WAP (wireless) technology Books
Pearson Education (US) Synchronizing 5G Mobile Networks
Book Synopsis Dennis Hagarty is an experienced technical specialist in the fields of information technology and telecommunications. He has led presales, consulting, and engineering efforts for major utilities, corporations, and service providers in Australasia and Europe. Having worked in numerous technical areas, Dennis has concentrated on the mobile space for almost 30 years and has specialized in timing and synchronization for the last 12 years. In his current role, Dennis is the Cisco communications interface between engineering, field sales teams, and the global Cisco customer community for all matters related to 5G timing and synchronization. This mandate sees him talking with many large service providers, including most of the world's tier 1 mobile operators. Shahid Ajmeri is a senior product manager at Cisco with responsibility for leading its 5G transport and mobile edge architecture strategy. He has more than 20 yearsTable of Contents Foreword xxi Introduction xxiii Part I Fundamentals of Synchronization and Timing Chapter 1 Introduction to Synchronization and Timing 1 Overview of Time Synchronization 1 What Is Synchronization and Why Is It Needed? 3 What Is Time? 10 How Can GPS Provide Timing and Synchronization? 13 Accuracy Versus Precision Versus Stability 15 Summary 16 References in This Chapter 16 Chapter 1 Acronyms Key 16 Further Reading 17 Chapter 2 Usage of Synchronization and Timing 19 Use of Synchronization in Telecommunications 20 Use of Time Synchronization in Finance, Business, and Enterprise 28 Industrial Uses of Time—Power Industry 33 Summary 34 References in This Chapter 34 Chapter 2 Acronyms Key 35 Chapter 3 Synchronization and Timing Concepts 39 Synchronous Networks Overview 40 Clocks 54 Sources of Frequency, Phase, and Time 66 Timing Distribution Network 82 Consumer of Time and Sync (the End Application) 88 Summary 89 References in This Chapter 89 Chapter 3 Acronyms Key 92 Further Reading 95 Part II SDOs, Clocks, and Timing Protocols Chapter 4 Standards Development Organizations 97 International Telecommunication Union 98 International Mobile Telecommunications 104 3rd Generation Partnership Project 106 Institute of Electrical and Electronics Engineers 109 European Telecommunications Standards Institute 116 Internet Engineering Task Force 118 Radio Access Network 120 MEF Forum 126 Society of Motion Picture and Television Engineers and Audio Engineering Society 127 Summary 128 References in This Chapter 129 Chapter 4 Acronyms Key 132 Further Reading 137 Chapter 5 Clocks, Time Error, and Noise 139 Clocks 139 Time Error 154 Holdover Performance 169 Transient Response 172 Measuring Time Error 173 References in This Chapter 175 Chapter 5 Acronyms Key 175 Further Reading 177 Chapter 6 Physical Frequency Synchronization 179 Evolution of Frequency Synchronization 180 BITS and SSU 181 Clocking Hierarchy 185 Synchronous Ethernet 187 Enhanced Synchronous Ethernet 189 Clock Traceability 189 Synchronization Network Chain 197 Clock Selection Process 199 Timing Loops 201 Standardization 207 Summary 207 References in This Chapter 208 Chapter 6 Acronyms Key 209 Further Reading 211 Chapter 7 Precision Time Protocol 213 History and Overview of PTP 214 PTP Versus NTP 215 IEEE 1588-2008 (PTPv2) 216 PTP Clocks 242 Profiles 250 PTP Security 273 IEEE 1588-2019 (PTPv2.1) 275 Summary 280 References in This Chapter 280 Chapter 7 Acronyms Key 283 Part III Standards, Recommendations, and Deployment Considerations Chapter 8 ITU-T Timing Recommendations 289 Overview of the ITU 290 ITU-T Study Group 15 and Question 13 291 Reading the Recommendations 299 ITU-T Physical and TDM Timing Recommendations 299 ITU-T Recommendations for Frequency in Packet Networks 310 ITU-T Packet-Based Timing Recommendations 316 Possible Future Changes in Recommendations 340 Summary 341 References in This Chapter 341 Chapter 8 Acronyms Key 342 Further Reading 346 Chapter 9 PTP Deployment Considerations 347 Deployment and Usage 348 Factors Impacting Timing Performance 380 Parameters for Timing Performance 383 Clock Performance 401 Budgeting End-to-End Time Error 419 Network Holdover 422 Packet Network Topologies 424 Packet Transport 426 Non-Mobile Deployments 430 Summary 434 References in This Chapter 435 Chapter 9 Acronyms Key 437 Further Reading 442 Part IV Timing Requirements, Solutions, and Testing Chapter 10 Mobile Timing Requirements 443 Evolution of Cellular Networks 444 Timing Requirements for Mobility Networks 448 Timing Requirements for LTE and LTE-A 455 Evolution of the 5G Architecture 478 5G New Radio Synchronization Requirements 496 Summary 509 References in This Chapter 510 Chapter 10 Acronyms Key 512 Further Reading 517 Chapter 11 5G Timing Solutions 519 Deployment Considerations for Mobile Timing 520 Frequency-Only Deployments 535 Frequency, Phase, and Time Deployment Options 538 Midhaul and Fronthaul Timing 550 Timing Security and MACsec 556 Summary 564 References in This Chapter 565 Chapter 11 Acronyms Key 567 Further Reading 571 Chapter 12 Operating and Verifying Timing Solutions 573 Hardware and Software Solution Requirements 574 Writing a Request for Proposal 587 Testing Timing 590 Automation and Assurance 629 Troubleshooting and Field Testing 635 Summary 648 Conclusion 649 References in This Chapter 649 Chapter 12 Acronyms Key 653 Further Reading 658 9780136836254, TOC, 5/3/2021
£44.19
McGraw-Hill Education Fundamentals of 5G Communications Connectivity
Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Explore the foundations and applications of 5G technologyThis comprehensive guide contains practical information from telecommunications experts working at the forefront of 5G innovation. The authors discuss the foundations of 5G technologyânot just the new standards, but the reasons and stories behind them. Fundamentals of 5G Communications features coverage of all major vertical domains with a focus on practical, commercial applications. This book serves both as an essential reference for telecom professionals and as a textbook for students learning about 5G.Coverage includes: 5G versus 4G: Whatâs new? Deployment scenarios and architecture options The evolution of 5G architecture Numerology and slot structure Table of ContentsForewordIntroductionAcronyms1 5G versus 4G: What’s New? 1.1 Overview 1.2 LTE: A Success Story 1.3 Physical Layer Changes in 5G 1.4 Protocol Changes in 5G 1.5 Main Physical Layer Features of LTE over Releases2 Deployment Scenarios 2.1 LTE-NR Spectrum Sharing 2.2 Switched NR UL Carrier Aggregation Enhancements 2.3 Nonaligned Carrier Aggregation Operation 2.4 Frequency Ranges and Frequency Bands3 Architecture Options for 5G 3.1 Introduction 3.2 The 5G RAN Architecture 3.3 The 5G Core 3.4 EPC versus 5GC (What Is 5GC For?) 3.5 Main Functional Entities of the 5G Core 3.6 High-Level Features of 5G Core 3.7 Network Slicing 3.8 QoS 3.9 Interworking with Non-3GPP Access Technologies 3.10 Policy Control 3.11 5G Security 3.12 Access Control and Barring 3.13 Support for Operator and Regulatory Services 3.14 Interworking with EPC 3.15 EPC to 5GC Migration4 Evolution of 5G Architecture 4.1 Introduction 4.2 Non-Public Networks 4.3 Cellular V2X 4.4 Cellular IoT 4.5 “Big Data” Collection (Enhanced Network Automation) 4.6 Enhancements to Interworking with Non-3GPP Accesses 4.7 URLLC 4.8 Slice Authentication 4.9 Other Release 16 Features5 Numerology and Slot Structure 5.1 Numerology and Slot Structure in 4G LTE 5.2 Lessons Learned from 4G LTE and 5G Considerations 5.3 SCSs for 5G NR 5.4 Frequency Ranges, Bandwidths, and Bands for 5G NR 5.5 gNB Channel Bandwidth versus UE Channel Bandwidth 5.6 Symbol, Slot, Subframe, and Frame for 5G NR 5.7 Slot Structure for 5G NR and Forward Compatibility Considerations6 Initial Access and Mobility 6.1 Overview 6.2 Initial Access 6.3 Random Access 6.4 Paging 6.5 Mobility7 Downlink Control Operation 7.1 Downlink Control in 4G LTE 7.2 Control Region Management in 5G NR 7.3 PDCCH Structure in 5G NR 7.4 Search Space for NR PDCCH 7.5 DCI Formats for NR PDCCH 7.6 Physical Layer Block Diagram for NR PDCCH 7.7 Power Saving Considerations8 Downlink Data Operation 8.1 Channel Coding for Data 8.2 Channel Code Rate Matching 8.3 DL Soft Buffer Management 8.4 DL MCS and TBS Determination 8.5 DL Resource Allocation in the Time Domain 8.6 DL Resource Allocation in the Frequency Domain 8.7 DL Rate Matching 8.8 DL HARQ Operation 8.9 DL Data Rate Capability 8.10 Processing Time for DL Data 8.11 Demodulation Reference Signals for Data 8.12 PDSCH DM-RS 8.13 DL Phase Tracking Reference Signal 8.14 Channel State Information Reference Signal 8.15 Tracking Reference Signal 8.16 DL MIMO Scheme 8.17 CSI Feedback 8.18 Beam Management for the PDSCH 8.19 Signal Quasi Co-Location9 Uplink Control Operation 9.1 Uplink Control in 4G LTE 9.2 UCI Types and Payload Sizes in 5G NR 9.3 PUCCH Formats in 5G NR 9.4 PUCCH Resource Determination in 5G NR 9.5 UCI on PUSCH in 5G NR 9.6 Channel Coding for UCI10 Uplink Data Operation 10.1 UL MCS and TBS Determination 10.2 UL Resource Allocation in the Time Domain 10.3 UL Resource Allocation in the Frequency Domain 10.4 UL Rate Matching 10.5 UL HARQ Operation 10.6 UL Soft Buffer Management 10.7 UL Data Rate Capability 10.8 Processing Time for UL Data 10.9 PUSCH DM-RS 10.10 UL Phase Tracking Reference Signal 10.11 Sounding Reference Signal 10.12 UL MIMO Scheme 10.13 Beam Management for the PUSCH 10.14 UL Power Control 10.15 UL Timing11 Coexistence of 4G and 5G 11.1 Adjacent Channel Coexistence 11.2 Same Channel Coexistence 11.3 EN-DC Power Control 11.4 Switched EN-DC UL12 5G in Unlicensed and Shared Spectrum 12.1 Unlicensed Operation in LTE 12.2 Overview 12.3 Channel Access 12.4 Discovery Burst 12.5 Physical Layer Extensions for Uplink 12.6 Increased Scheduling Flexibility13 Vertical Expansion: URLLC 13.1 A Brief History of 3GPP Standardization Related to URLLC 13.2 Use Cases and Deployment Scenarios for 5G NR URLLC 13.3 Resource Management for URLLC 13.4 Optimizing Link Efficiency for URLLC 13.5 Downlink Resource Sharing for Distinct Service Types 13.6 Uplink Resource Sharing for Distinct Service Types 13.7 Handling Distinct Services at the UE 13.8 Other Related Aspects14 Vertical Expansion: MTC 14.1 A Brief History of MTC in 3GPP 14.2 Key Technical Enablers for eMTC 14.3 Key Technical Enablers for NB-IoT 14.4 Integration of eMTC and NB-IoT into 5G NR 14.5 Future Trends15 5G Vertical Expansion: V2X 15.1 Overview 15.2 Background: LTE V2X 15.3 NR V2X16 Vertical Expansion: Broadcast and Multicast17 Miscellaneous Topics for 5G 17.1 Overview 17.2 Interference Management 17.3 UE Power Savings 17.4 NR Positioning 17.5 Two-Step RACH 17.6 Multi-RAT DC/CA Enhancements 17.7 Mobility Enhancements 17.8 Integrated Access and Backhaul18 A Look at Typical 5G Commercial Deployments19 5G: What’s Next? 19.1 Overview 19.2 Radio Projects in Release 17 19.3 Systems Projects in Release 17 19.4 NR Expansion into Higher Frequencies 19.5 Sidelink Beyond V2X 19.6 Relaying Operation 19.7 Edge Applications 19.8 On the Path to 6GIndex
£88.19
Pearson Education (US) Network Architects Guide to 5G A
Book SynopsisSyed Farrukh Hassan has been designing and deploying networks for over 20 years. In his current role as principal telecommunications architect at Red Hat, Syed provides consultancy services to global 5G customers. Prior to that, Syed worked as a senior solutions architect in the Cisco professional and consulting services organization, providing guidance, strategy, and planning support to various Internet, cloud, and mobile service providers in their adoption of innovating networking technologies and transformation of their networks to new architectures. Syed co-authored one of the first books on NFV and SDN, has been a regular speaker in public forums and conferences, and is recognized as a Cisco Live Distinguished Speaker. Syed is a double CCIE in Service Provider and Data Center technologies (#21617), Google Certified Professional Cloud Networking Engineer, and Certified Kubernetes Administrator (CKA). He holds a bachelor's degree in engineering from NED UniversitTable of ContentsIntroduction xx Chapter 1: A Peek at the Past 2 Brief History of Pre-Cellular Mobile Networks. . . . . . . . . . . . . . . . . 2 The Very First Cellular Networks: 1G.. . . . . . . . . . . . . . . . . . . . 5 Second Generation (2G) Cellular Networks. . . . . . . . . . . . . . . . . 10 Generation Two and a Half (2.5G). . . . . . . . . . . . . . . . . . . . . 15 Enhanced Data Rates for GSM Evolution (EDGE). . . . . . . . . . . . . . . 17 Third Generation (3G).. . . . . . . . . . . . . . . . . . . . . . . . . . 17 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Chapter 2: Anatomy of Mobile Communication Networks 28 Understanding Radio Access Network.. . . . . . . . . . . . . . . . . . . 28 Mobile Transport and Backhaul.. . . . . . . . . . . . . . . . . . . . . . 41 Mobile Core Concepts.. . . . . . . . . . . . . . . . . . . . . . . . . 51 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Chapter 3: Mobile Networks Today 76 3GPP Releases and Evolved Packet System.. . . . . . . . . . . . . . . . 77 Evolved Packet Core (EPC) Architecture.. . . . . . . . . . . . . . . . . . 79 RAN Evolution.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Modern Mobile Backhaul Networks. . . . . . . . . . . . . . . . . . . . 102 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Chapter 4: The Promise of 5G 120 Emerging Trends and Expectations from Mobile Networks.. . . . . . . . . . 121 5G Technology Enablers.. . . . . . . . . . . . . . . . . . . . . . . . 126 5G Service Offerings.. . . . . . . . . . . . . . . . . . . . . . . . . . 131 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Chapter 5: 5G Fundamentals 138 5G Radio Access Network.. . . . . . . . . . . . . . . . . . . . . . . 138 5G Core Network.. . . . . . . . . . . . . . . . . . . . . . . . . . . 179 5G Transport Network.. . . . . . . . . . . . . . . . . . . . . . . . . 195 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Chapter 6: Emerging Technologies for 5G-Ready Networks: Segment Routing 212 Complexity in Today’s Network.. . . . . . . . . . . . . . . . . . . . . 212 Introducing Segment Routing. . . . . . . . . . . . . . . . . . . . . . 214 Segment Routing Traffic Engineering (SR-TE). . . . . . . . . . . . . . . . 222 Software-Defined Transport with Segment Routing.. . . . . . . . . . . . . 228 5G Transport Network Slicing. . . . . . . . . . . . . . . . . . . . . . 232 Redundancy and High Availability with Segment Routing.. . . . . . . . . . . 238 Segment Routing for IPv6 (SRv6). . . . . . . . . . . . . . . . . . . . . 242 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Chapter 7: Essential Technologies for 5G-Ready Networks: DC Architecture and Edge Computing 250 Data Center Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . 250 From Centralized to Distributed to Cloud Data Centers. . . . . . . . . . . . 257 Deploying Data Centers.. . . . . . . . . . . . . . . . . . . . . . . . 260 Optimizing Compute Resources. . . . . . . . . . . . . . . . . . . . . 267 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Chapter 8: Essential Technologies for 5G-Ready Networks: Transport Services 274 What’s a 5G Transport Service?.. . . . . . . . . . . . . . . . . . . . . 274 VPN Services.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Transport Services Across MCN. . . . . . . . . . . . . . . . . . . . . 297 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Chapter 9: Essential Technologies for 5G-Ready Networks: Timing and Synchronization 302 Types of Synchronization.. . . . . . . . . . . . . . . . . . . . . . . . 304 Why Synchronization Is Important in 5G.. . . . . . . . . . . . . . . . . . 306 Synchronization Sources and Clock Types.. . . . . . . . . . . . . . . . . 308 Implementing Timing in Mobile Networks.. . . . . . . . . . . . . . . . . 311 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Chapter 10: Designing and Implementing 5G Network Architecture 334 5G Architecture Recap.. . . . . . . . . . . . . . . . . . . . . . . . . 334 5G Fronthaul Considerations.. . . . . . . . . . . . . . . . . . . . . . 336 xHaul Transport Technology Choices. . . . . . . . . . . . . . . . . . . 345 Designing the Mobile Transport Network. . . . . . . . . . . . . . . . . . 346 Routing Design Simplification. . . . . . . . . . . . . . . . . . . . . . 361 Transport Services for 5G MCN.. . . . . . . . . . . . . . . . . . . . . 370 Taking MCN to the Cloud.. . . . . . . . . . . . . . . . . . . . . . . . 372 Automation in 5G Networks.. . . . . . . . . . . . . . . . . . . . . . . 376 Deciphering 5G Mobile Requirements.. . . . . . . . . . . . . . . . . . . 380 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Afterword: Beyond 5G 386 9780137376841, TOC, 4/14/2022
£40.49
Pearson Education (US) Securing 5G and Evolving Architectures
Book SynopsisPramod Nair is a Lead Security Architect at Cisco Systems focusing on service providers. During his 20 years of experience in the industry, Pramod has worked in multiple areas, including research and development, designing end-to-end mobile networks, and technical consulting on military and defense projects. Among other responsibilities in his current role within Cisco, Pramod leads 5G Security Architecture, driving its adoption globally, and has been instrumental in architecting secure next-generation networks for customers across the globe. He is a regular speaker on the subject at large conferences and industry events. Pramod is an active member of the security community. His role is to help mobile network providers, service providers, industry verticals, the national security and defense sectors, and other agencies dedicated to securing critical infrastructures. He is also deeply involved with industry trade organizations, has co-chaired the 5G secTable of ContentsForeword xv Preface xvi Acknowledgments xxi About the Author xxii Part I Evolution of Cellular Technologies to 5G, Security Enhancements, and Challenges Chapter 1: Evolution from 4G to 5G 2 Mobile Network Evolution from 4G to 5G.. . . . . . . . . . . . . . . . . . 4 Key 5G Features in 3GPP Releases.. . . . . . . . . . . . . . . . . . . . 18 Key 5G Advanced Features.. . . . . . . . . . . . . . . . . . . . . . . 20 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Chapter 2: Deployment Modes in 5G 26 5G NSA and SA Deployments.. . . . . . . . . . . . . . . . . . . . . . 27 5G Time-Sensitive Networks.. . . . . . . . . . . . . . . . . . . . . . . 42 5G Local Area Network–Type Service.. . . . . . . . . . . . . . . . . . . 44 Private 5G/Non-Public Networks.. . . . . . . . . . . . . . . . . . . . . 46 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Chapter 3: Securing 5G Infrastructure 56 3GPP 5G Security Enhancements.. . . . . . . . . . . . . . . . . . . . . 57 Security Challenges in 5G. . . . . . . . . . . . . . . . . . . . . . . . 74 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Acronyms Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Part II Securing 5G Architectures, Deployment Modes, and Use Cases Chapter 4: Securing RAN and Transport Deployments in 5G 82 5G RAN and Transport Threats. . . . . . . . . . . . . . . . . . . . . . 84 Securing 5G RAN and Transport.. . . . . . . . . . . . . . . . . . . . . 92 Real Scenario Case Study: Examples of Threat Surfaces and Their Mitigation. . 125 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Chapter 5: Securing MEC Deployments in 5G 142 Service Provider Network-Based MEC.. . . . . . . . . . . . . . . . . . 144 Enterprise Network-Based MEC.. . . . . . . . . . . . . . . . . . . . . 145 MEC Deployment Models.. . . . . . . . . . . . . . . . . . . . . . . . 146 Threat Surfaces in 5G MEC Deployments.. . . . . . . . . . . . . . . . . 154 Securing 5G MEC.. . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Real Scenario Case Study: MEC Threats and Their Mitigation.. . . . . . . . . 217 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Chapter 6: Securing Virtualized 5G Core Deployments 234 A Brief Evolution of Virtualization in Telecommunications.. . . . . . . . . . . 235 Threats in Virtualized 5G Packet Core Deployments.. . . . . . . . . . . . . 240 Securing Virtualized 5G Packet Core Deployments.. . . . . . . . . . . . . 257 Real Scenario Case Study: Virtualized 5GC Threats and Mitigation.. . . . . . . 281 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Chapter 7: Securing Network Slice, SDN, and Orchestration in 5G 298 Network Slicing and Its Enablers—SDN and Orchestration. . . . . . . . . . 299 Threat Surfaces in 5G Network Slice, SDN, and Orchestration Deployments.. . . 309 Mitigation of Threats.. . . . . . . . . . . . . . . . . . . . . . . . . . 327 Real Scenario Case Study: Threats in the 5G Network Slice, SDN, and Orchestration Deployments and Their Mitigation. . . . . . . . . . . . . 355 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Key Acronyms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 Chapter 8: Securing Massive IoT Deployments in 5G 376 Massive IoT–Based Threats in 5G.. . . . . . . . . . . . . . . . . . . . 380 Securing mIoT Deployments in 5G Networks.. . . . . . . . . . . . . . . . 391 Real Scenario Case Study: mIoT Threats and Their Mitigation.. . . . . . . . . 414 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Key Acronyms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 420 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422 Chapter 9: Securing 5G Use Cases 424 Secure 5G Smart Factory and Manufacturing. . . . . . . . . . . . . . . . 425 Critical Infrastructure.. . . . . . . . . . . . . . . . . . . . . . . . . . 437 5G Vehicle-to-Everything (5G-V2X).. . . . . . . . . . . . . . . . . . . . 447 Standards and Associations.. . . . . . . . . . . . . . . . . . . . . . . 463 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 Key Acronyms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 Part III End-to-End 5G Security Architecture and Prioritizing Security Investments Chapter 10: Building Pragmatic End-to-End 5G Security Architecture 468 Foundations of 5G Security.. . . . . . . . . . . . . . . . . . . . . . . 470 Key Tenets of 5G Security Architecture.. . . . . . . . . . . . . . . . . . 472 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497 Acronyms Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501 Chapter 11: Prioritizing 5G Security Investments 502 Method of Prioritizing Security Controls.. . . . . . . . . . . . . . . . . . 505 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532 Acronyms Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 533 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534 Part IV Emerging Discussions Chapter 12: 5G and Beyond 536 Adoption and Adaptability of 5G and Evolving Technologies.. . . . . . . . . 537 Convergence of Wi-Fi and Evolving Cellular Technologies.. . . . . . . . . . 539 Use of AI and ML in Securing 5G and Evolving Networks.. . . . . . . . . . . 543 Crypto Agility in 5G and Evolving Technologies.. . . . . . . . . . . . . . . 546 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 9780137457939, TOC, 10/27/2021
£46.79
MIT Press Ltd Tap Unlocking the Mobile Economy
Book SynopsisHow the smartphone can become a personal concierge (not a stalker) in the mobile marketing revolution of smarter companies, value-seeking consumers, and curated offers.Consumers create a data trail by tapping their phones; businesses can tap into this trail to harness the power of the more than three trillion dollar mobile economy. According to Anindya Ghose, a global authority on the mobile economy, this two-way exchange can benefit both customers and businesses. In Tap, Ghose welcomes us to the mobile economy of smartphones, smarter companies, and value-seeking consumers.Drawing on his extensive research in the United States, Europe, and Asia, and on a variety of real-world examples from companies including Alibaba, China Mobile, Coke, Facebook, SK Telecom, Telefónica, and Travelocity, Ghose describes some intriguingly contradictory consumer behavior: people seek spontaneity, but they are predictable; they find advertising annoying, but they fear missing
£18.58
Taylor & Francis Ltd Hybrid Encryption Algorithms over Wireless
Book SynopsisThis book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, Hybrid Encryption Algorithms over Wireless Communication Channels, examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations.TransmisTrade Review“ In this clearly written book, Shaheen studies methods of encrypting images and video for transmission over wireless communication systems, and methodically demonstrates several encryption algorithms. This text will certainly be of interest to graduate students and researchers in the field of wireless communications.”— J. M. Smith, Sonoma State University, Choice Feb 2022 Vol 59Table of ContentsIntroduction.Fundamentals of Image Encryption for Wireless Communication. Rubik’s Cube Encryption for Wireless Communications. Hybrid Rubik’s Cube Algorithm for Wireless Communications. Proposed Hybrid Encryption Frameworkfor Reliable 3-D Wireless Video Communications. Conclusions and Future Work. References.
