WAP networking and applications Books
Pearson Education (US) Synchronizing 5G Mobile Networks
Book Synopsis Dennis Hagarty is an experienced technical specialist in the fields of information technology and telecommunications. He has led presales, consulting, and engineering efforts for major utilities, corporations, and service providers in Australasia and Europe. Having worked in numerous technical areas, Dennis has concentrated on the mobile space for almost 30 years and has specialized in timing and synchronization for the last 12 years. In his current role, Dennis is the Cisco communications interface between engineering, field sales teams, and the global Cisco customer community for all matters related to 5G timing and synchronization. This mandate sees him talking with many large service providers, including most of the world's tier 1 mobile operators. Shahid Ajmeri is a senior product manager at Cisco with responsibility for leading its 5G transport and mobile edge architecture strategy. He has more than 20 yearsTable of Contents Foreword xxi Introduction xxiii Part I Fundamentals of Synchronization and Timing Chapter 1 Introduction to Synchronization and Timing 1 Overview of Time Synchronization 1 What Is Synchronization and Why Is It Needed? 3 What Is Time? 10 How Can GPS Provide Timing and Synchronization? 13 Accuracy Versus Precision Versus Stability 15 Summary 16 References in This Chapter 16 Chapter 1 Acronyms Key 16 Further Reading 17 Chapter 2 Usage of Synchronization and Timing 19 Use of Synchronization in Telecommunications 20 Use of Time Synchronization in Finance, Business, and Enterprise 28 Industrial Uses of Time—Power Industry 33 Summary 34 References in This Chapter 34 Chapter 2 Acronyms Key 35 Chapter 3 Synchronization and Timing Concepts 39 Synchronous Networks Overview 40 Clocks 54 Sources of Frequency, Phase, and Time 66 Timing Distribution Network 82 Consumer of Time and Sync (the End Application) 88 Summary 89 References in This Chapter 89 Chapter 3 Acronyms Key 92 Further Reading 95 Part II SDOs, Clocks, and Timing Protocols Chapter 4 Standards Development Organizations 97 International Telecommunication Union 98 International Mobile Telecommunications 104 3rd Generation Partnership Project 106 Institute of Electrical and Electronics Engineers 109 European Telecommunications Standards Institute 116 Internet Engineering Task Force 118 Radio Access Network 120 MEF Forum 126 Society of Motion Picture and Television Engineers and Audio Engineering Society 127 Summary 128 References in This Chapter 129 Chapter 4 Acronyms Key 132 Further Reading 137 Chapter 5 Clocks, Time Error, and Noise 139 Clocks 139 Time Error 154 Holdover Performance 169 Transient Response 172 Measuring Time Error 173 References in This Chapter 175 Chapter 5 Acronyms Key 175 Further Reading 177 Chapter 6 Physical Frequency Synchronization 179 Evolution of Frequency Synchronization 180 BITS and SSU 181 Clocking Hierarchy 185 Synchronous Ethernet 187 Enhanced Synchronous Ethernet 189 Clock Traceability 189 Synchronization Network Chain 197 Clock Selection Process 199 Timing Loops 201 Standardization 207 Summary 207 References in This Chapter 208 Chapter 6 Acronyms Key 209 Further Reading 211 Chapter 7 Precision Time Protocol 213 History and Overview of PTP 214 PTP Versus NTP 215 IEEE 1588-2008 (PTPv2) 216 PTP Clocks 242 Profiles 250 PTP Security 273 IEEE 1588-2019 (PTPv2.1) 275 Summary 280 References in This Chapter 280 Chapter 7 Acronyms Key 283 Part III Standards, Recommendations, and Deployment Considerations Chapter 8 ITU-T Timing Recommendations 289 Overview of the ITU 290 ITU-T Study Group 15 and Question 13 291 Reading the Recommendations 299 ITU-T Physical and TDM Timing Recommendations 299 ITU-T Recommendations for Frequency in Packet Networks 310 ITU-T Packet-Based Timing Recommendations 316 Possible Future Changes in Recommendations 340 Summary 341 References in This Chapter 341 Chapter 8 Acronyms Key 342 Further Reading 346 Chapter 9 PTP Deployment Considerations 347 Deployment and Usage 348 Factors Impacting Timing Performance 380 Parameters for Timing Performance 383 Clock Performance 401 Budgeting End-to-End Time Error 419 Network Holdover 422 Packet Network Topologies 424 Packet Transport 426 Non-Mobile Deployments 430 Summary 434 References in This Chapter 435 Chapter 9 Acronyms Key 437 Further Reading 442 Part IV Timing Requirements, Solutions, and Testing Chapter 10 Mobile Timing Requirements 443 Evolution of Cellular Networks 444 Timing Requirements for Mobility Networks 448 Timing Requirements for LTE and LTE-A 455 Evolution of the 5G Architecture 478 5G New Radio Synchronization Requirements 496 Summary 509 References in This Chapter 510 Chapter 10 Acronyms Key 512 Further Reading 517 Chapter 11 5G Timing Solutions 519 Deployment Considerations for Mobile Timing 520 Frequency-Only Deployments 535 Frequency, Phase, and Time Deployment Options 538 Midhaul and Fronthaul Timing 550 Timing Security and MACsec 556 Summary 564 References in This Chapter 565 Chapter 11 Acronyms Key 567 Further Reading 571 Chapter 12 Operating and Verifying Timing Solutions 573 Hardware and Software Solution Requirements 574 Writing a Request for Proposal 587 Testing Timing 590 Automation and Assurance 629 Troubleshooting and Field Testing 635 Summary 648 Conclusion 649 References in This Chapter 649 Chapter 12 Acronyms Key 653 Further Reading 658 9780136836254, TOC, 5/3/2021
£44.19
Pearson Education (US) Principles of Web API Design
Book SynopsisJames Higginbotham is a software developer and architect with over 25 years of experience in developing and deploying apps and APIs. He guides enterprises through their digital transformation journey, ensuring alignment between business and technology through product-based thinking to deliver a great customer experience. James engages with teams and organizations to help them align their business, product, and technology strategies into a more composable and modular enterprise platform. James also delivers workshops that help cross-functional teams to apply an API design-first approach using his ADDR process. His industry experience includes banking, commercial insurance, hospitality, travel, and the airline industry where he helped to get an airline off the ground--literally. You can learn more about his latest efforts at https://launchany.com and on Twitter @launchany.Trade Review"I've had the good fortune to work alongside and learn from James over the past several years. His varied institutional knowledge, along with his depth of experience and eye for practical application, makes him unique among his peers. I am ecstatic that others now have the opportunity, in this book, to benefit from James's compelling, pragmatic vision for how to make better APIs. Principles of Web API