Mobile phone technology Books

100 products


  • Designing Delay-Tolerant Applications for

    Artech House Publishers Designing Delay-Tolerant Applications for

    Out of stock

    Book SynopsisThis comprehensive resource explains how network application engineers benefit from store-and-forward protocols. It reviews the motivation and design of delay tolerant networks (DTNs) and presents a series of design patterns, with examples, for developing and deploying delay-tolerant applications. The rationale for delay-tolerant applications as an evolution of standard solutions to current terrestrial internet networking challenges is presented. Similarities between internet architectures and DTN features are described, along with an overview of the history of DTNs, the architecture defining modern DTNs, and the Bundle Protocol transport mechanism. The book identifies emerging, advanced networking concepts that require delay tolerance and presents network design patterns as a general way of reasoning about these concepts. Delay-tolerance is explained, and how it can be used to cache content in a network, perform open-loop autonomous control of nodes, annotate messages to reduce traffic needs, perform distributed error correction, implement in-network data fusion, and operationalize regional administration. The book discusses special considerations unique to DTNs that must be accommodated by delay-tolerant applications, examples of using these patterns, and a case study for their deployment.Table of ContentsIntroduction; A Brief History of Challenged Networking; Delay-Tolerant Architectures; Patience on the Wire: The DTN Bundle Protocol; How the Internet Does It: Approaches and Patterns for DTN-Like Problems; Where the Internet is Not Enough: DARPA, NASA, and Disruption Tolerance; Advanced Networking Architectures; Application Services and Design Patterns; The Offshore Oracle Pattern: Centralizing Reporting Structures; The Training Wheels Pattern: Performing Asynchronous, Open-Loop Control; The Stowaway Pattern: Propagating State Information; The Network Watchdog Pattern: Error Detection and Recovery; The Checkpoint Pattern: Reducing Retransmissions; The Wormhole Pattern: Encapsulating for Uncertainty; What Can Go Wrong Along the Way: Special Considerations in DTNs; Case Studies for Delay-Tolerant Applications.

    Out of stock

    £114.00

  • Implementing Full Duplexing for 5G

    Artech House Publishers Implementing Full Duplexing for 5G

    Out of stock

    Book SynopsisThis exciting new book examines the feasibility of using a method of doubling the capacity of cellular networks by simultaneously transmitting and receiving signals at the same frequency, a process known as full duplexing (FD). To realize full duplexing, changes in the hardware of the cell- base stations, relaying equipment, “hot spot” access points and mobile phones are necessary to prevent the hardware’s transmitters from interfering with their own receivers. This requires looking at how to separate the strong transmitted signal from the very weak received signal, a process requiring both hardware (analog) changes and more complex digital signal processing. Different ways of achieving that goal are examined. The books reviews the merits of hardware changes involving new duplexing components that may be different depending on the frequency band and cell hardware being used.Developing full duplex (FD) systems in 5G LTE cellular communications and what can be achieved with ferrite-based circulators in terms of size reduction and performance enhancement, especially at millimetric frequencies, is considered. The relative merits of ferrite and non-ferrite circulators are compared in terms of their fundamental materials and device technologies, such as isolation, insertion loss, bandwidth and non-linearity. FD in the entire 5G cell is also examined and its resulting range of equipment and device communication. This includes front-hauling, more sophisticated back and front-hauling, backhaul beam switching, and cell extenders and relays, all of which could involve FD.Table of ContentsFull Duplexing; Self Interference; SI reduction-Solutions from Academic Groups; Non-Reciprocal Magnetism Physics; Practical Spatio-Temporal circulation approaches; Limitations of Semiconductor based Circulators; Current Ferrite Circulator Technology; Unbiased Ferrite Devices; Newer Transmission Line Technologies; New Materials and Packaging; Comparison of Ferrite and Semi-conductor based Circulators for Full Duplex; Future Full Duplex 5G Applications

    Out of stock

    £124.20

  • Wearable Antennas and Electronics

    Artech House Publishers Wearable Antennas and Electronics

    Out of stock

    Book SynopsisThis book presents a practical and comprehensive guide to game-changing and state-of-the-art wearable antennas and RF electronics and their applications. Written by leading experts, the book details how to weave clothing into functional antennas and sensors to serve as unobtrusive devices for medical monitoring, athletic performance tracking, body-area network communications, and a host of other applications. You will learn about the latest advances in materials and electronics along with new and unexplored opportunities in functionalizing fabrics for sensing and wireless connectivity; understand materials selection for diverse wearable applications; gain practical insight into the newest class of embroidered e-textiles; and learn how to engineer flexible and wearable sensors. Wearable Antennas and Electronics covers basic approaches for wearable technology and their applications. You will also get an expert preview of promising future directions and paths for research opportunities. This is a must-have resource for anyone working in the growing industry of wearables and body-area devices, including engineers, researchers, faculty, and graduate students.Table of ContentsIntroduction; Basic Approaches for Printing and Weaving Wearables; Wearable Electronics with Flexible, Transferable, and Remateable Components; Wearable Antennas; Wearable Sensors; Wearable RF Harvesting; Radiofrequency Finger Augmentation Devices for Tactile Internet; Wearable Imaging Technologies; Wearable Wireless Power Transfer Systems.

    Out of stock

    £132.30

  • Wi-Fi 6 Protocol and Network

    Artech House Publishers Wi-Fi 6 Protocol and Network

    4 in stock

    Book SynopsisWith more than 15 billion Wi-Fi enabled devices, Wi-Fi has proven itself as a technology that has successfully evolved over the past 25 years. The need for high-speed connectivity is growing, as Wi-Fi has evolved into a fundamental utility that is expected to be available everywhere. This comprehensive resource covers six generations of Wi-Fi standards including protocol, implementation, and network deployment for both residential and enterprise environments. It will provide readers with a new understanding of how to approach and debug basic Wi-Fi problems, and will grant those wondering whether to pick 5G or Wi-Fi 6 for their product the clarity needed to make an informed decision. Readers will find in-depth coverage of Wi-Fi encryption and authentication methods, including explorations of recently uncovered security vulnerabilities and how to fix them. This book also provides detailed information on the implementation of Wi-Fi, including common regulatory and certification requirements, as well its associated challenges. This book also provides direction on the placement of Wi-Fi access points in indoor locations. It introduces the most recent Wi-Fi 6E certification, which defines requirements for devices operating on the newly opened 6 GHz band. Wi-Fi 6 is then compared with 5G technology, and this resource provides insight into the benefits of each as well as how these two technologies can be used to complement each other.Table of ContentsIntroduction; Wi-Fi 1 to 5 Overview; Wi-Fi 6; Wi-Fi Security; Wi-Fi Implementation; Wi-Fi 6E; Wi-Fi Deployment; 5G Overview and Wi-Fi Comparison; Conclusion.

    4 in stock

    £98.10

  • Introduction to Mobile Communications and

    NY Research Press Introduction to Mobile Communications and

    Out of stock

    Book Synopsis

    Out of stock

    £103.95

  • Mobile Security: A Comprehensive Guide to

    NY Research Press Mobile Security: A Comprehensive Guide to

    Out of stock

    Book Synopsis

    Out of stock

    £107.42

  • Mobile Apps & Banking: Investigations of

    Nova Science Publishers Inc Mobile Apps & Banking: Investigations of

    Out of stock

    Book SynopsisThrough a variety of new mobile applications ("apps"), technology is rapidly changing the way consumers shop. Today''s mobile apps offer new beneficial services designed to enhance the consumer shopping experience. These apps allow smartphone users to compare competing products and retailers in real-time, seek out the best deals, and pay for their purchases by waving their phones at the checkout counter. Many of these apps have been installed on millions of devices, and all use mobile technology to alter consumers'' shopping. Mobile payments can be a convenient way for consumers to pay for goods and services but they also raise consumer protection concerns. This book examines the mobile payments industry and its effects on consumers, while exploring areas where more attention is warranted such as dispute resolution, data security, and privacy.

    Out of stock

    £122.99

  • America's Embrace of the Mobile Internet:

    Nova Science Publishers Inc America's Embrace of the Mobile Internet:

    1 in stock

    Book SynopsisThe rise of sophisticated mobile devices and high-speed wireless networks is transforming the Internet and how our society interacts with it. Americans are rapidly embracing mobile technologies and the opportunities they create. This book examines data from the 2012 Current Population Survey (CPS) describing Americans'' use of computers and the Internet. Data from this survey depict the accelerating popularity of mobile phone-based Internet use across demographic groups. The book also reveals the explosion in mobile Internet use accompanied by narrowing but persistent disparities in computer ownership and Internet use overall. This book''s insights will allow policymakers, in cooperation with private partners, to make decisions that will improve America''s productivity, ingenuity, world competitiveness, and standard of living.

