Mobile phone technology Books
Grove Press / Atlantic Monthly Press Eccentric Orbits
Book SynopsisTrade ReviewPraise for Eccentric Orbits: Named one of the “Top 10 Nonfiction Books of 2016” and one of the “20 Books That Defined Our Year” by the Wall Street Journal Named a Book of the Year 2016 by the Economist An Amazon Best Book of the Month A Hudson Booksellers’ Best Book of 2016 (Best Business Interest) “Engaging and ambitious . . . Eccentric Orbits is maximalist nonfiction, 500 pages of deep reporting put forward with epic intentions . . . a panoramic narrative, laced with fine filigree details, that makes for a story that soars and jumps and dives and digresses . . . [A] big, gutsy, exciting book.”—Wall Street Journal “Those with visions of vast satellite communications networks dancing in their heads would do well to read John Bloom’s new book on [Iridium] . . . Bloom . . . tells this story well . . . He does a good job of explaining the technology and the importance of the inventors who made the technology possible.”—Washington Post “Think of Final Cut, Steven Bach’s gripping account of the notorious movie disaster ‘Heaven’s Gate.’ Or The Smartest Guys in the Room, Bethany McLean and Peter Elkind’s chronicle of the collapse of Enron, and The Big Short, Michael Lewis’ tale of the cratering of the national economy. Eccentric Orbits . . . is a tale of ham-fisted management that’s lively enough to invite comparisons to those modern classics.”—Los Angeles Times “An exhaustive account . . . Eccentric Orbits not only offers good corporate drama, but is an enlightening narrative of how new communications infrastructures often come about: with a lot of luck, government help and investors who do not ask too many questions.”—Economist “Eccentric Orbits is a story rich in larger-than-life characters, including shady Cold War operatives and warrior-like Motorola executives . . . Bloom gives a wonderful sense of what an engineering marvel Iridium was.”—Bethany McLean, Strategy + Business (Best Business Books 2016) “An inspiring history as well as an effective business thriller . . . Bloom argues convincingly that creating and then saving Iridium was one . . . desperately difficult—and brilliant—achievement.”—New Scientist “Extensive . . . Sprawling . . . A detailed and entertaining history of the rise, fall, and rebirth of Iridium.”—Space Review “A good read.”—Marketplace “Highly engaging . . . Check it out.”—News Tribune “A prize-worthy example of the investigative genre . . . [Eccentric Orbits] has conflict and triumph on a Wagnerian scale . . . John Bloom has achieved in Eccentric Orbits an admirable balance of the human and the technological in what is at heart an age-old tale of one man’s triumph against apparently insuperable odds.”—Literary Review “An outstanding read . . . [An] inspiring story . . . Highly recommended.”—ATC Reform News “Eccentric Orbits does for the 1990s birth of the satellite phone industry what Tracy Kidder’s Soul of a New Machine did for the next-generation computer business. It’s a wild story . . . Funny, informative, exciting . . . A sprawling masterpiece of history and reporting.”—Shelf Awareness “Spellbinding . . . A tireless researcher, Bloom delivers a superlative history . . . A tour de force.”—Kirkus Reviews (starred review) “Eccentric Orbits is a remarkable work. I had known about Iridium but not about its fascinating history. John Bloom’s writing style is attractive and the level of detail is astonishing. This was a page-turner for me!”—Vint Cerf, Chief Internet Evangelist, Google “Interested in giant, head-scratching miscalculations by a great American company? The power of one man to rescue the world’s biggest deployment of low-earth satellites? A place where genius engineering meets a total lack of common sense? Then John Bloom’s book about Motorola’s multibillion-dollar debacle, Iridium, is for you. Eccentric Orbits is both a novelistic thriller and a cautionary tale, a page-turner about a reach for the heavens and a business primer on a near-fatal fall back to the earth.”—Julian Guthrie, author of The Billionaire and The Mechanic “John Bloom’s Eccentric Orbits, which tells the story of one of the most ambitious projects in the history of technology, is the most compelling book I have read in a long while. Bloom somehow coaxed the deepest thoughts and darkest secrets out of many satellite engineers, skeptical VCs, business royalty, inner-city tycoons, Italian marketers, Russian rocket launchers, Arabian princes, corporate CEOs, African leaders, Washington insiders, insurance giants, Pentagon brass, government lifers, politicians, and frustrated bankruptcy judges. This is a masterpiece of research and storytelling. If not for Bloom, one of the greatest stories of American ingenuity and bullheadedness would still lie scattered in thousands of documents and the memories of those who lived it.”—Gary Kinder, author of Ship of Gold in the Deep Blue Sea “This is a monumental piece of non-fiction, not just for the breadth and depth of the research, but for its audacity: Bloom seeks to make technology and marketing and high finance dramatic and funny and instructive of the human condition—and succeeds. Until I read this, I had always assumed that my cell phone was created by something like spontaneous combustion; like one day, it just appeared between my right hand and my ear, as if it had always belonged there. Bloom has given all of us—all billions of us—the back story on it, and what a strange, tangled, convoluted, fairly hilarious one it is.”—Jim Atkinson, Texas Monthly contributing editor “Build a better mousetrap, and the world will erect every possible obstacle to its success. That’s the sobering lesson of John Bloom’s book on the progress of a reliable, cheap, encrypted, worldwide mobile phone system to supermarket shelves. The exhilarating lesson is that it can be done if you have visionary geeks, hard-boiled veterans, retired capitalists, and the occasional eccentric rebellious bureaucrat determined to do it. This is high scientific journalism, exciting business journalism, and a rattling good tale. It even includes Nazis.”—John O’Sullivan, author of The President, the Pope, and the Prime Minister: Three Who Changed the World “Impeccably researched, and in smooth, easy prose, John Bloom interweaves fascinating historical trivia about the space race, satellites, and global communications with detail-filled personality snapshots and cringingly revealing, often disturbingly humorous, insights about the many ways big business can shoot itself in the foot.”—John Brewer, former president and editor-in-chief, New York Times Syndicate and News Service “Pacy [and] . . . worth reading, not just for the wild ride that involves secretive Saudi sheikhs, plucky terrorists, never-say-die businessmen and Bill Clinton, but also as a reminder of how vast business can be vastly dumb . . . A thrilling boom-to-boom corporate drama.”—Sunday Times (UK) “John Bloom’s account of the Iridium satellite network is more than a ripping read, it is both a commentary on the way we do technology today and a reminder of Friedrick Hayek’s observation that presumed experts and planners are the last people you want picking winners. A tale well told is a thing of delight, and John Bloom’s Eccentric Orbits: The Iridium Story does not fail.”—Quadrant (Australia) “Riveting . . . I’ve never used the term ‘tour de force’ in a book review before, but if it ever belonged in one, it is this review of Eccentric Orbits.”—800-CEO-READ
£17.46
Transworld Publishers Ltd The One Device
Book SynopsisThe secret history of the invention that changed everything and became the most profitable product in the world.Odds are that as you read this, an iPhone is within reach. But before Steve Jobs introduced us to ''the one device'', as he called it, a mobile phone was merely what you used to make calls on the go.How did the iPhone transform our world and turn Apple into the most valuable company ever? Veteran technology journalist Brian Merchant reveals the inside story you won''t hear from Cupertino - based on his exclusive interviews with the engineers, inventors and developers who guided every stage of the iPhone''s creation.This deep dive takes you from inside 1 Infinite Loop to nineteenth-century France to WWII America, from the driest place on earth to a Kenyan pit of toxic e-waste, and even deep inside Shenzhen''s notorious ''suicide factories''. It''s a first-hand look at how the cutting-edge tech that makes the world work - touch screens, Trade ReviewA road map for design and engineering genius, an anthropology of the modern age and an unprecedented view into one of the most secretive companies in history. * Financial Times *Merchant tells a far richer story than I — having covered Apple for years as a journalist — have seen before. -- Lev Grossman * New York Times *The best account of the contemporary world’s single greatest technological miracle. * Bloomberg, Must Reads of 2017 *Brian Merchant is a lovely writer... formidable... fascinating. -- Hugo Rifkind * The Times *A remarkable tale... the story it tells is compelling, even addictive - almost as addictive as the iPhone itself * The Wall Street Journal *Delivers its quota of compelling anecdotes... Merchant's investigations have great depth... I have no doubt this book will fly off the shelves. * Evening Standard *A deep dive into the decisions and breakthroughs behind the development of the historic smartphone. * Business Insider, Best Business Books of 2017 *Brian Merchant’s The One Device dives deep into the making of Apple’s iPhone on its 10th anniversary, and [analyses] the implications of this worldchanging innovation. -- Andrew Hill * FT Business Book of the Year 2017 *Apple's culture of reverence and secrecy is no match for Brian Merchant in The One Device. * New York Times Book Review *In terms of breath and depth of research, The One Device is impressive. * Irish Times *A wild ride * San Francisco Chronicle *The One Device is a tour de force. Brian Merchant has dug into the iPhone like no other reporter before him, travelling the world to find the untold stories behind the device’s creation and to uncover the very real human costs that come with making the iPhone. Packed with vivid detail, the book carries the reader from one unexpected revelation to the next with a fast-paced edge and heaps of analytical insight. -- Ashlee Vance, New York Times bestselling author of Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future
£11.69
Academic Press DelayDoppler Communications
Book SynopsisTrade Review"The book is written in a very clear style, and allows somebody not familiar with OTFS to quickly understand the essentials of this exciting new topic. Even active researchers in the field will appreciate the clear and consistent description and the extensive intuitive explanations of the finer points of OTFS. The authors have done an excellent job in focusing on the key formulations and their interpretations, and making the book concise (some 250 pages), while also providing extensive references that enable looking up specialized developments. This valuable book will certainly benefit anyone working in the vibrant area of waveform design for 6G." --Andreas F. MolischTable of Contents1. Introduction 2. High-mobility wireless channels 3. OFDM review and its limitations 4. Delay-Doppler modulation 5. Zak transform analysis for delay-Doppler communications 6. Detection methods 7. Channel estimation methods 8. MIMO and multiuser OTFS 9. Conclusions and future directions Appendix A: Notation and acronyms B: Some useful matrix properties C: Some MATLAB code and examples Please visit the book's companion site for additional materials (MATLAB package code): https://www.elsevier.com/books-and-journals/book-companion/9780323850285 (copy and paste the URL to your browser and search or reach it through the hyperlink available in the Resources box).
£86.36
Elsevier Science Dimensions of Uncertainty in Communication
Book SynopsisTable of Contents1. Model selection 2. Performance bounds from epistemic uncertainty 3. Moment bounds 4. Interval analysis 5. Probability boxes 6. Dependence bounds 7. Beyond probability
£86.36
John Wiley & Sons Inc AAA and Network Security for Mobile Access
Book SynopsisAAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations. AAA and Network Security for Mobile Access: Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment. Discusses public key infrastructures and provides practical tips on certificates management. Introduces Diameter, a state-of-the-art AAA protocol designed to meet today's reliability, security and robustneTrade Review"…serves to provide planners and researchers in both academic and professional capacities a way in which to completely access pertinent data in a logical and clearly defined manner." (Electric Review, September/October 2006)Table of ContentsForeword xv Preface xvii About the Author xxi Chapter 1 The 3 “A”s: Authentication, Authorization, Accounting 1 1.1 Authentication Concepts 1 1.1.1 Client Authentication 2 1.1.2 Message Authentication 4 1.1.3 Mutual Authentication 5 1.1.4 Models for Authentication Messaging 6 1.1.5 AAA Protocols for Authentication Messaging 7 1.2 Authorization 8 1.2.1 How is it Different from Authentication? 8 1.2.2 Administration Domain and Relationships with the User 9 1.2.3 Standardization of Authorization Procedures 10 1.3 Accounting 13 1.3.1 Accounting Management Architecture 13 1.3.2 Models for Collection of Accounting Data 15 1.3.3 Accounting Security 17 1.3.4 Accounting Reliability 17 1.3.5 Prepaid Service: Authorization and Accounting in Harmony 19 1.4 Generic AAA Architecture 19 1.4.1 Requirements on AAA Protocols Running on NAS 21 1.5 Conclusions and Further Resources 23 1.6 References 23 Chapter 2 Authentication 25 2.1 Examples of Authentication Mechanisms 25 2.1.1 User Authentication Mechanisms 26 2.1.2 Example of Device Authentication Mechanisms 31 2.1.3 Examples of Message Authentication Mechanisms 33 2.2 Classes of Authentication Mechanisms 36 2.2.1 Generic Authentication Mechanisms 41 2.3 Further Resources 44 2.4 References 45 Chapter 3 Key Management Methods 47 3.1 Key Management Taxonomy 47 3.1.1 Key Management Terminology 47 3.1.2 Types of Cryptographic Algorithms 49 3.1.3 Key Management Functions 50 3.1.4 Key Establishment Methods 51 3.2 Management of Symmetric Keys 54 3.2.1 EAP Key Management Methods 54 3.2.2 Diffie–Hellman Key Agreement for Symmetric Key Generation 58 3.2.3 Internet Key Exchange for Symmetric Key Agreement 61 3.2.4 Kerberos and Single Sign On 62 3.2.5 Kerberized Internet Negotiation of Keys (KINK) 66 3.3 Management of Public Keys and PKIs 67 3.4 Further Resources 68 3.5 References 69 Chapter 4 Internet Security and Key Exchange Basics 71 4.1 Introduction: Issues with Link Layer-Only Security 71 4.2 Internet Protocol Security 73 4.2.1 Authentication Header 74 4.2.2 Encapsulating Security Payload 74 4.2.3 IPsec Modes 75 4.2.4 Security Associations and Policies 77 4.2.5 IPsec Databases 78 4.2.6 IPsec Processing 78 4.3 Internet Key Exchange for IPsec 79 4.3.1 IKE Specifications 79 4.3.2 IKE Conversations 81 4.3.3 ISAKMP: The Backstage Protocol for IKE 83 4.3.4 The Gory Details of IKE 86 4.4 Transport Layer Security 91 4.4.1 TLS Handshake for Key Exchange 93 4.4.2 TLS Record Protocol 95 4.4.3 Issues with TLS 96 4.4.4 Wireless Transport Layer Security 96 4.5 Further Resources 96 4.6 References 97 Chapter 5 Introduction on Internet Mobility Protocols 99 5.1 Mobile IP 99 5.1.1 Mobile IP Functional Overview 102 5.1.2 Mobile IP Messaging Security 107 5.2 Shortcomings of Mobile IP Base Specification 109 5.2.1 Mobile IP Bootstrapping Issues 110 5.2.2 Mobile IP Handovers and Their Shortcomings 113 5.3 Seamless Mobility Procedures 117 5.3.1 Candidate Access Router Discovery 118 5.3.2 Context Transfer 120 5.4 Further Resources 125 5.5 References 126 Chapter 6 Remote Access Dial-In User Service (RADIUS) 127 6.1 RADIUS Basics 127 6.2 RADIUS Messaging 128 6.2.1 Message Format 129 6.2.2 RADIUS Extensibility 130 6.2.3 Transport Reliability for RADIUS 130 6.2.4 RADIUS and Security 131 6.3 RADIUS Operation Examples 135 6.3.1 RADIUS Support for PAP 135 6.3.2 RADIUS Support for CHAP 136 6.3.3 RADIUS Interaction with EAP 138 6.3.4 RADIUS Accounting 139 6.4 RADIUS Support for Roaming and Mobility 141 6.4.1 RADIUS Support for Proxy Chaining 142 6.5 RADIUS Issues 143 6.6 Further Resources 144 6.6.1 Commercial RADIUS Resources 144 6.6.2 Free Open Source Material 145 6.7 References 145 Chapter 7 Diameter: Twice the RADIUS? 147 7.1 Election for the Next AAA Protocol 147 7.1.1 The Web of Diameter Specifications 148 7.1.2 Diameter Applications 151 7.1.3 Diameter Node Types and their Roles 152 7.2 Diameter Protocol 153 7.2.1 Diameter Messages 153 7.2.2 Diameter Transport and Routing Concepts 157 7.2.3 Capability Negotiations 159 7.2.4 Diameter Security Requirements 160 7.3 Details of Diameter Applications 162 7.3.1 Accounting Message Exchange Example 162 7.3.2 Diameter-Based Authentication, NASREQ 163 7.3.3 Diameter Mobile IP Application 167 7.3.4 Diameter EAP Support 167 7.4 Diameter Versus RADIUS: A Factor 2? 168 7.4.1 Advantages of Diameter over RADIUS 168 7.4.2 Issues with Use of Diameter 170 7.4.3 Diameter-RADIUS Interactions (Translation Agents) 171 7.5 Further Resources 172 7.6 References 172 Chapter 8 AAA and Security for Mobile IP 175 8.1 Architecture and Trust Model 177 8.1.1 Timing Characteristics of Security Associations 178 8.1.2 Key Delivery Mechanisms 181 8.1.3 Overview of Use of Mobile IP-AAA in Key Generation 182 8.2 Mobile IPv4 Extensions for Interaction with AAA 184 8.2.1 MN-AAA Authentication Extension 184 8.2.2 Key Generation Extensions (IETF work in progress) 186 8.2.3 Keys to Mobile IP Agents? 187 8.3 AAA Extensions for Interaction with Mobile IP 187 8.3.1 Diameter Mobile IPv4 Application 188 8.3.2 Radius and Mobile IP Interaction: A CDMA2000 Example 196 8.4 Conclusion and Further Resources 200 8.5 References 201 Chapter 9 PKI: Public Key Infrastructure: Fundamentals and Support for IPsec and Mobility 203 9.1 Public Key Infrastructures: Concepts and Elements 204 9.1.1 Certificates 204 9.1.2 Certificate Management Concepts 205 9.1.3 PKI Elements 209 9.1.4 PKI Management Basic Functions 210 9.1.5 Comparison of Existing PKI Management Protocols 212 9.1.6 PKI Operation Protocols 221 9.2 PKI for Mobility Support 222 9.2.1 Identity Management for Mobile Clients: No IP Addresses! 222 9.2.2 Certification and Distribution Issues 225 9.3 Using Certificates in IKE 227 9.3.1 Exchange of Certificates within IKE 229 9.3.2 Identity Management for ISAKMP: No IP Address, Please! 231 9.4 Further Resources 232 9.5 References 232 9.6 Appendix A PKCS Documents 233 Chapter 10 Latest Authentication Mechanisms, EAP Flavors 235 10.1 Introduction 235 10.1.1 EAP Transport Mechanisms 237 10.1.2 EAP over LAN (EAPOL) 237 10.1.3 EAP over AAA Protocols 238 10.2 Protocol Overview 239 10.3 EAP-XXX 242 10.3.1 EAP-TLS (TLS over EAP) 244 10.3.2 EAP-TTLS 248 10.3.3 EAP-SIM 257 10.4 Use of EAP in 802 Networks 259 10.4.1 802.1X Port-Based Authentication 259 10.4.2 Lightweight Extensible Authentication Protocol (LEAP) 260 10.4.3 PEAP 262 10.5 Further Resources 262 10.6 References 263 Chapter 11 AAA and Identity Management for Mobile Access: The World of Operator Co-Existence 265 11.1 Operator Co-existence and Agreements 265 11.1.1 Implications for the User 266 11.1.2 Implications for the Operators 267 11.1.3 Bilateral Billing and Trust Agreements and AAA Issues 269 11.1.4 Brokered Billing and Trust Agreements 272 11.1.5 Billing and Trust Management through an Alliance 274 11.2 A Practical Example: Liberty Alliance 275 11.2.1 Building the Trust Network: Identity Federation 276 11.2.2 Support for Authentication/Sign On/Sign Off 279 11.2.3 Advantages and Limitations of the Liberty Alliance 282 11.3 IETF Procedures 283 11.4 Further Resources 285 11.5 References 285 Index 287
£91.76
John Wiley & Sons Inc GSM Architecture Protocols and Services
Book SynopsisA comprehensive updated overview on the current status and future of GSM. Fills the need for a revised edition that covers the advances made in the technology in this time. Focuses on recent developments in high speed circuit switched data service (HSCD), enhanced data rates for GSM revolution (EDGE) technologies and new services e.g.Table of ContentsPreface. 1. Introduction. 1.1. The idea of unbounded communication. 1.2. The success of GSM. 1.3. Classification of mobile communication systems 1.4. Some history of statistics of GSM. 1.5. Overview of the book. 2. The mobile radio channel and the cellular principle. 2.1. Characteristics of the mobile radio channel. 2.2. Separation of directions and duplex transmission. 2.3. Multiple access. 2.4. Cellular principle. 3. System architecture and addressing. 3.1. System architecture. 3.2. The SIM concept. 3.3. Addressing. 3.4. Registers and subscriber data. 3.5. Network interfaces and configurations. 4. Air interface - physical layer. 4.1. Logical channels. 4.2. Physical channels. 4.3. Synchronization. 4.4. Mapping of logical onto physical channels. 4.5. Radio subsystem link control. 4.6. Channel coding, source coding and speech processing. 4.7. Source coding and speech processing. 4.8. Channel coding. 4.9. Power-up scenario. 5. Protocols. 5.1. Protocols architrecutre planes. 5.2. Protocol architecture of the user plane. 5.3. Protocol architecture of the signaling plane. 5.4. Signaling at the air interface (Um). 5.5. Signaling at the A and Abis interfaces. 5.6. Security-related network functions: authentication and encryption. 5.7. Signaling at the user interface. 6. Roaming an handover. 6.1. Mobile application part interfaces. 6.2. Location registration and location update. 6.3. Connection estalishment and termination. 6.4. Handover. 7. Services. 7.1. Classical GSM services. 7.2. Popular GSM services: SMS and MMS. 7.3. Overviwe of GSM services in Phase 2+. 7.4. Bearer and teleservices of GSM Phase 2+. 7.5. Supplementary services in GSM Phase 2+. 7.6. Service platforms. 7.7. Wireless application protocol. 8. Improved data services in GSM: GPRS, HSCSD and EDGE. 8.1. GPRS. 8.2. HSCSD. 8.3. EDGE. 9. Beyond GSM and MTS: 4G Appendices. A. Data communication and networking. B. Aspects of network operation. C. GSM Addresses. D. List of Acronyms. References. Index.
