WAP (wireless) technology Books

243 products


  • Eccentric Orbits

    Grove Press / Atlantic Monthly Press Eccentric Orbits

    Out of stock

    Book SynopsisTrade ReviewPraise for Eccentric Orbits: Named one of the “Top 10 Nonfiction Books of 2016” and one of the “20 Books That Defined Our Year” by the Wall Street Journal Named a Book of the Year 2016 by the Economist An Amazon Best Book of the Month A Hudson Booksellers’ Best Book of 2016 (Best Business Interest) “Engaging and ambitious . . . Eccentric Orbits is maximalist nonfiction, 500 pages of deep reporting put forward with epic intentions . . . a panoramic narrative, laced with fine filigree details, that makes for a story that soars and jumps and dives and digresses . . . [A] big, gutsy, exciting book.”—Wall Street Journal “Those with visions of vast satellite communications networks dancing in their heads would do well to read John Bloom’s new book on [Iridium] . . . Bloom . . . tells this story well . . . He does a good job of explaining the technology and the importance of the inventors who made the technology possible.”—Washington Post “Think of Final Cut, Steven Bach’s gripping account of the notorious movie disaster ‘Heaven’s Gate.’ Or The Smartest Guys in the Room, Bethany McLean and Peter Elkind’s chronicle of the collapse of Enron, and The Big Short, Michael Lewis’ tale of the cratering of the national economy. Eccentric Orbits . . . is a tale of ham-fisted management that’s lively enough to invite comparisons to those modern classics.”—Los Angeles Times “An exhaustive account . . . Eccentric Orbits not only offers good corporate drama, but is an enlightening narrative of how new communications infrastructures often come about: with a lot of luck, government help and investors who do not ask too many questions.”—Economist “Eccentric Orbits is a story rich in larger-than-life characters, including shady Cold War operatives and warrior-like Motorola executives . . . Bloom gives a wonderful sense of what an engineering marvel Iridium was.”—Bethany McLean, Strategy + Business (Best Business Books 2016) “An inspiring history as well as an effective business thriller . . . Bloom argues convincingly that creating and then saving Iridium was one . . . desperately difficult—and brilliant—achievement.”—New Scientist “Extensive . . . Sprawling . . . A detailed and entertaining history of the rise, fall, and rebirth of Iridium.”—Space Review “A good read.”—Marketplace “Highly engaging . . . Check it out.”—News Tribune “A prize-worthy example of the investigative genre . . . [Eccentric Orbits] has conflict and triumph on a Wagnerian scale . . . John Bloom has achieved in Eccentric Orbits an admirable balance of the human and the technological in what is at heart an age-old tale of one man’s triumph against apparently insuperable odds.”—Literary Review “An outstanding read . . . [An] inspiring story . . . Highly recommended.”—ATC Reform News “Eccentric Orbits does for the 1990s birth of the satellite phone industry what Tracy Kidder’s Soul of a New Machine did for the next-generation computer business. It’s a wild story . . . Funny, informative, exciting . . . A sprawling masterpiece of history and reporting.”—Shelf Awareness “Spellbinding . . . A tireless researcher, Bloom delivers a superlative history . . . A tour de force.”—Kirkus Reviews (starred review) “Eccentric Orbits is a remarkable work. I had known about Iridium but not about its fascinating history. John Bloom’s writing style is attractive and the level of detail is astonishing. This was a page-turner for me!”—Vint Cerf, Chief Internet Evangelist, Google “Interested in giant, head-scratching miscalculations by a great American company? The power of one man to rescue the world’s biggest deployment of low-earth satellites? A place where genius engineering meets a total lack of common sense? Then John Bloom’s book about Motorola’s multibillion-dollar debacle, Iridium, is for you. Eccentric Orbits is both a novelistic thriller and a cautionary tale, a page-turner about a reach for the heavens and a business primer on a near-fatal fall back to the earth.”—Julian Guthrie, author of The Billionaire and The Mechanic “John Bloom’s Eccentric Orbits, which tells the story of one of the most ambitious projects in the history of technology, is the most compelling book I have read in a long while. Bloom somehow coaxed the deepest thoughts and darkest secrets out of many satellite engineers, skeptical VCs, business royalty, inner-city tycoons, Italian marketers, Russian rocket launchers, Arabian princes, corporate CEOs, African leaders, Washington insiders, insurance giants, Pentagon brass, government lifers, politicians, and frustrated bankruptcy judges. This is a masterpiece of research and storytelling. If not for Bloom, one of the greatest stories of American ingenuity and bullheadedness would still lie scattered in thousands of documents and the memories of those who lived it.”—Gary Kinder, author of Ship of Gold in the Deep Blue Sea “This is a monumental piece of non-fiction, not just for the breadth and depth of the research, but for its audacity: Bloom seeks to make technology and marketing and high finance dramatic and funny and instructive of the human condition—and succeeds. Until I read this, I had always assumed that my cell phone was created by something like spontaneous combustion; like one day, it just appeared between my right hand and my ear, as if it had always belonged there. Bloom has given all of us—all billions of us—the back story on it, and what a strange, tangled, convoluted, fairly hilarious one it is.”—Jim Atkinson, Texas Monthly contributing editor “Build a better mousetrap, and the world will erect every possible obstacle to its success. That’s the sobering lesson of John Bloom’s book on the progress of a reliable, cheap, encrypted, worldwide mobile phone system to supermarket shelves. The exhilarating lesson is that it can be done if you have visionary geeks, hard-boiled veterans, retired capitalists, and the occasional eccentric rebellious bureaucrat determined to do it. This is high scientific journalism, exciting business journalism, and a rattling good tale. It even includes Nazis.”—John O’Sullivan, author of The President, the Pope, and the Prime Minister: Three Who Changed the World “Impeccably researched, and in smooth, easy prose, John Bloom interweaves fascinating historical trivia about the space race, satellites, and global communications with detail-filled personality snapshots and cringingly revealing, often disturbingly humorous, insights about the many ways big business can shoot itself in the foot.”—John Brewer, former president and editor-in-chief, New York Times Syndicate and News Service “Pacy [and] . . . worth reading, not just for the wild ride that involves secretive Saudi sheikhs, plucky terrorists, never-say-die businessmen and Bill Clinton, but also as a reminder of how vast business can be vastly dumb . . . A thrilling boom-to-boom corporate drama.”—Sunday Times (UK) “John Bloom’s account of the Iridium satellite network is more than a ripping read, it is both a commentary on the way we do technology today and a reminder of Friedrick Hayek’s observation that presumed experts and planners are the last people you want picking winners. A tale well told is a thing of delight, and John Bloom’s Eccentric Orbits: The Iridium Story does not fail.”—Quadrant (Australia) “Riveting . . . I’ve never used the term ‘tour de force’ in a book review before, but if it ever belonged in one, it is this review of Eccentric Orbits.”—800-CEO-READ

    Out of stock

    £17.46

  • RF Circuit Design

    Elsevier Science RF Circuit Design

    Out of stock

    Book SynopsisIncludes integrated circuit (IC) and system-level design issues as well as keeping its classic "wire lead" material. This title also includes topics such as: Wires, Resistors, Capacitors, Inductors; Resonant Circuits: Resonance, Insertion Loss; Filter Design: High-pass, Bandpass, Band-rejection; and more.Table of Contents1: Components2: Resonant Circuits3: Filter Design4: Impedance Matching5: The Transistor at Radio Frequencies6: Small-Signal RF Amplifier Design7: RF Power Amplifiers8: RF Wireless Front-End Design9: RF Design Software

    Out of stock

    £44.64

  • Synchronizing 5G Mobile Networks

    Pearson Education (US) Synchronizing 5G Mobile Networks

    2 in stock

    Book Synopsis Dennis Hagarty is an experienced technical specialist in the fields of information technology and telecommunications. He has led presales, consulting, and engineering efforts for major utilities, corporations, and service providers in Australasia and Europe. Having worked in numerous technical areas, Dennis has concentrated on the mobile space for almost 30 years and has specialized in timing and synchronization for the last 12 years. In his current role, Dennis is the Cisco communications interface between engineering, field sales teams, and the global Cisco customer community for all matters related to 5G timing and synchronization. This mandate sees him talking with many large service providers, including most of the world's tier 1 mobile operators. Shahid Ajmeri is a senior product manager at Cisco with responsibility for leading its 5G transport and mobile edge architecture strategy. He has more than 20 yearsTable of Contents Foreword xxi Introduction xxiii Part I Fundamentals of Synchronization and Timing Chapter 1 Introduction to Synchronization and Timing 1 Overview of Time Synchronization 1 What Is Synchronization and Why Is It Needed? 3 What Is Time? 10 How Can GPS Provide Timing and Synchronization? 13 Accuracy Versus Precision Versus Stability 15 Summary 16 References in This Chapter 16 Chapter 1 Acronyms Key 16 Further Reading 17 Chapter 2 Usage of Synchronization and Timing 19 Use of Synchronization in Telecommunications 20 Use of Time Synchronization in Finance, Business, and Enterprise 28 Industrial Uses of Time—Power Industry 33 Summary 34 References in This Chapter 34 Chapter 2 Acronyms Key 35 Chapter 3 Synchronization and Timing Concepts 39 Synchronous Networks Overview 40 Clocks 54 Sources of Frequency, Phase, and Time 66 Timing Distribution Network 82 Consumer of Time and Sync (the End Application) 88 Summary 89 References in This Chapter 89 Chapter 3 Acronyms Key 92 Further Reading 95 Part II SDOs, Clocks, and Timing Protocols Chapter 4 Standards Development Organizations 97 International Telecommunication Union 98 International Mobile Telecommunications 104 3rd Generation Partnership Project 106 Institute of Electrical and Electronics Engineers 109 European Telecommunications Standards Institute 116 Internet Engineering Task Force 118 Radio Access Network 120 MEF Forum 126 Society of Motion Picture and Television Engineers and Audio Engineering Society 127 Summary 128 References in This Chapter 129 Chapter 4 Acronyms Key 132 Further Reading 137 Chapter 5 Clocks, Time Error, and Noise 139 Clocks 139 Time Error 154 Holdover Performance 169 Transient Response 172 Measuring Time Error 173 References in This Chapter 175 Chapter 5 Acronyms Key 175 Further Reading 177 Chapter 6 Physical Frequency Synchronization 179 Evolution of Frequency Synchronization 180 BITS and SSU 181 Clocking Hierarchy 185 Synchronous Ethernet 187 Enhanced Synchronous Ethernet 189 Clock Traceability 189 Synchronization Network Chain 197 Clock Selection Process 199 Timing Loops 201 Standardization 207 Summary 207 References in This Chapter 208 Chapter 6 Acronyms Key 209 Further Reading 211 Chapter 7 Precision Time Protocol 213 History and Overview of PTP 214 PTP Versus NTP 215 IEEE 1588-2008 (PTPv2) 216 PTP Clocks 242 Profiles 250 PTP Security 273 IEEE 1588-2019 (PTPv2.1) 275 Summary 280 References in This Chapter 280 Chapter 7 Acronyms Key 283 Part III Standards, Recommendations, and Deployment Considerations Chapter 8 ITU-T Timing Recommendations 289 Overview of the ITU 290 ITU-T Study Group 15 and Question 13 291 Reading the Recommendations 299 ITU-T Physical and TDM Timing Recommendations 299 ITU-T Recommendations for Frequency in Packet Networks 310 ITU-T Packet-Based Timing Recommendations 316 Possible Future Changes in Recommendations 340 Summary 341 References in This Chapter 341 Chapter 8 Acronyms Key 342 Further Reading 346 Chapter 9 PTP Deployment Considerations 347 Deployment and Usage 348 Factors Impacting Timing Performance 380 Parameters for Timing Performance 383 Clock Performance 401 Budgeting End-to-End Time Error 419 Network Holdover 422 Packet Network Topologies 424 Packet Transport 426 Non-Mobile Deployments 430 Summary 434 References in This Chapter 435 Chapter 9 Acronyms Key 437 Further Reading 442 Part IV Timing Requirements, Solutions, and Testing Chapter 10 Mobile Timing Requirements 443 Evolution of Cellular Networks 444 Timing Requirements for Mobility Networks 448 Timing Requirements for LTE and LTE-A 455 Evolution of the 5G Architecture 478 5G New Radio Synchronization Requirements 496 Summary 509 References in This Chapter 510 Chapter 10 Acronyms Key 512 Further Reading 517 Chapter 11 5G Timing Solutions 519 Deployment Considerations for Mobile Timing 520 Frequency-Only Deployments 535 Frequency, Phase, and Time Deployment Options 538 Midhaul and Fronthaul Timing 550 Timing Security and MACsec 556 Summary 564 References in This Chapter 565 Chapter 11 Acronyms Key 567 Further Reading 571 Chapter 12 Operating and Verifying Timing Solutions 573 Hardware and Software Solution Requirements 574 Writing a Request for Proposal 587 Testing Timing 590 Automation and Assurance 629 Troubleshooting and Field Testing 635 Summary 648 Conclusion 649 References in This Chapter 649 Chapter 12 Acronyms Key 653 Further Reading 658 9780136836254, TOC, 5/3/2021

    2 in stock

    £44.19

  • CCNP Enterprise Wireless Design ENWLSD 300425 and

    Pearson Education (US) CCNP Enterprise Wireless Design ENWLSD 300425 and

    Out of stock

    Book SynopsisJerome Henry, CCIE No. 24750, is a Distinguished Engineer in the Office of the Wireless CTO at Cisco Systems. Jerome has more than 20 years' experience teaching technical Cisco courses, in more than 15 countries and four languages, to audiences ranging from bachelor's degree students to networking professionals and Cisco internal system engineers. Focusing on his wireless and networking experience, Jerome joined Cisco in 2012. Before that time, he was consulting and teaching about heterogeneous networks and wireless integration with the European Airespace team, which was later acquired by Cisco to become its main wireless solution. He then spent several years with a Cisco Learning Partner, developing networking courses and working on training materials for emerging technologies.   Jerome is a certified wireless networking expert (CWNE No. 45), has developed multiple Cisco courses, and has authored several books and video courses on wireless technoTable of Contents Introduction xxvi Part I Wireless Design (ENWLSD) 3 Chapter 1 Wireless Design Requirements 4 “Do I Know This Already?” Quiz 5 Foundation Topics 7 Following a Design Process 7 Evaluating Customer Requirements 8 Evaluating Client Requirements 10 Choosing AP Types 15 Evaluating Security Requirements 16 AP Deployment Models 17 Summary 23 Exam Preparation Tasks 23 Review All Key Topics 23 Define Key Terms 23 Chapter 2 Conducting an Offsite Site Survey 24 “Do I Know This Already?” Quiz 25 Foundation Topics 26 The Effect of Material Attenuation on Wireless Design 26 Common Deployment Models for Different Industries 28 Designing with Regulations in Mind 34 Choosing the Right Survey Type 39 A Survey of Wireless Planning Tools 40 Conducting a Predictive Site Survey 41 Summary 43 References 43 Exam Preparation Tasks 44 Review All Key Topics 44 Define Key Terms 44 Chapter 3 Conducting an Onsite Site Survey 46 “Do I Know This Already?” Quiz 47 Foundation Topics 48 Performing a Walkthrough Survey 48 Performing a Layer 1 Survey 51 Performing a Layer 2 Survey 56 Performing a Post-Deployment Onsite Survey 66 Summary 68 References 68 Exam Preparation Tasks 68 Review All Key Topics 68 Define Key Term 69 Chapter 4 Physical and Logical Infrastructure Requirements 70 “Do I Know This Already?” Quiz 71 Foundation Topics 72 Physical Infrastructure Requirements 72 Logical Infrastructure Requirements 80 Summary 85 References 85 Exam Preparation Tasks 86 Review All Key Topics 86 Define Key Terms 86 Chapter 5 Applying Wireless Design Requirements 88 “Do I Know This Already?” Quiz 89 Foundation Topics 91 Defining AP Coverage 91 Expanding Coverage with Additional APs 98 Designing a Wireless Network for Data 102 Designing a Wireless Network for High Density 103 Designing a Wireless Network for Voice and Video 109 Designing a Wireless Network for Location 111 Summary 112 Exam Preparation Tasks 112 Review All Key Topics 112 Define Key Terms 113 Chapter 6 Designing Radio Management 114 “Do I Know This Already?” Quiz 114 Foundation Topics 117 Understanding RRM 117 Localizing RRM with RF Profiles 134 Optimizing AP Cell Sensitivity with RxSOP 136 Summary 138 Exam Preparation Tasks 139 Review All Key Topics 139 Define Key Terms 139 Chapter 7 Designing Wireless Mesh Networks 140 “Do I Know This Already?” Quiz 141 Foundation Topics 142 Mesh Network Architecture and Components 142 Site Preparation and Planning 147 Mesh Convergence and Traffic Flows 152 Cisco Wi-Fi Mesh Configuration 157 Daisy-Chaining Wireless Mesh Links 163 Workgroup Bridges 166 Summary 169 References 169 Exam Preparation Tasks 170 Review All Key Topics 170 Define Key Terms 170 Chapter 8 Designing for Client Mobility 172 “Do I Know This Already?” Quiz 172 Foundation Topics 175 Roaming Review 175 Organizing Roaming Behavior with Mobility Groups 179 Optimizing AP Selection for Client Roaming 184 Optimizing Security Processes for Roaming 187 Summary 194 Exam Preparation Tasks 194 Review All Key Topics 194 Define Key Terms 194 Chapter 9 Designing High Availability 196 “Do I Know This Already?” Quiz 196 Foundation Topics 198 Making Controller Connectivity More Resilient 200 Designing High Availability for APs 201 Designing High Availability for Controllers 205 Summary 209 Exam Preparation Tasks 209 Review All Key Topics 209 Define Key Terms 210 Part II Wireless Implementation (ENWLSI) 213 Chapter 10 Implementing FlexConnect 214 “Do I Know This Already?” Quiz 216 Foundation Topics 218 Remote Office Wireless Deployment Modes 218 FlexConnect Overview and Requirements 220 Implementing FlexConnect with AireOS 223 FlexConnect High Availability and Resiliency 230 FlexConnect ACLs 234 FlexConnect Smart AP Image Upgrades 237 Implementing FlexConnect with IOS XE Controllers 238 A Summary of FlexConnect Best Practice Recommendations 244 Office Extend 245 ME and EWC 247 Summary 251 References 251 Exam Preparation Tasks 252 Review All Key Topics 252 Define Key Terms 252 Chapter 11 Implementing Quality of Service on a Wireless Network 254 “Do I Know This Already?” Quiz 255 Foundation Topics 257 An Overview of Wireless QoS Principles 257 Implementing QoS Policies on Wireless Controllers 269 Implementing QoS for Wireless Clients 283 Implementing Application Visibility and Control 285 Summary 290 References 290 Exam Preparation Tasks 291 Review All Key Topics 291 Define Key Terms 291 Chapter 12 Implementing Multicast 292 “Do I Know This Already?” Quiz 292 Foundation Topics 294 Multicast Overview 294 Implementing mDNS 305 Implementing Multicast Direct 310 Summary 316 References 316 Exam Preparation Tasks 316 Review All Key Topics 316 Define Key Terms 317 Chapter 13 Location Services Deployment 318 “Do I Know This Already?” Quiz 319 Foundation Topics 320 Indoor Location 320 Deploying Location Services 329 Tracking Clients, RFID Tags, Rogues, and Interferers 338 Customizing Location Services 342 Summary 344 References 345 Exam Preparation Tasks 345 Review All Key Topics 345 Define Key Terms 345 Chapter 14 Advanced Location Services Implementation 346 “Do I Know This Already?” Quiz 347 Foundation Topics 348 CMX and Cisco Spaces Services and Licenses 348 Implementing Analytics 351 Implementing Guest Portals 358 Implementing aWIPS on Catalyst Center 368 Ensuring Location Operational Efficiency 374 Summary 381 References 381 Exam Preparation Tasks 382 Review All Key Topics 382 Define Key Terms 382 Chapter 15 Security for Wireless Client Connectivity 384 “Do I Know This Already?” Quiz 385 Foundation Topics 387 Implementing 802.1X and AAA on Wireless Architectures 387 Implementing Client Profiling 398 Implementing BYOD and Guest 406 Summary 420 References 421 Exam Preparation Tasks 421 Review All Key Topics 421 Define Key Terms 422 Chapter 16 Monitoring and Troubleshooting WLAN Components 424 “Do I Know This Already?” Quiz 425 Foundation Topics 427 Using Reports on Cisco Prime Infrastructure and Catalyst Center 427 Managing Alarms on Cisco Prime Infrastructure and Catalyst Center 438 Troubleshooting Client Connectivity 444 Troubleshooting and Managing RF Interferences 455 Summary 458 References 458 Exam Preparation Tasks 459 Review All Key Topics 459 Define Key Terms 460 Chapter 17 Device Hardening 462 “Do I Know This Already?” Quiz 463 Foundation Topics 464 Implementing Device Access Controls 464 Implementing Access Point Authentication 473 Implementing CPU ACLs on the Wireless Controller 483 Summary 485 References 485 Exam Preparation Tasks 486 Review All Key Topics 486 Define Key Terms 487 Chapter 18 Final Preparation 488 Getting Ready 488 Tools for Final Preparation 489 Suggested Plan for Final Review/Study 492 Summary 492 Chapter 19 ENWLSD 300-425 and ENWLSI 300-430 Exam Updates 494 The Purpose of This Chapter 494 News About the Next Exam Release 496 Updated Technical Content 496 Appendix A Wi-Fi 6 (802.11ax) 498 Appendix B Software-Defined Access with Wireless 508 Appendix C RRM TPC Algorithm Example 518 Appendix D Answers to the “Do I Know This Already?” Quizzes and Review Questions 532 Glossary 545 Appendix E Study Planner 9780138249892, TOC, 12/4/2023