£104.50
CRC Press Fieldbus and Networking in Process Automation
Book SynopsisOver the last two decades, fieldbus has totally revolutionized the way communication takes place in the fields of process control, automation, and manufacturing industries. Recent introduction of real-time fieldbuses has opened up its application in multi-axis motor control and other time-critical applications. Fieldbus is designed to ensure easy interoperability, smarter network designs, increased data availability, and lessened stress on the design aspects of safety protocols.This second edition of Fieldbus and Networking in Process Automation discusses the different facets of fieldbus technology including design, wiring, installation, and commissioning as well as safety aspects in hostile application areas. The book:â Explains basic communication principles and networkingâa must for understanding fieldbusesâ Considers the advantages and shortcomings of individual fieldbusesâ Provides a broad spectrum of different fieldbuses used in both pTable of ContentsChapter 1 Data Communication..............................................................1Chapter 2 Networking...........................................................................25Chapter 3 Network Models...................................................................35Chapter 4 Networks in Process Automation.........................................53Chapter 5 Fieldbuses.............................................................................63Chapter 6 Highway Addressable Remote Transducer (HART)................ 75Chapter 7 Foundation Fieldbus.............................................................89Chapter 8 PROFIBUS......................................................................... 119Chapter 9 Modbus and Modbus Plus.................................................. 145Chapter 10 CAN Bus............................................................................ 157Chapter 11 DeviceNet........................................................................... 163Chapter 12 AS-i.................................................................................... 169Chapter 13 Seriplex............................................................................... 175Chapter 14 Interbus-S........................................................................... 179Chapter 15 ControlNet.......................................................................... 189Chapter 16 Common Industrial Protocol.............................................. 201Chapter 17 Ethernet and Ethernet/IP.................................................... 213Chapter 18 EtherCAT...........................................................................225Chapter 19 Sercos III............................................................................237Chapter 20 Ethernet Powerlink............................................................. 251Chapter 21 Profinet IRT........................................................................257Chapter 22 Intrinsically Safe Fieldbus Systems....................................265Chapter 23 Wiring, Installation, and Commissioning..........................277Chapter 24 Wireless Sensor Networks..................................................303Chapter 25 WirelessHART (WHART)................................................ 317Chapter 26 ISA100.11a..........................................................................343
£43.69
John Wiley & Sons Inc Wireless Sensor Networks
Book SynopsisThis book presents an in-depth study on recent advances and research in Wireless Sensor Networks (WSNs). Existing WSN applications are described, followed by discussing the ongoing research efforts on some WSNs applications that show the usefulness of sensor networks. Theoretical analysis and factors influencing protocol design are highlighted.Trade Review"It is intended for advanced students but also would be useful for researchers, system and chip designers, and other professionals in related fields." (Booknews, 1 February 2011) "The book is written in an accessible, textbook style, and includes problems and solutions to assist learning." (Dark Fiber, 8 February 2011)Table of ContentsAbout the Series Editor xvii Preface xix 1 Introduction 1 1.1 Sensor Mote Platforms 2 1.2 WSN Architecture and Protocol Stack 10 References 15 2 WSN Applications 17 2.1 Military Applications 17 2.2 Environmental Applications 21 2.3 Health Applications 26 2.4 Home Applications 29 2.5 Industrial Applications 31 References 33 3 Factors Influencing WSN Design 37 3.1 Hardware Constraints 37 3.2 Fault Tolerance 39 3.3 Scalability 40 3.4 Production Costs 40 3.5 WSN Topology 40 3.6 Transmission Media 41 3.7 Power Consumption 43 References 49 4 Physical Layer 53 4.1 Physical Layer Technologies 53 4.2 Overview of RF Wireless Communication 57 4.3 Channel Coding (Error Control Coding) 59 4.4 Modulation 62 4.5 Wireless Channel Effects 66 4.6 PHY Layer Standards 72 References 75 5 Medium Access Control 77 5.1 Challenges for MAC 77 5.2 CSMA Mechanism 80 5.3 Contention-Based Medium Access 83 5.4 Reservation-Based Medium Access 103 5.5 Hybrid Medium Access 110 References 115 6 Error Control 117 6.1 Classification of Error Control Schemes 117 6.2 Error Control in WSNs 120 6.3 Cross-layer Analysis Model 123 6.4 Comparison of Error Control Schemes 131 References 137 7 Network Layer 139 7.1 Challenges for Routing 139 7.2 Data-centric and Flat-Architecture Protocols 141 7.3 Hierarchical Protocols 148 7.4 Geographical Routing Protocols 152 7.5 QoS-Based Protocols 159 References 163 8 Transport Layer 167 8.1 Challenges for Transport Layer 167 8.2 Reliable Multi-Segment Transport (RMST) Protocol 169 8.3 Pump Slowly, Fetch Quickly (PSFQ) Protocol 171 8.4 Congestion Detection and Avoidance (CODA) Protocol 175 8.5 Event-to-Sink Reliable Transport (ESRT) Protocol 177 8.6 GARUDA 180 8.7 Real-Time and Reliable Transport (RT)2 Protocol 185 References 189 9 Application Layer 191 9.1 Source Coding (Data Compression) 191 9.2 Query Processing 195 9.3 Network Management 212 References 218 10 Cross-layer Solutions 221 10.1 Interlayer Effects 222 10.2 Cross-layer Interactions 224 10.3 Cross-layer Module 229 References 240 11 Time Synchronization 243 11.1 Challenges for Time Synchronization 243 11.2 Network Time Protocol 245 11.3 Definitions 246 11.4 Timing-Sync Protocol for Sensor Networks (TPSN) 248 11.5 Reference-Broadcast Synchronization (RBS) 251 11.6 Adaptive Clock Synchronization (ACS) 253 11.7 Time Diffusion Synchronization Protocol (TDP) 254 11.8 Rate-Based Diffusion Protocol (RDP) 257 11.9 Tiny- and Mini-Sync Protocols 258 11.10 Other Protocols 260 References 262 12 Localization 265 12.1 Challenges in Localization 265 12.2 Ranging Techniques 268 12.3 Range-Based Localization Protocols 272 12.4 Range-Free Localization Protocols 280 References 284 13 Topology Management 287 13.1 Deployment 288 13.2 Power Control 289 13.3 Activity Scheduling 296 13.4 Clustering 308 References 317 14 Wireless Sensor and Actor Networks 319 14.1 Characteristics of WSANs 321 14.2 Sensor–Actor Coordination 325 14.3 Actor–Actor Coordination 337 14.4 WSAN Protocol Stack 345 References 348 15 Wireless Multimedia Sensor Networks 349 15.1 Design Challenges 350 15.2 Network Architecture 353 15.3 Multimedia Sensor Hardware 357 15.4 Physical Layer 365 15.5 MAC Layer 367 15.6 Error Control 371 15.7 Network Layer 374 15.8 Transport Layer 379 15.9 Application Layer 383 15.10 Cross-layer Design 388 15.11 Further Research Issues 392 References 394 16 Wireless Underwater Sensor Networks 399 16.1 Design Challenges 401 16.2 Underwater Sensor Network Components 402 16.3 Communication Architecture 405 16.4 Basics of Underwater Acoustic Propagation 409 16.5 Physical Layer 414 16.6 MAC Layer 416 16.7 Network Layer 426 16.8 Transport Layer 435 16.9 Application Layer 437 16.10 Cross-layer Design 437 References 440 17 Wireless Underground Sensor Networks 443 17.1 Applications 445 17.2 Design Challenges 447 17.3 Network Architecture 450 17.4 Underground Wireless Channel for EM Waves 453 17.5 Underground Wireless Channel for Magnetic Induction 463 17.6 Wireless Communication in Mines and Road/Subway Tunnels 466 17.7 Communication Architecture 474 References 480 18 Grand Challenges 483 18.1 Integration of Sensor Networks and the Internet 483 18.2 Real-Time and Multimedia Communication 484 18.3 Protocol Stack 485 18.4 Synchronization and Localization 485 18.5 WSNs in Challenging Environments 486 18.6 Practical Considerations 488 18.7 Wireless Nano-sensor Networks 488 References 489 Index 491
£79.16
John Wiley & Sons Inc Compact Multifunctional Antennas for Wireless
Book SynopsisOffers an up-to-date description of modern multifunctional antenna systems and microwave components Compact multifunctional antennas are of great interest in the field of antennas and wireless communication systems, but there are few, if any, books available that fully explore the multifunctional concept. Divided into six chapters, Compact Multifunctional Antennas for Wireless Systems encompasses both the active and passive multifunctional antennas and components for microwave systems. It provides a systematic, valuable reference for antenna/microwave researchers and designers. Beginning with such novel passive components as antenna filters, antenna packaging covers, and balun filters, the book discusses various miniaturization techniques for the multifunctional antenna systems. In addition to amplifying and oscillating antennas, the book also covers design considerations for frequency- and pattern-reconfigurable antennas. The last chapter is dedicated toTable of ContentsPreface ix 1 Compact Multifunctional Antennas in Microwave Wireless Systems 1 1.1 Introduction 1 1.2 Microwave Components in Wireless Systems 6 1.3 Planar and Nonplanar Antennas in Compact Wireless Systems 7 1.3.1 Performance Parameters 8 1.3.2 Planar Antennas 14 1.3.3 Nonplanar Antennas 16 1.4 Multifunctional Antennas and Microwave Circuits 17 1.4.1 Active Antennas 18 1.4.2 Passive Antennas 19 1.5 Miniaturization Techniques for Multifunctional Antennas 19 1.6 Design Processes and Considerations 20 1.7 Design Tools and Software 22 1.8 Overview of the Book 24 2 Multifunctional Passive Integrated Antennas and Components 29 2.1 Development of Passive Integrated Antennas and Components 29 2.2 Antenna Filters 30 2.2.1 Dielectric Resonator Antenna Filter 31 2.2.2 Other DRAFs 46 2.2.3 Microstrip-Based Antenna Filters 50 2.3 Balun Filters 60 2.3.1 Ring Balun Filter 60 2.3.2 Magnetic-Coupled Balun Filter 64 2.3.3 Rectangular Patch Balun Filter 65 2.4 Antenna Package 67 2.4.1 DRA Packaging Cover 70 2.4.2 Other Antenna Packages 78 2.5 Conclusions 80 3 Reconfigurable Antennas 85 3.1 Introduction 85 3.2 Design Considerations and Recent Developments 86 3.3 Frequency-Reconfigurable Antennas 88 3.3.1 Frequency-Reconfigurable Slot-Loaded Microstrip Patch Antenna 91 3.3.2 Frequency-Reconfigurable E-Shaped Patch Antenna 93 3.4 Pattern-Reconfigurable Antennas 98 3.4.1 Pattern-Reconfigurable Fractal Patch Antenna 103 3.4.2 Pattern-Reconfigurable Leaky-Wave Antenna 105 3.5 Multi-Reconfigurable Antennas 109 3.6 Conclusions 112 4 Receiving Amplifying Antennas 117 4.1 Introduction 117 4.2 Design Criteria and Considerations 118 4.3 Wearable Low-Noise Amplifying Antenna 118 4.4 Active Broadband Low-Noise Amplifying Antenna 128 4.5 Conclusions 139 5 Oscillating Antennas 145 5.1 Introduction 145 5.2 Design Methods for Microwave Oscillators 145 5.2.1 Design Using S Parameters 146 5.2.2 Design Using a Network Model 147 5.2.3 Specifications of Microwave Oscillators 147 5.3 Recent Developments and Issues of Antenna Oscillators 149 5.4 Reflection-Amplifier Antenna Oscillators 152 5.4.1 Rectangular DRAO 152 5.4.2 Hollow DRAO 158 5.4.3 Differential Planar Antenna Oscillator 161 5.5 Coupled-Load Antenna Oscillators 167 5.5.1 Coupled-Load Microstrip Patch Oscillator 167 5.5.2 Patch Antenna Oscillator with Feedback Loop 171 5.6 Conclusions 180 6 Solar-Cell-Integrated Antennas 185 6.1 Integration of Antennas with Solar Cells 185 6.2 Nonplanar Solar-Cell-Integrated Antennas 188 6.2.1 Solar-Cell-Integrated Hemispherical DRA 189 6.2.2 Solar-Cell-Integrated Rectangular DRA 201 6.3 Planar Solar-Cell-Integrated Antennas 204 6.3.1 Solar-Cell-Integrated U-Shaped SPA 208 6.3.2 Solar-Cell-Integrated V-Shaped SPA 219 6.4 Conclusions 223 References 224 Index 227
£86.36
John Wiley & Sons Inc Wireless Connectivity
Book SynopsisWireless Connectivity: An Intuitive and Fundamental Guide Wireless connectivity has become an indispensable part, a commodity associated with the way we work and play. The latest developments, the 5G, next-generation Wi-Fi and Internet of Things connectivity, are the key enablers for widespread digitalization of practically all industries and public sector segments. This immense development within the last three decades have been accompanied by a large number of ideas, articles, patents, and even myths. This book introduces the most important ideas and concepts in wireless connectivity and discusses how these are interconnected, whilst the mathematical content is kept minimal. The book does not follow the established, linear structure in which one starts from the propagation and channels and then climbs up the protocol layers. The structure is, rather, nonlinear, in an attempt to follow the intuition used when one creates a new technology to solve a certain problem. The target audience is: Students in electronics, communication, and networkingWireless engineers that are specialized in one area, but want to know how the whole system works, without going through all the details and mathComputer scientists that want to understand the fundamentals of wireless connectivity, the requirements and, most importantly, the limitationsEngineers in energy systems, logistics, transport and other vertical sectors that are increasingly reliant on wireless technologyTable of ContentsForeword xv Acknowledgments xix Acronyms xxi 1 An Easy Introduction to the Shared Wireless Medium 3 1.1 How to Build a Simple Model for Wireless Communication 4 1.1.1 Which Features We Want from the Model 4 1.1.2 Communication Channel with Collisions 4 1.1.3 Trade-offs in the Collision Model 7 1.2 The First Contact 9 1.2.1 Hierarchy Helps to Establish Contact 9 1.2.2 Wireless Rendezvous without Help 11 1.2.3 Rendezvous with Full-Duplex Devices 12 1.3 Multiple Access with Centralized Control 12 1.3.1 A Frame for Time Division 13 1.3.2 Frame Header for Flexible Time Division 14 1.3.3 A Simple Two-Way System that Works Under the Collision Model 15 1.3.4 Still Not a Practical TDMA System 18 1.4 Making TDMA Dynamic 19 1.4.1 Circuit-Switched versus Packet-Switched Operation 19 1.4.2 Dynamic Allocation of Resources to Users 20 1.4.3 Short Control Packets and the Idea of Reservation 22 1.4.4 Half-Duplex versus Full-Duplex in TDMA 24 1.5 Chapter Summary 25 1.6 Further Reading 25 1.7 Problems and Reflections 26 2 Random Access: How to Talk in Crowded Dark Room 29 2.1 Framed ALOHA 30 2.1.1 Randomization that Maximizes the ALOHA Throughput 32 2.2 Probing 35 2.2.1 Combining ALOHA and Probing 39 2.3 Carrier Sensing 39 2.3.1 Randomization and Spectrum Sharing 39 2.3.2 An Idle Slot is Cheap 41 2.3.3 Feedback to the Transmitter 43 2.4 Random Access and Multiple Hops 45 2.4.1 Use of Reservation Packets in Multi-Hop 47 2.4.2 Multiple Hops and Full-Duplex 47 2.5 Chapter Summary 48 2.6 Further Reading 48 2.7 Problems and Reflections 48 3 Access Beyond the Collision Model 53 3.1 Distance Gets into the Model 53 3.1.1 Communication Degrades as the Distance Increases 53 3.1.2 How to Make the Result of a Collision Dependent on the Distance 55 3.2 Simplified Distance Dependence: A Double Disk Model 57 3.3 Downlink Communication with the Double Disk Model 58 3.3.1 A Cautious Example of a Design that Reaches the Limits of the Model 61 3.4 Uplink Communication with the Double Disk Model 62 3.4.1 Uplink that Uses Multi-Packet Reception 64 3.4.2 Buffered Collisions for Future Use 64 3.4.3 Protocols that Use Packet Fractions 66 3.5 Unwrapping the Packets 68 3.6 Chapter Summary 69 3.7 Further Reading 70 3.8 Problems and Reflections 70 4 The Networking Cake: Layering and Slicing 75 4.1 Layering for a One-Way Link 75 4.1.1 Modules and their Interconnection 75 4.1.2 Three Important Concepts in Layering 77 4.1.3 An Example of a Two-Layer System 78 4.2 Layers and Cross-Layer 79 4.3 Reliable and Unreliable Service from a Layer 81 4.4 Black Box Functionality for Different Communication Models 84 4.5 Standard Layering Models 86 4.5.1 Connection versus Connectionless 87 4.5.2 Functionality of the Standard Layers 88 4.5.3 A Very Brief Look at the Network Layer 89 4.6 An Alternative Wireless Layering 91 4.7 Cross-Layer Design for Multiple Hops 92 4.8 Slicing of the Wireless Communication Resources 94 4.8.1 Analog, Digital, Sliced 94 4.8.2 A Primer on Wireless Slicing 96 4.8.2.1 Orthogonal Wireless Slicing 96 4.8.2.2 Non-Orthogonal Wireless Slicing 98 4.9 Chapter Summary 100 4.10 Further Reading 100 4.11 Problems and Reflections 100 5 Packets Under the Looking Glass: Symbols and Noise 105 5.1 Compression, Entropy, and Bit 105 5.1.1 Obtaining Digital Messages by Compression 106 5.1.2 A Bit of Information 106 5.2 Baseband Modules of the Communication System 107 5.2.1 Mapping Bits to Baseband Symbols under Simplifying Assumptions 108 5.2.2 Challenging the Simplifying Assumptions about the Baseband 109 5.3 Signal Constellations and Noise 110 5.3.1 Constellation Points and Noise Clouds 110 5.3.2 Constellations with Limited Average Power 113 5.3.3 Beyond the Simple Setup for Symbol Detection 114 5.3.4 Signal-to-Noise Ratio (SNR) 116 5.4 From Bits to Symbols 117 5.4.1 Binary Phase Shift Keying (BPSK) 117 5.4.2 Quaternary Phase Shift Keying (QPSK) 118 5.4.3 Constellations of Higher Order 119 5.4.4 Generalized Mapping to Many Symbols 122 5.5 Symbol-Level Interference Models 123 5.5.1 Advanced Treatment of Collisions based on a Baseband Model 124 5.6 Weak and Strong Signals: New Protocol Possibilities 126 5.6.1 Randomization of Power 127 5.6.2 Other Goodies from the Baseband Model 129 5.7 How to Select the Data Rate 130 5.7.1 A Simple Relation between Packet Errors and Distance 130 5.7.2 Adaptive Modulation 132 5.8 Superposition of Baseband Symbols 134 5.8.1 Broadcast and Non-Orthogonal Access 135 5.8.2 Unequal Error Protection (UEP) 137 5.9 Communication with Unknown Channel Coefficients 138 5.10 Chapter Summary 141 5.11 Further Reading 142 5.12 Problems and Reflections 142 6 A Mathematical View on a Communication Channel 147 6.1 A Toy Example: The Pigeon Communication Channel 147 6.1.1 Specification of a Communication Channel 149 6.1.2 Comparison of the Information Carrying Capability of Mathematical Channels 150 6.1.3 Assumptions and Notations 151 6.2 Analog Channels with Gaussian Noise 151 6.2.1 Gaussian Channel 152 6.2.2 Other Analog Channels Based on the Gaussian Channel 152 6.3 The Channel Definition Depends on Who Knows What 154 6.4 Using Analog to Create Digital Communication Channels 158 6.4.1 Creating Digital Channels through Gray Mapping 158 6.4.2 Creating Digital Channels through Superposition 161 6.5 Transmission of Packets over Communication Channels 163 6.5.1 Layering Perspective of the Communication Channels 163 6.5.2 How to Obtain Throughput that is not Zero 164 6.5.3 Asynchronous Packets and Transmission of “Nothing” 167 6.5.4 Packet Transmission over a Ternary Channel 169 6.6 Chapter Summary 171 6.7 Further Reading 171 6.8 Problems and Reflections 172 7 Coding for Reliable Communication 177 7.1 Some Coding Ideas for the Binary Symmetric Channel 177 7.1.1 A Channel Based on Repetition Coding 177 7.1.2 Channel Based on Repetition Coding with Erasures 179 7.1.3 Coding Beyond Repetition 181 7.1.4 An Illustrative Comparison of the BSC Based Channels 182 7.2 Generalization of the Coding Idea 183 7.2.1 Maximum Likelihood (ML) Decoding 187 7.3 Linear Block Codes for the Binary Symmetric Channel 188 7.4 Coded Modulation as a Layered Subsystem 192 7.5 Retransmission as a Supplement to Coding 194 7.5.1 Full Packet Retransmission 195 7.5.2 Partial Retransmission and Incremental Redundancy 197 7.6 Chapter Summary 199 7.7 Further Reading 199 7.8 Problems and Reflections 199 8 Information-Theoretic View on Wireless Channel Capacity 203 8.1 It Starts with the Law of Large Numbers 203 8.2 A Useful Digression into Source Coding 204 8.3 Perfectly Reliable Communication and Channel Capacity 207 8.4 Mutual Information and Its Interpretations 209 8.4.1 From a Local to a Global Property 209 8.4.2 Mutual Information in Some Actual Communication Setups 211 8.5 The Gaussian Channel and the Popular Capacity Formula 214 8.5.1 The Concept of Entropy in Analog Channels 214 8.5.2 The Meaning of “Shannon’s Capacity Formula” 215 8.5.3 Simultaneous Usage of Multiple Gaussian Channels 217 8.6 Capacity of Fading Channels 219 8.6.1 Channel State Information Available at the Transmitter 219 8.6.2 Example: Water Filling for Binary Fading 221 8.6.3 Water Filling for Continuously Distributed Fading 222 8.6.4 Fast Fading and Further Remarks on Channel Knowledge 223 8.6.5 Capacity When the Transmitter Does Not Know the Channel 225 8.6.5.1 Channel with Binary Inputs and Binary Fading 225 8.6.5.2 Channels with Gaussian Noise and Fading 229 8.6.6 Channel Estimation and Knowledge 230 8.7 Chapter Summary 232 8.8 Further Reading 233 8.9 Problems and Reflections 233 9 Time and Frequency in Wireless Communications 237 9.1 Reliable Communication Requires Transmission of Discrete Values 237 9.2 Communication Through a Waveform: An Example 239 9.3 Enter the Frequency 242 9.3.1 Infinitely Long Signals and True Frequency 242 9.3.2 Bandwidth and Time-Limited Signals 245 9.3.3 Parallel Communication Channels 247 9.3.4 How Frequency Affects the Notion of Multiple Access 248 9.4 Noise and Interference 250 9.4.1 Signal Power and Gaussian White Noise 250 9.4.2 Interference between Non-Orthogonal Frequencies 252 9.5 Power Spectrum and Fourier Transform 255 9.6 Frequency Channels, Finally 258 9.6.1 Capacity of a Bandlimited Channel 259 9.6.2 Capacity and OFDM Transmission 261 9.6.3 Frequency for Multiple Access and Duplexing 261 9.7 Code Division and Spread Spectrum 263 9.7.1 Sharing Synchronized Resources with Orthogonal Codes 263 9.7.2 Why Go Through the Trouble of Spreading? 265 9.7.3 Mimicking the Noise and Covert Communication 268 9.7.4 Relation to Random Access 269 9.8 Chapter Summary 270 9.9 Further Reading 270 9.10 Problems and Reflections 270 10 Space in Wireless Communications 275 10.1 Communication Range and Coverage Area 276 10.2 The Myth about Frequencies that Propagate Badly in Free Space 278 10.3 The World View of an Antenna 280 10.3.1 Antenna Directivity 280 10.3.2 Directivity Changes the Communication Models 282 10.4 Multipath and Shadowing: Space is Rarely Free 283 10.5 The Final Missing Link in the Layering Model 286 10.6 The Time-Frequency Dynamics of the Radio Channel 288 10.6.1 How a Time-Invariant Channel Distorts the Received Signal 288 10.6.2 Frequency Selectivity, Multiplexing, and Diversity 291 10.6.3 Time-Variant Channel Introduces New Frequencies 292 10.6.4 Combined Time-Frequency Dynamics 295 10.7 Two Ideas to Deal with Multipath Propagation and Delay Spread 296 10.7.1 The Wideband Idea: Spread Spectrum and a RAKE Receiver 297 10.7.2 The Narrowband Idea: OFDM and a Guard Interval 299 10.8 Statistical Modeling of Wireless Channels 300 10.8.1 Fading Models: Rayleigh and Some Others 301 10.8.2 Randomness in the Path Loss 303 10.9 Reciprocity and How to Use It 303 10.10 Chapter Summary 305 10.11 Further Reading 305 10.12 Problems and Reflections 305 11 Using Two, More, or a Massive Number of Antennas 309 11.1 Assumptions about the Channel Model and the Antennas 310 11.2 Receiving or Transmitting with a Two-Antenna Device 311 11.2.1 Receiver with Two Antennas 311 11.2.2 Using Two Antennas at a Knowledgeable Transmitter 313 11.2.3 Transmit Diversity 314 11.3 Introducing MIMO 315 11.3.1 Spatial Multiplexing 317 11.4 Multiple Antennas for Spatial Division of Multiple Users 319 11.4.1 Digital Interference-Free Beams: Zero Forcing 320 11.4.2 Other Schemes for Precoding and Digital Beamforming 322 11.5 Beamforming and Spectrum Sharing 325 11.6 What If the Number of Antennas is Scaled Massively? 327 11.6.1 The Base Station Knows the Channels Perfectly 328 11.6.2 The Base Station has to Learn the Channels 329 11.7 Chapter Summary 331 11.8 Further Reading 331 11.9 Problems and Reflections 331 12 Wireless Beyond a Link: Connections and Networks 335 12.1 Wireless Connections with Different Flavors 335 12.1.1 Coarse Classification of the Wireless Connections 335 12.1.2 The Complex, Multidimensional World of Wireless Connectivity 337 12.2 Fundamental Ideas for Providing Wireless Coverage 339 12.2.1 Static or Moving Infrastructure 340 12.2.2 Cells and a Cellular Network 341 12.2.3 Spatial Reuse 343 12.2.4 Cells Come in Different Sizes 345 12.2.5 Two-Way Coverage and Decoupled Access 347 12.3 No Cell is an Island 348 12.3.1 Wired and Wireless Backhaul 348 12.3.2 Wireless One-Way Relaying and the Half-Duplex Loss 349 12.3.3 Wireless Two-Way Relaying: Reclaiming the Half-Duplex Loss 351 12.4 Cooperation and Coordination 355 12.4.1 Artificial Multipath: Treating the BS as Yet Another Antenna 355 12.4.2 Distributing and Networking the MIMO Concept 357 12.4.3 Cooperation Through a Wireless Backhaul 359 12.5 Dissolving the Cells into Clouds and Fog 360 12.5.1 The Unattainable Ideal Coverage 360 12.5.2 The Backhaul Links Must Have a Finite Capacity 362 12.5.3 Noisy Cooperation with a Finite Backhaul 363 12.5.4 Access Through Clouds and Fog 364 12.6 Coping with External Interference and Other Questions about the Radio Spectrum 366 12.6.1 Oblivious Rather Than Selfish 366 12.6.2 License to Control Interference 367 12.6.3 Spectrum Sharing and Caring 369 12.6.4 Duty Cycling, Sensing, and Hopping 371 12.6.5 Beyond the Licensed and Unlicensed and Some Final Words 372 12.7 Chapter Summary 374 12.8 Further Reading 374 12.9 Problems and Reflections 375 Bibliography 377 Index 381
£66.56
John Wiley & Sons Inc Evaluation of HSDPA to LTE
Book SynopsisThis book explains how the performance of modern cellular wireless networks can be evaluated by measurements and simulations With the roll-out of LTE, high data throughput is promised to be available to cellular users. In case you have ever wondered how high this throughput really is, this book is the right read for you: At first, it presents results from experimental research and simulations of the physical layer of HSDPA, WiMAX, and LTE. Next, it explains in detail how measurements on such systems need to be performed in order to achieve reproducible and repeatable results. The book further addresses how wireless links can be evaluated by means of standard-compliant link-level simulation. The major challenge in this context is their complexity when investigating complete wireless cellular networks. Consequently, it is shown how system-level simulators with a higher abstraction level can be designed such that their results still match link-level simulations. Exemplarily, thTable of ContentsAbout the Authors xiii About the Contributors xv Preface xvii Acknowledgments xxiii List of Abbreviations xxv Part I CELLULAR WIRELESS STANDARDS Introduction 3 References 4 1 UMTS High-Speed Downlink Packet Access 5 1.1 Standardization and Current Deployment of HSDPA 5 1.2 HSDPA Principles 6 1.2.1 Network Architecture 7 1.2.2 Physical Layer 9 1.2.3 MAC Layer 13 1.2.4 Radio Resource Management 14 1.2.5 Quality of Service Management 16 1.3 MIMO Enhancements of HSDPA 17 1.3.1 Physical Layer Changes for MIMO 19 1.3.2 Precoding 21 1.3.3 MAC Layer Changes for MIMO 25 1.3.4 Simplifications of the Core Network 26 References 26 2 UMTS Long-Term Evolution 29 Contributed by Josep Colom Ikuno 2.1 LTE Overview 29 2.1.1 Requirements 29 2.2 Network Architecture 31 2.3 LTE Physical Layer 33 2.3.1 LTE Frame Structure 34 2.3.2 Reference and Synchronization Symbols 36 2.3.3 MIMO Transmission 37 2.3.4 Modulation and Layer Mapping 39 2.3.5 Channel Coding 41 2.3.6 Channel Adaptive Feedback 45 2.4 MAC Layer 46 2.4.1 Hybrid Automatic Repeat Request 46 2.4.2 Scheduling 47 2.5 Physical, Transport, and Logical Channels 48 References 51 Part II TESTBEDS FOR MEASUREMENTS Introduction 57 Reference 58 3 On Building Testbeds 59 3.1 Basic Idea 60 3.2 Transmitter 61 3.3 Receiver 63 3.4 Synchronization 65 3.5 Possible Pitfalls 67 3.5.1 Digital Baseband Hardware 67 3.5.2 Tool and Component Selection 68 3.5.3 Analog RF Front Ends 69 3.5.4 Cost 70 3.5.5 Matlab® Code and Testbeds 70 3.6 Summary 71 References 72 4 Quasi-Real-Time Testbedding 75 4.1 Basic Idea 75 4.2 Problem Formulation 77 4.3 Employing the Basic Idea 78 4.4 Data Collection 80 4.4.1 More Sophisticated Sampling Techniques 81 4.4.2 Variance Reduction Techniques 84 4.4.3 Bias 85 4.4.4 Outliers 86 4.4.5 Parameter Estimation 87 4.5 Evaluating and Summarizing the Data 88 4.6 Statistical Inference 90 4.6.1 Inferring the Population Mean 90 4.6.2 Precision and Sample Size 91 4.6.3 Reproducibility and Repeatability 92 4.7 Measurement Automation 95 4.8 Dealing with Feedback and Retransmissions 96 References 97 Part III EXPERIMENTAL LINK-LEVEL EVALUATION Introduction 101 5 HSDPA Performance Measurements 103 5.1 Mathematical Model of the Physical Layer 104 5.1.1 System Model for the Channel Estimation 106 5.1.2 System Model for the Equalizer Calculation 106 5.2 Receiver 107 5.2.1 Channel Estimation 107 5.2.2 Equalizer 112 5.2.3 Further Receiver Processing 113 5.3 Quantized Precoding 113 5.4 CQI and PCI Calculation 115 5.4.1 HS-PDSCH Interference 115 5.4.2 Pilot Interference 116 5.4.3 Synchronization and Control Channel Interference 116 5.4.4 Post-equalization Noise and SINR 118 5.4.5 SINR to CQI Mapping 119 5.5 Achievable Mutual Information 121 5.6 Measurement Results 124 5.6.1 Alpine Scenario 125 5.6.2 Urban Scenario 128 5.6.3 Discussion of the Implementation Loss 130 5.7 Summary 131 References 132 6 HSDPA Antenna Selection Techniques 139 Contributed by Jos´e Antonio Garc´ıa-Naya 6.1 Existing Research 141 6.2 Receive Antenna Selection 142 6.2.1 Antenna Selection Based on System Throughput 143 6.2.2 Hardware Aspects of Antenna Selection 143 6.3 An Exemplary Measurement and its Results 144 6.3.1 Urban Scenario 144 6.3.2 Experimental Assessment of Antenna Selection in HSDPA 145 6.3.3 Measurement Results and Discussion 147 6.4 Summary 148 References 149 7 HSDPA Antenna Spacing Measurements 153 7.1 Problem Formulation 153 7.2 Existing Research 154 7.3 Experimental Setup 155 7.4 Measurement Methodology 157 7.4.1 Inferring the Mean Scenario Throughput 157 7.4.2 Issues Requiring Special Attention 158 7.5 Measurement Results and Discussion 160 7.5.1 Equal Polarization Versus Cross-Polarization 160 7.5.2 Channel Capacity 160 7.5.3 Channel Capacity Versus Mutual Information 162 7.5.4 Mutual Information Versus Achievable Mutual Information 162 7.5.5 Achievable Mutual Information Versus Throughput 163 7.5.6 Throughput 163 7.6 Different Transmit Power Levels and Scenarios 163 References 164 8 Throughput Performance Comparisons 167 8.1 Introduction 167 8.2 Cellular Systems Investigated: WiMAX and HSDPA 168 8.2.1 WiMAX and HSDPA 168 8.2.2 Throughput Bounds and System Losses 169 8.3 Measurement Methodology and Setup 172 8.4 Measurement Results 173 8.4.1 WiMAX Results 173 8.4.2 HSDPA Results in Standard-Compliant Setting 177 8.4.3 HSDPA Results in Advanced Setting 179 8.5 Summary 179 References 182 9 Frequency Synchronization in LTE 183 Contributed by Qi Wang 9.1 Mathematical Model 184 9.2 Carrier Frequency Offset Estimation in LTE 186 9.2.1 Standardized Training Symbols in LTE 186 9.2.2 Maximum Likelihood Estimators 188 9.3 Performance Evaluation 191 9.3.1 Estimation Performance 192 9.3.2 Post-FFT SINR 194 9.3.3 Post-equalization SINR and Throughput 195 References 199 10 LTE Performance Evaluation 201 Contributed by Stefan Schwarz 10.1 Mathematical Model of the Physical Layer 202 10.2 Receiver 203 10.2.1 Channel Estimation 204 10.2.2 Data Detection 205 10.2.3 Further Receiver Processing 206 10.3 Physical Layer Modeling 206 10.3.1 Post-equalization SINR 207 10.3.2 SINR Averaging 207 10.4 User Equipment Feedback Calculation 208 10.4.1 User Equipment Feedback Indicators 208 10.4.2 Calculation of the CQI, PMI, and RI 210 10.5 Practical Throughput Bounds 216 10.5.1 Channel Capacity 216 10.5.2 Open-Loop Mutual Information 217 10.5.3 Closed-Loop Mutual Information 218 10.5.4 BICM Bounds 219 10.5.5 Achievable Throughput Bounds 222 10.5.6 Prediction of the Optimal Performance 223 10.6 Simulation Results 224 10.6.1 SISO Transmission 225 10.6.2 OLSM Transmission 227 10.6.3 CLSM Transmission 229 References 230 Part IV SIMULATORS FOR WIRELESS SYSTEMS Introduction 237 References 240 11 LTE Link- and System-Level Simulation 243 Contributed by Josep Colom Ikuno 11.1 The Vienna LTE Link Level Simulator 245 11.1.1 Structure of the Simulator 245 11.1.2 Complexity 247 11.2 The Vienna LTE System Level Simulator 250 11.2.1 Structure of the Simulator 250 11.2.2 Simulator Implementation 252 11.2.3 Complexity 253 11.3 Validation of the Simulators 255 11.3.1 3GPP Minimum Performance Requirements 257 11.3.2 Link- and System-Level Cross-Comparison 257 11.4 Exemplary Results 259 11.4.1 Link-Level Throughput 259 11.4.2 LTE Scheduling 262 References 265 12 System-Level Modeling for MIMO-Enhanced HSDPA 271 12.1 Concept of System-Level Modeling 271 12.2 Computationally Efficient Link-Measurement Model 273 12.2.1 Receive Filter 274 12.2.2 WCDMA MIMO in the Network Context 276 12.2.3 Equivalent Fading Parameters Description 278 12.2.4 Generation of the Equivalent Fading Parameters 284 12.2.5 Influence of Non-Data Channels 286 12.2.6 Resulting SINR Description 287 12.3 Link-Performance Model 288 12.3.1 Link-Performance Model Concept 289 12.3.2 Training and Validation of the Model 293 References 296 Part V SIMULATION-BASED EVALUATION FOR WIRELESS SYSTEMS Introduction 301 13 Optimization of MIMO-Enhanced HSDPA 303 13.1 Network Performance Prediction 303 13.1.1 Simulation Setup 303 13.1.2 Single Network Scenario Investigation 304 13.1.3 Average Network Performance 306 13.2 RLC-Based Stream Number Decision 310 13.2.1 UE Decision 310 13.2.2 RLC Decision 311 13.2.3 System-Level Simulation Results 311 13.3 Content-Aware Scheduling 313 13.3.1 Video Packet Prioritization in HSDPA 313 13.3.2 Content-Aware Scheduler 314 13.3.3 Simulation Results 315 13.4 CPICH Power Optimization 316 13.4.1 System-Level Modeling of the CPICH Influence 317 13.4.2 CPICH Optimization in the Cellular Context 318 References 321 14 Optimal Multi-User MMSE Equalizer 325 14.1 System Model 326 14.2 Intra-Cell Interference Aware MMSE Equalization 330 14.2.1 Interference Suppression Capability 332 14.3 The Cell Precoding State 334 14.3.1 Training-Sequence-Based Precoding State Estimation 336 14.3.2 Blind Precoding State Estimation 337 14.3.3 Estimator Performance 339 14.4 Performance Evaluation 340 14.4.1 Physical-Layer Simulation Results 340 14.4.2 System-Level Simulation Results 341 References 343 15 LTE Advanced Versus LTE 347 Contributed by Stefan Schwarz 15.1 IMT-Advanced and 3GPP Performance Targets 348 15.2 Radio Interface Enhancements 349 15.2.1 Bandwidth Extension 349 15.2.2 Enhanced MIMO 350 15.2.3 Uplink Improvements 351 15.2.4 Beyond Release 10 352 15.3 MIMO in LTE Advanced 354 15.3.1 Codebook-Based Precoding 354 15.3.2 Non-Codebook-Based Precoding 356 15.4 Physical-Layer Throughput Simulation Results 359 15.4.1 Eight-Antenna Transmission 359 15.4.2 Comparison between LTE and LTE Advanced 363 15.4.3 Comparison of SU-MIMO and MU-MIMO 363 References 366 Index 369
£100.65
John Wiley & Sons Inc RFID Systems
Book SynopsisThis book provides an insight into the ''hot'' field of Radio Frequency Identification (RFID) Systems In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews various algorithms, protocols and design solutions that have been developed within the area, including most recent advances. In addition, authors cover a wide range of recognized problems in RFID industry, striking a balance between theoretical and practical coverage. Limitations of the technology and state-of-the-art solutions are identified and new research opportunities are addressed. Finally, the book is authored by experts and respected researchers in the field and every chapter is peer reviewed. Key Features: Provides the most comprehensive analysis of networking aspects of RFID systems, including tag identification protocols aTable of ContentsAbout the Editors. Preface. Acknowledgements. Part I COMPONENTS OF RFID SYSTEMS AND PERFORMANCE METRICS. 1 Performance of Passive UHF RFID Systems in Practice (Miodrag Bolic, Akshay Athalye, and Tzu Hao Li). 1.1 Introduction. 1.2 Ideal RFID System. 1.3 Practical RFID Systems. 1.4 Overview of the Book. 1.5 Conclusion. References. 2 Performance Metrics and Operational Parameters of RFID Systems (Raj Bridelall and Abhiman Hande). 2.1 Overview. 2.2 Key Operational Parameters. 2.3 Classification of Commercially Available Products. 2.4 Conclusion. Problems. References. 3 UHF RFID Antennas (Daniel Deavours). 3.1 Dipoles and Relatives. 3.2 T-Match and Relatives. 3.3 Putting it Together: Building an RFID Tag. 3.4 The Environment. 3.5 Conclusions, Trends, and Challenges. References. 4 RFID Tag Chip Design (Na Yan, Wenyi Che, Yuqing Yang, and Qiang Li). 4.1 Tag Architecture Systems. 4.2 Memory in Standard CMOS Processes. 4.3 Baseband of RFID Tag. 4.4 RFID Tag Performance Optimization. 4.5 Conclusion. Problems. References. 5 Design of Passive Tag RFID Readers (Scott Chiu). 5.1 Overview. 5.2 Basics of Passive RFID Operation. 5.3 Passive RFID Reader Designs. 5.4 Advanced Topics on RFID Reader Design. 5.5 Conclusion. Problems. References. 6 RFID Middleware: Concepts and Architecture (Nathalie Mitton, Loïc Schmidt, and David Simplot-Ryl). 6.1 Introduction. 6.2 Overview of an RFID Middleware Architecture. 6.3 Readers Management. 6.4 Data Management and Application-Level Events. 6.5 Store and Share Data. 6.6 Example. 6.7 Conclusion. Problems. References. Part II TAG IDENTIFICATION PROTOCOLS. 7 Aloha-Based Protocols (Kwan-Wu Chin and Dheeraj Klair). 7.1 Pure Aloha. 7.2 Slotted Aloha. 7.3 Framed Slotted Aloha. 7.4 Conclusion. Problems. References. 8 Tree-Based Anti-Collision Protocols for RFID Tags (Petar Popovski). 8.1 Introduction. 8.2 Principles of Tree-Based Anti-Collision Protocols. 8.3 Tree Protocols in the Existing RFID Specifications. 8.4 Practical Issues and Transmission Errors. 8.5 Cooperative Readers and Generalized Arbitration Spaces. 8.6 Conclusion. Problems. References. 9 A Comparison of TTF and RTF UHF RFID Protocols (Alwyn Hoffman, Johann Holm, and Henri-Jean Marais). 9.1 Introduction. 9.2 Requirements for RFID Protocols. 9.3 Different Approaches Used in UHF Protocols. 9.4 Description of Stochastic TTF Protocols. 9.5 Comparison between ISO18000-6C and TTF Protocols. 9.6 Conclusion. Problems. References. Part III READER INFRASTRUCTURE NETWORKING. 10 Integrating RFID Readers in Enterprise IT (Christian Floerkemeier and Sanjay Sarma). 10.1 Related Work. 10.2 RFID System Services. 10.3 Reader Capabilities. 10.4 RFID System Architecture Taxonomy. 10.5 EPCglobal Standards. 10.6 Adoption of High-Level Reader Protocols. 10.7 Potential Future Standardization Activities. 10.8 Conclusion. Problems. References. 11 Reducing Interference in RFID Reader Networks (Sung Won Kim and Gyanendra Prasad Joshi). 11.1 Introduction. 11.2 Interference Problem in RFID Reader Networks. 11.3 Access Mechanism, Regulations, Standards and Algorithms. 11.4 Comparison. 11.5 Conclusion. Problems. References. 12 Optimal Tag Coverage and Tag Report Elimination (Bogdan Carbunar, Murali Krishna Ramanathan, Mehmet Koyuturk, Suresh Jagannathan, and Ananth Grama). 12.1 Introduction. 12.2 Overview of RFID Systems. 12.3 Tree Walking: An Algorithm for Detecting Tags in the Presence of Collisions. 12.4 Reader Collision Avoidance. 12.5 Coverage Redundancy in RFID Systems: Comparison with Sensor Networks. 12.6 Network Model. 12.7 Optimal Tag Coverage and Tag Reporting. 12.8 Redundant Reader Elimination Algorithms: A Centralized Heuristic. 12.9 RRE: A Distributed Solution. 12.10 Adapting to Topological Changes. 12.11 The Layered Elimination Optimization (LEO). 12.12 Related Work. 12.13 Conclusion. Problems. References. 13 Delay/Disruption-Tolerant Mobile RFID Networks: Challenges and Opportunities (Hongyi Wu and Zhipeng Yang). 13.1 Motivation. 13.2 Overview of FINDERS. 13.3 General Feasibility Study. 13.4 Unique Challenges and Tactics. 13.5 Related Work. 13.6 Conclusion. Problems. References. Part IV ADDRESSING OTHER CHALLENGES IN RFID SYSTEMS. 14 Improving Read Ranges and Read Rates for Passive RFID Systems (Zhiguang Fan, Fazhong Shen, Jianhua Shen, and Lixin Ran). 14.1 Introduction. 14.2 Signal Descriptions and Formulations for Passive Backscatter RFID Systems. 14.3 Improving the Read Range of a Passive RFID System. 14.4 Improving the Read Rate of a Passive RFID System. 14.5 Two Design Examples for RFID System. 14.6 Conclusion. Problems. References. 15 Principles and Techniques of RFID Positioning (Yimin Zhang, Xin Li, and Moeness Amin). 15.1 Introduction. 15.2 Tag Range Estimation Techniques. 15.3 DOA Estimation Techniques. 15.4 RFID Positioning Techniques. 15.5 Improving Positioning Accuracy. 15.6 Conclusion. Problems. References. 16 Towards Secure and Privacy-Enhanced RFID Systems (Heiko Knospe and Kerstin Lemke-Rust). 16.1 Introduction. 16.2 Security and Privacy. 16.3 Classification of RFID Systems. 16.4 Attacks on RFID Systems and Appropriate Countermeasures. 16.5 Lightweight Cryptography for RFID. 16.6 Conclusion. Problems. References. 17 Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems (Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita). 17.1 Introduction. 17.2 Threats against the RFID System. 17.3 Required Properties. 17.4 Cryptographic Protocols for Identification with Privacy. 17.5 Cryptographic Protocols for Authentication without Privacy. 17.6 Cryptographic Protocols for Privacy and Other Requirements. 17.7 Implementation. 17.8 Real Systems and Attacks. 17.9 Conclusion. Problems. References. 18 Novel RFID Technologies: Energy Harvesting for Self-Powered Autonomous RFID Systems (Raj Bridelall and Abhiman Hande). 18.1 Introduction. 18.2 Novel Low Power Architectures. 18.3 Energy Harvesting Optimized for RFID. 18.4 Future Trends in Energy Harvesting. 18.5 Conclusion. Problems. References. 19 Simulators and Emulators for Different Abstraction Layers of UHF RFID Systems (Christian Steger, Alex Janek, Reinhold Weiß, Vojtech Derbek, Manfred Jantscher, Josef Preishuber-Pfluegl, and Markus Pistauer). 19.1 Introduction. 19.2 The Simulation/Emulation Platforms. 19.3 UHF RFID Simulation Platform. 19.4 Real-Time HIL-Verification and Emulation Platform. 19.5 Higher Class Tag Architecture Based on Energy Harvesting. 19.6 Conclusion. Problems. References. Index.