£89.06
John Wiley & Sons Inc The 3g IP Multimedia Subsystem Ims
Book SynopsisThird edition of this best-selling guide to IMS: fully revised, and updated with brand new material The IMS (IP Multimedia Subsystem) is the technology that merges the Internet with the cellular world. It makes Internet technologies such as the web, email, instant messaging, presence, and videoconferencing available nearly everywhere at any time. The third edition of this bestselling book is fully updated and provides comprehensively expanded content, including new chapters on emergency calls and on Voice Call Continuity (VCC). As well as this, The 3G IP Multimedia Subsystem (IMS) presents updated material including a comprehensive picture of Session Initiation Protocol (SIP) as well as its applicability to IMS. As most of the protocols have been designed in the IETF, this book explains how the IETF developed these protocols and describes how these protocols are used in the IMS architecture. This is an indispensable guide for engineers, programmers, business maTable of ContentsForeword by Stephen Hayes. Foreword by Allison Mankin and Jon Peterson. Preface to the Third Edition. Preface to the Second Edition. Preface to the First Edition. Acknowledgements. Part I Introduction to the IMS. IMS Vision: Where Do We Want to Go? 1.1 The Internet. 1.2 The Cellular World. 1.3 Why do we need the IMS? 1.4 Relation between IMS and non-IMS Services. 2 The History of the IMS Standardization. 2.1 Relations between IMS-related Standardization Bodies. 2.3 Third Generation Partnership Project. 2.4 Third Generation Partnership Project 2. 2.5 IETF-3GPP/3GPP2 Collaboration. 2.6 Open Mobile Alliance. 3 General Principles of the IMS Architecture. 3.1 From Circuit-switched to Packet-switched. 3.2 IMS Requirements. 3.3 Overview of Protocols used in the IMS. 3.4 Overview of IMS Architecture. 3.5 Identification in the IMS. 3.6 SIM, USIM, and ISIM in 3GPP. 3.7 Next Generation Networks (NGN). Part II The Signaling Plane in the IMS. 4 Session Control on the Internet. 4.1 SIP Functionality. 4.2 SIP Entities. 4.3 Message Format. 4.4 The Start Line in SIP Responses: the Status Line. 4.5 The Start Line in SIP Requests: the Request Line. 4.6 Header Fields. 4.7 Message Body. 4.8 SIP Transactions. 4.9 Message Flow for Session Establishment. 4.10 SIP Dialogs. 4.11 Extending SIP. 4.12 Caller Preferences and User Agent Capabilities. 4.13 Reliability of Provisional Responses. 4.14 Preconditions. 4.15 Event Notification. 4.16 Signaling Compression. 4.17 Content Indirection. 4.18 The REFER Method. 4.19 Globally Routable User- Agent URIs (GRUU). 4.20 NAT Traversal. 5 Session Control in the IMS. 5.1 Prerequisites for Operation in the IMS. 5.2 IPv4 and IPv6 in the IMS. 5.3 IP Connectivity Access Network. 5.4 P-CSCF Discovery. 5.5 IMS-level Registration. 5.6 Subscription to the reg Event State. 5.7 Basic Session Setup. 5.8 Application Servers: Providing Services to Users. 5.9 Changes due to Next Generation Networks (NGN). 5.10 Interworking. 5.11 Combinational Services. 5.12 Basic Sessions not Requiring Resource Reservation. 5.13 Globally Routable User-Agent URI (GRUU) in IMS. 5.14 IMS Communication Services Identification (ICSI). 5.15 IMS Application Reference Identifier (IARI). 5.16 NAT Traversal in the IMS. 6 AAA on the Internet. 6.1 Authentication, Authorization, and Accounting. 6.2 AAA Framework on the Internet. 6.3 The Diameter Protocol. 7 AAA in the IMS. 7.1 Authentication and Authorization in the IMS. 7.2 he Cx and Dx Interfaces. 7.3 The Sh Interface. 7.4 Accounting. 8 Policy and Charging Control in the IMS. 8.1 PCC Architecture. 8.2 Charging Architecture. 8.3 Offline Charging Architecture. 8.4 Online Charging Architecture. 9 Quality of Service on the Internet. 9.1 Integrated Services. 9.2 Differentiated Services. 10 Quality of Service in the IMS. 10.1 Policy Control and QoS. 10.2 Instructions to Perform Resource Reservations. 10.3 Reservations by the Terminals. 10.4 QoS in the Network. 11 Security on the Internet. 11.1 HTTP Digest Access Authentication. 11.2 Certificates. 11.3 TLS. 11.4 S/MIME. 11.5 Authenticated Identity Body. 11.6 IPsec. 11.7 Privacy. 11.8 Encrypting Media Streams. 12 Security in the IMS. 12.1 Access Security. 12.2 Network Security. 13 Emergency Calls on the Internet. 13.1 Introduction. 13.2 Location Acquisition. 13.3 Identifying Emergency Calls. 13.4 Locating the closest PSAP. 14 Emergency Calls in the IMS. 14.1 Architecture for Supporting Emergency Calls in IMS. 14.2 Establishing an Emergency Call in IMS. 14.3 IMS Registration for Emergency Calls. 14.4 Call back from PSAP to user. 14.5 Anonymous calls. 14.6 Emergency Calls in Fixed Broadband Accesses. Part III The Media Plane in the IMS. 15 Media Encoding. 15.1 Speech Encoding. 15.2 Video Encoding. 15.3 Text Encoding. 15.4 Mandatory Codecs in the IMS. 16 Media Transport. 16.1 Reliable Media Transport. 16.2 Unreliable Media Transport. 16.3 Media Transport in the IMS. Part IV Building Services with the IMS. 17 Service Configuration on the Internet. 17.1 The XML Configuration Access Protocol (XCAP). 17.2 An Overview of XML. 17.3 HTTP URIs that Identify XCAP Resources. 17.4 XCAP operations. 17.5 Entity Tags and Conditional Operations. 17.6 Subscriptions to Changes in XML Documents. 17.7 XML Patch Operations. 18 Service Configuration in the IMS. 18.1 XDM architecture. 18.2 Downloading an XML document, attribute, or element. 18.3 Directory Retrieval. 18.4 Data Search with XDM. 18.5 Subscribing to Changes in XML Documents. 19 The Presence Service on the Internet. 19.1 Overview of the Presence Service. 19.2 The Presence Life Cycle. 19.3 Presence Subscriptions and Notifications. 19.4 Presence Publication. 19.5 Presence Information Data Format (PIDF). 19.6 The Presence Data Model for SIP. 19.7 Mapping the SIP Presence Data Model to the PIDF. 19.8 Rich Presence Information Data Format. 19.9 CIPID. 19.10 Timed Presence Extension to the PIDF. 19.11 Presence Capabilities. 19.12 Geographical Location in Presence. 19.13 Watcher Information. 19.14 Watcher Authorization: Presence Authorization Rules. 19.15 URI-list Services and Resource Lists. 19.16 Presence Optimizations. 20 The Presence Service in the IMS. 20.1 The Foundation of Services. 20.2 Presence Architecture in the IMS. 20.3 Presence Publication. 20.4 Watcher Subscription. 20.5 Watcher Information and Authorization of Watchers. 20.6 Presence Optimizations. 20.7 OMA extensions to PIDF. 21 Instant Messaging on the Internet. 21.1 The im URI. 21.2 Modes of Instant Messages. 21.3 Pager-mode Instant Messaging. 21.4 Session-based Instant Messaging. 21.5 The “isComposing” Indication. 21.6 Messaging Multiple Parties. 21.7 File Transfer. 22 The Instant Messaging Service in the IMS. 22.1 Pager-mode Instant Messaging in the IMS. 22.2 Pager-mode Instant Messaging to Multiple Recipients. 22.3 Session-based Instant Messaging in the IMS. 22.4 File Transfer. 23 Conferencing on the Internet. 23.1 Conferencing Standardization at the IETF. 23.2 The SIPPING Conferencing Framework. 23.3 The XCON Conferencing Framework. 23.4 The Binary Floor Control Protocol (BFCP). 24 Conferencing in the IMS. 24.1 The IMS Conferencing Service. 24.2 Relation with the work in TISPAN and OMA. 25 Push-to-Talk over Cellular. 25.1 PoC Standardization. 25.2 IETF Work Relevant to PoC. 25.3 Architecture. 25.4 Registration. 25.5 PoC Server Roles. 25.6 PoC Session Types. 25.7 Adding Users to a PoC Session. 25.8 Group Advertisements. 25.9 Session Establishment Types. 25.10 Answer Modes. 25.11 Right-to-send-media Indication Types. 25.12 Participant Information. 25.13 Barring and Instant Personal Alerts. 25.14 Full Duplex Call Follow on. 25.15 The User Plane. 25.16 Simultaneous PoC Sessions. 25.17 Charging in PoC. 26 Multimedia Telephony Services: PSTN/ISDN Simulation Services. 26.1 Providing Audible Announcements. 26.2 Communication Diversion (CDIV). 26.3 Communication Diversion Notification (CDIVN). 26.4 Conference (CONF). 26.5 Message Waiting Indication (MWI). 26.6 OIP and OIR. 26.7 TIP and TIR. 26.8 ACRACR and CB. 26.9 Advice of Charge (AoC). 26.10 CCBS and CCNR. 26.11 Malicious Communication Identification (MCID). 26.12 Communication Hold (HOLD). 26.13 Explicit Communication Transfer (ECT). 26.14 User Settings in PSTN/ISDN Simulation Services. 27 Voice Call Continuity (VCC). 27.1 Overview of Voice Call Continuity. 27.2 VCC architecture. 27.3 Registration. 27.4 Call origination and anchoring. 27.5 Call termination and anchoring. 27.6 Domain Transfer. Appendix A List of IMS-related Specifications. A.1 Introduction. A.2 3GPP Specifications. A.3 ETSI NGN Specifications. A.4 OMA Specifications. References. Index.
£91.76
John Wiley & Sons Inc IP Telephony
Book SynopsisAll you need to know about deploying VoIP protocols in one comprehensive and highly practical reference - Now updated with coverage on SIP and the IMS infrastructure This book provides a comprehensive and practical overview of the technology behind Internet Telephony (IP), providing essential information to Network Engineers, Designers, and Managers who need to understand the protocols. Furthermore, the author explores the issues involved in the migration of existing telephony infrastructure to an IP - based real time communication service. Assuming a working knowledge of IP and networking, it addresses the technical aspects of real-time applications over IP. Drawing on his extensive research and practical development experience in VoIP from its earliest stages, the author provides an accessible reference to all the relevant standards and cutting-edge techniques in a single resource. Key Features: Updated with a chapter on SIP and theTrade Review Table of ContentsContents Abbreviations Glossary Preface 1 Voice over multimedia 1.1Transporting voice, fax and video over a packet network 1.2Encoding media streams 2 H.323: Packet-based Multimedia Communications Systems 2.1 Introduction 2.2 H.323 step by step 2.3 Optimizing and enhancing H.323 2.4 Conferencing with H.323 2.5 Directories and numbering 2.6 H.323 security 2.7 Supplementary services 2.8Future work on H.323 3 Session Initiation Protocol 3.1. The origin and purpose of SIP 3.2. From RFC 2543 To RFC 3261 3.3. Overview of a simple SIP call 3.4. Call handling services with SIP 3.5. SIP security 3.6. Instant messaging (IM) and presence 4 The 3GPP IP Multimedia Subsystem (IMS) architecture 4.1. Introduction 4.2. Overview of the IMS architecture 4.3. The IMS CSCFs 4.4. The full picture : 3GPP release 8, TISPAN 5 The Media Gateway to Media Controller Protocol (MGCP) 5.1Introduction:why MGCP? 5.2 MGCP 1.0 5.3 Sample MGCP call flows 5.4 The future of MGCP 6 Advanced Topics: Call Redirection 6.1CallredirectioninVoIPnetworks 7 Advanced Topics: NAT Traversal 7.1 Introduction to Network AddressTranslation343 7.2 Workarounds for VoIP when the network cannot be controlled 7.3 Recommended network design for service providers 7.4 Conclusion Index
£78.80
John Wiley & Sons Inc Radio Access Networks for UMTS Principles and
Book SynopsisProvides a detailed description of the Radio Access Network for UMTS (3G). Focuses on the subjects most relevant to today's network deployments, including HSDPA, HSUPA and the Iub transport network. Combines the protocol stack with signalling flows and network planning guidelines to provide a comprehensive treatment of the RAN for UMTS.Table of ContentsPreface. Acknowledgements. Abbreviations. 1 INTRODUCTION. 1.1 NETWORK ARCHITECTURE. 1.2 RADIO ACCESS TECHNOLOGY. 1.3 STANDARDISATION. 2 FLOW OF DATA. 2.1 RADIO INTERFACE PROTOCOL STACKS. 2.2 RRC LAYER. 2.3 RLC LAYER. 2.4 MAC LAYER. 2.5 FRAME PROTOCOL LAYER. 2.6 PHYSICAL LAYER. 3 CHANNEL TYPES. 3.1 LOGICAL CHANNELS. 3.2 TRANSPORT CHANNELS. 3.3 PHYSICAL CHANNELS. 4 NON-ACCESS STRATUM. 4.1 CONCEPTS. 4.2 MOBILITY MANAGEMENT. 4.3 CONNECTION MANAGEMENT. 4.4 PLMN SELECTION. 5 IUB TRANSPORT NETWORK. 5.1 PROTOCOL STACKS. 5.2 ARCHITECTURE. 5.3 OVERHEADS. 5.4 SERVICE CATEGORIES. 6 HSDPA. 6.1 CONCEPT. 6.2 HSDPA BIT RATES. 6.3 PDCP LAYER. 6.4 RLC LAYER. 6.5 MAC-D ENTITY. 6.6 FRAME PROTOCOL LAYER. 6.7 IUB TRANSPORT. 6.8 MAC-HS ENTITY. 6.9 PHYSICAL CHANNELS. 6.10 MOBILITY. 7. HSUPA. 7.1 CONCEPT. 7.2 HSUPA BIT RATES. 7.3 PDCP LAYER. 7.4 RLC LAYER. 7.5 MAC-D ENTITY. 7.6 MAC-ES/E ENTITY (UE). 7.7 PHYSICAL CHANNELS. 7.8 MAC-E ENTITY (NODE B). 7.9 FRAME PROTOCOL LAYER. 7.10 MAC-ES ENTITY (RNC). 7.11 MOBILITY. 8 SIGNALING PROCEDURES. 8.1 RRC CONNECTION ESTABLISHMENT. 8.2 SPEECH CALL CONNECTION ESTABLISHMENT. 8.3 VIDEO CALL CONNECTION ESTABLISHMENT. 8.4 SHORT MESSAGE SERVICE (SMS). 8.5 PS DATA CONNECTION ESTABLISHMENT. 8.6 SOFT HANDOVER. 8.7 INTER-SYSTEM HANDOVER. 9 PLANNING. 9.1 LINK BUDGETS. 9.2 RADIO NETWORK PLANNING. 9.3 SCRAMBLING CODE PLANNING. 9.4 NEIGHBOUR PLANNING. 9.5 ANTENNA SUB-SYSTEMS. 9.6 CO-SITING. 9.7 MICROCELLS. 9.8 INDOOR SOLUTIONS. 10 REFERENCES. Index
£104.36
John Wiley & Sons Inc Radio Technologies and Concepts for IMTAdvanced
Book SynopsisRadio Technologies and Concepts for IMT-Advanced presents the findings of the Wireless World Initiative New Radio (WINNER) project, a discussion of future consumer expectations and requirements.Table of ContentsAbout the Editors. Preface. Acknowledgements. Abbreviations. List of Contributors. 1 Introduction. 1.1 Development and Status of Mobile and Wireless Communications. 1.2 Expectations of Data Traffic Growth. 1.3 Development Towards IMT-Advanced. 1.4 Global Research Activities. 1.5 WINNER Project. 1.6 Future Work. References. 2 Usage Scenarios and Technical Requirements. 2.1 Introduction. 2.2 Key Scenario Elements. 2.3 Service Classes and Service Requirements. 2.4 Requirements for System Capabilities. 2.5 Terminal Requirements. 2.6 Performance Requirements. 2.7 Spectrum Requirements. 2.8 Dependency of Requirements. 2.9 Conclusion. Acknowledgements. References. 3 WINNER II Channel Models. 3.1 Introduction. 3.2 Modelling Considerations. 3.3 Channel-Modelling Approach. 3.4 Channel Models and Parameters. 3.5 Channel Model Usage. 3.6 Conclusion. Acknowledgements. References. 4 System Concept and Architecture. 4.1 Introduction. 4.2 Design Principles and Main Characteristics. 4.3 Logical Node Architecture. 4.4 Protocol and Service Architecture. 4.5 Conclusion. Acknowledgements. References. 5 Modulation and Coding Techniques. 5.1 Introduction. 5.2 Basic Modulation and Coding Scheme. 5.3 Coding Schemes. 5.4 Link Adaptation. 5.5 Link Level Aspects of H-ARQ. 5.6 Conclusions. References. 6 Link Level Procedures. 6.1 Introduction. 6.2 Pilot Design. 6.3 Channel Estimation. 6.4 Radio Frequency Impairments. 6.5 Measurements and Signalling. 6.6 Link Level Synchronisation. 6.7 Network Synchronisation. 6.8 Conclusion. Acknowledgements. References. 7 Advanced Antennas Concept for 4G. 7.1 Introduction. 7.2 Multiple Antennas Concept. 7.3 Spatial Adaptation. 7.4 Spatial Schemes. 7.5 Interference Mitigation. 7.6 Pilots, Feedback and Measurements. 7.7 MIMO Aspects in Relaying. 7.8 Conclusion. Acknowledgements. References. 8 Layer-2 Relays for IMT-Advanced Cellular Networks. 8.1 Introduction. 8.2 Motivation for Layer-2 Relays and Prior Work. 8.3 Relay-based Deployments. 8.4 Design Choices for Relay-based Cellular Networks. 8.5 System and Network Aspects. 8.6 System-level Performance Evaluation. 8.7 Conclusion. Acknowledgements. References. 9 Multiple Access Schemes and Inter-cell Interference Mitigation Techniques. 9.1 Introduction. 9.2 Multiple Access Schemes. 9.3 Inter-cell Interference Mitigation Schemes. 9.4 Conclusion. Acknowledgements. References. 10 Radio Resource Control and System Level Functions. 10.1 Introduction. 10.2 IPCL Layer. 10.3 Radio Resource Control. 10.4 Centralised, Distributed and Hybrid RRM Architecture. 10.5 System-Level Performance Results. 10.6 Conclusion. Acknowledgements. References. 11 Sharing and Flexible Spectrum Use Capabilities. 11.1 Introduction. 11.2 Spectrum Technologies Framework. 11.3 Detailed Design of a Spectrum Assignment Negotiation Mechanism. 11.4 Spectrum Assignment Enabling Mechanisms. 11.5 WINNER Sharing with FSS. 11.6 Performance Evaluation of Spectrum Assignment Mechanisms. 11.7 Conclusion. Acknowledgements. References. 12 ITU-R Spectrum Demand Calculation for IMT-Advanced. 12.1 Introduction. 12.2 ITU-R Work on Spectrum Requirements of IMT-Advanced. 12.3 ITU-R Spectrum Calculation Methodology. 12.4 Software Implementation of Methodology. 12.5 Estimated Spectrum Requirements of IMT-Advanced. 12.6 Conclusion. Acknowledgements. References. 13 System Model, Test Scenarios, and Performance Evaluation. 13.1 Introduction. 13.2 Performance Assessment of Wireless Networks. 13.3 Interface between Link and System Simulations. 13.4 Test Scenarios. 13.5 Spectral Efficiency and Number of Satisfied Users under QoS Constraints. 13.6 End-to-End Performance Evaluation. 13.7 Conclusion. Acknowledgements. References. 14 Cost Assessment and Optimisation for WINNER Deployments. 14.1 Introduction. 14.2 Cost Assessment Framework and Assumptions. 14.3 Cost Components. 14.4 Cost Assessment Models. 14.5 Reference Deployment Scenarios and Cost Assessments. 14.6 Conclusion. Acknowledgements. References. Index.
£124.40
John Wiley & Sons Inc Wireless Multimedia
Book SynopsisWireless Multimedia: A Handbook to the IEEE 802.15.3 Standard clarifies the IEEE 802.15.3 standard for individuals who are implementing compliant devices and shows how the standard can be used to develop wireless multimedia applications. The 802.15.3 standard addresses an untapped market that does beyond 802.11 and Bluetooth wireless technologies. The standard addresses the consumer need for low-cost, high data-rate, ad-hoc wireless connections. Some of these applications include: wireless keyboards and printers, personal video and digital cameras, cordless telephones and intercoms, digital audio players and headphones, gaming (including interactive gaming, multiplayer consoles, handheld multiplayer gaming, digital music, video, and image uploads to handheld games), home theater system and stereo system components, video conferencing, and more! Navigating through the IEEE 802.15.3 standard to find the required information can be a difficult task for anyone who has not spent a coTable of ContentsIntroduction xv Acronyms and Abbreviations xvii Chapter 1 Background and History 1 What is an IEEE standard? 1 The 802.15 family 2 Why 802.15.3? 4 History of 802.15.3 6 Chapter 2 802.15.3 applications 13 The high-rate WPAN theme 13 Still image applications 14 Telephone quality audio applications 16 High quality audio applications 17 Gaming applications 18 Video and multimedia applications 19 Chapter 3 Overview of the IEEE 802.15.3 standard 23 Elements of the 802.15.3 piconet 25 PHY overview 28 Starting a piconet 31 The superframe 32 Joining and leaving a piconet 34 Connecting with other devices 35 Dependent piconets 36 Obtaining information 39 Power management 40 System changes 43 Implementation cost and complexity 44 Chapter 4 MAC functionality 47 MAC terminology in IEEE Std 802.15.3 47 Frame formats 49 Piconet timing and superframe structure 51 Interframe spacings 53 Contention access period (CAP) 55 Channel time allocation period (CTAP) 56 Comparing the contention access methods 60 Guard time 63 The role of the PNC 66 Starting a piconet 66 Handing over control 66 Ending a piconet 72 Joining and leaving the piconet 73 Association 74 Broadcasting piconet information 77 Disassociation 78 Assigning DEVIDs 80 Managing bandwidth 81 Acknowledgements 81 Asynchronous data 87 Stream connections 92 Fragmentation/defragmentation 96 Retransmissions and duplicate detection 99 Power management 100 Common characteristics of the SPS modes 104 Analyzing power save efficiencies 107 Switching PM modes 110 Managing SPS sets 114 DSPS mode 118 Allocating channel time for DSPS DEVs 119 PSPS mode 124 APS mode 126 Changing piconet parameters 128 Beacon announcements 129 Dynamic channel selection 132 Changing the PNID or BSID 134 Moving the beacon or changing the superframe duration 136 Finding information 138 Probe 139 Announce 143 PNC Information 145 Channel status 148 PNC channel scanning 150 Remote scan 152 Piconet services 154 Other capabilities 157 Transmit power control 157 Multirate capabilities 159 Extensibility of the standard 160 Example of the life cycle of a DEV 162 Chapter 5 Dependent piconets 165 Introduction 165 Starting a dependent piconet 168 Parent PNC ceasing operations with dependent piconets 174 Parent PNC stopping a dependent piconet 176 Handing over PNC responsibilities in a dependent piconet 177 Chapter 6 Security 187 Introduction and history 187 Security modes and policies 190 Security services provided in mode 1 191 Security policies 193 Symmetric key security suite 195 Overview of AES CCM 195 Key distribution 197 Security information 199 Chapter 7 2.4 GHz PHY 203 Overview 203 General PHY requirements 205 Channel plan 205 Timing issues 206 Miscellaneous PHY requirements 213 PHY frame format 213 Stuff bits and tail symbols 214 Frame format 215 PHY preamble 217 Data size restrictions 219 Modulation 220 Receiver performance 224 Transmitter performance 228 Regulatory and requirements 233 Delay spread performance 234 Mitigating the effects of delay spread 236 Fading channel model used for 802.15.3 237 Defining delay spread performance 239 Delay spread measurements 240 Radio architectures 244 Superheterodyne 245 Direct conversion 248 Walking IF 250 Low IF 253 Summary of radio architectures 256 Chapter 8 2.4 Interfacing to 802.15.3 257 The PIBs and their interface 261 MLME SAP 262 PLME SAP 265 MAC SAP 265 PHY SAP 266 The FCSL 268 Chapter 9 2.4 Coexistence mechanisms 271 Introduction 271 Coexistence techniques in 802.15.3 271 Passive scanning 273 The ability to request channel quality information 273 Dynamic channel selection 273 Link quality and RSSI 274 Channel plan that minimizes channel overlap 274 Transmit power control 275 Lower impact transmit spectral mask 275 Neighbor piconet capability 276 Coexistence results 278 Assumptions for coexistence simulations 278 BER calculations 280 802.11b and 802.15.3 282 802.15.1 and 802.11 FHSS overlapping with 802.15.3 288 Summary 291 References 295 Glossary 299 Index 305
£61.16
Rlpg/Galleys Communication and Control
Book SynopsisCommunication and Control: Tools, Systems, and New Dimensions advocates a systems view of human communication in a time of intelligent, learning machines. This edited collection sheds new light on things as mundane yet still profoundly consequential (and seemingly low-tech) as push buttons, pagers, and telemarketing systems. Contributors also investigate aspects of remote control related to education, organizational design, artificial intelligence, cyberwarfare, drones, and even binge-watching on Netflix. In line with a systems view, the collection takes up a media ecological view. This work will be of interest to students, scholars, and researchers in communication, new media, and technology.Trade ReviewThe shift from analog to digital is about much more than efficiency, precision, and progress. As MacDougall points out, it is a dramatic shift in what it is to be human and how we relate to the world. Computers are enveloping areas of expertise that were once the sole domain of human creativity and are transforming the relationship of humans to those domains. Such a shift is difficult to see and discuss, but MacDougall gets the conversation started. -- Michael Wesch, Kansas State UniversityAlmost no part of life stays untouched by technology and media. Yet our everyday understanding of technological systems, media dynamics, and data networks is still relatively low-key in comparison. This powerful collection of essays comes to offer timely guidance by creatively and critically mapping the media ecologies of a rich array of systems, networks, and fields. A must-read for anyone who wants to probe the extent to which “control” controls. -- Yoni Van Den Eede, Free University of BrusselsMacDougall has assembled a satisfying spectrum of voices to track how the pulsing, global spray of electrons we stubbornly call "media" continues to transform us. From theory to case study, Communication and Control is truly cutting-edge stuff that will put you in the feedback loop. -- Roger Stahl, University of GeorgiaThis fine edited volume covers a broad spectrum of theoretical and applied topics. For the theorist, there are stimulating reinterpretations of Norbert Wiener and Marshall McLuhan. For those more intrigued by case studies, behold the chapters on push buttons, pagers, call centers, and chatbots. By consolidating so much varied work on emerging communication systems, this collection does exactly what a good anthology is supposed to do. -- Graham Harman, Southern California Institute of ArchitectureTable of ContentsChapter 1: A Brief History of Communication and Control in Humans and Machines. Robert C. MacDougall Chapter 2: Four Dimensions of Control. Robert C. MacDougall Chapter 3: Panic Button: Thinking Historically about Danger, Interfaces, and Control-at-a-Distance. Rachel Plotnick Chapter 4: A Waiting Room Without Walls: Paging, Pagers, and the Future of Mobile Communication. Benjamin Morton Chapter 5: Chained to the Dialer, or Frederick Taylor Reaches Out and Touches Someone Brett Lunceford Chapter 6: Chatbots in the Metropolis: Turing and the Communicative Labor of the Multitude Kevin Cummings and Cameron Kunzelman Chapter 7: Remote Control from the C-Suite: Chief Knowledge Officers, Chief Learning Officers, and Globalized Corporate Noopower. Robert Gehl Chapter 8: So Many Choices, So Little Choice: Streaming media, artificial intelligence, and the Illusion of Control. Matthew Pittman and Ryan Eanes Chapter 9: Educational Policy and Political Action as Mechanisms of Remote Control. Zeke Kimball and Karla Loya Chapter 10: Mobile geospatial search and the limits of knowledge: linking application design and use in time and space. Jim Thatcher Chapter 11: Reflections on the Nature of Organization, Control and Resilience in Sociotechnical Systems. Vincenzo DeFlorio Chapter 12: Mediascape as Battlefield: Infrastructure Convergence and Smart War. Kathleen Oswald Chapter 13: Remotely Piloted Vehicles, Ubiquitous Networks, and new manifestations of Control in Open Society National Security Environments. R.E. Burnett Chapter 14: Remotely Human: The ‘Remote-Me’ and the Emergence of the Companion-Head. Madhusudan Raman
£88.20
Institute of Physics Publishing RFMEMS Technology for HighPerformance Passives
Book SynopsisThis book discusses, in practical terms and with anhands-on approach, the exploitation of Microsystem (MEMS) technology for RadioFrequency (RF) passive components, i.e. RF-MEMS, in the field of 5G and futurenetworks (e.g., 6G). The book will find a wider readership as itcrosses into the translational aspects of applied research in the subject.