Design surveys the gamut of available techniques and sets forth a prescriptive, easy-to-follow approach. Teams that apply the guidance in this book will create APIs that better resonate with customers, deliver more business value in less time, and require fewer breaking changes. I cannot recommend Principles of Web API Design enough." --Matthew Reinbold, Director of API Ecosystems, Postman "In modern software development, APIs end up being both the cause of and solution to many of the problems we face. James's process for dissecting, analyzing, and designing APIs from concepts to caching creates a repeatable approach for teams to solve more problems than they create.” --D. Keith Casey, Jr., API Problem Solver, CaseySoftware, LLC "Following James's clear and easy-to-follow guide, in one afternoon I was able to apply his process to current real-world use cases. I now have the practical guidance, techniques, and clear examples to help me take those next vital steps. Recommended reading for anyone connected to and working with APIs." --Joyce Stack, Architect, Elsevier " Principles of Web API Design uncovers more than principles. In it, you'll learn a process--a method to design APIs." --Arnaud Lauret, API Handyman "This insightful playbook guides API teams through a structured process that fosters productive collaboration, valuable capability identification, and best-practice contract crafting. James distills years of experience into a pragmatic roadmap for defining and refining API products, and also provides a primer for API security, eventing, resiliency, and microservices alignment. A must-read for architects either new to the API discipline or responsible for onboarding new teams and instituting a structured API definition process." --Chris Haddad, Chief Architect, Karux LLCTable of ContentsSeries Editor Foreword xxiForeword xxvPreface xxviiAcknowledgments xxxiAbout the Author xxxiii Part I: Introduction to Web API Design 1 Chapter 1: The Principles of API Design 3 The Elements of Web API Design 4 API Design Is Communication 6 Reviewing the Principles of Software Design 7 Resource-Based API Design 10 Resources Are Not Object or Domain Models 11 Resource-Based APIs Exchange Messages 12 The Principles of Web API Design 13 Summary 14 Chapter 2: Collaborative API Design 15 Why an API Design Process? 15 API Design Process Antipatterns 16 The API Design-First Approach 20 Remaining Agile with API Design-First 22 The Align-Define-Design-Refine Process 23 The Role of DDD in API Design 26 API Design Involves Everyone 26 Applying the Process Effectively 28 Summary 28 Part II: Aligning on API Outcomes 29 Chapter 3: Identify Digital Capabilities 31 Ensuring Stakeholder Alignment 32 What Are Digital Capabilities? 33 Focusing on the Jobs to Be Done 34 What Are Job Stories? 35 The Components of a Job Story 36 Writing Job Stories for APIs 37 Overcoming Job Story Challenges 38 Techniques for Capturing Job Stories 40 A Real-World API Design Project 41 Job Story Examples 42 Summary 42 Chapter 4: Capture Activities and Steps 45 Extending Job Stories into Activities and Steps 46 Using EventStorming for Collaborative Understanding 49 How EventStorming Works 50 The Benefits of EventStorming 58 Facilitating an EventStorming Session 60 Customizing the Process 64 Summary 65 Part III: Defining Candidate APIs 67 Chapter 5: Identifying API Boundaries 69 Avoiding API Boundary Antipatterns 70 Bounded Contexts, Subdomains, and APIs 72 Finding API Boundaries Using EventStorming 73 Finding API Boundaries through Activities 73 Naming and Scoping APIs 75 Summary 78 Chapter 6: API Modeling 79 What Is API Modeling? 80 The API Modeling Process 81 Validating the API Model with Sequence Diagrams 93 Evaluating API Priority and Reuse 95 Summary 96 Part IV: Designing APIs 99 Chapter 7: REST-Based API Design 101 What Is a REST-Based API? 102 REST API Design Process 112 Selecting a Representation Format 125 Common REST Design Patterns 132 Summary 136 Chapter 8: RPC and Query-Based API Design 137 What Is an RPC-Based API? 138 RPC API Design Process 142 What Is a Query-Based API? 146 Query-Based API Design Process 150 Summary 157 Chapter 9: Async APIs for Eventing and Streaming 159 The Problem with API Polling 160 Async APIs Create New Possibilities 161 A Review of Messaging Fundamentals 162 Async API Styles 171 Designing Async APIs 178 Documenting Async APIs 184 Summary 186 Part V: Refining the API Design 187 Chapter 10: From APIs to Microservices 189 What Are Microservices? 190 Microservices Reduce Coordination Costs 192 The Difference between APIs and Microservices 193 Weighing the Complexity of Microservices 193 Synchronous and Asynchronous Microservices 198 Microservice Architecture Styles 201 Right-Sizing Microservices 204 Decomposing APIs into Microservices 204 Considerations When Transitioning to Microservices 210 Summary 211 Chapter 11: Improving the Developer Experience 213 Creating a Mock API Implementation 214 Providing Helper Libraries and SDKs 219 Offering CLIs for APIs 221 Summary 224 Chapter 12: API Testing Strategies 225 Acceptance Testing 226 Automated Security Testing 226 Operational Monitoring 227 API Contract Testing 227 Selecting Tools to Accelerate Testing 229 The Challenges of API Testing 230 Make API Testing Essential 231 Summary 231 Chapter 13: Document the API Design 233 The Importance of API Documentation 234 API Description Formats 234 Extending Docs with Code Examples 248 From Reference Docs to a Developer Portal 251 Effective API Documentation 253 The Minimum Viable Portal 256 Tools and Frameworks for Developer Portals 259 Summary 260 Chapter 14: Designing for Change 261 The Impact of Change on Existing APIs 261 API Versioning Strategies 264 Deprecating APIs 268 Establishing an API Stability Contract 270 Summary 271 Chapter 15: Protecting APIs 273 The Potential for API Mischief 273 Essential API Protection Practices 274 Components of API Protection 276 API Gateway Topologies 279 Identity and Access Management 284 Considerations before Building an In-House API Gateway 289 Summary 291 Chapter 16: Continuing the API Design Journey 293 Establishing an API Style Guide 293 Conducting API Design Reviews 297 Developing a Culture of Reuse 300 The Journey Has Only Begun 301 Appendix: HTTP Primer 303 Index 319
£30.59
Pearson Education (US) Network Architects Guide to 5G A