    1 in stock

    £122.99

  • Advances in Wireless Communication Networks

    Murphy & Moore Publishing Advances in Wireless Communication Networks

    Out of stock

    Book Synopsis

    Out of stock

    £104.61

  • Current Trends in Optical Fiber and Wireless

    Murphy & Moore Publishing Current Trends in Optical Fiber and Wireless

    Out of stock

    Book Synopsis

    Out of stock

    £106.72

  • Fundamentals of Mobile Computing

    Murphy & Moore Publishing Fundamentals of Mobile Computing

    Out of stock

    Book Synopsis

    Out of stock

    £106.72

  • Microwave Systems: Design and Applications

    Murphy & Moore Publishing Microwave Systems: Design and Applications

    Out of stock

    Book Synopsis

    Out of stock

    £106.69

  • Recent Advances in Wireless Power Transfer

    Murphy & Moore Publishing Recent Advances in Wireless Power Transfer

    Out of stock

    Book Synopsis

    Out of stock

    £103.22

  • Telecommunications: An Engineering Perspective

    Murphy & Moore Publishing Telecommunications: An Engineering Perspective

    Out of stock

    Book Synopsis

    Out of stock

    £108.11

  • Wireless Communications

    Murphy & Moore Publishing Wireless Communications

    Out of stock

    Book Synopsis

    Out of stock

    £109.46

  • Wireless Sensor Networks: A Systems Perspective

    Murphy & Moore Publishing Wireless Sensor Networks: A Systems Perspective

    Out of stock

    Book Synopsis

    Out of stock

    £105.30

  • Murphy & Moore Publishing Wireless Communications: Propagation and Smart

    Out of stock

    Book Synopsis

    Out of stock

    £116.63

  • Ad Hoc Networks: Current Status and Future Trends

    States Academic Press Ad Hoc Networks: Current Status and Future Trends

    Out of stock

    Book Synopsis

    Out of stock

    £106.72

  • Handbook of 5g Wireless Networks

    States Academic Press Handbook of 5g Wireless Networks

    Out of stock

    Book Synopsis

    Out of stock

    £108.80

  • Mobile Computing

    States Academic Press Mobile Computing

    Out of stock

    Book Synopsis

    Out of stock

    £102.56

  • Wireless Communication Networks and Systems

    States Academic Press Wireless Communication Networks and Systems

    Out of stock

    Book Synopsis

    Out of stock

    £108.07

  • States Academic Press Optical Fibre Communications: Devices, Circuits

    Out of stock

    Book Synopsis

    Out of stock

    £112.27

  • Wireless Communications and Networking: Concepts,

    Larsen and Keller Education Wireless Communications and Networking: Concepts,

    Out of stock

    Book Synopsis

    Out of stock

    £103.95

  • Understanding Digital Signal Processing

    Clanrye International Understanding Digital Signal Processing

    Out of stock

    Book Synopsis

    Out of stock

    £101.14

  • Digital Signal Processing

    Willford Press Digital Signal Processing

    Out of stock

    Book Synopsis

    Out of stock

    £104.64

  • Wimax Systems: Current Technologies

    Willford Press Wimax Systems: Current Technologies

    Out of stock

    Book Synopsis

    Out of stock

    £100.49

  • Willford Press 5g Wireless Communications and Internet of Things

    Out of stock

    Book Synopsis

    Out of stock

    £111.54

  • Android Programming For Beginners: The Ultimate Android App Developer's Guide

    15 in stock

    £11.63

  • M-Libraries 5: From devices to people

    Facet Publishing M-Libraries 5: From devices to people

    Out of stock

    Book SynopsisAn up-to-date showcase of the innovative and inspiring work that libraries are doing across the world to interact with their users and deliver resources via mobile devices. This brand new edition of the highly successful M-Libraries series brings together cutting-edge international contributions from the leading experts, practitioners and researchers in the field. Based on the proceedings of the Fifth International M-Libraries Conference held at the Chinese University of Hong Kong in 2014, it illustrates the diversity of innovative and inspiring work that libraries are doing across the world to interact with their users and deliver resources via mobile and hand-held devices. With a foreword from Joan K Lippincott and 22 chapters from 13 countries, as far apart as India and Germany, Hong Kong and Zimbabwe, Scotland and Bangladesh, the book explores the following themes: Best practice for the use of mobile technologies in libraries Challenges and strategies involved in embracing mobile innovation for librarie The impact of ubiquitous and wearable technologies on the future of librarie Harnessing the future for teaching and learning with mobile technologies Mobile technologies enhancing information access for all and pursuing the millennium development goals. As the world becomes more mobile, users will access information using mobile technologies. Hence, libraries have to make the transition to provide mobile service. M-Libraries 5 will help libraries to develop adaptable and efficient mobile services so they can meet the needs of the current and new generations of users. Readership: Information professionals in all sectors and researchers, educators, technical developers, managers and library professionals. It will also be invaluable for students of library and information science and newcomers to the profession.Trade ReviewThis collection offers a useful range of case studies and research for a student, academic, or a librarian applying the concepts to his or her project or problem...this collection’s strength is that people are at the core of the research and therefore the findings are relevant and offer practical uses today. -- Katie Smith * Library and Information Research *Table of ContentsForeword - Joan K Lippincott Introduction - Gill Needham PART 1: BEST PRACTICE FOR THE USE OF MOBILE TECHNOLOGIES IN LIBRARIES 1. Design and testing of mobile library websites: best practices in creating mobile library applications - John Paul Anbu K and Dr Sanjay Kataria 2. Mobile information literacy for libraries: a case study on requirements for an effective information literacy programme - Shri Ram, John Paul Anbu K and Dr Sanjay Kataria 3. Mapping and library services at UOC: a preliminary case study for BPC and UOC - Pep Torn, Anna Zuñiga Ruiz and Carme Fenoll Clarabuch 4. Library tour evolution (analogue/digital/mobile) - Michael J Whitchurch 5. A manifesto for mobile: developing a shared mobile resources checklist - Mark Williams 6. M-libraries user services: a survey of the world’s leading database publishers for mobile devices- Dr Parveen Babbar and Dr P K Jain 7. Assessing students’ perception of ease of use and satisfaction with mobile library websites: a private university perspective in Bangladesh - Md Maidul Islam 8. Web v native application: best practices and considerations in the development and design of web applications - Gillian Nowlan PART 2: CHALLENGES AND STRATEGIES INVOLVED IN EMBRACING MOBILE INNOVATION FOR LIBRARIES 9. Smart devices, smart staff - Kay Munro and Karen Stevenson 10. Does position within the library affect mobile technology acceptance? - Dr Sarah-Jane Saravani and Dr Gaby Haddow 11. Learning with smartphones: higher education students’ experiences and practices - Dr Zvjezdana Dukic, Dr Dickson Chiu and Dr Patrick Lo 12. Innovative use of SMS for library services: attitude of library professionals in Anambra and Delta public libraries - Nkem Ekene Osuigwe, Chinelo O Jiagbogu, Nkechi S Udeze and Ebele N Anyaoku 13. From brick to click and click to mobile: transforming libraries with mobile technology - Geeta Paliwal and Dr P K Jain 14. Mobile applications and services in academic libraries: a survey of university libraries in New Delhi - Dr Seema Chandhok and Dr Parveen Babbar 15. Mobile frontiers: real or perceived? Adopting a service-wide approach - Alison Mackenzie PART 3: MOBILE TECHNOLOGIES ENHANCING INFORMATION ACCESS AND PURSUING THE MILLENNIUM DEVELOPMENT GOAL 16. Mobile wellness innovation: a Qi Gong app to improve wellness and cognitive resiliency in older adults - Dr Collen McMillan and Tony Tin 17. M-agricultural information services in Zimbabwean libraries: drawbacks and opportunities in facilitating access to information to enhance production - Collence Takaingenhamo Chisita and Thembani Malapela PART 4: THE IMPACT OF MOBILE TECHNOLOGIES ON LIBRARIES OF THE FUTURE 18. The unintentional iPad-lending programme – experience from the Sojourner Truth Library - Kristy Lee 19. LibrARy and e-leARning: further adventures with augmented reality - Nitin Parmar, Kate Robinson and Marie Salter 20. A library location-based service: the app ‘Bavaria in Historical Maps’ presents Bavarian history on the mobile internet - Dr Klaus Ceynowa 21. The geography of information: Placing our information needs and behaviours in context - Andrew Carlos 22. Developing adaptable, efficient mobile library services: librarians as enablers - Lizzie Caperon Conclusion - Professor Mohamed Ally

    Out of stock

    £58.46

  • The Art and Science of NFC Programming

    ISTE Ltd and John Wiley & Sons Inc The Art and Science of NFC Programming

    15 in stock

    Book SynopsisNFC is a world standard since 2004 which is now within every smartphone on the market. Such a standard enables us to do mobile transactions (mobile payment) in a secure way along with many other information- based tap’n play operations. This book has a double role for computer scientists (from bachelor students in CS to IT professionals).Table of ContentsForeword vii Preface xi Introduction xv Chapter 1. State-of-the-Art of NFC1 1.1. Future mobiquitous digital services 2 1.1.1. The era of mobiquity 3 1.1.2. Toward a world of contactless communicating objects 6 1.2. NFC equipment 7 1.2.1. NFC tag 7 1.2.2. NFC smart card 8 1.2.3. NFC smartphone 13 1.2.4. Reader/encoder: NFC transaction terminals 14 1.2.5. “Smart cities” and sustainable development 14 1.2.6. Cashless payment with NFC 15 1.3. NFC standards 16 1.3.1. Analog signal and NFC digital transposition 18 1.3.2. The three standardized modes of NFC 21 1.3.3. NFC forum standards 25 1.3.4. GlobalPlatform (GP) 36 1.3.5. SIMAlliance and open mobile API 42 Chapter 2. Developing NFC Applications with Android 45 2.1. Introduction to Android programming using Eclipse 46 2.1.1. Android in a nutshell 46 2.1.2. Android in Eclipse IDE 49 2.1.3. Intents and Android context 60 2.1.4. The Activity class of Android 61 2.1.5. Android graphical interface: “layout” files 64 2.1.6. Compiling and testing an Android application 67 2.2. Implementing NFC with Android 70 2.2.1. Android manifest declarations 71 2.2.2. Implementing the NFC reader/writer mode 71 2.2.3. Implementing the NFC P2P mode with Android 83 2.2.4. Implementing the NFC card emulation mode with Android 87 2.2.5. Developing NFC services with Android HCE 97 Chapter 3. NFC Use Cases 107 3.1. Usage of the NFC reader/writer mode 107 3.1.1. Use case: management of equipment loans 108 3.2. Usage of the NFC P2P mode 112 3.2.1. Use case: NFC pairing 112 3.3. Usage of NFC card emulation mode 114 3.3.1. Use case: digital wallet in the SE 115 3.4. Usage of the HCE mode 118 3.4.1. Use case: SE in the Cloud with HCE 119 Conclusion 121 Bibliography 125 Index 129