£113.95
John Wiley & Sons Inc 60GHz Technology for Gbps WLAN and WPAN
Book SynopsisThis book addresses 60 GHz technology for Gbps WLAN and WPAN from theory to practice, covering key aspects for successful deployment. In this book, the authors focus specifically on 60 GHz wireless technology which has emerged as the most promising candidate for multi-gigabit wireless indoor communication systems.Table of ContentsPreface xiii List of Contributors xvii 1 Introduction to 60GHz 1 Su-Khiong (SK) Yong 1.1 What is 60 GHz? 1 1.2 Comparison with other Unlicensed Systems 2 1.3 Potential Applications 6 1.4 Worldwide Regulation and Frequency Allocation 7 1.4.1 North America 7 1.4.2 Japan 8 1.4.3 Australia 9 1.4.4 Korea 9 1.4.5 Europe 9 1.5 Industry Standardization Effort 10 1.5.1 IEEE 802.15.3c 11 1.5.2 ECMA 387 12 1.5.3 WirelessHD 13 1.5.4 IEEE 802.11.ad 14 1.5.5 Wireless Gigabit Alliance 14 1.6 Summary 14 References 15 2 60GHz Channel Characterizations and Modeling 17 Su-Khiong (SK) Yong 2.1 Introduction to Wireless Channel Modeling 17 2.2 Modeling Approach and Classification of Channel Model 18 2.2.1 Deterministic Modeling 18 2.2.2 Stochastic Modeling 20 2.3 Channel Characterization 21 2.3.1 Large-Scale Channel Characterization 21 2.3.2 Small-Scale Channel Characterization 29 2.3.3 Polarization 40 2.4 Industry Standard Channel Models 43 2.4.1 IEEE 802.15.3c 43 2.4.2 IEEE 802.11ad 47 2.5 Summary 57 References 57 3 Non-Ideal Radio Frequency Front-End Models in 60GHz Systems 63 Chang-Soon Choi, Maxim Piz and Eckhard Grass 3.1 RF Front-End Architecture 64 3.1.1 Super-Heterodyne Architecture 64 3.1.2 Direct-Conversion Architecture 66 3.1.3 Low-IF Architecture 66 3.2 Nonlinear Power Amplifier 67 3.2.1 Tradeoff Between Linearity and Efficiency 67 3.2.2 Nonlinearity Modeling 69 3.2.3 Behavioral Models 71 3.2.4 Output Backoff Versus Peak-to-Average Power Ratio 75 3.2.5 Impact of Nonlinear Power Amplifier 76 3.3 Phase Noise from Oscillators 78 3.3.1 Modeling of Phase Noise in Phase-Locked Loops 78 3.3.2 Behavioral Modeling for Phase Noise in Phase-Locked Loops 82 3.4 Other RF Non-Idealities 82 3.4.1 Quantization Noise in Data Converters 82 3.4.2 I/Q Mismatch 86 References 87 4 Antenna Array Beamforming in 60GHz 89 Pengfei Xia 4.1 Introduction 89 4.2 60 GHz Channel Characteristics 90 4.2.1 Path Loss and Oxygen Absorption 90 4.2.2 Multipath Fading 91 4.3 Antenna Array Beamforming 93 4.3.1 Training for Adaptive Antenna Arrays 95 4.3.2 Training for Switched Antenna Arrays 107 4.3.3 Channel Access in 60 GHz Wireless Networks 110 4.4 Summary 115 References 115 5 Baseband Modulation 117 Pengfei Xia and André Bourdoux 5.1 Introduction 117 5.2 OFDM Baseband Modulation 120 5.2.1 Principles of OFDM 120 5.2.2 OFDM Design Considerations 123 5.3 Case Study: IEEE 802.15.3c Audio Video OFDM 126 5.3.1 Uncompressed Video Communications 126 5.3.2 Equal and Unequal Error Protection 127 5.3.3 Bit Interleaving and Multiplexing 130 5.3.4 AV OFDM Modulation 132 5.4 SC with Frequency-Domain Equalization 135 5.4.1 Introduction 135 5.4.2 Case Study: IEEE 802.15.3c SC PHY 137 5.5 SC Transceiver Design and System Aspects 142 5.5.1 Transmit and Receive Architecture 142 5.5.2 SC with Frequency-Domain Equalization 146 5.6 Digital Baseband Processing 149 5.6.1 Burst Detection and Rough Timing/CFO Acquisition 149 5.6.2 Joint Fine CFO and Channel Estimation Without I/Q Imbalance 155 5.6.3 Joint Estimation of Fine CFO, Channel and I/Q Imbalance 156 5.6.4 Time-Domain Equalization, Despreading and Tracking 161 References 166 6 60GHz Radio Implementation in Silicon 169 Alberto Valdes-Garcia 6.1 Introduction 169 6.2 Overview of Semiconductor Technologies for 60 GHz Radios 170 6.3 60 GHz Front-End Components 173 6.3.1 60 GHz LNAs in SiGe and CMOS 174 6.3.2 60 GHz PAs in SiGe and CMOS 176 6.3.3 Process Variability in Silicon Millimeter-Wave Designs 179 6.4 Frequency Synthesis and Radio Architectures 180 6.5 Radio–Baseband Interface 182 6.5.1 ADCs and DACs for Wide Bandwidth Signals 182 6.5.2 Modulators, Demodulators and Analog Signal Processors for Gbps Applications 187 References 189 7 Hardware Implementation for Single Carrier Systems 193 Yasunao Katayama 7.1 Introduction 193 7.2 Advantages and Challenges of SC Systems 194 7.3 System Design with Non-Coherent Detection 196 7.4 System Design with Differentially Coherent Detection 201 7.5 Test and Evaluation 203 7.6 Advanced SC System with Per-Packet Coherent Detection 205 7.7 Conclusion 209 References 209 8 Gbps OFDM Baseband Design and Implementation for 60GHz Wireless LAN Applications 211 Chang-Soon Choi, Maxim Piz, Marcus Ehrig and Eckhard Grass 8.1 OFDM Physical Layer Implemented on FPGA 212 8.1.1 Designed OFDM Physical Layer 212 8.1.2 Performance Evaluation in the Presence of Clock Deviation and Phase Noise 214 8.2 OFDM Baseband Receiver Architecture 214 8.2.1 Receiver Front-End 217 8.2.2 Receiver Back-End 222 8.3 OFDM Baseband Transmitter Architecture 225 8.4 60 GHz Link Demonstration 226 8.4.1 60 GHz OFDM Demonstrator Architecture 226 8.4.2 Wireless Link Demonstration with 60 GHz Radio 227 8.5 Next-Generation OFDM Demonstrators for 60 GHz Wireless LAN Applications 229 8.5.1 Channel Plan and RF Transceiver 230 8.5.2 Next-Generation Multi-Gbps OFDM Physical Layers 231 8.5.3 Performance Evaluation with 60 GHz NLOS Channel and 60 GHz Phase Noise Models 232 References 236 9 Medium Access Control Design 239 Harkirat Singh 9.1 Design Issues in the Use of Directional Antennas 240 9.2 IEEE 802.15.3c MAC for 60 GHz 244 9.2.1 Neighbor Discovery 244 9.2.2 Aggregation and Block-ACK 245 9.3 Design Considerations for Supporting Uncompressed Video 252 9.3.1 Pixel Partitioning 254 9.3.2 Uncompressed Video ARQ 255 9.3.3 Unequal Error Protection 256 9.3.4 Error Concealment 257 9.4 Performance Study 258 9.4.1 Effect of UEP and EEP 260 9.4.2 Stability of UEP 261 9.4.3 VQM Scores 262 9.5 Conclusions and Future Directions 263 References 264 10 Remaining Challenges and Future Directions 267 Alberto Valdes-Garcia, Pengfei Xia, Su-Khiong Yong and Harkirat Singh References 270 Index 273
£80.96
John Wiley & Sons Inc 3g Hspa and Fdd Versus Tdd Networking
Book Synopsis3G, HSPA and FDD versus TDD Networking, Second Edition is the only book that contrasts the network capacity gains that may be achieved with the advent of adaptive antenna arrays and HSDPA-style adaptive modulation techniques in the context of FDD and TDD CDMA cellular networks.Table of ContentsAbout the Authors xv Other Wiley and IEEE Press Books on Related Topics xvii Preface xix Acknowledgments xxxi 1 Third-generation CDMA Systems 1 1.1 Introduction 1 1.2 Basic CDMA System 2 1.2.1 Spread Spectrum Fundamentals 2 1.2.2 The Effect of Multipath Channels 6 1.2.3 Rake Receiver 9 1.2.4 Multiple Access 13 1.2.5 Spreading Codes 19 1.2.6 Channel Estimation 22 1.2.7 Summary 26 1.3 Third-generation Systems 26 1.3.1 Introduction 26 1.3.2 UMTS Terrestrial Radio Access (UTRA) 29 1.3.3 The cdma2000 Terrestrial Radio Access 68 1.3.4 Performance-enhancement Features 82 1.3.5 Summary of 3G Systems 84 1.4 Summary and Conclusions 85 2 High Speed Downlink and Uplink Packet Access 87 2.1 Introduction 87 2.2 High Speed Downlink Packet Access 88 2.2.1 Physical Layer 92 2.2.2 Medium Access Control (MAC) Layer 98 2.3 High Speed Uplink Packet Access 99 2.3.1 Physical Layer 102 2.3.2 MAC Layer 108 2.4 Implementation Issues 112 2.4.1 HS-SCCH Detection Algorithm 112 2.4.2 16QAM 115 2.4.3 HARQ Result Processing Time 116 2.4.4 Crest Factor 117 3 HSDPA-style Burst-by-Burst Adaptive Wireless Transceivers 119 3.1 Motivation 119 3.2 Narrowband Burst-by-Burst Adaptive Modulation 120 3.3 Wideband Burst-by-Burst Adaptive Modulation 123 3.3.1 Channel Quality Metrics 123 3.4 Wideband BbB-AQAM Video Transceivers 126 3.5 BbB-AQAM Performance 129 3.6 Wideband BbB-AQAM Video Performance 131 3.6.1 AQAM Switching Thresholds 133 3.6.2 Turbo-coded AQAM Videophone Performance 135 3.7 Burst-by-Burst Adaptive Joint-Detection CDMA Video Transceiver 136 3.7.1 Multi-user Detection for CDMA 136 3.7.2 JD-ACDMA Modem Mode Adaptation and Signalling 138 3.7.3 The JD-ACDMA Video Transceiver 139 3.7.4 JD-ACDMA Video Transceiver Performance 141 3.8 Subband-adaptive OFDM Video Transceivers 145 3.9 Summary and Conclusions 150 4 Intelligent Antenna Arrays and Beamforming 151 4.1 Introduction 151 4.2 Beamforming 152 4.2.1 Antenna Array Parameters 152 4.2.2 Potential Benefits of Antenna Arrays in Mobile Communications 153 4.2.3 Signal Model 162 4.2.4 A Beamforming Example 165 4.2.5 Analog Beamforming 166 4.2.6 Digital Beamforming 167 4.2.7 Element-space Beamforming 167 4.2.8 Beam-space Beamforming 168 4.3 Adaptive Beamforming 169 4.3.1 Fixed Beams 170 4.3.2 Temporal Reference Techniques 171 4.3.3 Spatial Reference Techniques 184 4.3.4 Blind Adaptation 187 4.3.5 Adaptive Arrays in the Downlink 189 4.3.6 Adaptive Beamforming Performance Results 191 4.4 Summary and Conclusions 213 5 Adaptive Arrays in an FDMA/TDMA Cellular Network 215 5.1 Introduction 215 5.2 Modelling Adaptive Antenna Arrays 216 5.2.1 Algebraic Manipulation with Optimal Beamforming 216 5.2.2 Using Probability Density Functions 218 5.2.3 Sample Matrix Inversion Beamforming 219 5.3 Channel Allocation Techniques 220 5.3.1 Overview of Channel Allocation 221 5.3.2 Simulation of the Channel Allocation Algorithms 232 5.3.3 Overview of Channel Allocation Algorithms 236 5.3.4 DCA Performance without Adaptive Arrays 241 5.4 Employing Adaptive Antenna Arrays 242 5.5 Multipath Propagation Environments 245 5.6 Network Performance Results 251 5.6.1 System Simulation Parameters 252 5.6.2 Non-wraparound Network Performance Results 261 5.6.3 Wrap-around Network Performance Results 292 5.7 Summary and Conclusions 315 6 HSDPA-style FDD Networking, Adaptive Arrays and Adaptive Modulation 317 6.1 Introduction 317 6.2 Direct Sequence Code Division Multiple Access 318 6.3 UMTS Terrestrial Radio Access 320 6.3.1 Spreading and Modulation 321 6.3.2 Common Pilot Channel 325 6.3.3 Power Control 326 6.3.4 Soft Handover 328 6.3.5 Signal-to-interference plus Noise Ratio Calculations 329 6.3.6 Multi-user Detection 331 6.4 Simulation Results 332 6.4.1 Simulation Parameters 332 6.4.2 The Effect of Pilot Power on Soft Handover Results 336 6.4.3 Ec/Io Power Based Soft Handover Results 351 6.4.4 Overview of Results 363 6.4.5 Performance of Adaptive Antenna Arrays in a High Data Rate Pedestrian Environment 365 6.4.6 Performance of Adaptive Antenna Arrays and Adaptive Modulation in a High Data Rate Pedestrian Environment 373 6.5 Summary and Conclusions 380 7 HSDPA-style FDD/CDMA Performance Using Loosely Synchronized Spreading Codes 383 7.1 Effects of Loosely Synchronized Spreading Codes on the Performance of CDMA Systems 383 7.1.1 Introduction 383 7.1.2 Loosely Synchronized Codes 384 7.1.3 System Parameters 386 7.1.4 Simulation Results 388 7.1.5 Summary 391 7.2 Effects of Cell Size on the UTRA Performance 392 7.2.1 Introduction 392 7.2.2 System Model and System Parameters 393 7.2.3 Simulation Results and Comparisons 395 7.2.4 Summary and Conclusion 400 7.3 Effects of SINR Threshold on the Performance of CDMA Systems 401 7.3.1 Introduction 401 7.3.2 Simulation Results 402 7.3.3 Summary and Conclusion 406 7.4 Network-layer Performance of Multi-carrier CDMA 407 7.4.1 Introduction 407 7.4.2 Simulation Results 413 7.4.3 Summary and Conclusions 419 8 HSDPA-style TDD/CDMA Network Performance 421 8.1 Introduction 421 8.2 UMTS FDD versus TDD Terrestrial Radio Access 422 8.2.1 FDD versus TDD Spectrum Allocation of UTRA 422 8.2.2 Physical Channels 423 8.3 UTRATDD/CDMA System 424 8.3.1 The TDD Physical Layer 425 8.3.2 Common Physical Channels of the TDD Mode 425 8.3.3 Power Control 426 8.3.4 Time Advance 428 8.4 Interference Scenario in TDD CDMA 428 8.4.1 Mobile-to-Mobile Interference 429 8.4.2 Base Station-to-Base Station Interference 429 8.5 Simulation Results 430 8.5.1 Simulation Parameters 431 8.5.2 Performance of Adaptive Antenna Array Aided TDD CDMA Systems 433 8.5.3 Performance of Adaptive Antenna Array and Adaptive Modulation Aided TDD HSDPA-style Systems 438 8.6 Loosely Synchronized Spreading Code Aided Network Performance Of UTRA-like TDD/CDMA Systems 442 8.6.1 Introduction 442 8.6.2 LS Codes in UTRA TDD/CDMA 444 8.6.3 System Parameters 445 8.6.4 Simulation Results 446 8.6.5 Summary and Conclusions 449 9 The Effects of Power Control and Hard Handovers on the UTRA TDD/CDMA System 451 9.1 A Historical Perspective on Handovers 451 9.2 Hard HO in UTRA-like TDD/CDMA Systems 452 9.2.1 Relative Pilot Power-based Hard HO 453 9.2.2 Simulation Results 454 9.3 Power Control in UTRA-like TDD/CDMA Systems 464 9.3.1 UTRATDD Downlink Closed-loop Power Control 464 9.3.2 UTRA TDD Uplink Closed-loop Power Control 466 9.3.3 Closed-loop Power Control Simulation Results 466 9.3.4 UTRA TDDUL Open-loop Power Control 475 9.3.5 Frame-delay-based Power Adjustment Model 476 9.4 Summary and Conclusion 486 10 Genetically Enhanced UTRA/TDD Network Performance 489 10.1 Introduction 489 10.2 The Genetically Enhanced UTRA-like TDD/CDMA System 490 10.3 Simulation Results 494 10.4 Summary and Conclusion 499 11 Conclusions and Further Research 501 11.1 Summary of FDD Networking 501 11.2 Summary of FDD versus TDD Networking 506 11.3 Further Research 511 11.3.1 Advanced Objective Functions 513 11.3.2 Other Types of GAs 513 Glossary 515 Bibliography 521 Subject Index 547 Author Index 553
£163.35
John Wiley & Sons Inc Networking Fundamentals
Book SynopsisFocusing on the physical layer, Networking Fundamentals provides essential information on networking technologies that are used in both wired and wireless networks designed for local area networks (LANs) and wide-area networks (WANs). The book starts with an overview of telecommunications followed by four parts, each including several chapters. Part I explains the principles of design and analysis of information networks at the lowest layers. It concentrates on the characteristics of the transmission media, applied transmission and coding, and medium access control. Parts II and III are devoted to detailed descriptions of important WANs and LANs respectively with Part II describing the wired Ethernet and Internet as well as cellular networks while Part III covers popular wired LANs and wireless LANs (WLANs), as well as wireless personal area network (WPAN) technologies. Part IV concludes by examining security, localization and sensor networking. The partitioned structure of the Trade Review?5/5 stars? (IT Training, November 2009) ?I would wholeheartedly recommend the book to everyone, whether novices or expert, as it covers an incredible amount of knowledge on communication.? (BCS, September 2009)Table of ContentsAbout the Authors. Preface. 1. Introduction to Information Networks. 1.1 Introduction. 1.2 Evolution of Wide-Area Networks. 1.3 Evolution of Local Networks. 1.4 Structure of the book. PART ONE: FUNDAMENTALS OF TRANSMISSION AND ACCESS. 2. Characteristics of the Medium. 2.1 Introduction. 2.2 Guided Media. 2.3 Wireless Media. 3. Fundamentals of Physical Layer Transmission. 3.1 Information Transmission. 3.2 Transmission Techniques and Signal Constellation. 3.3 Performance of the Physical Layer. 3.4 Wideband Modems. 4. Coding and Reliable Packet Transmission. 4.1 Introduction. 4.2 Source Coding and Framing Techniques. 4.3 FEC Coding. 4.4 Coding for Spread-Spectrum and Code-Division Multiple Access Systems. 4.5 ARQ Schemes. 4.6 Flow Control Protocols. 5. Medium Access Methods. 5.1 Introduction. 5.2 Centralized Assigned Access Schemes. 5.3 Distributed Random Access Networks. 5.4 Integration of Voice and Data Traffic. PART TWO: WIDE-AREA NETWORKS. 6. The Internet. 6.1 Introduction: Internet Infrastructure. 6.2 Addressing. 6.3 Quality of Service. 6.4 Bridges or LAN Switches. 6.5 Switches. 6.6 Routers. 7. Cellular Networks. 7.1 Introduction. 7.2 General Architecture of a Cellular Network. 7.3 Mechanisms to Support a Mobile Environment. 7.4 Protocol Stack in Cellular Networks. 7.5 Physical Layer in TDMA Air Interface. 7.6 Physical Layer in CDMA Air Interface. 7.7 Achieving Higher Data Rates in Cellular Networks. 7.8 Deployment of Cellular Networks. PART THREE: LOCAL AND PERSONAL-AREA NETWORKS. 8. IEEE 802-3 Ethernet. 8.1 Introduction. 8.2 Legacy 10 Mb/s Ethernet. 8.3 Evolution of the Physical Layer. 8.4 Emergence of Additional Features for Ethernet. 9. IEEE Wireless Local-Area Network Standards. 9.1 Introduction. 9.2 IEEE 802.11 and WLANs. 9.3 IEEE 802.16 (WiMAX). 10. IEEE 802.15 Wireless Personal-Area Network. 10.1 Introduction. 10.2 IEEE 802.15.1 Bluetooth. 10.3 Interference between Bluetooth and 802.11. 10.4 IEEE 802.15.3 Ultra Wideband Wireless. 10.5 IEEE 802.15.4 ZigBee. PART FOUR: SYSTEM ASPECTS. 11. Network Security. 11.1 Introduction. 11.2 Network Attacks and Security Issues. 11.3 Protection and Prevention. 11.4 Detection. 11.5 Assessment and Response. 12. Wireless Localization. 12.1 Introduction. 12.2 What is Wireless Geolocation? 12.3 RF Location Sensing and Positioning Methodologies. 12.4 LCS Architecture for Cellular Systems. 12.5 Positioning in Ad Hoc and Sensor Networks. 13. Wireless Sensor Networks. 13.1 Introduction. 13.2 Sensor Network Applications. 13.3 Sensor Network Architecture and Sensor Devices. 13.4 The PHY Layer in Sensor Networks. 13.5 The MAC Layer in Sensor Networks. 13.6 Higher Layer Issues in Sensor Networks. References. Appendix A: What is Decibel? Appendix B: STC for Two Transmitters and One Receiver. Appendix C: Source Coding. C.1 Source Coding for Voice. C.2 Source Coding for Images and Video. Appendix D: Acronyms. Appendic E: List of Variables. Index.
£60.26
John Wiley & Sons Inc Practical Electromagnetics
Book SynopsisLearn to solve both simple and complex electromagnetic problems with this text's unique integration of theoretical and mathematical concepts. With the author's guidance, you'll discover a broad range of classic and cutting-edge applications across a wide array of fields, including biomedicine, wireless communication, process control, and instrumentation. Case studies, detailed derivations, and 170 fully solved examples deepen your understanding of theory, and help you apply numerical methods to real-world problems.Trade Review"…a perfect, very good introductory work…" (CHOICE, August 2007)Table of ContentsPreface. 1. INTRODUCTION. 1.1 Electrical sources and fundamental quantities. 1.2 Static and dynamic fields. 1.3 Working with complex numbers and functions. 2. VECTORS AND FIELDS. 2.1 Working with vectors. 2.2 Coordinate systems. 2.3 Differentiation and integration of vectors. 2.4 Gradient of the scalar field and its applications. 2.5 Divergence of the vector field and its applications. 2.6 Curl of the vector field and its applications. 2.7 The divergence theorem. 2.8 Stokes’ theorem. Δ. 2.9 Other operations involving 2.10 Helmholtz theorem. 3. BASIC LAWS OF ELECTROMAGNETICS. 3.1 Maxwell’s equations in large scale/integral form. 3.2 Maxwell’s equations in point/differential form. 3.3 Constitutive relations. 3.4 Boundary conditions. 3.5 Lorentz force equation. 3.6 Poynting vector and power flow. 4. UNIFORM PLANE WAVES. 4.1 The wave equation and uniform plane wave solutions. 4.2 Plane electromagnetic waves in Lossy media. 4.3 Uniform plane wave incident normally on an interface. 4.4 Uniform plane wave incident obliquely on an interface. 5. TRANSMISSION LINES. 5.1 Transmission line equations. 5.2 Finite length transmission line. 5.3 Smith chart. 5.4 Transients on transmission lines. 6. MODIFIED MAXWELL'S EQUATIONS AND POTENTIAL FUNCTIONS. 6.1 Magnetic charge and current. 6.2 Magnetic vector and electric scalar potentials. 6.3 Electric vector and magnetic scalar potentials. 6.4 Construction of solution in rectangular coordinates. 6.5 Construction of solution in cylindrical coordinates. 6.6 Construction of solution in spherical coordinates. 7. SOURCE IN INFINITE SPACE. 7.1 Fields of an infinitesimal source. 7.2 Antenna parameters. 7.3 Linear antennas. 7.4 Antenna arrays. 7.5 Friis transmission formula and the radar range equation. 8. ELECTROSTATIC FIELDS. 8.1 Laws of electrostatic fields. 8.2 Gauss’ law. 8.3 Poisson’s and Laplace’s equations. 8.4 Capacitors and energy storage. 8.5 Further applications of Poisson’s and Laplace’s equations. 9. MAGNETOSTATIC FIELDS. 9.1 Laws of magnetostatic fields. 9.2 Inductors and energy storage. 9.3 Magnetic materials. 9.4 Magnetic Circuits. 10. WAVEGUIDES AND CAVITY RESONATORS. 10. 1 Metallic rectangular waveguide. 10. 2 Metallic circular cylindrical waveguide. 10.3 Rectangular cavity resonators. 10.4 Circular cylindrical cavity resonators. 11. NUMERICAL TECHNIQUES. 11.1 Finite difference methods. 11.2 The method of moments. 11.3 Scattering of plane EM waves from an infinitely long cylinder. Appendix A. Mathematical formulas. Appendix B. Delta function and evaluation of fields in unbounded media. Appendix C. Bessel functions. Appendix D. Legendre functions. Appendix E. Characteristics of selected materials. Appendix F. Physical constants. Appendix G. Decibels and Neper. Appendix H. Nomenclature and characteristics of standard rectangular waveguides. SELECTED REFERENCE BOOKS . Index.
