Typical Processes in Queues 1 Chapter 1 The Poisson Process 3 1.1 Review of the exponential distribution 3 1.1.1 Definitions 3 1.1.2 The properties of an exponential distribution 4 1.2 Poisson process 10 1.2.1 Definitions 10 1.2.2 Properties of the Poisson process 12 1.3 Exercises 16 Chapter 2 Markov Chains 21 2.1 Markov chains in discrete time 21 2.1.1 Definitions 21 2.1.2 Evolution of a stochastic vector over time 26 2.1.3 Asymptotic behavior 30 2.1.4 Holding time in a state 32 2.1.5 Time-reversible chain 33 2.1.6 Reversible Markov chains 34 2.1.7 Kolmogorov’s criterion 34 2.2 Markov chains in continuous time 35 2.2.1 Definitions 35 2.2.2 Evolution over time 38 2.2.3 Resolving the state equation 41 2.2.4 Asymptotic behavior 42 2.3 Birth and death process 43 2.3.1 Definition 43 2.3.2 Infinitesimal stochastic generator 43 2.3.3 Stationary distribution 44 2.4 Exercises 45 Part 2 Queues 51 Chapter 3 Common Queues 53 3.1 Arrival process of customers in a queue 53 3.1.1 The Poisson process 53 3.1.2 Using the Poisson distribution Rho(lambda) 54 3.1.3 Exponential distribution of delay times 55 3.2 Queueing systems 57 3.2.1 Notation for queueing systems 58 3.2.2 Little distributions 59 3.2.3 Offered traffic 60 3.3 M/M/1 queue 60 3.3.1 Stationary distribution 61 3.3.2 Characteristics of the M/M/1 queue 62 3.3.3 Introducing a factor of impatience 64 3.4 M/M/(Infinity) queue 65 3.5 M/M/n/n queue 66 3.5.1 Stationary distribution 67 3.5.2 Erlang-B formula 67 3.5.3 Characteristics of the M/M/n/n queue 68 3.6 M/M/n queue 68 3.6.1 Stationary distribution 69 3.6.2 Erlang-C formula 70 3.6.3 Characteristics of the M/M/n queue 70 3.7 M/GI/1 queue 71 3.7.1 Stationary distribution 71 3.7.2 Characteristics of the M/GI/1 queue 73 3.8 Exercises 74 Chapter 4 Product-Form Queueing Networks 79 4.1 Jackson networks 80 4.1.1 Definition of a Jackson network 80 4.1.2 Stationary distribution 81 4.1.3 The particular case of the Jackson theorem for open networks 84 4.1.4 Generalization of Jackson networks: BCMP networks 84 4.2 Whittle networks 85 4.2.1 Definition of a Whittle network 85 4.2.2 Stationary distribution 88 4.2.3 Properties of a Whittle network 88 4.3 Exercise 89 Part 3 Teletraffic 91 Chapter 5 Notion of Teletraffic 93 5.1 Teletraffic and its objectives 93 5.2 Definitions 94 5.2.1 Measures in teletraffic 94 5.2.2 Sources and resources 95 5.2.3 