    15 in stock

    £125.06

  • LTE Advanced Pro: Towards the 5G Mobile Network

    ISTE Ltd and John Wiley & Sons Inc LTE Advanced Pro: Towards the 5G Mobile Network

    15 in stock

    Book SynopsisThis book presents LTE evolution towards 5G mobile communication and the emergence of new requirements for MBB, MTC and LLC services. As LTE technologies evolve, LTE Advanced Pro dramatically increases cell capacity and user data rates for the MBB unicast service. Such requirements are obtained using full-dimension MIMO, carrier aggregation (on either licensed or unlicensed frequency bands) and dual connectivity. To improve the efficiency of same-content delivery to multiple users, 3GPP proposes a group communications service over LTE and defines mission critical push-to-talk (MCPTT) for dedicated public safety services. Complementary low-cost and low-power modems with enhanced coverage and massive connectivity are emerging. Thus, this book also discusses the need for LTE to support low-rate transmission and high-latency communication for MTC services. Table of ContentsList of Abbreviations xi Introduction xxix Chapter 1. MBB Service – Network Architecture 1 1.1. Initial architecture 1 1.1.1. Functional architecture 1 1.1.2. Protocol architecture 6 1.2. CUPS architecture 13 1.3. Heterogeneous networks 15 1.3.1. HeNB station 16 1.3.2. Relay node 19 1.3.3. RRH module 23 1.3.4. Dual connectivity 25 Chapter 2. MBB Service – Spatial Multiplexing 29 2.1. Multiplexing techniques 29 2.1.1. MIMO mechanism 29 2.1.2. Beamforming 31 2.1.3. Antenna configurations 31 2.2. Antenna ports 33 2.2.1. Downlink 33 2.2.2. Uplink 35 2.3. UCI 36 2.4. Transmission modes 38 2.4.1. Downlink 38 2.4.2. Uplink 41 2.5. FD-MIMO mechanism 41 2.6. eFD-MIMO mechanism 46 Chapter 3. MBB Service – Carrier Aggregation 49 3.1. Functional architecture 49 3.2. LTE aggregation 50 3.2.1. Radio channels 50 3.2.2. PDCCH physical channel 52 3.2.3. MAC layer 54 3.2.4. Mobile categories 54 3.3. LAA aggregation 57 3.3.1. Frame structure 57 3.3.2. Access to the radio channel 60 3.3.3. Discovery reference signal (DRS) 61 3.4. LWA aggregation 62 3.4.1. Protocol architecture 62 3.4.2. Procedures 63 3.5. LWIP aggregation 67 3.5.1. Protocol architecture 67 3.5.2. Tunnel establishment 69 Chapter 4. Wi-Fi Integration – Network Architecture 71 4.1. Functional architecture 71 4.1.1. Architecture based on the S2a interface 71 4.1.2. Architecture based on the S2b interface 74 4.1.3. Architecture based on the S2c interface 76 4.2. Tunnel establishment 78 4.2.1. Architecture based on the S2a interface 78 4.2.2. Architecture based on the S2b interface 82 4.2.3. Architecture based on the S2c interface 83 4.3. DIAMETER protocol 84 4.3.1. AAA server interfaces 85 4.3.2. PCRF interfaces 89 Chapter 5. Wi-Fi Integration – Procedures 91 5.1. Mutual authentication 91 5.1.1. EAP-AKA method 91 5.1.2. Mutual authentication procedure 92 5.1.3. Procedure for rapid renewal of authentication 95 5.1.4. Application to the MIPv4 FA mechanism 96 5.2. SWu tunnel establishment 97 5.2.1. IPSec mechanism 97 5.2.2. SWu tunnel establishment procedure 98 5.2.3. Procedure for rapid renewal of authentication 101 5.3. S2a/S2b tunnel establishment 102 5.3.1. PMIPv6 mechanism 102 5.3.2. GTPv2 mechanism 107 5.3.3. MIPv4 FA mechanism 109 5.4. S2c tunnel establishment 113 5.4.1. Trusted Wi-Fi access 114 5.4.2. Untrusted Wi-Fi access 115 Chapter 6. Wi-Fi Integration – Network Discovery and Selection 117 6.1. Mechanisms defined by 3GPP organization 117 6.1.1. ANDSF function 117 6.1.2. RAN assistance 125 6.2. Mechanisms defined by IEEE and WFA organizations 125 6.2.1. Information elements provided by the beacon 127 6.2.2. Information elements provided by the ANQP server 128 Chapter 7. LLC Service – Proximity Communications 133 7.1. Introduction 133 7.2. Functional architecture 135 7.2.1. D2D communication 135 7.2.2. V2X communication 139 7.3. Direct discovery 141 7.4. Radio interface 142 7.4.1. Radio interface structure 142 7.4.2. Physical resources 145 Chapter 8. LLC Service – Group Communications 151 8.1. Introduction 151 8.2. Transport architecture 152 8.2.1. Functional architecture 152 8.2.2. Protocol architecture 154 8.3. Service architecture 155 8.3.1. Functional architecture 155 8.3.2. Protocol architecture 158 8.4. Radio interface 159 8.4.1. MBSFN-RS 160 8.4.2. PMCH 162 8.4.3. RRC messages 166 8.5. Procedures 170 8.5.1. Mutual authentication. 170 8.5.2. Mobile registration 171 8.5.3. Multicast bearer establishment 172 Chapter 9. LLC Service – GCSE and MCPTT Functions 175 9.1. Introduction 175 9.2. GCSE function 176 9.2.1. Functional architecture 176 9.2.2. Protocol architecture 177 9.3. MCPTT function 178 9.3.1. Functional architecture 178 9.3.2. Protocol architecture 182 9.4. Procedures 186 9.4.1. Group creation 186 9.4.2. Group affiliation 187 9.4.3. Session pre-establishment 188 9.4.4. Group call 190 9.4.5. Private call 191 9.4.6. Floor 194 Chapter 10. MTC Service – Network Architecture 197 10.1. Functional architecture 197 10.1.1. MTC-IWF entity 198 10.1.2. MTC-AAA entity 199 10.1.3. SCEF entity 199 10.1.4. IWF-SCEF entity 200 10.2. Network optimization 200 10.2.1. RRC state Suspend 202 10.2.2. RRC state Resume 203 10.3. Congestion control 204 10.4. Procedures 206 10.4.1. Triggering procedure 206 10.4.2. Group message delivery 207 10.4.3. Event monitoring configuration 209 10.4.4. NIDD transfer 213 Chapter 11. MTC Service – Radio Interfaces 219 11.1. Introduction 219 11.2. Special features 220 11.2.1. PSM feature 220 11.2.2. eDRX feature 221 11.2.3. Coverage extension 221 11.3. LTE-M interface 221 11.3.1. Radio channel 221 11.3.2. Guard time 222 11.3.3. Physical channels 223 11.4. NB-IoT interface 226 11.4.1. Radio channel 226 11.4.2. Resource block 227 11.4.3. Physical signals and channels 228 Chapter 12. MBB Service – 5G Integration 237 12.1. Deployment options 237 12.2. Functional architecture 239 12.3. Protocol architecture 240 12.3.1. Radio interface 240 12.3.2. F1 interface 243 12.4. Procedures 245 12.4.1. Adding a secondary node 245 12.4.2. Changing a secondary node 247 12.4.3. Removing a secondary node 249 12.5. Transmission chain 250 12.5.1. Frequency bands 250 12.5.2. Waveform 251 12.5.3. Time frame 253 12.5.4. Error correction codes 254 12.5.5. Reference signals 254 12.5.6. PSS, SSS and PBCH 254 References 259 Index 265

    15 in stock

    £125.06

  • Queues Applied to Telecoms: Courses and Exercises

    ISTE Ltd and John Wiley & Sons Inc Queues Applied to Telecoms: Courses and Exercises