£108.00
IOP Publishing RFMEMS Technology for HighPerformance Passives
Book Synopsis
£23.75
Scarecrow Press The Book Stops Here
Book SynopsisBookmobiles have become popular again, and this anthologythe first monograph on bookmobiles to be published in over 25 yearsexplains whyas well as the what, where, when, and how of successful mobile library programs. Thirty-six experienced authors share their insight and ideas in this valuable and practical guide. The book is divided into four sections: ''In Defense of Bookmobiles;'' ''Mobile Services Administration;'' vehicles and equipment; and services to special populations. Contributors include John Philip, Carol Hole, Russ Topping, Eric Anderson, Bernard Vavrek, and Judith and Bert Boyce. Catherine Suyak Alloway is Director of Access and Information Services, St. Louis Public Library.Trade Review...a vital source for outreach librarians and library administrators... * Rq *Especially interesting are the detailed chapters on administration and vehicles...gives librarians considering a bookmobile service a solid basis to begin their education. * Library Journal *...fills a void in library outreach literature. * Teacher Librarian *...recommended for all professional collections... * Public Library Quarterly *...informative and at times entertaining...a very worthwhile addition to any librarian's collection. * Australian Library Journal *...outstanding descriptions of the continuing commitment to the best possible library service that so many librarians have. * Wilson Library Bulletin *We highly recommend this comprehensive study of bookmobiles. * Mediamobiles *
£67.50
Rowman & Littlefield Going Mobile
Book SynopsisThe world is going mobile at an astounding pace. Estimates show 80 percent of global Internet access will take place through mobile devices by 2016. Smartphones, tablets, and handheld devices have reshaped communications, the global economy, and the very way in which we live. The revolution is an electronic nirvana: for the first time in human history we have sophisticated digital applications to help us learn, access financial and health care records, connect with others, and build businesses. But the one trillion dollar mobile industry is still relatively young. Leaders in both the public and private sectors need to figure out how to apply mobile technologies or mobile devices to optimize education, health care, public safety, disaster preparedness, and economic development. And the ever-expanding mobile frontier presents new challenges to law, policy, and regulations and introduces new tensions; one person''s idea of cautious deliberation can be another''s idea of a barrier
£23.75
Duke University Press The Undersea Network
Book SynopsisNicole Starosielski examines undersea communication cable network, bringing it to the surface of media scholarship and making visible the "wireless" network's materiality. She argues that the network is inextricably linked to historical and political factors and that it is precarious, rural, aquatic, territorially entrench and semi-centralized.Trade Review“Starosielski offers a crucial intervention into theoretical conceptualizations of communications infrastructure. . . . This rich text also has profound implications for how citizens in an always-networked society and economy understand our lived realities. The Undersea Network makes us reconsider the ‘wirelessness’ of our world by admonishing us consider it in terms of its peculiar and ongoing connectedness to geographies, cultures, and politics.” -- Sara Rodrigues * PopMatters *“[A] fascinating book that is part history, part travelogue and part socio-economic memoir. . . . Starosielski’s account makes for fascinating reading, drawing together the varied threads of history, technical complexity, economic power and political will that have shaped the world’s cable networks. Despite the scale of the infrastructure under discussion, the narrative remains intensely personal, and one to be enjoyed." -- John Gilbey * Times Higher Education *“The Undersea Network is a fascinating interdisciplinary look at the infrastructure that lets us communicate instantly across oceans…. [T]his book is a good read for anyone broadly interested in geography or communications.” -- Eva Amsen * Hakai Magazine *“A fascinating cultural assessment of global undersea cable networks that carry most of the world's trans-ocean Internet traffic. … Great stuff!” -- Christopher Sterling * Communication Booknotes Quarterly *"Overall, the book brilliantly brings together the global metanarrative of mass communication with the local, material, and relatively immobile specificities of this undersea network.... Starosielski is extremely successful in rewiring our wireless imaginaries of a networked world. The depth and breadth of the fieldwork conducted is noteworthy as is the production of the book itself, which contains a plethora of images, graphics, and maps." -- Rachael Squire * Transfers *"The multistranded analysis developed in the book provides a rewarding account that blends cultural history with investigative ethnography and along the way takes us to remote sites in Hawaii, Tahiti and Guam. Most importantly, Starosielski brings the infrastructure of undersea cable systems back into visibility, showing us in vivid ways what makes global communications possible." * European Journal of Communication *"The Undersea Network succeeds in introducing an environmental consciousness into one’s imagination of digital networks and the ecological, political, financial, place-based contingencies that support, interfere with and maintain our global telecommunications system. It makes cables salient. ... The Undersea Network is required reading for students of media and network archaeology, communication educators, political and environmental scientists, the history of technology discipline, and readers within the cable industries and government." -- Emily Goodmann * International Journal of Media & Cultural Politics *"If you have ever wondered why infrastructure has suddenly become a buzzword in cultural anthropology and science and technology studies, then follow the signal. That is precisely what The Undersea Network does, brilliantly redeeming the promise of multi-sited fieldwork methods to highlight the connections and disconnection–historical and present-day–among far-flung people and places.... For anyone with an interest in Pacific studies, this book has plenty to ponder." -- Robert J. Foster * Journal of Pacific History *"[A]n enthralling read for anybody with an interest in telecoms infrastructure and the way that it is presented in the media." -- Mike Conradi * Telecommunications Policy *"This is a fascinating and deeply geographical piece of media scholarship.Starosielski’s book is remarkably successful in demonstrating that the unstable materiality of the infrastructures it describes matters in all kinds of sometimes contradictory ways to those who construct these infrastructures, to those they connect, and to those who remain at a distance from their connective capacities." -- Derek P. McCormack * Cultural Geographies *Table of ContentsPreface. Edges ix Acknowledgments xv Introduction. Against Flow 1 1. Circuitous Routes. From Topology to Topography 26 2. Short-Circuiting Discursive Infrastructure: From Connection to Transmission 64 3. Gateway: From Cable Colony to Network Operations Center 94 4. Pressure Point: Turbulent Ecologies of the Cable Landing 138 5. A Network of Islands: Interconnecting the Pacific 170 6. Cabled Depths: The Aquatic Afterlives of Signal Traffic 198 Conclusion. Surfacing 225 Notes 235 Bibliography 263 Index 281
£75.65
Duke University Press The Undersea Network
Book SynopsisIn our 'wireless' world it is easy to take the importance of the undersea cable systems for granted, but the stakes of their successful operation are huge, as they are responsible for carrying almost all transoceanic Internet traffic. In The Undersea Network Nicole Starosielski follows these cables from the ocean depths to their landing zones on the sandy beaches of the South Pacific, bringing them to the surface of media scholarship and making visible the materiality of the wired network. In doing so, she charts the cable network''s cultural, historical, geographic and environmental dimensions. Starosielski argues that the environments the cables occupy are historical and political realms, where the network and the connections it enables are made possible by the deliberate negotiation and manipulation of technology, culture, politics and geography. Accompanying the book is an interactive digital mapping project, where readers can trace Trade Review“Starosielski offers a crucial intervention into theoretical conceptualizations of communications infrastructure. . . . This rich text also has profound implications for how citizens in an always-networked society and economy understand our lived realities. The Undersea Network makes us reconsider the ‘wirelessness’ of our world by admonishing us consider it in terms of its peculiar and ongoing connectedness to geographies, cultures, and politics.” -- Sara Rodrigues * PopMatters *“[A] fascinating book that is part history, part travelogue and part socio-economic memoir. . . . Starosielski’s account makes for fascinating reading, drawing together the varied threads of history, technical complexity, economic power and political will that have shaped the world’s cable networks. Despite the scale of the infrastructure under discussion, the narrative remains intensely personal, and one to be enjoyed." -- John Gilbey * Times Higher Education *“The Undersea Network is a fascinating interdisciplinary look at the infrastructure that lets us communicate instantly across oceans…. [T]his book is a good read for anyone broadly interested in geography or communications.” -- Eva Amsen * Hakai Magazine *“A fascinating cultural assessment of global undersea cable networks that carry most of the world's trans-ocean Internet traffic. … Great stuff!” -- Christopher Sterling * Communication Booknotes Quarterly *"Overall, the book brilliantly brings together the global metanarrative of mass communication with the local, material, and relatively immobile specificities of this undersea network.... Starosielski is extremely successful in rewiring our wireless imaginaries of a networked world. The depth and breadth of the fieldwork conducted is noteworthy as is the production of the book itself, which contains a plethora of images, graphics, and maps." -- Rachael Squire * Transfers *"The multistranded analysis developed in the book provides a rewarding account that blends cultural history with investigative ethnography and along the way takes us to remote sites in Hawaii, Tahiti and Guam. Most importantly, Starosielski brings the infrastructure of undersea cable systems back into visibility, showing us in vivid ways what makes global communications possible." * European Journal of Communication *"The Undersea Network succeeds in introducing an environmental consciousness into one’s imagination of digital networks and the ecological, political, financial, place-based contingencies that support, interfere with and maintain our global telecommunications system. It makes cables salient. ... The Undersea Network is required reading for students of media and network archaeology, communication educators, political and environmental scientists, the history of technology discipline, and readers within the cable industries and government." -- Emily Goodmann * International Journal of Media & Cultural Politics *"If you have ever wondered why infrastructure has suddenly become a buzzword in cultural anthropology and science and technology studies, then follow the signal. That is precisely what The Undersea Network does, brilliantly redeeming the promise of multi-sited fieldwork methods to highlight the connections and disconnection–historical and present-day–among far-flung people and places.... For anyone with an interest in Pacific studies, this book has plenty to ponder." -- Robert J. Foster * Journal of Pacific History *"[A]n enthralling read for anybody with an interest in telecoms infrastructure and the way that it is presented in the media." -- Mike Conradi * Telecommunications Policy *"This is a fascinating and deeply geographical piece of media scholarship.Starosielski’s book is remarkably successful in demonstrating that the unstable materiality of the infrastructures it describes matters in all kinds of sometimes contradictory ways to those who construct these infrastructures, to those they connect, and to those who remain at a distance from their connective capacities." -- Derek P. McCormack * Cultural Geographies *Table of ContentsPreface. Edges ix Acknowledgments xv Introduction. Against Flow 1 1. Circuitous Routes. From Topology to Topography 26 2. Short-Circuiting Discursive Infrastructure: From Connection to Transmission 64 3. Gateway: From Cable Colony to Network Operations Center 94 4. Pressure Point: Turbulent Ecologies of the Cable Landing 138 5. A Network of Islands: Interconnecting the Pacific 170 6. Cabled Depths: The Aquatic Afterlives of Signal Traffic 198 Conclusion. Surfacing 225 Notes 235 Bibliography 263 Index 281
£20.69
£11.64
Strathclyde Academic Media Software Defined Radio using MATLAB Simulink and the RTLSDR
£52.25
John Wiley & Sons Inc LTE Security
Book SynopsisThis book explains in detail the security mechanisms employed in LTE and gives an overview of the ones in GSM and 3G, which LTE security substantially extends.Table of ContentsPreface xiii Foreword to the First Edition xv Acknowledgements xix Copyright Acknowledgements xix 1 Overview of the Book 1 2 Background 5 2.1 Evolution of Cellular Systems 5 2.2 Basic Security Concepts 10 2.3 Basic Cryptographic Concepts 13 2.4 Introduction to LTE Standardization 21 2.5 Notes on Terminology and Specification Language 26 3 GSM Security 29 3.1 Principles of GSM Security 29 3.2 The Role of the SIM 30 3.3 Mechanisms of GSM Security 31 3.4 GSM Cryptographic Algorithms 34 4 Third-Generation Security (UMTS) 37 4.1 Principles of Third-Generation (3G) Security 37 4.2 Third-Generation Security Mechanisms 40 4.3 Third-Generation Cryptographic Algorithms 49 4.4 Interworking between GSM and 3G Security 55 4.5 Network Domain Security 59 4.6 Architectures with RNCs in Exposed Locations 65 5 3G–WLAN Interworking 67 5.1 Principles of 3G–WLAN Interworking 67 5.2 Security Mechanisms of 3G–WLAN Interworking 75 5.3 Cryptographic Algorithms for 3G–WLAN Interworking 81 6 EPS Security Architecture 83 6.1 Overview and Relevant Specifications 83 6.2 Requirements and Features of EPS Security 89 6.3 Design Decisions for EPS Security 97 6.4 Platform Security for Base Stations 103 7 EPS Authentication and Key Agreement 109 7.1 Identification 109 7.2 The EPS Authentication and Key Agreement Procedure 112 7.3 Key Hierarchy 123 7.4 Security Contexts 129 8 EPS Protection for Signalling and User Data 133 8.1 Security Algorithms Negotiation 133 8.2 NAS Signalling Protection 136 8.3 AS Signalling and User Data Protection 138 8.4 Security on Network Interfaces 141 8.5 Certificate Enrolment for Base Stations 143 8.6 Emergency Call Handling 151 9 Security in Intra-LTE State Transitions and Mobility 155 9.1 Transitions to and from Registered State 156 9.2 Transitions between Idle and Connected States 157 9.3 Idle State Mobility 158 9.4 Handover 161 9.5 Key Change on the Fly 169 9.6 Periodic Local Authentication Procedure 170 9.7 Concurrent Run of Security Procedures 171 10 EPS Cryptographic Algorithms 175 10.1 Null Algorithms 176 10.2 Ciphering Algorithms 177 10.3 Integrity Algorithms 180 10.4 Key Derivation Algorithms 180 11 Interworking Security between EPS and Other Systems 183 11.1 Interworking with GSM and 3G Networks 183 11.2 Interworking with Non-3GPP Networks 193 12 Security for Voice over LTE 215 12.1 Methods for Providing Voice over LTE 215 12.2 Security Mechanisms for Voice over LTE 220 12.3 Rich Communication Suite and Voice over LTE 230 13 Security for Home Base Station Deployment 233 13.1 Security Architecture, Threats and Requirements 234 13.2 Security Features 241 13.3 Security Procedures Internal to the Home Base Station 244 13.4 Security Procedures between Home Base Station and Security Gateway 247 13.5 Security Aspects of Home Base Station Management 261 13.6 Closed Subscriber Groups and Emergency Call Handling 275 13.7 Support for Subscriber Mobility 277 14 Relay Node Security 281 14.1 Overview of Relay Node Architecture 281 14.2 Security Solution 284 15 Security for Machine-Type Communications 293 15.1 Security for MTC at the Application Level 294 15.2 Security for MTC at the 3GPP Network Level 301 15.3 Security for MTC at the Credential Management Level 306 16 Future Challenges 309 16.1 Near-Term Outlook 309 16.2 Far-Term Outlook 314 Abbreviations 319 References 327 Index 337
£84.56
John Wiley & Sons Inc An Introduction to LTE
Book SynopsisFollowing on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works. It assumes no more than a basic knowledge of mobile telecommunication systems, and the reader is not expected to have any previous knowledge of the complex mathematical operations that underpin LTE.Table of ContentsPreface xxi Acknowledgements xxiii List of Abbreviations xxv 1 Introduction 1 1.1 Architectural Review of UMTS and GSM 1 1.1.1 High-Level Architecture 1 1.1.2 Architecture of the Radio Access Network 2 1.1.3 Architecture of the Core Network 4 1.1.4 Communication Protocols 5 1.2 History of Mobile Telecommunication Systems 6 1.2.1 From 1G to 3G 6 1.2.2 Third Generation Systems 7 1.3 The Need for LTE 8 1.3.1 The Growth of Mobile Data 8 1.3.2 Capacity of a Mobile Telecommunication System 9 1.3.3 Increasing the System Capacity 10 1.3.4 Additional Motivations 11 1.4 From UMTS to LTE 11 1.4.1 High-Level Architecture of LTE 11 1.4.2 Long-Term Evolution 12 1.4.3 System Architecture Evolution 13 1.4.4 LTE Voice Calls 14 1.4.5 The Growth of LTE 15 1.5 From LTE to LTE-Advanced 16 1.5.1 The ITU Requirements for 4G 16 1.5.2 Requirements of LTE-Advanced 16 1.5.3 4G Communication Systems 16 1.5.4 The Meaning of 4G 17 1.6 The 3GPP Specifications for LTE 17 References 19 2 System Architecture Evolution 21 2.1 High-Level Architecture of LTE 21 2.2 User Equipment 21 2.2.1 Architecture of the UE 21 2.2.2 UE Capabilities 22 2.3 Evolved UMTS Terrestrial Radio Access Network 23 2.3.1 Architecture of the E-UTRAN 23 2.3.2 Transport Network 24 2.3.3 Small Cells and the Home eNB 25 2.4 Evolved Packet Core 25 2.4.1 Architecture of the EPC 25 2.4.2 Roaming Architecture 27 2.4.3 Network Areas 28 2.4.4 Numbering, Addressing and Identification 28 2.5 Communication Protocols 30 2.5.1 Protocol Model 30 2.5.2 Air Interface Transport Protocols 31 2.5.3 Fixed Network Transport Protocols 31 2.5.4 User Plane Protocols 32 2.5.5 Signalling Protocols 33 2.6 Example Signalling Flows 34 2.6.1 Access Stratum Signalling 34 2.6.2 Non-Access Stratum Signalling 35 2.7 Bearer Management 36 2.7.1 The EPS Bearer 36 2.7.2 Default and Dedicated Bearers 37 2.7.3 Bearer Implementation Using GTP 38 2.7.4 Bearer Implementation Using GRE and PMIP 39 2.7.5 Signalling Radio Bearers 39 2.8 State Diagrams 40 2.8.1 EPS Mobility Management 40 2.8.2 EPS Connection Management 40 2.8.3 Radio Resource Control 41 2.9 Spectrum Allocation 43 References 45 3 Digital Wireless Communications 49 3.1 Radio Transmission and Reception 49 3.1.1 Carrier Signal 49 3.1.2 Modulation Techniques 50 3.1.3 The Modulation Process 51 3.1.4 The Demodulation Process 53 3.1.5 Channel Estimation 55 3.1.6 Bandwidth of the Modulated Signal 55 3.2 Radio Transmission in a Mobile Cellular Network 56 3.2.1 Multiple Access Techniques 56 3.2.2 FDD and TDD Modes 56 3.3 Impairments to the Received Signal 58 3.3.1 Propagation Loss 58 3.3.2 Noise and Interference 58 3.3.3 Multipath and Fading 58 3.3.4 Inter-symbol Interference 60 3.4 Error Management 61 3.4.1 Forward Error Correction 61 3.4.2 Automatic Repeat Request 62 3.4.3 Hybrid ARQ 63 References 65 4 Orthogonal Frequency Division Multiple Access 67 4.1 Principles of OFDMA 67 4.1.1 Sub-carriers 67 4.1.2 The OFDM Transmitter 68 4.1.3 The OFDM Receiver 70 4.1.4 The Fast Fourier Transform 72 4.1.5 Block Diagram of OFDMA 72 4.1.6 Details of the Fourier Transform 73 4.2 Benefits and Additional Features of OFDMA 75 4.2.1 Orthogonal Sub-carriers 75 4.2.2 Choice of Sub-carrier Spacing 75 4.2.3 Frequency-Specific Scheduling 77 4.2.4 Reduction of Inter-symbol Interference 78 4.2.5 Cyclic Prefix Insertion 79 4.2.6 Choice of Symbol Duration 80 4.2.7 Fractional Frequency Re-use 81 4.3 Single Carrier Frequency Division Multiple Access 82 4.3.1 Power Variations From OFDMA 82 4.3.2 Block Diagram of SC-FDMA 83 References 85 5 Multiple Antenna Techniques 87 5.1 Diversity Processing 87 5.1.1 Receive Diversity 87 5.1.2 Closed Loop Transmit Diversity 88 5.1.3 Open Loop Transmit Diversity 89 5.2 Spatial Multiplexing 90 5.2.1 Principles of Operation 90 5.2.2 Open Loop Spatial Multiplexing 92 5.2.3 Closed Loop Spatial Multiplexing 94 5.2.4 Matrix Representation 96 5.2.5 Implementation Issues 99 5.2.6 Multiple User MIMO 99 5.3 Beamforming 101 5.3.1 Principles of Operation 101 5.3.2 Beam Steering 102 5.3.3 Downlink Multiple User MIMO Revisited 103 References 104 6 Architecture of the LTE Air Interface 105 6.1 Air Interface Protocol Stack 105 6.2 Logical, Transport and Physical Channels 107 6.2.1 Logical Channels 107 6.2.2 Transport Channels 107 6.2.3 Physical Data Channels 108 6.2.4 Control Information 109 6.2.5 Physical Control Channels 110 6.2.6 Physical Signals 111 6.2.7 Information Flows 111 6.3 The Resource Grid 111 6.3.1 Slot Structure 111 6.3.2 Frame Structure 113 6.3.3 Uplink Timing Advance 115 6.3.4 Resource Grid Structure 116 6.3.5 Bandwidth Options 117 6.4 Multiple Antenna Transmission 118 6.4.1 Downlink Antenna Ports 118 