Book SynopsisSyed Farrukh Hassan has been designing and deploying networks for over 20 years. In his current role as principal telecommunications architect at Red Hat, Syed provides consultancy services to global 5G customers. Prior to that, Syed worked as a senior solutions architect in the Cisco professional and consulting services organization, providing guidance, strategy, and planning support to various Internet, cloud, and mobile service providers in their adoption of innovating networking technologies and transformation of their networks to new architectures. Syed co-authored one of the first books on NFV and SDN, has been a regular speaker in public forums and conferences, and is recognized as a Cisco Live Distinguished Speaker. Syed is a double CCIE in Service Provider and Data Center technologies (#21617), Google Certified Professional Cloud Networking Engineer, and Certified Kubernetes Administrator (CKA). He holds a bachelor's degree in engineering from NED UniversitTable of ContentsIntroduction xx Chapter 1: A Peek at the Past 2 Brief History of Pre-Cellular Mobile Networks. . . . . . . . . . . . . . . . . 2 The Very First Cellular Networks: 1G.. . . . . . . . . . . . . . . . . . . . 5 Second Generation (2G) Cellular Networks. . . . . . . . . . . . . . . . . 10 Generation Two and a Half (2.5G). . . . . . . . . . . . . . . . . . . . . 15 Enhanced Data Rates for GSM Evolution (EDGE). . . . . . . . . . . . . . . 17 Third Generation (3G).. . . . . . . . . . . . . . . . . . . . . . . . . . 17 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Chapter 2: Anatomy of Mobile Communication Networks 28 Understanding Radio Access Network.. . . . . . . . . . . . . . . . . . . 28 Mobile Transport and Backhaul.. . . . . . . . . . . . . . . . . . . . . . 41 Mobile Core Concepts.. . . . . . . . . . . . . . . . . . . . . . . . . 51 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Chapter 3: Mobile Networks Today 76 3GPP Releases and Evolved Packet System.. . . . . . . . . . . . . . . . 77 Evolved Packet Core (EPC) Architecture.. . . . . . . . . . . . . . . . . . 79 RAN Evolution.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Modern Mobile Backhaul Networks. . . . . . . . . . . . . . . . . . . . 102 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Chapter 4: The Promise of 5G 120 Emerging Trends and Expectations from Mobile Networks.. . . . . . . . . . 121 5G Technology Enablers.. . . . . . . . . . . . . . . . . . . . . . . . 126 5G Service Offerings.. . . . . . . . . . . . . . . . . . . . . . . . . . 131 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Chapter 5: 5G Fundamentals 138 5G Radio Access Network.. . . . . . . . . . . . . . . . . . . . . . . 138 5G Core Network.. . . . . . . . . . . . . . . . . . . . . . . . . . . 179 5G Transport Network.. . . . . . . . . . . . . . . . . . . . . . . . . 195 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Chapter 6: Emerging Technologies for 5G-Ready Networks: Segment Routing 212 Complexity in Today’s Network.. . . . . . . . . . . . . . . . . . . . . 212 Introducing Segment Routing. . . . . . . . . . . . . . . . . . . . . . 214 Segment Routing Traffic Engineering (SR-TE). . . . . . . . . . . . . . . . 222 Software-Defined Transport with Segment Routing.. . . . . . . . . . . . . 228 5G Transport Network Slicing. . . . . . . . . . . . . . . . . . . . . . 232 Redundancy and High Availability with Segment Routing.. . . . . . . . . . . 238 Segment Routing for IPv6 (SRv6). . . . . . . . . . . . . . . . . . . . . 242 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Chapter 7: Essential Technologies for 5G-Ready Networks: DC Architecture and Edge Computing 250 Data Center Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . 250 From Centralized to Distributed to Cloud Data Centers. . . . . . . . . . . . 257 Deploying Data Centers.. . . . . . . . . . . . . . . . . . . . . . . . 260 Optimizing Compute Resources. . . . . . . . . . . . . . . . . . . . . 267 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Chapter 8: Essential Technologies for 5G-Ready Networks: Transport Services 274 What’s a 5G Transport Service?.. . . . . . . . . . . . . . . . . . . . . 274 VPN Services.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Transport Services Across MCN. . . . . . . . . . . . . . . . . . . . . 297 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Chapter 9: Essential Technologies for 5G-Ready Networks: Timing and Synchronization 302 Types of Synchronization.. . . . . . . . . . . . . . . . . . . . . . . . 304 Why Synchronization Is Important in 5G.. . . . . . . . . . . . . . . . . . 306 Synchronization Sources and Clock Types.. . . . . . . . . . . . . . . . . 308 Implementing Timing in Mobile Networks.. . . . . . . . . . . . . . . . . 311 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Chapter 10: Designing and Implementing 5G Network Architecture 334 5G Architecture Recap.. . . . . . . . . . . . . . . . . . . . . . . . . 334 5G Fronthaul Considerations.. . . . . . . . . . . . . . . . . . . . . . 336 xHaul Transport Technology Choices. . . . . . . . . . . . . . . . . . . 345 Designing the Mobile Transport Network. . . . . . . . . . . . . . . . . . 346 Routing Design Simplification. . . . . . . . . . . . . . . . . . . . . . 361 Transport Services for 5G MCN.. . . . . . . . . . . . . . . . . . . . . 370 Taking MCN to the Cloud.. . . . . . . . . . . . . . . . . . . . . . . . 372 Automation in 5G Networks.. . . . . . . . . . . . . . . . . . . . . . . 376 Deciphering 5G Mobile Requirements.. . . . . . . . . . . . . . . . . . . 380 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Afterword: Beyond 5G 386 9780137376841, TOC, 4/14/2022
£40.49
Pearson Education (US) Securing 5G and Evolving Architectures
Book SynopsisPramod Nair is a Lead Security Architect at Cisco Systems focusing on service providers. During his 20 years of experience in the industry, Pramod has worked in multiple areas, including research and development, designing end-to-end mobile networks, and technical consulting on military and defense projects. Among other responsibilities in his current role within Cisco, Pramod leads 5G Security Architecture, driving its adoption globally, and has been instrumental in architecting secure next-generation networks for customers across the globe. He is a regular speaker on the subject at large conferences and industry events. Pramod is an active member of the security community. His role is to help mobile network providers, service providers, industry verticals, the national security and defense sectors, and other agencies dedicated to securing critical infrastructures. He is also deeply involved with industry trade organizations, has co-chaired the 5G secTable of ContentsForeword xv Preface xvi Acknowledgments xxi About the Author xxii Part I Evolution of Cellular Technologies to 5G, Security Enhancements, and Challenges Chapter 1: Evolution from 4G to 5G 2 Mobile Network Evolution from 4G to 5G.. . . . . . . . . . . . . . . . . . 4 Key 5G Features in 3GPP Releases.. . . . . . . . . . . . . . . . . . . . 18 Key 5G Advanced Features.. . . . . . . . . . . . . . . . . . . . . . . 20 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Chapter 2: Deployment Modes in 5G 26 5G NSA and SA Deployments.. . . . . . . . . . . . . . . . . . . . . . 