    15 in stock

    Book SynopsisFrom queues to telecoms. Queues are, of course, omnipresent in our world, at the bank, the supermarket, the shops, on the road... and yes, they also exist in the domain of telecoms. Queues Applied to Telecoms studies the theoretical aspect of these queues, from Poisson processes, Markov chains and queueing systems to queueing networks. The study of the use of their resources is addressed by the theory of teletraffic. This book also outlines the basic ideas in the theory of teletraffic, presenting the teletraffic of loss systems and waiting systems. However, some applications and explanations are more oriented towards the field of telecommunications, and this book contains lectures and more than sixty corrected exercises to cover these topics. On your marks....Table of ContentsNotations xi Preface xxi Part 1 Typical Processes in Queues 1 Chapter 1 The Poisson Process 3 1.1 Review of the exponential distribution 3 1.1.1 Definitions 3 1.1.2 The properties of an exponential distribution 4 1.2 Poisson process 10 1.2.1 Definitions 10 1.2.2 Properties of the Poisson process 12 1.3 Exercises 16 Chapter 2 Markov Chains 21 2.1 Markov chains in discrete time 21 2.1.1 Definitions 21 2.1.2 Evolution of a stochastic vector over time 26 2.1.3 Asymptotic behavior 30 2.1.4 Holding time in a state 32 2.1.5 Time-reversible chain 33 2.1.6 Reversible Markov chains 34 2.1.7 Kolmogorov’s criterion 34 2.2 Markov chains in continuous time 35 2.2.1 Definitions 35 2.2.2 Evolution over time 38 2.2.3 Resolving the state equation 41 2.2.4 Asymptotic behavior 42 2.3 Birth and death process 43 2.3.1 Definition 43 2.3.2 Infinitesimal stochastic generator 43 2.3.3 Stationary distribution 44 2.4 Exercises 45 Part 2 Queues 51 Chapter 3 Common Queues 53 3.1 Arrival process of customers in a queue 53 3.1.1 The Poisson process 53 3.1.2 Using the Poisson distribution Rho(lambda) 54 3.1.3 Exponential distribution of delay times 55 3.2 Queueing systems 57 3.2.1 Notation for queueing systems 58 3.2.2 Little distributions 59 3.2.3 Offered traffic 60 3.3 M/M/1 queue 60 3.3.1 Stationary distribution 61 3.3.2 Characteristics of the M/M/1 queue 62 3.3.3 Introducing a factor of impatience 64 3.4 M/M/(Infinity) queue 65 3.5 M/M/n/n queue 66 3.5.1 Stationary distribution 67 3.5.2 Erlang-B formula 67 3.5.3 Characteristics of the M/M/n/n queue 68 3.6 M/M/n queue 68 3.6.1 Stationary distribution 69 3.6.2 Erlang-C formula 70 3.6.3 Characteristics of the M/M/n queue 70 3.7 M/GI/1 queue 71 3.7.1 Stationary distribution 71 3.7.2 Characteristics of the M/GI/1 queue 73 3.8 Exercises 74 Chapter 4 Product-Form Queueing Networks 79 4.1 Jackson networks 80 4.1.1 Definition of a Jackson network 80 4.1.2 Stationary distribution 81 4.1.3 The particular case of the Jackson theorem for open networks 84 4.1.4 Generalization of Jackson networks: BCMP networks 84 4.2 Whittle networks 85 4.2.1 Definition of a Whittle network 85 4.2.2 Stationary distribution 88 4.2.3 Properties of a Whittle network 88 4.3 Exercise 89 Part 3 Teletraffic 91 Chapter 5 Notion of Teletraffic 93 5.1 Teletraffic and its objectives 93 5.2 Definitions 94 5.2.1 Measures in teletraffic 94 5.2.2 Sources and resources 95 5.2.3 Requests and holding time 96 5.2.4 Traffic 97 5.3 Measuring and foreseeing traffic 101 5.3.1 Traffic and service quality 101 5.3.2 Measuring traffic 102 5.3.3 Markovian model of traffic 102 5.3.4 Economy and traffic forecasting 103 5.4 Exercises 103 Chapter 6 Resource Requests and Activity 107 6.1 Infinite number of sources 107 6.1.1 Distribution of requests in continuous time 107 6.1.2 Distribution of requests in discrete time 110 6.1.3 Duration of activity distributions 113 6.1.4 Distribution of busy sources 115 6.2 Finite number of sources 115 6.2.1 Modeling with birth and death processes 116 6.2.2 Distribution of requests 117 6.3 Traffic peaks and randomness 118 6.3.1 Traffic peaks 118 6.3.2 Pure chance traffic 119 6.4 Recapitulation 119 6.5 Exercises 120 Chapter 7 The Teletraffic of Loss Systems 123 7.1 Loss systems 124 7.1.1 Definitions 124 7.1.2 Blocking and loss 124 7.2 The Erlang model 126 7.2.1 Infinite number of resources 127 7.2.2 Finite number of resources 128 7.2.3 Erlang-B formula 131 7.2.4 Dimensioning principles 132 7.3 Engset model 133 7.3.1 Sufficient number of resources 133 7.3.2 Insufficient number of resources 135 7.3.3 On the Engset loss formula 137 7.4 Imperfect loss systems 137 7.4.1 Loss probability in an imperfect system with limited and constant accessibility 137 7.4.2 Losses in a system with limited and variable accessibility 138 7.5 Exercises 138 Chapter 8 Teletraffic in Delay Systems 143 8.1 Delay system 143 8.1.1 Description 143 8.1.2 Characteristics of delay 144 8.2 Erlang model 145 8.2.1 Infinitely long queue 145 8.2.2 Erlang-C formula 146 8.2.3 Distribution of delays 147 8.3 Finite waiting capacity model 150 8.3.1 Queues of finite length 150 8.3.2 Limitations affecting the delay 151 8.4 Palm model 151 8.4.1 M/M/n/N/N queue 152 8.4.2 Characteristics of traffic 153 8.5 General distribution model for activity 153 8.5.1 The Pollaczek--Khinchine formula 153 8.5.2 Activity with a constant duration 154 8.6 Exercises 155 Part 4 Answers to Exercises 161 Chapter 9 Chapter 1 Exercises 163 Chapter 10 Chapter 2 Exercises 171 Chapter 11 Chapter 3 Exercises 185 Chapter 12 Chapter 4 Exercise 197 Chapter 13 Chapter 5 Exercises 201 Chapter 14 Chapter 6 Exercises 205 Chapter 15 Chapter 7 Exercises 207 Chapter 16 Chapter 8 Exercises 211 Part 5 Appendices 219 Appendix 1 221 Appendix 2 227 References 233 Index 235