£155.66
The University of Michigan Press Smartland Korea
Book SynopsisAnalyses mobile communication in the context of Korean smartphones. This book looks into a largely neglected focus of inquiry, a localized mobile landscape, with particular reference to young Koreans' engagement with their devices and applications. Dal Yong Jin focuses on the achievement of technological advancement and the significance of social milieu in the development of the smartphones.Trade ReviewSmartland Korea is an empirically rich study that is multi-perspectival in incorporating industry and technology studies, policy analysis, audience/user research, and case studies. As the Korean case is under-explored in the English-language communication and media studies literature relative to its global significance, this is an important contribution to the overall literature in the field."" - Terry Flew, Queensland University of Technology
£29.95
Cambridge University Press Introduction to SpaceTime Wireless Communications
Book SynopsisThis book is an accessible introduction to the theory of space-time wireless communications. The book is an ideal introduction to this rapidly growing field for graduate students and for practitioners in the wireless industry. Homework problems and other supporting material are available on a companion website.Table of Contents1. Introduction; 2. Space-time propagation; 3. Space-time channel and signal models; 4. Capacity of space-time channels; 5. Spatial diversity; 6. Space-time coding without channel knowledge at the transmitter; 7. Space-time receivers; 8. Exploiting channel knowledge at the receiver; 9. Space-time OFDM and spread spectrum modulation; 10. MIMO-multiuser; 11. Space-time co-channel interference mitigation; 12. Performance limits and tradeoffs in MIMO channels.
£59.99
John Wiley & Sons Inc Wireless Multimedia
Book SynopsisWireless Multimedia: A Handbook to the IEEE 802.15.3 Standard clarifies the IEEE 802.15.3 standard for individuals who are implementing compliant devices and shows how the standard can be used to develop wireless multimedia applications. The 802.15.3 standard addresses an untapped market that does beyond 802.11 and Bluetooth wireless technologies. The standard addresses the consumer need for low-cost, high data-rate, ad-hoc wireless connections. Some of these applications include: wireless keyboards and printers, personal video and digital cameras, cordless telephones and intercoms, digital audio players and headphones, gaming (including interactive gaming, multiplayer consoles, handheld multiplayer gaming, digital music, video, and image uploads to handheld games), home theater system and stereo system components, video conferencing, and more! Navigating through the IEEE 802.15.3 standard to find the required information can be a difficult task for anyone who has not spent a coTable of ContentsIntroduction xv Acronyms and Abbreviations xvii Chapter 1 Background and History 1 What is an IEEE standard? 1 The 802.15 family 2 Why 802.15.3? 4 History of 802.15.3 6 Chapter 2 802.15.3 applications 13 The high-rate WPAN theme 13 Still image applications 14 Telephone quality audio applications 16 High quality audio applications 17 Gaming applications 18 Video and multimedia applications 19 Chapter 3 Overview of the IEEE 802.15.3 standard 23 Elements of the 802.15.3 piconet 25 PHY overview 28 Starting a piconet 31 The superframe 32 Joining and leaving a piconet 34 Connecting with other devices 35 Dependent piconets 36 Obtaining information 39 Power management 40 System changes 43 Implementation cost and complexity 44 Chapter 4 MAC functionality 47 MAC terminology in IEEE Std 802.15.3 47 Frame formats 49 Piconet timing and superframe structure 51 Interframe spacings 53 Contention access period (CAP) 55 Channel time allocation period (CTAP) 56 Comparing the contention access methods 60 Guard time 63 The role of the PNC 66 Starting a piconet 66 Handing over control 66 Ending a piconet 72 Joining and leaving the piconet 73 Association 74 Broadcasting piconet information 77 Disassociation 78 Assigning DEVIDs 80 Managing bandwidth 81 Acknowledgements 81 Asynchronous data 87 Stream connections 92 Fragmentation/defragmentation 96 Retransmissions and duplicate detection 99 Power management 100 Common characteristics of the SPS modes 104 Analyzing power save efficiencies 107 Switching PM modes 110 Managing SPS sets 114 DSPS mode 118 Allocating channel time for DSPS DEVs 119 PSPS mode 124 APS mode 126 Changing piconet parameters 128 Beacon announcements 129 Dynamic channel selection 132 Changing the PNID or BSID 134 Moving the beacon or changing the superframe duration 136 Finding information 138 Probe 139 Announce 143 PNC Information 145 Channel status 148 PNC channel scanning 150 Remote scan 152 Piconet services 154 Other capabilities 157 Transmit power control 157 Multirate capabilities 159 Extensibility of the standard 160 Example of the life cycle of a DEV 162 Chapter 5 Dependent piconets 165 Introduction 165 Starting a dependent piconet 168 Parent PNC ceasing operations with dependent piconets 174 Parent PNC stopping a dependent piconet 176 Handing over PNC responsibilities in a dependent piconet 177 Chapter 6 Security 187 Introduction and history 187 Security modes and policies 190 Security services provided in mode 1 191 Security policies 193 Symmetric key security suite 195 Overview of AES CCM 195 Key distribution 197 Security information 199 Chapter 7 2.4 GHz PHY 203 Overview 203 General PHY requirements 205 Channel plan 205 Timing issues 206 Miscellaneous PHY requirements 213 PHY frame format 213 Stuff bits and tail symbols 214 Frame format 215 PHY preamble 217 Data size restrictions 219 Modulation 220 Receiver performance 224 Transmitter performance 228 Regulatory and requirements 233 Delay spread performance 234 Mitigating the effects of delay spread 236 Fading channel model used for 802.15.3 237 Defining delay spread performance 239 Delay spread measurements 240 Radio architectures 244 Superheterodyne 245 Direct conversion 248 Walking IF 250 Low IF 253 Summary of radio architectures 256 Chapter 8 2.4 Interfacing to 802.15.3 257 The PIBs and their interface 261 MLME SAP 262 PLME SAP 265 MAC SAP 265 PHY SAP 266 The FCSL 268 Chapter 9 2.4 Coexistence mechanisms 271 Introduction 271 Coexistence techniques in 802.15.3 271 Passive scanning 273 The ability to request channel quality information 273 Dynamic channel selection 273 Link quality and RSSI 274 Channel plan that minimizes channel overlap 274 Transmit power control 275 Lower impact transmit spectral mask 275 Neighbor piconet capability 276 Coexistence results 278 Assumptions for coexistence simulations 278 BER calculations 280 802.11b and 802.15.3 282 802.15.1 and 802.11 FHSS overlapping with 802.15.3 288 Summary 291 References 295 Glossary 299 Index 305
£61.16
Duke University Press The Undersea Network
Book SynopsisIn our 'wireless' world it is easy to take the importance of the undersea cable systems for granted, but the stakes of their successful operation are huge, as they are responsible for carrying almost all transoceanic Internet traffic. In The Undersea Network Nicole Starosielski follows these cables from the ocean depths to their landing zones on the sandy beaches of the South Pacific, bringing them to the surface of media scholarship and making visible the materiality of the wired network. In doing so, she charts the cable network''s cultural, historical, geographic and environmental dimensions. Starosielski argues that the environments the cables occupy are historical and political realms, where the network and the connections it enables are made possible by the deliberate negotiation and manipulation of technology, culture, politics and geography. Accompanying the book is an interactive digital mapping project, where readers can trace Trade Review“Starosielski offers a crucial intervention into theoretical conceptualizations of communications infrastructure. . . . This rich text also has profound implications for how citizens in an always-networked society and economy understand our lived realities. The Undersea Network makes us reconsider the ‘wirelessness’ of our world by admonishing us consider it in terms of its peculiar and ongoing connectedness to geographies, cultures, and politics.” -- Sara Rodrigues * PopMatters *“[A] fascinating book that is part history, part travelogue and part socio-economic memoir. . . . Starosielski’s account makes for fascinating reading, drawing together the varied threads of history, technical complexity, economic power and political will that have shaped the world’s cable networks. Despite the scale of the infrastructure under discussion, the narrative remains intensely personal, and one to be enjoyed." -- John Gilbey * Times Higher Education *“The Undersea Network is a fascinating interdisciplinary look at the infrastructure that lets us communicate instantly across oceans…. [T]his book is a good read for anyone broadly interested in geography or communications.” -- Eva Amsen * Hakai Magazine *“A fascinating cultural assessment of global undersea cable networks that carry most of the world's trans-ocean Internet traffic. … Great stuff!” -- Christopher Sterling * Communication Booknotes Quarterly *"Overall, the book brilliantly brings together the global metanarrative of mass communication with the local, material, and relatively immobile specificities of this undersea network.... Starosielski is extremely successful in rewiring our wireless imaginaries of a networked world. The depth and breadth of the fieldwork conducted is noteworthy as is the production of the book itself, which contains a plethora of images, graphics, and maps." -- Rachael Squire * Transfers *"The multistranded analysis developed in the book provides a rewarding account that blends cultural history with investigative ethnography and along the way takes us to remote sites in Hawaii, Tahiti and Guam. Most importantly, Starosielski brings the infrastructure of undersea cable systems back into visibility, showing us in vivid ways what makes global communications possible." * European Journal of Communication *"The Undersea Network succeeds in introducing an environmental consciousness into one’s imagination of digital networks and the ecological, political, financial, place-based contingencies that support, interfere with and maintain our global telecommunications system. It makes cables salient. ... The Undersea Network is required reading for students of media and network archaeology, communication educators, political and environmental scientists, the history of technology discipline, and readers within the cable industries and government." -- Emily Goodmann * International Journal of Media & Cultural Politics *"If you have ever wondered why infrastructure has suddenly become a buzzword in cultural anthropology and science and technology studies, then follow the signal. That is precisely what The Undersea Network does, brilliantly redeeming the promise of multi-sited fieldwork methods to highlight the connections and disconnection–historical and present-day–among far-flung people and places.... For anyone with an interest in Pacific studies, this book has plenty to ponder." -- Robert J. Foster * Journal of Pacific History *"[A]n enthralling read for anybody with an interest in telecoms infrastructure and the way that it is presented in the media." -- Mike Conradi * Telecommunications Policy *"This is a fascinating and deeply geographical piece of media scholarship.Starosielski’s book is remarkably successful in demonstrating that the unstable materiality of the infrastructures it describes matters in all kinds of sometimes contradictory ways to those who construct these infrastructures, to those they connect, and to those who remain at a distance from their connective capacities." -- Derek P. McCormack * Cultural Geographies *Table of ContentsPreface. Edges ix Acknowledgments xv Introduction. Against Flow 1 1. Circuitous Routes. From Topology to Topography 26 2. Short-Circuiting Discursive Infrastructure: From Connection to Transmission 64 3. Gateway: From Cable Colony to Network Operations Center 94 4. Pressure Point: Turbulent Ecologies of the Cable Landing 138 5. A Network of Islands: Interconnecting the Pacific 170 6. Cabled Depths: The Aquatic Afterlives of Signal Traffic 198 Conclusion. Surfacing 225 Notes 235 Bibliography 263 Index 281
£20.69
Taylor & Francis Inc Cardiovascular Disease In The Elderly Third
Book SynopsisBroadband Last Mile: Access Technologies for Multimedia Communications provides in-depth treatments of access technologies and the applications that rely upon them or support them. It examines innovations and enhancements along multiple dimensions in access, with the overarching goal of ensuring that the last mile is not the weak link in the broadband chain. Written by experts from the academic and commercial segments of the field, the book's self-contained sections address topics related to the disciplines of communications, networking, computing, and signal processing.The core of this treatment contains contemporary reviews of broadband pipes in the classes of copper, cable, fiber, wireless, and satellite. It emphasizes the coexistence of these classes within a network, the importance of optical communications for unprecedented bandwidth, and the flexibility and mobility provided by wireless.The book also includes perspective on the increasingly important topic of network management, providing insights that are true regardless of the nature of the pipe. The text concludes with a discussion of newly emerging applications and broadband services.This book offers an all-in-one treatment of the physical pipes and network architectures that make rich and increasingly personalized applications possible. It serves as a valuable resource for researchers and practitioners working in the increasingly pervasive field of broadband.Table of ContentsBroadband in the Last Mile: Current and Future Applications. The Last Mile, the Edge, and the Backbone. Last-Mile Copper Access. Last-Mile HFC Access. Optical Access: Networks and Technology. Last-Mile Wireless Access in Broadband and Home Networks. Satellite Technologies Serving as Last-Mile Solutions. Management of Last-Mile Broadband Networks. Emerging Broadband Services Solutions.
£137.75
Taylor & Francis Ltd The Handbook of Mobile Middleware
Book SynopsisOffers an overview of developments in the various fields related to how software supports mobile computing. This book presents mobile middleware motivations, requirements, and technologies, and offers a taxonomy of solutions organized on the basis of their goals: mobility/disconnection handling; location-based support; and context-based support.Table of ContentsFundamentals. Emerging Technologies for Mobile Middleware. Requirements and Guidelines for Mobile Middleware. Mobile Middleware for Seamless Connectivity. Mobile Middleware for Location-Dependent Services. Mobile Middleware for Context-Dependent Services. Current Experiences and Envisioned Application Domains for Services Based on Mobile Middleware.
£161.50
Taylor & Francis Ltd Performance Optimization of Digital
Book SynopsisBecause fine-tuning the parameters of a system is critical to a developer's success, Performance Optimization of Digital Communications Systems examines particular optimization problems in digital communications, presenting analytical techniques in combination with SystemView and MATLAB simulations. Consisting of ten chapters, this monograph presents a unique method for determining the quality of a communications channel - a great advantage to any company that uses this method. The book presents a method for the transmission of proprietary data. It also describes the means to reduce the peak-to-average power ratio and introduces optimal phase shifters for multicarrier communication systems.This volume contains numerous illustrations and includes appendices that offer optimization puzzles, MATLAB scripts, and some newly discovered properties of flat-spectrum and spectrum-shaped waveforms.Table of ContentsIntroduction. Method for determining the quality of a communication channel. Digital communications in stealth mode. Pulse shape optimization. Optimal phase shifters for peak-to-average power ratio reduction in multicarrier communication systems. Optimization of the automatic repeat request parameters in quadrature amplitude modulation channels. Optimal selection of error correction and retransmission parameters in multichannel communications systems. Bit error rate of self-similar constellations in ADSL systems. Throughput optimization in a general duplex communications system with FEC and ARQ. A quantitative procedure of optimizing the MAC packet size in TCP/IP-compliant networks.
£133.00
Taylor & Francis Inc Wireless Multimedia Communications Convergence
Book SynopsisWith the rapid evolution of multimedia communications, engineers and other professionals are generally forced to hoard a plethora of different texts and journals to maintain a solid grasp on essential ideas and techniques in the field. Wireless Multimedia Communications provides researchers and students with a primary reference to help readers take maximum advantage of current systems and uncover opportunities to propose new and novel protocols, applications, and services. Extract the Essentials of System Design, Analysis, ImplementationA complete technical reference, the text condenses the essential topics of core wireless multimedia communication technologies, convergence, QoS, and security that apply to everything from networking to communications systems, signal processing, and security. From extensive existing literature, the authors distill the central tenets and primary methods of analysis, design, and implementation, to reflect the latest technoloTable of ContentsIntroduction to Wireless Networking. Convergence Technologies. Wireless Video. Wireless Multimedia Services and Applications. Wireless Networking Standards (WLAN, WPAN, WMAN, WWAN). Advances in Wireless Video. Cross-Layer Wireless Multimedia. Mobile Internet. Evolution toward 4G Networks.
£147.25
£11.64
Taylor & Francis Ltd The Big Book of Drones
Book SynopsisDrones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist.For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down.Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.Table of ContentsAbout this book. 1 Introduction. 2 The history of drones. 3 Laws governing drones. 4 Drone hardware/software. 5 Flying a drone. 6 Hacking a drone. 7 Programing a drone. 8 Build your own drone. 9 Do-It-Yourself (DIY) drone projects. 10 Drone forensics. 11 More on drones. Definitions. Index.
£25.64
CRC Press Printed Antennas for Future Generation Wireless
Book SynopsisThis proposed book focuses on the design and development of printed antennas along with modeling aspects for multifaceted applications. It further investigates imperfections in the manufacturing processes and assembly operation during the testing/characterization of printed antennas.This text- Discusses in a comprehensive manner the design and development aspects of printed antennas. Provides fractal engineering aspects for miniaturization and wideband characteristics of the low-profile antenna with high performances. Covers high gain printed antenna for Terahertz application. Showcases electrical modeling of smart antennas. Pedagogical features such as review questions based on practical experiences are included at the end of each chapter. The book comprehensively discusses fractal engineering in printed antennas for miniaturization and enhancement of performance factors. It further covers the modeling of electrically small antennas, circuit modeling, modeling of factual-based Ultra-Wide Band antennas, and modeling of reconfigurable micro-electromechanical system-based patch antennas. The book highlights performance metrics of multiple-input-multiple-output antennas. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in fields including electrical engineering, electronics, communications engineering, and computer engineering.
£46.54
CRC Press Cyber Insecurity
Book SynopsisCyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understanding history and fostering innovation. The author, Dr. Leonas, shares his journey from Moscow to Australia, highlighting his academic and professional milestones.Then the book covers the evolution of cybersecurity from the late 1960s to the present, detailing significant events and technological advancements. It emphasizes the importance of simplicity in technology projects, citing complexity as a major hindrance to success. This book also discusses the impact of the digital revolution, using the example of a global IT outage caused by a faulty software update.Project management methodologies are explored, tracing their origins from ancient civilizations to modern techniques like CPM and PERT. The concept of cloud computing is examined, highlighting its benefits and potential security issues. The evolution and advantages of SaaS solutions are also discussed, noting their increased adoption during the COVID-19 pandemic.The author then addresses supply chain challenges, using real-world examples to illustrate vulnerabilities. It traces the history of communication methods leading up to TCP/IP and discusses the development and importance of DNS. The differences between compliance and conformance in cybersecurity are clarified, emphasizing that compliance does not equate to security.Key cybersecurity standards like the NIST CSF and ISO/IEC 27000 series are examined. The book also covers the Essential 8, a set of cybersecurity controls developed by the Australian Signals Directorate. The convergence of OT and IoT is discussed, highlighting the cybersecurity risks associated with this integration.Emerging threats from AI and quantum computing are explored, noting their potential to both advance and threaten cybersecurity. The evolving legal landscape of cybersecurity is also covered, emphasizing the need for international cooperation and innovative legal solutions.In conclusion, the book stresses the importance of critical thinking and a holistic approach to cybersecurity, advocating for simplicity and foundational practices to enhance security.
£46.54
£48.44
Cambridge University Press Random Matrix Methods for Wireless Communications
Book SynopsisBlending theoretical results with practical applications, this book provides an introduction to random matrix theory and shows how it can be used to tackle a variety of real-world problems in wireless communications. Intuitive yet rigorous, it demonstrates how to choose the correct approach for obtaining mathematically accurate results.Table of Contents1. Introduction; Part I. Theoretical Aspects: 2. Random matrices; 3. The Stieltjes transform method; 4. Free probability theory; 5. Combinatoric approaches; 6. Deterministic equivalents; 7. Spectrum analysis; 8. Eigen-inference; 9. Extreme eigenvalues; 10. Summary and partial conclusions; Part II. Applications to Wireless Communications: 11. Introduction to applications in telecommunications; 12. System performance of CDMA technologies; 13. Performance of multiple antenna systems; 14. Rate performance in multiple access and broadcast channels; 15. Performance of multi-cellular and relay networks; 16. Detection; 17. Estimation; 18. System modeling; 19. Perspectives; 20. Conclusion.
£89.99
Cambridge University Press Signalling Across Space Without Wires
Book SynopsisIn 1894, Heinrich Hertz died aged only thirty-seven. His legacy was the wireless transmission of radio waves: the foundation of modern radio technology. This revised treatise, published in 1900, explains his work from the very basics of radio waves to the cutting edge of wireless telegraphy.Table of Contents1. Royal Institution lecture on the work of Hertz and some of his successors; 2. Application of Hertz waves and coherer signalling to telegraphy; 3. Details of other telegraphic developments; 4. A history of the coherer principle; 5. Communications with respects to coherer phenomena on a large scale; 6. Photo-electric researches of Drs. Elster and Geitel; 7. Photo-electric researches of Professor Right; Electrical precipitation: a lecture delivered before the Institute of Physics.
£25.41
Cambridge University Press Talks about Wireless With Some Pioneering History and Some Hints and Calculations for Wireless Amateurs Cambridge Library Collection Technology
Book SynopsisIn the 1860s, radio waves were predicted by James Clerk Maxwell in his work on electromagnetism. It took a further twenty years for the first experiments to produce a working demonstration. In this guide to radio technology, first published in 1925, eminent physicist Sir Oliver Lodge (1851â1940) provides a concise history of the development of the wireless radio, explains the theory behind it, and includes some practical tips for amateurs. Having lived through and contributed to the discovery, he explains the difficulty of the early experiments, which took place in a time when terms like 'frequency' and 'inductance', now taken for granted, did not exist in the scientific vocabulary. His first-hand account reveals the incredible efforts poured into the development of a revolutionary modern technology, rekindling the sense of wonder that once surrounded this strange new science.Table of ContentsPreface; Introduction; Part I. Radio in General: 1. On broadcasting; 2. Early pioneering work in radio waves; 3. The discovery of the waves; 4. The development of radiotelegraphy; 5. Wireless achievement and anticipation; 6. Vast range of ether vibrations; 7. The transmission of wireless waves; 8. Wave peculiarities; 9. On the general theory of ether waves; 10. Earth transmission; 11. The Heaviside layer; Part II. Details that Make for Efficiency: 12. Some points about capacity and inductance; 13. Conditions for maximum inductance; 14. The importance of good contact; 15. Advantage of low resistance and stranded wire; 16. Some disadvantages of reaction; 17. Stray capacities and couplings; 18. The use of iron in transformers; 19. Contrasting methods of aerial excitation; 20. Phase difference in different kinds of coupling; 21. The grid as traffic regulator; Part III. Calculations for Amateur Constructors: 22. Comparison of the absolute magnitudes of capacity and inductance; 23. A plea for easy specification; 24. On self-induction and its maximum value; 25. Desiderata for inductance coil of receiver; 26. How to calculate the conductance of coils; 27. On the use of a simple formula for maximum inductance; 28. To estimate the capacity of an aerial; 29. Calculation of aerial capacity; 30. On the damping of vibrations by coils of wire; 31. The romance of wireless; Index.
£26.99
Cambridge University Press The Quantum Internet
Book SynopsisA highly interdisciplinary overview of the emerging topic of the Quantum Internet. Current and future quantum technologies are covered in detail, in addition to their global socio-economic impact. Written in an engaging style and accessible to graduate students in physics, engineering, computer science and mathematics.Trade Review'This book explores the technical and socioeconomic aspects of a future quantum internet … The volume will be a valuable acquisition for any institution supporting research in quantum computing or, more broadly, the emerging science and engineering of quantum information … Highly recommended.' M. C. Ogilvie, Choice ConnectTable of ContentsPart I. Introduction: 1. Foreword; 2. Introduction. Part II. Classical Networks: 3. Mathematical representation of networks; 4. Network topologies; 5. Network algorithms. Part III. Quantum Networks: 6. Quantum channels; 7. Optical encoding of quantum information; 8. Errors in quantum networks; 9. Quantum cost vector analysis; 10. Routing strategies; 11. Interconnecting and interfacing quantum networks; 12. Optical routers; 13. Optical stability in quantum networks. Part IV. Protocols for the Quantum Internet: 14. State preparation; 15. Measurement; 16. Evolution; 17. High-level protocols. Part V. Entanglement Distribution: 18. Entanglement – The ultimate quantum resource; 19. Quantum repeater networks; 20. The irrelevance of latency; 21. The quantum Sneakernet™. Part VI. Quantum Cryptography: 22. What is security?; 23. Classical cryptography; 24. Attacks on classical cryptography; 25. Bitcoin and the blockchain; 26. Quantum cryptography; 27. Attacks on quantum cryptography. Part VII. Quantum Computing: 28. Models for quantum computation; 29. Quantum algorithms. Part VIII. Cloud Quantum Computing: 30. The Quantum Cloud™; 31. Encrypted cloud quantum computation. Part IX. Economics and Politics: 32. Classical-equivalent computational power and computational scaling functions; 33. Per-qubit computational power; 34. Time-sharing; 35. Economic model assumptions; 36. Network power; 37. Network value; 38. Rate of return; 39. Market competitiveness; 40. Cost of computation; 41. Arbitrage-free time-sharing model; 42. Problem size scaling functions; 43. Quantum computational leverage; 44. Static computational return; 45. Forward contract pricing model; 46. Political leverage; 47. Economic properties of the qubit marketplace; 48. Economic implications; 49. Game theory of the qubit marketplace. Part X. Essays: 50. The era of quantum supremacy; 51. The global virtual quantum computer; 52. The economics of the quantum internet; 53. Security implications of the global quantum internet; 54. Geostrategic quantum politics; 55. The quantum ecosystem. Part XI. The End: 56. Conclusion. References. Index.