Requests and holding time 96 5.2.4 Traffic 97 5.3 Measuring and foreseeing traffic 101 5.3.1 Traffic and service quality 101 5.3.2 Measuring traffic 102 5.3.3 Markovian model of traffic 102 5.3.4 Economy and traffic forecasting 103 5.4 Exercises 103 Chapter 6 Resource Requests and Activity 107 6.1 Infinite number of sources 107 6.1.1 Distribution of requests in continuous time 107 6.1.2 Distribution of requests in discrete time 110 6.1.3 Duration of activity distributions 113 6.1.4 Distribution of busy sources 115 6.2 Finite number of sources 115 6.2.1 Modeling with birth and death processes 116 6.2.2 Distribution of requests 117 6.3 Traffic peaks and randomness 118 6.3.1 Traffic peaks 118 6.3.2 Pure chance traffic 119 6.4 Recapitulation 119 6.5 Exercises 120 Chapter 7 The Teletraffic of Loss Systems 123 7.1 Loss systems 124 7.1.1 Definitions 124 7.1.2 Blocking and loss 124 7.2 The Erlang model 126 7.2.1 Infinite number of resources 127 7.2.2 Finite number of resources 128 7.2.3 Erlang-B formula 131 7.2.4 Dimensioning principles 132 7.3 Engset model 133 7.3.1 Sufficient number of resources 133 7.3.2 Insufficient number of resources 135 7.3.3 On the Engset loss formula 137 7.4 Imperfect loss systems 137 7.4.1 Loss probability in an imperfect system with limited and constant accessibility 137 7.4.2 Losses in a system with limited and variable accessibility 138 7.5 Exercises 138 Chapter 8 Teletraffic in Delay Systems 143 8.1 Delay system 143 8.1.1 Description 143 8.1.2 Characteristics of delay 144 8.2 Erlang model 145 8.2.1 Infinitely long queue 145 8.2.2 Erlang-C formula 146 8.2.3 Distribution of delays 147 8.3 Finite waiting capacity model 150 8.3.1 Queues of finite length 150 8.3.2 Limitations affecting the delay 151 8.4 Palm model 151 8.4.1 M/M/n/N/N queue 152 8.4.2 Characteristics of traffic 153 8.5 General distribution model for activity 153 8.5.1 The Pollaczek--Khinchine formula 153 8.5.2 Activity with a constant duration 154 8.6 Exercises 155 Part 4 Answers to Exercises 161 Chapter 9 Chapter 1 Exercises 163 Chapter 10 Chapter 2 Exercises 171 Chapter 11 Chapter 3 Exercises 185 Chapter 12 Chapter 4 Exercise 197 Chapter 13 Chapter 5 Exercises 201 Chapter 14 Chapter 6 Exercises 205 Chapter 15 Chapter 7 Exercises 207 Chapter 16 Chapter 8 Exercises 211 Part 5 Appendices 219 Appendix 1 221 Appendix 2 227 References 233 Index 235