6.4.2 Downlink Transmission Modes 119 6.5 Resource Element Mapping 119 6.5.1 Downlink Resource Element Mapping 119 6.5.2 Uplink Resource Element Mapping 121 References 123 7 Cell Acquisition 125 7.1 Acquisition Procedure 125 7.2 Synchronization Signals 126 7.2.1 Physical Cell Identity 126 7.2.2 Primary Synchronization Signal 127 7.2.3 Secondary Synchronization Signal 128 7.3 Downlink Reference Signals 128 7.4 Physical Broadcast Channel 129 7.5 Physical Control Format Indicator Channel 130 7.6 System Information 131 7.6.1 Organization of the System Information 131 7.6.2 Transmission and Reception of the System Information 133 7.7 Procedures after Acquisition 133 References 134 8 Data Transmission and Reception 135 8.1 Data Transmission Procedures 135 8.1.1 Downlink Transmission and Reception 135 8.1.2 Uplink Transmission and Reception 137 8.1.3 Semi Persistent Scheduling 139 8.2 Transmission of Scheduling Messages on the PDCCH 139 8.2.1 Downlink Control Information 139 8.2.2 Resource Allocation 140 8.2.3 Example: DCI Format 1 141 8.2.4 Radio Network Temporary Identifiers 142 8.2.5 Transmission and Reception of the PDCCH 143 8.3 Data Transmission on the PDSCH and PUSCH 144 8.3.1 Transport Channel Processing 144 8.3.2 Physical Channel Processing 146 8.4 Transmission of Hybrid ARQ Indicators on the PHICH 148 8.4.1 Introduction 148 8.4.2 Resource Element Mapping of the PHICH 148 8.4.3 Physical Channel Processing of the PHICH 149 8.5 Uplink Control Information 149 8.5.1 Hybrid ARQ Acknowledgements 149 8.5.2 Channel Quality Indicator 150 8.5.3 Rank Indication 151 8.5.4 Precoding Matrix Indicator 151 8.5.5 Channel State Reporting Mechanisms 151 8.5.6 Scheduling Requests 152 8.6 Transmission of Uplink Control Information on the PUCCH 153 8.6.1 PUCCH Formats 153 8.6.2 PUCCH Resources 154 8.6.3 Physical Channel Processing of the PUCCH 155 8.7 Uplink Reference Signals 155 8.7.1 Demodulation Reference Signal 155 8.7.2 Sounding Reference Signal 156 8.8 Power Control 157 8.8.1 Uplink Power Calculation 157 8.8.2 Uplink Power Control Commands 158 8.8.3 Downlink Power Control 159 8.9 Discontinuous Reception 159 8.9.1 Discontinuous Reception and Paging in RRC_IDLE 159 8.9.2 Discontinuous Reception in RRC_CONNECTED 159 References 161 9 Random Access 163 9.1 Transmission of Random Access Preambles on the PRACH 163 9.1.1 Resource Element Mapping 163 9.1.2 Preamble Sequence Generation 165 9.1.3 Signal Transmission 165 9.2 Non-Contention-Based Procedure 166 9.3 Contention-Based Procedure 167 References 169 10 Air Interface Layer 2 171 10.1 Medium Access Control Protocol 171 10.1.1 Protocol Architecture 171 10.1.2 Timing Advance Commands 173 10.1.3 Buffer Status Reporting 173 10.1.4 Power Headroom Reporting 173 10.1.5 Multiplexing and De-multiplexing 174 10.1.6 Logical Channel Prioritization 174 10.1.7 Scheduling of Transmissions on the Air Interface 175 10.2 Radio Link Control Protocol 176 10.2.1 Protocol Architecture 176 10.2.2 Transparent Mode 177 10.2.3 Unacknowledged Mode 177 10.2.4 Acknowledged Mode 178 10.3 Packet Data Convergence Protocol 180 10.3.1 Protocol Architecture 180 10.3.2 Header Compression 180 10.3.3 Prevention of Packet Loss during Handover 182 References 183 11 Power-On and Power-Off Procedures 185 11.1 Power-On Sequence 185 11.2 Network and Cell Selection 187 11.2.1 Network Selection 187 11.2.2 Closed Subscriber Group Selection 187 11.2.3 Cell Selection 188 11.3 RRC Connection Establishment 189 11.3.1 Basic Procedure 189 11.3.2 Relationship with Other Procedures 190 11.4 Attach Procedure 191 11.4.1 IP Address Allocation 191 11.4.2 Overview of the Attach Procedure 192 11.4.3 Attach Request 192 11.4.4 Identification and Security Procedures 194 11.4.5 Location Update 195 11.4.6 Default Bearer Creation 196 11.4.7 Attach Accept 197 11.4.8 Default Bearer Update 198 11.5 Detach Procedure 199 References 200 12 Security Procedures 203 12.1 Network Access Security 203 12.1.1 Security Architecture 203 12.1.2 Key Hierarchy 204 12.1.3 Authentication and Key Agreement 205 12.1.4 Security Activation 207 12.1.5 Ciphering 208 12.1.6 Integrity Protection 209 12.2 Network Domain Security 210 12.2.1 Security Protocols 210 12.2.2 Security in the Evolved Packet Core 210 12.2.3 Security in the Radio Access Network 211 References 212 13 Quality of Service, Policy and Charging 215 13.1 Policy and Charging Control 215 13.1.1 Quality of Service Parameters 215 13.1.2 Service Data Flows 217 13.1.3 Charging Parameters 218 13.1.4 Policy and Charging Control Rules 219 13.2 Policy and Charging Control Architecture 219 13.2.1 Basic PCC Architecture 219 13.2.2 Local Breakout Architecture 220 13.2.3 Architecture Using a PMIP Based S5/S8 220 13.2.4 Software Protocols 221 13.3 Session Management Procedures 222 13.3.1 IP-CAN Session Establishment 222 13.3.2 Mobile Originated SDF Establishment 223 13.3.3 Server Originated SDF Establishment 224 13.3.4 Dedicated Bearer Establishment 225 13.3.5 PDN Connectivity Establishment 226 13.3.6 Other Session Management Procedures 228 13.4 Data Transport in the Evolved Packet Core 228 13.4.1 Packet Handling at the PDN Gateway 228 13.4.2 Data Transport Using GTP 229 13.4.3 Differentiated Services 230 13.4.4 Multiprotocol Label Switching 231 13.4.5 Data Transport Using GRE and PMIP 231 13.5 Charging and Billing 231 13.5.1 High Level Architecture 231 13.5.2 Offline Charging 232 13.5.3 Online Charging 233 References 234 14 Mobility Management 237 14.1 Transitions between Mobility Management States 237 14.1.1 S1 Release Procedure 237 14.1.2 Paging Procedure 239 14.1.3 Service Request Procedure 239 14.2 Cell Reselection in RRC_IDLE 241 14.2.1 Objectives 241 14.2.2 Measurement Triggering on the Same LTE Frequency 241 14.2.3 Cell Reselection to the Same LTE Frequency 242 14.2.4 Measurement Triggering on a Different LTE Frequency 243 14.2.5 Cell Reselection to a Different LTE Frequency 244 14.2.6 Fast Moving Mobiles 244 14.2.7 Tracking Area Update Procedure 245 14.2.8 Network Reselection 246 14.3 Measurements in RRC_CONNECTED 247 14.3.1 Objectives 247 14.3.2 Measurement Procedure 247 14.3.3 Measurement Reporting 248 14.3.4 Measurement Gaps 249 14.4 Handover in RRC_CONNECTED 250 14.4.1 X2 Based Handover Procedure 250 14.4.2 Handover Variations 252 References 253 15 Inter-operation with UMTS and GSM 255 15.1 System Architecture 255 15.1.1 Architecture of the 2G/3G Packet Switched Domain 255 15.1.2 S3/S4-Based Inter-operation Architecture 257 15.1.3 Gn/Gp-Based Inter-operation Architecture 258 15.2 Power-On Procedures 259 15.3 Mobility Management in RRC_IDLE 259 15.3.1 Cell Reselection 259 15.3.2 Routing Area Update Procedure 260 15.3.3 Idle Mode Signalling Reduction 262 15.4 Mobility Management in RRC_CONNECTED 262 15.4.1 RRC Connection Release with Redirection 262 15.4.2 Measurement Procedures 264 15.4.3 Optimized Handover 265 References 268 16 Inter-operation with Non-3GPP Technologies 271 16.1 Generic System Architecture 271 16.1.1 Network-Based Mobility Architecture 271 16.1.2 Host-Based Mobility Architecture 273 16.1.3 Access Network Discovery and Selection Function 274 16.2 Generic Signalling Procedures 275 16.2.1 Overview of the Attach Procedure 275 16.2.2 Authentication and Key Agreement 276 16.2.3 PDN Connectivity Establishment 278 16.2.4 Radio Access Network Reselection 280 16.3 Inter-Operation with cdma2000 HRPD 280 16.3.1 System Architecture 280 16.3.2 Preregistration with cdma2000 281 16.3.3 Cell Reselection in RRC_IDLE 282 16.3.4 Measurements and Handover in RRC_CONNECTED 283 References 286 17 Self-Optimizing Networks 289 17.1 Self-Configuration of an eNB 289 17.1.1 Automatic Configuration of the Physical Cell Identity 289 17.1.2 Automatic Neighbour Relations 290 17.1.3 Random Access Channel Optimization 291 17.2 Inter-Cell Interference Coordination 292 17.3 Mobility Management 292 17.3.1 Mobility Load Balancing 292 17.3.2 Mobility Robustness Optimization 293 17.3.3 Energy Saving 295 17.4 Radio Access Network Information Management 295 17.4.1 Introduction 295 17.4.2 Transfer of System Information 296 17.4.3 Transfer of Self-Optimization Data 297 17.5 Drive Test Minimization 297 References 298 18 Enhancements in Release 9 301 18.1 Multimedia Broadcast/Multicast Service 301 18.1.1 Introduction 301 18.1.2 Multicast/Broadcast over a Single Frequency Network 302 18.1.3 Implementation of MBSFN in LTE 302 18.1.4 Architecture of MBMS 304 18.1.5 Operation of MBMS 305 18.2 Location Services 306 18.2.1 Introduction 306 18.2.2 Positioning Techniques 306 18.2.3 Location Service Architecture 307 18.2.4 Location Service Procedures 308 18.3 Other Enhancements in Release 9 309 18.3.1 Dual Layer Beamforming 309 18.3.2 Commercial Mobile Alert System 310 References 310 19 LTE-Advanced and Release 10 313 19.1 Carrier Aggregation 313 19.1.1 Principles of Operation 313 19.1.2 UE Capabilities 314 19.1.3 Scheduling 316 19.1.4 Data Transmission and Reception 316 19.1.5 Uplink and Downlink Feedback 317 19.1.6 Other Physical Layer and MAC Procedures 317 19.1.7 RRC Procedures 317 19.2 Enhanced Downlink MIMO 318 19.2.1 Objectives 318 19.2.2 Downlink Reference Signals 318 19.2.3 Downlink Transmission and Feedback 320 19.3 Enhanced Uplink MIMO 321 19.3.1 Objectives 321 19.3.2 Implementation 321 19.4 Relays 322 19.4.1 Principles of Operation 322 19.4.2 Relaying Architecture 323 19.4.3 Enhancements to the Air Interface 324 19.5 Heterogeneous Networks 324 19.5.1 Introduction 324 19.5.2 Enhanced Inter-Cell Interference Coordination 325 19.5.3 Enhancements to Self-Optimizing Networks 326 19.6 Traffic Offload Techniques 326 19.6.1 Local IP Access 326 19.6.2 Selective IP Traffic Offload 327 19.6.3 Multi-Access PDN Connectivity 327 19.6.4 IP Flow Mobility 329 19.7 Overload Control for Machine-Type Communications 330 References 331 20 Releases 11 and 12 333 20.1 Coordinated Multipoint Transmission and Reception 333 20.1.1 Objectives 333 20.1.2 Scenarios 334 20.1.3 CoMP Techniques 335 20.1.4 Standardization 336 20.1.5 Performance 337 20.2 Enhanced Physical Downlink Control Channel 337 20.3 Interference Avoidance for in Device Coexistence 338 20.4 Machine-Type Communications 339 20.4.1 Device Triggering 339 20.4.2 Numbering, Addressing and Identification 340 20.5 Mobile Data Applications 340 20.6 New Features in Release 12 341 20.6.1 Proximity Services and Device to Device Communications 341 20.6.2 Dynamic Adaptation of the TDD Configuration 342 20.6.3 Enhancements for Machine-Type Communications and Mobile Data 344 20.6.4 Traffic Offloading Enhancements 344 20.7 Release 12 Studies 345 20.7.1 Enhancements to Small Cells and Heterogeneous Networks 345 20.7.2 Elevation Beamforming and Full Dimension MIMO 346 References 346 21 Circuit Switched Fallback 349 21.1 Delivery of Voice and Text Messages over LTE 349 21.1.1 The Market for Voice and SMS 349 21.1.2 Third Party Voice over IP 350 21.1.3 The IP Multimedia Subsystem 351 21.1.4 VoLGA 351 21.1.5 Dual Radio Devices 352 21.1.6 Circuit Switched Fallback 353 21.2 System Architecture 353 21.2.1 Architecture of the 2G/3G Circuit Switched Domain 353 21.2.2 Circuit Switched Fallback Architecture 354 21.3 Attach Procedure 355 21.3.1 Combined EPS/IMSI Attach Procedure 355 21.3.2 Voice Domain Preference and UE Usage Setting 356 21.4 Mobility Management 357 21.4.1 Combined Tracking Area/Location Area Update Procedure 357 21.4.2 Alignment of Tracking Areas and Location Areas 357 21.4.3 Cell Reselection to UMTS or GSM 358 21.5 Call Setup 359 21.5.1 Mobile-Originated Call Setup using RRC Connection Release 359 21.5.2 Mobile Originated Call Setup using Handover 361 21.5.3 Signalling Messages in the Circuit Switched Domain 362 21.5.4 Mobile-Terminated Call Setup 363 21.5.5 Returning to LTE 364 21.6 SMS over SGs 365 21.6.1 System Architecture 365 21.6.2 SMS Delivery 365 21.7 Circuit Switched Fallback to cdma2000 1xRTT 366 21.8 Performance of Circuit Switched Fallback 367 References 368 22 VoLTE and the IP Multimedia Subsystem 371 22.1 Introduction 371 22.1.1 The IP Multimedia Subsystem 371 22.1.2 VoLTE 372 22.1.3 Rich Communication Services 372 22.2 Hardware Architecture of the IMS 373 22.2.1 High-Level Architecture 373 22.2.2 Call Session Control Functions 374 22.2.3 Application Servers 375 22.2.4 Home Subscriber Server 375 22.2.5 User Equipment 375 22.2.6 Relationship with LTE 376 22.2.7 Border Control Functions 377 22.2.8 Media Gateway Functions 378 22.2.9 Multimedia Resource Functions 379 22.2.10 Security Architecture 380 22.2.11 Charging Architecture 380 22.3 Signalling Protocols 381 22.3.1 Session Initiation Protocol 381 22.3.2 Session Description Protocol 382 22.3.3 Other Signalling Protocols 382 22.4 Service Provision in the IMS 382 22.4.1 Service Profiles 382 22.4.2 Media Feature Tags 383 22.4.3 The Multimedia Telephony Service for IMS 383 22.5 VoLTE Registration Procedure 384 22.5.1 Introduction 384 22.5.2 LTE Procedures 384 22.5.3 Contents of the REGISTER Request 385 22.5.4 IMS Registration Procedure 387 22.5.5 Routing of SIP Requests and Responses 388 22.5.6 Third-Party Registration with Application Servers 389 22.5.7 Subscription for Network-Initiated Deregistration 389 22.6 Call Setup and Release 390 22.6.1 Contents of the INVITE Request 390 22.6.2 Initial INVITE Request and Response 391 22.6.3 Acceptance of the Initial INVITE 393 22.6.4 Establishment of a Call to a Circuit Switched Network 396 22.6.5 Call Release 396 22.7 Access Domain Selection 397 22.7.1 Mobile-Originated Calls 397 22.7.2 Mobile-Terminated Calls 398 22.8 Single Radio Voice Call Continuity 398 22.8.1 Introduction 398 22.8.2 SRVCC Architecture 399 22.8.3 Attach, Registration and Call Setup Procedures 400 22.8.4 Handover Preparation 400 22.8.5 Updating the Remote Leg 401 22.8.6 Releasing the Source Leg 403 22.8.7 Handover Execution and Completion 403 22.8.8 Evolution of SRVCC 404 22.9 IMS Centralized Services 405 22.10 IMS Emergency Calls 406 22.10.1 Emergency Call Architecture 406 22.10.2 Emergency Call Setup Procedure 407 22.11 Delivery of SMS Messages over the IMS 408 22.11.1 SMS Architecture 408 22.11.2 Access Domain Selection 409 References 410 23 Performance of LTE and LTE-Advanced 413 23.1 Peak Data Rates of LTE and LTE-Advanced 413 23.1.1 Increase of the Peak Data Rate 413 23.1.2 Limitations on the Peak Data Rate 415 23.2 Coverage of an LTE Cell 416 23.2.1 Uplink Link Budget 416 23.2.2 Downlink Link Budget 418 23.2.3 Propagation Modelling 419 23.2.4 Coverage Estimation 420 23.3 Capacity of an LTE Cell 421 23.3.1 Capacity Estimation 421 23.3.2 Cell Capacity Simulations 422 23.4 Performance of Voice over IP 424 23.4.1 AMR Codec Modes 424 23.4.2 Transmission of AMR Frames on the Air Interface 425 23.4.3 Transmission of AMR Frames in the Fixed Network 426 References 427 Bibliography 429 Index 431
£54.86
John Wiley & Sons Inc Design and Optimization for 5G Wireless
Book SynopsisThis book offers a technical background to the design and optimization of wireless communication systems, covering optimization algorithms for wireless and 5G communication systems design. The book introduces the design and optimization systems which target capacity, latency, and connection density; including Enhanced Mobile Broadband Communication (eMBB), Ultra-Reliable and Low Latency Communication (URLL), and Massive Machine Type Communication (mMTC). The book is organized into two distinct parts: Part I, mathematical methods and optimization algorithms for wireless communications are introduced, providing the reader with the required mathematical background. In Part II, 5G communication systems are designed and optimized using the mathematical methods and optimization algorithms.Table of ContentsPreface xi List of Abbreviations xiii Part I Mathematical Methods and Optimization Theories for Wireless Communications 1 1 Historical Sketch of Cellular Communications and Networks 3 1.1 Evolution of Cellular Communications and Networks 3 1.2 Evolution to 5G Networks 9 References 11 2 5G Wireless Communication System Parameters and Requirements 13 2.1 5G Requirements 13 2.2 Trade-off of 5G System Metrics 16 Problems 19 References 20 3 Mathematical Methods for Wireless Communications 21 3.1 Signal Spaces 21 3.2 Approximation and Estimation in Signal Spaces 32 3.2.1 Approximation Problems 32 3.2.2 Least Squares Estimation 35 3.2.3 Minimum Mean-Squared Error Estimation 45 3.2.4 Maximum Likelihood and Maximum A Posteriori Estimation 65 3.3 Matrix Factorization 71 3.3.1 LU Decomposition 71 3.3.2 Cholesky Decomposition 76 3.3.3 QR Decomposition 77 3.3.4 SVD Decomposition 85 Problems 92 References 95 4 Mathematical Optimization Techniques for Wireless Communications 97 4.1 Introduction 97 4.2 Mathematical Modeling and Optimization Process 99 4.3 Linear Programming 108 4.4 Convex Optimization 120 4.4.1 Barrier Method 124 4.4.2 Primal-Dual Interior Point Method 130 4.5 Gradient Descent Method 138 Problems 146 References 149 5 Machine Learning 151 5.1 Artificial Intelligence, Machine Learning, and Deep Learning 152 5.2 Supervised and Unsupervised Learning 153 5.3 Reinforcement Learning 177 Problems 191 References 193 Part II Design and Optimization for 5G Wireless Communications and Networks 195 6 Design Principles for 5G Communications and Networks 197 6.1 New Design Approaches and Key Challenges of 5G Communications and Networks 198 6.1.1 5G Frequency Bands 198 6.1.2 Low Latency 199 6.1.3 More Efficient Radio Resource Utilization 201 6.1.4 Small Cells and Ultra-Dense Networks 202 6.1.5 Higher Flexibility 202 6.1.6 Virtualization 203 6.1.7 Distributed Network Architecture 204 6.1.8 Device-Centric Communications 205 6.1.9 New Air Interfaces 206 6.1.10 Big Data Management 206 6.2 5G New Radio 207 6.2.1 5G Radio Access Network Architecture 207 6.2.2 5G NR Deployment Scenarios 208 6.2.3 Frame Structure 209 6.2.4 5G Logical, Transport, and Physical Channels 213 6.2.5 5G Protocol Layers 217 6.2.6 5G NR Physical Layer Processing 220 6.2.7 5G Initial Access Procedure and Beam Management 222 6.3 5G Key Enabling Techniques 226 6.3.1 5GWaveforms 226 6.3.2 5G Multiple Access Schemes 227 6.3.3 Channel Coding Schemes 228 6.3.4 MIMO 230 6.3.5 mmWAVE 231 6.3.6 Network Slicing 232 6.3.7 Multi-access Edge Computing 232 Problems 235 References 237 7 Enhanced Mobile Broadband Communication Systems 239 7.1 Introduction 239 7.2 Design Approaches of eMBB Systems 240 7.3 MIMO 242 7.3.1 Capacity of MIMO Channel 243 7.3.2 Space–Time Coding Design 251 7.3.3 Spatial Multiplexing Design 262 7.3.4 Massive MIMO 268 7.4 5G Multiple Access Techniques 271 7.4.1 OFDM System Design 271 7.4.2 FBMC, GFDM, and UFMC 280 7.5 5G Channel Coding and Modulation 284 7.5.1 LDPC Codes 285 7.5.2 Coding and Modulation for High Spectral Efficiency 291 Problems 299 References 300 8 Ultra-Reliable and Low Latency Communication Systems 303 8.1 Design Approaches of URLLC Systems 304 8.2 Short Packet Transmission 306 8.3 Latency Analysis 317 8.4 Multi-Access Edge Computing 328 Problems 339 References 340 9 Massive Machine Type Communication Systems 343 9.1 Introduction 343 9.2 Design Approaches of mMTC Systems 344 9.3 Robust Optimization 351 9.4 Power Control and Management 362 9.4.1 Linear Programming for Power Control in Distributed Networks 363 9.4.2 Power Control Problem Formulations 366 9.4.3 Beamforming for Transmit Power Minimization 370 9.5 Wireless Sensor Networks 376 Problems 392 References 393 Index 397
£98.96
John Wiley & Sons Inc Massive Connectivity
Book SynopsisMassive Connectivity Learn to support more devices and sensors in Internet of Things applications through NOMA and machine-type communication Non-orthogonal multiple access (NOMA) has held much interest due to its ability to provide a higher spectral efficiencysuch as more bits per unit bandwidth in Hertzthan other, orthogonal multiple access schemes. The majority of this research focuses on the application of NOMA to downlink channels (from base station to users) in cellular systems as its use for uplink (users to base station) is somewhat circumscribed. However, NOMA has recently been employed in contention-based uplink access, which has shown an improvement in performance that allows an increase in the number of users that can be supported. As a result, NOMA is promising for machine-type communication (MTC) in 5G systems and beyond, making it a key enabler of the Internet of Things (IoT). Massive Connectivity provides an in-depth, comprehensive view of Table of ContentsPreface xiii 1 Introduction 1 1.1 Machine-Type Communication 1 1.2 Non-Orthogonal Multiple Access 3 1.3 NOMA for MTC 4 1.4 An Overview of Probability and Random Processes 6 1.4.1 Review of Probability 6 1.4.2 Random Variables 7 1.4.3 Random Processes 14 1.4.4 Markov Chains 15 2 Single-User and Multiuser Systems 19 2.1 A Single-User System 19 2.1.1 Signal Representation 20 2.1.2 Transmission of Signal Sequences 21 2.1.3 ML Decoding 23 2.1.4 ML Decoding over Fading Channels 26 2.1.5 Achievable Rate 28 2.2 Multiuser Systems 33 2.2.1 Broadcast Channels 34 2.2.2 Multiple Access Channels 37 2.3 Further Reading 41 3 OMA and NOMA 43 3.1 Orthogonal Multiple Access 43 3.1.1 Time Division Multiple Access 43 3.1.2 Frequency Division Multiple Access 46 3.1.3 Orthogonal Frequency Division Multiple Access 47 3.2 Non-Orthogonal Multiple Access 51 3.2.1 Downlink NOMA 52 3.2.2 Uplink NOMA 57 3.3 Power and Rate Allocation 60 3.3.1 System with Known Instantaneous CSI 60 3.3.2 System with Unknown Instantaneous CSI 67 3.4 Code Division Multiple Access 73 3.4.1 DS-CDMA 74 3.4.2 Multiuser Detection Approaches 78 3.5 Further Reading 84 4 Random Access Systems 87 4.1 ALOHA Systems 88 4.1.1 Single Channel Random Access 88 4.1.2 Multi-Channel S-ALOHA 90 4.2 Throughput Analysis 91 4.2.1 Pure ALOHA 91 4.2.2 Slotted ALOHA 92 4.2.3 Multichannel ALOHA 94 4.3 Analysis with a Finite Number of Users 98 4.3.1 A Markov Chain 98 4.3.2 Drift Analysis 100 4.4 Analysis with an In_nite Number of Users 102 4.4.1 Constant Re-transmission Probability 102 4.4.2 Adaptive Re-transmission Probability 104 4.5 Fast Retrial 107 4.6 Multiuser Detection 108 4.6.1 Compressive Random Access 108 4.6.2 Throughput Analysis 110 4.7 Further Reading 114 5 NOMA-based Random Access 117 5.1 NOMA to Random Access 117 5.1.1 S-ALOHA with NOMA 118 5.1.2 More Power Levels 122 5.2 Multichannel ALOHA with NOMA 127 5.2.1 Multichannel ALOHA with NOMA and Throughput Analysis 128 5.2.2 Channel-Dependent Selection 132 5.3 Opportunistic NOMA 137 5.3.1 System Model 137 5.3.2 Throughput Analysis 140 5.3.3 Opportunistic NOMA for Channel Selection 147 5.4 NOMA-based Random Access with Multiuser Detection 152 5.4.1 Compressive Random Access 152 5.4.2 Layered CRA 154 5.4.3 Performance under Realistic Conditions 159 5.5 Further Reading 161 6 Application of NOMA to MTC in 5G 163 6.1 Machine-Type Communication 163 6.1.1 IoT Connectivity 163 6.1.2 Random Access Schemes for MTC 164 6.2 A Model with Massive MIMO 168 6.2.1 Massive MIMO 168 6.2.2 Two-step Random Access with Massive MIMO 173 6.2.3 Throughput Analysis 174 6.3 NOMA for High-Throughput MTC 177 6.3.1 Co-existing Preambles and Data Packets 178 6.3.2 Maximum Throughput Comparison 180 6.3.3 Limitations 184 6.4 Layered Preambles for Heterogeneous Devices 185 6.4.1 Heterogeneous Devices in MTC 185 6.4.2 Design of Layered Preambles 187 6.4.3 Performance Analysis 189 6.5 Further Reading 195 7 Game-Theoretic Perspective of NOMA-based Random Access 197 7.1 Background of Game Theory 197 7.1.1 Normal-Form Games 198 7.1.2 Nash Equilibrium 200 7.1.3 Mixed Strategies 200 7.2 Random Access Game 202 7.2.1 Normal-Form and NE 203 7.2.2 Mixed Strategies 204 7.3 NOMA-ALOHA Game 204 7.3.1 Single-Channel NOMA-ALOHA Game 205 7.3.2 Multichannel NOMA-ALOHA Game 216 7.4 Fictitious Play 221 7.4.1 A Model for Fictitious Play 221 7.4.2 Convergence 223 7.5 Evolutionary Game Theory and Its Application 227 7.5.1 Population Games 227 7.5.2 Replicator Dynamics and Evolutionary Stable State 228 7.5.3 Stability of the Replicator Dynamics 231 7.5.4 Application to NOMA 232 7.6 Further Reading 234 Index 247