£51.99
John Wiley & Sons Inc Behavioral Modeling and Predistortion of Wideband
Book SynopsisCovers theoretical and practical aspects related to the behavioral modelling and predistortion of wireless transmitters and power amplifiers. It includes simulation software that enables the users to apply the theory presented in the book.Table of ContentsAbout the Authors xi Preface xiii Acknowledgments xv 1 Characterization of Wireless Transmitter Distortions 1 1.1 Introduction 1 1.1.1 RF Power Amplifier Nonlinearity 2 1.1.2 Inter-Modulation Distortion and Spectrum Regrowth 2 1.2 Impact of Distortions on Transmitter Performances 6 1.3 Output Power versus Input Power Characteristic 9 1.4 AM/AM and AM/PM Characteristics 10 1.5 1 dB Compression Point 12 1.6 Third and Fifth Order Intercept Points 15 1.7 Carrier to Inter-Modulation Distortion Ratio 16 1.8 Adjacent Channel Leakage Ratio 18 1.9 Error Vector Magnitude 19 References 21 2 Dynamic Nonlinear Systems 23 2.1 Classification of Nonlinear Systems 23 2.1.1 Memoryless Systems 23 2.1.2 Systems with Memory 24 2.2 Memory in Microwave Power Amplification Systems 25 2.2.1 Nonlinear Systems without Memory 25 2.2.2 Weakly Nonlinear and Quasi-Memoryless Systems 26 2.2.3 Nonlinear System with Memory 27 2.3 Baseband and Low-Pass Equivalent Signals 27 2.4 Origins and Types of Memory Effects in Power Amplification Systems 29 2.4.1 Origins of Memory Effects 29 2.4.2 Electrical Memory Effects 30 2.4.3 Thermal Memory Effects 33 2.5 Volterra Series Models 38 References 40 3 Model Performance Evaluation 43 3.1 Introduction 43 3.2 Behavioral Modeling versus Digital Predistortion 43 3.3 Time Domain Metrics 46 3.3.1 Normalized Mean Square Error 46 3.3.2 Memory Effects Modeling Ratio 47 3.4 Frequency Domain Metrics 48 3.4.1 Frequency Domain Normalized Mean Square Error 48 3.4.2 Adjacent Channel Error Power Ratio 49 3.4.3 Weighted Error Spectrum Power Ratio 50 3.4.4 Normalized Absolute Mean Spectrum Error 51 3.5 Static Nonlinearity Cancelation Techniques 52 3.5.1 Static Nonlinearity Pre-Compensation Technique 52 3.5.2 Static Nonlinearity Post-Compensation Technique 56 3.5.3 Memory Effect Intensity 59 3.6 Discussion and Conclusion 61 References 62 4 Quasi-Memoryless Behavioral Models 63 4.1 Introduction 63 4.2 Modeling and Simulation of Memoryless/Quasi-Memoryless Nonlinear Systems 63 4.3 Bandpass to Baseband Equivalent Transformation 67 4.4 Look-Up Table Models 69 4.4.1 Uniformly Indexed Loop-Up Tables 69 4.4.2 Non-Uniformly Indexed Look-Up Tables 70 4.5 Generic Nonlinear Amplifier Behavioral Model 71 4.6 Empirical Analytical Based Models 73 4.6.1 Polar Saleh Model 73 4.6.2 Cartesian Saleh Model 74 4.6.3 Frequency-Dependent Saleh Model 76 4.6.4 Ghorbani Model 76 4.6.5 Berman and Mahle Phase Model 77 4.6.6 Thomas–Weidner–Durrani Amplitude Model 77 4.6.7 Limiter Model 78 4.6.8 ARCTAN Model 79 4.6.9 Rapp Model 81 4.6.10 White Model 82 4.7 Power Series Models 82 4.7.1 Polynomial Model 82 4.7.2 Bessel Function Based Model 83 4.7.3 Chebyshev Series Based Model 84 4.7.4 Gegenbauer Polynomials Based Model 84 4.7.5 Zernike Polynomials Based Model 85 References 86 5 Memory Polynomial Based Models 89 5.1 Introduction 89 5.2 Generic Memory Polynomial Model Formulation 90 5.3 Memory Polynomial Model 91 5.4 Variants of the Memory Polynomial Model 91 5.4.1 Orthogonal Memory Polynomial Model 91 5.4.2 Sparse-Delay Memory Polynomial Model 93 5.4.3 Exponentially Shaped Memory Delay Profile Memory Polynomial Model 95 5.4.4 Non-Uniform Memory Polynomial Model 96 5.4.5 Unstructured Memory Polynomial Model 97 5.5 Envelope Memory Polynomial Model 98 5.6 Generalized Memory Polynomial Model 101 5.7 Hybrid Memory Polynomial Model 106 5.8 Dynamic Deviation Reduction Volterra Model 108 5.9 Comparison and Discussion 111 References 113 6 Box-Oriented Models 115 6.1 Introduction 115 6.2 Hammerstein and Wiener Models 115 6.2.1 Wiener Model 116 6.2.2 Hammerstein Model 117 6.3 Augmented Hammerstein and Weiner Models 118 6.3.1 Augmented Wiener Model 118 6.3.2 Augmented Hammerstein Model 119 6.4 Three-Box Wiener–Hammerstein Models 120 6.4.1 Wiener–Hammerstein Model 120 6.4.2 Hammerstein–Wiener Model 120 6.4.3 Feedforward Hammerstein Model 121 6.5 Two-Box Polynomial Models 123 6.5.1 Models’ Descriptions 123 6.5.2 Identification Procedure 124 6.6 Three-Box Polynomial Models 124 6.6.1 Parallel Three-Blocks Model: PLUME Model 124 6.6.2 Three Layered Biased Memory Polynomial Model 125 6.6.3 Rational Function Model for Amplifiers 127 6.7 Polynomial Based Model with I/Q and DC Impairments 128 6.7.1 Parallel Hammerstein (PH) Based Model for the Alleviation of Various Imperfections in Direct Conversion Transmitters 129 6.7.2 Two-Box Model with I/Q and DC Impairments 129 References 130 7 Neural Network Based Models 133 7.1 Introduction 133 7.2 Basics of Neural Networks 133 7.3 Neural Networks Architecture for Modeling of Complex Static Systems 137 7.3.1 Single-Input Single-Output Feedforward Neural Network (SISO-FFNN) 137 7.3.2 Dual-Input Dual-Output Feedforward Neural Network (DIDO-FFNN) 138 7.3.3 Dual-Input Dual-Output Coupled Cartesian Based Neural Network (DIDO-CC-NN) 139 7.4 Neural Networks Architecture for Modeling of Complex Dynamic Systems 140 7.4.1 Complex Time-Delay Recurrent Neural Network (CTDRNN) 141 7.4.2 Complex Time-Delay Neural Network (CTDNN) 142 7.4.3 Real Valued Time-Delay Recurrent Neural Network (RVTDRNN) 142 7.4.4 Real Valued Time-Delay Neural Network (RVTDNN) 144 7.5 Training Algorithms 147 7.6 Conclusion 150 References 151 8 Characterization and Identification Techniques 153 8.1 Introduction 153 8.2 Test Signals for Power Amplifier and Transmitter Characterization 155 8.2.1 Characterization Using Continuous Wave Signals 155 8.2.2 Characterization Using Two-Tone Signals 156 8.2.3 Characterization Using Multi-Tone Signals 157 8.2.4 Characterization Using Modulated Signals 158 8.2.5 Characterization Using Synthetic Modulated Signals 160 8.2.6 Discussion: Impact of Test Signal on the Measured AM/AM and AM/PM Characteristics 160 8.3 Data De-Embedding in Modulated Signal Based Characterization 163 8.4 Identification Techniques 170 8.4.1 Moving Average Techniques 170 8.4.2 Model Coefficient Extraction Techniques 172 8.5 Robustness of System Identification Algorithms 179 8.5.1 The LS Algorithm 179 8.5.2 The LMS Algorithm 179 8.5.3 The RLS Algorithm 180 8.6 Conclusions 181 References 181 9 Baseband Digital Predistortion 185 9.1 The Predistortion Concept 185 9.2 Adaptive Digital Predistortion 188 9.2.1 Closed Loop Adaptive Digital Predistorters 188 9.2.2 Open Loop Adaptive Digital Predistorters 189 9.3 The Predistorter’s Power Range in Indirect Learning Architectures 191 9.3.1 Constant Peak Power Technique 193 9.3.2 Constant Average Power Technique 193 9.3.3 Synergetic CFR and DPD Technique 194 9.4 Small Signal Gain Normalization 194 9.5 Digital Predistortion Implementations 201 9.5.1 Baseband Digital Predistortion 201 9.5.2 RF Digital Predistortion 204 9.6 The Bandwidth and Power Scalable Digital Predistortion Technique 205 9.7 Summary 206 References 207 10 Advanced Modeling and Digital Predistortion 209 10.1 Joint Quadrature Impairment and Nonlinear Distortion Compensation Using Multi-Input DPD 209 10.1.1 Modeling of Quadrature Modulator Imperfections 210 10.1.2 Dual-Input Polynomial Model for Memoryless Joint Modeling of Quadrature Imbalance and PA Distortions 211 10.1.3 Dual-Input Memory Polynomial for Joint Modeling of Quadrature Imbalance and PA Distortions Including Memory Effects 212 10.1.4 Dual-Branch Parallel Hammerstein Model for Joint Modeling of Quadrature Imbalance and PA Distortions with Memory 213 10.1.5 Dual-Conjugate-Input Memory Polynomial for Joint Modeling of Quadrature Imbalance and PA Distortions Including Memory Effects 216 10.2 Modeling and Linearization of Nonlinear MIMO Systems 216 10.2.1 Impairments in MIMO Systems 216 10.2.2 Crossover Polynomial Model for MIMO Transmitters 221 10.2.3 Dual-Input Nonlinear Polynomial Model for MIMO Transmitters 222 10.2.4 MIMO Transmitters Nonlinear Multi-Variable Polynomial Model 223 10.3 Modeling and Linearization of Dual-Band Transmitters 227 10.3.1 Generalization of the Polynomial Model to the Dual-Band Case 228 10.3.2 Two-Dimensional (2-D) Memory Polynomial Model for Dual-Band Transmitters 230 10.3.3 Phase-Aligned Multi-band Volterra DPD 231 10.4 Application of MIMO and Dual-Band Models in Digital Predistortion 235 10.4.1 Linearization of MIMO Systems with Nonlinear Crosstalk 236 10.4.2 Linearization of Concurrent Dual-Band Transmitters Using a 2-D Memory Polynomial Model 238 10.4.3 Linearization of Concurrent Tri-Band Transmitters Using 3-D Phase-Aligned Volterra Model 240 References 242 Index 247
£75.56
John Wiley & Sons Inc Wireless Communications Systems Design
Book SynopsisWireless Communications Systems Design provides the basic knowledge and methodology for wireless communications design. The book mainly focuses on a broadband wireless communication system based on OFDM/OFDMA system because it is widely used in the modern wireless communication system.Table of ContentsPreface xi List of Abbreviations xiii Part I Wireless Communications Theory 1 1 Historical Sketch of Wireless Communications 3 1.1 Advancement of Wireless Communications Technologies 3 1.2 Wireless Communications, Lifestyles, and Economics 6 References 9 2 Probability Theory 11 2.1 Random Signals 11 2.2 Spectral Density 16 2.3 Correlation Functions 18 2.4 Central Limit Theorem 25 2.5 Problems 28 Reference 30 3 Wireless Channels 31 3.1 Additive White Gaussian Noise 31 3.2 Large]Scale Path Loss Models 34 3.3 Multipath Channels 38 3.4 Empirical Wireless Channel Models 46 3.5 Problems 48 References 50 4 Optimum Receiver 51 4.1 Decision Theory 51 4.2 Optimum Receiver for AWGN 55 4.3 Matched Filter Receiver 66 4.4 Coherent and Noncoherent Detection 69 4.5 Problems 73 References 74 5 Wireless Channel Impairment Mitigation Techniques 75 5.1 Diversity Techniques 75 5.2 Error Control Coding 82 5.2.1 Linear Block Codes 84 5.2.2 Convolutional Codes 92 5.3 MIMO 99 5.4 Equalization 107 5.5 OFDM 114 5.6 Problems 120 References 121 Part II Wireless Communications Blocks Design 123 6 Error Correction Codes 125 6.1 Turbo Codes 125 6.1.1 Turbo Encoding and Decoding Algorithm 125 6.1.2 Example of Turbo Encoding and Decoding 133 6.1.3 Hardware Implementation of Turbo Encoding and Decoding 149 6.2 Turbo Product Codes 155 6.2.1 Turbo Product Encoding and Decoding Algorithm 155 6.2.2 Example of Turbo Product Encoding and Decoding 156 6.2.3 Hardware Implementation of Turbo Product Encoding and Decoding 174 6.3 Low]Density Parity Check Codes 175 6.3.1 LDPC Encoding and Decoding Algorithms 175 6.3.2 Example of LDPC Encoding and Decoding 191 6.3.3 Hardware Implementation of LDPC Encoding and Decoding 199 6.4 Problems 205 References 206 7 Orthogonal Frequency]Division Multiplexing 209 7.1 OFDM System Design 209 7.2 FFT Design 217 7.3 Hardware Implementations of FFT 232 7.4 Problems 237 References 238 8 Multiple Input Multiple Output 239 8.1 MIMO Antenna Design 239 8.2 Space Time Coding 240 8.3 Example of STTC Encoding and Decoding 254 8.4 Spatial Multiplexing and MIMO Detection Algorithms 266 8.5 Problems 276 References 277 9 Channel Estimation and Equalization 279 9.1 Channel Estimation 279 9.2 Channel Estimation for MIMO–OFDM System 293 9.3 Equalization 295 9.4 Hardware Implementation of Channel Estimation and Equalizer for OFDM System 298 9.5 Problems 298 References 299 10 Synchronization 301 10.1 Fundamental Synchronization Techniques for OFDM System 301 10.2 Synchronization Errors 305 10.3 Synchronization Techniques for OFDM System 310 10.4 Hardware Implementation of OFDM Synchronization 319 10.5 Problems 320 References 321 Part III Wireless Communications Systems Design 323 11 Radio Planning 325 11.1 Radio Planning and Link Budget Analysis 325 11.2 Traffic Engineering 335 11.3 Problems 345 References 347 12 Wireless Communications Systems Design and Considerations 349 12.1 Wireless Communications Systems Design Flow 349 12.2 Wireless Communications Systems Design Considerations 353 12.3 Hardware and Software Codesign 370 12.4 Problems 377 References 378 13 Wireless Communications Blocks Integration 379 13.1 High Level View of Wireless Communications Systems 379 13.2 4G Physical Layer Systems 383 13.2.1 LTE 384 13.2.2 WiMAX 394 13.2.3 Comparison of LTE and WiMAX 400 13.3 SoC Design for 4G Communication System 401 13.3.1 Software Design for 4G Communication System 403 13.3.2 Hardware Design for 4G Communication System 404 13.4 Problems 409 References 410 Index 411
£69.26
John Wiley & Sons Inc Radio Propagation and Adaptive Antennas for
Book SynopsisWith an emphasis on antennas and propagation, Radio Propagation and Adaptive Antennas investigates every aspect of wireless communication network design and function. The book delves into, among other applicable radio propagation topics, multipath phenomena, slow and fast fading, free-space propagation, and obstructed reflection and diffraction.Table of ContentsPreface vii Part I Fundamentals of Wireless Links and Networks 1 Wireless Communication Links with Fading 1 2 Antenna Fundamentals 34 3 Fundamentals of Wireless Networks 54 Part II Fundamentals of Radio Propagation 4 Electromagnetic Aspects of Wave Propagation over Terrain 81 5 Terrestrial Radio Communications 117 6 Indoor Radio Propagation 179 Part III Fundamentals of Adaptive Antennas 7 Adaptive Antennas for Wireless Networks 216 8 Prediction of Signal Distribution in Space, Time, and Frequency Domains in Radio Channels for Adaptive Antenna Applications 280 9 Prediction of Operational Characteristics of Adaptive Antennas 375 Part IV Practical Aspects of Terrestrial Networks Performance: Cellular and Noncellular 10 Multipath Fading Phenomena in Terrestrial Wireless Communication Links 413 11 Cellular and Noncellular Communication Networks Design Based on Radio Propagation Phenomena 494 Part V Atmospheric and Satellite Communication Links and Networks 12 Effects of the Troposphere on Radio Propagation 536 13 Ionospheric Radio Propagation 591 14 Land–Satellite Communication Links 639 Index 677
£141.26
John Wiley & Sons Inc Design Deployment and Performance of 4GLTE
Book SynopsisThis book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment.Table of ContentsAuthors’ Biographies xv Preface xvii Acknowledgments xix Abbreviations and Acronyms xxi 1 LTE Network Architecture and Protocols 1 Ayman Elnashar and Mohamed A. El-saidny 1.1 Evolution of 3GPP Standards 2 1.1.1 3GPP Release 99 3 1.1.2 3GPP Release 4 3 1.1.3 3GPP Release 5 3 1.1.4 3GPP Release 6 4 1.1.5 3GPP Release 7 4 1.1.6 3GPP Release 8 5 1.1.7 3GPP Release 9 and Beyond 5 1.2 Radio Interface Techniques in 3GPP Systems 6 1.2.1 Frequency Division Multiple Access (FDMA) 6 1.2.2 Time Division Multiple Access (TDMA) 6 1.2.3 Code Division Multiple Access (CDMA) 7 1.2.4 Orthogonal Frequency Division Multiple Access (OFDMA) 7 1.3 Radio Access Mode Operations 7 1.3.1 Frequency Division Duplex (FDD) 8 1.3.2 Time Division Duplex (TDD) 8 1.4 Spectrum Allocation in UMTS and LTE 8 1.5 LTE Network Architecture 10 1.5.1 Evolved Packet System (EPS) 10 1.5.2 Evolved Packet Core (EPC) 11 1.5.3 Evolved Universal Terrestrial Radio Access Network (E-UTRAN) 13 1.5.4 LTE User Equipment 13 1.6 EPS Interfaces 14 1.6.1 S1-MME Interface 14 1.6.2 LTE-Uu Interface 15 1.6.3 S1-U Interface 17 1.6.4 S3 Interface (SGSN-MME) 18 1.6.5 S4 (SGSN to SGW) 18 1.6.6 S5/S8 Interface 19 1.6.7 S6a (Diameter) 21 1.6.8 S6b Interface (Diameter) 21 1.6.9 S6d (Diameter) 22 1.6.10 S9 Interface (H-PCRF-VPCRF) 23 1.6.11 S10 Interface (MME-MME) 23 1.6.12 S11 Interface (MME–SGW) 23 1.6.13 S12 Interface 23 1.6.14 S13 Interface 24 1.6.15 SGs Interface 24 1.6.16 SGi Interface 25 1.6.17 Gx Interface 26 1.6.18 Gy and Gz Interfaces 27 1.6.19 DNS Interface 27 1.6.20 Gn/Gp Interface 27 1.6.21 SBc Interface 28 1.6.22 Sv Interface 28 1.7 EPS Protocols and Planes 29 1.7.1 Access and Non-Access Stratum 29 1.7.2 Control Plane 29 1.7.3 User Plane 30 1.8 EPS Procedures Overview 31 1.8.1 EPS Registration and Attach Procedures 31 1.8.2 EPS Quality of Service (QoS) 34 1.8.3 EPS Security Basics 36 1.8.4 EPS Idle and Active States 38 1.8.5 EPS Network Topology for Mobility Procedures 39 1.8.6 EPS Identifiers 44 References 44 2 LTE Air Interface and Procedures 47 Mohamed A. El-saidny 2.1 LTE Protocol Stack 47 2.2 SDU and PDU 48 2.3 LTE Radio Resource Control (RRC) 50 2.4 LTE Packet Data Convergence Protocol Layer (PDCP) 52 2.4.1 PDCP Architecture 53 2.4.2 PDCP Data and Control SDUs 53 2.4.3 PDCP Header Compression 54 2.4.4 PDCP Ciphering 54 2.4.5 PDCP In-Order Delivery 54 2.4.6 PDCP in LTE versus HSPA 55 2.5 LTE Radio Link Control (RLC) 55 2.5.1 RLC Architecture 56 2.5.2 RLC Modes 57 2.5.3 Control and Data PDUs 60 2.5.4 RLC in LTE versus HSPA 60 2.6 LTE Medium Access Control (MAC) 61 2.7 LTE Physical Layer (PHY) 61 2.7.1 HSPA(+) Channel Overview 61 2.7.2 General LTE Physical Channels 71 2.7.3 LTE Downlink Physical Channels 71 2.7.4 LTE Uplink Physical Channels 72 2.8 Channel Mapping of Protocol Layers 73 2.8.1 E-UTRAN Channel Mapping 73 2.8.2 UTRAN Channel Mapping 76 2.9 LTE Air Interface 76 2.9.1 LTE Frame Structure 76 2.9.2 LTE Frequency and Time Domains Structure 76 2.9.3 OFDM Downlink Transmission Example 80 2.9.4 Downlink Scheduling 81 2.9.5 Uplink Scheduling 88 2.9.6 LTE Hybrid Automatic Repeat Request (HARQ) 89 2.10 Data Flow Illustration Across the Protocol Layers 90 2.10.1 HSDPA Data Flow 90 2.10.2 LTE Data Flow 91 2.11 LTE Air Interface Procedures 92 2.11.1 Overview 92 2.11.2 Frequency Scan and Cell Identification 92 2.11.3 Reception of Master and System Information Blocks (MIB and SIB) 93 2.11.4 Random Access Procedures (RACH) 94 2.11.5 Attach and Registration 95 2.11.6 Downlink and Uplink Data Transfer 96 2.11.7 Connected Mode Mobility 96 2.11.8 Idle Mode Mobility and Paging 99 References 100 3 Analysis and Optimization of LTE System Performance 103 Mohamed A. El-saidny 3.1 Deployment Optimization Processes 104 3.1.1 Profiling Device and User Behavior in the Network 105 3.1.2 Network Deployment Optimization Processes 107 3.1.3 Measuring the Performance Targets 108 3.1.4 LTE Troubleshooting Guidelines 119 3.2 LTE Performance Analysis Based on Field Measurements 123 3.2.1 Performance Evaluation of Downlink Throughput 127 3.2.2 Performance Evaluation of Uplink Throughput 131 3.3 LTE Case Studies and Troubleshooting 134 3.3.1 Network Scheduler Implementations 135 3.3.2 LTE Downlink Throughput Case Study and Troubleshooting 136 3.3.3 LTE Uplink Throughput Case Studies and Troubleshooting 139 3.3.4 LTE Handover Case Studies 146 3.4 LTE Inter-RAT Cell Reselection 153 3.4.1 Introduction to Cell Reselection 155 3.4.2 LTE to WCDMA Inter-RAT Cell Reselection 155 3.4.3 WCDMA to LTE Inter-RAT Cell Reselection 160 3.5 Inter-RAT Cell Reselection Optimization Considerations 165 3.5.1 SIB-19 Planning Strategy for UTRAN to E-UTRAN Cell Reselection 165 3.5.2 SIB-6 Planning Strategy for E-UTRAN to UTRAN Cell Reselection 167 3.5.3 Inter-RAT Case Studies from Field Test 168 3.5.4 Parameter Setting Trade-off 174 3.6 LTE to LTE Inter-frequency Cell Reselection 177 3.6.1 LTE Inter-Frequency Cell Reselection Rules 177 3.6.2 LTE Inter-Frequency Optimization Considerations 177 3.7 LTE Inter-RAT and Inter-frequency Handover 180 3.7.1 Inter-RAT and Inter-Frequency Handover Rules 187 3.7.2 Inter-RAT and Inter-Frequency Handover Optimization Considerations 188 References 189 4 Performance Analysis and Optimization of LTE Key Features: C-DRX, CSFB, and MIMO 191 Mohamed A. El-saidny and Ayman Elnashar 4.1 LTE Connected Mode Discontinuous Reception (C-DRX) 192 4.1.1 Concepts of DRX for Battery Saving 193 4.1.2 Optimizing C-DRX Performance 195 4.2 Circuit Switch Fallback (CSFB) for LTE Voice Calls 204 4.2.1 CSFB to UTRAN Call Flow and Signaling 206 4.2.2 CSFB to UTRAN Features and Roadmap 216 4.2.3 Optimizing CSFB to UTRAN 231 4.3 Multiple-Input, Multiple-Output (MIMO) Techniques 252 4.3.1 Introduction to MIMO Concepts 252 4.3.2 3GPP MIMO Evolution 256 4.3.3 MIMO in LTE 258 4.3.4 Closed-Loop MIMO (TM4) versus Open-Loop MIMO (TM3) 261 4.3.5 MIMO Optimization Case Study 267 References 270 5 Deployment Strategy of LTE Network 273 Ayman Elnashar 5.1 Summary and Objective 273 5.2 LTE Network Topology 273 5.3 Core Network Domain 276 5.3.1 Policy Charging and Charging (PCC) Entities 280 5.3.2 Mobility Management Entity (MME) 283 5.3.3 Serving Gateway (SGW) 286 5.3.4 PDN Gateway (PGW) 287 5.3.5 Interworking with PDN (DHCP) 289 5.3.6 Usage of RADIUS on the Gi/SGi Interface 291 5.3.7 IPv6 EPC Transition Strategy 293 5.4 IPSec Gateway (IPSec GW) 294 5.4.1 IPSec GW Deployment Strategy and Redundancy Options 299 5.5 EPC Deployment and Evolution Strategy 300 5.6 Access Network Domain 303 5.6.1 E-UTRAN Overall Description 303 5.6.2 Home eNB 305 5.6.3 Relaying 307 5.6.4 End-to-End Routing of the eNB 308 5.6.5 Macro Sites Deployment Strategy 312 5.6.6 IBS Deployment Strategy 317 5.6.7 Passive Inter Modulation (PIM) 319 5.7 Spectrum Options and Guard Band 327 5.7.1 Guard Band Requirement 327 5.7.2 Spectrum Options for LTE 327 5.8 LTE Business Case and Financial Analysis 333 5.8.1 Key Financial KPIs [31] 334 5.9 Case Study: Inter-Operator Deployment Scenario 341 References 347 6 Coverage and Capacity Planning of 4G Networks 349 Ayman Elnashar 6.1 Summary and Objectives 349 6.2 LTE Network Planning and Rollout Phases 349 6.3 LTE System Foundation 351 6.3.1 LTE FDD Frame Structure 351 6.3.2 Slot Structure and Physical Resources 353 6.3.3 Reference Signal Structure 356 6.4 PCI and TA Planning 360 6.4.1 PCI Planning Introduction 360 6.4.2 PCI Planning Guidelines 361 6.4.3 Tracking Areas (TA) Planning 362 6.5 PRACH Planning 370 6.5.1 Zadoff-Chu Sequence 371 6.5.2 PRACH Planning Procedures 372 6.5.3 Practical PRACH Planning Scenarios 373 6.6 Coverage Planning 375 6.6.1 RSSI, RSRP, RSRQ, and SINR 375 6.6.2 The Channel Quality Indicator 378 6.6.3 Modulation and Coding Scheme and Link Adaptation 381 6.6.4 LTE Link Budget and Coverage Analysis 385 6.6.5 Comparative Analysis with HSPA+ 401 6.6.6 Link Budget for LTE Channels 405 6.6.7 RF Propagation Models and Model Tuning 409 6.7 LTE Throughput and Capacity Analysis 418 6.7.1 Served Physical Layer Throughput Calculation 418 6.7.2 Average Spectrum Efficiency Estimation 418 6.7.3 Average Sector Capacity 419 6.7.4 Capacity Dimensioning Process 419 6.7.5 Capacity Dimensioning Exercises 423 6.7.6 Calculation of VoIP Capacity in LTE 426 6.7.7 LTE Channels Planning 431 6.8 Case Study: LTE FDD versus LTE TDD 437 References 443 7 Voice Evolution in 4G Networks 445 Mahmoud R. Sherif 7.1 Voice over IP Basics 445 7.1.1 VoIP Protocol Stack 445 7.1.2 VoIP Signaling (Call Setup) 449 7.1.3 VoIP Bearer Traffic (Encoded Speech) 449 7.2 Voice Options for LTE 451 7.2.1 SRVCC and CSFB 451 7.2.2 Circuit Switched Fallback (CSFB) 452 7.3 IMS Single Radio Voice Call Continuity (SRVCC) 455 7.3.1 IMS Overview 456 7.3.2 VoLTE Call Flow and Interaction with IMS 460 7.3.3 Voice Call Continuity Overview 469 7.3.4 SRVCC from VoLTE to 3G/2G 471 7.3.5 Enhanced SRVCC (eSRVCC) 480 7.4 Key VoLTE Features 482 7.4.1 End-to-End QoS Support 482 7.4.2 Semi-Persistent Scheduler 486 7.4.3 TTI Bundling 488 7.4.4 Connected Mode DRX 491 7.4.5 Robust Header Compression (ROHC) 492 7.4.6 VoLTE Vocoders and De-Jitter Buffer 497 7.5 Deployment Considerations for VoLTE 503 References 505 8 4G Advanced Features and Roadmap Evolutions from LTE to LTE-A 507 Ayman Elnashar and Mohamed A. El-saidny 8.1 Performance Comparison between LTE’s UE Category 3 and 4 509 8.1.1 Trial Overview 512 8.1.2 Downlink Performance Comparison in Near and Far Cell Conditions 513 8.1.3 Downlink Performance Comparison in Mobility Conditions 515 8.2 Carrier Aggregation 516 8.2.1 Basic Definitions of LTE Carrier Aggregation 518 8.2.2 Band Types of LTE Carrier Aggregation 519 8.2.3 Impact of LTE Carrier Aggregation on Protocol Layers 520 8.3 Enhanced MIMO 520 8.3.1 Enhanced Downlink MIMO 522 8.3.2 Uplink MIMO 523 8.4 Heterogeneous Network (HetNet) and Small Cells 523 8.4.1 Wireless Backhauling Applicable to HetNet Deployment 524 8.4.2 Key Features for HetNet Deployment 528 8.5 Inter-Cell Interference Coordination (ICIC) 529 8.6 Coordinated Multi-Point Transmission and Reception 531 8.6.1 DL CoMP Categories 531 8.6.2 UL CoMP Categories 533 8.6.3 Performance Evaluation of CoMP 533 8.7 Self-Organizing, Self-Optimizing Networks (SON) 535 8.7.1 Automatic Neighbor Relation (ANR) 536 8.7.2 Mobility Robust Optimization (MRO) 537 8.7.3 Mobility Load Balancing (MLB) 539 8.7.4 SON Enhancements in LTE-A 540 8.8 LTE-A Relays and Home eNodeBs (HeNB) 540 8.9 UE Positioning and Location-Based Services in LTE 541 8.9.1 LBS Overview 541 8.9.2 LTE Positioning Architecture 543 References 544 Index 547
£78.26
John Wiley & Sons Inc LTE Signaling
Book SynopsisThis extensively updated second edition of LTE Signaling, Troubleshooting and Performance Measurement describes the LTE signaling protocols and procedures for the third generation of mobile communications and beyond. It is one of the few books available that explain the LTE signaling messages, procedures and measurements down to the bit & byte level, and all trace examples are taken for a real lab and field trial traces. This book covers the crucial key performance indicators (KPI) to be measured during field trials and deployment phase of new LTE networks. It describes how statistic values can be aggregated and evaluated, and how the network can be optimized during the first stages of deployment, using dedicated examples to enhance understanding. Written by experts in the field of mobile communications, this book systematically describes the most recent LTE signaling procedures, explaining how to identify and troubleshoot abnormal network behavior and common failure cTable of ContentsForeword xi Acknowledgements xiii 1 Standards, Protocols, and Functions 1 1.1 LTE Standards and Standard Roadmap 2 1.2 LTE Radio Access Network Architecture 9 1.3 Network Elements and Functions 10 1.3.1 The eNodeB (eNB) 11 1.3.2 Mobility Management Entity (MME) 12 1.3.3 Serving Gateway (S-GW) 12 1.3.4 Packet Data Network Gateway (PDN-GW) 13 1.3.5 Interfaces and Reference Points 13 1.4 Area and Subscriber Identities 18 1.4.1 Domains and Strati 18 1.4.2 IMSI 19 1.4.3 LMSI, TMSI, P-TMSI, M-TMSI, and S-TMSI 20 1.4.4 GUTI 21 1.4.5 IMEI 22 1.4.6 RNTI 22 1.4.7 Location Area, Routing Area, Service Area, Tracking Area, and Cell Global Identity 24 1.4.8 Mapping between Temporary and Area Identities for EUTRAN and UTRAN/GERAN-Based Systems 25 1.4.9 GSM Base Station Identification 27 1.4.10 UTRA Base Station Identification 28 1.4.11 Numbering, Addressing, and Identification in the Session Initiation Protocol 29 1.4.12 Access Point Name 30 1.5 User Equipment 30 1.5.1 UE Categories 31 1.6 QoS Architecture 32 1.7 LTE Security 34 1.8 Radio Interface Basics 38 1.8.1 Duplex Methods 40 1.8.2 Multiple Access Methods 42 1.8.3 OFDM Principles and Modulation 46 1.8.4 Multiple Access in OFDM–OFDMA 48 1.8.5 Resource Blocks 49 1.8.6 Downlink Slot Structure 53 1.8.7 OFDM Scheduling on LTE DL 56 1.8.8 SC-FDMA Principles and Modulation 60 1.8.9 Scheduling on LTE UL 62 1.8.10 Uplink Slot Structure 64 1.8.11 Link Adaptation in LTE 64 1.8.12 Physical Channels in LTE 70 1.8.13 Transport Channels in LTE 79 1.8.14 Channel Mapping and Multiplexing 80 1.8.15 Initial UE Radio Access 82 1.8.16 UE Random Access 82 1.9 Hybrid ARQ 87 1.9.1 Synchronous HARQ in LTE Uplink 90 1.9.2 Asynchronous HARQ in LTE Downlink 91 1.9.3 HARQ Example 92 1.10 LTE Advanced 94 1.10.1 Increasing Spectral Efficiency 95 1.10.2 Carrier Aggregation 95 1.10.3 Heterogeneous Networks 95 1.10.4 Inter-Cell Interference Coordination 97 1.11 LTE Network Protocol Architecture 98 1.11.1 Uu–Control/User Plane 98 1.11.2 S1–Control/User Plane 99 1.11.3 X2–User/Control Plane 100 1.11.4 S6a–Control Plane 100 1.11.5 S3/S4/S5/S8/S10/S11–Control Plane/User Plane 101 1.12 Protocol Functions, Encoding, Basic Messages, and Information Elements 102 1.12.1 Ethernet 102 1.12.2 Internet Protocol (IPv4/IPv6) 102 1.12.3 Stream Control Transmission Protocol (SCTP) 106 1.12.4 Radio Interface Layer 2 Protocols 108 1.12.5 Medium Access Control (MAC) Protocol 110 1.12.6 Radio Link Control (RLC) Protocol 111 1.12.7 Packet Data Convergence Protocol (PDCP) 115 1.12.8 Radio Resource Control (RRC) Protocol 117 1.12.9 Non-Access Stratum (NAS) Protocol 124 1.12.10 S1 Application Part (S1AP) 124 1.12.11 User Datagram Protocol (UDP) 128 1.12.12 GPRS Tunneling Protocol (GTP) 129 1.12.13 Transmission Control Protocol (TCP) 136 1.12.14 Session Initiation Protocol (SIP) 138 1.12.15 DIAMETER on EPC Interfaces 139 2 E-UTRAN/EPC Signaling 145 2.1 S1 Setup 145 2.1.1 S1 Setup: Message Flow 145 2.1.2 S1 Setup: Failure Analysis 147 2.2 Initial Attach 149 2.2.1 Procedure 150 2.3 UE Context Release Requested by eNodeB 166 2.3.1 Procedure 166 2.4 UE Service Request 168 2.4.1 Procedure 169 2.5 Dedicated Bearer Setup 172 2.6 Inter-eNodeB Handover over X2 174 2.6.1 Procedure 176 2.7 S1 Handover 186 2.7.1 Procedure 188 2.8 Dedicated Bearer Release 199 2.9 Detach 200 2.9.1 Procedure 200 2.10 Failure Cases in E-UTRAN and EPC 203 2.11 Voice over LTE (SIP) Call–Complete Scenario 203 2.12 Inter-RAT Cell Reselection 4G-3G-4G 210 2.13 Normal/Periodical Tracking Area Update 211 2.14 CS Fallback End-to-End S1/IuCS/IuPS 212 2.15 Paging 213 2.16 Multi-E-RAB Call Scenarios 214 2.16.1 Multi-E-RAB Call Scenarios without Subscriber Mobility 214 2.16.2 Multi-E-RAB Call with Intra-LTE Handover 215 2.16.3 Inter-RAT Mobility of a Multi-E-RAB Call Using CS Fallback 216 2.16.4 Abnormal Releases of Calls with VoLTE Services 217 3 Radio Interface Signaling Procedures 219 3.1 RRC Connection Setup, Attach, and Default Bearer Setup 220 3.1.1 Random Access and RRC Connection Setup Procedure 220 3.1.2 RRC Connection Reconfiguration and Default Bearer Setup 229 3.1.3 RRC Connection Release 238 3.2 LTE Mobility 238 3.2.1 Intra-eNB Intra-Frequency HO 242 3.2.2 Intra-eNodeB Inter-Frequency Handover 243 3.2.3 Inter-eNodeB Intra-Frequency Handover 248 3.2.4 Inter-RAT Handover to 3G 253 3.2.5 Inter-RAT Handover to 2G 255 3.2.6 Inter-RAT Blind Redirection to 3G 257 3.2.7 Inter-RAT Blind Redirection to 2G 259 3.2.8 CS Fallback 260 3.3 Failure Cases 262 4 Key Performance Indicators and Measurements for LTE Radio Network Optimization 267 4.1 Monitoring Solutions for LTE Interfaces 267 4.1.1 Monitoring the Air Interface (Uu) 267 4.1.2 Antenna-Based Monitoring 269 4.1.3 Coax-Based Monitoring 270 4.1.4 CPRI-Based Monitoring 270 4.1.5 Monitoring the E-UTRAN Line Interface 272 4.1.6 Monitoring the eNodeB Trace Port 276 4.2 Monitoring the Scheduler Efficiency 279 4.2.1 UL and DL Scheduling Resources 285 4.2.2 X2 Load Indication 286 4.2.3 The eNodeB Layer 2 Measurements 288 4.3 Radio Quality Measurements 290 4.3.1 UE Measurements 293 4.3.2 The eNodeB Physical Layer Measurements 297 4.3.3 Radio Interface Tester Measurements 301 4.3.4 I/Q Constellation Diagrams 302 4.3.5 EVM/Modulation Error Ratio 304 4.4 Control Plane Performance Counters and Delay Measurements 306 4.4.1 Network Accessibility 307 4.4.2 Network Retainability 316 4.4.3 Mobility (Handover) 318 4.5 User Plane KPIs 322 4.5.1 IP Throughput 323 4.5.2 Application Throughput 325 4.5.3 TCP Startup KPIs 327 4.5.4 TCP Round-Trip Time 328 4.5.5 Packet Jitter 329 4.5.6 Packet Delay and Packet Loss on a Hop-to-Hop Basis 330 4.6 KPI Visualization using Geographical Maps (Geolocation) 331 4.6.1 The Minimize Drive Test Feature Set of 3GPP 333 Acronyms 337 Bibliography 343 Index 345