    Out of stock

    £53.99

  • Fundamentals of 5G Communications Connectivity

    McGraw-Hill Education Fundamentals of 5G Communications Connectivity

    10 in stock

    Book SynopsisPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Explore the foundations and applications of 5G technologyThis comprehensive guide contains practical information from telecommunications experts working at the forefront of 5G innovation. The authors discuss the foundations of 5G technologyânot just the new standards, but the reasons and stories behind them. Fundamentals of 5G Communications features coverage of all major vertical domains with a focus on practical, commercial applications. This book serves both as an essential reference for telecom professionals and as a textbook for students learning about 5G.Coverage includes: 5G versus 4G: Whatâs new? Deployment scenarios and architecture options The evolution of 5G architecture Numerology and slot structure Table of ContentsForewordIntroductionAcronyms1 5G versus 4G: What’s New? 1.1 Overview 1.2 LTE: A Success Story 1.3 Physical Layer Changes in 5G 1.4 Protocol Changes in 5G 1.5 Main Physical Layer Features of LTE over Releases2 Deployment Scenarios 2.1 LTE-NR Spectrum Sharing 2.2 Switched NR UL Carrier Aggregation Enhancements 2.3 Nonaligned Carrier Aggregation Operation 2.4 Frequency Ranges and Frequency Bands3 Architecture Options for 5G 3.1 Introduction 3.2 The 5G RAN Architecture 3.3 The 5G Core 3.4 EPC versus 5GC (What Is 5GC For?) 3.5 Main Functional Entities of the 5G Core 3.6 High-Level Features of 5G Core 3.7 Network Slicing 3.8 QoS 3.9 Interworking with Non-3GPP Access Technologies 3.10 Policy Control 3.11 5G Security 3.12 Access Control and Barring 3.13 Support for Operator and Regulatory Services 3.14 Interworking with EPC 3.15 EPC to 5GC Migration4 Evolution of 5G Architecture 4.1 Introduction 4.2 Non-Public Networks 4.3 Cellular V2X 4.4 Cellular IoT 4.5 “Big Data” Collection (Enhanced Network Automation) 4.6 Enhancements to Interworking with Non-3GPP Accesses 4.7 URLLC 4.8 Slice Authentication 4.9 Other Release 16 Features5 Numerology and Slot Structure 5.1 Numerology and Slot Structure in 4G LTE 5.2 Lessons Learned from 4G LTE and 5G Considerations 5.3 SCSs for 5G NR 5.4 Frequency Ranges, Bandwidths, and Bands for 5G NR 5.5 gNB Channel Bandwidth versus UE Channel Bandwidth 5.6 Symbol, Slot, Subframe, and Frame for 5G NR 5.7 Slot Structure for 5G NR and Forward Compatibility Considerations6 Initial Access and Mobility 6.1 Overview 6.2 Initial Access 6.3 Random Access 6.4 Paging 6.5 Mobility7 Downlink Control Operation 7.1 Downlink Control in 4G LTE 7.2 Control Region Management in 5G NR 7.3 PDCCH Structure in 5G NR 7.4 Search Space for NR PDCCH 7.5 DCI Formats for NR PDCCH 7.6 Physical Layer Block Diagram for NR PDCCH 7.7 Power Saving Considerations8 Downlink Data Operation 8.1 Channel Coding for Data 8.2 Channel Code Rate Matching 8.3 DL Soft Buffer Management 8.4 DL MCS and TBS Determination 8.5 DL Resource Allocation in the Time Domain 8.6 DL Resource Allocation in the Frequency Domain 8.7 DL Rate Matching 8.8 DL HARQ Operation 8.9 DL Data Rate Capability 8.10 Processing Time for DL Data 8.11 Demodulation Reference Signals for Data 8.12 PDSCH DM-RS 8.13 DL Phase Tracking Reference Signal 8.14 Channel State Information Reference Signal 8.15 Tracking Reference Signal 8.16 DL MIMO Scheme 8.17 CSI Feedback 8.18 Beam Management for the PDSCH 8.19 Signal Quasi Co-Location9 Uplink Control Operation 9.1 Uplink Control in 4G LTE 9.2 UCI Types and Payload Sizes in 5G NR 9.3 PUCCH Formats in 5G NR 9.4 PUCCH Resource Determination in 5G NR 9.5 UCI on PUSCH in 5G NR 9.6 Channel Coding for UCI10 Uplink Data Operation 10.1 UL MCS and TBS Determination 10.2 UL Resource Allocation in the Time Domain 10.3 UL Resource Allocation in the Frequency Domain 10.4 UL Rate Matching 10.5 UL HARQ Operation 10.6 UL Soft Buffer Management 10.7 UL Data Rate Capability 10.8 Processing Time for UL Data 10.9 PUSCH DM-RS 10.10 UL Phase Tracking Reference Signal 10.11 Sounding Reference Signal 10.12 UL MIMO Scheme 10.13 Beam Management for the PUSCH 10.14 UL Power Control 10.15 UL Timing11 Coexistence of 4G and 5G 11.1 Adjacent Channel Coexistence 11.2 Same Channel Coexistence 11.3 EN-DC Power Control 11.4 Switched EN-DC UL12 5G in Unlicensed and Shared Spectrum 12.1 Unlicensed Operation in LTE 12.2 Overview 12.3 Channel Access 12.4 Discovery Burst 12.5 Physical Layer Extensions for Uplink 12.6 Increased Scheduling Flexibility13 Vertical Expansion: URLLC 13.1 A Brief History of 3GPP Standardization Related to URLLC 13.2 Use Cases and Deployment Scenarios for 5G NR URLLC 13.3 Resource Management for URLLC 13.4 Optimizing Link Efficiency for URLLC 13.5 Downlink Resource Sharing for Distinct Service Types 13.6 Uplink Resource Sharing for Distinct Service Types 13.7 Handling Distinct Services at the UE 13.8 Other Related Aspects14 Vertical Expansion: MTC 14.1 A Brief History of MTC in 3GPP 14.2 Key Technical Enablers for eMTC 14.3 Key Technical Enablers for NB-IoT 14.4 Integration of eMTC and NB-IoT into 5G NR 14.5 Future Trends15 5G Vertical Expansion: V2X 15.1 Overview 15.2 Background: LTE V2X 15.3 NR V2X16 Vertical Expansion: Broadcast and Multicast17 Miscellaneous Topics for 5G 17.1 Overview 17.2 Interference Management 17.3 UE Power Savings 17.4 NR Positioning 17.5 Two-Step RACH 17.6 Multi-RAT DC/CA Enhancements 17.7 Mobility Enhancements 17.8 Integrated Access and Backhaul18 A Look at Typical 5G Commercial Deployments19 5G: What’s Next? 19.1 Overview 19.2 Radio Projects in Release 17 19.3 Systems Projects in Release 17 19.4 NR Expansion into Higher Frequencies 19.5 Sidelink Beyond V2X 19.6 Relaying Operation 19.7 Edge Applications 19.8 On the Path to 6GIndex

    10 in stock

    £88.19

  • 5G Core Networks

    Elsevier Science 5G Core Networks

    Out of stock

    Book SynopsisTable of Contents1. Introduction 2. Drivers for 5G 3. Architecture overview 4. EPC for 5G 5. Key concepts 6. Session management 7. Mobility Management 8. Security 9. Quality-of-Service 10. Policy control and charging 11. Network slicing 12. Dual connectivity 13. Network functions and services 14. Protocols 15. Selected call flows 16. Architecture extensions and vertical industries 17. Future outlook

    Out of stock

    £86.36

  • Network Architects Guide to 5G A

    Pearson Education (US) Network Architects Guide to 5G A

    15 in stock

    Book SynopsisSyed Farrukh Hassan has been designing and deploying networks for over 20 years. In his current role as principal telecommunications architect at Red Hat, Syed provides consultancy services to global 5G customers. Prior to that, Syed worked as a senior solutions architect in the Cisco professional and consulting services organization, providing guidance, strategy, and planning support to various Internet, cloud, and mobile service providers in their adoption of innovating networking technologies and transformation of their networks to new architectures. Syed co-authored one of the first books on NFV and SDN, has been a regular speaker in public forums and conferences, and is recognized as a Cisco Live Distinguished Speaker. Syed is a double CCIE in Service Provider and Data Center technologies (#21617), Google Certified Professional Cloud Networking Engineer, and Certified Kubernetes Administrator (CKA). He holds a bachelor's degree in engineering from NED UniversitTable of ContentsIntroduction xx Chapter 1: A Peek at the Past 2 Brief History of Pre-Cellular Mobile Networks. . . . . . . . . . . . . . . . . 2 The Very First Cellular Networks: 1G.. . . . . . . . . . . . . . . . . . . . 5 Second Generation (2G) Cellular Networks. . . . . . . . . . . . . . . . . 10 Generation Two and a Half (2.5G). . . . . . . . . . . . . . . . . . . . . 15 Enhanced Data Rates for GSM Evolution (EDGE). . . . . . . . . . . . . . . 17 Third Generation (3G).. . . . . . . . . . . . . . . . . . . . . . . . . . 17 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Chapter 2: Anatomy of Mobile Communication Networks 28 Understanding Radio Access Network.. . . . . . . . . . . . . . . . . . . 28 Mobile Transport and Backhaul.. . . . . . . . . . . . . . . . . . . . . . 41 Mobile Core Concepts.. . . . . . . . . . . . . . . . . . . . . . . . . 51 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Chapter 3: Mobile Networks Today 76 3GPP Releases and Evolved Packet System.. . . . . . . . . . . . . . . . 77 Evolved Packet Core (EPC) Architecture.. . . . . . . . . . . . . . . . . . 79 RAN Evolution.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Modern Mobile Backhaul Networks. . . . . . . . . . . . . . . . . . . . 102 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Chapter 4: The Promise of 5G 120 Emerging Trends and Expectations from Mobile Networks.. . . . . . . . . . 121 5G Technology Enablers.. . . . . . . . . . . . . . . . . . . . . . . . 126 5G Service Offerings.. . . . . . . . . . . . . . . . . . . . . . . . . . 131 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Chapter 5: 5G Fundamentals 138 5G Radio Access Network.. . . . . . . . . . . . . . . . . . . . . . . 138 5G Core Network.. . . . . . . . . . . . . . . . . . . . . . . . . . . 179 5G Transport Network.. . . . . . . . . . . . . . . . . . . . . . . . . 195 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Chapter 6: Emerging Technologies for 5G-Ready Networks: Segment Routing 212 Complexity in Today’s Network.. . . . . . . . . . . . . . . . . . . . . 212 Introducing Segment Routing. . . . . . . . . . . . . . . . . . . . . . 214 Segment Routing Traffic Engineering (SR-TE). . . . . . . . . . . . . . . . 222 Software-Defined Transport with Segment Routing.. . . . . . . . . . . . . 228 5G Transport Network Slicing. . . . . . . . . . . . . . . . . . . . . . 232 Redundancy and High Availability with Segment Routing.. . . . . . . . . . . 238 Segment Routing for IPv6 (SRv6). . . . . . . . . . . . . . . . . . . . . 242 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Chapter 7: Essential Technologies for 5G-Ready Networks: DC Architecture and Edge Computing 250 Data Center Basics.. . . . . . . . . . . . . . . . . . . . . . . . . . 250 From Centralized to Distributed to Cloud Data Centers. . . . . . . . . . . . 257 Deploying Data Centers.. . . . . . . . . . . . . . . . . . . . . . . . 260 Optimizing Compute Resources. . . . . . . . . . . . . . . . . . . . . 267 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272 Chapter 8: Essential Technologies for 5G-Ready Networks: Transport Services 274 What’s a 5G Transport Service?.. . . . . . . . . . . . . . . . . . . . . 274 VPN Services.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275 Transport Services Across MCN. . . . . . . . . . . . . . . . . . . . . 297 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Chapter 9: Essential Technologies for 5G-Ready Networks: Timing and Synchronization 302 Types of Synchronization.. . . . . . . . . . . . . . . . . . . . . . . . 304 Why Synchronization Is Important in 5G.. . . . . . . . . . . . . . . . . . 306 Synchronization Sources and Clock Types.. . . . . . . . . . . . . . . . . 308 Implementing Timing in Mobile Networks.. . . . . . . . . . . . . . . . . 311 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 Chapter 10: Designing and Implementing 5G Network Architecture 334 5G Architecture Recap.. . . . . . . . . . . . . . . . . . . . . . . . . 334 5G Fronthaul Considerations.. . . . . . . . . . . . . . . . . . . . . . 336 xHaul Transport Technology Choices. . . . . . . . . . . . . . . . . . . 345 Designing the Mobile Transport Network. . . . . . . . . . . . . . . . . . 346 Routing Design Simplification. . . . . . . . . . . . . . . . . . . . . . 361 Transport Services for 5G MCN.. . . . . . . . . . . . . . . . . . . . . 370 Taking MCN to the Cloud.. . . . . . . . . . . . . . . . . . . . . . . . 372 Automation in 5G Networks.. . . . . . . . . . . . . . . . . . . . . . . 376 Deciphering 5G Mobile Requirements.. . . . . . . . . . . . . . . . . . . 380 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Afterword: Beyond 5G 386 9780137376841, TOC, 4/14/2022

    15 in stock

    £40.49

  • Securing 5G and Evolving Architectures

    Pearson Education (US) Securing 5G and Evolving Architectures

    1 in stock

    Book SynopsisPramod Nair is a Lead Security Architect at Cisco Systems focusing on service providers. During his 20 years of experience in the industry, Pramod has worked in multiple areas, including research and development, designing end-to-end mobile networks, and technical consulting on military and defense projects. Among other responsibilities in his current role within Cisco, Pramod leads 5G Security Architecture, driving its adoption globally, and has been instrumental in architecting secure next-generation networks for customers across the globe. He is a regular speaker on the subject at large conferences and industry events. Pramod is an active member of the security community. His role is to help mobile network providers, service providers, industry verticals, the national security and defense sectors, and other agencies dedicated to securing critical infrastructures. He is also deeply involved with industry trade organizations, has co-chaired the 5G secTable of ContentsForeword xv Preface xvi Acknowledgments xxi About the Author xxii Part I Evolution of Cellular Technologies to 5G, Security Enhancements, and Challenges Chapter 1: Evolution from 4G to 5G 2 Mobile Network Evolution from 4G to 5G.. . . . . . . . . . . . . . . . . . 4 Key 5G Features in 3GPP Releases.. . . . . . . . . . . . . . . . . . . . 18 Key 5G Advanced Features.. . . . . . . . . . . . . . . . . . . . . . . 20 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Chapter 2: Deployment Modes in 5G 26 5G NSA and SA Deployments.. . . . . . . . . . . . . . . . . . . . . . 27 5G Time-Sensitive Networks.. . . . . . . . . . . . . . . . . . . . . . . 42 5G Local Area Network–Type Service.. . . . . . . . . . . . . . . . . . . 44 Private 5G/Non-Public Networks.. . . . . . . . . . . . . . . . . . . . . 46 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Chapter 3: Securing 5G Infrastructure 56 3GPP 5G Security Enhancements.. . . . . . . . . . . . . . . . . . . . . 57 Security Challenges in 5G. . . . . . . . . . . . . . . . . . . . . . . . 74 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Acronyms Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Part II Securing 5G Architectures, Deployment Modes, and Use Cases Chapter 4: Securing RAN and Transport Deployments in 5G 82 5G RAN and Transport Threats. . . . . . . . . . . . . . . . . . . . . . 84 Securing 5G RAN and Transport.. . . . . . . . . . . . . . . . . . . . . 92 Real Scenario Case Study: Examples of Threat Surfaces and Their Mitigation. . 125 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140 Chapter 5: Securing MEC Deployments in 5G 142 Service Provider Network-Based MEC.. . . . . . . . . . . . . . . . . . 144 Enterprise Network-Based MEC.. . . . . . . . . . . . . . . . . . . . . 145 MEC Deployment Models.. . . . . . . . . . . . . . . . . . . . . . . . 146 Threat Surfaces in 5G MEC Deployments.. . . . . . . . . . . . . . . . . 154 Securing 5G MEC.. . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Real Scenario Case Study: MEC Threats and Their Mitigation.. . . . . . . . . 217 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Chapter 6: Securing Virtualized 5G Core Deployments 234 A Brief Evolution of Virtualization in Telecommunications.. . . . . . . . . . . 235 Threats in Virtualized 5G Packet Core Deployments.. . . . . . . . . . . . . 240 Securing Virtualized 5G Packet Core Deployments.. . . . . . . . . . . . . 257 Real Scenario Case Study: Virtualized 5GC Threats and Mitigation.. . . . . . . 281 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Chapter 7: Securing Network Slice, SDN, and Orchestration in 5G 298 Network Slicing and Its Enablers—SDN and Orchestration. . . . . . . . . . 299 Threat Surfaces in 5G Network Slice, SDN, and Orchestration Deployments.. . . 309 Mitigation of Threats.. . . . . . . . . . . . . . . . . . . . . . . . . . 327 Real Scenario Case Study: Threats in the 5G Network Slice, SDN, and Orchestration Deployments and Their Mitigation. . . . . . . . . . . . . 355 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Key Acronyms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 Chapter 8: Securing Massive IoT Deployments in 5G 376 Massive IoT–Based Threats in 5G.. . . . . . . . . . . . . . . . . . . . 380 Securing mIoT Deployments in 5G Networks.. . . . . . . . . . . . . . . . 391 Real Scenario Case Study: mIoT Threats and Their Mitigation.. . . . . . . . . 414 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418 Key Acronyms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 420 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422 Chapter 9: Securing 5G Use Cases 424 Secure 5G Smart Factory and Manufacturing. . . . . . . . . . . . . . . . 425 Critical Infrastructure.. . . . . . . . . . . . . . . . . . . . . . . . . . 437 5G Vehicle-to-Everything (5G-V2X).. . . . . . . . . . . . . . . . . . . . 447 Standards and Associations.. . . . . . . . . . . . . . . . . . . . . . . 463 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 Key Acronyms.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 Part III End-to-End 5G Security Architecture and Prioritizing Security Investments Chapter 10: Building Pragmatic End-to-End 5G Security Architecture 468 Foundations of 5G Security.. . . . . . . . . . . . . . . . . . . . . . . 470 Key Tenets of 5G Security Architecture.. . . . . . . . . . . . . . . . . . 472 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497 Acronyms Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501 Chapter 11: Prioritizing 5G Security Investments 502 Method of Prioritizing Security Controls.. . . . . . . . . . . . . . . . . . 505 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532 Acronyms Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . 533 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534 Part IV Emerging Discussions Chapter 12: 5G and Beyond 536 Adoption and Adaptability of 5G and Evolving Technologies.. . . . . . . . . 537 Convergence of Wi-Fi and Evolving Cellular Technologies.. . . . . . . . . . 539 Use of AI and ML in Securing 5G and Evolving Networks.. . . . . . . . . . . 543 Crypto Agility in 5G and Evolving Technologies.. . . . . . . . . . . . . . . 546 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 Acronym Key.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 References.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550 9780137457939, TOC, 10/27/2021