27 5G Time-Sensitive Networks.. . . . . . . . . . . . . . . . . . . . . . . 42 5G Local Area Network–Type Service.. . . . . . . . . . . . . . . . . . . 44 Private 5G/Non-Public Networks.. . . . . . . . . . . . . . . . . . . . . 46 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Chapter 3: Securing 5G Infrastructure 56 3GPP 5G Security Enhancements.. . . . . . . . . . . . . . . . . . . . . 57 Security Challenges in 5G. . . . . . . . . . . . . . . . . . . . . . . . 74 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Acronyms Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Part II Securing 5G Architectures, Deployment Modes, and Use Cases Chapter 4: Securing RAN and Transport Deployments in 5G 82 5G RAN and Transport Threats. . . . . . . . . . . . . . . . . . . . . . 84 Securing 5G RAN and Transport.. . . . . . . . . . . . . . . . . . . . . 92 Real Scenario Case Study: Examples of Threat Surfaces and Their Mitigation. . 125 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Chapter 5: Securing MEC Deployments in 5G 142 Service Provider Network-Based MEC.. . . . . . . . . . . . . . . . . . 144 Enterprise Network-Based MEC.. . . . . . . . . . . . . . . . . . . . . 145 MEC Deployment Models.. . . . . . . . . . . . . . . . . . . . . . . . 146 Threat Surfaces in 5G MEC Deployments.. . . . . . . . . . . . . . . . . 154 Securing 5G MEC.. . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Real Scenario Case Study: MEC Threats and Their Mitigation.. . . . . . . . . 217 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Chapter 6: Securing Virtualized 5G Core Deployments 234 A Brief Evolution of Virtualization in Telecommunications.. . . . . . . . . . . 235 Threats in Virtualized 5G Packet Core Deployments.. . . . . . . . . . . . . 240 Securing Virtualized 5G Packet Core Deployments.. . . . . . . . . . . . . 257 Real Scenario Case Study: Virtualized 5GC Threats and Mitigation.. . . . . . . 281 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Chapter 7: Securing Network Slice, SDN, and Orchestration in 5G 298 Network Slicing and Its Enablers—SDN and Orchestration. . . . . . . . . . 299 Threat Surfaces in 5G Network Slice, SDN, and Orchestration Deployments.. . . 309 Mitigation of Threats.. . . . . . . . . . . . . . . . . . . . . . . . . . 327 Real Scenario Case Study: Threats in the 5G Network Slice, SDN, and Orchestration Deployments and Their Mitigation. . . . . . . . . . . . . 355 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Key Acronyms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 Chapter 8: Securing Massive IoT Deployments in 5G 376 Massive IoT–Based Threats in 5G.. . . . . . . . . . . . . . . . . . . . 380 Securing mIoT Deployments in 5G Networks.. . . . . . . . . . . . . . . . 391 Real Scenario Case Study: mIoT Threats and Their Mitigation.. . . . . . . . . 414 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Key Acronyms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 420 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422 Chapter 9: Securing 5G Use Cases 424 Secure 5G Smart Factory and Manufacturing. . . . . . . . . . . . . . . . 425 Critical Infrastructure.. . . . . . . . . . . . . . . . . . . . . . . . . . 437 5G Vehicle-to-Everything (5G-V2X).. . . . . . . . . . . . . . . . . . . . 447 Standards and Associations.. . . . . . . . . . . . . . . . . . . . . . . 463 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 Key Acronyms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 Part III End-to-End 5G Security Architecture and Prioritizing Security Investments Chapter 10: Building Pragmatic End-to-End 5G Security Architecture 468 Foundations of 5G Security.. . . . . . . . . . . . . . . . . . . . . . . 470 Key Tenets of 5G Security Architecture.. . . . . . . . . . . . . . . . . . 472 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497 Acronyms Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501 Chapter 11: Prioritizing 5G Security Investments 502 Method of Prioritizing Security Controls.. . . . . . . . . . . . . . . . . . 505 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532 Acronyms Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 533 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534 Part IV Emerging Discussions Chapter 12: 5G and Beyond 536 Adoption and Adaptability of 5G and Evolving Technologies.. . . . . . . . . 537 Convergence of Wi-Fi and Evolving Cellular Technologies.. . . . . . . . . . 539 Use of AI and ML in Securing 5G and Evolving Networks.. . . . . . . . . . . 543 Crypto Agility in 5G and Evolving Technologies.. . . . . . . . . . . . . . . 546 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 9780137457939, TOC, 10/27/2021
£46.79
Pearson Education (US) Understanding and Troubleshooting Cisco Catalyst
Book SynopsisSimone Arena is a principal technical marketing engineer (TME) within the Cisco Enterprise Networking & Cloud group and is primarily focused on enterprise network architecture and on all things related to wireless and mobility. Simone is based in Italy and is a Cisco veteran, having joined Cisco in 1999. Throughout the years, Simone has covered multiple roles at Cisco, starting as a software engineer working with Catalyst switching platforms, to consulting system engineer in the field, to TME within different teams (Enterprise Solution Engineering, Wireless Business Unit, Enterprise Networking and Cloud, and now Networking Experiences Group). Today Simone is the lead TME architect for Catalyst Wireless, and his time is split between helping customers and partners design the best solution that fits their needs and engineering and product management, trying to evolve and improve the products and solutions. Simone is a Distinguished Speaker at Cisco Live and has spokenTable of Contents Introduction xxvii Chapter 1 Cisco C9800 Series 1 Why Cisco C9800? 