    15 in stock

    £112.50

  • The Tactile Internet

    ISTE Ltd The Tactile Internet

    15 in stock

    Book SynopsisThe Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data.This book answers the many questions surrounding the Tactile Internet, including its reference architecture and adapted compression methods for conveying haptic information. It also describes the key enablers for deploying the applications of the Tactile Internet.As an antecedent technology, the IoT is tackled, explaining the differences and similarities between the Tactile Internet, the Internet of Things and the Internet of Everything. The essentials of teleoperation systems are summarized and the challenges that face this paradigm in its implementation and deployment are also discussed.Finally, a teleoperation case study demonstrating an application of the Tactile Internet is investigated to demonstrate its functionalities, architecture and performance.Table of ContentsForeword xi Ian F. Akyildiz Preface xiii Tara Ali-Yahiya and Wrya Monnet List of Acronyms xv Chapter 1 Introduction to Tactile Internet 1 Tara Ali-Yahiya 1. 1. Human perception and Tactile Internet 2 1. 2. The roadmap towards Tactile Internet 3 1. 3. What is Tactile Internet? 5 1. 4. Cyber-Physical Systems and TI 7 1. 4. 1. Physical world 7 1. 4. 2. Internet of Things 7 1. 4. 3. Communication 7 1. 4. 4. Storage and computation 8 1. 4. 5. Feedback 8 1. 4. 6. Smart computing 10 1. 5. References 11 Chapter 2 Reference Architecture of the Tactile Internet 13 Tara Ali-Yahiya 2. 1. Tactile Internet system architecture 13 2. 2. IEEE 1918. 1 use cases 15 2. 2. 1. Teleoperation 16 2. 2. 2. Automotive 17 2. 2. 3. Immersive virtual reality (IVR) 17 2. 2. 4. Internet of drones 18 2. 2. 5. Inter personal communication 18 2. 2. 6. Live haptic-enabled broadcast 19 2. 2. 7. Cooperative automated driving 19 2. 3. Conclusion 20 2. 4. References 20 Chapter 3 Tactile Internet Key Enablers 21 Tara Ali-Yahiya 3. 1. Introduction 21 3. 1. 1. The fifth-generation system architecture 21 3. 1. 2. Network slicing 23 3. 1. 3. Network function virtualization 25 3. 1. 4. Software-defined networking 26 3. 1. 5. Edge computing 27 3. 1. 6. Artificial intelligence 29 3. 2. Conclusion 31 3. 3. References 31 Chapter 4 6G for Tactile Internet 35 Pinar Kirci and Tara Ali-Yahiya 4. 1. Introduction 35 4. 2. Thearchitectureof6G 37 4. 2. 1. Networkperformanceof6G 38 4. 2. 2. Space network 39 4. 2. 3. Air network 40 4. 2. 4. Ground network 40 4. 2. 5. Underwater network 41 4. 3. 6G channel measurements and characteristics 41 4. 3. 1. Optical wireless channel 41 4. 3. 2. Unmanned aerial vehicle (UAV) channel 42 4. 3. 3. Underwater acoustic channel 43 4. 3. 4. Satellite channel 43 4. 3. 5. RFandterahertznetworksin6G 45 4. 3. 6. Visible light communication technology 48 4. 3. 7. Orbital angular momentum technology 48 4. 4. 6GcellularInternetofThings 49 4. 5. Energy self-sustainability (ESS) in 6G 50 4. 6. IoT-integrated ultra smart city life 52 4. 7. AI-enabled6Gnetworks 55 4. 8. AI- and ML-based security management in super IoT 59 4. 9. Securityfor6G 60 4. 10. The WEAFMnecosystem (water, earth, air, fire micro/nanoecosystem) with 6G and Tactile Internet 61 4. 11. References 63 Chapter 5 IoT, IoE and Tactile Internet 65 Wrya Monnet 5. 1. From M2MtoIoT 66 5. 2. Classification of remote monitoring and control systems 66 5. 3. IoT-enabling technologies 67 5. 3. 1. IoT hardware 67 5. 3. 2. IoT software 67 5. 3. 3. IoT connectivity 67 5. 4. Architectural design and interfaces 68 5. 5. IoT communication protocols 71 5. 5. 1. Message Queuing Telemetry Transport (MQTT) 72 5. 5. 2. Constrained Application Protocol (CoAP) 74 5. 5. 3. Data Distribution Service for real-time systems (DDS) 76 5. 5. 4. Open Mobile Alliance Device Management (OMA-DM) 79 5. 6. Internet of Everything (IoE) 80 5. 6. 