    1 in stock

    £46.79

  • Understanding and Troubleshooting Cisco Catalyst

    Pearson Education (US) Understanding and Troubleshooting Cisco Catalyst

    Out of stock

    Book SynopsisSimone Arena is a principal technical marketing engineer (TME) within the Cisco Enterprise Networking & Cloud group and is primarily focused on enterprise network architecture and on all things related to wireless and mobility. Simone is based in Italy and is a Cisco veteran, having joined Cisco in 1999. Throughout the years, Simone has covered multiple roles at Cisco, starting as a software engineer working with Catalyst switching platforms, to consulting system engineer in the field, to TME within different teams (Enterprise Solution Engineering, Wireless Business Unit, Enterprise Networking and Cloud, and now Networking Experiences Group). Today Simone is the lead TME architect for Catalyst Wireless, and his time is split between helping customers and partners design the best solution that fits their needs and engineering and product management, trying to evolve and improve the products and solutions. Simone is a Distinguished Speaker at Cisco Live and has spokenTable of Contents Introduction xxvii Chapter 1 Cisco C9800 Series 1 Why Cisco C9800? 2 The Role of the Wireless Controller in a Cloud Era 7 Managing the Cisco C9800 10 Cisco Next-Generation Wireless Stack 22 Summary 23 References 23 Chapter 2 Hardware and Software Architecture of the C9800 25 General CAPWAP Split MAC Architecture 25 The Controller Control Plane Architecture Elasticity 27 Wireless Client State Machine 31 One Dataplane to Rule Them All (or Three at the Maximum) 35 Hardware Overview 38 Summary 42 Chapter 3 C9800 Configuration Model 43 C9800 New Configuration Model 43 Cisco C9800 Series Profile and Tag Considerations 48 Summary 64 References 64 Chapter 4 C9800 Deployment and Installation 65 C9800 Deployment Models 65 Setting Up Your First Catalyst Wireless Network 79 Summary 87 References 87 Chapter 5 Security 89 Network Security Fundamentals 89 Wireless Security Fundamentals 116 Securing the Air 128 Securing Your Access Points 148 Securing Your Wireless Controller 151 Encrypted Traffic Analytics 154 Cisco Umbrella 155 Cisco Secure Development Lifecycle (CSDL) 157 Summary 157 References 157 Chapter 6 Mobility and Client Roaming 159 802.11 Roaming 160 Types of Client Roaming 181 C9800 to AireOS Inter-Release Controller Mobility (IRCM) 191 Summary 192 References 193 Chapter 7 RF Deployment and Guidelines 195 Radio Resources Management (RRM) Concepts and Components 195 Challenging RF Environments 199 Radio Resources Management (RRM) 203 DCA 211 RF Profiles 215 Spectrum Intelligence and CleanAir 219 Advanced RF Features 224 Airtime Fairness (ATF) 228 Dynamic Frequency Selection (DFS) 232 Flexible Radio Assignment (FRA) 235 Wireless Intrusion Prevention System (WIPS) and Rogue Detection 238 Summary 246 References 246 Chapter 8 Multicast and Multicast Domain Name System (mDNS) 247 Wireless Multicast 250 Media Stream Feature 263 mDNS 272 Summary 283 References 283 Chapter 9 Quality of Service (QoS) 285 Wi-Fi Quality of Service (QoS) 286 Wi-Fi (802.11) QoS Fundamentals 287 Implementing Wireless QoS on the C9800 300 Designing and Deploying Catalyst C9800 QoS 304 Best Practices 320 Summary 322 References 322 Chapter 10 C9800 High Availability 323 SSO Redundancy 324 HA Teardown 349 SSO Deployment: Impact on Features 350 N+1 Redundancy 352 N+1 vs. SSO High Availability 357 HA in EWC-AP Deployment 358 HA in EWC-SW Deployment 359 Summary 359 References 360 Chapter 11 Cisco DNA Spaces Integration and IoT 361 Value-Added Wireless Services 361 Connected Mobile Experiences (CMX) 372 Cisco DNA Spaces 372 Specific Service Examples 379 Summary 392 References 392 Chapter 12 Network Programmability 393 What Is Network Programmability? 393 Why Is Network Programmability Needed? 393 Is Network Programmability a New Concept? 396 Orchestration of the Entire Network 396 Configuration Repeatability 396 Idempotency 397 Imperative vs. Declarative Models 397 Infrastructure as Code (IaC) 400 Network Programmability in the C9800 401 Data Models 402 YANG Data Models 403 Encoding Formats 406 Protocols 408 Tools to Examine YANG Models 412 How to Examine Data Using NETCONF and YANG Suite 419 How to Examine Data Using RESTCONF and POSTMAN 421 Python and Network Programmability 429 Summary 436 References 436 Chapter 13 Model-Driven Telemetry 437 What Is Model-Driven Telemetry? 437 How to Enable Model-Driven Telemetry 438 Operational Data and KPIs 441 Polling vs. Subscribing 447 Telemetry Streams 448 How to Identify Subtrees in YANG Models 449 Dial-out vs. Dial-in 450 Tools 460 Summary 467 References 467 Chapter 14 Cisco DNA Center/Assurance Integration 469 Introduction 469 Managing the C9800 with Cisco DNA Center 472 Summary 492 References 492 Chapter 15 Backing Up, Restoring, and Upgrading Your C9800 493 Saving and Restoring the Configuration for Disaster Recovery 493 Running IOS-XE in Install or Bundle Mode 500 Upgrading (and Downgrading) the Controller Safely 501 Summary 506 References 506 Chapter 16 Troubleshooting 507 Control Plane Tracing 509 Embedded Packet Capture (EPC) 525 Packet Tracer 531 Troubleshooting Dashboard 536 Other On-the-Box Tools on the C9800 GUI 540 Offline Tools for the C9800 545 Health and KPI Monitoring 548 Summary 577 References 578 Appendix A Setting Up a Development Environment 579 9780137492329, TOC, 5/27/2022

    Out of stock

    £42.74

  • Tap Unlocking the Mobile Economy

    MIT Press Ltd Tap Unlocking the Mobile Economy

    Book SynopsisHow the smartphone can become a personal concierge (not a stalker) in the mobile marketing revolution of smarter companies, value-seeking consumers, and curated offers.Consumers create a data trail by tapping their phones; businesses can tap into this trail to harness the power of the more than three trillion dollar mobile economy. According to Anindya Ghose, a global authority on the mobile economy, this two-way exchange can benefit both customers and businesses. In Tap, Ghose welcomes us to the mobile economy of smartphones, smarter companies, and value-seeking consumers.Drawing on his extensive research in the United States, Europe, and Asia, and on a variety of real-world examples from companies including Alibaba, China Mobile, Coke, Facebook, SK Telecom, Telefónica, and Travelocity, Ghose describes some intriguingly contradictory consumer behavior: people seek spontaneity, but they are predictable; they find advertising annoying, but they fear missing

    £18.58

  • DelayDoppler Communications

    Academic Press DelayDoppler Communications

    Out of stock

    Book SynopsisTrade Review"The book is written in a very clear style, and allows somebody not familiar with OTFS to quickly understand the essentials of this exciting new topic. Even active researchers in the field will appreciate the clear and consistent description and the extensive intuitive explanations of the finer points of OTFS. The authors have done an excellent job in focusing on the key formulations and their interpretations, and making the book concise (some 250 pages), while also providing extensive references that enable looking up specialized developments. This valuable book will certainly benefit anyone working in the vibrant area of waveform design for 6G." --Andreas F. MolischTable of Contents1. Introduction 2. High-mobility wireless channels 3. OFDM review and its limitations 4. Delay-Doppler modulation 5. Zak transform analysis for delay-Doppler communications 6. Detection methods 7. Channel estimation methods 8. MIMO and multiuser OTFS 9. Conclusions and future directions Appendix A: Notation and acronyms B: Some useful matrix properties C: Some MATLAB code and examples Please visit the book's companion site for additional materials (MATLAB package code): https://www.elsevier.com/books-and-journals/book-companion/9780323850285 (copy and paste the URL to your browser and search or reach it through the hyperlink available in the Resources box).

    Out of stock

    £86.36

  • Open Radio Access Network ORAN Systems

    Academic Press Open Radio Access Network ORAN Systems

    Out of stock

    Book SynopsisTable of Contents1. Open radio access network overview 2. System components, requirements, and interfaces 3. Hardware system dimensioning 4. Hardware architecture choices 5. System software 6. User-plane application components 7. Wireless scheduling and Quality of Service optimization techniques 8. Synchronization in open radio access networks 9. Software performance 10. Interoperability and test 11. Differentiation by use case

    Out of stock

    £86.36

  • Microwave Integrated Circuit Components Design

    CRC Press Microwave Integrated Circuit Components Design

    Out of stock

    Book SynopsisMICROWAVE INTEGRATED CIRCUIT COMPONENTS DESIGN THROUGH MATLAB This book teaches the student community microwave integrated circuit component design through MATLAB, helping the reader to become conversant in using codes and, thereafter, commercial software for verification purposes only. Microwave circuit theory and its comparisons, transmission line networks, S-parameters, ABCD parameters, basic design parameters of planar transmission lines (striplines, microstrips, slot lines, coplanar waveguides, finlines), filter theory, Smith chart, inverted Smith chart, stability circles, noise figure circles and microwave components, are thoroughly explained in the book. The chapters are planned in such a way that readers get a thorough understanding to ensure expertise in design. Aimed at senior undergraduates, graduates and researchers in electrical engineering, electromagnetics, microwave circuit design and communications engineering, this book: ExplainTable of ContentsForeword. Ten Commandments for Microwaves. 1. Transmission Line Networks 2. Planar Transmission Lines 3. Microwave Components (MICs) 4. Microwave Filters 5. Microwave Amplifiers 6. Smith Chart Appendix

    Out of stock

    £73.14

  • Hybrid Encryption Algorithms over Wireless

    Taylor & Francis Ltd Hybrid Encryption Algorithms over Wireless

    1 in stock

    Book SynopsisThis book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, Hybrid Encryption Algorithms over Wireless Communication Channels, examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations.TransmisTrade Review“ In this clearly written book, Shaheen studies methods of encrypting images and video for transmission over wireless communication systems, and methodically demonstrates several encryption algorithms. This text will certainly be of interest to graduate students and researchers in the field of wireless communications.”— J. M. Smith, Sonoma State University, Choice Feb 2022 Vol 59Table of ContentsIntroduction.Fundamentals of Image Encryption for Wireless Communication. Rubik’s Cube Encryption for Wireless Communications. Hybrid Rubik’s Cube Algorithm for Wireless Communications. Proposed Hybrid Encryption Frameworkfor Reliable 3-D Wireless Video Communications. Conclusions and Future Work. References.

    1 in stock

    £104.50

  • Fieldbus and Networking in Process Automation

    CRC Press Fieldbus and Networking in Process Automation

    1 in stock

    Book SynopsisOver the last two decades, fieldbus has totally revolutionized the way communication takes place in the fields of process control, automation, and manufacturing industries. Recent introduction of real-time fieldbuses has opened up its application in multi-axis motor control and other time-critical applications. Fieldbus is designed to ensure easy interoperability, smarter network designs, increased data availability, and lessened stress on the design aspects of safety protocols.This second edition of Fieldbus and Networking in Process Automation discusses the different facets of fieldbus technology including design, wiring, installation, and commissioning as well as safety aspects in hostile application areas. The book:â Explains basic communication principles and networkingâa must for understanding fieldbusesâ Considers the advantages and shortcomings of individual fieldbusesâ Provides a broad spectrum of different fieldbuses used in both pTable of ContentsChapter 1 Data Communication..............................................................1Chapter 2 Networking...........................................................................25Chapter 3 Network Models...................................................................35Chapter 4 Networks in Process Automation.........................................53Chapter 5 Fieldbuses.............................................................................63Chapter 6 Highway Addressable Remote Transducer (HART)................ 75Chapter 7 Foundation Fieldbus.............................................................89Chapter 8 PROFIBUS......................................................................... 119Chapter 9 Modbus and Modbus Plus.................................................. 145Chapter 10 CAN Bus............................................................................ 157Chapter 11 DeviceNet........................................................................... 163Chapter 12 AS-i.................................................................................... 169Chapter 13 Seriplex............................................................................... 175Chapter 14 Interbus-S........................................................................... 179Chapter 15 ControlNet.......................................................................... 189Chapter 16 Common Industrial Protocol.............................................. 201Chapter 17 Ethernet and Ethernet/IP.................................................... 213Chapter 18 EtherCAT...........................................................................225Chapter 19 Sercos III............................................................................237Chapter 20 Ethernet Powerlink............................................................. 251Chapter 21 Profinet IRT........................................................................257Chapter 22 Intrinsically Safe Fieldbus Systems....................................265Chapter 23 Wiring, Installation, and Commissioning..........................277Chapter 24 Wireless Sensor Networks..................................................303Chapter 25 WirelessHART (WHART)................................................ 317Chapter 26 ISA100.11a..........................................................................343

    1 in stock

    £43.69

  • Wireless Sensor Networks

    John Wiley & Sons Inc Wireless Sensor Networks

    15 in stock

    Book SynopsisThis book presents an in-depth study on recent advances and research in Wireless Sensor Networks (WSNs). Existing WSN applications are described, followed by discussing the ongoing research efforts on some WSNs applications that show the usefulness of sensor networks. Theoretical analysis and factors influencing protocol design are highlighted.Trade Review"It is intended for advanced students but also would be useful for researchers, system and chip designers, and other professionals in related fields." (Booknews, 1 February 2011) "The book is written in an accessible, textbook style, and includes problems and solutions to assist learning." (Dark Fiber, 8 February 2011)Table of ContentsAbout the Series Editor xvii Preface xix 1 Introduction 1 1.1 Sensor Mote Platforms 2 1.2 WSN Architecture and Protocol Stack 10 References 15 2 WSN Applications 17 2.1 Military Applications 17 2.2 Environmental Applications 21 2.3 Health Applications 26 2.4 Home Applications 29 2.5 Industrial Applications 31 References 33 3 Factors Influencing WSN Design 37 3.1 Hardware Constraints 37 3.2 Fault Tolerance 39 3.3 Scalability 40 3.4 Production Costs 40 3.5 WSN Topology 40 3.6 Transmission Media 41 3.7 Power Consumption 43 References 49 4 Physical Layer 53 4.1 Physical Layer Technologies 53 4.2 Overview of RF Wireless Communication 57 4.3 Channel Coding (Error Control Coding) 59 4.4 Modulation 62 4.5 Wireless Channel Effects 66 4.6 PHY Layer Standards 72 References 75 5 Medium Access Control 77 5.1 Challenges for MAC 77 5.2 CSMA Mechanism 80 5.3 Contention-Based Medium Access 83 5.4 Reservation-Based Medium Access 103 5.5 Hybrid Medium Access 110 References 115 6 Error Control 117 6.1 Classification of Error Control Schemes 117 6.2 Error Control in WSNs 120 6.3 Cross-layer Analysis Model 123 6.4 Comparison of Error Control Schemes 131 References 137 7 Network Layer 139 7.1 Challenges for Routing 139 7.2 Data-centric and Flat-Architecture Protocols 141 7.3 Hierarchical Protocols 148 7.4 Geographical Routing Protocols 152 7.5 QoS-Based Protocols 159 References 163 8 Transport Layer 167 8.1 Challenges for Transport Layer 167 8.2 Reliable Multi-Segment Transport (RMST) Protocol 169 8.3 Pump Slowly, Fetch Quickly (PSFQ) Protocol 171 8.4 Congestion Detection and Avoidance (CODA) Protocol 175 8.5 Event-to-Sink Reliable Transport (ESRT) Protocol 177 8.6 GARUDA 180 8.7 Real-Time and Reliable Transport (RT)2 Protocol 185 References 189 9 Application Layer 191 9.1 Source Coding (Data Compression) 191 9.2 Query Processing 195 9.3 Network Management 212 References 218 10 Cross-layer Solutions 221 10.1 Interlayer Effects 222 10.2 Cross-layer Interactions 224 10.3 Cross-layer Module 229 References 240 11 Time Synchronization 243 11.1 Challenges for Time Synchronization 243 11.2 Network Time Protocol 245 11.3 Definitions 246 11.4 Timing-Sync Protocol for Sensor Networks (TPSN) 248 11.5 Reference-Broadcast Synchronization (RBS) 251 11.6 Adaptive Clock Synchronization (ACS) 253 11.7 Time Diffusion Synchronization Protocol (TDP) 254 11.8 Rate-Based Diffusion Protocol (RDP) 257 11.9 Tiny- and Mini-Sync Protocols 258 11.10 Other Protocols 260 References 262 12 Localization 265 12.1 Challenges in Localization 265 12.2 Ranging Techniques 268 12.3 Range-Based Localization Protocols 272 12.4 Range-Free Localization Protocols 280 References 284 13 Topology Management 287 13.1 Deployment 288 13.2 Power Control 289 13.3 Activity Scheduling 296 13.4 Clustering 308 References 317 14 Wireless Sensor and Actor Networks 319 14.1 Characteristics of WSANs 321 14.2 Sensor–Actor Coordination 325 14.3 Actor–Actor Coordination 337 14.4 WSAN Protocol Stack 345 References 348 15 Wireless Multimedia Sensor Networks 349 15.1 Design Challenges 350 15.2 Network Architecture 353 15.3 Multimedia Sensor Hardware 357 15.4 Physical Layer 365 15.5 MAC Layer 367 15.6 Error Control 371 15.7 Network Layer 374 15.8 Transport Layer 379 15.9 Application Layer 383 15.10 Cross-layer Design 388 15.11 Further Research Issues 392 References 394 16 Wireless Underwater Sensor Networks 399 16.1 Design Challenges 401 16.2 Underwater Sensor Network Components 402 16.3 Communication Architecture 405 16.4 Basics of Underwater Acoustic Propagation 409 16.5 Physical Layer 414 16.6 MAC Layer 416 16.7 Network Layer 426 16.8 Transport Layer 435 16.9 Application Layer 437 16.10 Cross-layer Design 437 References 440 17 Wireless Underground Sensor Networks 443 17.1 Applications 445 17.2 Design Challenges 447 17.3 Network Architecture 450 17.4 Underground Wireless Channel for EM Waves 453 17.5 Underground Wireless Channel for Magnetic Induction 463 17.6 Wireless Communication in Mines and Road/Subway Tunnels 466 17.7 Communication Architecture 474 References 480 18 Grand Challenges 483 18.1 Integration of Sensor Networks and the Internet 483 18.2 Real-Time and Multimedia Communication 484 18.3 Protocol Stack 485 18.4 Synchronization and Localization 485 18.5 WSNs in Challenging Environments 486 18.6 Practical Considerations 488 18.7 Wireless Nano-sensor Networks 488 References 489 Index 491