2 The Role of the Wireless Controller in a Cloud Era 7 Managing the Cisco C9800 10 Cisco Next-Generation Wireless Stack 22 Summary 23 References 23 Chapter 2 Hardware and Software Architecture of the C9800 25 General CAPWAP Split MAC Architecture 25 The Controller Control Plane Architecture Elasticity 27 Wireless Client State Machine 31 One Dataplane to Rule Them All (or Three at the Maximum) 35 Hardware Overview 38 Summary 42 Chapter 3 C9800 Configuration Model 43 C9800 New Configuration Model 43 Cisco C9800 Series Profile and Tag Considerations 48 Summary 64 References 64 Chapter 4 C9800 Deployment and Installation 65 C9800 Deployment Models 65 Setting Up Your First Catalyst Wireless Network 79 Summary 87 References 87 Chapter 5 Security 89 Network Security Fundamentals 89 Wireless Security Fundamentals 116 Securing the Air 128 Securing Your Access Points 148 Securing Your Wireless Controller 151 Encrypted Traffic Analytics 154 Cisco Umbrella 155 Cisco Secure Development Lifecycle (CSDL) 157 Summary 157 References 157 Chapter 6 Mobility and Client Roaming 159 802.11 Roaming 160 Types of Client Roaming 181 C9800 to AireOS Inter-Release Controller Mobility (IRCM) 191 Summary 192 References 193 Chapter 7 RF Deployment and Guidelines 195 Radio Resources Management (RRM) Concepts and Components 195 Challenging RF Environments 199 Radio Resources Management (RRM) 203 DCA 211 RF Profiles 215 Spectrum Intelligence and CleanAir 219 Advanced RF Features 224 Airtime Fairness (ATF) 228 Dynamic Frequency Selection (DFS) 232 Flexible Radio Assignment (FRA) 235 Wireless Intrusion Prevention System (WIPS) and Rogue Detection 238 Summary 246 References 246 Chapter 8 Multicast and Multicast Domain Name System (mDNS) 247 Wireless Multicast 250 Media Stream Feature 263 mDNS 272 Summary 283 References 283 Chapter 9 Quality of Service (QoS) 285 Wi-Fi Quality of Service (QoS) 286 Wi-Fi (802.11) QoS Fundamentals 287 Implementing Wireless QoS on the C9800 300 Designing and Deploying Catalyst C9800 QoS 304 Best Practices 320 Summary 322 References 322 Chapter 10 C9800 High Availability 323 SSO Redundancy 324 HA Teardown 349 SSO Deployment: Impact on Features 350 N+1 Redundancy 352 N+1 vs. SSO High Availability 357 HA in EWC-AP Deployment 358 HA in EWC-SW Deployment 359 Summary 359 References 360 Chapter 11 Cisco DNA Spaces Integration and IoT 361 Value-Added Wireless Services 361 Connected Mobile Experiences (CMX) 372 Cisco DNA Spaces 372 Specific Service Examples 379 Summary 392 References 392 Chapter 12 Network Programmability 393 What Is Network Programmability? 393 Why Is Network Programmability Needed? 393 Is Network Programmability a New Concept? 396 Orchestration of the Entire Network 396 Configuration Repeatability 396 Idempotency 397 Imperative vs. Declarative Models 397 Infrastructure as Code (IaC) 400 Network Programmability in the C9800 401 Data Models 402 YANG Data Models 403 Encoding Formats 406 Protocols 408 Tools to Examine YANG Models 412 How to Examine Data Using NETCONF and YANG Suite 419 How to Examine Data Using RESTCONF and POSTMAN 421 Python and Network Programmability 429 Summary 436 References 436 Chapter 13 Model-Driven Telemetry 437 What Is Model-Driven Telemetry? 437 How to Enable Model-Driven Telemetry 438 Operational Data and KPIs 441 Polling vs. Subscribing 447 Telemetry Streams 448 How to Identify Subtrees in YANG Models 449 Dial-out vs. Dial-in 450 Tools 460 Summary 467 References 467 Chapter 14 Cisco DNA Center/Assurance Integration 469 Introduction 469 Managing the C9800 with Cisco DNA Center 472 Summary 492 References 492 Chapter 15 Backing Up, Restoring, and Upgrading Your C9800 493 Saving and Restoring the Configuration for Disaster Recovery 493 Running IOS-XE in Install or Bundle Mode 500 Upgrading (and Downgrading) the Controller Safely 501 Summary 506 References 506 Chapter 16 Troubleshooting 507 Control Plane Tracing 509 Embedded Packet Capture (EPC) 525 Packet Tracer 531 Troubleshooting Dashboard 536 Other On-the-Box Tools on the C9800 GUI 540 Offline Tools for the C9800 545 Health and KPI Monitoring 548 Summary 577 References 578 Appendix A Setting Up a Development Environment 579 9780137492329, TOC, 5/27/2022
£40.49
John Wiley & Sons Inc Connected Services
Book Synopsis*Trade Review"I highly recommend the essential and idea filled book Connected Services: A Guide to the Internet Technologies Shaping the Future of Mobile Services and Operators by Paul Golding, to anyone in any internet, telco, business, policy making, or technology related field who seeks a clearer understanding of the rapidly changing technologies affecting the overall information and communications landscape. This book explains in detail how the underlying technologies, that drive connected services, really work in a format that is understandable and applicable for anyone with a basic knowledge of technology." (Blog Business World, 4 November 2011)Table of ContentsForeword xv Preface xvii 1 Connected Services: The Collision of Internet with Telco 1 1.1 Connected What? 1 1.2 Ubiquity: IP Everywhere or Software Everyware? 5 1.3 Six Models for Potential Operator Futures 6 1.3.1 Access Provider 7 1.3.2 Connected Services Platform 7 1.3.3 Distribution Channel 8 1.3.4 Seamless Services Provider 9 1.3.5 Financial Merchant 10 1.3.6 Social Telco 10 1.3.7 Start Thinking Platforms 12 1.3.8 Execution 14 1.4 “Follow Me” Web – Social Networks and Social Software 14 1.5 What are Platforms and Why are They Important? 18 1.5.1 Platform Patterns for Telcos 23 1.5.2 Marketplace and Service Platforms 24 1.5.3 Data and Mash-Up Platforms 26 1.5.4 Platform as a Service 28 1.5.5 Do Platforms Work? 30 1.6 From Platforms to Ecosystems 31 1.7 Where’s the Value? 32 1.8 What Should We Build? It’s Still About the Experience! 33 1.9 Summary 36 2 The Web 2.0 Services Ecosystem, How ItWorks and Why 37 2.1 Introduction 37 2.2 Beneath the Hood of Web 2.0: CRUD, MVC and REST 38 2.3 LAMP and Beyond: Web Frameworks and Middleware 45 2.3.1 Introducing LAMP 45 2.3.2 Web Frameworks 47 2.3.3 Agile – Coding at the Speed of Thought 50 2.3.4 Summary – “Why Frameworks Work” 52 2.4 Open by Default: Open Source, Open APIs and Open Innovation 52 2.4.1 The Different Types of Open 52 2.4.2 Open, Open, Open! 56 2.4.3 Summary (“Why Open Works . . .”) 58 2.5 One App Fits All? HTML5 and the Modern Browser 58 2.5.1 Summary (“Why the Browser Works”) 62 2.6 It’s all About People: Social Computing 62 2.6.1 Exploiting Relationships – The Social Graph 62 2.6.2 Exploiting Interests – Context Awareness 63 2.6.3 Portable Data 64 2.6.4 Mobile is THE Social Device 67 2.6.5 Summary (“Why Social Computing Works”) 67 2.7 User Participation, Co-Creation and Analytics 67 2.7.1 User Participation 67 2.7.2 Co-Creation 68 2.7.3 Analytics 68 2.7.4 Summary (“Why User-Voice Works”) 69 2.8 Standing on the Shoulders of Giants: APIs and Mash-Ups 69 2.8.1 Summary (“Why Mash-Ups Work”) 71 2.9 Mobile 2.0 – It’s Really a Developer Thing! 71 2.9.1 Mobile 2.0 71 2.9.2 Mobile as THE Platform (Again) 72 3 The Web Operating System – The Future (Mobile) Services Platform 75 3.1 Why is the Concept of a Web OS Important? 75 3.1.1 Summary 81 3.2 Internet of Things 81 3.2.1 Summary 84 3.3 Making Sense of Data 85 3.3.1 Data Semantics 85 3.3.2 Data Relationships 87 3.3.3 Meta-Data Tools: Ontologies, OWL, RDF 89 3.3.4 Meta-Data Tools: Tagging and Folksonomies 91 3.3.5 RDFa – Embedding Meta-Data Within Web Pages 93 3.3.6 Meta-Data Tools: Twitter and Annotations “Twannotations” 94 3.3.7 Summary 98 3.4 Future Web: “People OS?” 98 3.4.1 Introduction 98 3.4.2 Social Networks 100 3.4.3 Social APIs and Platform Thinking (Again) 103 3.4.4 Open Social API – A Cross-Platform People OS? 104 3.4.5 Open Social API – The Mechanics 105 3.4.6 Emergence of a Person OS at the UI layer 108 3.4.7 Privacy and Personas 110 3.5 Social Telcos and the Web OS 110 3.5.1 Where are the Telcos? 