£92.70
John Wiley & Sons Inc Open RAN
Book SynopsisOpen RAN A comprehensive survey of Open RAN technology and its ecosystem In Open RAN: The Definitive Guide, a team of distinguished industry leaders deliver an authoritative guide to all four principles of the Open RAN vision: openness, virtualization, intelligence, and interoperability. Written by the industry experts currently defining the specifications, building the systems, and testing and deploying the networks, the book covers O-RAN architecture, the fronthaul interface, security, cloudification, virtualization, intelligence, certification, badging, and standardization. This critical reference on Open RAN explains how and why an open and disaggregated, intelligent, and fully virtualized network is the way networks should be designed and deployed moving forward. Readers will also find: A thorough introduction from key industry players, including AT&T, Telefonica, Mavenir, VMWare, Google and VIAVI Comprehensive explorations of Open X-Table of ContentsList of Contributors xiii Foreword xv Preface xvii About the Authors xix Definitions / Acronyms xxi 1 The Evolution of RAN 1 Sameh M. Yamany 1.1 Introduction 1 1.2 RAN Architecture Evolution 4 1.2.1 The 2G RAN 5 1.2.2 The 3G RAN 6 1.2.3 The 4G/LTE RAN 6 1.2.4 The 5G RAN 9 1.3 The Case for Open RAN 11 1.4 6G and the Road Ahead 11 1.5 Conclusion 13 Bibliography 13 2 Open RAN Overview 14 Rittwik Jana 2.1 Introduction 14 2.1.1 What is Open RAN and Why is it Important? 17 2.1.2 How Does Open RAN Accelerate Innovation? 17 2.1.3 What are the major challenges that Open RAN can help to address? 18 2.2 Open RAN Architecture 18 2.3 Open RAN Cloudification and Virtualization 19 2.4 RAN Intelligence 20 2.5 Fronthaul Interface and Open Transport 20 2.6 Securing Open RAN 21 2.7 Open Source Software 21 2.8 RAN Automation and Deployment with CI/CD 22 2.9 Open RAN Testing 22 2.10 Industry Organizations 23 2.11 Conclusion 23 Bibliography 23 3 O-RAN Architecture Overview 24 Rajarajan Sivaraj and Sridhar Rajagopal 3.1 Introduction 24 3.1.1 General Description of O-RAN Functions 24 3.1.1.1 Centralized Unit – Control Plane and User Plane Functions (CU-CP and CU-UP) 26 3.1.1.2 Distributed Unit Function (DU) 26 3.1.1.3 Radio Unit Function (RU) 26 3.1.1.4 Evolved Node B (eNB) 27 3.1.2 RAN Intelligent Controller (RIC) and Service Management and Orchestration (SMO) Functions 28 3.1.3 Interfaces 29 3.2 Near-RT RIC Architecture 30 3.2.1 Standard Functional Architecture Principles 30 3.2.2 E2 Interface Design Principles 32 3.2.3 xApp API Design Architecture 34 3.3 Non-RT RIC Architecture 37 3.3.1 Standard Functional Architecture Principles 38 3.3.2 A1 Interface Design Principles 38 3.3.3 R1 API Design Principles for rApps 41 3.4 SMO Architecture 47 3.4.1 Standard Functional Architecture Principles 47 3.4.2 O1 Interface Design Principles 48 3.4.3 Open M-Plane Fronthaul Design Principles 51 3.4.4 O2 Interface Design Principles 52 3.5 Other O-RAN Functions and Open Interfaces 54 3.5.1 O-RAN compliant Centralized Unit Control Plane (O-CU-CP) 54 3.5.1.1 Control Plane Procedures 54 3.5.1.2 Management Plane Procedures 54 3.5.2 O-CU-UP 54 3.5.2.1 Control Plane Procedures 55 3.5.2.2 User Plane Procedures 55 3.5.2.3 Management Plane Procedures 55 3.5.3 O-DU 55 3.5.3.1 Control Plane Procedures 55 3.5.3.2 User Plane Procedures 55 3.5.3.3 Management Plane Procedures 55 3.5.4 O-eNB 56 3.5.5 O-RU 56 3.6 Conclusion 57 Bibliography 57 4 Cloudification and Virtualization 59 Padma Sudarsan and Sridhar Rajagopal 4.1 Virtualization Trends 59 4.2 Openness and Disaggregation with vRAN 59 4.3 Cloud Deployment Scenarios 61 4.3.1 Private, Public, and Hybrid Cloud 61 4.3.2 Telco Features Required for “Any Cloud” Deployment 62 4.3.3 On Premise, Far Edge, Edge, and Central Deployments 63 4.3.4 Classical, Virtual Machines (VMs), Containers, and Hybrid Deployments 64 4.4 Unwinding the RAN Monolith 64 4.4.1 Adapting Cloud-Native Principles 66 4.4.2 Architectural Patterns 67 4.4.3 Software Architecture Portability and Refactoring Considerations 68 4.4.4 Compute Architecture Consideration 69 4.5 Orchestration, Management, and Automation as Key to Success 70 4.5.1 Acceleration Abstraction Layer 73 4.5.2 Cloud Deployment Workflow Automation 75 4.6 Summary 76 Bibliography 76 5 RAN Intelligence 77 Dhruv Gupta, Rajarajan Sivaraj, and Rittwik Jana 5.1 Introduction 77 5.2 Challenges and Opportunities in Building Intelligent Networks 77 5.3 Background on Machine Learning Life Cycle Management 78 5.4 ML-Driven Intelligence and Analytics for Non-RT RIC 80 5.5 ML-Driven Intelligence and Analytics for Near-RT RIC 82 5.6 E2 Service Models for Near-RT RIC 83 5.6.1 E2SM-KPM 84 5.6.2 E2SM-RC 84 5.6.3 Other E2SMs 85 5.7 ml Algorithms for Near-RT RIC 86 5.7.1 Reinforcement Learning Models 87 5.8 Near-RT RIC Platform Functions for AI/ML Training 88 5.9 RIC Use Cases 89 5.10 Conclusion 90 Bibliography 90 6 The Fronthaul Interface 91 Aditya Chopra 6.1 The Lower-Layer Split RAN 91 6.1.1 Lower Layer Fronthaul Split Options 92 6.2 Option 8 Split – CPRI and eCPRI 93 6.3 Option 6 Split – FAPI and nFAPI 94 6.3.1 Subinterfaces 97 6.3.2 Architecture Agnostic Deployment 97 6.4 Option 7 Split – O-RAN Alliance Open Fronthaul 97 6.4.1 Control (C) and User (U) Plane 98 6.4.2 Management (M) Plane 98 6.4.3 Synchronization (S) Plane 100 6.4.4 Key Features 100 6.4.4.1 Fronthaul Compression 100 6.4.4.2 Delay Management 102 6.4.4.3 Beamforming 102 6.4.4.4 Initial Access 103 6.4.4.5 License Assisted Access and Spectrum Sharing 104 6.5 Conclusions 104 Bibliography 104 7 Open Transport 105 Reza Vaez-Ghaemi and Luis Manuel Contreras Murillo 7.1 Introduction 105 7.2 Requirements 105 7.2.1 Fronthaul Requirements 106 7.2.2 Midhaul Requirements 106 7.2.3 Backhaul Requirements 107 7.2.4 Synchronization Requirements 107 7.3 WDM Solutions 108 7.3.1 Passive WDM 109 7.3.2 Active WDM 109 7.3.3 Semiactive WDM 110 7.4 Packet-Switched Solutions 111 7.4.1 Technology Overview 112 7.4.2 Deployment Patterns 112 7.4.3 Connectivity Service and Protocols 113 7.4.4 Quality of Service (QoS) 114 7.5 Management and Control Interface 114 7.5.1 Control and Management Architecture 114 7.5.2 Interaction with O-RAN Management 116 7.6 Synchronization Solutions 117 7.6.1 Synchronization Baseline 117 7.6.2 Synchronization Accuracy and Limits 118 7.7 Testing 118 7.8 Conclusion 119 Bibliography 120 8 O-RAN Security 121 Amy Zwarico 8.1 Introduction 121 8.2 Zero Trust Principles 121 8.3 Threats to O-RAN 122 8.3.1 Stakeholders 122 8.3.2 Threat Surface and Threat Actors 122 8.3.3 Overall Threats 123 8.3.4 Threats Against the Lower Layer Split (LLS) Architecture and Open Fronthaul Interface 123 8.3.5 Threats Against O-RU 124 8.3.6 Threats Against Near- and Non-Real-Time RICs, xApps, and rApps 124 8.3.7 Threats Against Physical Network Functions (PNFs) 124 8.3.8 Threats Against SMO 125 8.3.9 Threats Against O-Cloud 125 8.3.10 Threats to the Supply Chain 125 8.3.11 Physical Threats 126 8.3.12 Threats Against 5G Radio Networks 126 8.3.13 Threats to Standards Development 126 8.4 Protecting O-RAN 126 8.4.1 Securing the O-RAN-Defined Interfaces 126 8.4.1.1 A1 127 8.4.1.2 O1 127 8.4.1.3 O2 128 8.4.1.4 E2 128 8.4.1.5 Open Fronthaul 128 8.4.1.6 R1 130 8.4.1.7 3GPP Interfaces 131 8.4.2 Securing the O-Cloud 131 8.4.3 Container Security 131 8.4.4 O-RAN Software Security 131 8.4.5 Software Bill of Materials (SBOM) 132 8.5 Recommendations for Vendors and MNOs 132 8.6 Conclusion 134 Bibliography 134 9 Open RAN Software 137 David Kinsey, Padma Sudarsan, and Rittwik Jana 9.1 Introduction 137 9.2 O-RAN Software Community (OSC) 138 9.2.1 OSC Projects 138 9.2.2 The Service Management and Orchestration (SMO) Framework 138 9.2.3 Near-RT RIC (RIC) 139 9.2.4 O-CU-CP and O-CU-UP 140 9.2.5 O-DU Project 140 9.2.6 O-RU 140 9.2.7 O-Cloud 140 9.2.8 The AI/ML Framework 141 9.2.9 Support Projects 141 9.3 Open Network Automation Platform (ONAP) 141 9.3.1 Netconf/YANG Support 141 9.3.2 Configuration Persistence 142 9.3.3 VES Support 142 9.3.4 A1 Support 142 9.3.5 Optimization Support 142 9.4 Other Open-Source Communities 143 9.5 Conclusion 144 Bibliography 144 10 Open RAN Deployments 145 Sidd Chenumolu 10.1 Introduction 145 10.2 Network Architecture 146 10.2.1 Network Components 147 10.2.1.1 Antenna 147 10.2.1.2 O-RAN – Radio Unit 148 10.2.1.3 O-RAN-Distributed Unit (O-DU) 150 10.2.1.4 O-RAN-Centralized Unit (O-CU) 150 10.2.1.5 RAN Intelligent Controller (RIC) 150 10.2.2 Traditional vs. O-RAN Deployment 151 10.2.3 Typical O-RAN Deployment 152 10.2.4 Spectrum and Regulatory 153 10.3 Network Planning and Design 153 10.3.1 Cell Site Design 154 10.3.2 Network Function Placement 155 10.3.3 Dimensioning 155 10.3.3.1 Application Dimensioning 155 10.3.3.2 Platform Dimensioning 156 10.3.4 Virtualization Impact 156 10.3.4.1 Non-Uniform Memory Access 157 10.3.4.2 Hyper-Threading 157 10.3.4.3 CPU Pinning 157 10.3.4.4 Huge Page 157 10.3.4.5 Single Root Input/Output Virtualization 158 10.3.4.6 PCI Passthrough 158 10.3.4.7 Data Plane Development Kit 158 10.3.4.8 Resource Director Technology 158 10.3.4.9 Cache Allocation Technology 158 10.3.4.10 Resource Overcommitment 159 10.3.4.11 Operating System 159 10.3.4.12 K8S Impact 159 10.3.5 Networking Hardware 159 10.3.6 Hardware Type 160 10.3.7 Reliability and Availability 160 10.3.8 Impact of Network Slicing 161 10.4 Network Deployment 162 10.4.1 DU Deployment 162 10.4.1.1 DU Deployed at a Centralized Data Center 162 10.4.1.2 Timing Design When DU is at the dc 163 10.4.1.3 DU Deployed at Cell Site 164 10.4.2 CU Deployment 165 10.4.3 Radio Unit Instantiation 165 10.4.4 Radio Unit Management 166 10.4.4.1 Hierarchical Management Architecture Model 166 10.4.4.2 Hybrid Management Architecture Model 166 10.4.5 Network Management 166 10.4.6 Public Cloud Provider Overview 167 10.4.6.1 Native Services 167 10.4.6.2 CD Pipeline 167 10.4.6.3 Cluster Creation and Management 168 10.4.6.4 Transport Design 168 10.4.7 Life Cycle Management of NFs 168 10.4.8 Network Monitoring and Observability 169 10.4.8.1 Prometheus 169 10.4.8.2 Jaeger 169 10.4.8.3 Fluentd and Fluentbit 169 10.4.8.4 Probing 169 10.4.9 Network Inventory 169 10.4.10 Building the Right Team 170 10.5 Conclusion 170 Bibliography 170 11 Open RAN Test and Integration 172 Ian Wong, Ph.D. 11.1 Introduction 172 11.2 Testing Across the Network Life Cycle 174 11.3 O-RAN ALLIANCE Test and Integration Activities 175 11.3.1 Test Specifications 175 11.3.2 Conformance Test Specifications 176 11.3.2.1 A1 Interface Test Specification (O-RAN.WG2.A1TS) 178 11.3.2.2 E2 Interface Test Specification (O-RAN.WG3.E2TS) 179 11.3.2.3 Open Fronthaul Conformance Test Specification (O-RAN.WG4.CONF) 180 11.3.2.4 Xhaul Transport Testing (O-RAN.WG9.XTRP-Test.0) 181 11.3.2.5 Security Test Specifications (O-RAN.SFG.Security-Test-Specifications) 181 11.3.3 Interoperability Test Specifications 181 11.3.3.1 Fronthaul Interoperability Test Specification (O-RAN.WG4.IOT.0-09.00) 182 11.3.3.2 Open F1/W1/E1/X2/Xn Interoperability Test Specification (O-RAN.WG5.IOT.0) 183 11.3.3.3 Stack Interoperability Test Specification (O-RAN.WG8.IOT) 183 11.3.4 End-to-End Test Specifications 185 11.3.5 O-RAN Certification and Badging 186 11.3.6 Open Test and Integration Centers 187 11.3.7 O-RAN Global PlugFests 189 11.4 Conclusion 189 Bibliography 189 12 Other Open RAN Industry Organizations 191 Aditya Chopra, Manish Singh, Prabhakar Chitrapu, Luis Lopes, and Diane Rinaldo 12.1 Telecom Infra Project 191 12.1.1 Organizational Structure 192 12.1.2 Core Activities 194 12.2 Trials and Deployments 194 12.3 Small Cell Forum 195 12.3.1 A History of Openness at SCF 196 12.3.2 Alignment with the 3GPP and O-RAN Alliance Solutions 196 12.4 3rd Generation Partnership Project 197 12.5 Open RAN Policy Coalition 199 12.6 Conclusion 200 Bibliography 200 Index 201
£91.80
John Wiley & Sons Inc 6G and Onward to Next G
Book SynopsisThis book weaves emerging themes in future 6G and Next G networks carefully together. It points to three spheres of contexts with different narratives for the year 2030 and beyond, in which the coming Metaverse as the precursor of the future Multiverse can be embedded naturally. The book aims at providing the reader with new cross-disciplinary research material, ranging from communication and computer science to cognitive science, social sciences, and behavioral economics, for building a deeper Metaverse. It will be instrumental in helping the reader find and overcome some of the most common 6G and Next G blind spots. Modern networks are more than communication and computer science. They may be better viewed as techno-social systems that exhibit complex adaptive system behavior and resemble biological superorganisms. 6G and especially Next G should go beyond continuing the linear incremental 6G=5G+1G mindset of past generations of mobile networks. To this end, the book: Helps readerTable of ContentsAbout the Author xiv Preface xv Acknowledgments xvii Acronyms xviii Chapter 1 Introduction 1 1.1 Toward 6G: A New Era of Convergence 1 1.2 Fusion of Digital and Real Worlds: Multiverse vs. Metaverse 5 1.2.1 The Multiverse: An Architecture of Advanced XR Experiences 7 1.2.2 Metaverse: The Next Big Thing? 9 1.3 The Big Picture: Narratives for 2030 and Beyond 11 1.3.1 From IoT-Based Industry 4.0 to Human-Centric Cyber–Physical–Social Systems 11 1.3.2 Human-Centric Industry 5.0 12 1.3.3 Society 5.0 13 1.4 Purpose and Outline of Book 17 1.4.1 Embedding the Multiverse and Metaverse in Meta Narrative Society 5.0 19 1.4.2 The Art of 6G and Next G: How To Wire Society 5.0 22 1.4.2.1 Next G: Beyond Incremental 6G = 5G + 1G Mindset 23 1.4.2.2 Society 5.0: Exodus to the Virtual World? 25 1.4.3 Finding Your 6G/Next G Blind Spot 26 1.4.4 Outline 27 References 33 Chapter 2 Metaverse: The New North Star 37 2.1 Origins 38 2.1.1 Avatars and Daemons 38 2.1.2 Hypercard and Language of Nature 39 2.1.3 Sumerian Creation Myth: The Nam-Shub of Enki – A Neurolinguistic Virus 40 2.1.4 Metaverse: At Once Brand New and Very Ancient 43 2.2 Early Deployments 44 2.2.1 Metaverse Components, Applications, and Open Challenges 44 2.2.2 Nissan’s Invisible-to-Visible (I2V) Connected-Car Technology Concept 46 2.2.3 Internet of No Things: Making the Internet Disappear and “See the Invisible” 48 2.3 Key Enabling Technologies 49 2.3.1 Metaverse Roadmap of 6G Communications and Networking Technologies 49 2.3.2 CPSS-Based Sustainable and Smart Societies: Integrated Human, Artificial, Natural, and Organizational Intelligence 52 2.3.3 NFTs: Tulip Mania or Digital Renaissance? 54 2.3.3.1 What Is an NFT? 55 2.3.3.2 How Do NFTs Work? 55 2.4 Definition(s) of the Metaverse 56 2.4.1 Confusion and Uncertainty as Features of Disruption 57 2.4.2 Blockchains, Cryptocurrencies, and Tokens: The First Digitally Native Payment Rail 58 2.4.3 Social DAOs 60 2.4.4 Metaversal Existence: Life, Labor, and Leisure 62 2.4.5 Gaming on the Blockchain 63 2.5 Metaverse Economy and Community: Gamified Experiences 64 References 66 Chapter 3 The Multiverse: Infinite Possibility 67 3.1 Experience Innovation on the Digital Frontier 67 3.2 The Multiverse 69 3.2.1 Realms of Experience 69 3.2.2 Experience Design Canvas 73 3.3 Beyond the Metaverse Origins: Into the Future 74 3.3.1 Limitless Mind 75 3.3.2 Realm of the Infinite: The Eternal 75 References 75 Chapter 4 6G Vision and Next G Alliance Roadmap 77 4.1 6G Vision: Recent Progress and State of the Art 79 4.1.1 6G Paradigm Shifts 79 4.1.2 Value-Creation-and-Capture Problem 81 4.1.3 Perceptive Mobile Networks (PMNs) 81 4.1.4 Quantum-Enabled 6G Wireless Networks 82 4.1.5 From Softwarized to Blockchainized Mobile Networks 83 4.1.6 AI-Native 6G Networks 84 4.1.6.1 From 5G AI4Net to 6G Net4AI 84 4.1.6.2 Intelligence-Endogenous Network (IEN) 86 4.1.6.3 Native Edge AI: Mimicking Nature Through Brain-Inspired Stigmergy 87 4.1.7 THz Communications: An Old Problem Revisited 89 4.1.8 Comparison between NG-OANs and 6G RANs 90 4.1.9 6G Standardization Roadmap 91 4.2 NSF: Next G Research 92 4.3 Next G Alliance Roadmap 93 4.3.1 Six Audacious Goals 93 4.3.2 Societal and Economic Needs 95 4.3.3 The Four Fundamental Areas for 6G Applications and Use Cases 96 References 98 Chapter 5 6G Post-Smartphone Era: XR and Hybrid-Augmented Intelligence 101 5.1 XR in the 6G Post-Smartphone Era 101 5.1.1 Internet of No Things: The Gadget-Free Internet 103 5.1.2 Extended Reality (XR): Unleashing Its Full Potential 104 5.1.3 Invisible-to-Visible (I2V) Technologies 105 5.1.4 Extrasensory Perception (ESP) 107 5.1.5 Mimicking the Quantum Realm: Nonlocal Awareness of Space and Time 108 5.1.5.1 Precognition 109 5.1.5.2 Eternalism 110 5.2 Hybrid-Augmented Intelligence 114 5.2.1 Ethereum: The DAO 116 5.2.2 DAO Use Case: Decentralizing Technosocial Systems 117 5.2.2.1 The Tactile Internet: Key Principles 118 5.2.2.2 FiWi-enhanced Mobile Networks: Spreading Ownership 119 5.2.2.3 Decentralizing the Tactile Internet: AI-Enhanced MEC and Crowdsourcing 120 5.2.3 From AI to Human Intelligence Amplification (IA) 124 5.2.3.1 Cognitive Assistance 124 5.2.3.2 Hybrid-Augmented Intelligence 125 5.2.3.3 Decentralized Self-Organizing Cooperative 125 5.2.4 Collective Intelligence: Nudging via Smart Contract 126 References 128 Chapter 6 Web3 and Token Engineering 131 6.1 Emerging Web3 Token Economy 131 6.2 Backend Revolution 132 6.3 Technology-Enabled Social Organisms 132 6.4 Tokens 133 6.4.1 Tokenization: Creation of Tokenized Digital Twins 133 6.4.2 Token Contract 134 6.4.3 Fungible Tokens vs. Non-Fungible Tokens (NFTs) 134 6.4.4 Purpose-Driven Tokens 136 6.4.4.1 Public Goods and Externalities 136 6.4.4.2 Club Goods and Tech-Driven Public Goods 137 6.5 Mechanism Design and Token Engineering 138 References 140 Chapter 7 From Robonomics to Tokenomics 141 7.1 Robonomics 141 7.2 Blockchain Oracles and On-Chaining 142 7.3 Blockchain-Enabled Trust Game 143 7.3.1 Open Research Challenges 144 7.3.2 Blockchain-Enabled Implementation 146 7.3.2.1 Experimenter Smart Contract 146 7.3.2.2 Blockchain Mechanism Deposit 147 7.3.2.3 Experimental Validation 148 7.4 On-Chaining Oracle for Networked N-Player Trust Game 150 7.4.1 Architecture of Oracle 151 7.4.2 On-Chaining of Voting-Based Decisions 153 7.4.3 Experimental Validation 153 7.5 Playing the N-Player Trust Game with Persuasive Robots 155 7.6 Tokenomics 161 References 162 Chapter 8 Society 5.0: Internet As If People Mattered 165 8.1 Human Nature: Bounded Rationality and Predictable Irrationality 166 8.2 Society 5.0: Human-Centeredness 167 8.3 The Path (DAO) to a Human-Centered Society 168 8.3.1 Token Engineering DAO Framework for Society 5.0 168 8.3.2 The Human Use of Human Beings: Cybernetics and Society 170 8.4 From Biological Superorganism to Stigmergic Society 171 8.4.1 Stigmergy Enhanced Society 5.0: Toward the Future Stigmergic Society 172 8.4.2 Implementation 173 8.4.3 Experimental Results 175 8.5 Biologization: Exiting the Anthropocene and Entering the Symbiocene 176 References 178 Chapter 9 Metahuman: Unleashing the Infinite Potential of Humans 179 9.1 Becoming Human: The Biological Uniqueness of Humans 179 9.1.1 Social Cognition 180 9.1.2 Coordinated Decision-Making 180 9.1.3 Uniquely Human Sociality 182 9.1.4 How Evolution Makes Us Smarter and More Social 183 9.2 Implications of Biological Human Uniqueness for Metaverse 185 9.3 MetaHuman Creator: Building a More Realistic Virtual World 189 9.3.1 Crossing the Uncanny Valley 189 9.3.2 Infinite Reality: Embodied Avatars and Eternal Life 190 9.3.2.1 Embodied Avatars 191 9.3.2.2 Eternal Life: Virtual Immortality 192 9.4 The Case Against Reality: Why Evolution Hid the Truth from Our Eyes 193 9.4.1 Cognitive Science: From Token Economy to the World as a Network of Conscious Agents 193 9.4.2 The Fitness-Beats-Truth Theorem 194 9.5 Simulated Reality: The Simulation Hypothesis 195 9.6 Metareality and Metahuman 196 9.6.1 The Human Condition 197 9.6.2 Deus Ex Machina 197 References 198 Chapter 10 Opportunities vs. Risks 201 10.1 The “New New Normal” and Upcoming T Junction 202 10.2 Opportunities 207 10.2.1 An Inconvenient Truth for Everything: Earth Inc. vs. Global Mind 207 10.2.2 The Social Singularity 209 10.2.2.1 Social Physics and Human Hive Mind 209 10.2.2.2 Ethereum: The World Computer 210 10.2.2.3 Extended Stigmergy in Dynamic Media 210 10.2.3 6G, Next G, and the Metaverse: Toward the Peak-Experience Machine 211 10.2.3.1 The Experience Machine 212 10.2.3.2 Toward Peak-Experiences 212 10.2.3.3 Deus Ex Machina Technologies 214 10.3 Risks 215 10.3.1 Ray Kurzweil’s Age of Spiritual Machines 216 10.3.2 Platform Capitalism: Uberworked and Underpaid 217 10.3.3 BUMMER Machine 2.0 218 10.4 Team Human: From Communications to Communitas 220 10.4.1 Self-Refuting Tech Prophecy 221 10.4.2 The Human Strategy 221 10.4.3 Understanding Thinking: From Silicon Valley and Computation to Human Reasoning and Intelligence 222 10.4.4 Communitas: Fusion of Self and World 225 10.4.4.1 Transcendent Experiences 225 10.4.4.2 Communitas: Jumping the Gap into the Future 226 10.4.5 Team Human: Are We in the Midst of the Next Renaissance? 228 References 230 Chapter 11 Conclusion and Outlook 233 11.1 Today’s Life in “Parallel Universes” 233 11.2 The Road Ahead to the Future Multiverse: 6G, Next G, and the Metaverse 235 11.2.1 Metaverse: Mirror of Real World Rather than Virtual Escape Hatch 235 11.2.2 Overcoming 6G and Next G Blind Spots 237 11.2.3 Super Smart Society 5.0: From Galileo’s Telescope to Metaverse’s Telóscope 242 11.3 Age of Discovery: Navigating the Risks and Rewards of Our New Renaissance 247 11.3.1 The Formula for Mass Flourishing 248 11.3.2 Cognitive Blind Spots: Social Complexity vs. Cognitive Capacity 250 References 252 Epilogue 253 Index 257