    15 in stock

    £112.50

  • The Tactile Internet

    ISTE Ltd The Tactile Internet

    15 in stock

    Book SynopsisThe Tactile Internet will change the landscape of communication by introducing a new paradigm that enables the remote delivery of haptic data.This book answers the many questions surrounding the Tactile Internet, including its reference architecture and adapted compression methods for conveying haptic information. It also describes the key enablers for deploying the applications of the Tactile Internet.As an antecedent technology, the IoT is tackled, explaining the differences and similarities between the Tactile Internet, the Internet of Things and the Internet of Everything. The essentials of teleoperation systems are summarized and the challenges that face this paradigm in its implementation and deployment are also discussed.Finally, a teleoperation case study demonstrating an application of the Tactile Internet is investigated to demonstrate its functionalities, architecture and performance.Table of ContentsForeword xi Ian F. Akyildiz Preface xiii Tara Ali-Yahiya and Wrya Monnet List of Acronyms xv Chapter 1 Introduction to Tactile Internet 1 Tara Ali-Yahiya 1. 1. Human perception and Tactile Internet 2 1. 2. The roadmap towards Tactile Internet 3 1. 3. What is Tactile Internet? 5 1. 4. Cyber-Physical Systems and TI 7 1. 4. 1. Physical world 7 1. 4. 2. Internet of Things 7 1. 4. 3. Communication 7 1. 4. 4. Storage and computation 8 1. 4. 5. Feedback 8 1. 4. 6. Smart computing 10 1. 5. References 11 Chapter 2 Reference Architecture of the Tactile Internet 13 Tara Ali-Yahiya 2. 1. Tactile Internet system architecture 13 2. 2. IEEE 1918. 1 use cases 15 2. 2. 1. Teleoperation 16 2. 2. 2. Automotive 17 2. 2. 3. Immersive virtual reality (IVR) 17 2. 2. 4. Internet of drones 18 2. 2. 5. Inter personal communication 18 2. 2. 6. Live haptic-enabled broadcast 19 2. 2. 7. Cooperative automated driving 19 2. 3. Conclusion 20 2. 4. References 20 Chapter 3 Tactile Internet Key Enablers 21 Tara Ali-Yahiya 3. 1. Introduction 21 3. 1. 1. The fifth-generation system architecture 21 3. 1. 2. Network slicing 23 3. 1. 3. Network function virtualization 25 3. 1. 4. Software-defined networking 26 3. 1. 5. Edge computing 27 3. 1. 6. Artificial intelligence 29 3. 2. Conclusion 31 3. 3. References 31 Chapter 4 6G for Tactile Internet 35 Pinar Kirci and Tara Ali-Yahiya 4. 1. Introduction 35 4. 2. Thearchitectureof6G 37 4. 2. 1. Networkperformanceof6G 38 4. 2. 2. Space network 39 4. 2. 3. Air network 40 4. 2. 4. Ground network 40 4. 2. 5. Underwater network 41 4. 3. 6G channel measurements and characteristics 41 4. 3. 1. Optical wireless channel 41 4. 3. 2. Unmanned aerial vehicle (UAV) channel 42 4. 3. 3. Underwater acoustic channel 43 4. 3. 4. Satellite channel 43 4. 3. 5. RFandterahertznetworksin6G 45 4. 3. 6. Visible light communication technology 48 4. 3. 7. Orbital angular momentum technology 48 4. 4. 6GcellularInternetofThings 49 4. 5. Energy self-sustainability (ESS) in 6G 50 4. 6. IoT-integrated ultra smart city life 52 4. 7. AI-enabled6Gnetworks 55 4. 8. AI- and ML-based security management in super IoT 59 4. 9. Securityfor6G 60 4. 10. The WEAFMnecosystem (water, earth, air, fire micro/nanoecosystem) with 6G and Tactile Internet 61 4. 11. References 63 Chapter 5 IoT, IoE and Tactile Internet 65 Wrya Monnet 5. 1. From M2MtoIoT 66 5. 2. Classification of remote monitoring and control systems 66 5. 3. IoT-enabling technologies 67 5. 3. 1. IoT hardware 67 5. 3. 2. IoT software 67 5. 3. 3. IoT connectivity 67 5. 4. Architectural design and interfaces 68 5. 5. IoT communication protocols 71 5. 5. 1. Message Queuing Telemetry Transport (MQTT) 72 5. 5. 2. Constrained Application Protocol (CoAP) 74 5. 5. 3. Data Distribution Service for real-time systems (DDS) 76 5. 5. 4. Open Mobile Alliance Device Management (OMA-DM) 79 5. 6. Internet of Everything (IoE) 80 5. 6. 1. Enabling technologies for the IoE 81 5. 7. Protocol comparisons and the readiness for TI 82 5. 8. TI-IoT models and challenges 83 5. 9. Edge computing in the IoT 85 5. 9. 1. Edge computing paradigms 86 5. 10. Real-time IoT and analytics versus real time in TI 88 5. 11. From IoT towardsTI 88 5. 12. Conclusion 90 5. 13. References 91 Chapter 6 Telerobotics 95 Wrya Monnet 6. 1. Introduction 95 6. 2. Teleoperation evolution to telepresence 96 6. 3. Tele presence applications 97 6. 4. Teleoperation system components 99 6. 4. 1. Master domains 102 6. 4. 2. Network domain (communication channel) 102 6. 4. 3. Slave domain 102 6. 5. Architecture of bilateral teleoperation control system 103 6. 5. 1. Classification of the control systems architectures 106 6. 5. 2. Discrete architecture with transmission delay 107 6. 6. Performance and transparency of telepresence systems 110 6. 6. 1. Passivity and stability 110 6. 6. 2. Time delay issues 112 6. 7. Other methods for time-delay mitigation 116 6. 8. Teleoperation over the Internet 117 6. 9. Multiple access to a teleoperation system 119 6. 10. A use case 121 6. 11. Conclusion 122 6. 12. References 122 Chapter 7 Haptic Data: Compression and Transmission Protocols 127 Wrya Monnet 7. 1. Introduction 127 7. 2. Haptic perception 128 7. 2. 1. Human haptic perception 128 7. 2. 2. Telerobotic tactile and haptic perception 128 7. 2. 3. Tactile sensing for material recognition 129 7. 2. 4. Tactile sensing for object shape recognition 130 7. 2. 5. Tactile sensing for pose estimation 131 7. 3. Haptic interfaces 133 7. 3. 1. Haptic interface for tele presence 133 7. 3. 2. Haptic and tactile sensors and actuators 135 7. 4. Haptic compression 139 7. 5. Haptic transport protocols 142 7. 5. 1. Application layer protocols 143 7. 5. 2. Transport layer protocols 146 7. 6. Multi-transport protocols 149 7. 7. Haptic transport protocol performance metrics 149 7. 8. Conclusion 150 7. 9. References 150 Chapter 8 Mapping Wireless Networked Robotics into Tactile Internet 155 Nicola Roberto Zema and Tara Ali-Yahiya 8. 1. Wireless networked robots 155 8. 2. WNR traffic requisites 158 8. 2. 1. Types of traffic in WNRs 158 8. 3. Traffic shaping and TI haptic codecs 160 8. 3. 1. Introduction 161 8. 3. 2. Mapping WNR control traffic to TI 161 8. 4. WNRs in the Tactile Internet architecture 164 8. 4. 1. WNRs in the TI architecture and interfaces 165 8. 5. Conclusion 169 8. 6. References 170 Chapter 9 HoIP over 5G for Tactile Internet Teleoperation Application 173 Tara Ali-Yahiya, Wryamonnet and Bakhtiar M. Amin 9. 1. Relatedworks 174 9. 2. 5G architecture design for Tactile Internet 179 9. 2. 1. Tactile edge A 180 9. 2. 2. Network domain 182 9. 2. 3. Protocol stack of 5G integration with IEEE 1918. 1 182 9. 3. HapticsoverIP 183 9. 4. Teleoperationcasestudy 185 9. 4. 1. Master to slave (uplink) data rate in edge A 187 9. 4. 2. Slave to master (downlink) data rate in edge B 187 9. 4. 3. Encapsulating the haptic data in HoIP 188 9. 4. 4. 5G network data and control handling 188 9. 4. 5. Case study operational states 190 9. 4. 6. Case study protocol stack 191 9. 5. Simulationresults 192 9. 5. 1. Simulation topology 193 9. 5. 2. NS3networkarchitecture 194 9. 5. 3. Simulation scenario 196 9. 5. 4. Simulation results 198 9. 6. Conclusion 203 9. 7. References 203 Chapter 10 Issues and Challenges Facing Low Latency in the Tactile Internet 209 Tara Ali-Yahiya 10. 1. Introduction 209 10. 1. 1. Technical requirements for the TI 211 10. 2. Low latency in the Tactile Internet 212 10. 2. 1. Resource allocation 212 10. 2. 2. Mobile edge computing 213 10. 2. 3. Network coding 214 10. 2. 4. Haptic communication protocols 214 10. 3. Intelligence and the Tactile Internet 216 10. 4. Edge intelligent 216 10. 5. Openissues 219 10. 6. Conclusion 220 10. 7. References 221 List of Authors 227 Index 229

    15 in stock

    £124.15

  • Understanding 5G Mobile Networks: A

    Emerald Publishing Limited Understanding 5G Mobile Networks: A

    15 in stock

    Book SynopsisMost of the literature on 5G has been in the form of standards, reports, and industry papers and articles. Because of this, researchers from non-scientific or non-engineering disciplines have struggled to understand how it is or could be operationalized and standardized across the globe. Here Peter Curwen and Jason Whalley offer the first manageable overview of 5G for a non-technical audience. This book provides a full review of the current literature, both academic and professional; an in-depth but non-technical discussion of the historical background of the development of 5G; and a broad, multidisciplinary survey of major issues including spectrum, and the licensing and launch of 5G networks throughout the world, distinguishing standalone 5G from non-standalone 5G. Throughout, there is consideration given to how operators and equipment vendors make money from mobile networks, and where money is potentially to be made in the years to come. Understanding 5G Mobile Networks: A Multidisciplinary Primer is a must-read not only for researchers and students in economics, business, strategy, and operations and logistics, but also for regulators, mobile companies, vertical operators, and anyone else interested in the development of this vital technology.Table of ContentsChapter 1. 5G: A Multigenerational ApproachChapter 2. 5G: A Review of Technical Progress Chapter 3. 5G Literature Review Chapter 4. 5G Progress in Europe Chapter 5. 5G Progress in the Americas, Asia, the Middle East and Africa Chapter 6. 5G Vendors and Summing Up

    15 in stock

    £75.04

  • Mobile Access Safety: Beyond BYOD

    ISTE Ltd and John Wiley & Sons Inc Mobile Access Safety: Beyond BYOD

    15 in stock

    Book SynopsisOver recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise. Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context.Table of ContentsIntroduction ix Chapter 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility 1 1.1. A busy day 1 1.2. The ups and downs of the day 3 1.3. What actually happened? 3 Chapter 2. Threats and Attacks 7 2.1. Reconnaissance phase 9 2.1.1. Passive mode information gathering techniques 10 2.1.2. Active mode information gathering techniques 14 2.2. Identity/authentication attack 22 2.2.1. ARP spoofing 22 2.2.2. IP spoofing 22 2.2.3. Connection hijacking 29 2.2.4. Man in the middle 29 2.2.5. DNS spoofing 30 2.2.6. Replay attack 31 2.2.7. Rebound intrusion 31 2.2.8. Password hacking 32 2.2.9. The insecurity of SSL/TLS 34 2.3. Confidentiality attack 38 2.3.1. Espionage software 39 2.3.2. Trojans 41 2.3.3. Sniffing 43 2.3.4. Cracking encrypted data 44 2.4. Availability attack 49 2.4.1. ICMP Flood 50 2.4.2. SYN Flood 50 2.4.3. Smurfing 52 2.4.4. Log Flood 52 2.4.5. Worms 53 2.5. Attack on software integrity 55 2.6. BYOD: mixed-genre threats and attacks 57 2.7. Interception of GSM/GPRS/EDGE communications 61 Chapter 3. Technological Countermeasures 65 3.1. Prevention 66 3.1.1. Protection of mobile equipment 67 3.1.2. Data protection 71 3.2. Detection 81 3.2.1. Systems of intrusion detection 81 3.2.2. Honeypot 88 3.2.3. Management and supervision tools 91 3.3. Reaction 95 3.3.1. Firewall 95 3.3.2. Reverse proxy 102 3.3.3. Antivirus software 104 3.3.4. Antivirus software: an essential building block but in need of completion 107 3.4. Organizing the information system’s security 108 3.4.1. What is security organization? 109 3.4.2. Quality of security, or the attraction of ISMS 110 Chapter 4. Technological Countermeasures for Remote Access 113 4.1. Remote connection solutions 114 4.1.1. Historic solutions 115 4.1.2. Desktop sharing solutions 115 4.1.3. Publication on the Internet 116 4.1.4. Virtual Private Network (VPN) solutions 118 4.2. Control of remote access 137 4.2.1. Identification and authentication 139 4.2.2. Unique authentication 155 4.3. Architecture of remote access solutions 157 4.3.1. Securing the infrastructure 157 4.3.2. Load balancing/redundancy 161 4.4. Control of conformity of the VPN infrastructure 162 4.5. Control of network admission 166 4.5.1. Control of network access 166 4.5.2. ESCV (Endpoint Security Compliancy Verification) 167 4.5.3. Mobile NAC 170 Chapter 5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary 173 5.1. The attack at Mr Rowley’s house 173 5.1.1. Securing Mr Rowley’s PC 173 5.1.2. Securing the organizational level 174 5.1.3. Detection at the organizational level 175 5.1.4. A little bit of prevention 175 5.2. The attack at the airport VIP lounge while on the move 176 5.3. The attack at the café 176 5.4. The attack in the airport VIP lounge during Mr Rowley’s return journey 178 5.5. The loss of a smartphone and access to confidential data 180 5.6. Summary of the different security solutions that should have been implemented 181 Conclusion 187 APPENDICES 189 Appendix 1 191 Appendix 2 197 Bibliography 223 Index 233