110 3.5.2 Telco Social Graph and APIs 111 3.5.3 Identity and Security 114 4 Big Data and Real-Time Web 115 4.1 What is Big Data and Where Did it Come From? 115 4.1.1 In Search of the New Big Data 115 4.1.2 The Business of Big Data 116 4.1.3 Welcome to the Age of Big Data 120 4.2 Some Key Examples of Big Data 121 4.2.1 Statistics Collection at Facebook 121 4.2.2 Real-Time e-Commerce at Amazon with Dynamo 123 4.2.3 Amazon’s Dynamo Features 127 4.3 Say Hello to the Data Geeks 128 4.4 “No SQL” and Some of its Flavours 130 4.4.1 No SQL Means No SQL, But not Much Else 130 4.4.2 Key-Value Stores 132 4.4.3 Document Stores 133 4.4.4 Graph Stores 134 5 Real-Time and Right-TimeWeb 137 5.1 Real-Time Web and Twitter 137 5.1.1 Web Becomes Real-Time Thanks to Twitter 137 5.1.2 Web Infrastructure Goes Real-Time 142 5.1.3 The Real-Time Nature of Mobile 149 5.2 Big Data + Real-Time = Right-Time Web 152 5.2.1 New Buzzword: Right-Time Web 152 5.2.2 Key Components of Right-Time Web 153 6 Modern Device Platforms 159 6.1 Mobile Devices or Connected Devices? 160 6.1.1 What is a Mobile Platform? 160 6.1.2 Developer Mindset About Mobile Platforms 162 6.1.3 Mobile Device or Connected Device? 164 6.2 Introduction to Mobile Device Platforms 166 6.2.1 Platforms of Interest 166 6.2.2 Brief Explanation of an Operating System and SDK 167 6.3 The iOS Platform 170 6.3.1 Mac OS X and Unix – The Foundation for iOS 171 6.3.2 The Mechanics of iOS 172 6.3.3 iOS – What Makes the Platform Tick 176 6.3.4 How Open is iOS? 177 6.4 The Android Platform 178 6.4.1 Introduction 178 6.4.2 Architecture 179 6.4.3 Linux Kernel 179 6.4.4 Android Runtime 180 6.4.5 Android Application Framework 181 6.4.6 Android System Libraries 181 6.4.7 Android – What Makes the Platform Tick 182 6.4.8 How Open is Android? 183 6.5 The Mobile Web Platform 184 6.5.1 Introduction 184 6.5.2 Native versus Web “Debate” 184 6.5.3 Is Native versus Web the Right Question? 186 6.5.4 Major Trends in Mobile Web 190 6.5.5 HTML5 193 6.5.6 Widgets 200 6.5.7 Is That a Phone in My Browser? 207 6.5.8 Mobile Web First? 207 7 Augmented Web 209 7.1 Real or Virtual Worlds? 210 7.1.1 Introduction 210 7.1.2 Augmented Reality 210 7.1.3 Proof-of-Presence or “check-in” Services 215 7.1.4 Summary – Virtual is Just Another Layer in the Web OS 215 7.2 Sensor-Net: Mobiles as Sixth-Sense Devices 216 7.2.1 Current Sensor Applications in Smartphones 217 7.2.2 Emergent and Future Sensor Applications in Smartphones 220 7.2.3 Sensor Net – Is This Web 3.0? 227 8 Cloud Computing, Saas and PaaS 229 8.1 What is Cloud Computing? 230 8.1.1 More Than Just a Fluffy Phrase 230 8.1.2 Open and Commodity: Key Enablers for Cloud Computing 231 8.1.3 Public or Private Cloud? 233 8.1.4 Key Use Cases 234 8.2 On-Demand: Cloud Computing Infrastructure 236 8.2.1 The Infrastructure Level: Servers, Images and Templates 236 8.2.2 The Service Level: Storage, Queues, Load-Balancers . . . 239 8.3 On-Demand: Software as a Service 242 8.3.1 Opening SaaS with APIs 243 8.3.2 Using SaaS for an Ecosystem Strategy 244 8.3.3 Opportunities for Telcos 245 8.4 On-Demand: Platform as a Service 247 8.4.1 Business PaaS – Force.com 248 8.4.2 Telco 2.0 PaaS – Tropo.com 251 8.4.3 Web 2.0 PaaS – Heroku.com 255 9 Operator Platform: Network as a Service 265 9.1 Opportunity? Network as a Service 266 9.1.1 What is Network as a Service (NaaS)? 266 9.1.2 Characteristics of NaaS APIs 266 9.1.3 Opportunity? 267 9.1.4 The “Customers” are Developers, not the Users! 268 9.1.5 Who are Developers? 268 9.1.6 Ingredients for NaaS Success – What do Developers Want? 270 9.2 Examples of NaaS Connected Services 279 9.2.1 NaaS Case Study – O2 Litmus 279 9.2.2 Update to O2 Litmus Story – BlueVia 281 9.2.3 OneAPI – The Interoperable NaaS Play 282 9.2.4 Hashblue Case Study? – RT# and SMSOwl 283 9.2.5 The #Blue Hacks 284 9.2.6 The Benefits of #Blue Platform 286 10 Harnessing Web 2.0 Start-Up Methods for Telcos 289 10.1 Start-Ups and Innovation 289 10.2 What can Telcos Learn from Web 2.0? 290 10.3 Key Web Start-Up Memes 291 10.4 Tech People 293 10.5 Lean Start-Up Methodologies 294 10.6 Extreme and Constant Optimization 297 10.6.1 Ship Often 297 10.6.2 Always Experiment 298 10.6.3 Experiment Driven Development (EDD) 301 10.6.4 The Metrics Mantra – Startup Metrics for Pirates: AARRR! 303 10.7 Co-Creation and Crowdsourcing 304 10.8 Exploiting Big-Data 307 10.9 Social Discovery 310 10.10 APIs and Developers 311 10.11 Incubation and Acceleration 312 10.12 Hack Days, Events and Barcamps 313 10.12.1 Hack Days 314 10.12.2 Barcamps 315 Index 319
£63.60
Cambridge University Press Wireless Communications and Networking for
Book SynopsisA thorough treatment of UAV wireless communications and networking research challenges and opportunities. Detailed, step-by-step development of carefully selected research problems that pertain to UAV network performance analysis and optimization, physical layer design, trajectory path planning, resource management, multiple access, cooperative communications, standardization, control, and security is provided. Featuring discussion of practical applications including drone delivery systems, public safety, IoT, virtual reality, and smart cities, this is an essential tool for researchers, students, and engineers interested in broadening their knowledge of the deployment and operation of communication systems that integrate or rely on unmanned aerial vehicles.Trade Review'This book, written by the most prominent experts in the field, provides a complete in-depth analysis of UAV wireless communications. It should become a reference material for all the students, engineers and researchers who are building our next generation wireless communication networks.' Merouane Debbah, CentraleSupélec'This is the most comprehensive book on the rapidly evolving field of wireless communications and networking for UAVs. The authors are among the researchers who have made the most profound contributions to this emerging field. Their impressive command on the subject matter results in a thorough presentation taking theory, practice, and industrial standards into account. A must-read for researchers and engineers working in this field.' Halim Yanikomeroglu, Carleton University, OttawaTable of Contents1. Wireless communications and networking with unmanned aerial vehicles: an introduction; 2. UAV applications and use cases; 3. Aerial channel modeling and waveform design; 4. Performance analysis and tradeoffs; 5. Deployment of UAVs for wireless communications; 6. Wireless-aware path planning for UAV networks; 7. Resource management for UAV networks; 8. Cooperative communications in UAV networks; 9. From LTE to 5G NR-enabled UAV networks; 10. Security of UAV networks.