1. Enabling technologies for the IoE 81 5. 7. Protocol comparisons and the readiness for TI 82 5. 8. TI-IoT models and challenges 83 5. 9. Edge computing in the IoT 85 5. 9. 1. Edge computing paradigms 86 5. 10. Real-time IoT and analytics versus real time in TI 88 5. 11. From IoT towardsTI 88 5. 12. Conclusion 90 5. 13. References 91 Chapter 6 Telerobotics 95 Wrya Monnet 6. 1. Introduction 95 6. 2. Teleoperation evolution to telepresence 96 6. 3. Tele presence applications 97 6. 4. Teleoperation system components 99 6. 4. 1. Master domains 102 6. 4. 2. Network domain (communication channel) 102 6. 4. 3. Slave domain 102 6. 5. Architecture of bilateral teleoperation control system 103 6. 5. 1. Classification of the control systems architectures 106 6. 5. 2. Discrete architecture with transmission delay 107 6. 6. Performance and transparency of telepresence systems 110 6. 6. 1. Passivity and stability 110 6. 6. 2. Time delay issues 112 6. 7. Other methods for time-delay mitigation 116 6. 8. Teleoperation over the Internet 117 6. 9. Multiple access to a teleoperation system 119 6. 10. A use case 121 6. 11. Conclusion 122 6. 12. References 122 Chapter 7 Haptic Data: Compression and Transmission Protocols 127 Wrya Monnet 7. 1. Introduction 127 7. 2. Haptic perception 128 7. 2. 1. Human haptic perception 128 7. 2. 2. Telerobotic tactile and haptic perception 128 7. 2. 3. Tactile sensing for material recognition 129 7. 2. 4. Tactile sensing for object shape recognition 130 7. 2. 5. Tactile sensing for pose estimation 131 7. 3. Haptic interfaces 133 7. 3. 1. Haptic interface for tele presence 133 7. 3. 2. Haptic and tactile sensors and actuators 135 7. 4. Haptic compression 139 7. 5. Haptic transport protocols 142 7. 5. 1. Application layer protocols 143 7. 5. 2. Transport layer protocols 146 7. 6. Multi-transport protocols 149 7. 7. Haptic transport protocol performance metrics 149 7. 8. Conclusion 150 7. 9. References 150 Chapter 8 Mapping Wireless Networked Robotics into Tactile Internet 155 Nicola Roberto Zema and Tara Ali-Yahiya 8. 1. Wireless networked robots 155 8. 2. WNR traffic requisites 158 8. 2. 1. Types of traffic in WNRs 158 8. 3. Traffic shaping and TI haptic codecs 160 8. 3. 1. Introduction 161 8. 3. 2. Mapping WNR control traffic to TI 161 8. 4. WNRs in the Tactile Internet architecture 164 8. 4. 1. WNRs in the TI architecture and interfaces 165 8. 5. Conclusion 169 8. 6. References 170 Chapter 9 HoIP over 5G for Tactile Internet Teleoperation Application 173 Tara Ali-Yahiya, Wryamonnet and Bakhtiar M. Amin 9. 1. Relatedworks 174 9. 2. 5G architecture design for Tactile Internet 179 9. 2. 1. Tactile edge A 180 9. 2. 2. Network domain 182 9. 2. 3. Protocol stack of 5G integration with IEEE 1918. 1 182 9. 3. HapticsoverIP 183 9. 4. Teleoperationcasestudy 185 9. 4. 1. Master to slave (uplink) data rate in edge A 187 9. 4. 2. Slave to master (downlink) data rate in edge B 187 9. 4. 3. Encapsulating the haptic data in HoIP 188 9. 4. 4. 5G network data and control handling 188 9. 4. 5. Case study operational states 190 9. 4. 6. Case study protocol stack 191 9. 5. Simulationresults 192 9. 5. 1. Simulation topology 193 9. 5. 2. NS3networkarchitecture 194 9. 5. 3. Simulation scenario 196 9. 5. 4. Simulation results 198 9. 6. Conclusion 203 9. 7. References 203 Chapter 10 Issues and Challenges Facing Low Latency in the Tactile Internet 209 Tara Ali-Yahiya 10. 1. Introduction 209 10. 1. 1. Technical requirements for the TI 211 10. 2. Low latency in the Tactile Internet 212 10. 2. 1. Resource allocation 212 10. 2. 2. Mobile edge computing 213 10. 2. 3. Network coding 214 10. 2. 4. Haptic communication protocols 214 10. 3. Intelligence and the Tactile Internet 216 10. 4. Edge intelligent 216 10. 5. Openissues 219 10. 6. Conclusion 220 10. 7. References 221 List of Authors 227 Index 229