    15 in stock

    £125.06

  • Design Constraints for NFC Devices

    ISTE Ltd and John Wiley & Sons Inc Design Constraints for NFC Devices

    15 in stock

    Book SynopsisNear field communication (NFC) can appear to be a simple intuitive technology for exchanging data between close devices. In reality, these contactless structures that combine components and antennas must respect important and specific working constraints. Illustrated by a number of detailed technological examples, this book discusses the multiple normative (ISO, CEN, NFC Forum, EMVCo, etc.) and regulatory (ERC, FCC, ETSI, radiofrequency, private and ecological pollution, etc.) constraints, as well as the applied, typological, functional, structural, environmental or interoperability constraints that a NFC device might face. Design Constraints for NFC Devices also presents techniques that enable us to free ourselves from the technological constraints of current NFC operations encountered in banking, public transport, administration, automotive, industrial, communicating object and Internet of Things applications.Table of ContentsAcknowledgements xi Preface xiii Introduction xvii Part 1. Introduction to – and Reminders About – NFC 1 Introduction to Part 1 3 Chapter 1. Recap of the Principles Employed in NFC 5 1.1. The physical fundaments of “contactless” and NFC 5 1.1.1. Phenomenon of propagation and radiation 5 1.1.2. Classification of fields and spatial regions 6 1.1.3. Spatial regions 6 1.1.4. Far field: r >> λ/2π (Fraunhofer zone) 6 1.1.5. Intermediary field: r approximately equal to λ (Fresnel zone) 7 1.1.6. Near field: r << λ/2π (Rayleigh zone) and the origin of NFC 7 1.1.7. Remarks on contactless, RFID and NFC applications 7 1.2. The concept of NFC 9 1.2.1. Biot–Savart law 10 1.2.2. Field H at a point on the axis of a circular antenna 10 1.2.3. Decrease in the field H as a function of “d” 13 1.2.4. Field H at a point on the axis of a rectangular antenna 14 Chapter 2. Normative Constraints of NFC 17 2.1. Introduction 17 2.1.1. Normative, regulatory and NFC market constraints 17 2.1.2. A little bit of vocabulary 18 2.1.3. Norm 19 2.1.4. Standard 19 2.2. Normative constraints 19 2.2.1. Uplink from initiator to targets 20 2.2.2. “Contactless” normative constraints on NFC device antennae 27 2.3. Conclusion 36 Chapter 3. Regulatory Constraints and Recommendations 39 3.1. Regulatory constraints specific to NFC and NFC antennas 39 3.1.1. State of RF regulations 39 3.1.2. Constraints pertaining to radiation and pollution by NFC 41 3.1.3. The ERC 70 03 recommendation and the ETSI 300 330 norm 41 3.2. Constraints due to recommendations 45 3.2.1. Exposure of the human body to EM fields 46 3.2.2. Societal constraints due to individual freedoms (privacy) 48 3.2.3. Environmental constraints 50 3.3. Constraints of the NFC market 52 3.3.1. NFC applications of short range devices 52 3.3.2. Costs and market prices desired by users 52 3.3.3. Beware of false advertising 53 Part 2. Constraints Due to the Field of Applications of NFC 55 Introduction to Part 2 57 Chapter 4. Applicational Typologies of the NFC and their Consequences 59 4.1. Applicational typologies of the NFC 59 4.1.1. Technologies 59 4.1.2. “NFC Forum Devices” and “NFC Forum Tags” 60 4.1.3. “Modes” of communication of an NFC Forum Device 62 4.1.4. Role of an NFC Forum Device 63 4.1.5. Applicational typological possibilities and their constraints 64 4.2. Application consequences and their direct constraints 67 4.2.1. Touch & Go typology 67 4.2.2. Touch & Confirm typology 67 4.2.3. Touch & Connect typology 67 4.2.4. Touch & Explore typology 68 Chapter 5. Constraints Due to Fields of Application 69 5.1. Range of technical possibilities of applications 69 5.1.1. In architectures and electronic functions 69 5.1.2. Shapes, dimensions and form factors (publicity aside) 70 5.1.3. Remarks and some clarifications about the table 70 5.1.4. Targets/tags for the monitoring of long-distance races 72 5.1.5. Targets/tags for monitoring luxury items 72 5.2. Segmentation, typologies of markets, their problems and their incidences, and direct technical constraints on NFC devices 73 5.2.1. Market sectors and typologies 74 5.3. Mobile telephony 75 5.4. Banks/money matters/payments 77 5.5. Transport 78 5.5.1. 1st case: card emulation mode in battery-assisted and then flat battery 81 5.5.2. 2nd case: card emulation mode with battery out 81 5.5.3. 3rd case: collisions and loading effects 82 5.6. Automobiles 82 5.6.1. Consumer electronics 85 5.7. Healthcare 88 5.8. Communicating objects 89 5.8.1. NFC tablets 89 5.8.2. NFC USB key 90 5.8.3. NFC communication and promotional objects 91 5.8.4. “Add-on” NFC devices, sticks, and stickers 92 Part 3. Applicational Constraints Needing to be Solved when Designing NFC Systems and their Antennas 95 Introduction to Part 3 97 Chapter 6. Structural Constraints in NFC 99 6.1. Constraints due to the form factors of the antennas 99 6.2. Constraints due to variations of the operating distance 100 6.2.1. Distances and magnetic couplings 100 6.3. Constraint of the maximum acceptable value of the quality coefficient Q of the initiator antenna 100 6.4. Constraint of the value of return (retro) modulation voltage 102 6.4.1. Passive Load Modulation (PLM) 103 6.4.2. Active Load Modulation (ALM) 106 Chapter 7. Functional Applicational Constraints 111 7.1. Antenna tuning/detuning constraints 111 7.1.1. The case of an initiator 111 7.1.2. Electrical representation of the target 112 7.1.3. “Tuned”, “untuned” and “detuned” mobile phones 120 7.2. Constraints and influences of the environment 124 7.2.1. Physical influence of the environment 124 7.2.2. Impacts of the environment on the antenna and its performance 124 7.2.3. Electrical fields E 125 7.2.4. Magnetic field 128 Part 4. Conformity and Interoperability Constraints 137 Introduction to Part 4 139 Chapter 8. Conformity Constraints 141 8.1. Conformity tests for NFC devices 141 8.2. Norms of “conformity” tests for NFC IPx 142 8.2.1. ISO 23917 tests (NFC IP1 protocol) 143 8.2.2. ISO 22536 tests (NFC IP1 RF interface) 143 8.3. Electrical characterizations of the initiator antenna 146 8.3.1. The antenna’s inductance and resistance 146 8.3.2. Quality coefficient 149 8.3.3. Bandwidth 149 8.3.4. Tuning of the antenna and its impedance matching 149 8.4. Method of adjustment of the target antenna 154 8.4.1. Absorption threshold, H_thr 154 8.4.2. Absorption in reading mode, H_read 154 8.4.3. Resonance frequency, f_res 154 8.4.4. Bandwidth 155 8.5. Measuring methods for use with the target 155 8.6. Electrical measurements of the initiator antenna 156 8.6.1. Measuring the magnetic field H radiated by the initiator 156 8.6.2. Measurement of the quality coefficient – Q 158 8.6.3. Measuring Q in the application 162 8.6.4. Measuring the bandwidth in the application 163 8.7. Method for adjustment of whole systems 165 8.7.1. Measurements needing to be performed 165 8.7.2. Order in which the measurements must be taken 165 8.7.3. Energy domains, zero lines, and safe operating areas 165 8.8. Measuring tools 166 Chapter 9. Interoperability Constraints 169 9.1. Norms and interoperability 169 9.2. Problems of the tests; JNCF ISO vs EMV vs NFC Forum; etc 170 9.2.1. EMV conformity tests . 171 9.3. In practice: a few simple examples of measurements 178 9.3.1. Example 1 179 9.3.2. Example 2 181 9.3.3. Conformity tests of the NFC Forum 185 9.3.4. NFC Forum testing and certification methods for the lower levels 186 9.3.5. Testing the conformity of NFC with the CEN – Comité européen de normalisation (European Standardizing Committee) 187 9.3.6. What about overall interoperability? 188 Conclusion 189 Bibliography 197 Index 199