£99.75
Cambridge University Press 6G The Next Horizon
Book SynopsisThe first book on 6G wireless presents an overall vision for 6G - an era of intelligence-of-everything - with drivers, key capabilities, use cases, KPIs, and the technology innovations that will shape it. These innovations include immersive human-centric communication, sensing, localization, and imaging, connected machine learning and networked AI, Industry 4.0 and beyond with connected intelligence, smart cities and life, and the satellite mega-constellation for 3D full-Earth wireless coverage. Also covered are new air-interface and networking technologies, integrated sensing and communications, and integrated terrestrial and non-terrestrial networks. In addition, novel network architectures to enable network AI, user centric networks, native trustworthiness are discussed. Essential reading for researchers in academia and industry working on B5G wireless communications.Table of ContentsPreface; Part I. Introduction: 1. Mobile communications towards 2030 and beyond Wen Tong, Peiying Zhu, Yan Chen and Wenshuan Dang; Part II. Use Cases and Target KPIs: 2. Extremely immersive human-centric experience Chunqing Zhang and Yan Chen; 3. Sensing, localization, and imaging Danny Kai Pin Tan, Jia He and Yanchun Li; 4. Full-capability industry 4.0 and beyond Xueli An, Xiuqiang Xu and Yingpei Lin; 5. Smart city and smart life Xueli An, Xiuqiang Xu and Yingpei Lin; 6. Global coverage for mobile services Xueliang Shi and Jun Wang; 7. Connected machine learning and networked AI Yiqun Ge, Rong Li, Hui Lin and Yan Chen; Part III. Theoretical Foundations: 8. Theoretical foundations for native AI and machine learning Jean-Claude Belfiore, Merouane Debbah, Rui Ni, Yiqun Ge and Jian Wang; 9. Theoretical foundations for massive capacity and connectivity Rui Ni, Merouane Debbah and Maxime Guillaudl; 10. Theoretical foundations for future machine type communications Jean-Claude Belfiore, Merouane Debbah, Rui Ni and Yiqun Ge; 11. Theoretical foundations for energy-efficient systems Merouane Debbah and Rui Ni; Part IV. New Elements: 12. New spectrum Kun Zeng and Guangjian Wang; 13. New channels Jia He, Ziming Yu; 14. New materials Huanhuan Gu, Morris Repeta and David Wessel; 15. New antennas Huanhuan Gu, Morris Repeta and David Wessel; 16. THz technology Huanhuan Gu, Morris Repeta and David Wessel; 17. Post moore's law computing Huanhuan Gu, Morris Repeta and David Wessel; 18. New devices Xueqiang Yan, Xun Yang, Chunqing Zhang and Huanhuan Gu; Part V. Enabling Technologies for 6G Air Interface Design: 19. Intelligent air interface framework Jianglei Ma, Rong Li, Yongxia Lyv, Hao Tang, Xiaoyan Bi and Liqing Zhang; 20. Integrated terrestrial and non-terrestrial communication Amine Maaref, Hejia Luo and Jianglei Ma; 21. Integrated sensing and communication Alireza Bayesteh, Jiajin Luo and Jia He; 22. New waveforms and modulation schemes Huang Huang and Alireza Bayesteh; 23. New coding Huazi Zhang, Mengyao Ma, Yiqun Ge and Zhongfeng Li; 24. New multiple access Lei Wang, Yan Chen, Liqing Zhang and Jianglei Ma; 25. Ultra-massive MIMO Hadi Baligh, Xiaoyan Bi, Gaoning He, Yong Liu, Huan Sun, Rui Ni, Zhongfeng Li and Jianglei Ma; 26. Integrated super-sidelink and access link communication Chunqing Zhang and Zhongfeng Li; Part VI. New Features for 6G Network Architecture Design: 27. Technologies for the network AI architecture Jianjun Wu, Chenghui Peng, Xueli An and Hang Zhang; 28. User-centric architecture technologies Xueqiang Yan, Artur Hecker, Chenghui Peng and Mingyu Zhao; 29. Native trustworthiness Fei Liu and Rob Sun; 30. Data governance architecture technologies Chenghui Peng, Jianjun Wu, Xueli An, Chenchen Yang and Xu Li; 31. Multi-player ecosystem architecture technologies Hang Zhang, Xueli An, Xun Xiao and Wei Tan; 32. Non-terrestrial network integrated architecture technologies Arashmid Akhavain and Michael Mayer; Part VII. Summary and Future Work: 33. 6G Ecosystem and roadmap Hui Lin, Xueqiang Yan, Yan Chen and Jianmin Lu.
£75.04
John Wiley & Sons Inc Evolutionary Algorithms for Mobile Ad Hoc
Book SynopsisThis comprehensive guide describes how evolutionary algorithms (EA) may be used to identify, model, and optimize day-to-day problems that arise for researchers in optimization and mobile networking.Table of ContentsPreface xiii PART I BASIC CONCEPTS AND LITERATURE REVIEW 1 1 INTRODUCTION TO MOBILE AD HOC NETWORKS 3 1.1 Mobile Ad Hoc Networks 6 1.2 Vehicular Ad Hoc Networks 9 1.2.1 Wireless Access in Vehicular Environment (WAVE) 11 1.2.2 Communication Access for Land Mobiles (CALM) 12 1.2.3 C2C Network 13 1.3 Sensor Networks 14 1.3.1 IEEE 1451 17 1.3.2 IEEE 802.15.4 17 1.3.3 ZigBee 18 1.3.4 6LoWPAN 19 1.3.5 Bluetooth 19 1.3.6 Wireless Industrial Automation System 20 1.4 Conclusion 20 References 21 2 INTRODUCTION TO EVOLUTIONARY ALGORITHMS 27 2.1 Optimization Basics 28 2.2 Evolutionary Algorithms 29 2.3 Basic Components of Evolutionary Algorithms 32 2.3.1 Representation 32 2.3.2 Fitness Function 32 2.3.3 Selection 32 2.3.4 Crossover 33 2.3.5 Mutation 34 2.3.6 Replacement 35 2.3.7 Elitism 35 2.3.8 Stopping Criteria 35 2.4 Panmictic Evolutionary Algorithms 36 2.4.1 Generational EA 36 2.4.2 Steady-State EA 36 2.5 Evolutionary Algorithms with Structured Populations 36 2.5.1 Cellular EAs 37 2.5.2 Cooperative Coevolutionary EAs 38 2.6 Multi-Objective Evolutionary Algorithms 39 2.6.1 Basic Concepts in Multi-Objective Optimization 40 2.6.2 Hierarchical Multi-Objective Problem Optimization 42 2.6.3 Simultaneous Multi-Objective Problem Optimization 43 2.7 Conclusion 44 References 45 3 SURVEY ON OPTIMIZATION PROBLEMS FOR MOBILE AD HOC NETWORKS 49 3.1 Taxonomy of the Optimization Process 51 3.1.1 Online and Offline Techniques 51 3.1.2 Using Global or Local Knowledge 52 3.1.3 Centralized and Decentralized Systems 52 3.2 State of the Art 53 3.2.1 Topology Management 53 3.2.2 Broadcasting Algorithms 58 3.2.3 Routing Protocols 59 3.2.4 Clustering Approaches 63 3.2.5 Protocol Optimization 64 3.2.6 Modeling the Mobility of Nodes 65 3.2.7 Selfish Behaviors 66 3.2.8 Security Issues 67 3.2.9 Other Applications 67 3.3 Conclusion 68 References 69 4 MOBILE NETWORKS SIMULATION 79 4.1 Signal Propagation Modeling 80 4.1.1 Physical Phenomena 81 4.1.2 Signal Propagation Models 85 4.2 State of the Art of Network Simulators 89 4.2.1 Simulators 89 4.2.2 Analysis 92 4.3 Mobility Simulation 93 4.3.1 Mobility Models 93 4.3.2 State of the Art of Mobility Simulators 96 4.4 Conclusion 98 References 98 PART II PROBLEMS OPTIMIZATION 105 5 PROPOSED OPTIMIZATION FRAMEWORK 107 5.1 Architecture 108 5.2 Optimization Algorithms 110 5.2.1 Single-Objective Algorithms 110 5.2.2 Multi-Objective Algorithms 115 5.3 Simulators 121 5.3.1 Network Simulator: ns-3 121 5.3.2 Mobility Simulator: SUMO 123 5.3.3 Graph-Based Simulations 126 5.4 Experimental Setup 127 5.5 Conclusion 131 References 131 6 BROADCASTING PROTOCOL 135 6.1 The Problem 136 6.1.1 DFCN Protocol 136 6.1.2 Optimization Problem Definition 138 6.2 Experiments 140 6.2.1 Algorithm Configurations 140 6.2.2 Comparison of the Performance of the Algorithms 141 6.3 Analysis of Results 142 6.3.1 Building a Representative Subset of Best Solutions 143 6.3.2 Interpretation of the Results 145 6.3.3 Selected Improved DFCN Configurations 148 6.4 Conclusion 150 References 151 7 ENERGY MANAGEMENT 153 7.1 The Problem 154 7.1.1 AEDB Protocol 154 7.1.2 Optimization Problem Definition 156 7.2 Experiments 159 7.2.1 Algorithm Configurations 159 7.2.2 Comparison of the Performance of the Algorithms 160 7.3 Analysis of Results 161 7.4 Selecting Solutions from the Pareto Front 164 7.4.1 Performance of the Selected Solutions 167 7.5 Conclusion 170 References 171 8 NETWORK TOPOLOGY 173 8.1 The Problem 175 8.1.1 Injection Networks 175 8.1.2 Optimization Problem Definition 176 8.2 Heuristics 178 8.2.1 Centralized 178 8.2.2 Distributed 179 8.3 Experiments 180 8.3.1 Algorithm Configurations 180 8.3.2 Comparison of the Performance of the Algorithms 180 8.4 Analysis of Results 183 8.4.1 Analysis of the Objective Values 183 8.4.2 Comparison with Heuristics 185 8.5 Conclusion 187 References 188 9 REALISTIC VEHICULAR MOBILITY 191 9.1 The Problem 192 9.1.1 Vehicular Mobility Model 192 9.1.2 Optimization Problem Definition 196 9.2 Experiments 199 9.2.1 Algorithms Configuration 199 9.2.2 Comparison of the Performance of the Algorithms 200 9.3 Analysis of Results 202 9.3.1 Analysis of the Decision Variables 202 9.3.2 Analysis of the Objective Values 204 9.4 Conclusion 206 References 206 10 SUMMARY AND DISCUSSION 209 10.1 A New Methodology for Optimization in Mobile Ad Hoc Networks 211 10.2 Performance of the Three Algorithmic Proposals 213 10.2.1 Broadcasting Protocol 213 10.2.2 Energy-Efficient Communications 214 10.2.3 Network Connectivity 214 10.2.4 Vehicular Mobility 215 10.3 Global Discussion on the Performance of the Algorithms 215 10.3.1 Single-Objective Case 216 10.3.2 Multi-Objective Case 217 10.4 Conclusion 218 References 218 INDEX 221
£86.36
Morgan & Claypool Publishers Embracing Interference in Wireless Systems
Book SynopsisThe wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.