    15 in stock

    £79.16

  • Compact Multifunctional Antennas for Wireless

    John Wiley & Sons Inc Compact Multifunctional Antennas for Wireless

    15 in stock

    Book SynopsisOffers an up-to-date description of modern multifunctional antenna systems and microwave components Compact multifunctional antennas are of great interest in the field of antennas and wireless communication systems, but there are few, if any, books available that fully explore the multifunctional concept. Divided into six chapters, Compact Multifunctional Antennas for Wireless Systems encompasses both the active and passive multifunctional antennas and components for microwave systems. It provides a systematic, valuable reference for antenna/microwave researchers and designers. Beginning with such novel passive components as antenna filters, antenna packaging covers, and balun filters, the book discusses various miniaturization techniques for the multifunctional antenna systems. In addition to amplifying and oscillating antennas, the book also covers design considerations for frequency- and pattern-reconfigurable antennas. The last chapter is dedicated toTable of ContentsPreface ix 1 Compact Multifunctional Antennas in Microwave Wireless Systems 1 1.1 Introduction 1 1.2 Microwave Components in Wireless Systems 6 1.3 Planar and Nonplanar Antennas in Compact Wireless Systems 7 1.3.1 Performance Parameters 8 1.3.2 Planar Antennas 14 1.3.3 Nonplanar Antennas 16 1.4 Multifunctional Antennas and Microwave Circuits 17 1.4.1 Active Antennas 18 1.4.2 Passive Antennas 19 1.5 Miniaturization Techniques for Multifunctional Antennas 19 1.6 Design Processes and Considerations 20 1.7 Design Tools and Software 22 1.8 Overview of the Book 24 2 Multifunctional Passive Integrated Antennas and Components 29 2.1 Development of Passive Integrated Antennas and Components 29 2.2 Antenna Filters 30 2.2.1 Dielectric Resonator Antenna Filter 31 2.2.2 Other DRAFs 46 2.2.3 Microstrip-Based Antenna Filters 50 2.3 Balun Filters 60 2.3.1 Ring Balun Filter 60 2.3.2 Magnetic-Coupled Balun Filter 64 2.3.3 Rectangular Patch Balun Filter 65 2.4 Antenna Package 67 2.4.1 DRA Packaging Cover 70 2.4.2 Other Antenna Packages 78 2.5 Conclusions 80 3 Reconfigurable Antennas 85 3.1 Introduction 85 3.2 Design Considerations and Recent Developments 86 3.3 Frequency-Reconfigurable Antennas 88 3.3.1 Frequency-Reconfigurable Slot-Loaded Microstrip Patch Antenna 91 3.3.2 Frequency-Reconfigurable E-Shaped Patch Antenna 93 3.4 Pattern-Reconfigurable Antennas 98 3.4.1 Pattern-Reconfigurable Fractal Patch Antenna 103 3.4.2 Pattern-Reconfigurable Leaky-Wave Antenna 105 3.5 Multi-Reconfigurable Antennas 109 3.6 Conclusions 112 4 Receiving Amplifying Antennas 117 4.1 Introduction 117 4.2 Design Criteria and Considerations 118 4.3 Wearable Low-Noise Amplifying Antenna 118 4.4 Active Broadband Low-Noise Amplifying Antenna 128 4.5 Conclusions 139 5 Oscillating Antennas 145 5.1 Introduction 145 5.2 Design Methods for Microwave Oscillators 145 5.2.1 Design Using S Parameters 146 5.2.2 Design Using a Network Model 147 5.2.3 Specifications of Microwave Oscillators 147 5.3 Recent Developments and Issues of Antenna Oscillators 149 5.4 Reflection-Amplifier Antenna Oscillators 152 5.4.1 Rectangular DRAO 152 5.4.2 Hollow DRAO 158 5.4.3 Differential Planar Antenna Oscillator 161 5.5 Coupled-Load Antenna Oscillators 167 5.5.1 Coupled-Load Microstrip Patch Oscillator 167 5.5.2 Patch Antenna Oscillator with Feedback Loop 171 5.6 Conclusions 180 6 Solar-Cell-Integrated Antennas 185 6.1 Integration of Antennas with Solar Cells 185 6.2 Nonplanar Solar-Cell-Integrated Antennas 188 6.2.1 Solar-Cell-Integrated Hemispherical DRA 189 6.2.2 Solar-Cell-Integrated Rectangular DRA 201 6.3 Planar Solar-Cell-Integrated Antennas 204 6.3.1 Solar-Cell-Integrated U-Shaped SPA 208 6.3.2 Solar-Cell-Integrated V-Shaped SPA 219 6.4 Conclusions 223 References 224 Index 227

    15 in stock

    £86.36

  • Wireless Connectivity

    John Wiley & Sons Inc Wireless Connectivity

    15 in stock

    Book SynopsisWireless Connectivity: An Intuitive and Fundamental Guide Wireless connectivity has become an indispensable part, a commodity associated with the way we work and play. The latest developments, the 5G, next-generation Wi-Fi and Internet of Things connectivity, are the key enablers for widespread digitalization of practically all industries and public sector segments. This immense development within the last three decades have been accompanied by a large number of ideas, articles, patents, and even myths. This book introduces the most important ideas and concepts in wireless connectivity and discusses how these are interconnected, whilst the mathematical content is kept minimal. The book does not follow the established, linear structure in which one starts from the propagation and channels and then climbs up the protocol layers. The structure is, rather, nonlinear, in an attempt to follow the intuition used when one creates a new technology to solve a certain problem. The target audience is: Students in electronics, communication, and networkingWireless engineers that are specialized in one area, but want to know how the whole system works, without going through all the details and mathComputer scientists that want to understand the fundamentals of wireless connectivity, the requirements and, most importantly, the limitationsEngineers in energy systems, logistics, transport and other vertical sectors that are increasingly reliant on wireless technologyTable of ContentsForeword xv Acknowledgments xix Acronyms xxi 1 An Easy Introduction to the Shared Wireless Medium 3 1.1 How to Build a Simple Model for Wireless Communication 4 1.1.1 Which Features We Want from the Model 4 1.1.2 Communication Channel with Collisions 4 1.1.3 Trade-offs in the Collision Model 7 1.2 The First Contact 9 1.2.1 Hierarchy Helps to Establish Contact 9 1.2.2 Wireless Rendezvous without Help 11 1.2.3 Rendezvous with Full-Duplex Devices 12 1.3 Multiple Access with Centralized Control 12 1.3.1 A Frame for Time Division 13 1.3.2 Frame Header for Flexible Time Division 14 1.3.3 A Simple Two-Way System that Works Under the Collision Model 15 1.3.4 Still Not a Practical TDMA System 18 1.4 Making TDMA Dynamic 19 1.4.1 Circuit-Switched versus Packet-Switched Operation 19 1.4.2 Dynamic Allocation of Resources to Users 20 1.4.3 Short Control Packets and the Idea of Reservation 22 1.4.4 Half-Duplex versus Full-Duplex in TDMA 24 1.5 Chapter Summary 25 1.6 Further Reading 25 1.7 Problems and Reflections 26 2 Random Access: How to Talk in Crowded Dark Room 29 2.1 Framed ALOHA 30 2.1.1 Randomization that Maximizes the ALOHA Throughput 32 2.2 Probing 35 2.2.1 Combining ALOHA and Probing 39 2.3 Carrier Sensing 39 2.3.1 Randomization and Spectrum Sharing 39 2.3.2 An Idle Slot is Cheap 41 2.3.3 Feedback to the Transmitter 43 2.4 Random Access and Multiple Hops 45 2.4.1 Use of Reservation Packets in Multi-Hop 47 2.4.2 Multiple Hops and Full-Duplex 47 2.5 Chapter Summary 48 2.6 Further Reading 48 2.7 Problems and Reflections 48 3 Access Beyond the Collision Model 53 3.1 Distance Gets into the Model 53 3.1.1 Communication Degrades as the Distance Increases 53 3.1.2 How to Make the Result of a Collision Dependent on the Distance 55 3.2 Simplified Distance Dependence: A Double Disk Model 57 3.3 Downlink Communication with the Double Disk Model 58 3.3.1 A Cautious Example of a Design that Reaches the Limits of the Model 61 3.4 Uplink Communication with the Double Disk Model 62 3.4.1 Uplink that Uses Multi-Packet Reception 64 3.4.2 Buffered Collisions for Future Use 64 3.4.3 Protocols that Use Packet Fractions 66 3.5 Unwrapping the Packets 68 3.6 Chapter Summary 69 3.7 Further Reading 70 3.8 Problems and Reflections 70 4 The Networking Cake: Layering and Slicing 75 4.1 Layering for a One-Way Link 75 4.1.1 Modules and their Interconnection 75 4.1.2 Three Important Concepts in Layering 77 4.1.3 An Example of a Two-Layer System 78 4.2 Layers and Cross-Layer 79 4.3 Reliable and Unreliable Service from a Layer 81 4.4 Black Box Functionality for Different Communication Models 84 4.5 Standard Layering Models 86 4.5.1 Connection versus Connectionless 87 4.5.2 Functionality of the Standard Layers 88 4.5.3 A Very Brief Look at the Network Layer 89 4.6 An Alternative Wireless Layering 91 4.7 Cross-Layer Design for Multiple Hops 92 4.8 Slicing of the Wireless Communication Resources 94 4.8.1 Analog, Digital, Sliced 94 4.8.2 A Primer on Wireless Slicing 96 4.8.2.1 Orthogonal Wireless Slicing 96 4.8.2.2 Non-Orthogonal Wireless Slicing 98 4.9 Chapter Summary 100 4.10 Further Reading 100 4.11 Problems and Reflections 100 5 Packets Under the Looking Glass: Symbols and Noise 105 5.1 Compression, Entropy, and Bit 105 5.1.1 Obtaining Digital Messages by Compression 106 5.1.2 A Bit of Information 106 5.2 Baseband Modules of the Communication System 107 5.2.1 Mapping Bits to Baseband Symbols under Simplifying Assumptions 108 5.2.2 Challenging the Simplifying Assumptions about the Baseband 109 5.3 Signal Constellations and Noise 110 5.3.1 Constellation Points and Noise Clouds 110 5.3.2 Constellations with Limited Average Power 113 5.3.3 Beyond the Simple Setup for Symbol Detection 114 5.3.4 Signal-to-Noise Ratio (SNR) 116 5.4 From Bits to Symbols 117 5.4.1 Binary Phase Shift Keying (BPSK) 117 5.4.2 Quaternary Phase Shift Keying (QPSK) 118 5.4.3 Constellations of Higher Order 119 5.4.4 Generalized Mapping to Many Symbols 122 5.5 Symbol-Level Interference Models 123 5.5.1 Advanced Treatment of Collisions based on a Baseband Model 124 5.6 Weak and Strong Signals: New Protocol Possibilities 126 5.6.1 Randomization of Power 127 5.6.2 Other Goodies from the Baseband Model 129 5.7 How to Select the Data Rate 130 5.7.1 A Simple Relation between Packet Errors and Distance 130 5.7.2 Adaptive Modulation 132 5.8 Superposition of Baseband Symbols 134 5.8.1 Broadcast and Non-Orthogonal Access 135 5.8.2 Unequal Error Protection (UEP) 137 5.9 Communication with Unknown Channel Coefficients 138 5.10 Chapter Summary 141 5.11 Further Reading 142 5.12 Problems and Reflections 142 6 A Mathematical View on a Communication Channel 147 6.1 A Toy Example: The Pigeon Communication Channel 147 6.1.1 Specification of a Communication Channel 149 6.1.2 Comparison of the Information Carrying Capability of Mathematical Channels 150 6.1.3 Assumptions and Notations 151 6.2 Analog Channels with Gaussian Noise 151 6.2.1 Gaussian Channel 152 6.2.2 Other Analog Channels Based on the Gaussian Channel 152 6.3 The Channel Definition Depends on Who Knows What 154 6.4 Using Analog to Create Digital Communication Channels 158 6.4.1 Creating Digital Channels through Gray Mapping 158 6.4.2 Creating Digital Channels through Superposition 161 6.5 Transmission of Packets over Communication Channels 163 6.5.1 Layering Perspective of the Communication Channels 163 6.5.2 How to Obtain Throughput that is not Zero 164 6.5.3 Asynchronous Packets and Transmission of “Nothing” 167 6.5.4 Packet Transmission over a Ternary Channel 169 6.6 Chapter Summary 171 6.7 Further Reading 171 6.8 Problems and Reflections 172 7 Coding for Reliable Communication 177 7.1 Some Coding Ideas for the Binary Symmetric Channel 177 7.1.1 A Channel Based on Repetition Coding 177 7.1.2 Channel Based on Repetition Coding with Erasures 179 7.1.3 Coding Beyond Repetition 181 7.1.4 An Illustrative Comparison of the BSC Based Channels 182 7.2 Generalization of the Coding Idea 183 7.2.1 Maximum Likelihood (ML) Decoding 187 7.3 Linear Block Codes for the Binary Symmetric Channel 188 7.4 Coded Modulation as a Layered Subsystem 192 7.5 Retransmission as a Supplement to Coding 194 7.5.1 Full Packet Retransmission 195 7.5.2 Partial Retransmission and Incremental Redundancy 197 7.6 Chapter Summary 199 7.7 Further Reading 199 7.8 Problems and Reflections 199 8 Information-Theoretic View on Wireless Channel Capacity 203 8.1 It Starts with the Law of Large Numbers 203 8.2 A Useful Digression into Source Coding 204 8.3 Perfectly Reliable Communication and Channel Capacity 207 8.4 Mutual Information and Its Interpretations 209 8.4.1 From a Local to a Global Property 209 8.4.2 Mutual Information in Some Actual Communication Setups 211 8.5 The Gaussian Channel and the Popular Capacity Formula 214 8.5.1 The Concept of Entropy in Analog Channels 214 8.5.2 The Meaning of “Shannon’s Capacity Formula” 215 8.5.3 Simultaneous Usage of Multiple Gaussian Channels 217 8.6 Capacity of Fading Channels 219 8.6.1 Channel State Information Available at the Transmitter 219 8.6.2 Example: Water Filling for Binary Fading 221 8.6.3 Water Filling for Continuously Distributed Fading 222 8.6.4 Fast Fading and Further Remarks on Channel Knowledge 223 8.6.5 Capacity When the Transmitter Does Not Know the Channel 225 8.6.5.1 Channel with Binary Inputs and Binary Fading 225 8.6.5.2 Channels with Gaussian Noise and Fading 229 8.6.6 Channel Estimation and Knowledge 230 8.7 Chapter Summary 232 8.8 Further Reading 233 8.9 Problems and Reflections 233 9 Time and Frequency in Wireless Communications 237 9.1 Reliable Communication Requires Transmission of Discrete Values 237 9.2 Communication Through a Waveform: An Example 239 9.3 Enter the Frequency 242 9.3.1 Infinitely Long Signals and True Frequency 242 9.3.2 Bandwidth and Time-Limited Signals 245 9.3.3 Parallel Communication Channels 247 9.3.4 How Frequency Affects the Notion of Multiple Access 248 9.4 Noise and Interference 250 9.4.1 Signal Power and Gaussian White Noise 250 9.4.2 Interference between Non-Orthogonal Frequencies 252 9.5 Power Spectrum and Fourier Transform 255 9.6 Frequency Channels, Finally 258 9.6.1 Capacity of a Bandlimited Channel 259 9.6.2 Capacity and OFDM Transmission 261 9.6.3 Frequency for Multiple Access and Duplexing 261 9.7 Code Division and Spread Spectrum 263 9.7.1 Sharing Synchronized Resources with Orthogonal Codes 263 9.7.2 Why Go Through the Trouble of Spreading? 265 9.7.3 Mimicking the Noise and Covert Communication 268 9.7.4 Relation to Random Access 269 9.8 Chapter Summary 270 9.9 Further Reading 270 9.10 Problems and Reflections 270 10 Space in Wireless Communications 275 10.1 Communication Range and Coverage Area 276 10.2 The Myth about Frequencies that Propagate Badly in Free Space 278 10.3 The World View of an Antenna 280 10.3.1 Antenna Directivity 280 10.3.2 Directivity Changes the Communication Models 282 10.4 Multipath and Shadowing: Space is Rarely Free 283 10.5 The Final Missing Link in the Layering Model 286 10.6 The Time-Frequency Dynamics of the Radio Channel 288 10.6.1 How a Time-Invariant Channel Distorts the Received Signal 288 10.6.2 Frequency Selectivity, Multiplexing, and Diversity 291 10.6.3 Time-Variant Channel Introduces New Frequencies 292 10.6.4 Combined Time-Frequency Dynamics 295 10.7 Two Ideas to Deal with Multipath Propagation and Delay Spread 296 10.7.1 The Wideband Idea: Spread Spectrum and a RAKE Receiver 297 10.7.2 The Narrowband Idea: OFDM and a Guard Interval 299 10.8 Statistical Modeling of Wireless Channels 300 10.8.1 Fading Models: Rayleigh and Some Others 301 10.8.2 Randomness in the Path Loss 303 10.9 Reciprocity and How to Use It 303 10.10 Chapter Summary 305 10.11 Further Reading 305 10.12 Problems and Reflections 305 11 Using Two, More, or a Massive Number of Antennas 309 11.1 Assumptions about the Channel Model and the Antennas 310 11.2 Receiving or Transmitting with a Two-Antenna Device 311 11.2.1 Receiver with Two Antennas 311 11.2.2 Using Two Antennas at a Knowledgeable Transmitter 313 11.2.3 Transmit Diversity 314 11.3 Introducing MIMO 315 11.3.1 Spatial Multiplexing 317 11.4 Multiple Antennas for Spatial Division of Multiple Users 319 11.4.1 Digital Interference-Free Beams: Zero Forcing 320 11.4.2 Other Schemes for Precoding and Digital Beamforming 322 11.5 Beamforming and Spectrum Sharing 325 11.6 What If the Number of Antennas is Scaled Massively? 327 11.6.1 The Base Station Knows the Channels Perfectly 328 11.6.2 The Base Station has to Learn the Channels 329 11.7 Chapter Summary 331 11.8 Further Reading 331 11.9 Problems and Reflections 331 12 Wireless Beyond a Link: Connections and Networks 335 12.1 Wireless Connections with Different Flavors 335 12.1.1 Coarse Classification of the Wireless Connections 335 12.1.2 The Complex, Multidimensional World of Wireless Connectivity 337 12.2 Fundamental Ideas for Providing Wireless Coverage 339 12.2.1 Static or Moving Infrastructure 340 12.2.2 Cells and a Cellular Network 341 12.2.3 Spatial Reuse 343 12.2.4 Cells Come in Different Sizes 345 12.2.5 Two-Way Coverage and Decoupled Access 347 12.3 No Cell is an Island 348 12.3.1 Wired and Wireless Backhaul 348 12.3.2 Wireless One-Way Relaying and the Half-Duplex Loss 349 12.3.3 Wireless Two-Way Relaying: Reclaiming the Half-Duplex Loss 351 12.4 Cooperation and Coordination 355 12.4.1 Artificial Multipath: Treating the BS as Yet Another Antenna 355 12.4.2 Distributing and Networking the MIMO Concept 357 12.4.3 Cooperation Through a Wireless Backhaul 359 12.5 Dissolving the Cells into Clouds and Fog 360 12.5.1 The Unattainable Ideal Coverage 360 12.5.2 The Backhaul Links Must Have a Finite Capacity 362 12.5.3 Noisy Cooperation with a Finite Backhaul 363 12.5.4 Access Through Clouds and Fog 364 12.6 Coping with External Interference and Other Questions about the Radio Spectrum 366 12.6.1 Oblivious Rather Than Selfish 366 12.6.2 License to Control Interference 367 12.6.3 Spectrum Sharing and Caring 369 12.6.4 Duty Cycling, Sensing, and Hopping 371 12.6.5 Beyond the Licensed and Unlicensed and Some Final Words 372 12.7 Chapter Summary 374 12.8 Further Reading 374 12.9 Problems and Reflections 375 Bibliography 377 Index 381