    15 in stock

    £124.15

  • Understanding 5G Mobile Networks: A

    Emerald Publishing Limited Understanding 5G Mobile Networks: A

    15 in stock

    Book SynopsisMost of the literature on 5G has been in the form of standards, reports, and industry papers and articles. Because of this, researchers from non-scientific or non-engineering disciplines have struggled to understand how it is or could be operationalized and standardized across the globe. Here Peter Curwen and Jason Whalley offer the first manageable overview of 5G for a non-technical audience. This book provides a full review of the current literature, both academic and professional; an in-depth but non-technical discussion of the historical background of the development of 5G; and a broad, multidisciplinary survey of major issues including spectrum, and the licensing and launch of 5G networks throughout the world, distinguishing standalone 5G from non-standalone 5G. Throughout, there is consideration given to how operators and equipment vendors make money from mobile networks, and where money is potentially to be made in the years to come. Understanding 5G Mobile Networks: A Multidisciplinary Primer is a must-read not only for researchers and students in economics, business, strategy, and operations and logistics, but also for regulators, mobile companies, vertical operators, and anyone else interested in the development of this vital technology.Table of ContentsChapter 1. 5G: A Multigenerational ApproachChapter 2. 5G: A Review of Technical Progress Chapter 3. 5G Literature Review Chapter 4. 5G Progress in Europe Chapter 5. 5G Progress in the Americas, Asia, the Middle East and Africa Chapter 6. 5G Vendors and Summing Up

    15 in stock

    £75.04

  • Mobile Access Safety: Beyond BYOD

    ISTE Ltd and John Wiley & Sons Inc Mobile Access Safety: Beyond BYOD

    15 in stock

    Book SynopsisOver recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise. Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context.Table of ContentsIntroduction ix Chapter 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility 1 1.1. A busy day 1 1.2. The ups and downs of the day 3 1.3. What actually happened? 3 Chapter 2. Threats and Attacks 7 2.1. Reconnaissance phase 9 2.1.1. Passive mode information gathering techniques 10 2.1.2. Active mode information gathering techniques 14 2.2. Identity/authentication attack 22 2.2.1. ARP spoofing 22 2.2.2. IP spoofing 22 2.2.3. Connection hijacking 29 2.2.4. Man in the middle 29 2.2.5. DNS spoofing 30 2.2.6. Replay attack 31 2.2.7. Rebound intrusion 31 2.2.8. Password hacking 32 2.2.9. The insecurity of SSL/TLS 34 2.3. Confidentiality attack 38 2.3.1. Espionage software 39 2.3.2. Trojans 41 2.3.3. Sniffing 43 2.3.4. Cracking encrypted data 44 2.4. Availability attack 49 2.4.1. ICMP Flood 50 2.4.2. SYN Flood 50 2.4.3. Smurfing 52 2.4.4. Log Flood 52 2.4.5. Worms 53 2.5. Attack on software integrity 55 2.6. BYOD: mixed-genre threats and attacks 57 2.7. Interception of GSM/GPRS/EDGE communications 61 Chapter 3. Technological Countermeasures 65 3.1. Prevention 66 3.1.1. Protection of mobile equipment 67 3.1.2. Data protection 71 3.2. Detection 81 3.2.1. Systems of intrusion detection 81 3.2.2. Honeypot 88 3.2.3. Management and supervision tools 91 3.3. Reaction 95 3.3.1. Firewall 95 3.3.2. Reverse proxy 102 3.3.3. Antivirus software 104 3.3.4. Antivirus software: an essential building block but in need of completion 107 3.4. Organizing the information system’s security 108 3.4.1. What is security organization? 109 3.4.2. Quality of security, or the attraction of ISMS 110 Chapter 4. Technological Countermeasures for Remote Access 113 4.1. Remote connection solutions 114 4.1.1. Historic solutions 115 4.1.2. Desktop sharing solutions 115 4.1.3. Publication on the Internet 116 4.1.4. Virtual Private Network (VPN) solutions 118 4.2. Control of remote access 137 4.2.1. Identification and authentication 139 4.2.2. Unique authentication 155 4.3. Architecture of remote access solutions 157 4.3.1. Securing the infrastructure 157 4.3.2. Load balancing/redundancy 161 4.4. Control of conformity of the VPN infrastructure 162 4.5. Control of network admission 166 4.5.1. Control of network access 166 4.5.2. ESCV (Endpoint Security Compliancy Verification) 167 4.5.3. Mobile NAC 170 Chapter 5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary 173 5.1. The attack at Mr Rowley’s house 173 5.1.1. Securing Mr Rowley’s PC 173 5.1.2. Securing the organizational level 174 5.1.3. Detection at the organizational level 175 5.1.4. A little bit of prevention 175 5.2. The attack at the airport VIP lounge while on the move 176 5.3. The attack at the café 176 5.4. The attack in the airport VIP lounge during Mr Rowley’s return journey 178 5.5. The loss of a smartphone and access to confidential data 180 5.6. Summary of the different security solutions that should have been implemented 181 Conclusion 187 APPENDICES 189 Appendix 1 191 Appendix 2 197 Bibliography 223 Index 233