£76.46
John Wiley & Sons Inc Opportunistic Spectrum Sharing and White Space
Book SynopsisDetails the paradigms of opportunistic spectrum sharing and white space access as effective means to satisfy increasing demand for high-speed wireless communication and for novel wireless communication applications This book addresses opportunistic spectrum sharing and white space access, being particularly mindful of practical considerations and solutions. In Part I, spectrum sharing implementation issues are considered in terms of hardware platforms and software architectures for realization of flexible and spectrally agile transceivers. Part II addresses practical mechanisms supporting spectrum sharing, including spectrum sensing for opportunistic spectrum access, machine learning and decision making capabilities, aggregation of spectrum opportunities, and spectrally-agile radio waveforms. Part III presents the ongoing work on policy and regulation for efficient and reliable spectrum sharing, including major recent steps forward in TV White Space (TTable of ContentsLIST OF CONTRIBUTORS xi INTRODUCTION xvOliver Holland, Hanna Bogucka, and Arturas Medeisis ACRONYMS xxiii PART I FLEXIBLE RADIO HARDWARE AND SOFTWARE PLATFORMS SUPPORTING SPECTRUM SHARING 1 1 The Universal Software Radio Peripheral (USRP) Family of Low-Cost SDRs 3Matt Ettus and Martin Braun 2 On the GNU Radio Ecosystem 25Thomas W. Rondeau 3 Wireless Open-Access Research Platform (WARP) for Flexible Radio 49Junaid Ansari and Petri Mähönen 4 A Dynamically Reconfigurable Software Radio Framework: Iris 81Paul Sutton 5 OpenAirInterface and ExpressMIMO2 for Spectrally Agile Communication 99Bassem Zayen, Florian Kaltenberger, and Raymond Knopp 6 CORAL Cognitive WiFi Networking System: Case Studies of Rural Applications in India 123John Sydor PART II PRACTICAL MECHANISMS SUPPORTING SPECTRUM SHARING 141 7 Cooperative Sensing of Spectrum Opportunities 143Giuseppe Caso, Luca De Nardis, Ragnar Thobaben, and Maria-Gabriella Di Benedetto 8 A Machine-Learning Approach Based on Bio-Inspired Intelligence 167Dimitrios Karvounas, Aimilia Bantouna, Andreas Georgakopoulos, Kostas Tsagkaris, Vera Stavroulaki, and Panagiotis Demestichas 9 Spectrally Agile Waveforms 191Alexander M. Wyglinski, Adrian Kliks, Pawel Kryszkiewicz, Amit P. Sail, and Hanna Bogucka 10 Aggregation of Spectrum Opportunities 221Florian Kaltenberger, Theodoros A. Tsiftsis, Fotis Foukalas, Shuyu Ping, and Oliver Holland 11 Policies for Efficient Spectrum Sharing 239Liljana Gavrilovska, Vladimir Atanasovski, and Gianmarco Baldini PARTIII REGULATORY SOLUTIONS FOR SPECTRUM SHARING 257 12 International Regulatory Framework for Spectrum and Spectrum Sharing 259Peter Anker 13 Regulations for Spectrum Sharing in the USA 277Lee Pucker 14 UK Framework for Access to TV White Spaces 313Hamid Reza Karimi 15 Spectrum Sharing Using Geo-Location Databases 339Jeffrey C. Schmidt and Peter Stanforth 16 Novel Licensing Schemes 369Oliver Holland, Arturo Basaure, and Wataru Yamada PARTIV SPECTRUM SHARING BUSINESS SCENARIOS AND ECONOMIC CONSIDERATIONS 391 17 Economic and Game Theoretic Models for Spectrum Sharing 393Hamed Ahmadi, Irene Macaluso, Zaheer Khan, Hanna Bogucka, and Luiz A. DaSilva 18 Business Benefits of Licensed Shared Access (LSA) for Key Stakeholders 407Marja Matinmikko, Hanna Okkonen, Seppo Yrjölä, Petri Ahokangas, Miia Mustonen, Marko Palola, Vânia Gonçalves, Anri Kivimäki, Esko Luttinen, and Jukka Kemppainen 19 Initial Standardization of Disruptive Innovations in Radiocommunication Technology in Consortia 425Dirk-Oliver von der Emden 20 Spectrum as a Platform: a Critical Assessment of the Value Promise of Spectrum Sharing Solutions 453Olivier Rits, Simon Delaere, and Pieter Ballon PART V SPECTRUM SHARING DEPLOYMENT SCENARIOS IN PRACTICE 479 21 TV White Spaces with Geo-Location Database Access: Practical Considerations and Trials in Europe 481Rogério Dionísio, José Ribeiro, Jorge Ribeiro, Paulo Marques, and Jonathan Rodriguez 22 Developments and Practical Field Trials of TVWS Technologies 513Kentaro Ishizu, Keiichi Mizutani, Takeshi Matsumura, Ha-Nguyen Tran, Stanislav Filin, Hirokazu Sawada, and Hiroshi Harada 23 Cognitive Wireless Regional Area Network Standard 551Apurva Mody, Gerald Chouinard, Stephen J. Shellhammer, Monisha Ghosh, and Dave Cavalcanti 24 ETSI Opportunistic Spectrum Sharing Technology for (TV) White Spaces 605Markus Dominik Mueck, Naotaka Sato, Chen Sun, Martino Freda, Pekka Ojanen, Dong Zhou, Junfeng Xiao, Rogério Pais Dionisio, and Paulo Marques 25 The IEEE Dynamic Spectrum Access Networks Standards Committee (DySPAN-SC) and IEEE 1900 Working Groups 631Oliver Holland, Hiroshi Harada, Ha-Nguyen Tran, Bernd Bochow, Masayuki Ariyoshi, Matthew Sherman, Michael Gundlach, Stanislav Filin, and Adrian Kliks 26 Spectrum to Unlash Machine-to-Machine Uptake 649Mischa Dohler and Yue Gao CONCLUSIONS AND FUTURE WORK 679Oliver Holland, Hanna Bogucka, and Arturas Medeisis INDEX 689
£125.96
John Wiley & Sons Inc Towards 5G
Book SynopsisThis book brings together a group of visionaries and technical experts from academia to industry to discuss the applications and technologies that will comprise the next set of cellular advancements (5G).Table of ContentsList of Contributors xv List of Acronyms xix About the Companion Website xxxi Part I Overview of 5G 1 1 Introduction 3 Shilpa Talwar and Rath Vannithamby 1.1 Evolution of Cellular Systems through the Generations 3 1.2 Moving Towards 5G 4 1.3 5G Networks and Devices 5 1.4 Outline of the Book 7 References 8 2 5G Requirements 9 Anass Benjebbour, Yoshihisa Kishiyama, and Takehiro Nakamura 2.1 Introduction 9 2.2 Emerging Trends in Mobile Applications and Services 10 2.3 General Requirements 15 References 21 3 Collaborative 5G Research within the EU Framework of Funded Research 23 Michael Faerber 3.1 Rationale for 5G Research and the EU’s Motivation 23 3.2 EU Research 25 References 33 4 5G: Transforming the User Wireless Experience 34 David Ott, Nageen Himayat, and Shilpa Talwar 4.1 Introduction 34 4.2 Intel’s Vision of 5G Technologies 34 4.3 Intel Strategic Research Alliance on 5G 40 4.4 ISRA 5G Technical Objectives and Goals 40 4.5 ISRA 5G Project Summaries 42 References 50 Part II Candidate Technologies – Evolutionary 53 5 Towards Green and Soft 55 Chih‐Lin I and Shuangfeng Han 5.1 Chapter Overview 55 5.2 Efforts on Green and Soft 5G Networks 56 5.3 Rethink Shannon: EE and SE Co‐design for a Green Network 57 5.4 “No More Cell” for a Green and Soft Network 67 5.5 Summary 75 Acknowledgments 76 References 76 6 Proactive Caching in 5G Small Cell Networks 78 Ejder Baştuğ, Mehdi Bennis, and Mérouane Debbah 6.1 Small Cell Networks: Past, Present and Future Trends 78 6.2 Cache‐enabled Proactive Small Cell Networks 80 6.3 System Model 81 6.4 Proactive Caching at Base Stations 82 6.5 Proactive Caching at User Terminals 85 6.6 Related Work and Research Directions 90 6.7 Conclusions 95 Acknowledgments 95 References 95 7 Modeling Multi‐Radio Coordination and Integration in Converged Heterogeneous Networks 99 Olga Galinina, Sergey Andreev, Alexander Pyattaev, Mikhail Gerasimenko, Yevgeni Koucheryavy, Nageen Himayat, Kerstin Johnsson, and Shu‐ping Yeh 7.1 Enabling Technologies for Multi‐Radio Heterogeneous Networks 99 7.2 Comprehensive Methodology for Space‐Time Network Analysis 105 7.3 Analysis of Random Dynamic HetNets 114 7.4 Quantifying Performance with System‐level Evaluations 121 7.5 Summary and Conclusions 126 Acknowledgments 126 References 126 8 Distributed Resource Allocation in 5G Cellular Networks 129 Monowar Hasan and Ekram Hossain 8.1 Introduction 129 8.2 Multi‐tier 5G Cellular: Overview and Challenges 132 8.3 System Model 135 8.4 Resource Allocation using Stable Matching 139 8.5 Message‐passing Approach for Resource Allocation 143 8.6 Auction‐based Resource Allocation 151 8.7 Qualitative Comparison of the Resource Allocation Schemes 157 8.8 Summary and Conclusion 157 References 159 Additional Reading 160 9 Device‐to‐Device Communications 162 Andreas F. Molisch, Mingyue Ji, Joongheon Kim, Daoud Burghal, and Arash Saber Tehrani 9.1 Introduction and Motivation 162 9.2 Propagation Channels 163 9.3 Neighbor Discovery and Channel Estimation 166 9.4 Mode Selection and Resource Allocation 170 9.5 Scheduling 175 9.6 Multi‐hop D2D 180 9.7 Standardization 183 9.8 Applications 184 9.9 D2D for Video 186 9.10 Conclusions 191 Acknowledgments 191 References 191 10 Energy‐efficient Wireless OFDMA Networks 199 Cong Xiong and Geoffrey Ye Li 10.1 Overview 199 10.2 Energy Efficiency and Energy‐efficient Wireless Networks 200 10.3 Energy Efficiency and Spectral Efficiency Tradeoff in OFDMA 201 10.4 Energy Efficiency, Power, and Delay Tradeoff in OFDMA 208 10.5 Energy‐efficient Resource Allocation for Downlink OFDMA 212 10.6 Energy‐efficient Resource Allocation for Uplink OFDMA 217 10.7 Concluding Remarks 219 References 220 11 Advanced Multiple‐access and MIMO Techniques 222 NOMA sections Anass Benjebbour, Anxin Li, Kazuaki Takeda, Yoshihisa Kishiyama, and Takehiro Nakamura SV‐MIMO sections Yuki Inoue, Yoshihisa Kishiyama, and Takehiro Nakamura 11.1 Introduction 222 11.2 Non‐orthogonal Multiple Access 225 11.3 Smart Vertical MIMO 238 11.4 Conclusion 247 References 248 12 M2M Communications 250 Rapeepat Ratasuk, Amitava Ghosh, and Benny Vejlgaard 12.1 Chapter Overview 250 12.2 M2M Communications 250 12.3 LTE Evolution for M2M 253 12.4 5G for M2M Communications 270 12.5 Conclusion 273 References 274 13 Low‐latency Radio‐interface Perspectives for Small‐cell 5G Networks 275 Toni Levanen, Juho Pirskanen, and Mikko Valkama 13.1 Introduction to Low‐latency Radio‐interface Design 275 13.2 Small‐cell Channel Environment Considerations and Expected Traffic 277 13.3 New Radio‐interface Design for Low‐latency 5G Wireless Access 283 13.4 Extending the 5GETLA Reference Design to Millimeter‐Wave Communications 296 13.5 Conclusions and Open Research Topics 299 Part III Candidate Technologies – Revolutionary 303 14 New Physical‐layer Waveforms for 5G 305 Gerhard Wunder, Martin Kasparick, Peter Jung, Thorsten Wild, Frank Schaich, Yejian Chen, Gerhard Fettweis, Ivan Gaspar, Nicola Michailow, Maximilian Matthé, Luciano Mendes, Dimitri Kténas, Jean‐Baptiste Doré, Vincent Berg, Nicolas Cassiau, Slawomir Pietrzyk, and Mateusz Buczkowski 14.1 Why OFDM Fails 305 14.2 Unified Frame Structure 308 14.3 Waveform Candidates and Multiple‐access Approaches 310 14.4 One‐shot Random Access 328 14.5 Conclusions 339 References 339 15 Massive MIMO Communications 342 Frederick W. Vook, Amitava Ghosh, and Timothy A. Thomas 15.1 Introduction 342 15.2 Overview of Multi‐Antenna Techniques in LTE 343 15.3 Moving to 5G Cellular with Large‐scale Antenna Arrays 345 15.4 Antenna‐array Architectures for 5G Cellular 348 15.5 Massive MIMO for Evolved LTE Systems (Below 6 GHz) 349 15.6 Massive MIMO for cmWave and mmWave Systems (Above 6 GHz) 358 15.7 Conclusion 362 References 363 16 Full‐duplex Radios 365 Dinesh Bharadia and Sachin Katti 16.1 The Problem 367 16.2 Our Design 372 16.3 Implementation 381 16.4 Evaluation 383 16.5 Discussion and Conclusion 393 References 393 17 Point to Multi‐point, In‐band mmWave Backhaul for 5G Networks 395 Rakesh Taori and Arun Sridharan 17.1 Introduction 395 17.2 Feasibility of In‐band Backhaul 397 17.3 Deployment Assumptions 400 17.4 In‐band Backhaul Design Considerations 402 17.5 TDM‐based Scheduling Scheme for In‐band Backhauling 403 17.6 Concluding Remarks 407 Acknowledgments 407 References 407 18 Application of NFV and SDN to 5G Infrastructure 408 Ashok Sunder Rajan and Kannan Babu Ramia 18.1 Chapter Overview 408 18.2 Background 408 18.3 NFV and SDN 409 18.4 Network Planning and Engineering 410 18.5 Cellular Wireless Network Infrastructure 414 18.6 Network Workloads and Capacity Factors 417 18.7 Conclusion 419 References 420 Index 421
£89.06
John Wiley & Sons Inc Mobile Positioning and Tracking
Book SynopsisThe essential guide to state-of-the art mobile positioning and tracking techniquesfully updated for new and emerging trends in the field Mobile Positioning and Tracking, Second Edition explores state-of-the-art mobile positioning solutions applied on top of current wireless communication networks. Application areas covered include positioning, data fusion and filtering, tracking, error mitigation, both conventional and cooperative positioning technologies and systems, and more. The authors fill the gap between positioning and communication systems, showing how features of wireless communications systems can be used for positioning purposes and how the retrieved location information can be used to enhance the performance of wireless networks. Unlike other books on the subject, Mobile Positioning and Tracking: From Conventional to Cooperative Techniques, 2nd Edition covers the entire positioning and tracking value chain, starting from the measurementTable of ContentsAbout the Authors xv List of Contributors xvii Preface xix Acknowledgements xxi List of Abbreviations xxiii Notations xxxi 1 Introduction 1Joaõ Figueiras, Francescantonio Della Rosa and Simone Frattasi 1.1 Application Areas of Positioning (Chapter 2) 5 1.2 Basics of Wireless Communications for Positioning (Chapter 3) 5 1.3 Fundamentals of Positioning (Chapter 4) 5 1.4 Data Fusion and Filtering Techniques (Chapter 5) 6 1.5 Fundamentals of Tracking (Chapter 6) 6 1.6 Error Mitigation Techniques (Chapter 7) 7 1.7 Positioning Systems and Technologies (Chapter 8) 7 1.8 Ultrawideband Positioning and Tracking (Chapter 9) 8 1.9 Indoor Positioning in WLAN (Chapter 10) 8 1.10 Cooperative Multi-tag Localization in RFID Systems (Chapter 11) 9 1.11 Cooperative Mobile Positioning (Chapter 12) 9 2 Application Areas of Positioning 11Simone Frattasi 2.1 Introduction 11 2.2 Localization Framework 11 2.3 Location-based Services 13 2.3.1 LBS Ecosystem 13 2.3.2 Taxonomies 15 2.3.3 Context Awareness 26 2.3.4 Privacy 29 2.4 Location-based Network Optimization 32 2.4.1 Radio Network Planning 32 2.4.2 Radio Resource Management 32 2.5 Patent Trends 35 2.6 Conclusions 39 3 Basics of Wireless Communications for Positioning 43Gilberto Berardinelli and Nicola Marchetti 3.1 Introduction 43 3.2 Radio Propagation 44 3.2.1 Path Loss 45 3.2.2 Shadowing 48 3.2.3 Small-scale Fading 49 3.2.4 Radio Propagation and Mobile Positioning 52 3.2.5 RSS-based Positioning 54 3.3 Multiple-antenna Techniques 55 3.3.1 Spatial Diversity 55 3.3.2 Spatial Multiplexing 56 3.3.3 Gains Obtained by Exploiting the Spatial Domain 57 3.3.4 MIMO and Mobile Positioning 59 3.4 Duplexing Methods 59 3.4.1 Simplex Systems 59 3.4.2 Half-duplex 59 3.4.3 Full Duplex 60 3.5 Modulation and Multiple-access Techniques 61 3.5.1 Modulation Techniques 61 3.5.2 Multiple-access Techniques 65 3.5.3 OFDMA and Mobile Positioning 67 3.6 Radio Resource Management and Mobile Positioning 67 3.6.1 Handoff, Channel Reuse and Interference Adaptation 67 3.6.2 Power Control 69 3.7 Synchronization 70 3.7.1 Centralized Synchronization 70 3.7.2 Distributed Synchronization 71 3.8 Cooperative Communications 72 3.8.1 Cooperative MIMO 73 3.8.2 Clustering 74 3.8.3 Cooperative Routing 75 3.8.4 RSS-based Cooperative Positioning 75 3.9 Cognitive Radio and Mobile Positioning 75 3.10 Conclusions 78 4 Fundamentals of Positioning 81João Figueiras 4.1 Introduction 81 4.2 Classification of Positioning Infrastructures 81 4.2.1 Positioning-system Topology 82 4.2.2 Physical Coverage Range 83 4.2.3 Integration of Positioning Solutions 84 4.3 Types of Measurements and Methods for their Estimation 85 4.3.1 Cell ID 85 4.3.2 Signal Strength 85 4.3.3 Time of Arrival 86 4.3.4 Time Difference of Arrival 87 4.3.5 Angle of Arrival 88 4.3.6 Personal-information Identification 89 4.4 Positioning Techniques 89 4.4.1 Proximity Sensing 89 4.4.2 Triangulation 91 4.4.3 Fingerprinting 95 4.4.4 Dead Reckoning 98 4.4.5 Hybrid Approaches 98 4.5 Error Sources in Positioning 100 4.5.1 Propagation 100 4.5.2 Geometry 104 4.5.3 Equipment and Technology 105 4.6 Metrics of Location Accuracy 106 4.6.1 Circular Error Probability 106 4.6.2 Dilution of Precision 106 4.6.3 Cramér–Rao Lower Bound 107 4.7 Conclusions 107 5 Data Fusion and Filtering Techniques 109João Figueiras 5.1 Introduction 109 5.2 Least-squares Methods 110 5.2.1 Linear Least Squares 111 5.2.2 Recursive Least Squares 112 5.2.3 Weighted Nonlinear Least Squares 113 5.2.4 The Absolute/Local-minimum Problem 117 5.3 Bayesian Filtering 117 5.3.1 The Kalman Filter 118 5.3.2 The Particle Filter 124 5.3.3 Grid-based Methods 126 5.4 Estimating Model Parameters and Biases in Observations 126 5.4.1 Precalibration 127 5.4.2 Joint Parameter and State Estimation 127 5.5 Alternative Approaches 128 5.5.1 Fingerprinting 128 5.5.2 Time Series Data 131 5.6 Conclusions 132 6 Fundamentals of Tracking 135João Figueiras 6.1 Introduction 135 6.2 Impact of User Mobility on Positioning 136 6.2.1 Localizing Static Devices 136 6.2.2 Added Complexity in Tracking 136 6.2.3 Additional Knowledge in Cooperative Environments 136 6.3 Mobility Models 137 6.3.1 Conventional Models 137 6.3.2 Models Based on Stochastic Processes 137 6.3.3 Geographical-restriction Models 144 6.3.4 Group Mobility Models 146 6.3.5 Social-based Models 147 6.4 Tracking Moving Devices 150 6.4.1 Mitigating Obstructions in the Propagation Conditions 150 6.4.2 Tracking Nonmaneuvering Targets 151 6.4.3 Tracking Maneuvering Targets 152 6.4.4 Learning Position and Trajectory Patterns 155 6.5 Conclusions 160 7 Error Mitigation Techniques 163Ismail Guvenc 7.1 Introduction 163 7.2 System Model 165 7.2.1 Maximum-likelihood Algorithm for LOS Scenarios 166 7.2.2 Cramér–Rao Lower Bounds for LOS Scenarios 167 7.3 NLOS Scenarios: Fundamental Limits and Maximum-likelihood Solutions 170 7.3.1 ML-based Algorithms 170 7.3.2 Cramér–Rao Lower Bound 173 7.4 Least-squares Techniques for NLOS Localization 175 7.4.1 Weighted Least Squares 175 7.4.2 Residual-weighting Algorithm 176 7.5 Constraint-based Techniques for NLOS Localization 178 7.5.1 Constrained LS Algorithm and Quadratic Programming 178 7.5.2 Linear Programming 178 7.5.3 Geometry-constrained Location Estimation 180 7.5.4 Interior-point Optimization 181 7.6 Robust Estimators for NLOS Localization 182 7.6.1 Huber M-estimator 182 7.6.2 Least Median Squares 183 7.6.3 Other Robust Estimation Options 184 7.7 Identify and Discard Techniques for NLOS Localization 184 7.7.1 Residual Test Algorithm 184 7.8 Conclusions 188 8 Positioning Systems and Technologies 189Andreas Waadt, Guido Bruck and Peter Jung 8.1 Introduction 189 8.2 Satellite Positioning 190 8.2.1 Overview 190 8.2.2 Basic Principles 191 8.2.3 Satellite Positioning Systems 194 8.2.4 Accuracy and Reliability 195 8.2.5 Drawbacks When Applied to Mobile Positioning 195 8.3 Cellular Positioning 196 8.3.1 Overview 196 8.3.2 GSM 197 8.3.3 UMTS 206 8.3.4 LTE 208 8.3.5 Emergency Applications in Cellular Networks 211 8.3.6 Drawbacks When Applied to Mobile Positioning 213 8.4 Wireless Local/Personal Area Network Positioning 213 8.4.1 Solutions on Top of Wireless Local Networks 213 8.4.2 Dedicated Solutions 217 8.5 Ad hoc Positioning 220 8.6 Hybrid Positioning 220 8.6.1 Heterogeneous Positioning 220 8.6.2 Cellular and WLAN 221 8.6.3 Assisted GPS 221 8.7 Conclusions 223 Acknowledgements 223 9 Ultra-wideband Positioning and Tracking 225Davide Dardari 9.1 Introduction 225 9.2 UWB Technology 226 9.2.1 History and Definitions 226 9.2.2 Theory 226 9.2.3 Regulations 228 9.3 The UWB Radio Channel 230 9.3.1 Path Loss 231 9.3.2 Multipath 231 9.3.3 UWB Channel Models for Positioning 232 9.4 UWB Standards 233 9.4.1 IEEE 802.15.4a Standard 233 9.4.2 IEEE 802.15.4f Standard 235 9.4.3 Other Standards 237 9.5 Time-of-arrival Measurements 237 9.5.1 Two-way Ranging 237 9.5.2 Time Difference of Arrival 238 9.5.3 Fundamental Limits in TOA Estimation 238 9.5.4 Main Issues in TOA Estimation 240 9.5.5 Clock Drift 242 9.6 Ranging Algoritms in Real Conditions 243 9.6.1 ML TOA Estimation in the Presence of a Multipath 243 9.6.2 Clock Drift Mitigation 248 9.6.3 Localization and Tracking with UWB 250 9.7 Passive UWB Localization 253 9.7.1 UWB-RFID 253 9.8 Conclusions and Perspectives 258 Acknowledgments 260 10 Indoor Positioning in WLAN 261Francescantonio Della Rosa, Mauro Pelosi and Jari Nurmi 10.1 Introduction 261 10.2 Potential and Limitations of WLAN 262 10.3 Empirical Approaches 263 10.3.1 Probe Requests and Beacon Frames 264 10.3.2 Positioning Methods 265 10.3.3 Evaluation Criteria for Indoor Positioning Systems Based on WLANs 272 10.4 Error Sources in RSS Measurements 274 10.4.1 Heterogeneous WiFi Cards 275 10.4.2 Device Orientation 277 10.4.3 Channel in the Presence of the User and Body Loss 278 10.4.4 The Hand Grip 278 10.5 Experimental Activities 279 10.6 Conclusions 281 11 Cooperative Multi-tag Localization in RFID Systems: Exploiting Multiplicity, Diversity and Polarization of Tags 283Tanveer Bhuiyan and Simone Frattasi 11.1 Introduction 283 11.2 RFID Positioning Systems 285 11.2.1 Single-tag Localization 285 11.3 Cooperative Multi-tag Localization 286 11.3.1 Multi-tagged Objects and Persons 286 11.3.2 Localization of Mobile RFID Readers: CoopAOA 290 11.3.3 Performance Evaluation 297 11.3.4 Experimental Activity for Tag Localization 309 11.4 Conclusions 314 12 Cooperative Mobile Positioning 315Simone Frattasi, Joaõ Figueiras and Francescantonio Della Rosa 12.1 Introduction 315 12.2 Cooperative Localization 316 12.2.1 Robot Networks 316 12.2.2 Wireless Sensor Networks 317 12.2.3 Wireless Mobile Networks 321 12.3 Cooperative Data Fusion and Filtering Techniques 323 12.3.1 Coop-WNLLS: Cooperative Weighted Nonlinear Least Squares 323 12.3.2 Coop-EKF: Cooperative Extended Kalman Filter 326 12.4 COMET: A Cooperative Mobile Positioning System 328 12.4.1 System Architecture 328 12.4.2 Data Fusion Methods 330 12.4.3 Performance Evaluation 337 12.5 Experimental Activity in a Cooperative WLAN Scenario 349 12.5.1 Scenario 350 12.5.2 Results 350 12.6 Conclusions 352 References 353 Index 373
£112.46
John Wiley & Sons Inc Signal Processing for 5G