    15 in stock

    £66.56

  • Evaluation of HSDPA to LTE

    John Wiley & Sons Inc Evaluation of HSDPA to LTE

    10 in stock

    Book SynopsisThis book explains how the performance of modern cellular wireless networks can be evaluated by measurements and simulations With the roll-out of LTE, high data throughput is promised to be available to cellular users. In case you have ever wondered how high this throughput really is, this book is the right read for you: At first, it presents results from experimental research and simulations of the physical layer of HSDPA, WiMAX, and LTE. Next, it explains in detail how measurements on such systems need to be performed in order to achieve reproducible and repeatable results. The book further addresses how wireless links can be evaluated by means of standard-compliant link-level simulation. The major challenge in this context is their complexity when investigating complete wireless cellular networks. Consequently, it is shown how system-level simulators with a higher abstraction level can be designed such that their results still match link-level simulations. Exemplarily, thTable of ContentsAbout the Authors xiii About the Contributors xv Preface xvii Acknowledgments xxiii List of Abbreviations xxv Part I CELLULAR WIRELESS STANDARDS Introduction 3 References 4 1 UMTS High-Speed Downlink Packet Access 5 1.1 Standardization and Current Deployment of HSDPA 5 1.2 HSDPA Principles 6 1.2.1 Network Architecture 7 1.2.2 Physical Layer 9 1.2.3 MAC Layer 13 1.2.4 Radio Resource Management 14 1.2.5 Quality of Service Management 16 1.3 MIMO Enhancements of HSDPA 17 1.3.1 Physical Layer Changes for MIMO 19 1.3.2 Precoding 21 1.3.3 MAC Layer Changes for MIMO 25 1.3.4 Simplifications of the Core Network 26 References 26 2 UMTS Long-Term Evolution 29 Contributed by Josep Colom Ikuno 2.1 LTE Overview 29 2.1.1 Requirements 29 2.2 Network Architecture 31 2.3 LTE Physical Layer 33 2.3.1 LTE Frame Structure 34 2.3.2 Reference and Synchronization Symbols 36 2.3.3 MIMO Transmission 37 2.3.4 Modulation and Layer Mapping 39 2.3.5 Channel Coding 41 2.3.6 Channel Adaptive Feedback 45 2.4 MAC Layer 46 2.4.1 Hybrid Automatic Repeat Request 46 2.4.2 Scheduling 47 2.5 Physical, Transport, and Logical Channels 48 References 51 Part II TESTBEDS FOR MEASUREMENTS Introduction 57 Reference 58 3 On Building Testbeds 59 3.1 Basic Idea 60 3.2 Transmitter 61 3.3 Receiver 63 3.4 Synchronization 65 3.5 Possible Pitfalls 67 3.5.1 Digital Baseband Hardware 67 3.5.2 Tool and Component Selection 68 3.5.3 Analog RF Front Ends 69 3.5.4 Cost 70 3.5.5 Matlab® Code and Testbeds 70 3.6 Summary 71 References 72 4 Quasi-Real-Time Testbedding 75 4.1 Basic Idea 75 4.2 Problem Formulation 77 4.3 Employing the Basic Idea 78 4.4 Data Collection 80 4.4.1 More Sophisticated Sampling Techniques 81 4.4.2 Variance Reduction Techniques 84 4.4.3 Bias 85 4.4.4 Outliers 86 4.4.5 Parameter Estimation 87 4.5 Evaluating and Summarizing the Data 88 4.6 Statistical Inference 90 4.6.1 Inferring the Population Mean 90 4.6.2 Precision and Sample Size 91 4.6.3 Reproducibility and Repeatability 92 4.7 Measurement Automation 95 4.8 Dealing with Feedback and Retransmissions 96 References 97 Part III EXPERIMENTAL LINK-LEVEL EVALUATION Introduction 101 5 HSDPA Performance Measurements 103 5.1 Mathematical Model of the Physical Layer 104 5.1.1 System Model for the Channel Estimation 106 5.1.2 System Model for the Equalizer Calculation 106 5.2 Receiver 107 5.2.1 Channel Estimation 107 5.2.2 Equalizer 112 5.2.3 Further Receiver Processing 113 5.3 Quantized Precoding 113 5.4 CQI and PCI Calculation 115 5.4.1 HS-PDSCH Interference 115 5.4.2 Pilot Interference 116 5.4.3 Synchronization and Control Channel Interference 116 5.4.4 Post-equalization Noise and SINR 118 5.4.5 SINR to CQI Mapping 119 5.5 Achievable Mutual Information 121 5.6 Measurement Results 124 5.6.1 Alpine Scenario 125 5.6.2 Urban Scenario 128 5.6.3 Discussion of the Implementation Loss 130 5.7 Summary 131 References 132 6 HSDPA Antenna Selection Techniques 139 Contributed by Jos´e Antonio Garc´ıa-Naya 6.1 Existing Research 141 6.2 Receive Antenna Selection 142 6.2.1 Antenna Selection Based on System Throughput 143 6.2.2 Hardware Aspects of Antenna Selection 143 6.3 An Exemplary Measurement and its Results 144 6.3.1 Urban Scenario 144 6.3.2 Experimental Assessment of Antenna Selection in HSDPA 145 6.3.3 Measurement Results and Discussion 147 6.4 Summary 148 References 149 7 HSDPA Antenna Spacing Measurements 153 7.1 Problem Formulation 153 7.2 Existing Research 154 7.3 Experimental Setup 155 7.4 Measurement Methodology 157 7.4.1 Inferring the Mean Scenario Throughput 157 7.4.2 Issues Requiring Special Attention 158 7.5 Measurement Results and Discussion 160 7.5.1 Equal Polarization Versus Cross-Polarization 160 7.5.2 Channel Capacity 160 7.5.3 Channel Capacity Versus Mutual Information 162 7.5.4 Mutual Information Versus Achievable Mutual Information 162 7.5.5 Achievable Mutual Information Versus Throughput 163 7.5.6 Throughput 163 7.6 Different Transmit Power Levels and Scenarios 163 References 164 8 Throughput Performance Comparisons 167 8.1 Introduction 167 8.2 Cellular Systems Investigated: WiMAX and HSDPA 168 8.2.1 WiMAX and HSDPA 168 8.2.2 Throughput Bounds and System Losses 169 8.3 Measurement Methodology and Setup 172 8.4 Measurement Results 173 8.4.1 WiMAX Results 173 8.4.2 HSDPA Results in Standard-Compliant Setting 177 8.4.3 HSDPA Results in Advanced Setting 179 8.5 Summary 179 References 182 9 Frequency Synchronization in LTE 183 Contributed by Qi Wang 9.1 Mathematical Model 184 9.2 Carrier Frequency Offset Estimation in LTE 186 9.2.1 Standardized Training Symbols in LTE 186 9.2.2 Maximum Likelihood Estimators 188 9.3 Performance Evaluation 191 9.3.1 Estimation Performance 192 9.3.2 Post-FFT SINR 194 9.3.3 Post-equalization SINR and Throughput 195 References 199 10 LTE Performance Evaluation 201 Contributed by Stefan Schwarz 10.1 Mathematical Model of the Physical Layer 202 10.2 Receiver 203 10.2.1 Channel Estimation 204 10.2.2 Data Detection 205 10.2.3 Further Receiver Processing 206 10.3 Physical Layer Modeling 206 10.3.1 Post-equalization SINR 207 10.3.2 SINR Averaging 207 10.4 User Equipment Feedback Calculation 208 10.4.1 User Equipment Feedback Indicators 208 10.4.2 Calculation of the CQI, PMI, and RI 210 10.5 Practical Throughput Bounds 216 10.5.1 Channel Capacity 216 10.5.2 Open-Loop Mutual Information 217 10.5.3 Closed-Loop Mutual Information 218 10.5.4 BICM Bounds 219 10.5.5 Achievable Throughput Bounds 222 10.5.6 Prediction of the Optimal Performance 223 10.6 Simulation Results 224 10.6.1 SISO Transmission 225 10.6.2 OLSM Transmission 227 10.6.3 CLSM Transmission 229 References 230 Part IV SIMULATORS FOR WIRELESS SYSTEMS Introduction 237 References 240 11 LTE Link- and System-Level Simulation 243 Contributed by Josep Colom Ikuno 11.1 The Vienna LTE Link Level Simulator 245 11.1.1 Structure of the Simulator 245 11.1.2 Complexity 247 11.2 The Vienna LTE System Level Simulator 250 11.2.1 Structure of the Simulator 250 11.2.2 Simulator Implementation 252 11.2.3 Complexity 253 11.3 Validation of the Simulators 255 11.3.1 3GPP Minimum Performance Requirements 257 11.3.2 Link- and System-Level Cross-Comparison 257 11.4 Exemplary Results 259 11.4.1 Link-Level Throughput 259 11.4.2 LTE Scheduling 262 References 265 12 System-Level Modeling for MIMO-Enhanced HSDPA 271 12.1 Concept of System-Level Modeling 271 12.2 Computationally Efficient Link-Measurement Model 273 12.2.1 Receive Filter 274 12.2.2 WCDMA MIMO in the Network Context 276 12.2.3 Equivalent Fading Parameters Description 278 12.2.4 Generation of the Equivalent Fading Parameters 284 12.2.5 Influence of Non-Data Channels 286 12.2.6 Resulting SINR Description 287 12.3 Link-Performance Model 288 12.3.1 Link-Performance Model Concept 289 12.3.2 Training and Validation of the Model 293 References 296 Part V SIMULATION-BASED EVALUATION FOR WIRELESS SYSTEMS Introduction 301 13 Optimization of MIMO-Enhanced HSDPA 303 13.1 Network Performance Prediction 303 13.1.1 Simulation Setup 303 13.1.2 Single Network Scenario Investigation 304 13.1.3 Average Network Performance 306 13.2 RLC-Based Stream Number Decision 310 13.2.1 UE Decision 310 13.2.2 RLC Decision 311 13.2.3 System-Level Simulation Results 311 13.3 Content-Aware Scheduling 313 13.3.1 Video Packet Prioritization in HSDPA 313 13.3.2 Content-Aware Scheduler 314 13.3.3 Simulation Results 315 13.4 CPICH Power Optimization 316 13.4.1 System-Level Modeling of the CPICH Influence 317 13.4.2 CPICH Optimization in the Cellular Context 318 References 321 14 Optimal Multi-User MMSE Equalizer 325 14.1 System Model 326 14.2 Intra-Cell Interference Aware MMSE Equalization 330 14.2.1 Interference Suppression Capability 332 14.3 The Cell Precoding State 334 14.3.1 Training-Sequence-Based Precoding State Estimation 336 14.3.2 Blind Precoding State Estimation 337 14.3.3 Estimator Performance 339 14.4 Performance Evaluation 340 14.4.1 Physical-Layer Simulation Results 340 14.4.2 System-Level Simulation Results 341 References 343 15 LTE Advanced Versus LTE 347 Contributed by Stefan Schwarz 15.1 IMT-Advanced and 3GPP Performance Targets 348 15.2 Radio Interface Enhancements 349 15.2.1 Bandwidth Extension 349 15.2.2 Enhanced MIMO 350 15.2.3 Uplink Improvements 351 15.2.4 Beyond Release 10 352 15.3 MIMO in LTE Advanced 354 15.3.1 Codebook-Based Precoding 354 15.3.2 Non-Codebook-Based Precoding 356 15.4 Physical-Layer Throughput Simulation Results 359 15.4.1 Eight-Antenna Transmission 359 15.4.2 Comparison between LTE and LTE Advanced 363 15.4.3 Comparison of SU-MIMO and MU-MIMO 363 References 366 Index 369

    10 in stock

    £100.65

  • RFID Systems

    John Wiley & Sons Inc RFID Systems

    10 in stock

    Book SynopsisThis book provides an insight into the ''hot'' field of Radio Frequency Identification (RFID) Systems In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews various algorithms, protocols and design solutions that have been developed within the area, including most recent advances. In addition, authors cover a wide range of recognized problems in RFID industry, striking a balance between theoretical and practical coverage. Limitations of the technology and state-of-the-art solutions are identified and new research opportunities are addressed. Finally, the book is authored by experts and respected researchers in the field and every chapter is peer reviewed. Key Features: Provides the most comprehensive analysis of networking aspects of RFID systems, including tag identification protocols aTable of ContentsAbout the Editors. Preface. Acknowledgements. Part I COMPONENTS OF RFID SYSTEMS AND PERFORMANCE METRICS. 1 Performance of Passive UHF RFID Systems in Practice (Miodrag Bolic, Akshay Athalye, and Tzu Hao Li). 1.1 Introduction. 1.2 Ideal RFID System. 1.3 Practical RFID Systems. 1.4 Overview of the Book. 1.5 Conclusion. References. 2 Performance Metrics and Operational Parameters of RFID Systems (Raj Bridelall and Abhiman Hande). 2.1 Overview. 2.2 Key Operational Parameters. 2.3 Classification of Commercially Available Products. 2.4 Conclusion. Problems. References. 3 UHF RFID Antennas (Daniel Deavours). 3.1 Dipoles and Relatives. 3.2 T-Match and Relatives. 3.3 Putting it Together: Building an RFID Tag. 3.4 The Environment. 3.5 Conclusions, Trends, and Challenges. References. 4 RFID Tag Chip Design (Na Yan, Wenyi Che, Yuqing Yang, and Qiang Li). 4.1 Tag Architecture Systems. 4.2 Memory in Standard CMOS Processes. 4.3 Baseband of RFID Tag. 4.4 RFID Tag Performance Optimization. 4.5 Conclusion. Problems. References. 5 Design of Passive Tag RFID Readers (Scott Chiu). 5.1 Overview. 5.2 Basics of Passive RFID Operation. 5.3 Passive RFID Reader Designs. 5.4 Advanced Topics on RFID Reader Design. 5.5 Conclusion. Problems. References. 6 RFID Middleware: Concepts and Architecture (Nathalie Mitton, Loïc Schmidt, and David Simplot-Ryl). 6.1 Introduction. 6.2 Overview of an RFID Middleware Architecture. 6.3 Readers Management. 6.4 Data Management and Application-Level Events. 6.5 Store and Share Data. 6.6 Example. 6.7 Conclusion. Problems. References. Part II TAG IDENTIFICATION PROTOCOLS. 7 Aloha-Based Protocols (Kwan-Wu Chin and Dheeraj Klair). 7.1 Pure Aloha. 7.2 Slotted Aloha. 7.3 Framed Slotted Aloha. 7.4 Conclusion. Problems. References. 8 Tree-Based Anti-Collision Protocols for RFID Tags (Petar Popovski). 8.1 Introduction. 8.2 Principles of Tree-Based Anti-Collision Protocols. 8.3 Tree Protocols in the Existing RFID Specifications. 8.4 Practical Issues and Transmission Errors. 8.5 Cooperative Readers and Generalized Arbitration Spaces. 8.6 Conclusion. Problems. References. 9 A Comparison of TTF and RTF UHF RFID Protocols (Alwyn Hoffman, Johann Holm, and Henri-Jean Marais). 9.1 Introduction. 9.2 Requirements for RFID Protocols. 9.3 Different Approaches Used in UHF Protocols. 9.4 Description of Stochastic TTF Protocols. 9.5 Comparison between ISO18000-6C and TTF Protocols. 9.6 Conclusion. Problems. References. Part III READER INFRASTRUCTURE NETWORKING. 10 Integrating RFID Readers in Enterprise IT (Christian Floerkemeier and Sanjay Sarma). 10.1 Related Work. 10.2 RFID System Services. 10.3 Reader Capabilities. 10.4 RFID System Architecture Taxonomy. 10.5 EPCglobal Standards. 10.6 Adoption of High-Level Reader Protocols. 10.7 Potential Future Standardization Activities. 10.8 Conclusion. Problems. References. 11 Reducing Interference in RFID Reader Networks (Sung Won Kim and Gyanendra Prasad Joshi). 11.1 Introduction. 11.2 Interference Problem in RFID Reader Networks. 11.3 Access Mechanism, Regulations, Standards and Algorithms. 11.4 Comparison. 11.5 Conclusion. Problems. References. 12 Optimal Tag Coverage and Tag Report Elimination (Bogdan Carbunar, Murali Krishna Ramanathan, Mehmet Koyuturk, Suresh Jagannathan, and Ananth Grama). 12.1 Introduction. 12.2 Overview of RFID Systems. 12.3 Tree Walking: An Algorithm for Detecting Tags in the Presence of Collisions. 12.4 Reader Collision Avoidance. 12.5 Coverage Redundancy in RFID Systems: Comparison with Sensor Networks. 12.6 Network Model. 12.7 Optimal Tag Coverage and Tag Reporting. 12.8 Redundant Reader Elimination Algorithms: A Centralized Heuristic. 12.9 RRE: A Distributed Solution. 12.10 Adapting to Topological Changes. 12.11 The Layered Elimination Optimization (LEO). 12.12 Related Work. 12.13 Conclusion. Problems. References. 13 Delay/Disruption-Tolerant Mobile RFID Networks: Challenges and Opportunities (Hongyi Wu and Zhipeng Yang). 13.1 Motivation. 13.2 Overview of FINDERS. 13.3 General Feasibility Study. 13.4 Unique Challenges and Tactics. 13.5 Related Work. 13.6 Conclusion. Problems. References. Part IV ADDRESSING OTHER CHALLENGES IN RFID SYSTEMS. 14 Improving Read Ranges and Read Rates for Passive RFID Systems (Zhiguang Fan, Fazhong Shen, Jianhua Shen, and Lixin Ran). 14.1 Introduction. 14.2 Signal Descriptions and Formulations for Passive Backscatter RFID Systems. 14.3 Improving the Read Range of a Passive RFID System. 14.4 Improving the Read Rate of a Passive RFID System. 14.5 Two Design Examples for RFID System. 14.6 Conclusion. Problems. References. 15 Principles and Techniques of RFID Positioning (Yimin Zhang, Xin Li, and Moeness Amin). 15.1 Introduction. 15.2 Tag Range Estimation Techniques. 15.3 DOA Estimation Techniques. 15.4 RFID Positioning Techniques. 15.5 Improving Positioning Accuracy. 15.6 Conclusion. Problems. References. 16 Towards Secure and Privacy-Enhanced RFID Systems (Heiko Knospe and Kerstin Lemke-Rust). 16.1 Introduction. 16.2 Security and Privacy. 16.3 Classification of RFID Systems. 16.4 Attacks on RFID Systems and Appropriate Countermeasures. 16.5 Lightweight Cryptography for RFID. 16.6 Conclusion. Problems. References. 17 Cryptographic Approaches for Improving Security and Privacy Issues of RFID Systems (Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita). 17.1 Introduction. 17.2 Threats against the RFID System. 17.3 Required Properties. 17.4 Cryptographic Protocols for Identification with Privacy. 17.5 Cryptographic Protocols for Authentication without Privacy. 17.6 Cryptographic Protocols for Privacy and Other Requirements. 17.7 Implementation. 17.8 Real Systems and Attacks. 17.9 Conclusion. Problems. References. 18 Novel RFID Technologies: Energy Harvesting for Self-Powered Autonomous RFID Systems (Raj Bridelall and Abhiman Hande). 18.1 Introduction. 18.2 Novel Low Power Architectures. 18.3 Energy Harvesting Optimized for RFID. 18.4 Future Trends in Energy Harvesting. 18.5 Conclusion. Problems. References. 19 Simulators and Emulators for Different Abstraction Layers of UHF RFID Systems (Christian Steger, Alex Janek, Reinhold Weiß, Vojtech Derbek, Manfred Jantscher, Josef Preishuber-Pfluegl, and Markus Pistauer). 19.1 Introduction. 19.2 The Simulation/Emulation Platforms. 19.3 UHF RFID Simulation Platform. 19.4 Real-Time HIL-Verification and Emulation Platform. 19.5 Higher Class Tag Architecture Based on Energy Harvesting. 19.6 Conclusion. Problems. References. Index.