    15 in stock

    £125.06

  • High-Tech Entrepreneurship in Asia: Innovation,

    Edward Elgar Publishing Ltd High-Tech Entrepreneurship in Asia: Innovation,

    3 in stock

    Book SynopsisThe option for consumers to make payments for services and products via mobile telephones has created a dynamic new industry. High-Tech Entrepreneurship in Asia illustrates how small, entrepreneurial firms in Asia have devised and produced innovations crucial for this industry's development. Marina Zhang and Mark Dodgson explore the evolution of the mobile payment industry which has emerged in recent years through the convergence of services provided by financial and mobile telecommunications companies. They consider how leading Asian economies are increasingly becoming the source of important technological innovations. Detailed case studies are used to reveal the technological, social, political, national and cultural factors that encourage and constrain entrepreneurship in Asia, paying particular attention to China and Korea, the industry vanguards. The role played by entrepreneurial start-ups in bridging the gap between banking, credit card and mobile telecommunications sectors is also explored. This highly original work will strongly appeal to students, researchers, policymakers and managers interested in international entrepreneurship, innovation, industrial and technological development and Asian business.Table of ContentsContents: Preface 1. Introduction 2. Mobile Payment Technologies 3. The Development of Emerging Technologies 4. High-Tech Entrepreneurship 5. Entrepreneurship Research by Process-Oriented Case Inquiry 6. The Development of Mobile Payment Technologies in Korea 7. The Development of the Mobile Payment Industry in China 8. High-Tech Entrepreneurship: Technology, Firms and International Context Bibliography Index

    3 in stock

    £37.00

  • M-Libraries 2: A Virtual Library in Everyone's

    Facet Publishing M-Libraries 2: A Virtual Library in Everyone's

    Out of stock

    Book SynopsisInterest in m-library services has grown exponentially in the last five years, as libraries are recognizing the potential of ubiquitous and increasingly sophisticated mobile devices. Building on the highly regarded M-Libraries: libraries on the move to provide virtual access, this new book brings together research and case studies from all corners of the globe on the development and delivery of library services and content to mobile devices. Based on the proceedings of the Second International M-Libraries Conference held in Vancouver, this new collection of contributions from authorities in the field serves to demonstrate the ingenuity and creativity of developers and service providers in this area, ranging from the innovative application of basic mobile phone technology to provide information services in remote parts of the globe lacking internet access, to the development of new tools and technologies which harness the full functionality of popular mobile phones. Key topics include: enhancing library access through the use of mobile technology the university library digital reading room mobile access for workplace and language training the role of an agent supplying content on mobile devices cyberlearning and reference services via mobile devices podcasting as an outreach tool service models for information therapy services delivered to mobiles bibliographic ontology and e-books health literacy and healthy action in the connected age a collaborative approach to support flexible, blended and technology-enhanced learning The collection demonstrates the emergence of an evidence base for m-libraries, with a number of contributions presenting the results of user surveys and studies of user behaviour. Readership: This highly topical book should be read by information professionals in all sectors, and by policy makers, researchers, developers, publishers and suppliers. It will also be of great interest to library and information studies students and newcomers to the profession.Trade Review"...any public, academic, medical or special librarian whose users rely on mobile devices will benefit from learning about the cutting-edge applications explained here. It is a useful guide for info pros in corporate organisations, policy makers, researchers, developers, publishers and suppliers." -- Information World Review"...the general library community and librarians, as well as M-Library developers, will find this work to be a useful reference, from an international view point as well, as to the current state of development in M-Libraries. 4/5.""...a very resourceful book for anyone trying to get to grips with m-libraries and how they might work, if one were to go ahead and put the plan in action." -- MmIT JournalTable of ContentsForeword - Sir John Daniel Introduction - Mohamed AllyPART 1: M-LIBRARIES: DEVELOPMENTS AROUND THE WORLD 1. Where books are few: the role of mobile phones in the developing world - Ken Banks 2. Mobile technology in Indian libraries - Parveen Babbarand and Seema Chandhok 3. Mobile technologies and their possibilities for the library, University of the South Pacific (USP) - Elizabeth C. Reade Fong 4. M-library in an m-university: changing models in the Open University of Catalonia - Dora Pérez and Pep Torn 5. Piloting mobile services at University of Houston Libraries - Karen A. Coombs, Veronica Arellano, Miranda Bennett, Robin Dasler and Rachel VacekPART 2: TECHNOLOGY IN M-LIBRARIES 6. Evolution of modern library services: the progression into the mobile domain - Damien Meere, Ivan Ganchev, Máirtín Ó’Droma, Mícheál Ó’hAodha and Stanimir Stojanov 7. Bibliographic ontology and e-books - Jim Hahn 8. QR codes and their applications for libraries: a case study from the University of Bath Library - Kate Robinson 9. A tale of two institutions: collaborative approach to support and develop mobile library services and resources - Hassan Sheikh and Tony Tin 10. Designing a mobile device automatic detector to support mobile library systems - Yang Guangbing, Tony Tin, Colin Elliott, Maureen Hutchison and Rory McGreal 11. The Athabasca University Library Digital Reading Room: an iPhone prototype implementation - Rory McGreal, Hongxing Geng, Tony Tin and Darren James HarknessPART 3: APPLICATION OF M-LIBRARIES 12. Mobile access for workplace and language training - Mohamed Ally, Tracey Woodburn, Tony Tin and Colin Elliott 13. Service models for information therapy services delivered to mobiles - Vahideh Z. Gavgani 14. Health literacy and healthy action in the connected age - Paul Nelson and Bob Gann 15. ‘Ask us upstairs’: bringing roaming reference to the Paley stacks - Fred Rowland and Adam Shambaugh 16. The role of an agent supplying content on mobile devices - Jose Luis Andrade 17. Portable science: podcasting as an outreach tool for a large academic science and engineering library - Eugene Barsky and Kevin LindstromPART 4: M-LIBRARIES AND LEARNING 18. Mobilizing the development of information skills for students on the move and for the workplace: two case studies of mobile delivery in practice - Hassan Sheikh and Anne Hewling 19. The library’s place in a mobile space - Graham McCarthy and Sally Wilson 20. M-libraries in distance education: a proposed model for IGNOU - Seema Chandhok and Parveen Babbar 21. Bridging the mobile divide: using mobile devices to engage the X and Y generations - Phil Cheeseman and Faye Jackson 22. Information literacy gets mobile - Peter Godwin 23. Library and Student Support (L&SS): flexible, blended and technology-enhanced learning - Victoria OwenPART 5: BUILDING THE EVIDENCE BASE FOR M-LIBRARIES 24. Enhancing library access through the use of mobile technology: case study of information services provided by six mobile companies in Bangladesh - Nafiz Zaman Shuva 25. M-libraries: information use on the move - Keren Mills 26. UCLA and Yale Science Libraries data on cyberlearning and reference services via mobile devices - Brena Smith, Michelle Jacobs, Joseph Murphy and Alison Armstrong 27 Say what? An SMS transcript analysis at New York University - Alexa Pearce, Scott Collard and Kara Whatley Conclusion - Gill Needham and Nicky Whitsed