Book SynopsisA comprehensive and invaluable guide to 5G technology, implementation and practice in one single volume. For all things 5G, this book is a must-read. Signal processing techniques have played the most important role in wireless communications since the second generation of cellular systems. It is anticipated that new techniques employed in 5G wireless networks will not only improve peak service rates significantly, but also enhance capacity, coverage, reliability , low-latency, efficiency, flexibility, compatibility and convergence to meet the increasing demands imposed by applications such as big data, cloud service, machine-to-machine (M2M) and mission-critical communications. This book is a comprehensive and detailed guide to all signal processing techniques employed in 5G wireless networks. Uniquely organized into four categories, New Modulation and Coding, New Spatial Processing, New Spectrum Opportunities and New System-level Enabling TechnoloTable of ContentsPreface xvii List of Contributors xxv Part I MODULATION, CODING AND WAVEFORM FOR 5G 1 An Introduction to Modulations and Waveforms for 5G Networks 3Stefano Buzzi, Alessandro Ugolini, Alessio Zappone and Giulio Colavolpe 1.1 Motivation and Background 3 1.2 New Modulation Formats: FBMC, GFDM, BFDM, UFMC and TFP 7 1.3 Waveform Choice 19 1.4 Discussion and Concluding Remarks 20 References 22 2 Faster-than-Nyquist Signaling for 5G Communication 24John B. Anderson 2.1 Introduction to FTN Signaling 25 2.2 Time FTN: Receivers and Performance 32 2.3 Frequency FTN Signaling 41 2.4 Summary of the Chapter 45 References 46 3 From OFDM to FBMC: Principles and Comparisons 47Wei Jiang and Thomas Kaiser 3.1 Introduction 47 3.2 The Filter Bank 49 3.3 Polyphase Implementation 53 3.4 OFDM 55 3.5 FBMC 61 3.6 Comparison of FBMC and Filtered OFDM 62 3.7 Conclusion 65 References 66 4 Filter Bank Multicarrier for Massive MIMO 67Arman Farhang, Nicola Marchetti and Behrouz Farhang-Boroujeny 4.1 System Model and FBMC Formulation in Massive MIMO 69 4.2 Self-equalization Property of FBMC in Massive MIMO 74 4.3 Comparison with OFDM 80 4.4 Blind Equalization and Pilot Decontamination 82 4.5 Conclusion 87 References 88 5 Bandwidth-compressed Multicarrier Communication: SEFDM 90Izzat Darwazeh, Tongyang Xu and Ryan C Grammenos 5.1 Introduction 91 5.2 SEFDM Fundamentals 93 5.3 Block-SEFDM 97 5.4 Turbo-SEFDM 102 5.5 Practical Considerations and Experimental Demonstration 106 5.6 Summary 112 References 112 6 Non-orthogonal Multi-User Superposition and Shared Access 115Yifei Yuan 6.1 Introduction 115 6.2 Basic Principles and Features of Non-orthogonal Multi-user Access 116 6.3 Downlink Non-orthogonal Multi-user Transmission 121 6.4 Uplink Non-orthogonal Multi-user Access 129 6.5 Summary and Future Work 140 References 142 7 Non-Orthogonal Multiple Access (NOMA): Concept and Design 143Anass Benjebbour, Keisuke Saito, Anxin Li, Yoshihisa Kishiyama and Takehiro Nakamura 7.1 Introduction 143 7.2 Concept 145 7.3 Benefits and Motivations 148 7.4 Interface Design 150 7.5 MIMO Support 153 7.6 Performance Evaluations 157 7.7 Conclusion 166 References 167 8 Major 5G Waveform Candidates: Overview and Comparison 169Hao Lin and Pierre Siohan 8.1 Why We Need New Waveforms 170 8.2 Major Multicarrier Modulation Candidates 171 8.3 High-level Comparison 178 8.4 Conclusion 184 List of acronyms 185 References 186 Part II NEW SPATIAL SIGNAL PROCESSING FOR 5G 9 Massive MIMO for 5G: Theory, Implementation and Prototyping 191Ove Edfors, Liang Liu, Fredrik Tufvesson, Nikhil Kundargi and Karl Nieman 9.1 Introduction 192 9.2 Massive MIMO Theory 194 9.3 Massive MIMO Channels 199 9.4 Massive MIMO Implementation 204 9.5 Testbed Design 214 9.6 Synchronization 224 9.7 Future Challenges and Conclusion 227 Acknowledgments 228 References 228 10 Millimeter-Wave MIMO Transceivers: Theory, Design and Implementation 231Akbar M. Sayeed and John H. Brady 10.1 Introduction 232 10.2 Overview of Millimeter-Wave MIMO Transceiver Architectures 235 10.3 Point-to-Point Single-User Systems 237 10.4 Point-to-Multipoint Multiuser Systems 243 10.5 Extensions 249 10.6 Conclusion 250 References 251 11 3D Propagation Channels: Modeling and Measurements 254Andreas F. Molisch 11.1 Introduction and Motivation 255 11.2 Measurement Techniques 257 11.3 Propagation Effects 260 11.4 Measurement Results 263 11.5 Channel Models 266 11.6 Summary and Open Issues 268 Acknowledgements 269 Disclaimer 269 References 269 12 3D-MIMO with Massive Antennas: Theory, Implementation and Testing 273Guangyi Liu, Xueying Hou, Fei Wang, Jing Jin and Hui Tong 12.1 Introduction 274 12.2 Application Scenarios of 3D-MIMO with Massive Antennas 276 12.3 Exploiting 3D-MIMO Gain Based on Techniques in Current Standards 277 12.4 Evaluation by System-level Simulations 283 12.5 Field Trials of 3D-MIMO with Massive Antennas 288 12.6 Achieving 3D-MIMO with Massive Antennas from Theory to Practice 292 12.7 Conclusions 294 References 295 13 Orbital Angular Momentum-based Wireless Communications: Designs and Implementations 296Alan. E. Willner, Yan Yan, Yongxiong Ren, Nisar Ahmed and Guodong Xie 13.1 EM Waves Carrying OAM 297 13.2 Application of OAM to RF Communications 298 13.3 OAM Beam Generation, Multiplexing and Detection 300 13.4 Wireless Communications Using OAM Multiplexing 303 13.5 Summary and Perspective 315 References 316 Part III NEW SPECTRUM OPPORTUNITIES FOR 5G 14 MillimeterWaves for 5G: From Theory To Practice 321Malik Gul, Eckhard Ohlmer, Ahsan Aziz, Wes McCoy and Yong Rao 14.1 Introduction 321 14.2 Building a mmWave PoC System 322 14.3 Desirable Features of a mmWave Prototyping System 323 14.4 Case Study: a mmWave Cellular PoC 326 14.5 Conclusion 352 References 353 15 *5G Millimeter-wave Communication Channel and Technology Overview 354Qian (Clara) Li, Hyejung Jung, Pingping Zong and Geng Wu 15.1 Introduction 354 15.2 Millimeter-wave Channel Characteristics 355 15.3 Requirements for a 5G mmWave Channel Model 357 15.4 Millimeter-wave Channel Model for 5G 358 15.5 Signal Processing for mmWave Band 5G RAT 365 15.6 Summary 370 References 371 16 General Principles and Basic Algorithms for Full-duplex Transmission 372Thomas Kaiser and Nidal Zarifeh 16.1 Introduction 373 16.2 Self-interference: Basic Analyses and Models 374 16.3 SIC Techniques and Algorithms 376 16.4 Hardware Impairments and Implementation Challenges 386 16.5 Looking Toward Full-duplex MIMO Systems 393 16.6 Conclusion and Outlook 396 References 397 17 Design and Implementation of Full-duplex Transceivers 402Katsuyuki Haneda, Mikko Valkama, Taneli Riihonen, Emilio Antonio-Rodriguez and Dani Korpi 17.1 Research Challenges 405 17.2 Antenna Designs 409 17.3 RF Self-interference Cancellation Methods 411 17.4 Digital Self-interference Cancellation Algorithms 413 17.5 Demonstration 423 17.6 Summary 426 Acknowledgements 426 References 426 Part IV NEW SYSTEM-LEVEL ENABLING TECHNOLOGIES FOR 5G 18 Cloud Radio Access Networks: Uplink Channel Estimation and Downlink Precoding 431Osvaldo Simeone, Jinkyu Kang, Joonkhyuk Kang and Shlomo Shamai (Shitz) 18.1 Introduction 432 18.2 Technology Background 432 18.3 Uplink: Where to Perform Channel Estimation? 434 18.4 Downlink: Where to Perform Channel Encoding and Precoding? 441 18.5 Concluding Remarks 453 References 454 19 Energy-efficient Resource Allocation in 5G with Application to D2D 456Alessio Zappone, Francesco Di Stasio, Stefano Buzzi and Eduard Jorswieck 19.1 Introduction 457 19.2 Signal Model 459 19.3 Resource Allocation 461 19.4 Fractional Programming 462 19.5 Algorithms 466 19.6 Sequential Fractional Programming 469 19.7 System Optimization 471 19.8 Numerical Results 476 19.9 Conclusion 480 References 481 20 Ultra Dense Networks: General Introduction and Design Overview 483Jianchi Zhu, Xiaoming She and Peng Chen 20.1 Introduction 484 20.2 Interference Management 487 20.3 Mobility Management 495 20.4 Architecture and Backhaul 499 20.5 Other Issues in UDNs for 5G 503 20.6 Conclusions 505 Acknowledgements 506 References 506 21 Radio-resource Management and Optimization in 5G Networks 509Antonis Gotsis, Athanasios Panagopoulos, Stelios Stefanatos and Angeliki Alexiou 21.1 Introduction 510 21.2 Background 511 21.3 Optimal Strategies for Single-antenna Coordinated Ultradense Networks 514 21.4 Optimal Strategies for Multi-antenna Coordinated and Cooperative Ultradense Networks 525 21.5 Summary and Future Research Directions 533 Acknowledgments 534 References 534 Part V REFERENCE DESIGN AND 5G STANDARD DEVELOPMENT 22 Full-duplex Radios in 5G: Fundamentals, Design and Prototyping 539Jaeweon Kim, Min Soo Sim, MinKeun Chung, Dong Ku Kim and Chan-Byoung Chae 22.1 Introduction 540 22.2 Self-interference 541 22.3 Analog Self-interference Cancellation 542 22.4 Digital Self-interference Cancellation 547 22.5 Prototyping Full-duplex Radios 550 22.6 Overall Performance Evaluation 558 22.7 Conclusion 559 References 559 23 5G Standard Development: Technology and Roadmap 561Juho Lee and Yongjun Kwak 23.1 Introduction 561 23.2 Standards Roadmap from 4G to 5G 562 23.3 Preparation of 5G Cellular Communication Standards 570 23.4 Concluding Remarks 575 References 575 Index 577
£86.36
John Wiley & Sons Inc Fog for 5G and IoT
Book SynopsisThe book examines how Fog will change the information technology industry in the next decade. Fog distributes the services of computation, communication, control and storage closer to the edge, access and users. As a computing and networking architecture, Fog enables key applications in wireless 5G, the Internet of Things, and big data.Table of ContentsContributors xi Introduction 1Bharath Balasubramanian, Mung Chiang, and Flavio Bonomi I.1 Summary of Chapters 5 I.2 Acknowledgments 7 References 8 I Communication and Management of Fog 11 1 ParaDrop: An Edge Computing Platform in Home Gateways 13Suman Banerjee, Peng Liu, Ashish Patro, and Dale Willis 1.1 Introduction 13 1.1.1 Enabling Multitenant Wireless Gateways and Applications through ParaDrop 14 1.1.2 ParaDrop Capabilities 15 1.2 Implementing Services for the ParaDrop Platform 17 1.3 Develop Services for ParaDrop 19 1.3.1 A Security Camera Service Using ParaDrop 19 1.3.2 An Environmental Sensor Service Using ParaDrop 22 References 23 2 Mind Your Own Bandwidth 24Carlee Joe-Wong, Sangtae Ha, Zhenming Liu, Felix Ming Fai Wong, and Mung Chiang 2.1 Introduction 24 2.1.1 Leveraging the Fog 25 2.1.2 A Home Solution to a Home Problem 25 2.2 Related Work 28 2.3 Credit Distribution and Optimal Spending 28 2.3.1 Credit Distribution 29 2.3.2 Optimal Credit Spending 31 2.4 An Online Bandwidth Allocation Algorithm 32 2.4.1 Estimating Other Gateways’ Spending 32 2.4.2 Online Spending Decisions and App Prioritization 34 2.5 Design and Implementation 35 2.5.1 Traffic and Device Classification 37 2.5.2 Rate Limiting Engine 37 2.5.3 Traffic Prioritization Engine 38 2.6 Experimental Results 39 2.6.1 Rate Limiting 39 2.6.2 Traffic Prioritization 41 2.7 Gateway Sharing Results 41 2.8 Concluding Remarks 45 Acknowledgments 46 Appendix 2.A 46 2.A.1 Proof of Lemma 2.1 46 2.A.2 Proof of Lemma 2.2 46 2.A.3 Proof of Proposition 2.1 47 2.A.4 Proof of Proposition 2.2 48 2.A.5 Proof of Proposition 2.3 49 2.A.6 Proof of Proposition 2.4 49 References 50 3 Socially-Aware Cooperative D2D and D4D Communications toward Fog Networking 52Xu Chen, Junshan Zhang, and Satyajayant Misra 3.1 Introduction 52 3.1.1 From Social Trust and Social Reciprocity to D2D Cooperation 54 3.1.2 Smart Grid: An IoT Case for Socially-Aware Cooperative D2D and D4D Communications 55 3.1.3 Summary of Main Results 57 3.2 Related Work 58 3.3 System Model 59 3.3.1 Physical (Communication) Graph Model 60 3.3.2 Social Graph Model 61 3.4 Socially-Aware Cooperative D2D and D4D Communications toward Fog Networking 62 3.4.1 Social Trust-Based Relay Selection 63 3.4.2 Social Reciprocity-Based Relay Selection 63 3.4.3 Social Trust and Social Reciprocity-Based Relay Selection 68 3.5 Network Assisted Relay Selection Mechanism 69 3.5.1 Reciprocal Relay Selection Cycle Finding 69 3.5.2 NARS Mechanism 70 3.5.3 Properties of NARS Mechanism 73 3.6 Simulations 75 3.6.1 Erdos–Renyi Social Graph 76 3.6.2 Real Trace Based Social Graph 78 3.7 Conclusion 82 Acknowledgments 82 References 83 4 You Deserve Better Properties (From Your Smart Devices) 86Steven Y. Ko 4.1 Why We Need to Provide Better Properties 86 4.2 Where We Need to Provide Better Properties 87 4.3 What Properties We Need to Provide and How 88 4.3.1 Transparency 88 4.3.2 Predictable Performance 93 4.3.3 Openness 99 4.4 Conclusions 102 Acknowledgment 102 References 103 II Storage and Computation in Fog 107 5 Distributed Caching for Enhancing Communications Efficiency 109A. Salman Avestimehr and Andreas F. Molisch 5.1 Introduction 109 5.2 Femtocaching 111 5.2.1 System Model 111 5.2.2 Adaptive Streaming from Helper Stations 114 5.3 User-Caching 115 5.3.1 Cluster-Based Caching and D2D Communications 115 5.3.2 IT LinQ-Based Caching and Communications 118 5.3.3 Coded Multicast 126 5.4 Conclusions and Outlook 130 References 131 6 Wireless Video Fog: Collaborative Live Streaming with Error Recovery 133Bo Zhang, Zhi Liu, and S.-H. Gary Chan 6.1 Introduction 133 6.2 Related Work 136 6.3 System Operation and Network Model 138 6.4 Problem Formulation and Complexity 140 6.4.1 NC Packet Selection Optimization 140 6.4.2 Broadcaster Selection Optimization 143 6.4.3 Complexity Analysis 144 6.5 VBCR: A Distributed Heuristic for Live Video with Cooperative Recovery 144 6.5.1 Initial Information Exchange 145 6.5.2 Cooperative Recovery 145 6.5.3 Updated Information Exchange 147 6.5.4 Video Packet Forwarding 147 6.6 Illustrative Simulation Results 150 6.7 Concluding Remarks 156 References 156 7 Elastic Mobile Device Clouds: Leveraging Mobile Devices to Provide Cloud Computing Services at the Edge 159Karim Habak, Cong Shi, Ellen W. Zegura, Khaled A. Harras, and Mostafa Ammar 7.1 Introduction 159 7.2 Design Space with Examples 161 7.2.1 Mont-Blanc 162 7.2.2 Computing while Charging 163 7.2.3 FemtoCloud 164 7.2.4 Serendipity 166 7.3 FemtoCloud Performance Evaluation 168 7.3.1 Experimental Setup 168 7.3.2 FemtoCloud Simulation Results 169 7.3.3 FemtoCloud Prototype Evaluation 173 7.4 Serendipity Performance Evaluation 175 7.4.1 Experimental Setup 175 7.4.2 Serendipity’s Performance Benefits 176 7.4.3 Impact of Network Environment 179 7.4.4 The Impact of the Job Properties 182 7.5 Challenges 186 References 186 III Applications of Fog 189 8 The Role of Fog Computing in the Future of the Automobile 191Flavio Bonomi, Stefan Poledna, and Wilfried Steiner 8.1 Introduction 191 8.2 Current Automobile Electronic Architectures 193 8.3 Future Challenges of Automotive E/E Architectures and Solution Strategies 195 8.4 Future Automobiles as Fog Nodes on Wheels 200 8.5 Deterministic FOG Nodes on Wheels Through Real-Time Computing and Time-Triggered Technologies 203 8.5.1 Deterministic Fog Node Addressing the Scalability Challenge through Virtualization 203 8.5.2 Deterministic Fog Node Addressing the Connectivity and Security Challenges 204 8.5.3 Emerging Use Case of Deterministic Fog Nodes in Automotive Applications—Vehicle-Wide Virtualization 206 8.6 Conclusion 209 References 209 9 Geographic Addressing for Field Networks 211Robert J. Hall 9.1 Introduction 211 9.1.1 Field Networking 211 9.1.2 Challenges of Field Networking 212 9.2 Geographic Addressing 214 9.3 SAGP: Wireless GA in the Field 215 9.3.1 SAGP Processing 216 9.3.2 SAGP Retransmission Heuristics 217 9.3.3 Example of SAGP Packet Propagation 218 9.3.4 Followcast: Efficient SAGP Streaming 219 9.3.5 Meeting the Challenges 220 9.4 Georouting: Extending GA to the Cloud 221 9.5 SGAF: A Multi-Tiered Architecture for Large-Scale GA 222 9.5.1 Bridging Between Tiers 223 9.5.2 Hybrid Security Architecture 225 9.6 The AT&T Labs Geocast System 225 9.7 Two GA Applications 226 9.7.1 PSCommander 226 9.7.2 Geocast Games 230 9.8 Conclusions 232 References 232 10 Distributed Online Learning and Stream Processing for a Smarter Planet 234Deepak S. Turaga and Mihaela van der Schaar 10.1 Introduction: Smarter Planet 234 10.2 Illustrative Problem: Transportation 237 10.3 Stream Processing Characteristics 238 10.4 Distributed Stream Processing Systems 239 10.4.1 State of the Art 239 10.4.2 Stream Processing Systems 240 10.5 Distributed Online Learning Frameworks 244 10.5.1 State of the Art 244 10.5.2 Systematic Framework for Online Distributed Ensemble Learning 247 10.5.3 Online Learning of the Aggregation Weights 250 10.5.4 Collision Detection Application 254 10.6 What Lies Ahead 257 Acknowledgment 258 References 258 11 Securing the Internet of Things: Need for a New Paradigm and Fog Computing 261Tao Zhang, Yi Zheng, Raymond Zheng, and Helder Antunes 11.1 Introduction 261 11.2 New IoT Security Challenges That Necessitate Fundamental Changes to the Existing Security Paradigm 263 11.2.1 Many Things Will Have Long Life Spans but Constrained and Difficult-to-Upgrade Resources 264 11.2.2 Putting All IoT Devices Inside Firewalled Castles Will Become Infeasible or Impractical 264 11.2.3 Mission-Critical Systems Will Demand Minimal-Impact Incident Responses 265 11.2.4 The Need to Know the Security Status of a Vast Number of Devices 266 11.3 A New Security Paradigm for the Internet of Things 268 11.3.1 Help the Less Capable with Fog Computing 269 11.3.2 Scale Security Monitoring to Large Number of Devices with Crowd Attestation 272 11.3.3 Dynamic Risk–Benefit-Proportional Protection with Adaptive Immune Security 277 11.4 Summary 281 Acknowledgment 281 References 281 Index 285
£93.56
John Wiley & Sons Inc Internet of Things
Book SynopsisThis book addresses researchers and graduate students at the forefront of study/research on the Internet of Things (IoT) by presenting state-of-the-art research together with the current and future challenges in building new smart applications (e.g., Smart Cities, Smart Buildings, and Industrial IoT) in an efficient, scalable, and sustainable way. It covers the main pillars of the IoT world (Connectivity, Interoperability, Discoverability, and Security/Privacy), providing a comprehensive look at the current technologies, procedures, and architectures.Table of ContentsPreface xv 1 Preliminaries, Motivation, and Related Work 1 1.1 What is the Internet of Things? 1 1.2 Wireless Ad-hoc and Sensor Networks:The Ancestors without IP 2 1.3 IoT-enabled Applications 3 1.3.1 Home and Building Automation 3 1.3.2 Smart Cities 4 1.3.3 Smart Grids 4 1.3.4 Industrial IoT 5 1.3.5 Smart Farming 7 2 Standards 9 2.1 “Traditional” Internet Review 9 2.1.1 Physical/Link Layer 10 2.1.1.1 IEEE 802.3 (Ethernet) 11 2.1.1.2 IEEE 802.11 12 2.1.2 Network Layer 14 2.1.2.1 IPv6 and IPv4 14 2.1.3 Transport Layer 17 2.1.3.1 TCP and UDP 19 2.1.4 Application Layer 21 2.1.4.1 HTTP 21 2.1.4.2 AMQP 22 2.1.4.3 SIP 23 2.2 The Internet ofThings 25 2.2.1 Designing the Architecture of an IP-based Internet of Things 26 2.2.2 Physical/Link Layer 28 2.2.2.1 IEEE 802.15.4 and ZigBee 28 2.2.2.2 Low-powerWi-Fi 30 2.2.2.3 Bluetooth and BLE 31 2.2.2.4 Powerline Communications 32 2.2.3 Network Layer 33 2.2.3.1 The 6LoWPAN Adaptation Layer 34 2.2.4 Transport Layer 34 2.2.5 Application Layer 34 2.2.5.1 CoAP 35 2.2.5.2 CoSIP Protocol Specification 60 2.3 The Industrial IoT 76 3 Interoperability 79 3.1 Applications in the IoT 79 3.2 The Verticals: Cloud-based Solutions 80 3.3 REST Architectures:TheWeb of Things 81 3.3.1 REST: TheWeb as a Platform 82 3.3.1.1 Resource-oriented Architectures 83 3.3.1.2 REST Architectures 84 3.3.1.3 Representation of Resources 84 3.3.1.4 Resource Identifiers 85 3.3.1.5 Statelessness 86 3.3.1.6 Applications as Finite-state Machines 86 3.3.1.7 Hypermedia as the Engine of Application State 86 3.3.2 Richardson MaturityModel 88 3.3.2.1 Level 0: the Swamp of POX 88 3.3.2.2 Level 1: Resources 90 3.3.2.3 Level 2: HTTP Verbs 90 3.3.2.4 Level 3: Hypermedia 95 3.3.2.5 The Meaning of the Levels 97 3.4 TheWeb of Things 97 3.5 Messaging Queues and Publish/Subscribe Communications 98 3.5.1 Advantages of the Pub/Sub Model 99 3.5.2 Disadvantages of the Pub/Sub Model 100 3.5.3 Message Queue Telemetry Transport 100 3.5.3.1 MQTT versus AMQP 101 3.6 Session Initiation for the IoT 102 3.6.1 Motivations 102 3.6.2 Lightweight Sessions in the IoT 104 3.6.2.1 A Protocol for Constrained Session Initiation 106 3.6.2.2 Session Initiation 106 3.6.2.3 Session Tear-down 108 3.6.2.4 Session Modification 108 3.7 Performance Evaluation 109 3.7.1 Implementation 109 3.7.2 Experimental Results 111 3.7.3 Conclusions 114 3.8 Optimized Communications: the Dual-network Management Protocol 115 3.8.1 DNMP Motivations 115 3.8.2 RelatedWork 117 3.8.3 The DNMP Protocol 118 3.8.4 Implementation with IEEE 802.15.4 and IEEE 802.11s 123 3.8.4.1 LPLT Networking 123 3.8.4.2 HPHT Networking 123 3.8.4.3 Node Integration 124 3.8.5 Performance Evaluation 125 3.8.5.1 Experimental Setup 125 3.8.5.2 Operational Limitations of IEEE 802.15.4 126 3.8.6 IEEE 802.15.4-controlled Selective Activation of the IEEE 802.11s Network 129 3.8.7 Conclusions 130 3.9 Discoverability in Constrained Environments 131 3.9.1 CoRE Link Format 131 3.9.1.1 CoRE Link Format: Discovery 132 3.9.1.2 Link Format 133 3.9.1.3 The Interface Description Attribute 135 3.9.2 CoRE Interfaces 135 3.9.2.1 Sensor 136 3.9.2.2 Parameter 137 3.9.2.3 Read-only Parameter 137 3.9.2.4 Actuator 137 3.10 Data Formats: Media Types for Sensor Markup Language 138 3.10.1 JSON Representations 141 3.10.1.1 Single Datapoint 141 3.10.1.2 Multiple Datapoints 142 3.10.1.3 Multiple Measurements 142 4 Discoverability 145 4.1 Service and Resource Discovery 145 4.2 Local and Large-scale Service Discovery 146 4.2.1 ZeroConf 151 4.2.2 UPnP 152 4.2.3 URI Beacons and the PhysicalWeb 152 4.3 Scalable and Self-configuring Architecture for Service Discovery in the IoT 154 4.3.1 IoT Gateway 156 4.3.1.1 Proxy Functionality 156 4.3.1.2 Service and Resource Discovery 158 4.3.2 A P2P-based Large-scale Service Discovery Architecture 159 4.3.2.1 Distributed Location Service 160 4.3.2.2 Distributed Geographic Table 161 4.3.2.3 An Architecture for Large-scale Service Discovery based on Peer-to-peer Technologies 162 4.3.3 Zeroconf-based Local Service Discovery for Constrained Environments 167 4.3.3.1 Architecture 167 4.3.3.2 Service Discovery Protocol 168 4.3.4 Implementation Results 170 4.3.4.1 Local Service Discovery 171 4.3.4.2 Large-scale Service Discovery 175 4.4 Lightweight Service Discovery in Low-power IoT Networks 178 4.4.1 Efficient Forwarding Protocol for Service Discovery 180 4.4.1.1 Multicast through Local Filtered Flooding 181 4.4.2 Efficient Multiple Unicast Forwarding 183 4.5 Implementation Results 185 5 Security and Privacy in the IoT 191 5.1 Security Issues in the IoT 192 5.2 Security Mechanisms Overview 196 5.2.1 Traditional vs Lightweight security 196 5.2.1.1 Network Layer 197 5.2.1.2 Transport Layer 199 5.2.1.3 Application Layer 201 5.2.2 Lightweight Cryptography 202 5.2.2.1 Symmetric-key LWC Algorithms 203 5.2.2.2 Public-key (Asymmetric) LWC Algorithms 206 5.2.2.3 Lightweight Cryptographic Hash Functions 210 5.2.2.4 Homomorphic Encryption Schemes 213 5.2.3 Key Agreement, Distribution, and Security Bootstrapping 214 5.2.3.1 Key Agreement Protocols 215 5.2.3.2 Shared Group-key Distribution 215 5.2.3.3 Security Bootstrapping 216 5.2.4 Processing Data in the Encrypted Domain: Secure Data Aggregation 217 5.2.5 Authorization Mechanisms for Secure IoT Services 219 5.3 Privacy Issues in the IoT 222 5.3.1 The Role of Authorization 222 5.3.2 IoT-OAS: Delegation-based Authorization for the Internet of Things 227 5.3.2.1 Architecture 227 5.3.2.2 Granting Access Tokens 229 5.3.2.3 Authorizing Requests 231 5.3.2.4 SP-to-IoT-OAS Communication: Protocol Details 231 5.3.2.5 Configuration 232 5.3.3 IoT-OAS Application Scenarios 232 5.3.3.1 Network Broker Communication 233 5.3.3.2 Gateway-based Communication 235 5.3.3.3 End-to-End CoAP Communication 235 5.3.3.4 Hybrid Gateway-based Communication 235 6 Cloud and Fog Computing for the IoT 237 6.1 Cloud Computing 237 6.2 Big Data Processing Pattern 238 6.3 Big Stream 239 6.3.1 Big-stream-oriented Architecture 243 6.3.2 Graph-based Processing 247 6.3.3 Implementation 251 6.3.3.1 Acquisition Module 251 6.3.3.2 Normalization Module 253 6.3.3.3 Graph Framework 254 6.3.3.4 Application Register Module 255 6.3.4 Performance Evaluation 257 6.3.5 Solutions and Security Considerations 262 6.4 Big Stream and Security 263 6.4.1 Graph-based Cloud System Security 266 6.4.2 Normalization after a Secure Stream Acquisition with OFS Module 268 6.4.3 Enhancing the Application Register with the IGS Module 269 6.4.4 Securing Streams inside Graph Nodes 273 6.4.5 Evaluation of a Secure Big Stream Architecture 277 6.5 Fog Computing and the IoT 281 6.6 The Role of the IoTHub 283 6.6.1 Virtualization and Replication 285 6.6.1.1 The IoT Hub 285 6.6.1.2 Operational Scenarios 287 6.6.1.3 Synchronization Protocol 290 7 The IoT in Practice 303 7.1 Hardware for the IoT 303 7.1.1 Classes of Constrained Devices 305 7.1.2 Hardware Platforms 307 7.1.2.1 TelosB 307 7.1.2.2 Zolertia Z1 307 7.1.2.3 OpenMote 310 7.1.2.4 Arduino 313 7.1.2.5 Intel Galileo 315 7.1.2.6 Raspberry Pi 318 7.2 Software for the IoT 321 7.2.1 OpenWSN 321 7.2.2 TinyOS 322 7.2.3 FreeRTOS 323 7.2.4 TI-RTOS 323 7.2.5 RIOT 324 7.2.6 Contiki OS 325 7.2.6.1 Networking 325 7.2.6.2 Low-power Operation 326 7.2.6.3 Simulation 326 7.2.6.4 Programming Model 327 7.2.6.5 Features 328 7.3 Vision and Architecture of a Testbed for theWeb of Things 328 7.3.1 An All-IP-based Infrastructure for Smart Objects 330 7.3.2 Enabling Interactions with Smart Objects through the IoT Hub 332 7.3.2.1 Integration Challenges 334 7.3.3 Testbed Access and Security 335 7.3.3.1 The Role of Authorization 335 7.3.4 Exploiting the Testbed:WoT Applications for Mobile and Wearable Devices 336 7.3.5 Open Challenges and Future Vision 338 7.4 Wearable Computing for the IoT: Interaction Patterns with Smart Objects in RESTful Environments 340 7.4.1 Shaping the Internet ofThings in a Mobile-Centric World 340 7.4.2 Interaction Patterns with Smart Objects throughWearable Devices 342 7.4.2.1 Smart Object Communication Principles 342 7.4.2.2 Interaction Patterns 343 7.4.3 Implementation in a Real-world IoT Testbed 345 7.4.3.1 Future Vision: towards the Tactile Internet 348 7.5 Effective Authorization for theWeb ofThings 349 7.5.1 Authorization Framework Architecture 353 7.5.1.1 System Operations 353 7.5.2 Implementation and Validation 357 Reference 359 Index 381
£90.86
John Wiley & Sons Inc Space Modulation Techniques
Book SynopsisExplores the fundamentals required to understand, analyze, and implement space modulation techniques (SMTs) in coherent and non-coherent radio frequency environments This book focuses on the concept of space modulation techniques (SMTs), and covers those emerging high data rate wireless communication techniques. The book discusses the advantages and disadvantages of SMTs along with their performance. A general framework for analyzing the performance of SMTs is provided and used to detail their performance over several generalized fading channels. The book also addresses the transmitter design of these techniques with the optimum number of hardware components and the use of these techniques in cooperative and mm-Wave communications. Beginning with an introduction to the subject and a brief history, Space Modulation Techniques goes on to offer chapters covering MIMO systems like spatial multiplexing and space-time coding. It then looks at channel models, such as Rayleigh, Rician, NakaTable of ContentsPreface xiii 1 Introduction 1 1.1 Wireless History 1 1.2 MIMO Promise 2 1.3 Introducing Space Modulation Techniques (SMTs) 3 1.4 Advanced SMTs 4 1.4.1 Space–Time Shift Keying (STSK) 4 1.4.2 Index Modulation (IM) 4 1.4.3 Differential SMTs 5 1.4.4 OpticalWireless SMTs 6 1.5 Book Organization 6 2 MIMO System and ChannelModels 9 2.1 MIMO System Model 9 2.2 SpatialMultiplexing MIMO Systems 11 2.3 MIMO Capacity 11 2.4 MIMO ChannelModels 13 2.4.1 Rayleigh Fading 15 2.4.2 Nakagami-n (Rician Fading) 15 2.4.3 Nakagami-m Fading 16 2.4.4 The ;;–;; MIMO Channel 17 2.4.5 The ;;–;; Distribution 20 2.4.6 The ;;–;; Distribution 23 2.5 Channel Imperfections 26 2.5.1 Spatial Correlation 26 2.5.1.1 Simulating SC Matrix 29 2.5.1.2 Effect of SC on MIMO Capacity 31 2.5.2 Mutual Coupling 31 2.5.2.1 Effect of MC on MIMO Capacity 33 2.5.3 Channel Estimation Errors 34 2.5.3.1 Impact of Channel Estimation Error on the MIMO Capacity 34 3 SpaceModulation Transmission and Reception Techniques 35 3.1 Space Shift Keying (SSK) 36 3.2 Generalized Space Shift Keying (GSSK) 39 3.3 SpatialModulation (SM) 41 3.4 Generalized SpatialModulation (GSM) 44 3.5 Quadrature Space Shift Keying (QSSK) 45 3.6 Quadrature SpatialModulation (QSM) 48 3.7 Generalized QSSK (GQSSK) 53 3.8 Generalized QSM (GQSM) 55 3.9 Advanced SMTs 55 3.9.1 Differential Space Shift Keying (DSSK) 55 3.9.2 Differential SpatialModulation (DSM) 60 3.9.3 Differential Quadrature SpatialModulation (DQSM) 60 3.9.4 Space–Time Shift Keying (STSK) 65 3.9.5 Trellis Coded-Spatial Modulation (TCSM) 66 3.10 Complexity Analysis of SMTs 69 3.10.1 Computational Complexity of the ML Decoder 69 3.10.2 Low-Complexity Sphere Decoder Receiver for SMTs 70 3.10.2.1 SMT-Rx Detector 70 3.10.2.2 SMT-Tx Detector 71 3.10.2.3 Single Spatial Symbol SMTs (SS-SMTs) 71 3.10.2.4 Double Spatial Symbols SMTs (DS-SMTs) 72 3.10.2.5 Computational Complexity 73 3.10.2.6 Error Probability Analysis and Initial Radius 74 3.11 Transmitter Power Consumption Analysis 75 3.11.1 Power Consumption Comparison 77 3.12 Hardware Cost 80 3.12.1 Hardware Cost Comparison 81 3.13 SMTs Coherent and Noncoherent Spectral Efficiencies 82 4 Average Bit Error Probability Analysis for SMTs 85 4.1 Average Error Probability over Rayleigh Fading Channels 85 4.1.1 SM and SSK with Perfect Channel Knowledge at the Receiver 85 4.1.1.1 Single Receive Antenna (Nr = 1) 86 4.1.1.2 Arbitrary Number of Receive Antennas (Nr) 88 4.1.1.3 Asymptotic Analysis 89 4.1.2 SM and SSK in the Presence of Imperfect Channel Estimation 90 4.1.2.1 Single Receive Antenna (Nr = 1) 91 4.1.2.2 Arbitrary Number of Receive Antennas (Nr) 92 4.1.2.3 Asymptotic Analysis 92 4.1.3 QSM with Perfect Channel Knowledge at the Receiver 94 4.1.4 QSM in the Presence of Imperfect Channel Estimation 96 4.2 A General Framework for SMTs Average Error Probability over Generalized Fading Channels and in the Presence of Spatial Correlation and Imperfect Channel Estimation 98 4.3 Average Error Probability Analysis of Differential SMTs 101 4.4 Comparative Average Bit Error Rate Results 103 4.4.1 SMTs, GSMTs, and QSMTs ABER Comparisons 103 4.4.2 Differential SMTs Results 107 5 Information Theoretic Treatment for SMTs 109 5.1 Evaluating the Mutual Information 110 5.1.1 Classical SpatialMultiplexing MIMO 110 5.1.2 SMTs 111 5.2 Capacity Analysis 114 5.2.1 SMX 114 5.2.2 SMTs 115 5.2.2.1 Classical SMTs Capacity Analysis 115 5.2.2.2 SMTs Capacity Analysis by Maximing over Spatial and Constellation Symbols 119 5.3 Achieving SMTs Capacity 121 5.3.1 SSK 121 5.3.2 SM 124 5.4 Information Theoretic Analysis in the Presence of Channel Estimation Errors 128 5.4.1 Evaluating the Mutual Information 128 5.4.1.1 Classical SpatialMultiplexing MIMO 128 5.4.1.2 SMTs 129 5.4.2 Capacity Analysis 131 5.4.2.1 SpatialMultiplexing MIMO 131 5.4.2.2 SMTs 134 5.4.3 Achieving SMTs Capacity 135 5.4.3.1 SSK 135 5.4.3.2 SM 136 5.5 Mutual Information Performance Comparison 138 6 Cooperative SMTs 141 6.1 Amplify and Forward (AF) Relaying 141 6.1.1 Average Error Probability Analysis 143 6.1.1.1 Asymptotic Analysis 147 6.1.1.2 Numerical Results 147 6.1.2 Opportunistic AF Relaying 149 6.1.2.1 Average Error Probability Analysis 151 6.1.2.2 Asymptotic Analysis 152 6.2 Decode and Forward (DF) Relaying 152 6.2.1 Multiple single-antenna DF relays 152 6.2.2 Single DF Relay with Multiple Antennas 153 6.2.3 Average Error Potability Analysis 154 6.2.3.1 Multiple Single-Antenna DF Relays 154 6.2.3.2 Single DF Relay with Multiple-Antennas 157 6.2.3.3 Numerical Results 157 6.3 Two-Way Relaying (2WR) SMTs 158 6.3.1 The Transmission Phase 159 6.3.2 The Relaying Phase 161 6.3.3 Average Error Probability Analysis 162 6.3.3.1 Numerical Results 165 7 SMTs for Millimeter-Wave Communications 167 7.1 Line of Sight mmWave Channel Model 168 7.1.1 Capacity Analysis 168 7.1.1.1 SM 168 7.1.1.2 QSM 169 7.1.1.3 Randomly Spaced Antennas 169 7.1.1.4 Capacity Performance Comparison 172 7.1.2 Average Bit Error Rate Results 174 7.2 Outdoor Millimeter-Wave Communications 3D Channel Model 175 7.2.1 Capacity Analysis 179 7.2.2 Average Bit Error Rate Results 182 8 Summary and Future Directions 185 8.1 Summary 185 8.2 Future Directions 187 8.2.1 SMTs with Reconfigurable Antennas (RAs) 187 8.2.2 Practical Implementation of SMTs 188 8.2.3 Index Modulation and SMTs 188 8.2.4 SMTs for OpticalWireless Communications 189 A MatlabCodes 191 A.1 Generating the Constellation Diagrams 191 A.1.1 SSK 191 A.1.2 GSSK 192 A.1.3 SM 193 A.1.4 GSM 194 A.1.5 QSSK 195 A.1.6 QSM 196 A.1.7 GQSSK 197 A.1.8 GQSM 199 A.1.9 SMTs 200 A.1.10 DSSK 202 A.1.11 DSM 203 A.1.12 DSMTs 204 A.2 Receivers 205 A.2.1 SMTs ML Receiver 205 A.2.2 DSMTs ML Receiver 206 A.3 Analytical and Simulated ABER 207 A.3.1 ABER of SM over Rayleigh Fading Channels with No CSE 207 A.3.2 ABER of SM over Rayleigh Fading Channels with CSE 209 A.3.3 ABER of QSM over Rayleigh Fading Channels with No CSE 211 A.3.4 ABER of QSM over Rayleigh Fading Channels with CSE 214 A.3.5 Analytical ABER of SMTs over Generalized Fading Channels and with CSE and SC 216 A.3.6 Simulated ABER of SMTs Using Monte Carlo Simulation over Generalized Fading Channels and with CSE and SC 222 A.3.7 Analytical ABER of DSMTs over Generalized Fading Channels 228 A.3.8 Simulated ABER of DSMTs Using Monte Carlo Simulation over Generalized Fading Channels 232 A.4 Mutual Information and Capacity 235 A.4.1 SMTs Simulated Mutual Information over Generalized Fading Channels and with CSE 235 A.4.2 SMTs Capacity 240 References 243 Index 265