    15 in stock

    £125.06

  • Design Constraints for NFC Devices

    ISTE Ltd and John Wiley & Sons Inc Design Constraints for NFC Devices

    15 in stock

    Book SynopsisNear field communication (NFC) can appear to be a simple intuitive technology for exchanging data between close devices. In reality, these contactless structures that combine components and antennas must respect important and specific working constraints. Illustrated by a number of detailed technological examples, this book discusses the multiple normative (ISO, CEN, NFC Forum, EMVCo, etc.) and regulatory (ERC, FCC, ETSI, radiofrequency, private and ecological pollution, etc.) constraints, as well as the applied, typological, functional, structural, environmental or interoperability constraints that a NFC device might face. Design Constraints for NFC Devices also presents techniques that enable us to free ourselves from the technological constraints of current NFC operations encountered in banking, public transport, administration, automotive, industrial, communicating object and Internet of Things applications.Table of ContentsAcknowledgements xi Preface xiii Introduction xvii Part 1. Introduction to – and Reminders About – NFC 1 Introduction to Part 1 3 Chapter 1. Recap of the Principles Employed in NFC 5 1.1. The physical fundaments of “contactless” and NFC 5 1.1.1. Phenomenon of propagation and radiation 5 1.1.2. Classification of fields and spatial regions 6 1.1.3. Spatial regions 6 1.1.4. Far field: r >> λ/2π (Fraunhofer zone) 6 1.1.5. Intermediary field: r approximately equal to λ (Fresnel zone) 7 1.1.6. Near field: r << λ/2π (Rayleigh zone) and the origin of NFC 7 1.1.7. Remarks on contactless, RFID and NFC applications 7 1.2. The concept of NFC 9 1.2.1. Biot–Savart law 10 1.2.2. Field H at a point on the axis of a circular antenna 10 1.2.3. Decrease in the field H as a function of “d” 13 1.2.4. Field H at a point on the axis of a rectangular antenna 14 Chapter 2. Normative Constraints of NFC 17 2.1. Introduction 17 2.1.1. Normative, regulatory and NFC market constraints 17 2.1.2. A little bit of vocabulary 18 2.1.3. Norm 19 2.1.4. Standard 19 2.2. Normative constraints 19 2.2.1. Uplink from initiator to targets 20 2.2.2. “Contactless” normative constraints on NFC device antennae 27 2.3. Conclusion 36 Chapter 3. Regulatory Constraints and Recommendations 39 3.1. Regulatory constraints specific to NFC and NFC antennas 39 3.1.1. State of RF regulations 39 3.1.2. Constraints pertaining to radiation and pollution by NFC 41 3.1.3. The ERC 70 03 recommendation and the ETSI 300 330 norm 41 3.2. Constraints due to recommendations 45 3.2.1. Exposure of the human body to EM fields 46 3.2.2. Societal constraints due to individual freedoms (privacy) 48 3.2.3. Environmental constraints 50 3.3. Constraints of the NFC market 52 3.3.1. NFC applications of short range devices 52 3.3.2. Costs and market prices desired by users 52 3.3.3. Beware of false advertising 53 Part 2. Constraints Due to the Field of Applications of NFC 55 Introduction to Part 2 57 Chapter 4. Applicational Typologies of the NFC and their Consequences 59 4.1. Applicational typologies of the NFC 59 4.1.1. Technologies 59 4.1.2. “NFC Forum Devices” and “NFC Forum Tags” 60 4.1.3. “Modes” of communication of an NFC Forum Device 62 4.1.4. Role of an NFC Forum Device 63 4.1.5. Applicational typological possibilities and their constraints 64 4.2. Application consequences and their direct constraints 67 4.2.1. Touch & Go typology 67 4.2.2. Touch & Confirm typology 67 4.2.3. Touch & Connect typology 67 4.2.4. Touch & Explore typology 68 Chapter 5. Constraints Due to Fields of Application 69 5.1. Range of technical possibilities of applications 69 5.1.1. In architectures and electronic functions 69 5.1.2. Shapes, dimensions and form factors (publicity aside) 70 5.1.3. Remarks and some clarifications about the table 70 5.1.4. Targets/tags for the monitoring of long-distance races 72 5.1.5. Targets/tags for monitoring luxury items 72 5.2. Segmentation, typologies of markets, their problems and their incidences, and direct technical constraints on NFC devices 73 5.2.1. Market sectors and typologies 74 5.3. Mobile telephony 75 5.4. Banks/money matters/payments 77 5.5. Transport 78 5.5.1. 