    10 in stock

    £113.95

  • 60GHz Technology for Gbps WLAN and WPAN

    John Wiley & Sons Inc 60GHz Technology for Gbps WLAN and WPAN

    1 in stock

    Book SynopsisThis book addresses 60 GHz technology for Gbps WLAN and WPAN from theory to practice, covering key aspects for successful deployment. In this book, the authors focus specifically on 60 GHz wireless technology which has emerged as the most promising candidate for multi-gigabit wireless indoor communication systems.Table of ContentsPreface xiii List of Contributors xvii 1 Introduction to 60GHz 1 Su-Khiong (SK) Yong 1.1 What is 60 GHz? 1 1.2 Comparison with other Unlicensed Systems 2 1.3 Potential Applications 6 1.4 Worldwide Regulation and Frequency Allocation 7 1.4.1 North America 7 1.4.2 Japan 8 1.4.3 Australia 9 1.4.4 Korea 9 1.4.5 Europe 9 1.5 Industry Standardization Effort 10 1.5.1 IEEE 802.15.3c 11 1.5.2 ECMA 387 12 1.5.3 WirelessHD 13 1.5.4 IEEE 802.11.ad 14 1.5.5 Wireless Gigabit Alliance 14 1.6 Summary 14 References 15 2 60GHz Channel Characterizations and Modeling 17 Su-Khiong (SK) Yong 2.1 Introduction to Wireless Channel Modeling 17 2.2 Modeling Approach and Classification of Channel Model 18 2.2.1 Deterministic Modeling 18 2.2.2 Stochastic Modeling 20 2.3 Channel Characterization 21 2.3.1 Large-Scale Channel Characterization 21 2.3.2 Small-Scale Channel Characterization 29 2.3.3 Polarization 40 2.4 Industry Standard Channel Models 43 2.4.1 IEEE 802.15.3c 43 2.4.2 IEEE 802.11ad 47 2.5 Summary 57 References 57 3 Non-Ideal Radio Frequency Front-End Models in 60GHz Systems 63 Chang-Soon Choi, Maxim Piz and Eckhard Grass 3.1 RF Front-End Architecture 64 3.1.1 Super-Heterodyne Architecture 64 3.1.2 Direct-Conversion Architecture 66 3.1.3 Low-IF Architecture 66 3.2 Nonlinear Power Amplifier 67 3.2.1 Tradeoff Between Linearity and Efficiency 67 3.2.2 Nonlinearity Modeling 69 3.2.3 Behavioral Models 71 3.2.4 Output Backoff Versus Peak-to-Average Power Ratio 75 3.2.5 Impact of Nonlinear Power Amplifier 76 3.3 Phase Noise from Oscillators 78 3.3.1 Modeling of Phase Noise in Phase-Locked Loops 78 3.3.2 Behavioral Modeling for Phase Noise in Phase-Locked Loops 82 3.4 Other RF Non-Idealities 82 3.4.1 Quantization Noise in Data Converters 82 3.4.2 I/Q Mismatch 86 References 87 4 Antenna Array Beamforming in 60GHz 89 Pengfei Xia 4.1 Introduction 89 4.2 60 GHz Channel Characteristics 90 4.2.1 Path Loss and Oxygen Absorption 90 4.2.2 Multipath Fading 91 4.3 Antenna Array Beamforming 93 4.3.1 Training for Adaptive Antenna Arrays 95 4.3.2 Training for Switched Antenna Arrays 107 4.3.3 Channel Access in 60 GHz Wireless Networks 110 4.4 Summary 115 References 115 5 Baseband Modulation 117 Pengfei Xia and André Bourdoux 5.1 Introduction 117 5.2 OFDM Baseband Modulation 120 5.2.1 Principles of OFDM 120 5.2.2 OFDM Design Considerations 123 5.3 Case Study: IEEE 802.15.3c Audio Video OFDM 126 5.3.1 Uncompressed Video Communications 126 5.3.2 Equal and Unequal Error Protection 127 5.3.3 Bit Interleaving and Multiplexing 130 5.3.4 AV OFDM Modulation 132 5.4 SC with Frequency-Domain Equalization 135 5.4.1 Introduction 135 5.4.2 Case Study: IEEE 802.15.3c SC PHY 137 5.5 SC Transceiver Design and System Aspects 142 5.5.1 Transmit and Receive Architecture 142 5.5.2 SC with Frequency-Domain Equalization 146 5.6 Digital Baseband Processing 149 5.6.1 Burst Detection and Rough Timing/CFO Acquisition 149 5.6.2 Joint Fine CFO and Channel Estimation Without I/Q Imbalance 155 5.6.3 Joint Estimation of Fine CFO, Channel and I/Q Imbalance 156 5.6.4 Time-Domain Equalization, Despreading and Tracking 161 References 166 6 60GHz Radio Implementation in Silicon 169 Alberto Valdes-Garcia 6.1 Introduction 169 6.2 Overview of Semiconductor Technologies for 60 GHz Radios 170 6.3 60 GHz Front-End Components 173 6.3.1 60 GHz LNAs in SiGe and CMOS 174 6.3.2 60 GHz PAs in SiGe and CMOS 176 6.3.3 Process Variability in Silicon Millimeter-Wave Designs 179 6.4 Frequency Synthesis and Radio Architectures 180 6.5 Radio–Baseband Interface 182 6.5.1 ADCs and DACs for Wide Bandwidth Signals 182 6.5.2 Modulators, Demodulators and Analog Signal Processors for Gbps Applications 187 References 189 7 Hardware Implementation for Single Carrier Systems 193 Yasunao Katayama 7.1 Introduction 193 7.2 Advantages and Challenges of SC Systems 194 7.3 System Design with Non-Coherent Detection 196 7.4 System Design with Differentially Coherent Detection 201 7.5 Test and Evaluation 203 7.6 Advanced SC System with Per-Packet Coherent Detection 205 7.7 Conclusion 209 References 209 8 Gbps OFDM Baseband Design and Implementation for 60GHz Wireless LAN Applications 211 Chang-Soon Choi, Maxim Piz, Marcus Ehrig and Eckhard Grass 8.1 OFDM Physical Layer Implemented on FPGA 212 8.1.1 Designed OFDM Physical Layer 212 8.1.2 Performance Evaluation in the Presence of Clock Deviation and Phase Noise 214 8.2 OFDM Baseband Receiver Architecture 214 8.2.1 Receiver Front-End 217 8.2.2 Receiver Back-End 222 8.3 OFDM Baseband Transmitter Architecture 225 8.4 60 GHz Link Demonstration 226 8.4.1 60 GHz OFDM Demonstrator Architecture 226 8.4.2 Wireless Link Demonstration with 60 GHz Radio 227 8.5 Next-Generation OFDM Demonstrators for 60 GHz Wireless LAN Applications 229 8.5.1 Channel Plan and RF Transceiver 230 8.5.2 Next-Generation Multi-Gbps OFDM Physical Layers 231 8.5.3 Performance Evaluation with 60 GHz NLOS Channel and 60 GHz Phase Noise Models 232 References 236 9 Medium Access Control Design 239 Harkirat Singh 9.1 Design Issues in the Use of Directional Antennas 240 9.2 IEEE 802.15.3c MAC for 60 GHz 244 9.2.1 Neighbor Discovery 244 9.2.2 Aggregation and Block-ACK 245 9.3 Design Considerations for Supporting Uncompressed Video 252 9.3.1 Pixel Partitioning 254 9.3.2 Uncompressed Video ARQ 255 9.3.3 Unequal Error Protection 256 9.3.4 Error Concealment 257 9.4 Performance Study 258 9.4.1 Effect of UEP and EEP 260 9.4.2 Stability of UEP 261 9.4.3 VQM Scores 262 9.5 Conclusions and Future Directions 263 References 264 10 Remaining Challenges and Future Directions 267 Alberto Valdes-Garcia, Pengfei Xia, Su-Khiong Yong and Harkirat Singh References 270 Index 273

    1 in stock

    £80.96

  • 3g Hspa and Fdd Versus Tdd Networking

    John Wiley & Sons Inc 3g Hspa and Fdd Versus Tdd Networking

    10 in stock

    Book Synopsis3G, HSPA and FDD versus TDD Networking, Second Edition is the only book that contrasts the network capacity gains that may be achieved with the advent of adaptive antenna arrays and HSDPA-style adaptive modulation techniques in the context of FDD and TDD CDMA cellular networks.Table of ContentsAbout the Authors xv Other Wiley and IEEE Press Books on Related Topics xvii Preface xix Acknowledgments xxxi 1 Third-generation CDMA Systems 1 1.1 Introduction 1 1.2 Basic CDMA System 2 1.2.1 Spread Spectrum Fundamentals 2 1.2.2 The Effect of Multipath Channels 6 1.2.3 Rake Receiver 9 1.2.4 Multiple Access 13 1.2.5 Spreading Codes 19 1.2.6 Channel Estimation 22 1.2.7 Summary 26 1.3 Third-generation Systems 26 1.3.1 Introduction 26 1.3.2 UMTS Terrestrial Radio Access (UTRA) 29 1.3.3 The cdma2000 Terrestrial Radio Access 68 1.3.4 Performance-enhancement Features 82 1.3.5 Summary of 3G Systems 84 1.4 Summary and Conclusions 85 2 High Speed Downlink and Uplink Packet Access 87 2.1 Introduction 87 2.2 High Speed Downlink Packet Access 88 2.2.1 Physical Layer 92 2.2.2 Medium Access Control (MAC) Layer 98 2.3 High Speed Uplink Packet Access 99 2.3.1 Physical Layer 102 2.3.2 MAC Layer 108 2.4 Implementation Issues 112 2.4.1 HS-SCCH Detection Algorithm 112 2.4.2 16QAM 115 2.4.3 HARQ Result Processing Time 116 2.4.4 Crest Factor 117 3 HSDPA-style Burst-by-Burst Adaptive Wireless Transceivers 119 3.1 Motivation 119 3.2 Narrowband Burst-by-Burst Adaptive Modulation 120 3.3 Wideband Burst-by-Burst Adaptive Modulation 123 3.3.1 Channel Quality Metrics 123 3.4 Wideband BbB-AQAM Video Transceivers 126 3.5 BbB-AQAM Performance 129 3.6 Wideband BbB-AQAM Video Performance 131 3.6.1 AQAM Switching Thresholds 133 3.6.2 Turbo-coded AQAM Videophone Performance 135 3.7 Burst-by-Burst Adaptive Joint-Detection CDMA Video Transceiver 136 3.7.1 Multi-user Detection for CDMA 136 3.7.2 JD-ACDMA Modem Mode Adaptation and Signalling 138 3.7.3 The JD-ACDMA Video Transceiver 139 3.7.4 JD-ACDMA Video Transceiver Performance 141 3.8 Subband-adaptive OFDM Video Transceivers 145 3.9 Summary and Conclusions 150 4 Intelligent Antenna Arrays and Beamforming 151 4.1 Introduction 151 4.2 Beamforming 152 4.2.1 Antenna Array Parameters 152 4.2.2 Potential Benefits of Antenna Arrays in Mobile Communications 153 4.2.3 Signal Model 162 4.2.4 A Beamforming Example 165 4.2.5 Analog Beamforming 166 4.2.6 Digital Beamforming 167 4.2.7 Element-space Beamforming 167 4.2.8 Beam-space Beamforming 168 4.3 Adaptive Beamforming 169 4.3.1 Fixed Beams 170 4.3.2 Temporal Reference Techniques 171 4.3.3 Spatial Reference Techniques 184 4.3.4 Blind Adaptation 187 4.3.5 Adaptive Arrays in the Downlink 189 4.3.6 Adaptive Beamforming Performance Results 191 4.4 Summary and Conclusions 213 5 Adaptive Arrays in an FDMA/TDMA Cellular Network 215 5.1 Introduction 215 5.2 Modelling Adaptive Antenna Arrays 216 5.2.1 Algebraic Manipulation with Optimal Beamforming 216 5.2.2 Using Probability Density Functions 218 5.2.3 Sample Matrix Inversion Beamforming 219 5.3 Channel Allocation Techniques 220 5.3.1 Overview of Channel Allocation 221 5.3.2 Simulation of the Channel Allocation Algorithms 232 5.3.3 Overview of Channel Allocation Algorithms 236 5.3.4 DCA Performance without Adaptive Arrays 241 5.4 Employing Adaptive Antenna Arrays 242 5.5 Multipath Propagation Environments 245 5.6 Network Performance Results 251 5.6.1 System Simulation Parameters 252 5.6.2 Non-wraparound Network Performance Results 261 5.6.3 Wrap-around Network Performance Results 292 5.7 Summary and Conclusions 315 6 HSDPA-style FDD Networking, Adaptive Arrays and Adaptive Modulation 317 6.1 Introduction 317 6.2 Direct Sequence Code Division Multiple Access 318 6.3 UMTS Terrestrial Radio Access 320 6.3.1 Spreading and Modulation 321 6.3.2 Common Pilot Channel 325 6.3.3 Power Control 326 6.3.4 Soft Handover 328 6.3.5 Signal-to-interference plus Noise Ratio Calculations 329 6.3.6 Multi-user Detection 331 6.4 Simulation Results 332 6.4.1 Simulation Parameters 332 6.4.2 The Effect of Pilot Power on Soft Handover Results 336 6.4.3 Ec/Io Power Based Soft Handover Results 351 6.4.4 Overview of Results 363 6.4.5 Performance of Adaptive Antenna Arrays in a High Data Rate Pedestrian Environment 365 6.4.6 Performance of Adaptive Antenna Arrays and Adaptive Modulation in a High Data Rate Pedestrian Environment 373 6.5 Summary and Conclusions 380 7 HSDPA-style FDD/CDMA Performance Using Loosely Synchronized Spreading Codes 383 7.1 Effects of Loosely Synchronized Spreading Codes on the Performance of CDMA Systems 383 7.1.1 Introduction 383 7.1.2 Loosely Synchronized Codes 384 7.1.3 System Parameters 386 7.1.4 Simulation Results 388 7.1.5 Summary 391 7.2 Effects of Cell Size on the UTRA Performance 392 7.2.1 Introduction 392 7.2.2 System Model and System Parameters 393 7.2.3 Simulation Results and Comparisons 395 7.2.4 Summary and Conclusion 400 7.3 Effects of SINR Threshold on the Performance of CDMA Systems 401 7.3.1 Introduction 401 7.3.2 Simulation Results 402 7.3.3 Summary and Conclusion 406 7.4 Network-layer Performance of Multi-carrier CDMA 407 7.4.1 Introduction 407 7.4.2 Simulation Results 413 7.4.3 Summary and Conclusions 419 8 HSDPA-style TDD/CDMA Network Performance 421 8.1 Introduction 421 8.2 UMTS FDD versus TDD Terrestrial Radio Access 422 8.2.1 FDD versus TDD Spectrum Allocation of UTRA 422 8.2.2 Physical Channels 423 8.3 UTRATDD/CDMA System 424 8.3.1 The TDD Physical Layer 425 8.3.2 Common Physical Channels of the TDD Mode 425 8.3.3 Power Control 426 8.3.4 Time Advance 428 8.4 Interference Scenario in TDD CDMA 428 8.4.1 Mobile-to-Mobile Interference 429 8.4.2 Base Station-to-Base Station Interference 429 8.5 Simulation Results 430 8.5.1 Simulation Parameters 431 8.5.2 Performance of Adaptive Antenna Array Aided TDD CDMA Systems 433 8.5.3 Performance of Adaptive Antenna Array and Adaptive Modulation Aided TDD HSDPA-style Systems 438 8.6 Loosely Synchronized Spreading Code Aided Network Performance Of UTRA-like TDD/CDMA Systems 442 8.6.1 Introduction 442 8.6.2 LS Codes in UTRA TDD/CDMA 444 8.6.3 System Parameters 445 8.6.4 Simulation Results 446 8.6.5 Summary and Conclusions 449 9 The Effects of Power Control and Hard Handovers on the UTRA TDD/CDMA System 451 9.1 A Historical Perspective on Handovers 451 9.2 Hard HO in UTRA-like TDD/CDMA Systems 452 9.2.1 Relative Pilot Power-based Hard HO 453 9.2.2 Simulation Results 454 9.3 Power Control in UTRA-like TDD/CDMA Systems 464 9.3.1 UTRATDD Downlink Closed-loop Power Control 464 9.3.2 UTRA TDD Uplink Closed-loop Power Control 466 9.3.3 Closed-loop Power Control Simulation Results 466 9.3.4 UTRA TDDUL Open-loop Power Control 475 9.3.5 Frame-delay-based Power Adjustment Model 476 9.4 Summary and Conclusion 486 10 Genetically Enhanced UTRA/TDD Network Performance 489 10.1 Introduction 489 10.2 The Genetically Enhanced UTRA-like TDD/CDMA System 490 10.3 Simulation Results 494 10.4 Summary and Conclusion 499 11 Conclusions and Further Research 501 11.1 Summary of FDD Networking 501 11.2 Summary of FDD versus TDD Networking 506 11.3 Further Research 511 11.3.1 Advanced Objective Functions 513 11.3.2 Other Types of GAs 513 Glossary 515 Bibliography 521 Subject Index 547 Author Index 553