£65.25
John Wiley & Sons Inc Laser InterSatellite Links Technology
Book SynopsisLASER INTER-SATELLITE LINKS TECHNOLOGY State of the art resource covering key technologies and related theories of inter-satellite links Laser Inter-Satellite Links Technology explores satellite networking as a growing topic in the field of communication technology, introducing the definition, types, and working frequency bands of inter-satellite links, discussing the number of orbital elements of the spacecraft motion state under two-body motion and their conversion relationship, and establishing the basic demand model for inter-satellite link network, chain topology model, and transmission protocol model. The book focuses on the analysis and introduction of the principles and error sources of microwave and laser inter-satellite ranging, including the basic composition, workflow, and constraints of the laser inter-satellite link, and related design principles of the inter-satellite laser transmitter and receivers. Later chapters also discuss theories andTable of ContentsAuthor Biography xi Preface xiii 1 Introduction 1 1.1 Connotation of Inter-Satellite Link 1 1.2 Types of Inter-Satellite Links 5 1.3 Band Selection of Inter-Satellite Link 7 1.3.1 Selection of Link Band 7 1.3.2 Selection of Working Frequency 8 1.4 Microwave Inter-Satellite Link 10 1.4.1 Frequency Selection 10 1.4.2 Microwave Inter-Satellite Link Data Transmission System 12 1.5 Laser Inter-Satellite Link 14 1.5.1 Technical Characteristics of Laser Inter-Satellite Link 14 1.5.2 Future Requirements for Laser Inter-Satellite Links 15 1.5.3 Development Trend of Laser Inter-Satellite Links 16 1.5.3.1 The Development of Laser Communication Technology from Technical Verification to Engineering Application Stage 16 1.5.3.2 The Communication Rate Develops from Low Code Rate to High Code Rate 16 1.5.3.3 Deep Space Will Become an Important Place for Laser Communication Applications 17 1.5.3.4 Combined Use of Laser Communication and Laser Ranging 18 1.5.3.5 Integration and Miniaturization of Laser Communication Terminals 18 1.5.3.6 Networking of Laser Inter-Satellite Links 19 References 19 2 Development History of Laser Inter-Satellite Link 21 2.1 Development Stage of Laser Inter-Satellite Link 21 2.2 Development Status of Laser Inter-Satellite Link Technology in Various Countries 22 2.2.1 United States 22 2.2.1.1 Lunar Laser Communication Demonstration 26 2.2.1.2 Relay Laser Communication Demonstration (LCRD) (GEO-Ground) 27 2.2.1.3 Integrated Laser Communication Terminal (ILLUMA-T) 30 2.2.1.4 Deep Space Optical Communication (DSOC) Project Terminal Reaches Level 6 Technology Maturity 30 2.2.1.5 Ultra-Light and Small Communication Terminal (OSCD) 33 2.2.2 Europe 33 2.2.2.1 Semiconductor Laser Inter-Satellite Link Experiment 33 2.2.2.2 European Data Relay Satellite System Project (EDRS) 34 2.2.2.3 Micro Laser Communication Terminal (OPTEL-μ) 35 2.2.3 Japan 36 2.2.3.1 Japanese Data Relay Satellite 37 2.2.3.2 High-Speed Communication of Advanced Laser Instruments 38 2.2.3.3 Miniaturized Laser Communication Terminal (SOTA) 39 2.3 Experience and Inspiration 39 2.3.1 Strengthen the Research on New Laser Inter-Satellite Links and Enhance the Innovation of Technology Research and Development 40 2.3.2 Strengthen the On-Orbit Verification of New Technologies and Improve the Engineering Level of New Technologies 40 2.3.3 Simplify the Product Spectrum and Promote the Construction of Product Pipelines 40 2.3.4 Respond to Commercial Product Demand and Reduce Product Cost 41 2.3.5 The Key Development Direction of Low-Orbit Laser Inter-Satellite Link Engineering Demonstration Work 41 References 41 3 Spacecraft Orbits and Application 45 3.1 Overview 45 3.2 Kepler’s Laws 46 3.2.1 Kepler’s First Law 46 3.2.2 Kepler’s Second Law 47 3.2.3 Kepler’s Third Law 47 3.3 Two-Body Motion and Orbital Parameters 47 3.3.1 Two-Body Movement 47 3.3.2 Track Parameters 49 3.4 Near-Earth Space Orbits and Applications 53 3.4.1 Track Type 54 3.4.2 Sub-Satellite Point Trajectory 54 3.4.3 Several Commonly Used Tracks 55 3.4.3.1 Sun-Synchronous Orbit 55 3.4.3.2 Return to the Track 56 3.4.3.3 Geosynchronous Orbit 57 3.4.3.4 Freeze the Track 58 3.4.4 Overlay 59 3.4.4.1 Coverage Area 59 3.4.4.2 Minimum Observation Angle 60 References 61 4 Basic Model of Constellation Inter-Satellite Link Networking 63 4.1 Application Requirements of Satellite Navigation Inter-Satellite Links 63 4.1.1 Constellation Precise Orbit Determination and Time Synchronization 64 4.1.2 Data Communication 64 4.1.3 Autonomous Operation 65 4.1.4 Extended Service 65 4.2 Basic Requirement Model of Inter-Satellite Link Network Application 66 4.2.1 Basic Configuration of Constellations 66 4.2.2 Inter-Satellite Transmission Network Based on STDMA 67 4.2.3 Antenna Solution 71 4.2.4 Inter-Satellite Link Application Mode 72 4.3 Inter-Satellite Link Network Chain Topology Model 74 4.3.1 Analysis of Topological Attribute of Inter-Satellite Links 74 4.3.2 Inter-Satellite Visibility Analysis 74 4.3.3 Inter-Satellite Link Topology Cost 77 4.3.3.1 Path Loss 78 4.3.3.2 Transmission Loss 79 4.3.3.3 Protocol Overhead 82 4.4 Inter-Satellite Link Network Protocol Model 83 4.4.1 Inter-Satellite Network Protocol Model 83 4.4.2 Transport Layer Protocol 84 References 85 5 Principles of Laser Inter-Satellite Ranging 87 5.1 Principle of Inter-Satellite Ranging 87 5.2 Inter-Satellite Ranging Accuracy 88 5.3 Principle of Microwave Inter-Satellite Ranging 89 5.3.1 Principle of Pseudo-Range Two-Way Ranging 89 5.3.2 Analysis of Error Sources in Microwave Ranging 91 5.3.2.1 Antenna Phase Center Error 91 5.3.2.2 Device Circuit Delay Error 93 5.3.2.3 Multipath Effect Error 93 5.3.2.4 Ionospheric Delay Error 93 5.3.2.5 Relativistic Effect Error 94 5.4 Principle of Laser Inter-Satellite Ranging 95 5.4.1 Principle of Laser Pulse Ranging 95 5.4.2 Analysis of Error Sources in Laser Ranging 96 References 97 6 Composition of Laser Inter-Satellite Link 99 6.1 Basic Structure of Laser Inter-Satellite Link 99 6.1.1 Optical Transmitting Subsystem 99 6.1.2 Light Receiving Subsystem 100 6.1.3 Align, Capture, Track Subsystem (PAT) 101 6.2 Workflow of Laser Inter-Satellite Link 101 6.3 Constraints 103 6.3.1 Satellite Orbit 103 6.3.2 Satellite Attitude 104 6.3.3 Uncertain Angle of Pre-Cover 105 6.3.4 Satellite Vibration Problem 106 6.3.5 Dynamic Coupling Problem 107 6.3.6 Influence of Background Stray Light 107 6.4 Transmitter Design 110 6.4.1 Choice of Laser 110 6.4.2 Wavelength Selection 111 6.4.3 Selection of the Diameter of the Transmitting Antenna 112 6.4.4 Calculation of Transmitting Antenna Gain 112 6.5 Receiver Design 113 6.5.1 Selection of Receiver Detector 113 6.5.2 Selection of Receiving Antenna Aperture 114 6.5.3 Calculation of Receiving Antenna Gain 114 6.5.4 Calculation of Received Power 115 References 115 7 Inter-Satellite Laser Capture, Aiming, and Tracking System 117 7.1 Introduction 117 7.2 Acquisition 119 7.2.1 Capture Scheme 120 7.2.1.1 Stare-Scan 120 7.2.1.2 Scan-Scan 121 7.2.2 Capture Path 122 7.3 Pointing 123 7.4 Tracking 124 7.4.1 Analysis of Tracking System Beacon Beam Divergence 124 7.4.2 The Role of the Tracking System in the APT System 126 7.5 APT System Terminal Structure 128 7.5.1 Coarse Sight Subsystem Design 129 7.5.1.1 Coarse Sight Subsystem Composition 129 7.5.1.2 Coarse Aiming Control Subsystem Design 132 7.5.2 Design of Precision Sighting Subsystem 133 7.5.2.1 The Composition of the Precision Aiming Subsystem 133 7.5.2.2 Design of Precision Aiming Control System 135 References 136 8 Inter-Satellite Laser Link Tracking Error 139 8.1 Definition of Alignment Error 139 8.2 Alignment Error Model and Factor Analysis 140 8.2.1 Mathematical Modeling of Alignment Errors 140 8.2.2 Factors Causing Alignment Errors 143 8.2.3 Influence of Tracking Error on Beam Distribution at Receiver 144 8.2.3.1 The Effect of Tracking Error on the Beam Intensity at the Receiving End 145 8.2.3.2 Influence of Tracking Error on Beam Power at Receiver 146 8.2.4 Influence of Tracking and Pointing Error on Communication Error Rate 147 8.3 Analysis of Tracking and Pointing Error Sources of Inter-Satellite Laser Communication System 149 8.3.1 Satellite Platform Vibration 151 8.3.2 Detector Noise 152 8.3.2.1 Characteristics and Types of Detector Noise 152 8.3.2.2 Effect of Detector Noise on System Performance 155 8.4 Satellite Platform Vibration Suppression Scheme 157 8.4.1 Satellite Platform Vibration Suppression Scheme 157 8.4.1.1 Passive Vibration Isolation 157 8.4.1.2 Active Control 158 8.4.2 Feedforward Vibration Suppression Algorithm 159 8.4.2.1 Influence of Satellite Platform Vibration on Precision Aiming Control System 159 8.4.2.2 Analysis of Feedforward Vibration Suppression Algorithm 161 References 165 9 Inter-Satellite Link Laser Modulation Mode 167 9.1 Block Diagram of Inter-Satellite Link Optical Communication System 167 9.2 Typical Incoherent Optical Modulation (IM/DD) 168 9.2.1 On-Off Key Control 169 9.2.2 Pulse Position Modulation 169 9.2.3 Differential Pulse Position Modulation 169 9.2.4 Digital Pulse Interval Modulation 171 9.2.5 Double Head Pulse Interval Modulation 171 9.3 Coherent Optical Communication Modulator and Modulation Principle 172 9.3.1 Optical Modulator 173 9.3.2 Coherent Optical Communication Modulation Format 174 9.3.2.1 Binary Phase Shift Keying 174 9.3.2.2 Quaternary Phase Shift Keying 175 9.3.2.3 8psk 176 9.3.2.4 8qam 178 9.4 Comparison of Communication Performance of Laser Modulation Schemes 179 9.4.1 Average Transmit Power 179 9.4.1.1 OOK 179 9.4.1.2 PPM 179 9.4.1.3 DPPM 179 9.4.1.4 DPIM 180 9.4.1.5 DH-PIM 180 9.4.1.6 Coherent PSK 180 9.4.2 Transmission Bandwidth 180 9.4.2.1 PPM 180 9.4.2.2 DPPM 181 9.4.2.3 DPIM 181 9.4.2.4 DH-PIM 181 9.4.2.5 Coherent PSK 181 9.4.3 Bit Error Rate 181 9.4.3.1 OOK 182 9.4.3.2 PPM 182 9.4.3.3 DPPM 182 9.4.3.4 DPIM 183 9.4.3.5 DH-PIM 183 9.4.3.6 BPSK 183 9.4.4 Summary 183 References 184 Index 187
£91.80
John Wiley & Sons Inc LTE Advanced
Book SynopsisExamining the main technical enhancements brought by LTE-Advanced (LTE-A), this book thoroughly covers 3GPP R10 and R11 specifications. Using illustrations, graphs and real-life scenarios, the authors systematically lead readers through this cutting-edge topic to provide an outlook on existing technologies as well as possible future developments.Table of ContentsList of Contributors xiii Preface xv Acknowledgements xvii List of Abbreviations xix 1 Introduction 1Harri Holma and Antti Toskala 1.1 Introduction 1 1.2 Radio Technology Convergence Towards LTE 1 1.3 LTE Capabilities 3 1.4 Underlying Technology Evolution 4 1.5 Traffic Growth 4 1.6 LTE-Advanced Schedule 6 1.7 LTE-Advanced Overview 6 1.8 Summary 7 2 LTE-Advanced Standardization 8Antti Toskala 2.1 Introduction 8 2.2 LTE-Advanced and IMT-Advanced 8 2.3 LTE-Advanced Requirements 9 2.4 LTE-Advanced Study and Specification Phases 10 2.5 Further LTE-Advanced 3GPP Releases 11 2.6 LTE-Advanced Specifications 11 2.7 Conclusions 12 References 12 3 LTE Release 8 and 9 Overview 14Antti Toskala 3.1 Introduction 14 3.2 Physical Layer 14 3.3 Architecture 22 3.4 Protocols 23 3.5 EPC and IMS 26 3.6 UE Capability and Differences in Release 8 and 9 27 3.7 Conclusions 28 References 29 4 Downlink Carrier Aggregation 30Mieszko Chmiel and Antti Toskala 4.1 Introduction 30 4.2 Carrier Aggregation Principle 30 4.3 Protocol Impact from Carrier Aggregation 33 4.4 Physical Layer Impact from Carrier Aggregation 38 4.5 Performance 42 4.6 Band Combinations for Carrier Aggregation 46 4.7 Conclusions 48 Reference 49 5 Uplink Carrier Aggregation 50Jari Lindholm, Claudio Rosa, Hua Wang and Antti Toskala 5.1 Introduction 50 5.2 Uplink Carrier Aggregation Principle 50 5.3 Protocol Impacts from Uplink Carrier Aggregation 51 5.4 Physical Layer Impact from Uplink Carrier Aggregation 52 5.5 Performance 56 5.6 Band Combinations for Carrier Aggregation 61 5.7 Conclusions 62 References 62 6 Downlink MIMO 63Timo Lunttila, Peter Skov and Antti Toskala 6.1 Introduction 63 6.2 Downlink MIMO Enhancements Overview 63 6.3 Protocol Impact from Downlink MIMO Enhancements 64 6.4 Physical Layer Impact from Downlink MIMO 65 6.5 Performance 70 6.6 Conclusions 73 References 74 7 Uplink MIMO 75Timo Lunttila, Kari Hooli, YuYu Yan and Antti Toskala 7.1 Introduction 75 7.2 Uplink MIMO Enhancements Overview 75 7.3 Protocol Impacts from Uplink MIMO 76 7.4 Physical Layer Impacts from Uplink MIMO 77 7.4.1 Uplink Reference Signal Structure 77 7.4.2 MIMO Transmission for Uplink Data 79 7.4.3 MIMO Transmission for Uplink Control Signalling 82 7.4.4 Multi-User MIMO Transmission in the Uplink 82 7.5 Performance 83 7.6 Conclusions 84 References 85 8 Heterogeneous Networks 86Harri Holma, Patrick Marsch and Klaus Pedersen 8.1 Introduction 86 8.2 Base Station Classes 87 8.3 Traffic Steering and Mobility Management 89 8.3.1 Traffic Steering and Mobility Management in Idle State 90 8.3.2 Traffic Steering and Mobility Management in the Connected State 91 8.3.3 Traffic Steering and Mobility Management with Femto Cells 91 8.3.4 WiFi Offloading 92 8.4 Interference Management 94 8.4.1 Static Interference Avoidance through Frequency Reuse Patterns 96 8.4.2 Dynamic Interference Coordination in the Frequency Domain 97 8.4.3 Dynamic Interference Coordination in the Time Domain 98 8.4.4 Dynamic Interference Coordination in the Power Domain 101 8.5 Performance Results 101 8.5.1 Macro and Outdoor Pico Scenarios 102 8.5.2 Macro and Femto Scenarios 105 8.6 Local IP Access (LIPA) 107 8.7 Summary 108 References 108 9 Relays 110Harri Holma, Bernhard Raaf and Simone Redana 9.1 Introduction 110 9.2 General Overview 111 9.3 Physical Layer 112 9.3.1 Inband and Outband Relays 112 9.3.2 Sub-frames 113 9.3.3 Retransmissions 115 9.3.4 Relays Compared to Repeaters 116 9.3.5 Relays in TD-LTE 118 9.4 Architecture and Protocols 118 9.4.1 Sub-frame Configuration with Relay Nodes 118 9.4.2 Bearer Usage with Relay Nodes 119 9.4.3 Packet Header Structure in the Relay Interface 120 9.4.4 Attach Procedure 121 9.4.5 Handovers 121 9.4.6 Autonomous Neighbour Relations 122 9.5 Radio Resource Management 124 9.6 Coverage and Capacity 125 9.6.1 Coverage Gain 126 9.6.2 User Throughput Gains 128 9.6.3 Cost Analysis 129 9.7 Relay Enhancements 130 9.8 Summary 132 References 132 10 Self-Organizing Networks (SON) 135Cinzia Sartori and Harri Holma 10.1 Introduction 135 10.2 SON Roadmap in 3GPP Releases 135 10.3 Self-Optimization 137 10.3.1 Mobility Robustness Optimization 137 10.3.2 Mobility Load Balancing 142 10.3.3 Minimization of Drive Tests 142 10.3.4 MDT Management and Reporting 144 10.3.5 Energy Savings 145 10.3.6 eNodeB Overlay 146 10.3.7 Capacity-Limited Network 147 10.3.8 Capacity and Coverage Optimization 148 10.4 Self-Healing 150 10.4.1 Cell Outage Compensation 150 10.5 SON Features in 3GPP Release 11 151 10.6 Summary 151 References 152 11 Performance Evaluation 153Harri Holma and Klaus Pedersen 11.1 Introduction 153 11.2 LTE-Advanced Targets 154 11.2.1 ITU Evaluation Environments 155 11.3 LTE-Advanced Performance Evaluation 156 11.3.1 Peak Data Rates 156 11.3.2 UE Categories 157 11.3.3 ITU Efficiency Evaluation 158 11.3.4 3GPP Efficiency Evaluation 160 11.4 Network Capacity and Coverage 163 11.5 Summary 165 References 165 12 Release 11 and Outlook Towards Release 12 166Timo Lunttila, Rapeepat Ratasuk, Jun Tan, Amitava Ghosh and Antti Toskala 12.1 Introduction 166 12.2 Release 11 LTE-Advanced Content 166 12.3 Advanced LTE UE Receiver 168 12.3.1 Overview of MMSE-MRC and MMSE-IRC Methods 169 12.3.2 Performance of UE Receiver using IRC and its Comparison to MRC Receiver for Various DL Transmit Modes 170 12.4 Machine Type Communications 172 12.5 Carrier Aggregation Enhancements 177 12.6 Enhanced Downlink Control Channel 179 12.7 Release 12 LTE-Advanced Outlook 181 12.8 Conclusions 183 References 183 13 Coordinated Multipoint Transmission and Reception 184Harri Holma, Kari Hooli, Pasi Kinnunen, Troels Kolding, PatrickMarsch and Xiaoyi Wang 13.1 Introduction 184 13.2 CoMP Concept 184 13.3 Radio Network Architecture Options 187 13.4 Downlink CoMP Transmission 190 13.4.1 Enablers for Downlink CoMP in 3GPP 191 13.4.2 Signal Processing and RRM for CoMP 192 13.4.3 Other Implementation Aspects 194 13.5 Uplink CoMP Reception 194 13.6 Downlink CoMP Gains 198 13.7 Uplink CoMP Gains 201 13.8 CoMP Field Trials 204 13.9 Summary 205 References 205 14 HSPA Evolution 206Harri Holma and Karri Ranta-aho 14.1 Introduction 206 14.2 Multicarrier Evolution 206 14.3 Multiantenna Evolution 208 14.4 Multiflow Transmission 211 14.5 Small Packet Efficiency 213 14.6 Voice Evolution 215 14.6.1 Adaptive Multirate Wideband (AMR-WB) Voice Codec 215 14.6.2 Voice Over IP (VoIP) 215 14.6.3 CS Voice Over HSPA (CSoHSPA) 215 14.6.4 Single Radio Voice Call Continuity (SR-VCC) 215 14.7 Advanced Receivers 215 14.7.1 Advanced UE Receivers 215 14.7.2 Advanced NodeB Receivers 216 14.8 Flat Architecture 217 14.9 LTE Interworking 218 14.10 Summary 218 References 219 Index 221
£71.96
John Wiley & Sons Inc Mobile and Wireless Communications for