1st case: card emulation mode in battery-assisted and then flat battery 81 5.5.2. 2nd case: card emulation mode with battery out 81 5.5.3. 3rd case: collisions and loading effects 82 5.6. Automobiles 82 5.6.1. Consumer electronics 85 5.7. Healthcare 88 5.8. Communicating objects 89 5.8.1. NFC tablets 89 5.8.2. NFC USB key 90 5.8.3. NFC communication and promotional objects 91 5.8.4. “Add-on” NFC devices, sticks, and stickers 92 Part 3. Applicational Constraints Needing to be Solved when Designing NFC Systems and their Antennas 95 Introduction to Part 3 97 Chapter 6. Structural Constraints in NFC 99 6.1. Constraints due to the form factors of the antennas 99 6.2. Constraints due to variations of the operating distance 100 6.2.1. Distances and magnetic couplings 100 6.3. Constraint of the maximum acceptable value of the quality coefficient Q of the initiator antenna 100 6.4. Constraint of the value of return (retro) modulation voltage 102 6.4.1. Passive Load Modulation (PLM) 103 6.4.2. Active Load Modulation (ALM) 106 Chapter 7. Functional Applicational Constraints 111 7.1. Antenna tuning/detuning constraints 111 7.1.1. The case of an initiator 111 7.1.2. Electrical representation of the target 112 7.1.3. “Tuned”, “untuned” and “detuned” mobile phones 120 7.2. Constraints and influences of the environment 124 7.2.1. Physical influence of the environment 124 7.2.2. Impacts of the environment on the antenna and its performance 124 7.2.3. Electrical fields E 125 7.2.4. Magnetic field 128 Part 4. Conformity and Interoperability Constraints 137 Introduction to Part 4 139 Chapter 8. Conformity Constraints 141 8.1. Conformity tests for NFC devices 141 8.2. Norms of “conformity” tests for NFC IPx 142 8.2.1. ISO 23917 tests (NFC IP1 protocol) 143 8.2.2. ISO 22536 tests (NFC IP1 RF interface) 143 8.3. Electrical characterizations of the initiator antenna 146 8.3.1. The antenna’s inductance and resistance 146 8.3.2. Quality coefficient 149 8.3.3. Bandwidth 149 8.3.4. Tuning of the antenna and its impedance matching 149 8.4. Method of adjustment of the target antenna 154 8.4.1. Absorption threshold, H_thr 154 8.4.2. Absorption in reading mode, H_read 154 8.4.3. Resonance frequency, f_res 154 8.4.4. Bandwidth 155 8.5. Measuring methods for use with the target 155 8.6. Electrical measurements of the initiator antenna 156 8.6.1. Measuring the magnetic field H radiated by the initiator 156 8.6.2. Measurement of the quality coefficient – Q 158 8.6.3. Measuring Q in the application 162 8.6.4. Measuring the bandwidth in the application 163 8.7. Method for adjustment of whole systems 165 8.7.1. Measurements needing to be performed 165 8.7.2. Order in which the measurements must be taken 165 8.7.3. Energy domains, zero lines, and safe operating areas 165 8.8. Measuring tools 166 Chapter 9. Interoperability Constraints 169 9.1. Norms and interoperability 169 9.2. Problems of the tests; JNCF ISO vs EMV vs NFC Forum; etc 170 9.2.1. EMV conformity tests . 171 9.3. In practice: a few simple examples of measurements 178 9.3.1. Example 1 179 9.3.2. Example 2 181 9.3.3. Conformity tests of the NFC Forum 185 9.3.4. NFC Forum testing and certification methods for the lower levels 186 9.3.5. Testing the conformity of NFC with the CEN – Comité européen de normalisation (European Standardizing Committee) 187 9.3.6. What about overall interoperability? 188 Conclusion 189 Bibliography 197 Index 199