    10 in stock

    £163.35

  • Networking Fundamentals

    John Wiley & Sons Inc Networking Fundamentals

    15 in stock

    Book SynopsisFocusing on the physical layer, Networking Fundamentals provides essential information on networking technologies that are used in both wired and wireless networks designed for local area networks (LANs) and wide-area networks (WANs). The book starts with an overview of telecommunications followed by four parts, each including several chapters. Part I explains the principles of design and analysis of information networks at the lowest layers. It concentrates on the characteristics of the transmission media, applied transmission and coding, and medium access control. Parts II and III are devoted to detailed descriptions of important WANs and LANs respectively with Part II describing the wired Ethernet and Internet as well as cellular networks while Part III covers popular wired LANs and wireless LANs (WLANs), as well as wireless personal area network (WPAN) technologies. Part IV concludes by examining security, localization and sensor networking. The partitioned structure of the Trade Review?5/5 stars? (IT Training, November 2009) ?I would wholeheartedly recommend the book to everyone, whether novices or expert, as it covers an incredible amount of knowledge on communication.? (BCS, September 2009)Table of ContentsAbout the Authors. Preface. 1. Introduction to Information Networks. 1.1 Introduction. 1.2 Evolution of Wide-Area Networks. 1.3 Evolution of Local Networks. 1.4 Structure of the book. PART ONE: FUNDAMENTALS OF TRANSMISSION AND ACCESS. 2. Characteristics of the Medium. 2.1 Introduction. 2.2 Guided Media. 2.3 Wireless Media. 3. Fundamentals of Physical Layer Transmission. 3.1 Information Transmission. 3.2 Transmission Techniques and Signal Constellation. 3.3 Performance of the Physical Layer. 3.4 Wideband Modems. 4. Coding and Reliable Packet Transmission. 4.1 Introduction. 4.2 Source Coding and Framing Techniques. 4.3 FEC Coding. 4.4 Coding for Spread-Spectrum and Code-Division Multiple Access Systems. 4.5 ARQ Schemes. 4.6 Flow Control Protocols. 5. Medium Access Methods. 5.1 Introduction. 5.2 Centralized Assigned Access Schemes. 5.3 Distributed Random Access Networks. 5.4 Integration of Voice and Data Traffic. PART TWO: WIDE-AREA NETWORKS. 6. The Internet. 6.1 Introduction: Internet Infrastructure. 6.2 Addressing. 6.3 Quality of Service. 6.4 Bridges or LAN Switches. 6.5 Switches. 6.6 Routers. 7. Cellular Networks. 7.1 Introduction. 7.2 General Architecture of a Cellular Network. 7.3 Mechanisms to Support a Mobile Environment. 7.4 Protocol Stack in Cellular Networks. 7.5 Physical Layer in TDMA Air Interface. 7.6 Physical Layer in CDMA Air Interface. 7.7 Achieving Higher Data Rates in Cellular Networks. 7.8 Deployment of Cellular Networks. PART THREE: LOCAL AND PERSONAL-AREA NETWORKS. 8. IEEE 802-3 Ethernet. 8.1 Introduction. 8.2 Legacy 10 Mb/s Ethernet. 8.3 Evolution of the Physical Layer. 8.4 Emergence of Additional Features for Ethernet. 9. IEEE Wireless Local-Area Network Standards. 9.1 Introduction. 9.2 IEEE 802.11 and WLANs. 9.3 IEEE 802.16 (WiMAX). 10. IEEE 802.15 Wireless Personal-Area Network. 10.1 Introduction. 10.2 IEEE 802.15.1 Bluetooth. 10.3 Interference between Bluetooth and 802.11. 10.4 IEEE 802.15.3 Ultra Wideband Wireless. 10.5 IEEE 802.15.4 ZigBee. PART FOUR: SYSTEM ASPECTS. 11. Network Security. 11.1 Introduction. 11.2 Network Attacks and Security Issues. 11.3 Protection and Prevention. 11.4 Detection. 11.5 Assessment and Response. 12. Wireless Localization. 12.1 Introduction. 12.2 What is Wireless Geolocation? 12.3 RF Location Sensing and Positioning Methodologies. 12.4 LCS Architecture for Cellular Systems. 12.5 Positioning in Ad Hoc and Sensor Networks. 13. Wireless Sensor Networks. 13.1 Introduction. 13.2 Sensor Network Applications. 13.3 Sensor Network Architecture and Sensor Devices. 13.4 The PHY Layer in Sensor Networks. 13.5 The MAC Layer in Sensor Networks. 13.6 Higher Layer Issues in Sensor Networks. References. Appendix A: What is Decibel? Appendix B: STC for Two Transmitters and One Receiver. Appendix C: Source Coding. C.1 Source Coding for Voice. C.2 Source Coding for Images and Video. Appendix D: Acronyms. Appendic E: List of Variables. Index.

    15 in stock

    £60.26

  • Practical Electromagnetics

    John Wiley & Sons Inc Practical Electromagnetics

    1 in stock

    Book SynopsisLearn to solve both simple and complex electromagnetic problems with this text's unique integration of theoretical and mathematical concepts. With the author's guidance, you'll discover a broad range of classic and cutting-edge applications across a wide array of fields, including biomedicine, wireless communication, process control, and instrumentation. Case studies, detailed derivations, and 170 fully solved examples deepen your understanding of theory, and help you apply numerical methods to real-world problems.Trade Review"…a perfect, very good introductory work…" (CHOICE, August 2007)Table of ContentsPreface. 1. INTRODUCTION. 1.1 Electrical sources and fundamental quantities. 1.2 Static and dynamic fields. 1.3 Working with complex numbers and functions. 2. VECTORS AND FIELDS. 2.1 Working with vectors. 2.2 Coordinate systems. 2.3 Differentiation and integration of vectors. 2.4 Gradient of the scalar field and its applications. 2.5 Divergence of the vector field and its applications. 2.6 Curl of the vector field and its applications. 2.7 The divergence theorem. 2.8 Stokes’ theorem. Δ. 2.9 Other operations involving 2.10 Helmholtz theorem. 3. BASIC LAWS OF ELECTROMAGNETICS. 3.1 Maxwell’s equations in large scale/integral form. 3.2 Maxwell’s equations in point/differential form. 3.3 Constitutive relations. 3.4 Boundary conditions. 3.5 Lorentz force equation. 3.6 Poynting vector and power flow. 4. UNIFORM PLANE WAVES. 4.1 The wave equation and uniform plane wave solutions. 4.2 Plane electromagnetic waves in Lossy media. 4.3 Uniform plane wave incident normally on an interface. 4.4 Uniform plane wave incident obliquely on an interface. 5. TRANSMISSION LINES. 5.1 Transmission line equations. 5.2 Finite length transmission line. 5.3 Smith chart. 5.4 Transients on transmission lines. 6. MODIFIED MAXWELL'S EQUATIONS AND POTENTIAL FUNCTIONS. 6.1 Magnetic charge and current. 6.2 Magnetic vector and electric scalar potentials. 6.3 Electric vector and magnetic scalar potentials. 6.4 Construction of solution in rectangular coordinates. 6.5 Construction of solution in cylindrical coordinates. 6.6 Construction of solution in spherical coordinates. 7. SOURCE IN INFINITE SPACE. 7.1 Fields of an infinitesimal source. 7.2 Antenna parameters. 7.3 Linear antennas. 7.4 Antenna arrays. 7.5 Friis transmission formula and the radar range equation. 8. ELECTROSTATIC FIELDS. 8.1 Laws of electrostatic fields. 8.2 Gauss’ law. 8.3 Poisson’s and Laplace’s equations. 8.4 Capacitors and energy storage. 8.5 Further applications of Poisson’s and Laplace’s equations. 9. MAGNETOSTATIC FIELDS. 9.1 Laws of magnetostatic fields. 9.2 Inductors and energy storage. 9.3 Magnetic materials. 9.4 Magnetic Circuits. 10. WAVEGUIDES AND CAVITY RESONATORS. 10. 1 Metallic rectangular waveguide. 10. 2 Metallic circular cylindrical waveguide. 10.3 Rectangular cavity resonators. 10.4 Circular cylindrical cavity resonators. 11. NUMERICAL TECHNIQUES. 11.1 Finite difference methods. 11.2 The method of moments. 11.3 Scattering of plane EM waves from an infinitely long cylinder. Appendix A. Mathematical formulas. Appendix B. Delta function and evaluation of fields in unbounded media. Appendix C. Bessel functions. Appendix D. Legendre functions. Appendix E. Characteristics of selected materials. Appendix F. Physical constants. Appendix G. Decibels and Neper. Appendix H. Nomenclature and characteristics of standard rectangular waveguides. SELECTED REFERENCE BOOKS . Index.

    1 in stock

    £155.66

  • Smartland Korea

    The University of Michigan Press Smartland Korea

    10 in stock

    Book SynopsisAnalyses mobile communication in the context of Korean smartphones. This book looks into a largely neglected focus of inquiry, a localized mobile landscape, with particular reference to young Koreans' engagement with their devices and applications. Dal Yong Jin focuses on the achievement of technological advancement and the significance of social milieu in the development of the smartphones.Trade ReviewSmartland Korea is an empirically rich study that is multi-perspectival in incorporating industry and technology studies, policy analysis, audience/user research, and case studies. As the Korean case is under-explored in the English-language communication and media studies literature relative to its global significance, this is an important contribution to the overall literature in the field."" - Terry Flew, Queensland University of Technology

    10 in stock

    £29.95

  • Introduction to SpaceTime Wireless Communications

    Cambridge University Press Introduction to SpaceTime Wireless Communications

    15 in stock

    Book SynopsisThis book is an accessible introduction to the theory of space-time wireless communications. The book is an ideal introduction to this rapidly growing field for graduate students and for practitioners in the wireless industry. Homework problems and other supporting material are available on a companion website.Table of Contents1. Introduction; 2. Space-time propagation; 3. Space-time channel and signal models; 4. Capacity of space-time channels; 5. Spatial diversity; 6. Space-time coding without channel knowledge at the transmitter; 7. Space-time receivers; 8. Exploiting channel knowledge at the receiver; 9. Space-time OFDM and spread spectrum modulation; 10. MIMO-multiuser; 11. Space-time co-channel interference mitigation; 12. Performance limits and tradeoffs in MIMO channels.

    15 in stock

    £59.99

  • Wireless Multimedia

    John Wiley & Sons Inc Wireless Multimedia

    15 in stock

    Book SynopsisWireless Multimedia: A Handbook to the IEEE 802.15.3 Standard clarifies the IEEE 802.15.3 standard for individuals who are implementing compliant devices and shows how the standard can be used to develop wireless multimedia applications. The 802.15.3 standard addresses an untapped market that does beyond 802.11 and Bluetooth wireless technologies. The standard addresses the consumer need for low-cost, high data-rate, ad-hoc wireless connections. Some of these applications include: wireless keyboards and printers, personal video and digital cameras, cordless telephones and intercoms, digital audio players and headphones, gaming (including interactive gaming, multiplayer consoles, handheld multiplayer gaming, digital music, video, and image uploads to handheld games), home theater system and stereo system components, video conferencing, and more! Navigating through the IEEE 802.15.3 standard to find the required information can be a difficult task for anyone who has not spent a coTable of ContentsIntroduction xv Acronyms and Abbreviations xvii Chapter 1 Background and History 1 What is an IEEE standard? 1 The 802.15 family 2 Why 802.15.3? 4 History of 802.15.3 6 Chapter 2 802.15.3 applications 13 The high-rate WPAN theme 13 Still image applications 14 Telephone quality audio applications 16 High quality audio applications 17 Gaming applications 18 Video and multimedia applications 19 Chapter 3 Overview of the IEEE 802.15.3 standard 23 Elements of the 802.15.3 piconet 25 PHY overview 28 Starting a piconet 31 The superframe 32 Joining and leaving a piconet 34 Connecting with other devices 35 Dependent piconets 36 Obtaining information 39 Power management 40 System changes 43 Implementation cost and complexity 44 Chapter 4 MAC functionality 47 MAC terminology in IEEE Std 802.15.3 47 Frame formats 49 Piconet timing and superframe structure 51 Interframe spacings 53 Contention access period (CAP) 55 Channel time allocation period (CTAP) 56 Comparing the contention access methods 60 Guard time 63 The role of the PNC 66 Starting a piconet 66 Handing over control 66 Ending a piconet 72 Joining and leaving the piconet 73 Association 74 Broadcasting piconet information 77 Disassociation 78 Assigning DEVIDs 80 Managing bandwidth 81 Acknowledgements 81 Asynchronous data 87 Stream connections 92 Fragmentation/defragmentation 96 Retransmissions and duplicate detection 99 Power management 100 Common characteristics of the SPS modes 104 Analyzing power save efficiencies 107 Switching PM modes 110 Managing SPS sets 114 DSPS mode 118 Allocating channel time for DSPS DEVs 119 PSPS mode 124 APS mode 126 Changing piconet parameters 128 Beacon announcements 129 Dynamic channel selection 132 Changing the PNID or BSID 134 Moving the beacon or changing the superframe duration 136 Finding information 138 Probe 139 Announce 143 PNC Information 145 Channel status 148 PNC channel scanning 150 Remote scan 152 Piconet services 154 Other capabilities 157 Transmit power control 157 Multirate capabilities 159 Extensibility of the standard 160 Example of the life cycle of a DEV 162 Chapter 5 Dependent piconets 165 Introduction 165 Starting a dependent piconet 168 Parent PNC ceasing operations with dependent piconets 174 Parent PNC stopping a dependent piconet 176 Handing over PNC responsibilities in a dependent piconet 177 Chapter 6 Security 187 Introduction and history 187 Security modes and policies 190 Security services provided in mode 1 191 Security policies 193 Symmetric key security suite 195 Overview of AES CCM 195 Key distribution 197 Security information 199 Chapter 7 2.4 GHz PHY 203 Overview 203 General PHY requirements 205 Channel plan 205 Timing issues 206 Miscellaneous PHY requirements 213 PHY frame format 213 Stuff bits and tail symbols 214 Frame format 215 PHY preamble 217 Data size restrictions 219 Modulation 220 Receiver performance 224 Transmitter performance 228 Regulatory and requirements 233 Delay spread performance 234 Mitigating the effects of delay spread 236 Fading channel model used for 802.15.3 237 Defining delay spread performance 239 Delay spread measurements 240 Radio architectures 244 Superheterodyne 245 Direct conversion 248 Walking IF 250 Low IF 253 Summary of radio architectures 256 Chapter 8 2.4 Interfacing to 802.15.3 257 The PIBs and their interface 261 MLME SAP 262 PLME SAP 265 MAC SAP 265 PHY SAP 266 The FCSL 268 Chapter 9 2.4 Coexistence mechanisms 271 Introduction 271 Coexistence techniques in 802.15.3 271 Passive scanning 273 The ability to request channel quality information 273 Dynamic channel selection 273 Link quality and RSSI 274 Channel plan that minimizes channel overlap 274 Transmit power control 275 Lower impact transmit spectral mask 275 Neighbor piconet capability 276 Coexistence results 278 Assumptions for coexistence simulations 278 BER calculations 280 802.11b and 802.15.3 282 802.15.1 and 802.11 FHSS overlapping with 802.15.3 288 Summary 291 References 295 Glossary 299 Index 305

    15 in stock

    £61.16

  • Blockchain in the Industrial Internet of Things

    Institute of Physics Publishing Blockchain in the Industrial Internet of Things

    Out of stock

    Book SynopsisBlockchain and the Internet of Things (IoT) are separately regarded as highly capable popular technologies. Blockchain is a database used for decentralized transaction purposes. It provides novel directions to store and manage data, whereas the IoT relates to the propagation of linked smart machines through the Internet. A technology significant to the manufacturing business, which is currently experiencing a digital revolution through new equipment and data, leading to the Industrial Internet of Things, or the IIoT. The IIoT has advanced swiftly, but privacy issues and safety vulnerabilities remain concerns. Incorporating blockchain technology with its decentralization and embedded cryptographic principles with the IIoT creates Blockchain for Industrial Internet of Things (BIIoT) which can overcome these security requirements and motivate the further development of Industry 4.0. This book gives a detailed survey of BIIoT and discusses all relevant aspects of this concept, including structural design and open research directions.Key features ?The first book of its kind to addresses the emergent Blockchain in the Industrial Internet of things (BIIoT) Explores basic and high-level concepts of Blockchain techniques and advanced aspects in various domains. Includes an overview of the mining, consensus algorithms, smart property key themes required for implementation in various domains. This book provides fundamental data structures and algorithms used to build a typical Blockchain. Helps programmers begin their journey with the public and private Blockchain development

    Out of stock

    £108.00

  • Advanced Wireless Sensing Techniques for 5G

    Taylor & Francis Inc Advanced Wireless Sensing Techniques for 5G

    Out of stock

    Book SynopsisThis book written for students of electronics and communication, students of computer science and communications engineers addresses topics such as Introduction of CRN, Advanced spectrum sensing techniques, Cooperative sensing techniques, Distributed sensing techniques, Issues in advanced sensing techniques, and Applications of 5G Networks. It provides new algorithms, explores recent results, and evaluates the performance of technologies in use in this area. It also provides new research topics and sensing techniques related to 5G networks for researchers.Table of ContentsIntroduction to Cognitive Radio Networks. Basics of 5G networks: Review. Next Generation Wireless Communication Networks. Introduction to Cognitive Radio Functions. Sensing techniques in Cognitive Radio Networks: An Appraisal. Advanced Wireless Spectrum Sensing Techniques in Cognitive Radio Networks: Features and Challenges. Various Sensing Techniques for Cognitive Radio. Sensing Algorithms for 5G Networks. New Cooperative Spectrum Detection Technique in Cognitive Radio Networks. Multiple Antennas based Collaborative Spectrum Sensing Technique. Distributed Sensing Technique for Cognitive Radio Networks. Energy Utilization in Next Generation 5G Networks. Shadowing & Fading, Sensing, and Security Issues in Cognitive Radio Networks. Cognitive Radio Sensor Networks: A Survey. Wireless Ad-hoc Networks with 5G technology. Advanced wireless 5G Networks: Applications.