£51.00
now publishers Inc Network and Protocol Architectures for Future
Book SynopsisSince their conception satellites have offered the promise of more capacity for terrestrial communication systems or to exploit their inherent multicasting and broadcasting capabilities. Recent advances in satellite technology have resulted in the integration of satellite and terrestrial networks to meet the quality and capacity requirements of modern day communication systems. Network and Protocol Architectures for Future Satellite Systems reviews the emerging technologies being deployed in the networking architectures being proposed in the framework of the Future Internet. Novel protocols such as Multi Path TCP (MPTCP) and networking trends such as Information Centric Networking (ICN) are described in depth and their application in segments deploying both satellite and terrestrial networks are illustrated. This is also the first monograph to review content-based networking extensively. This is becoming increasingly important driven by the ubiquitous nature of the internet. Applications to satellite communications are illustrated and the technical challenges to be further addressed are highlighted.Table of Contents1: Introduction 2 Future Trends in Satellite Communications 3 Networking Solutions for High Throughput Satellite Systems 4 Future Trends in Satellite Networking References
£999.99
River Publishers Introduction to Wireless Communication Circuits
Book SynopsisOver the past decade the tremendous development of Wireless Communications has changed human life incredibly. Considerable advancement has been made in the design and architecture of communications related RF and Microwave circuits. This book is focused on special circuits dedicated to the RF level of wireless Communications. From Oscillators to Modulation and Demodulation and from Mixers to RF and Power Amplifier Circuits, the topics are presented in a sequential manner. A wealth of analysis is provided in the text alongside various worked out examples. Related problem sets are given at the end of each chapter.Table of ContentsPart I: 1 The Amazing World of Wireless Systems 2 Oscillators Part 2: 3 PLL, FM Modulation, and FM Demodulation 4 Mixers 5 Modulation/Demodulation of Amplitude/Phase 6 Limiters and Automatic Gain Control Part 3: 7 Transmission Lines and Impedance Matching 8 Scattering Parameters 9 Amplifier Design Using S-parameters 10 Power Amplifier
£114.00
World Scientific Publishing Co Pte Ltd Silicon Systems For Wireless Lan
Book SynopsisToday's integrated silicon circuits and systems for wireless communications are of a huge complexity.This unique compendium covers all the steps (from the system-level to the transistor-level) necessary to design, model, verify, implement, and test a silicon system. It bridges the gap between the system-world and the transistor-world (between communication, system, circuit, device, and test engineers).It is extremely important nowadays (and will be more important in the future) for communication, system, and circuit engineers to understand the physical implications of system and circuit solutions based on hardware/software co-design as well as for device and test engineers to cope with the system and circuit requirements in terms of power, speed, and data throughput.Related Link(s)
£121.50
World Scientific Publishing Co Pte Ltd Wireless Sensor And Robot Networks: From Topology
Book SynopsisWireless sensor networks have gained much attention these last years thanks to the great set of applications that accelerated the technological advances. Such networks have been widely investigated and many books and articles have been published about the new challenges they pose and how to address them. One of these challenges is node mobility: sensors could be moved unexpectedly if deployed in an uncontrolled environment or hold by moving object/animals.Beyond all this, a new dimension arises when this mobility is controlled, i.e. if these sensors are embedded in robots. These robots cohabit with sensors and cooperate together to perform a given task collectively by presenting hardware constraints: they still rely on batteries; they communicate through short radio links and have limited capacities.In this book, we propose to review new challenges brought about by controlled mobility for different goals and how they are addressed in the literature in wireless sensor and Robot networks, ranging from deployment to communications.Table of ContentsRouting in Wireless Sensor and Robot Networks; Data Collection in Wireless Sensor and Robot Networks; Robot-Robot Coordination; Self-Deployment; Substitution Networks; Energy Restoration in Wireless Sensor and Robot Network; Swarm Robotic Deployment; Robot Cooperation; Localization; Challenges.
£88.20
World Scientific Publishing Co Pte Ltd Broadband Matching: Theory And Implementations
Book SynopsisThe third edition presents a unified, up-to-date and detailed account of broadband matching theory and its applications to the design of broadband matching networks and amplifiers. A special feature is the addition of results that are of direct practical value. They are design curves, tables and explicit formulas for designing networks having Butterworth, Chebyshev or elliptic, Bessel or maximally flat group-delay response. These results are extremely useful as the design procedures can be reduced to simple arithmetic. Two case studies towards the end of the book are intended to demonstrate the applications to the practical design of modern filter circuits.Table of ContentsFoundations of Network Theory; The Scattering Matrix; Approximation and Ladder Realization; Theory of Broadband Matching: The Passive Load; Theory of Broadband Matching: The Active Load; Explicit Design Formulas for Broadband Matching Networks; Broadband Matching of Frequency-Dependent Source and Load; Real-Frequency Solutions of the Broadband Matching Problem; Case Study One, and Case Study Two; Broadband Matching with Bessel or Maximally Flat Group-Delay Characteristic; Design of Reactance-Ladder Diplexer; Broadband Impedance Matching of the RLC Generator and Load;
£95.40
World Scientific Publishing Co Pte Ltd Cloud To Edgeware Wireless Grid Applications
Book SynopsisThis comprehensive book presents a new approach to dynamic distributed virtual systems. Wireless grids edgeware promises new cloud to edge secure architectures with mobile security for the 'Internet of Things' (IoT).
£121.50