    15 in stock

    £125.06

  • High-Tech Entrepreneurship in Asia: Innovation,

    Edward Elgar Publishing Ltd High-Tech Entrepreneurship in Asia: Innovation,

    3 in stock

    Book SynopsisThe option for consumers to make payments for services and products via mobile telephones has created a dynamic new industry. High-Tech Entrepreneurship in Asia illustrates how small, entrepreneurial firms in Asia have devised and produced innovations crucial for this industry's development. Marina Zhang and Mark Dodgson explore the evolution of the mobile payment industry which has emerged in recent years through the convergence of services provided by financial and mobile telecommunications companies. They consider how leading Asian economies are increasingly becoming the source of important technological innovations. Detailed case studies are used to reveal the technological, social, political, national and cultural factors that encourage and constrain entrepreneurship in Asia, paying particular attention to China and Korea, the industry vanguards. The role played by entrepreneurial start-ups in bridging the gap between banking, credit card and mobile telecommunications sectors is also explored. This highly original work will strongly appeal to students, researchers, policymakers and managers interested in international entrepreneurship, innovation, industrial and technological development and Asian business.Table of ContentsContents: Preface 1. Introduction 2. Mobile Payment Technologies 3. The Development of Emerging Technologies 4. High-Tech Entrepreneurship 5. Entrepreneurship Research by Process-Oriented Case Inquiry 6. The Development of Mobile Payment Technologies in Korea 7. The Development of the Mobile Payment Industry in China 8. High-Tech Entrepreneurship: Technology, Firms and International Context Bibliography Index

    3 in stock

    £37.00

  • Wireless Wars: China's Dangerous Domination of 5G

    BenBella Books Wireless Wars: China's Dangerous Domination of 5G

    10 in stock

    Book Synopsis

    10 in stock

    £20.96

  • 450 MHz – Frequenz für kritische Infrastrukturen:

    Springer Fachmedien Wiesbaden 450 MHz – Frequenz für kritische Infrastrukturen:

    1 in stock

    Book SynopsisDie Sicherstellung einer zuverlässigen Versorgungsinfrastruktur zur Gewährleistung der Versorgungssicherheit stellt eines der zentralen Themen der Energieversorger in Deutschland dar. Einen wichtigen Beitrag soll hierfür die 450 MHz Frequenz als Frequenz für kritische Infrastrukturen leisten. Für Energieversorger stellt sich daher die Frage, in welchem Kontext die 450 Frequenz zu nutzen ist sowie welche Vor- und Nachteile 450 MHz mit sich bringt.Die Kurzfassung zum Thema 450 MHz – die Frequenz für kritische Infrastrukturen soll dem Leser einen ersten schnellen Einstieg in die energiewirtschaftliche Einordnung, die Frequenz und darauf basierende Technologie sowie die Einsatzmöglichkeiten im eigenen Energieversorgungsunternehmen bieten.Table of ContentsHistorie & Hintergrund.- 450 MHz: die Technik.- 450 MHz Geschäftsmodell.- 450 MHz im EVU.- Fazit.

    1 in stock

    £9.99

  • VoIP Performance of LTE Networks

    Verlag G. Mainz VoIP Performance of LTE Networks

    3 in stock

    Book Synopsis

    3 in stock

    £37.39

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account