£100.76
John Wiley & Sons Inc The Physics and Mathematics of Electromagnetic
Book SynopsisAn important resource that examines the physical aspects of wireless communications based on mathematical and physical evidence The Physics and Mathematics of Electromagnetic Wave Propagation in Cellular Wireless Communicationdescribes the electromagnetic principles for designing a cellular wireless system and includes the subtle electromagnetic principles that are often overlooked in designing such a system. This important text explores both the physics and mathematical concepts used in deploying antennas for transmission and reception of electromagnetic signals and examines how to select the proper methodology from a wide range of scenarios. In this much-needed guide, the authorsnoted experts in the fieldexplore the principle of electromagnetics as developed through the Maxwellian principles and describe the properties of an antenna in the frequency domain. The text also includes a review of the characterization of propagation path loss in a cellular wireless environment and examiTable of ContentsPreface xi Acknowledgments xvii 1 The Mystery of Wave Propagation and Radiation from an Antenna 1 Summary 1 1.1 Historical Overview of Maxwell’s Equations 3 1.2 Review of Maxwell–Hertz–Heaviside Equations 5 1.2.1 Faraday’s Law 5 1.2.2 Generalized Ampere’s Law 8 1.2.3 Gauss’s Law of Electrostatics 9 1.2.4 Gauss’s Law of Magnetostatics 10 1.2.5 Equation of Continuity 11 1.3 Development of Wave Equations 12 1.4 Methodologies for the Solution of the Wave Equations 16 1.5 General Solution of Maxwell’s Equations 19 1.6 Power (Correlation) Versus Reciprocity (Convolution) 24 1.7 Radiation and Reception Properties of a Point Source Antenna in Frequency and in Time Domain 28 1.7.1 Radiation of Fields from Point Sources 28 1.7.1.1 Far Field in Frequency Domain of a Point Radiator 29 1.7.1.2 Far Field in Time Domain of a Point Radiator 30 1.7.2 Reception Properties of a Point Receiver 31 1.8 Radiation and Reception Properties of Finite‐Sized Dipole‐Like Structures in Frequency and in Time 33 1.8.1 Radiation Fields from Wire‐Like Structures in the Frequency Domain 33 1.8.2 Radiation Fields from Wire‐Like Structures in the Time Domain 34 1.8.3 Induced Voltage on a Finite‐Sized Receive Wire‐Like Structure Due to a Transient Incident Field 34 1.8.4 Radiation Fields from Electrically Small Wire‐Like Structures in the Time Domain 35 1.9 An Expose on Channel Capacity 44 1.9.1 Shannon Channel Capacity 47 1.9.2 Gabor Channel Capacity 51 1.9.3 Hartley‐Nyquist‐Tuller Channel Capacity 53 1.10 Conclusion 56 References 57 2 Characterization of Radiating Elements Using Electromagnetic Principles in the Frequency Domain 61 Summary 61 2.1 Field Produced by a Hertzian Dipole 62 2.2 Concept of Near and Far Fields 65 2.3 Field Radiated by a Small Circular Loop 68 2.4 Field Produced by a Finite‐Sized Dipole 70 2.5 Radiation Field from a Finite‐Sized Dipole Antenna 72 2.6 Maximum Power Transfer and Efficiency 74 2.6.1 Maximum Power Transfer 75 2.6.2 Analysis Using Simple Circuits 77 2.6.3 Computed Results Using Realistic Antennas 81 2.6.4 Use/Misuse of the S‐Parameters 84 2.7 Radiation Efficiency of Electrically Small Versus Electrically Large Antenna 85 2.7.1 What is an Electrically Small Antenna (ESA)? 86 2.7.2 Performance of Electrically Small Antenna Versus Large Resonant Antennas 86 2.8 Challenges in Designing a Matched ESA 90 2.9 Near‐ and Far‐Field Properties of Antennas Deployed Over Earth 94 2.10 Use of Spatial Antenna Diversity 100 2.11 Performance of Antennas Operating Over Ground 104 2.12 Fields Inside a Dielectric Room and a Conducting Box 107 2.13 The Mathematics and Physics of an Antenna Array 120 2.14 Does Use of Multiple Antennas Makes Sense? 123 2.14.1 Is MIMO Really Better than SISO? 132 2.15 Signal Enhancement Methodology Through Adaptivity on Transmit Instead of MIMO 138 2.16 Conclusion 148 Appendix 2A Where Does the Far Field of an Antenna Really Starts Under Different Environments? 149 Summary 149 2A.1 Introduction 150 2A.2 Derivation of the Formula 2D2/λ 153 2A.3 Dipole Antennas Operating in Free Space 157 2A.4 Dipole Antennas Radiating Over an Imperfect Ground 162 2A.5 Epilogue 164 References 167 3 Mechanism of Wireless Propagation: Physics, Mathematics, and Realization 171 Summary 171 3.1 Introduction 172 3.2 Description and Analysis of Measured Data on Propagation Available in the Literature 173 3.3 Electromagnetic Analysis of Propagation Path Loss Using a Macro Model 184 3.4 Accurate Numerical Evaluation of the Fields Near an Earth–Air Interface 190 3.5 Use of the Numerically Accurate Macro Model for Analysis of Okumura et al.’s Measurement Data 192 3.6 Visualization of the Propagation Mechanism 199 3.7 A Note on the Conventional Propagation Models 203 3.8 Refinement of the Macro Model to Take Transmitting Antenna’s Electronic and Mechanical Tilt into Account 207 3.9 Refinement of the Data Collection Mechanism and its Interpretation Through the Definition of the Proper Route 210 3.10 Lessons Learnt: Possible Elimination of Slow Fading and a Better Way to Deploy Base Station Antennas 217 3.10.1 Experimental Measurement Setup 224 3.11 Cellular Wireless Propagation Occurs Through the Zenneck Wave and not Surface Waves 227 3.12 Conclusion 233 Appendix 3A Sommerfeld Formulation for a Vertical Electric Dipole Radiating Over an Imperfect Ground Plane 234 Appendix 3B Asymptotic Evaluation of the Integrals by the Method of Steepest Descent 247 Appendix 3C Asymptotic Evaluation of the Integrals When there Exists a Pole Near the Saddle Point 252 Appendix 3D Evaluation of Fields Near the Interface 254 Appendix 3E Properties of a Zenneck Wave 258 Appendix 3F Properties of a Surface Wave 259 References 261 4 Methodologies for Ultrawideband Distortionless Transmission/ Reception of Power and Information 265 Summary 265 4.1 Introduction 266 4.2 Transient Responses from Differently Sized Dipoles 268 4.3 A Travelling Wave Antenna 276 4.4 UWB Input Pulse Exciting a Dipole of Different Lengths 279 4.5 Time Domain Responses of Some Special Antennas 281 4.5.1 Dipole Antennas 281 4.5.2 Biconical Antennas 292 4.5.3 TEM Horn Antenna 299 4.6 Two Ultrawideband Antennas of Century Bandwidth 305 4.6.1 A Century Bandwidth Bi‐Blade Antenna 306 4.6.2 Cone‐Blade Antenna 310 4.6.3 Impulse Radiating Antenna (IRA) 313 4.7 Experimental Verification of Distortionless Transmission of Ultrawideband Signals 315 4.8 Distortionless Transmission and Reception of Ultrawideband Signals Fitting the FCC Mask 327 4.8.1 Design of a T‐pulse 329 4.8.2 Synthesis of a T‐pulse Fitting the FCC Mask 331 4.8.3 Distortionless Transmission and Reception of a UWB Pulse Fitting the FCC Mask 332 4.9 Simultaneous Transmission of Information and Power in Wireless Antennas 338 4.9.1 Introduction 338 4.9.2 Formulation and Optimization of the Various Channel Capacities 342 4.9.2.1 Optimization for the Shannon Channel Capacity 342 4.9.2.2 Optimization for the Gabor Channel Capacity 344 4.9.2.3 Optimization for the Hartley‐Nyquist‐Tuller Channel Capacity 345 4.9.3 Channel Capacity Simulation of a Frequency Selective Channel Using a Pair of Transmitting and Receiving Antennas 347 4.9.4 Optimization of Each Channel Capacity Formulation 353 4.10 Effect of Broadband Matching in Simultaneous Information and Power Transfer 355 4.10.1 Problem Description 357 4.10.1.1 Total Channel Capacity 358 4.10.1.2 Power Delivery 361 4.10.1.3 Limitation on VSWR 361 4.10.2 Design of Matching Networks 362 4.10.2.1 Simplified Real Frequency Technique (SRFT) 362 4.10.2.2 Use of Non‐Foster Matching Networks 366 4.10.3 Performance Gain When Using a Matching Network 367 4.10.3.1 Constraints of VSWR < 2 367 4.10.3.2 Constraints of VSWR < 3 369 4.10.3.3 Without VSWR Constraint 371 4.10.3.4 Discussions 372 4.10.4 PCB (Printed Circuit Board) Implementation of a Broadband‐ Matched Dipole 373 4.11 Conclusion 376 References 377 Index 383
£89.96
John Wiley & Sons Inc Internet of Things A to Z
Book SynopsisA comprehensive overview of the Internet of Things' core concepts, technologies, and applications Internet of Things A to Z offers a holistic approach to the Internet of Things (IoT) model. The Internet of Things refers to uniquely identifiable objects and their virtual representations in an Internet-like structure. Recently, there has been a rapid growth in research on IoT communications and networks, that confirms the scalability and broad reach of the core concepts. With contributions from a panel of international experts, the text offers insight into the ideas, technologies, and applications of this subject. The authors discuss recent developments in the field and the most current and emerging trends in IoT. In addition, the text is filled with examples of innovative applications and real-world case studies. Internet of Things A to Z fills the need for an up-to-date volume on the topic. This important book: Covers in great detail tTable of ContentsPreface xix Acknowledgments xxv Contributors xxvii Part I Concepts and Perspectives 1 1 Introduction to the Internet of Things 3Detlef Schoder 1.1 Introduction 3 1.2 Internet of Things Concepts 7 1.3 Who Works on the Internet of Things? 11 1.4 Internet of Things Framework 12 1.5 Information and Communication Technology Infrastructure 14 1.6 Derived Qualities of Modern ICT 31 1.7 Potential for Product, Process, and Business Model Innovations 34 1.8 Implications and Challenges 38 1.9 Conclusion 44 2 Environment, People, and Time as Factors in the Internet of Things Technical Revolution 51Jan Sliwa 2.1 Introduction 51 2.2 Technical Revolutions 52 2.3 Cyber–Physical–Social Systems 54 2.4 Environment 56 2.5 Time 58 2.6 People 63 2.7 Cybersecurity 67 2.8 Reasoning from Data 69 2.9 Adaptable Self-Organizing Systems 70 2.10 Moral Things 72 2.11 Conclusion 74 Part II Enablers 77 3 An Overview of Enabling Technologies for the Internet of Things 79Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva 3.1 Introduction 79 3.2 Overview of IoT Architecture 80 3.3 Enabling Technologies 81 3.4 IoT Platforms and Operating Systems 105 3.5 Conclusion 108 4 Cloud and Fog Computing in the Internet of Things 113Daniel Happ 4.1 Introduction 113 4.2 IoT System Requirements 114 4.3 Cloud Computing in IoT 116 4.4 Fog Computing in IoT 122 4.5 Conclusion 131 5 RFID in the Internet of Things 135Akaa Agbaeze Eteng, Sharul Kamal Abdul Rahim, and Chee Yen Leow 5.1 Introduction 135 5.2 Historical Perspective 135 5.3 RFID and the Internet of Things 137 5.4 Emergent Issues 144 5.5 Conclusion 146 6 A Tutorial Introduction to IoT Design and Prototyping with Examples 153Manuel Meruje, Musa Gwani Samaila, Virginia N. L. Franqueira, Mário Marques Freire, and Pedro Ricardo Morais Inácio 6.1 Introduction 153 6.2 Main Features of IoT Hardware Development Platforms 154 6.3 Design and Prototyping of IoT Applications 169 6.4 Projects on IoT Applications 173 6.5 Conclusion 184 7 On Standardizing the Internet of Things and Its Applications 191Kai Jakobs 7.1 Introduction 191 7.2 Current Status 193 7.3 The Standardization Environment 199 7.4 Standardization in Selected Application Areas 201 7.5 Discussion and Some Speculation 210 7.6 Conclusion 213 Part III Security Issues and Solutions 219 8 Security Mechanisms and Technologies for Constrained IoT Devices 221Marco Tiloca and Shahid Raza 8.1 Introduction 221 8.2 Security in IoT Protocols and Technologies 222 8.3 Security Issues and Solutions 234 8.4 Conclusion 247 9 Blockchain-Based Security Solutions for IoT Systems 255Göran Pulkkis, Jonny Karlsson, and Magnus Westerlund 9.1 Introduction 255 9.2 Regulatory Requirements 256 9.3 Blockchain Technology 259 9.4 Blockchains and IoT Systems 261 9.5 Examples of Blockchain-Based Security Solutions for IoT Systems 262 9.6 Challenges and Future Research 270 9.7 Conclusions 270 10 The Internet of Things and IT Auditing 275John Shu, Jason M. Rosenberg, Shambhu Upadhyaya, and Hejamadi Raghav Rao 10.1 Introduction 275 10.2 Risks Associated with IoT 276 10.3 IT Auditing 279 10.4 Use Cases of IoT in IT Auditing 286 10.5 Protecting the Business Network 287 10.6 Conclusion 289 Part IV Application Domains 293 11 The Industrial Internet of Things 295Alexander Willner 11.1 Introduction 295 11.2 Market Overview 296 11.3 Interoperability and Technologies 303 11.4 Alliances 309 11.5 Conclusions 314 12 Internet of Things Applications for Smart Cities 319Daniel Minoli and Benedict Occhiogrosso 12.1 Introduction 319 12.2 IoT Applications for Smart Cities 321 12.3 Specific Smart City Applications 330 12.4 Optimal Enablement of Video and Multimedia Capabilities in IOT 338 12.5 Key Underlying Technologies for Smart Cities IOT Applications 340 12.6 Challenges and Future Research 349 12.7 Conclusion 350 13 Smart Connected Homes 359Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson 13.1 Introduction 359 13.2 The Smart Connected Home Domain 360 13.3 Smart Connected Home Systems 364 13.4 The Smart Connected Home Technologies 367 13.5 Smart Connected Home Architectures 375 13.6 Smart Connected Home Challenges and Research Directions 376 13.7 Conclusions 381 14 The Emerging “Energy Internet of Things” 385Daniel Minoli and Benedict Occhiogrosso 14.1 Introduction 385 14.2 Power Management Trends and EIoT Support 390 14.3 Real-Life Power Management Optimization Approaches 410 14.4 Challenges and Future Directions 415 14.5 Conclusion 417 15 Implementing the Internet of Things for Renewable Energy 425Lucas Finco and Daniel Minoli 15.1 Introduction 425 15.2 Managing the Impact of Sustainable Energy 426 15.3 EIoT Deployment 432 15.4 Industry Standards for EIoT 439 15.5 Security Considerations in EIoT and Clean Energy Environments 441 15.6 Conclusion 442 16 The Internet of Things and People in Health Care 447Nancy L. Russo and Jeanette Eriksson 16.1 Introduction 447 16.2 The Smart Health Care Ecosystem 448 16.3 Dimensions of Internet of Things Applications in Health Care 453 16.4 Examples of IoT-Related Health Care Applications and Their Dimensions 458 16.5 Challenges 469 16.6 Conclusion 471 17 Internet of Things in Smart Ambulance and Emergency Medicine 475Bernard Fong, A. C. M. Fong, and C. K. Li 17.1 Introduction 475 17.2 IoT in Emergency Medicine 477 17.3 Integration and Compatibility 486 17.4 Case Study: Chronic Obstructive Pulmonary Disease 492 17.5 Smart Ambulance Challenges 498 17.6 Conclusions 500 18 Internet of Things Applications for Agriculture 507Lei Zhang, Ibibia K. Dabipi, and Willie L. Brown Jr. 18.1 Introduction 507 18.2 Internet of Things-Based Precision Agriculture 510 18.3 IoT Application in Agriculture Irrigation 512 18.4 IoT Application in Agriculture Fertilization 516 18.5 IoT Application in Crop Disease and Pest Management 518 18.6 IoT Application in Precision Livestock Farming 519 18.7 Conclusion 522 19 The Internet of Flying Things 529Daniel Fernando Pigatto, Mariana Rodrigues, João Vitor de Carvalho Fontes, Alex Sandro Roschildt Pinto, James Smith, and Kalinka Regina Lucas Jaquie Castelo Branco 19.1 Introduction 529 19.2 Flying Things 530 19.3 The Internet of Flying Things 533 19.4 Challenges 542 19.5 Case Studies 549 19.6 Conclusions 557 Part V Relevant Sample Applications 563 20 An Internet of Things Approach to “Read” the Emotion of Children with Autism Spectrum Disorder 565Tiffany Y. Tang and Pinata Winoto 20.1 Introduction 565 20.2 Background 567 20.3 Related Work 568 20.4 The Internet of Things Environment for Emotion Recognition 571 20.5 The Study and Discussions 580 20.6 Conclusions 586 21 A Low-Cost IoT Framework for Landslide Prediction and Risk Communication 593Pratik Chaturvedi, Kamal Kishore Thakur, Naresh Mali, Venkata Uday Kala, Sudhakar Kumar, Srishti Yadav, and Varun Dutt 21.1 Introduction 593 21.2 Background 594 21.3 System Design and Implementation 595 21.4 Testing the IoT Framework 596 21.5 Results 603 21.6 Conclusions 605 Glossary 611 Author’s Biography 625 Index 645
£108.86
John Wiley & Sons Inc UltraDense Networks for 5G and Beyond
Book SynopsisOffers comprehensive insight into the theory, models, and techniques of ultra-dense networks and applications in 5G and other emerging wireless networks The need for speedand powerin wireless communications is growing exponentially. Data rates are projected to increase by a factor of ten every five yearsand with the emerging Internet of Things (IoT) predicted to wirelessly connect trillions of devices across the globe, future mobile networks (5G) will grind to a halt unless more capacity is created. This book presents new research related to the theory and practice of all aspects of ultra-dense networks, covering recent advances in ultra-dense networks for 5G networks and beyond, including cognitive radio networks, massive multiple-input multiple-output (MIMO), device-to-device (D2D) communications, millimeter-wave communications, and energy harvesting communications. Clear and concise throughout, Ultra-Dense Networks for 5G and Beyond - Modelling, Analysis, Table of ContentsList of Contributors xi Preface xv Part I Fundamentals of Ultra-dense Networks 1 1 Fundamental Limits of Ultra-dense Networks 3Marios Kountouris and Van Minh Nguyen 1.1 Introduction 3 1.2 System Model 6 1.2.1 Network Topology 6 1.2.2 Wireless Propagation Model 6 1.2.3 User Association 8 1.2.4 Performance Metrics 8 1.3 The Quest for Exact Analytical Expressions 9 1.3.1 Coverage Probability 10 1.3.2 The Effect of LOS Fading 16 1.3.3 The Effect of BS Height 19 1.4 The Quest for Scaling Laws 25 1.4.1 User Performance 26 1.4.2 Network Performance 33 1.4.3 Network Ordering and Design Guidelines 35 1.5 Conclusions and Future Challenges 36 Bibliography 37 2 Performance Analysis of Dense Small Cell Networks with Line of Sight and Non-Line of Sight Transmissions under Rician Fading 41Amir Hossein Jafari,Ming Ding and David López-Pérez 2.1 Introduction 41 2.2 System Model 42 2.2.1 BS Distribution 42 2.2.2 User Distribution 42 2.2.3 Path Loss 43 2.2.4 User Association Strategy (UAS) 44 2.2.5 Antenna Radiation Pattern 44 2.2.6 Multi-path Fading 44 2.3 Coverage Probability Analysis Based on the Piecewise Path Loss Model 44 2.4 Study of a 3GPP Special Case 46 2.4.1 The Computation of T1L 47 2.4.2 The Computation of T1NL 48 2.4.3 The Computation of T2 L 51 2.4.4 The Computation of T2 NL 51 2.4.5 The Results of pcov(𝜆, 𝛾) and AASE(𝜆, 𝛾0) 52 2.5 Simulation and Discussion 52 2.5.1 Validation of the Analytical Results of pcov(𝜆, 𝛾) for the 3GPP Case 52 2.5.2 Discussion on the Analytical Results of AASE(𝜆, 𝛾0) for the 3GPP Case 54 2.6 Conclusion 55 Appendix A: Proof ofTheorem 1.1 55 Appendix B: Proof of Lemma 2.2 60 Appendix C: Proof of Lemma 2.3 61 Appendix D: Proof of Lemma 2.4 62 Bibliography 62 3 Mean Field Games for 5G Ultra-dense Networks: A Resource Management Perspective 65Mbazingwa E.Mkiramweni, Chungang Yang and Zhu Han 3.1 Introduction 65 3.2 Literature Review 67 3.2.1 5G Ultra-dense Networks 67 3.2.2 Resource Management Challenges in 5G 71 3.2.3 Game Theory for Resource Management in 5G 71 3.3 Basics of Mean field game 71 3.3.1 Background 72 3.3.2 Mean Field Games 73 3.4 MFGs for D2D Communications in 5G 76 3.4.1 Applications of MFGs in 5G Ultra-dense D2D Networks 76 3.4.2 An Example of MFGs for Interference Management in UDN 77 3.5 MFGs for Radio Access Network in 5G 78 3.5.1 Application of MFGs for Radio Access Network in 5G 79 3.5.2 Energy Harvesting 81 3.5.3 An Example of MFGs for Radio Access Network in 5G 81 3.6 MFGs in 5G Edge Computing 84 3.6.1 MFG Applications in Edge Cloud Communication 85 3.7 Conclusion 85 Bibliography 85 Part II Ultra-dense Networks with Emerging 5G Technologies 91 4 Inband Full-duplex Self-backhauling in Ultra-dense Networks 93Dani Korpi, Taneli Riihonen and Mikko Valkama 4.1 Introduction 93 4.2 Self-backhauling in Existing Literature 94 4.3 Self-backhauling Strategies 95 4.3.1 Half-duplex Base Station without Access Nodes 97 4.3.2 Half-duplex Base Station with Half-duplex Access Nodes 97 4.3.3 Full-Duplex Base Station with Half-Duplex Access Nodes 98 4.3.4 Half-duplex Base Station with Full-duplex Access Nodes 99 4.4 Transmit Power Optimization under QoS Requirements 99 4.5 Performance Analysis 101 4.5.1 Simulation Setup 101 4.5.2 Numerical Results 103 4.6 Summary 109 Bibliography 110 5 The Role of Massive MIMO and Small Cells in Ultra-dense Networks 113Qi Zhang, Howard H. Yang and Tony Q. S. Quek 5.1 Introduction 113 5.2 System Model 115 5.2.1 Network Topology 115 5.2.2 Propagation Environment 116 5.2.3 User Association Policy 117 5.3 Average Downlink Rate 117 5.3.1 Association Probabilities 117 5.3.2 Uplink Training 119 5.3.3 Downlink Data Transmission 120 5.3.4 Approximation of Average Downlink Rate 121 5.4 Numerical Results 123 5.4.1 Validation of Analytical Results 123 5.4.2 Comparison between Massive MIMO and Small Cells 124 5.4.3 Optimal Network Configuration 126 5.5 Conclusion 127 Appendix 128 A.1 Proof of Theorem 5.1 128 A.2 Proof of Corollary 5.1 129 A.3 Proof of Theorem 5.2 129 A.4 Proof of Theorem 5.3 130 A.5 Proof of Proposition 5.1 130 A.6 Proof of Proposition 5.2 130 Bibliography 131 6 Security for Cell-free Massive MIMO Networks 135Tiep M. Hoang, Hien Quoc Ngo, Trung Q. Duong and Hoang D. Tuan 6.1 Introduction 135 6.2 Cell-free Massive MIMO System Model 136 6.3 Cell-free System Model in the presence of an active eavesdropper 139 6.4 On Dealing with Eavesdropper 143 6.4.1 Case 1: Power Coefficients Are Different 143 6.4.2 Case 2: Power Coefficients Are the Same 145 6.5 Numerical Results 146 6.6 Conclusion 148 Appendix 149 Bibliography 150 7 Massive MIMO for High-performance Ultra-dense Networks in the Unlicensed Spectrum 151Adrian Garcia-Rodriguez, Giovanni Geraci, Lorenzo Galati-Giordano and David López-Pérez 7.1 Introduction 151 7.2 System Model 152 7.3 Fundamentals of Massive MIMO Unlicensed (mMIMO-U) 154 7.3.1 Channel Covariance Estimation 154 7.3.2 Enhanced Listen Before Talk (eLBT) 155 7.3.3 Neighboring-Node-Aware Scheduling 157 7.3.4 Acquisition of Channel State Information 159 7.3.5 Beamforming with Radiation Nulls 160 7.4 Performance Evaluation 160 7.4.1 Outdoor Deployments 160 7.4.1.1 Cellular/Wi-Fi Coexistence 161 7.4.1.2 Achievable Cellular Data Rates 162 7.4.2 Indoor Deployments 165 7.4.2.1 Channel Access Success Rate 166 7.4.2.2 Downlink User SINR 166 7.4.2.3 Downlink Sum Throughput 169 7.5 Challenges 170 7.5.1 Wi-Fi Channel Subspace Estimation 170 7.5.2 Uplink Transmission 170 7.5.3 Hidden Terminals 171 7.6 Conclusion 172 Bibliography 172 8 Energy Efficiency Optimization for Dense Networks 175Quang-Doanh Vu, Markku Juntti, Een-Kee Hong and Le-Nam Tran 8.1 Introduction 175 8.2 Energy Efficiency Optimization Tools 176 8.2.1 Fractional Programming 176 8.2.2 Concave Fractional Programs 177 8.2.2.1 Parameterized Approach 177 8.2.2.2 Parameter-free Approach 178 8.2.3 Max–Min Fractional Programs 179 8.2.4 Generalized Non-convex Fractional Programs 179 8.2.5 Alternating Direction Method of Multipliers for Distributed Implementation 180 8.3 Energy Efficiency Optimization for Dense Networks: Case Studies 181 8.3.1 Multiple Radio Access Technologies 181 8.3.1.1 System Model and Energy Efficiency Maximization Problem 182 8.3.1.2 Solution via Parameterized Approach 184 8.3.1.3 Solution via Parameter-free Approach 184 8.3.1.4 Distributed Implementation 185 8.3.1.5 Numerical Examples 189 8.3.2 Dense Small Cell Networks 191 8.3.2.1 System Model 191 8.3.2.2 Centralized Solution via Successive Convex Approximation 193 8.3.2.3 Distributed Implementation 195 8.3.2.4 Numerical Examples 198 8.4 Conclusion 200 Bibliography 200 Part III Applications of Ultra-dense Networks 203 9 Big Data Methods for Ultra-dense Network Deployment 205Weisi Guo,Maria Liakata, GuillemMosquera,Weijie Qi, Jie Deng and Jie Zhang 9.1 Introduction 205 9.1.1 The Economic Case for Big Data in UDNs 205 9.1.2 Chapter Organization 207 9.2 Structured Data Analytics for Traffic Hotspot Characterization 207 9.2.1 Social Media Mapping of Hotspots 207 9.2.2 Community and Cluster Detection 211 9.2.3 Machine Learning for Clustering in Heterogeneous UDNs 213 9.3 Unstructured Data Analytics for Quality-of-Experience Mapping 219 9.3.1 Topic Identification 220 9.3.2 Sentiment 221 9.3.3 Data-Aware Wireless Network (DAWN) 222 9.4 Conclusion 226 Bibliography 227 10 Physical Layer Security for Ultra-dense Networks under Unreliable Backhaul Connection 231Huy T. Nguyen, Nam-Phong Nguyen, Trung Q. Duong andWon-Joo Hwang 10.1 Backhaul Reliability Level and Performance Limitation 232 10.1.1 Outage Probability Analysis under Backhaul Reliability Impacts 233 10.1.2 Performance Limitation 234 10.1.3 Numerical Results 234 10.2 Unreliable Backhaul Impacts with Physical Layer Security 235 10.2.1 The Two-Phase Transmitter/Relay Selection Scheme 237 10.2.2 Secrecy Outage Probability with Backhaul Reliability Impact 240 10.2.3 Secrecy Performance Limitation under Backhaul Reliability Impact 240 10.2.4 Numerical Results 241 Appendix A 242 Appendix B 243 Appendix C 244 Bibliography 245 11 SimultaneousWireless Information and Power Transfer in UDNs with Caching Architecture 247Sumit Gautam, Thang X. Vu, Symeon Chatzinotas and Björn Ottersten 11.1 Introduction 247 11.2 System Model 249 11.2.1 Signal Model 250 11.2.2 Caching Model 251 11.2.3 Power Assumption at the Relay 252 11.3 Maximization of the serving information rate 252 11.3.1 Optimization of TS Factors and the Relay Transmit Power 253 11.3.2 Relay Selection 255 11.4 Maximization of the Energy Stored at the Relay 255 11.4.1 Optimization of TS Factors and the Relay Transmit Power 256 11.4.2 Relay Selection 259 11.5 Numerical Results 260 11.6 Conclusion 263 Acknowledgment 265 Bibliography 265 12 Cooperative Video Streaming in Ultra-dense Networks with D2D Caching 267Nguyen-Son Vo and Trung Q. Duong 12.1 Introduction 267 12.2 5G Network with Dense D2D Caching for Video Streaming 268 12.2.1 System Model and Assumptions 269 12.2.2 Cooperative Transmission Strategy 270 12.2.3 Source Video Packetization Model 271 12.3 Problem Formulation and Solution 273 12.3.1 System Parameters Formulation 273 12.3.1.1 Average Reconstructed Distortion 273 12.3.1.2 Energy Consumption Guarantee 274 12.3.1.3 Co-channel Interference Guarantee 275 12.3.2 RDO Problem 275 12.3.3 GAs Solution 276 12.4 Performance Evaluation 276 12.4.1 D2D Caching 276 12.4.2 RDO 277 12.4.2.1 Simulation Setup 277 12.4.2.2 Performance Metrics 280 12.4.2.3 Discussions 285 12.5 Conclusion 285 Bibliography 285 Index 289
£101.66