    Out of stock

    £62.96

  • M-Libraries 3: Transforming Libraries with Mobile

    Facet Publishing M-Libraries 3: Transforming Libraries with Mobile

    Out of stock

    Book SynopsisThis title draws together international authorities to explore the variety of work that libraries are doing across the world to deliver resources to users via mobile and hand-held devices. Based on the proceedings of the Third International M-Libraries Conference held in Brisbane in May 2011, this draws together cutting-edge international contributions from the leading authorities in the field. The main strands of discussion include: mobile services and their development mobile users, their behaviour and requirements emerging technical developments including new platforms, devices and applications strategy and infrastructure developments at national level reflections and feedback on new service models local innovation. Readership: Information professionals in all sectors, policy makers, researchers, developers, publishers, suppliers, LIS students and new professionals.Trade Review"...a seminal contribution...an essential, core contribution to Library Science reference collections." -- Midwest Book Review"...a topical guide for information professionals in all sectors. These include policy makers, researchers, developers, publishers and suppliers. Students of library and information science and newcomers to the profession will also find it an invaluable resource. The book reads easily; bibliographies appearing at the end of each chapter can prompt further reading, and a useful index concludes the book." -- Online Information ReviewTable of ContentsForeword - Stephen Abram Introduction - Gill Needham 1. Education for all with mobile technology: the role of libraries - Mohamed AllyPART 1: DEVELOPING MOBILE SERVICES 2. Preparing for the mobile world: experimenting with changing technologies and applications for library services - Colin Bates and Rebecca Carruthers 3. Enhancing open distance learning library services with mobile technologies - Jenny Raubenheimer 4. Use of mobile phones in the delivery of consumer health information - Vahideh Zarea Gavgani 5. Deploying an e-reader loan service at an online university - Anna Zuñiga-Ruiz and Cristina López-Pérez 6. Mobile service providers and library services in a multi-campus library - Ela Volatabu Qica 7. Using mobile technology to deliver information in audio format:learning by listening - Margie Wallin, Kate Kelly and Annika McGinley 8. Sound selection: podcasts prove positive - Daniel McDonald and Roger HawcroftPART 2: PEOPLE AND SKILLS 9. Staff preparedness to implement mobile technologies in libraries - Sarah-Jane Saravani and Gaby Haddow 10. Apps and attitudes: towards an understanding of the m-librarian’s professional make-up - Kate Davis and Helen Partridge 11. There’s a librarian in my pocket: mobile information literacy at UTS Library - Sophie McDonald 12. Exploring student engagement with mobile technologies - Julie Cartwright, Sally Cummings, Bernadette Royal, Michelle Turner and JoAnne Witt 13. It’s just not the same: mobile information literacy - Andrew Walsh and Peter Godwin 14. The students have iPods: an opportunity to use iPods as a teaching tool in the library - Iris AmbrosePART 3: FOCUS ON TECHNOLOGY 15. Mobile services of the National Library of China - Wei Dawei, Xie Qiang and Niu Xianyun 16. India’s mobile technology infrastructure to support m-services for education and libraries - Seema Chandhok and Parveen Babbar 17. Use and user context of mobile computing: a rapid ethnographic study - Jim Hahn 18. Meeting the needs of library users on the mobile web - Hassan Sheikh and Keren Mills 19. Mobile dynamic display systems for library opening hours - Keiso Katsura 20. Device-independent and user-tailored delivery of mobile library service content - Damien Meere, Ivan Ganchev, Máirtín Ó Droma,Mícheál Ó hAodha and Stanimir Stojanov 21. Designing effective mobile web presence - Sam Moffatt Conclusion - Mohamed Ally

    Out of stock

    £62.96

  • A History of Telecommunications

    Bookstorm A History of Telecommunications

    Out of stock

    Book Synopsis‘Mr Watson, come here, I want to see you.’It’s been almost 150 years since Alexander Graham Bell said these immortal words on the first ever phone call, to his assistant in the next room. Between 10 March 1876 and now, the world has changed beyond recognition. And telecommunications, which has played a fundamental role in this change, has itself evolved into an industry that was the sole preserve of science fiction.When the world’s first modern mobile telephone network was launched in 1979, there were just over 300 million telephones. Today, there are more than eight billion, most of which are mobile. Most people in most countries can now contact each other in a matter of seconds. Soon we’ll all be connected, to each other, and to complex computer networks that provide us with instant information, but also observe and record our actions. No other phenomenon touches so many of us, so directly, each and every day of our lives.This book describes how this transformation came about. It considers the technologies that underpin telecommunications – microcircuits, fibre-optics and satellites – and touches on financial aspects of the industry: privatisations, mergers and takeovers that have helped shape the $2-trillion telecom market. But for the most part, it’s a story about us and our need to communicate.

    Out of stock

    £52.50

  • Connected: A Brief History of Global

    Bookstorm Connected: A Brief History of Global

    Out of stock

    Book Synopsis‘Mr Watson, come here, I want to see you.’It’s been almost 150 years since Alexander Graham Bell said these immortal words on the first ever phone call, to his assistant in the next room. Between 10 March 1876 and now, the world has changed beyond recognition. And telecommunications, which has played a fundamental role in this change, has itself evolved into an industry that was the sole preserve of science fiction.When the world’s first modern mobile telephone network was launched in 1979, there were just over 300 million telephones. Today, there are more than eight billion, most of which are mobile. Most people in most countries can now contact each other in a matter of seconds. Soon we’ll all be connected, to each other, and to complex computer networks that provide us with instant information, but also observe and record our actions. No other phenomenon touches so many of us, so directly, each and every day of our lives.A concise edition of John Tysoe and Alan Knott-Craig’s magnum opus, A History of Telecommunications, this book gives you the information you need to know about what keeps us connected and how we got here.

    Out of stock

    £11.96

  • Wireless Wars: China's Dangerous Domination of 5G

    BenBella Books Wireless Wars: China's Dangerous Domination of 5G

    10 in stock

    Book Synopsis

    10 in stock

    £20.96

  • Die Maxwell'schen Gleichungen: Vom Strömungsfeld

    Springer Fachmedien Wiesbaden Die Maxwell'schen Gleichungen: Vom Strömungsfeld

    Out of stock

    Book SynopsisIm Zentrum des Bandes steht die Herleitung der Maxwell'schen Gleichungen und deren Lösung. Die Stationen auf diesem Weg sind die Gesetze des Strömungsfeldes, der Elektrostatik und Magnetostatik. Der Band richtet sich an Studenten der Elektrotechnik und Informationstechnologie und an Studenten des Faches Physik mit dem Ziel, ihnen den Einstieg in die Vorlesung Elektromagnetische Feldtheorie zu erleichtern. Der Band baut auf den Kenntnissen auf, die in den Leistungskursen Physik und Mathematik der Gymnasien und Gesamtschulen vermittelt werden und ist zum Gebrauch neben den Vorlesungen gedacht. Besonderer Wert wird auf ausführliche Erklärungen in Textform in Verbindung mit vielen Abbildungen gelegt. Alle Formeln werden Schritt für Schritt hergeleitet.Für die aktuelle 3. Auflage wurde der Abschnitt „Induktionsgesetz“ grundlegend überarbeitet und in das vierte Kapitel verschoben, ebenso die Abschnitte „Induktivität“ und „Energiedichte des magnetischen Feldes“. Der Begriff „Durchflutungsgesetz“ wurde in Anlehnung an die angelsächsische Bezeichnung in „Ampèr´sches Gesetz“ umbenannt.Table of ContentsPotential- und Strömungsfeld des Gleichstroms.- Potentialgleichungen.- Verschiebungsdichte.- Energiedichte.- Induktionsgesetz.- Durchflutungsgesetz.- Magnetisches Vektorpotential.- Gesetz von Biot-Savart.- Kontinuitätsgleichung.- Verschiebungsstrom.- Erste und zweite Maxwellsche Gleichung.- Wellengleichungen.- Nah- und Fernfeld des Hertzschen Dipols.- Feldstärkekomponenten im Zeitbereich – Feldlinien des Hertzschen Dipols.- Antennenkennwerte.

    Out of stock

    £26.59

  • 450 MHz – Frequenz für kritische Infrastrukturen:

    Springer Fachmedien Wiesbaden 450 MHz – Frequenz für kritische Infrastrukturen:

    1 in stock

    Book SynopsisDie Sicherstellung einer zuverlässigen Versorgungsinfrastruktur zur Gewährleistung der Versorgungssicherheit stellt eines der zentralen Themen der Energieversorger in Deutschland dar. Einen wichtigen Beitrag soll hierfür die 450 MHz Frequenz als Frequenz für kritische Infrastrukturen leisten. Für Energieversorger stellt sich daher die Frage, in welchem Kontext die 450 Frequenz zu nutzen ist sowie welche Vor- und Nachteile 450 MHz mit sich bringt.Die Kurzfassung zum Thema 450 MHz – die Frequenz für kritische Infrastrukturen soll dem Leser einen ersten schnellen Einstieg in die energiewirtschaftliche Einordnung, die Frequenz und darauf basierende Technologie sowie die Einsatzmöglichkeiten im eigenen Energieversorgungsunternehmen bieten.Table of ContentsHistorie & Hintergrund.- 450 MHz: die Technik.- 450 MHz Geschäftsmodell.- 450 MHz im EVU.- Fazit.

    1 in stock

    £9.99

  • VoIP Performance of LTE Networks

    Verlag G. Mainz VoIP Performance of LTE Networks

    3 in stock

    Book Synopsis

    3 in stock

    £37.39

  • HD Telephony by Artificial Bandwidth Extension

    Verlag G. Mainz HD Telephony by Artificial Bandwidth Extension

    2 in stock

    Book SynopsisThe audio bandwidth of digital landline and mobile telephone networks is still mostly restricted to 200 Hz to 3.4 kHz. This is due to compatibility requirements during the transition phase from analogue to digital transmission technology. The resulting characteristic telephone speech is widely accepted, but the intelligibility of syllables is only 91%.Meanwhile, improved coding standards for so-called HD voice or Wideband Speech have been developed which are gradually being introduced into the networks. They support an audio frequency bandwidth of 50 Hz to 7.0 kHz with significantly increased audio quality and speech intelligibility. For a very long time however, new HD-telephones and old narrowband telephones have to co-exist. If an HD-terminal is connected over a narrowband link to an old telephone, the improved coding scheme cannot be used.In this thesis, signal processing concepts are developed for improving audio quality and intelligibility of narrowband speech by

    2 in stock

    £37.39

  • Mobile Computing

    PHI Learning Mobile Computing

    1 in stock

    Book SynopsisThe book covers wireless communication fundamentals, 2G networks (GSM & IS-95), WLL, WLAN, data services, UMTS (3G), mobile computing tenets, protocols, and system design. It balances theory and implementation, includes examples/exercises, and targets students in various computer science and engineering disciplines.

    1 in stock

    £7.16

  • Management Skills for Successful Agri

    New India Publishing Agency Management Skills for Successful Agri

    15 in stock

    Book Synopsis

    15 in stock

    £56.36

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account