Book SynopsisA timely addition to the understanding of IMT-Advanced, this book places particular emphasis on the new areas which IMT-Advanced technologies rely on compared with their predecessors. These latest areas include Radio Resource Management, Carrier Aggregation, improved MIMO support and Relaying. Each technique is thoroughly described and illustrated before being surveyed in context of the LTE-Advanced standards. The book also presents state-of-the-art information on the different aspects of the work of standardization bodies (such as 3GPP and IEEE), making global links between them. Explores the latest research innovations to assess the future of the LTE standard Covers the latest research techniques for beyond IMT-Advanced such as Coordinated multi-point systems (CoMP), Network Coding, Device-to-Device and Spectrum Sharing Contains key information for researchers from academia and industry, engineers, regulators and decision makers working on LTE-AdvanTrade Review"The book is up with the latest thinking and standards, and as such provides a particularly useful coverage of the way in which cellular telecommunications is moving. It would be a valuable addition to the library of any individual or company that is serious about keeping up with the latest LTE technology." (Radio-Electronics.com, 1 January 2012) Table of ContentsAbout the Editors xiii Preface xv Acknowledgements xvii List of Abbreviations xix List of Contributors xxv 1 Introduction 1 1.1 Market and Technology Trends 1 1.2 Technology Evolution 3 1.3 Development of IMT-Advanced and Beyond 6 References 8 2 Radio Resource Management 11 2.1 Overview of Radio Resource Management 11 2.2 Resource Allocation in IMT-Advanced Technologies 13 2.2.1 Main IMT-Advanced Characteristics 13 2.2.2 Scheduling 16 2.2.3 Interference Management 16 2.2.4 Carrier Aggregation 18 2.2.5 MBMS Transmission 18 2.3 Dynamic Resource Allocation 19 2.3.1 Resource Allocation and Packet Scheduling Using Utility Theory 19 2.3.2 Resource Allocation with Relays 22 2.3.3 Multiuser Resource Allocation Maximizing the UE QoS 24 2.3.4 Optimization Problems and Performance 26 2.4 Interference Coordination in Mobile Networks 26 2.4.1 Power Control 27 2.4.2 Resource Partitioning 28 2.4.3 MIMO Busy Burst for Interference Avoidance 33 2.5 Efficient MBMS Transmission 35 2.5.1 MBMS Transmission 36 2.5.2 Performance Assessment 37 2.6 Future Directions of RRM Techniques 39 References 40 3 Carrier Aggregation 43 3.1 Basic Concepts 43 3.2 ITU-R Requirements and Implementation in Standards 45 3.3 Evolution Towards Future Technologies 48 3.3.1 Channel Coding 48 3.3.2 Scheduling 51 3.3.3 Channel Quality Indicator 53 3.3.4 Additional Research Directions 54 3.4 Cognitive Radio Enabling Dynamic/Opportunistic Carrier Aggregation 55 3.4.1 Spectrum Sharing and Opportunistic Carrier Aggregation 56 3.4.2 Spectrum Awareness 58 3.4.3 Cognitive Component Carrier Identification, Selection and Mobility 59 3.5 Implications for Signaling and Architecture 59 3.6 Hardware and Legal Limitations 60 References 61 4 Spectrum Sharing 63 4.1 Introduction 63 4.2 Literature Overview 64 4.2.1 Spectrum Sharing from a Game Theoretic Perspective 66 4.2.2 Femtocells 67 4.3 Spectrum Sharing with Game Theory 68 4.3.1 Noncooperative Case 68 4.3.2 Hierarchical Case 69 4.4 Spectrum Trading 70 4.4.1 Revenue and Cost Function for the Offering Operator 73 4.4.2 Numerical Results 74 4.5 Femtocells and Opportunistic Spectrum Usage 75 4.5.1 Femtocells and Standardization 77 4.5.2 Self-Organized Femtocells 79 4.5.3 Beacon-Based Femtocells 81 4.5.4 Femtocells with Intercell Interference Coordination 82 4.5.5 Femtocells with Game Theory 83 4.6 Conclusion, Discussion and Future Research 84 4.6.1 Future Research 85 References 86 5 Multiuser MIMO Systems 89 5.1 MIMO Fundamentals 89 5.1.1 System Model 91 5.1.2 Point-to-Point MIMO Communications 92 5.1.3 Multiuser MIMO Communications 96 5.1.4 MIMO with Interference 100 5.2 MIMO in LTE-Advanced and 802.16m 101 5.2.1 LTE-Advanced 102 5.2.2 WiMAX Evolution 104 5.3 Generic Linear Precoding with CSIT 104 5.3.1 Transmitter–Receiver Design 105 5.3.2 Transceiver Design with Interference Nulling 110 5.4 CSI Acquisition for Multiuser MIMO 112 5.4.1 Limited Feedback 112 5.4.2 CSI Sounding 113 5.5 Future Directions of MIMO Techniques 114 References 115 6 Coordinated Multi Point (CoMP) Systems 121 6.1 Overview of CoMP 121 6.1.1 CoMP Types 122 6.1.2 Architectures and Clustering 123 6.1.3 Theoretical Performance Limits and Implementation Constraints 126 6.2 CoMP in the Standardization Bodies 129 6.2.1 Overview of CoMP Studies 129 6.2.2 Design Choices for a CoMP Functionality 131 6.3 Generic System Model for Downlink CoMP 133 6.3.1 SINR for Linear Transmissions 133 6.3.2 Compact Matricial Model 134 6.4 Joint Processing Techniques 134 6.4.1 State of the Art 135 6.4.2 Potential of Joint Processing 136 6.4.3 Dynamic Joint Processing 137 6.4.4 Uplink Joint Processing 141 6.5 Coordinated Beamforming and Scheduling Techniques 142 6.5.1 State of the Art 142 6.5.2 Decentralized Coordinated Beamforming 143 6.5.3 Coordinated Scheduling via Worst Companion Reporting 145 6.6 Practical Implementation of CoMP in a Trial Environment 147 6.6.1 Setup and Scenarios 149 6.6.2 Measurement Results 149 6.7 Future Directions 151 References 152 7 Relaying for IMT-Advanced 157 7.1 An Overview of Relaying 157 7.1.1 Relay Evolution 158 7.1.2 Relaying Deployment Scenarios 159 7.1.3 Relaying Protocol Strategies 160 7.1.4 Half Duplex and Full Duplex Relaying 162 7.1.5 Numerical Example 162 7.2 Relaying in the Standard Bodies 164 7.2.1 Relay Types in LTE-Advanced Rel-10 164 7.2.2 Relay Nodes in IEEE 802.16m 166 7.3 Comparison of Relaying and CoMP 166 7.3.1 Protocols and Resource Management 167 7.3.2 Simulation Results 169 7.4 In-band RNs versus Femtocells 171 7.5 Cooperative Relaying for Beyond IMT-Advanced 173 7.6 Relaying for beyond IMT-Advanced 176 7.6.1 Multihop RNs 176 7.6.2 Mobile Relay 177 7.6.3 Network Coding 177 References 177 8 Network Coding in Wireless Communications 181 8.1 An Overview of Network Coding 181 8.1.1 Historical Background 182 8.1.2 Types of Network Coding 183 8.1.3 Applications of Network Coding 183 8.2 Uplink Network Coding 188 8.2.1 Detection Strategies 188 8.2.2 User Grouping 190 8.2.3 Relay Selection 191 8.2.4 Performance 192 8.2.5 Integration in IMT-Advanced and Beyond 194 8.3 Nonbinary Network Coding 194 8.3.1 Nonbinary NC based on UE Cooperation 195 8.3.2 Nonbinary NC for Multiuser and Multirelay 196 8.3.3 Performance 197 8.3.4 Integration in IMT-Advanced and Beyond 198 8.4 Network Coding for Broadcast and Multicast 199 8.4.1 Efficient Broadcast Network Coding Scheme 200 8.4.2 Performance 201 8.5 Conclusions and Future Directions 202 References 203 9 Device-to-Device Communication 207 9.1 Introduction 207 9.2 State of the Art 208 9.2.1 In Standards 208 9.2.2 In Literature 210 9.3 Device-to-Device Communication as Underlay to Cellular Networks 211 9.3.1 Session Setup 212 9.3.2 D2D Transmit Power 214 9.3.3 Multiantenna Techniques 215 9.3.4 Radio Resource Management 220 9.4 Future Directions 225 References 228 10 The End-to-end Performance of LTE-Advanced 231 10.1 IMT-Advanced Evaluation: ITU Process, Scenarios and Requirements 231 10.1.1 ITU-R Process for IMT-Advanced 232 10.1.2 Evaluation Scenarios 234 10.1.3 Performance Requirements 235 10.2 Short Introduction to LTE-Advanced Features 238 10.2.1 The WINNER+ Evaluation Group Assessment Approach 238 10.3 Performance of LTE-Advanced 239 10.3.1 3GPP Self-evaluation 239 10.3.2 Simulative Performance Assessment by WINNER+ 241 10.3.3 LTE-Advanced Performance in the Rural Indian Open Area Scenario 243 10.4 Channel Model Implementation and Calibration 243 10.4.1 IMT-Advanced Channel Model 243 10.4.2 Calibration of Large-Scale Parameters 246 10.4.3 Calibration of Small-Scale Parameters 247 10.5 Simulator Calibration 248 10.6 Conclusion and Outlook on the IMT-Advanced Process 249 References 250 11 Future Directions 251 11.1 Radio Resource Allocation 252 11.2 Heterogeneous Networks 252 11.3 MIMO and CoMP 253 11.4 Relaying and Network Coding 254 11.5 Device-to-Device Communications 254 11.6 Green and Energy Efficiency 255 References 256 Appendices 259 Appendix A Resource Allocation 261 A.1 Dynamic Resource Allocation 261 A.1.1 Utility Predictive Scheduler 261 A.1.2 Resource Allocation with Relays 261 A.2 Multiuser Resource Allocation 263 A.2.1 PHY/MAC Layer Model 263 A.2.2 APP Layer Model 263 A.2.3 Optimization Problem 264 A.2.4 Simulation Results 265 A.3 Busy Burst Extended to MIMO 266 A.4 Efficient MBMS Transmission 267 A.4.1 Service Operation 267 A.4.2 Frequency Division Multiplexing (FDM) Performance 268 Appendix B Spectrum Awareness 269 B.1 Spectrum Sensing 269 B.2 Geo-Location Databases 270 B.3 Beacon Signaling 270 Appendix C CoordinatedMultiPoint (CoMP) 271 C.1 Joint Processing Methods 271 C.1.1 Partial Joint Processing 271 C.1.2 Dynamic Base Station Clustering 271 C.2 Coordinated Beamforming and Scheduling 273 C.2.1 Decentralized Coordinated Beamforming 273 C.2.2 Coordinated Scheduling via Worst Companion Reporting 276 C.3 Test-Bed: Distributed Realtime Implementation 276 Appendix D Network Coding 281 D.1 Nonbinary NC based on UE Cooperation 281 D.2 Multiuser and Multirelay Scenario 282 Appendix E LTE-Advanced Analytical Performance and Peak Spectral Efficiency 285 E.1 Analytical and Inspection Performance Assessment by WINNER+ 285 E.1.1 Analytical Evaluation 285 E.1.2 Inspection 286 E.2 Peak Spectral Efficiency Calculation 287 E.2.1 FDD Mode Downlink Direction 287 E.2.2 FDD Mode Uplink Direction 288 E.2.3 TDD Mode Downlink Direction 289 E.2.4 TDD Mode Uplink Direction 291 E.2.5 Comparison with Self-Evaluation 292 References 292 Index 295
£103.50
John Wiley & Sons Inc Mastodon For Dummies
Book SynopsisA little birdy told us you needed to know more about Mastodon Ready to escape the drama of existing social media platforms and try something new and awesome in the world of social media? In Mastodon For Dummies, experienced tech trainers Chris Minnick and Mike McCallister show you exactly how to use Mastodon, the hot decentralized social media offering on the web and destination for thousands of social media migrants. Learn how to sign up for the service on your choice of server and get familiar with the rules of what's sure to become your new favorite app. You'll discover how to connect with other people, attract your own followers, and make yourself right at home in the Mastodon community. In the book, you'll find: Easy-to-follow instructions on how to choose the Mastodon server that suits you bestInstructions for establishing new connections on a new social platform and learning the rules of the roadTips for conducting business on Mastodon and making a home for your home-based businTable of ContentsIntroduction 1 About This Book 1 Foolish Assumptions 3 Icons Used in This Book 3 Beyond the Book 4 Where to Go from Here 4 Chapter 1: Exploring Mastodon 5 A Brief Definition of Mastodon 6 A Brief History of Mastodon 7 Comparing Mastodon to Twitter 8 On Mastodon, conversation is the focus 9 Mastodon is a home, not a site 9 Mastodon is built to serve its community 10 Algorithms aren’t allowed on Mastodon 10 Users aren’t tracked on Mastodon 11 Ads aren’t acceptable (yet) on Mastodon 11 Welcome to the Fediverse! 12 Understanding Federation 13 Chapter 2: Digging into Mastodon 15 Choosing a Server 15 Browsing your options 17 Understanding sign-up speed 18 Reading the rules 19 Previewing a server 19 Meeting the admin 19 Seeing why smaller is better 20 Signing Up 20 Choosing your username 21 Choosing a display name 21 Choosing a password 22 Following the suggested people 23 Customizing Your Profile 24 Starting with the basics 24 Setting options and metadata 26 Viewing and tweaking your profile 28 Choosing featured hashtags 29 Setting Your Preferences 30 Choosing your preferred language 30 Checking out the themes 31 Trying out the advanced web interface 31 Looking at animations and accessibility preferences 32 Glancing at the other options 32 Getting Verified 32 Getting your verification link 33 Linking back to Mastodon 34 But can I have a blue check mark? 34 Securing Your Account 35 Getting an authenticator app 35 Setting up two-factor authentication 36 Understanding Mastodon’s Three Timelines 37 The home timeline 37 The local timeline 38 The federated timeline 39 Signing in Using the Mobile App 39 Chapter 3: Finding and Following Friends and Strangers 45 Searching for Users and Hashtags 46 Searching for users 46 Searching for hashtags 47 Following Other Users 48 Follow freely 48 Finding recommendation lists 49 Following accounts boosted by friends 50 Exploring 50 Following Hashtags 51 Viewing Trending Topics 52 Viewing top hashtags 52 Learning from history 53 Blocking and Filtering 53 Filtering content 53 Finding out who’s blocked 55 Blocking and muting users and servers 56 Unmuting and unblocking 57 Reporting users 58 Chapter 4: Developing a Following 59 Finding Your Friends on Mastodon 59 Searching for fellow Twitter refugees 59 Inviting friends and family 64 Boosting and Favoriting 66 Joining in the Conversation 68 Introducing yourself 69 Asking for advice 69 Asking big questions 69 Being funny 70 Being respectful of others 70 Posting about Mastodon 70 Using Direct Messages 70 Writing and sending direct messages 71 Remembering that direct is not private 72 Chapter 5: Toot, Toot: Writing Effective Posts 73 Knowing the Lingo 73 Instances, nodes, and servers 73 Toots and posts 74 Avoid using birdsite terms 75 Content warnings (CW) 75 Minding Your Manners: Mastodon Etiquette 76 Review the code of conduct 76 Be conversational 76 Build community 77 Using Hashtags 78 Enhancing Your Posts 79 Illustrating your posts with videos and images 81 Creating a poll 83 Setting post privacy 85 Adding a content warning 86 Changing your language 87 Chapter 6: Mastodon for Business 89 Doing Business in the Fediverse 89 Taking it slow 90 Monitoring what other businesses are doing 91 Knowing the Policies of a Server 92 Find out whether business users are allowed 92 Find out whether marketing is allowed 93 Adjusting to Mastodon 94 Make it personal 94 Don’t repeat yourself 94 Ask for guidance 94 Making Positive Contributions 95 Contributing money 95 Contributing expertise 97 Contributing equipment 98 Contributing space 98 Running Your Own Server 98 Chapter 7: Running Your Own Mastodon Instance 99 Building an Instance 99 Hosting your own instance versus using a hosted instance 100 Understanding Masto.host 101 Getting started with Masto.host 101 Opening Your Instance to the World 107 Adding (and limiting) users 107 Defining rules and policies 112 Keeping your instance staffed 115 Funding your instance 116 Keeping Your Instance Running: System Administration 117 Making backups 117 Fighting spam with scripts 118 Supporting user’s discoveries 118 Enforcing the Rules: Moderators 119 Reading reports 119 Fighting spam 122 Disciplining other sites 122 Contributing to the Mastodon Project 123 Reporting bugs and making suggestions 123 Preparing documentation 123 Getting involved with your instance 124 Chapter 8: Ten Tools that Integrate with Mastodon 125 Metatext 126 tooot 127 Whalebird 128 Subway Tooter 128 Tusky 129 TheDesk 130 Toot! 131 Tootle 132 Halcyon 133 Hyperspace 134 Chapter 9: Exploring Other Fediverse Platforms 135 PeerTube 135 Discourse 136 Pixelfed 137 Friendica 138 Funkwhale 139 BookWyrm 140 Inventaire 140 Lemmy 141 Owncast 142 Pubcast 142 Index 143
£10.79
Hay House Inc EMFD
Book SynopsisTrade Review“Dr. Mercola’s groundbreaking new book on the health effects of EMFs is both a sobering tale and an effective call to action. Dr. Mercola carefully lays out the history and evidence for the deleterious effects of EMF exposure and gives you real time, concrete steps to take to mitigate the damage for you and your family. As a result of reading this important book, I am redoubling my efforts to protect my family and patients from the harmful effects of EMFs, especially in light of the 5G rollout. This is a fight that involves us all, and Dr. Mercola’s book can help to light the way in this important struggle.” — Thomas Cowan, M.D., author of Human Heart, Cosmic Heart; Vaccines, Autoimmunity, and the Changing Nature of Childhood Illness; and Cancer and the New Biology of Water“Ten years ago, my declining health improved overnight after one simple change to my electrical exposures. If I had known about the health effects of wireless and electrical exposures fifteen years ago, it would have saved over a decade of deep personal pain and suffering. Please read this book and share what you have learned to protect yourself and the ones you love.” — Peter Sullivan, founder of Clear Light Ventures“Want to know how EMFs impact your health? This book gives a masterful account of why our lives and our planet are becoming EMF*D up and what we can do about it. Readable and balanced, it’s a must-read for anyone truly interested in safeguarding their health.” — Lloyd Burrell, author of EMF Practical Guide and founder of ElectricSense.com“5G technology holds the promise for faster connections, greater bandwidth, low latency, a massive internet-of-things, and smart cities. What’s not to like about that? Dr. Mercola has written an easy-to-read and comprehensive book explaining what we know about the potential adverse biological effects of a massive increase in our exposure to EMFs if/when 5G becomes widely available. Even if you don’t use the technology, you can’t opt out because it will be everywhere. This book is the go-to place if you want to become informed about the dangers of EMFs.” — Stephanie Seneff, Ph.D., senior research scientist, MIT Computer Science and Artificial Intelligence Laboratory“Dr. Joseph Mercola’s latest book—EMF*D—introduces the reader to the concept that electronic and wireless technology emits frequencies in the form of dirty electricity and microwave radiation that can harm and are harming our health. This books comes at an interesting time when governments around the world are racing to roll out 5G, 5th generation, wireless technology, without any testing of thebiological and health effects of long-term exposure. As we are increasingly exposed to more radiation via smart meters, smart appliances, Wi-Fi in schools, and now 5G small cell antennas placed on lamp posts every 100 meters or so, a growing number of people are asking, ‘Why the rush to 5G?’ and ‘Do we really need this technology?’ It is no longer enough for us to eat organic, drink purified water, inhale fresh air, exercise, and get plenty of sleep to stay healthy. We must also minimize our exposure to the harmful effects of electromagnetic pollution. Learn how to reduce your exposure and how to repair EMF-related damage by reading Dr. Mercola’s book, EMF*D. You won’t be disappointed!” — Dr. Magda Havas, B.Sc., Ph.D., Professor Emerita, Trent University, Canada“Dr. Joseph Mercola has written the definitive book on electromagnetic fields, with a particular emphasis on how they affect our health. This is an invaluable resource with many practical solutions, especially for those who are EMF-sensitive. For those who don’t yet know about EMFs or who refuse to take them seriously, it will be harder to ignore them after reading this book. Everyone needs to know about the dangers of EMFs. This comprehensive manual will help accomplish that.” — Oram Miller, certified building biology environmental consultant and electromagnetic radiation specialist
£15.29
Johns Hopkins University Press A Telephone for the World
Book SynopsisIn a postCold War world, the Iridium satellite network revealed a new age of globalization. Winner of the William and Joyce Middleton Electrical Engineering History Award by the IEEEIn June 1990, Motorola publicly announced an ambitious business venture called Iridium. The project's signature feature was a constellation of 77 satellites in low-Earth orbit which served as the equivalent of cellular towers, connecting to mobile customers below using wireless hand-held phones. As one of the founding engineers noted, the constellation bathed the planet in radiation, enabling a completely global communications system. Focusing on the Iridium venture, this book explores the story of globalization at a crucial period in US and international history. As the Cold War waned, corporations and nations reoriented toward a new global order in which markets, neoliberal ideology, and the ideal of a borderless world predominated. As a planetary-scale technological system, the project became emblematiTrade ReviewCollins examines the historical development of Motorola's Iridium global telecommunications project, which sought to provide cellular voice service to any point on Earth using a network of 77 low-orbiting satellites... Iridium's Apollo-like saga will capture the interest of general readers in engineering, science, history, sociology, and business, and will serve as an excellent capstone case study. Technical discussions are easy to understand, and the extensive endnotes and bibliography will satisfy the most rigorous scholar.—R. Dupont, Louisiana State University Alexandria, ChoiceThis is an ambitious book that connects technology, capitalism, and globalization. It is all that more audacious because it uses a failed communications platform and business model to make these connections . . . Although Iridium was a business failure, its legacy continues to be a set of cultural, social, and political expectations about global flows of information and capital. As Collins forcefully reminds us, globalization is not a given, but was (and continues to be) "actively fashioned" by those who seek "to project market values, power, and control over the totality of the planet."—David Hochfelder, University at Albany, Journal of American HistoryEngaging, informative, and thought provoking, A Telephone for the World should prove to be of particular interest to business and economic historians skeptical of neoliberal pieties about innovation, to media and communications historians intrigued by the evolution of spectrum management, and to cultural and political historians fascinated by the zeitgeist of the 1990s.—Richard R. John, Columbia University, American Historical ReviewTable of ContentsPrefaceIntroduction1. Iridium and the Global Age2. The Global and the Engineers3. The Global and Iridium the Business4. "Freedom to Communicate"5. From "It's a bird, it's a phone" to "Edsels in the sky"ConclusionNotesBibliographyIndex
£39.00
Taylor & Francis Inc Evolved Cellular Network Planning and
Book SynopsisMost books on network planning and optimization provide limited coverage of either GSM or WCDMA techniques. Few scrape the surface of HSPA, and even fewer deal with TD-SCDMA. Filling this void, Evolved Cellular Network Planning and Optimization for UMTS and LTE presents an accessible introduction to all stages of planning and optimizing UMTS, HSPA, and LTE cellular networks. Supplying a comprehensive explanation of the fundamental aspects of current and future cellular networks, the text starts with an overview of each type of network, including basic techniques and channel models. Next, it examines the challenges operators and vendors are likely to faceexplaining the critical role network planning and optimization play in addressing these challenges. The book details effective system-level simulation methods, it also provides: A complete overview of UMTS, HTrade ReviewThis edited volume provides an introduction to planning and optimization techniques and practices using system level simulation models for advanced cellular networks, covering UMTS (Universal Mobile Telecommunication System), HSPA (high-speed packet access), and LTE (long-term evolution) networks. It also addresses inter-operation issues with existing networks, issues of LTE deployment, troubleshooting, and radio performance analysis. -In Research Book News, booknews.com, February 2011Table of ContentsIntroduction to UMTS: WCDMA, HSPA, TD-SCDMA, and LTE. Overview of Wireless Channel Models for UMTS and LTE. Virtual Drive Test. 3G PLANNING AND OPTIMIZATION. WCDMA Planning and Optimization. TD-SCDMA Network Planning and Optimization. HSPA PLANNING AND OPTIMIZATION. Capacity, Coverage Planning, and Dimensioning for HSPA. Radio Resource Optimization and Scheduling Techniques for HSPA and LTE Advanced Technologies. Teletraffic Engineering for HSDPA and HSUPA Cells. Radio Resource Management for E-MBMS Transmissions towards LTE. Managing Coverage and Interference in UMTS Femtocell Deployments.LTE PLANNING AND OPTIMIZATION. RF Planning and Optimization for LTE Networks. Advanced Radio Access Networks for LTE and Beyond.Physical Uplink Shared Channel (PUSCH) Closed-Loop Power Control for 3G LTE. Key Technologies and Network Planning in TD-LTE Systems. Planning and Optimization of Multihop Relaying Networks. LTE E-MBMS Capacity and Intersite Gains.
£123.50
O'Reilly Media Basic Sensors in iOS
Book SynopsisModern mobile platforms, such as Apple's iPhone and iPad, come with a growing range of sensors; GPS, accelerometers, magnetometers and gyroscopes. This book guides you through how to make use of these sensors, giving you the necessary tools and experience to develop applications that makes best use of the hardware.
£13.59
John Murray Press Mobile Marketing In A Week
Book SynopsisUnderstand mobile marketing fast, without cutting cornersAn understanding of mobile marketing is essential for anyone who wants to reach the growing market of on-the-go consumers. In this short, accessible book, Nick Smith shares a lifetime of hard-earned wisdom and practical advice, giving you, in straightforward language, all the mobile marketing expertise you need to run successful mobile campaigns. The ''in a week'' structure explains the essentials of mobile marketing over just 7 days:Sunday: Why the future is mobileMonday: Basic mobile traffic getting tacticsTuesday: Social mobile marketingWednesday: Mobile pay per click (PPC) marketingThursday: Mobile apps for SMEsFriday: SMS marketingSaturday: Building the ultimate mobile marketing systemAt the end there are questions to ensure you have taken it all in and cartoons, diagrams and visual aids throughout help make Mobile Marketing In A Week an enjoyable and effective lea
£8.54
Taylor & Francis Inc From Internet of Things to Smart Cities
Book SynopsisFrom Internet of Things to Smart Cities: Enabling Technologies explores the information and communication technologies (ICT) needed to enable real-time responses to current environmental, technological, societal, and economic challenges. ICT technologies can be utilized to help with reducing carbon emissions, improving resource utilization efficiency, promoting active engagement of citizens, and more.This book aims to introduce the latest ICT technologies and to promote international collaborations across the scientific community, and eventually, the general public. It consists of three tightly coupled parts. The first part explores the involvement of enabling technologies from basic machine-to-machine communications to Internet of Things technologies. The second part of the book focuses on state of the art data analytics and security techniques, and the last part of the book discusses the design of human-machine interfaces, including smart home and cities.FeatuTable of ContentsFrom Machine-to-Machine Communications to Internet of Things. Cellular Technologies: LTE and 5G. Operating on the License-Free Bands: Wifi, DSRC, Zigbee, and Bluetooth. Network Management and Efficient Architectures. Big Data: Processing, Storage and Analytics. Big Data Processing with High-Performance Computing. Big Data Analytics Platform. Big Data Storage on Cloud. Human Machine Interface. Speech and Audio Interfaces. Multimodal Interfaces for IoT. Inclusive Design Practices for Connected Environments. Security and Privacy. Smart Meter Privacy. Wireless Network Security. Coding Strategies for Secure Communications. Towards Smart World: From Homes to Cities. Smart Home Control Systems. Intelligent Transportation Systems and Internet of Vehicles. Smart City Framework through Internet of Things.
£94.50
University of Minnesota Press The Platform Economy: How Japan Transformed the
Book SynopsisOffering a deeper understanding of today’s internet media and the management theory behind itPlatforms are everywhere. From social media to chat, streaming, credit cards, and even bookstores, it seems like almost everything can be described as a platform. In The Platform Economy, Marc Steinberg argues that the “platformization” of capitalism has transformed everything, and it is imperative that we have a historically precise, robust understanding of this widespread concept. Taking Japan as the key site for global platformization, Steinberg delves into that nation’s unique technological and managerial trajectory, in the process systematically examining every facet of the elusive word platform. Among the untold stories revealed here is that of the 1999 iPhone precursor, the i-mode: the world’s first widespread mobile internet platform, which became a blueprint for Apple and Google’s later dominance of the mobile market. Steinberg also charts the rise of social gaming giants GREE and Mobage, chat tools KakaoTalk, WeChat, and LINE, and video streaming site Niconico Video, as well as the development of platform theory in Japan, as part of a wider transformation of managerial theory to account for platforms as mediators of cultural life. Analyzing platforms’ immense impact on contemporary media such as video streaming, music, and gaming, The Platform Economy fills in neglected parts of the platform story. In narrating the rise and fall of Japanese platforms, and the enduring legacy of Japanese platform theory, this book sheds light on contemporary tech titans like Facebook, Google, Apple, and Netflix, and their platform-mediated transformation of contemporary life—it is essential reading for anyone wanting to understand what capitalism is today and where it is headed.Trade Review"By relocating the origins of the platform economy to Japan’s consumer technology industries of the 1990s, Marc Steinberg offers a powerful intervention into current debates about platformization. This is a book that challenges us to think differently about the business and culture of digital media."—Ramon Lobato, author of Netflix Nations: The Geography of Digital Distribution"Phenomenal. Marc Steinberg rewrites the history of the platform economy. Moving beyond an exclusive focus on Silicon Valley, he demonstrates that a crucial part of this history can be found in 1990s Japan. Steinberg deftly traces the emergence of platform theory and practices around Docomo’s i-mode, exploring intersections with U.S. and French discourse, and ending with the global markets forged by iOS and Android."—Thomas Poell, coauthor of The Platform Society: Public Values in a Connective World"The American tech giants monopolize our attention in daily life; they also tend to hog the attention in technology criticism. Marc Steinberg offers a more expansive and nuanced analysis, showing that the ‘platform’ story did not begin in Silicon Valley and is not likely to end there. A rigorous, illuminating book."—Rebecca Tuhus-Dubrow, author of Personal Stereo"The impressive feat of Steinberg’s book is that it allows both interpretations of platformization to emerge: a fairer crediting of Japanese theories and practices as well as a fuller questioning of global media industry dominance."—Film Quarterly"Readers in many disciplines seeking to better understand how the Android and Apple iOS, Netflix, Amazon, and myriad other everyday commercial experiences have come to be, and how they may change or adapt in ways that Silicon Valley will not necessarily lead, can look to The Platform Economy for global insights and a nuanced analysis of the way words and worlds have been formed, in part, through Japanese iterations of platforms and contents."—The Journal of Popular Culture"The Platform Economy adds a significant dimension to the study of platforms and urges us to think deeply about platformization, as well as the multidirectionality of cultural circulation more broadly."—Critical Inquiry"An important contribution for recapitulating certain concepts in management theory and reconstructing the discursive formation of the term ‘platform.’"—Journal of Japanese Studies Table of ContentsContentsIntroduction1. Contents Discourse: A Platform Prelude2. Platform Typology: From Hardware to Contents3. The Japanese Genesis of Transactional Platform Theory4. Docomo’s i-mode and the Formatting of the Mobile Internet5. Platforms after i-mode: Dwango’s Niconico VideoConclusion: The Platformization of Regional Chat AppsAcknowledgmentsNotesBibliographyIndex
£77.60
University of Minnesota Press The Platform Economy: How Japan Transformed the
Book SynopsisOffering a deeper understanding of today’s internet media and the management theory behind itPlatforms are everywhere. From social media to chat, streaming, credit cards, and even bookstores, it seems like almost everything can be described as a platform. In The Platform Economy, Marc Steinberg argues that the “platformization” of capitalism has transformed everything, and it is imperative that we have a historically precise, robust understanding of this widespread concept. Taking Japan as the key site for global platformization, Steinberg delves into that nation’s unique technological and managerial trajectory, in the process systematically examining every facet of the elusive word platform. Among the untold stories revealed here is that of the 1999 iPhone precursor, the i-mode: the world’s first widespread mobile internet platform, which became a blueprint for Apple and Google’s later dominance of the mobile market. Steinberg also charts the rise of social gaming giants GREE and Mobage, chat tools KakaoTalk, WeChat, and LINE, and video streaming site Niconico Video, as well as the development of platform theory in Japan, as part of a wider transformation of managerial theory to account for platforms as mediators of cultural life. Analyzing platforms’ immense impact on contemporary media such as video streaming, music, and gaming, The Platform Economy fills in neglected parts of the platform story. In narrating the rise and fall of Japanese platforms, and the enduring legacy of Japanese platform theory, this book sheds light on contemporary tech titans like Facebook, Google, Apple, and Netflix, and their platform-mediated transformation of contemporary life—it is essential reading for anyone wanting to understand what capitalism is today and where it is headed.Trade Review"By relocating the origins of the platform economy to Japan’s consumer technology industries of the 1990s, Marc Steinberg offers a powerful intervention into current debates about platformization. This is a book that challenges us to think differently about the business and culture of digital media."—Ramon Lobato, author of Netflix Nations: The Geography of Digital Distribution"Phenomenal. Marc Steinberg rewrites the history of the platform economy. Moving beyond an exclusive focus on Silicon Valley, he demonstrates that a crucial part of this history can be found in 1990s Japan. Steinberg deftly traces the emergence of platform theory and practices around Docomo’s i-mode, exploring intersections with U.S. and French discourse, and ending with the global markets forged by iOS and Android."—Thomas Poell, coauthor of The Platform Society: Public Values in a Connective World"The American tech giants monopolize our attention in daily life; they also tend to hog the attention in technology criticism. Marc Steinberg offers a more expansive and nuanced analysis, showing that the ‘platform’ story did not begin in Silicon Valley and is not likely to end there. A rigorous, illuminating book."—Rebecca Tuhus-Dubrow, author of Personal Stereo"The impressive feat of Steinberg’s book is that it allows both interpretations of platformization to emerge: a fairer crediting of Japanese theories and practices as well as a fuller questioning of global media industry dominance."—Film Quarterly"Readers in many disciplines seeking to better understand how the Android and Apple iOS, Netflix, Amazon, and myriad other everyday commercial experiences have come to be, and how they may change or adapt in ways that Silicon Valley will not necessarily lead, can look to The Platform Economy for global insights and a nuanced analysis of the way words and worlds have been formed, in part, through Japanese iterations of platforms and contents."—The Journal of Popular Culture"The Platform Economy adds a significant dimension to the study of platforms and urges us to think deeply about platformization, as well as the multidirectionality of cultural circulation more broadly."—Critical Inquiry"An important contribution for recapitulating certain concepts in management theory and reconstructing the discursive formation of the term ‘platform.’"—Journal of Japanese Studies Table of ContentsContentsIntroduction1. Contents Discourse: A Platform Prelude2. Platform Typology: From Hardware to Contents3. The Japanese Genesis of Transactional Platform Theory4. Docomo’s i-mode and the Formatting of the Mobile Internet5. Platforms after i-mode: Dwango’s Niconico VideoConclusion: The Platformization of Regional Chat AppsAcknowledgmentsNotesBibliographyIndex
£20.69
Manchester University Press Africa 2.0: Inside a Continent’s Communications
Book SynopsisAfrica 2.0 provides an important history of how two technologies – mobile calling and internet – were made available to millions of sub-Saharan Africans, and the impact they have had on their lives. The book deals with the political challenges of liberalisation and privatisation that needed to be in place in order for these technologies to be built. It analyses how the mobile phone fundamentally changed communications in sub-Saharan Africa and the ways Africans have made these technologies part of their lives, opening up a very different future. The book offers a critical examination of the impact these technologies have had on development practices, and the key role development actors played in accelerating regulatory reform, fibre roll-out and mobile money. Southwood shows how corruption in the industry is a prism through which patronage relationships in government can be understood, and argues that the arrival of a start-up ecosystem in the region has the potential to change this. A vital overview of the changes of the last three decades, Africa 2.0 examines the transformative effects of mobile and internet technologies, and the very different future they have opened out for sub-Saharan Africa.Table of ContentsIntroductionPart I: Technology diffusion: the spread of mobile calling and internetPrologue (1986–2004)1 Mobile voice calling booms (1993–2004)2 Bandwidth as the digital economy’s fuel: getting sub-Saharan Africa connected (1991–2015)3 Cheaper mobile internet and low-cost smartphones come together with apps sub-Saharan Africans want to use (2005–18)Part II: Technology influences: uses, behaviours and abuses4 Mobile money: from transferring cash by SMS to a digital payments ecosystem (2000–20)5 Sub-Saharan Africans start to live the digital life (2000–20)6 Sprinkling on the magic dust: digital’s impact on development (1982–2020)7 The ugly underbelly of the communications revolutions: corruption, cronyism, regulation and government (1999–2020)Part III: Taking the long view: start-up innovation and complex behaviour change8 Sub-Saharan African start-ups: getting beyond the hype to address deep market challenges (1995–2020)9 Doing complexity: making sense of what has happened over thirty-five yearsAppendix A: GlossaryAppendix B: List of those interviewedSelect bibliographyIndex
£68.00
Manchester University Press Africa 2.0: Inside a Continent’s Communications
Book SynopsisAfrica 2.0 provides an important history of how two technologies – mobile calling and internet – were made available to millions of sub-Saharan Africans, and the impact they have had on their lives. The book deals with the political challenges of liberalisation and privatisation that needed to be in place in order for these technologies to be built. It analyses how the mobile phone fundamentally changed communications in sub-Saharan Africa and the ways Africans have made these technologies part of their lives, opening up a very different future. The book offers a critical examination of the impact these technologies have had on development practices, and the key role development actors played in accelerating regulatory reform, fibre roll-out and mobile money. Southwood shows how corruption in the industry is a prism through which patronage relationships in government can be understood, and argues that the arrival of a start-up ecosystem in the region has the potential to change this. A vital overview of the changes of the last three decades, Africa 2.0 examines the transformative effects of mobile and internet technologies, and the very different future they have opened out for sub-Saharan Africa.Table of ContentsIntroductionPart I: Technology diffusion: the spread of mobile calling and internetPrologue (1986–2004)1 Mobile voice calling booms (1993–2004)2 Bandwidth as the digital economy’s fuel: getting sub-Saharan Africa connected (1991–2015)3 Cheaper mobile internet and low-cost smartphones come together with apps sub-Saharan Africans want to use (2005–18)Part II: Technology influences: uses, behaviours and abuses4 Mobile money: from transferring cash by SMS to a digital payments ecosystem (2000–20)5 Sub-Saharan Africans start to live the digital life (2000–20)6 Sprinkling on the magic dust: digital’s impact on development (1982–2020)7 The ugly underbelly of the communications revolutions: corruption, cronyism, regulation and government (1999–2020)Part III: Taking the long view: start-up innovation and complex behaviour change8 Sub-Saharan African start-ups: getting beyond the hype to address deep market challenges (1995–2020)9 Doing complexity: making sense of what has happened over thirty-five yearsAppendix A: GlossaryAppendix B: List of those interviewedSelect bibliographyIndex
£23.74
Nova Science Publishers Inc Text & Beyond: Issues in the Mobile Marketplace
Book SynopsisMobile devices, once associated only with voice telephone service, have become the launching pads for new data-driven technologies and services. Today, consumers use their mobile devices for myriad purposes including "chatting" through text messaging, taking pictures, browsing the Web, making purchases, listening to music, viewing videos, playing games across cyberspace, and keeping track of friends and relatives. This book addressed the mobile marketplace in the U.S., including the contours of the mobile market place and factors affecting the adoption of new mobile applications. Furthermore, in November 2001, wireless service providers began to connect their networks for text messaging, allowing subscribers on different networks to exchange text messages. Since then, the number of text messages in the U.S. has grown to over 48 billion messages every month. In this book, the discussion of the current mobile market in the U.S. was focused on three general areas: 1) text messaging; 2) ringtones and ringbacks; and 3)Internet access, mobile television, and new and emerging services.
£46.49
Nova Science Publishers Inc Contraband Cell Phones in Prisons: Technology
Book Synopsis
£189.74
Nova Science Publishers Inc Cell Phone Use & Health Risks: Assessments &
Book SynopsisMobile phone use in the United States has risen dramatically over the last 20 years, and Americans increasingly rely on mobile phones as their sole or primary means of telephone communication. The rapid adoption of mobile phones has occurred amidst controversy over whether the technology poses a risk to human health. Like other devices that transmit radio signals, mobile phones emit radio-frequency (RF) energy. At high power levels, RF energy can heat biological tissue and cause damage. Though mobile phones operate at power levels well below the level at which this thermal effect occurs, the question of whether long-term exposure to RF energy emitted from mobile phones can cause other types of adverse health effects, such as cancer, has been the subject of research and debate. This book examines what is known about the health effects of RF energy from mobile phones, with a focus on the FCC and FDA''s regulatory responsibilities; and other scientific research.
£73.49
Nova Science Publishers Inc Mobile Device Security: Threats & Controls
Book Synopsis
£63.74
Morgan & Claypool Publishers Embracing Interference in Wireless Systems
Book SynopsisThe wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.
£51.00
Nova Science Publishers Inc Assessing the Digital Nation: Broadband Adoption,
Book SynopsisResearchers and policymakers recognise that availability and use of high-speed Internet services -- a range of connection technologies collectively known as broadband -- are essential to economic growth. The United States has made considerable progress towards ubiquitous broadband access, with more than 93 percent of the population living in areas offering wired broadband service, and about 98 percent having access to either wired or terrestrial wireless connectivity at speeds of at least 3 Mbps download and 768 Kbps upload. The Internet has rapidly grown from an academic network into a resource that is now integral to the lives of most Americans. In 2000, only 4 percent of homes used broadband Internet service. By 2011, 69 percent were online at speeds greater than dial-up. By connecting every corner of our country to the digital age, we can help our businesses become more competitive, our students become more informed and our citizens become more engaged. Additionally, our nation''s technology industry leads the way in revolutionising the nature of Internet use through mobile devices. Smartphones -- driven by American-made operating systems and applications -- now lead the mobile market. Over one billion smartphone users world-wide carry the global network in their pockets, including the 46 percent of Americans currently using these devices -- now surpassing the 41 percent who use traditional mobile phones. Mobile broadband is vital to our future. This book examines online activities, broadband adoption, and reasons some do not go online at home which provide key factual underpinnings for the development of sound policies for increasing broadband adoption in the United States.
£119.99
Artech House Publishers From LTE to LTE-Advanced Pro and 5G
Book SynopsisThis book examines the new features of LTE technologies and how they integrate into existing LTE networks. The authors provide an in-depth coverage of how the air interface is structured at the physical level and how the related link protocols are designed and work. It contains detailed chapters on the end-to-end data transfer optimization mechanisms based on the TCP. Readers will find information about OFDMA, and how DFT is used to implement it, SON specifications and realization and potential 5G solutions, as considered in releases 14 and beyond, the migration paths, and the challenges involved with the latest updates and standardization process. The book gives an insight into core network architecture, including the protocols and signaling used for both data and voice services, parameter estimations, and network planning and sizing.Trade ReviewA well written book providing network design practitioners a comprehensive summary with practical details of the standards and technologies behind 4G LTE, LTE-Advanced (-Pro) and 5G. This network design handbook is a must have for Policy Makers, CTO's, radio- and core network engineers of cellular telecom operators to implement optimal current and future LTE networks. -- Werner Noz * Trend Communications International *Clear concise description of components and features which form the LTE solution, and how these entities will evolve as we move from LTE towards 5G. -- Robert Ivers * TfL London *Table of ContentsThe Underlying DFT Concepts and Formulations; The Air Interface Architecture and Operation; The Coverage-Capacity Planning and Analysis; Pre-Launch Parameter Planning and Resource Allocation; Radio Resource Control and Mobility Management; Inter-Cell Interference Management in LTE; SON Technologies in LTC; EPC Network Architecture, Planning and Dimensioning Guideline; LTE_Advanced Main Enhancements; Optimization for TCP Operation in 4G and Other Networks; Voice over LTE (VOLTE); LTE-Advance Pro-Enhanced LTE Features; Towards 5G
£108.00
Artech House Publishers Software-Defined Radio for Engineers
Book SynopsisBased on the popular Artech House classic, Digital Communication Systems Engineering with Software-Defined Radio, this book provides a practical approach to quickly learning the software-defined radio (SDR) concepts needed. It explains how to create wireless design prototypes using SDR for real-world testing and experimentation and discusses advanced wireless communication techniques such as OFDM, LTE, WLA, and hardware targeting. Readers will gain an understanding of the core concepts behind wireless hardware, such as the radio frequency front-end, analog-to-digital and digital-to-analog converters, as well as various processing technologies. The book also includes details about HDL code generation and deployment as well as orthogonal frequency division multiplexing. This volume includes chapters on timing estimation, matched filtering, frame synchronization message decoding, and source coding. It concludes with coverage of the WLAN toolbox with OFDM beacon reception and the LTE toolbox with downlink reception. Multiple case studies are presented throughout the book, and MATLAB and Simulink source codes are included to assist students and professionals with projects in the field.Table of ContentsWhat is SDR; Signal & System Overview; Probability Review; Digital Communications Review; Coarse and Fine Frequency Correction; Timing Estimation and Matched Filtering; Frame Synchronization Message Decoding, and Source Coding; Equalization; Orthogonal Frequency Division Multiplexing; HDL Code Generation and Deployment; WLAN Toolbox: OFDM Beacon Reception; LTE Toolbox: Downlink Reception; Appendix SDR, FFT, SNR, and Signal Manipulation.
£114.30