    Out of stock

    £135.00

  • Going Mobile

    Rowman & Littlefield Going Mobile

    Out of stock

    Book SynopsisThe world is going mobile at an astounding pace. Estimates show 80 percent of global Internet access will take place through mobile devices by 2016. Smartphones, tablets, and handheld devices have reshaped communications, the global economy, and the very way in which we live. The revolution is an electronic nirvana: for the first time in human history we have sophisticated digital applications to help us learn, access financial and health care records, connect with others, and build businesses. But the one trillion dollar mobile industry is still relatively young. Leaders in both the public and private sectors need to figure out how to apply mobile technologies or mobile devices to optimize education, health care, public safety, disaster preparedness, and economic development. And the ever-expanding mobile frontier presents new challenges to law, policy, and regulations and introduces new tensions; one person''s idea of cautious deliberation can be another''s idea of a barrier

    Out of stock

    £23.75

  • The Undersea Network

    Duke University Press The Undersea Network

    Out of stock

    Book SynopsisNicole Starosielski examines undersea communication cable network, bringing it to the surface of media scholarship and making visible the "wireless" network's materiality. She argues that the network is inextricably linked to historical and political factors and that it is precarious, rural, aquatic, territorially entrench and semi-centralized.Trade Review“Starosielski offers a crucial intervention into theoretical conceptualizations of communications infrastructure. . . . This rich text also has profound implications for how citizens in an always-networked society and economy understand our lived realities. The Undersea Network makes us reconsider the ‘wirelessness’ of our world by admonishing us consider it in terms of its peculiar and ongoing connectedness to geographies, cultures, and politics.” -- Sara Rodrigues * PopMatters *“[A] fascinating book that is part history, part travelogue and part socio-economic memoir. . . . Starosielski’s account makes for fascinating reading, drawing together the varied threads of history, technical complexity, economic power and political will that have shaped the world’s cable networks. Despite the scale of the infrastructure under discussion, the narrative remains intensely personal, and one to be enjoyed." -- John Gilbey * Times Higher Education *“The Undersea Network is a fascinating interdisciplinary look at the infrastructure that lets us communicate instantly across oceans…. [T]his book is a good read for anyone broadly interested in geography or communications.” -- Eva Amsen * Hakai Magazine *“A fascinating cultural assessment of global undersea cable networks that carry most of the world's trans-ocean Internet traffic. … Great stuff!” -- Christopher Sterling * Communication Booknotes Quarterly *"Overall, the book brilliantly brings together the global metanarrative of mass communication with the local, material, and relatively immobile specificities of this undersea network.... Starosielski is extremely successful in rewiring our wireless imaginaries of a networked world. The depth and breadth of the fieldwork conducted is noteworthy as is the production of the book itself, which contains a plethora of images, graphics, and maps." -- Rachael Squire * Transfers *"The multistranded analysis developed in the book provides a rewarding account that blends cultural history with investigative ethnography and along the way takes us to remote sites in Hawaii, Tahiti and Guam. Most importantly, Starosielski brings the infrastructure of undersea cable systems back into visibility, showing us in vivid ways what makes global communications possible." * European Journal of Communication *"The Undersea Network succeeds in introducing an environmental consciousness into one’s imagination of digital networks and the ecological, political, financial, place-based contingencies that support, interfere with and maintain our global telecommunications system. It makes cables salient. ... The Undersea Network is required reading for students of media and network archaeology, communication educators, political and environmental scientists, the history of technology discipline, and readers within the cable industries and government." -- Emily Goodmann * International Journal of Media & Cultural Politics *"If you have ever wondered why infrastructure has suddenly become a buzzword in cultural anthropology and science and technology studies, then follow the signal. That is precisely what The Undersea Network does, brilliantly redeeming the promise of multi-sited fieldwork methods to highlight the connections and disconnection–historical and present-day–among far-flung people and places.... For anyone with an interest in Pacific studies, this book has plenty to ponder." -- Robert J. Foster * Journal of Pacific History *"[A]n enthralling read for anybody with an interest in telecoms infrastructure and the way that it is presented in the media." -- Mike Conradi * Telecommunications Policy *"This is a fascinating and deeply geographical piece of media scholarship.Starosielski’s book is remarkably successful in demonstrating that the unstable materiality of the infrastructures it describes matters in all kinds of sometimes contradictory ways to those who construct these infrastructures, to those they connect, and to those who remain at a distance from their connective capacities." -- Derek P. McCormack * Cultural Geographies *Table of ContentsPreface. Edges ix Acknowledgments xv Introduction. Against Flow 1 1. Circuitous Routes. From Topology to Topography 26 2. Short-Circuiting Discursive Infrastructure: From Connection to Transmission 64 3. Gateway: From Cable Colony to Network Operations Center 94 4. Pressure Point: Turbulent Ecologies of the Cable Landing 138 5. A Network of Islands: Interconnecting the Pacific 170 6. Cabled Depths: The Aquatic Afterlives of Signal Traffic 198 Conclusion. Surfacing 225 Notes 235 Bibliography 263 Index 281

    Out of stock

    £75.65

  • The Undersea Network

    Duke University Press The Undersea Network

    15 in stock

    Book SynopsisIn our 'wireless' world it is easy to take the importance of the undersea cable systems for granted, but the stakes of their successful operation are huge, as they are responsible for carrying almost all transoceanic Internet traffic. In The Undersea Network Nicole Starosielski follows these cables from the ocean depths to their landing zones on the sandy beaches of the South Pacific, bringing them to the surface of media scholarship and making visible the materiality of the wired network. In doing so, she charts the cable network''s cultural, historical, geographic and environmental dimensions. Starosielski argues that the environments the cables occupy are historical and political realms, where the network and the connections it enables are made possible by the deliberate negotiation and manipulation of technology, culture, politics and geography. Accompanying the book is an interactive digital mapping project, where readers can trace Trade Review“Starosielski offers a crucial intervention into theoretical conceptualizations of communications infrastructure. . . . This rich text also has profound implications for how citizens in an always-networked society and economy understand our lived realities. The Undersea Network makes us reconsider the ‘wirelessness’ of our world by admonishing us consider it in terms of its peculiar and ongoing connectedness to geographies, cultures, and politics.” -- Sara Rodrigues * PopMatters *“[A] fascinating book that is part history, part travelogue and part socio-economic memoir. . . . Starosielski’s account makes for fascinating reading, drawing together the varied threads of history, technical complexity, economic power and political will that have shaped the world’s cable networks. Despite the scale of the infrastructure under discussion, the narrative remains intensely personal, and one to be enjoyed." -- John Gilbey * Times Higher Education *“The Undersea Network is a fascinating interdisciplinary look at the infrastructure that lets us communicate instantly across oceans…. [T]his book is a good read for anyone broadly interested in geography or communications.” -- Eva Amsen * Hakai Magazine *“A fascinating cultural assessment of global undersea cable networks that carry most of the world's trans-ocean Internet traffic. … Great stuff!” -- Christopher Sterling * Communication Booknotes Quarterly *"Overall, the book brilliantly brings together the global metanarrative of mass communication with the local, material, and relatively immobile specificities of this undersea network.... Starosielski is extremely successful in rewiring our wireless imaginaries of a networked world. The depth and breadth of the fieldwork conducted is noteworthy as is the production of the book itself, which contains a plethora of images, graphics, and maps." -- Rachael Squire * Transfers *"The multistranded analysis developed in the book provides a rewarding account that blends cultural history with investigative ethnography and along the way takes us to remote sites in Hawaii, Tahiti and Guam. Most importantly, Starosielski brings the infrastructure of undersea cable systems back into visibility, showing us in vivid ways what makes global communications possible." * European Journal of Communication *"The Undersea Network succeeds in introducing an environmental consciousness into one’s imagination of digital networks and the ecological, political, financial, place-based contingencies that support, interfere with and maintain our global telecommunications system. It makes cables salient. ... The Undersea Network is required reading for students of media and network archaeology, communication educators, political and environmental scientists, the history of technology discipline, and readers within the cable industries and government." -- Emily Goodmann * International Journal of Media & Cultural Politics *"If you have ever wondered why infrastructure has suddenly become a buzzword in cultural anthropology and science and technology studies, then follow the signal. That is precisely what The Undersea Network does, brilliantly redeeming the promise of multi-sited fieldwork methods to highlight the connections and disconnection–historical and present-day–among far-flung people and places.... For anyone with an interest in Pacific studies, this book has plenty to ponder." -- Robert J. Foster * Journal of Pacific History *"[A]n enthralling read for anybody with an interest in telecoms infrastructure and the way that it is presented in the media." -- Mike Conradi * Telecommunications Policy *"This is a fascinating and deeply geographical piece of media scholarship.Starosielski’s book is remarkably successful in demonstrating that the unstable materiality of the infrastructures it describes matters in all kinds of sometimes contradictory ways to those who construct these infrastructures, to those they connect, and to those who remain at a distance from their connective capacities." -- Derek P. McCormack * Cultural Geographies *Table of ContentsPreface. Edges ix Acknowledgments xv Introduction. Against Flow 1 1. Circuitous Routes. From Topology to Topography 26 2. Short-Circuiting Discursive Infrastructure: From Connection to Transmission 64 3. Gateway: From Cable Colony to Network Operations Center 94 4. Pressure Point: Turbulent Ecologies of the Cable Landing 138 5. A Network of Islands: Interconnecting the Pacific 170 6. Cabled Depths: The Aquatic Afterlives of Signal Traffic 198 Conclusion. Surfacing 225 Notes 235 Bibliography 263 Index 281

    15 in stock

    £20.69

  • Cardiovascular Disease In The Elderly Third

    Taylor & Francis Inc Cardiovascular Disease In The Elderly Third

    1 in stock

    Book SynopsisBroadband Last Mile: Access Technologies for Multimedia Communications provides in-depth treatments of access technologies and the applications that rely upon them or support them. It examines innovations and enhancements along multiple dimensions in access, with the overarching goal of ensuring that the last mile is not the weak link in the broadband chain. Written by experts from the academic and commercial segments of the field, the book's self-contained sections address topics related to the disciplines of communications, networking, computing, and signal processing.The core of this treatment contains contemporary reviews of broadband pipes in the classes of copper, cable, fiber, wireless, and satellite. It emphasizes the coexistence of these classes within a network, the importance of optical communications for unprecedented bandwidth, and the flexibility and mobility provided by wireless.The book also includes perspective on the increasingly important topic of network management, providing insights that are true regardless of the nature of the pipe. The text concludes with a discussion of newly emerging applications and broadband services.This book offers an all-in-one treatment of the physical pipes and network architectures that make rich and increasingly personalized applications possible. It serves as a valuable resource for researchers and practitioners working in the increasingly pervasive field of broadband.Table of ContentsBroadband in the Last Mile: Current and Future Applications. The Last Mile, the Edge, and the Backbone. Last-Mile Copper Access. Last-Mile HFC Access. Optical Access: Networks and Technology. Last-Mile Wireless Access in Broadband and Home Networks. Satellite Technologies Serving as Last-Mile Solutions. Management of Last-Mile Broadband Networks. Emerging Broadband Services Solutions.

    1 in stock

    £137.75

  • The Handbook of Mobile Middleware

    Taylor & Francis Ltd The Handbook of Mobile Middleware

    1 in stock

    Book SynopsisOffers an overview of developments in the various fields related to how software supports mobile computing. This book presents mobile middleware motivations, requirements, and technologies, and offers a taxonomy of solutions organized on the basis of their goals: mobility/disconnection handling; location-based support; and context-based support.Table of ContentsFundamentals. Emerging Technologies for Mobile Middleware. Requirements and Guidelines for Mobile Middleware. Mobile Middleware for Seamless Connectivity. Mobile Middleware for Location-Dependent Services. Mobile Middleware for Context-Dependent Services. Current Experiences and Envisioned Application Domains for Services Based on Mobile Middleware.

    1 in stock

    £161.50

  • Performance Optimization of Digital

    Taylor & Francis Ltd Performance Optimization of Digital

    1 in stock

    Book SynopsisBecause fine-tuning the parameters of a system is critical to a developer's success, Performance Optimization of Digital Communications Systems examines particular optimization problems in digital communications, presenting analytical techniques in combination with SystemView and MATLAB simulations. Consisting of ten chapters, this monograph presents a unique method for determining the quality of a communications channel - a great advantage to any company that uses this method. The book presents a method for the transmission of proprietary data. It also describes the means to reduce the peak-to-average power ratio and introduces optimal phase shifters for multicarrier communication systems.This volume contains numerous illustrations and includes appendices that offer optimization puzzles, MATLAB scripts, and some newly discovered properties of flat-spectrum and spectrum-shaped waveforms.Table of ContentsIntroduction. Method for determining the quality of a communication channel. Digital communications in stealth mode. Pulse shape optimization. Optimal phase shifters for peak-to-average power ratio reduction in multicarrier communication systems. Optimization of the automatic repeat request parameters in quadrature amplitude modulation channels. Optimal selection of error correction and retransmission parameters in multichannel communications systems. Bit error rate of self-similar constellations in ADSL systems. Throughput optimization in a general duplex communications system with FEC and ARQ. A quantitative procedure of optimizing the MAC packet size in TCP/IP-compliant networks.

    1 in stock

    £133.00

  • Multimedia Encryption and Authentication

    Taylor & Francis Ltd Multimedia Encryption and Authentication

    Out of stock

    Book SynopsisIntellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is a definitive resource for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.FeaturesDescribes and evaluates the state of the art in multimedia encryption and authenticaTable of ContentsProtection of Multimedia Content in Distribution Networks. Vulnerabilities of Multimedia Protection Schemes. Fundamentals of Multimedia Encryption Techniques. Chaos-Based Encryption for Digital Image and Video. Key Management and Protection for IP Multimedia. Streaming Media Encryption. Digital Media Fingerprinting: Techniques and Trends. Scalable Image and Video Authentication. Signature-Based Media Authentication. Digital Rights Management for Consumer Devices 311. Adult Image Filtering for Internet Safety. Digital Rights Management Issues for Video.

    Out of stock

    £114.00

  • Wireless Multimedia Communications Convergence

    Taylor & Francis Inc Wireless Multimedia Communications Convergence

    1 in stock

    Book SynopsisWith the rapid evolution of multimedia communications, engineers and other professionals are generally forced to hoard a plethora of different texts and journals to maintain a solid grasp on essential ideas and techniques in the field. Wireless Multimedia Communications provides researchers and students with a primary reference to help readers take maximum advantage of current systems and uncover opportunities to propose new and novel protocols, applications, and services. Extract the Essentials of System Design, Analysis, ImplementationA complete technical reference, the text condenses the essential topics of core wireless multimedia communication technologies, convergence, QoS, and security that apply to everything from networking to communications systems, signal processing, and security. From extensive existing literature, the authors distill the central tenets and primary methods of analysis, design, and implementation, to reflect the latest technoloTable of ContentsIntroduction to Wireless Networking. Convergence Technologies. Wireless Video. Wireless Multimedia Services and Applications. Wireless Networking Standards (WLAN, WPAN, WMAN, WWAN). Advances in Wireless Video. Cross-Layer Wireless Multimedia. Mobile Internet. Evolution toward 4G Networks.

    1 in stock

    £147.25

  • Solutions Manual Fundamentals of Communication Systems

    15 in stock

    £11.64

  • The Big Book of Drones

    Taylor & Francis Ltd The Big Book of Drones

    15 in stock

    Book SynopsisDrones are taking the world by storm. The technology and laws governing them change faster than we can keep up with. The Big Book of Drones covers everything from drone law to laws on privacy, discussing the history and evolution of drones to where we are today. If you are new to piloting, it also covers how to fly a drone including a pre-flight checklist.For those who are interested in taking drones to the next level, we discuss how to build your own using a 3D printer as well as many challenging projects for your drone. For the truly advanced, The Big Book of Drones discusses how to hack a drone. This includes how to perform a replay attack, denial of service attack, and how to detect a drone and take it down.Finally, the book also covers drone forensics. This is a new field of study, but one that is steadily growing and will be an essential area of inquiry as drones become more prevalent.Table of ContentsAbout this book. 1 Introduction. 2 The history of drones. 3 Laws governing drones. 4 Drone hardware/software. 5 Flying a drone. 6 Hacking a drone. 7 Programing a drone. 8 Build your own drone. 9 Do-It-Yourself (DIY) drone projects. 10 Drone forensics. 11 More on drones. Definitions. Index.

    15 in stock

    £25.64

  • CRC Press DataDriven Intelligence in Wireless Networks

    Out of stock

    Book SynopsisThis book highlights the importance of data-driven techniques to solve wireless communication problems. It presents a number of problems (e.g., related to performance, security, and social networking), and provides solutions using various data-driven techniques, including machine learning, deep learning, federated learning, and artificial intelligence.This book details wireless communication problems that can be solved by data-driven solutions. It presents a generalized approach toward solving problems using specific data-driven techniques. The book also develops a taxonomy of problems according to the type of solution presented and includes several case studies that examine data-driven solutions for issues such as quality of service (QoS) in heterogeneous wireless networks, 5G/6G networks, and security in wireless networks. The target audience of this book includes professionals, researchers, professors, and students working in the field of networking, communications, machine learning, and related fields.

    Out of stock

    £61.46

  • CRC Press Applications of 5G and Beyond in Smart Cities

    Out of stock

    Book SynopsisThis book explores the potential of 5G technologies and beyond in smart city setups, with the availability of high bandwidths and performance, and low latency. The book starts with an introduction to 5G, along with the challenges, limitations, and research areas in future wireless communication, including the related requirements for transformation of societal paradigms and infrastructure. Applications related to visible light communication, network management in smart cities, the role of 5G in public healthcare, safety, security, and transportation, and existing and planned 6G research frameworks are included.The features of the book include: A broad perspective on 5G communications with a focus on smart cities. Discussion of artificial intelligence in future wireless communication and its applications. A systemic and comprehensive coverage of 6G technologies, challenges, and uses. The role of future wireless communications in safety, health, and transport in smart cities. Case studies of future wireless communication. This book is aimed at researchers and professionals in communications, signal processing, cyber-physical systems, and smart cities.

    Out of stock

    £61.46

  • CRC Press Printed Antennas for Future Generation Wireless

    1 in stock

    Book SynopsisThis proposed book focuses on the design and development of printed antennas along with modeling aspects for multifaceted applications. It further investigates imperfections in the manufacturing processes and assembly operation during the testing/characterization of printed antennas.This text- Discusses in a comprehensive manner the design and development aspects of printed antennas. Provides fractal engineering aspects for miniaturization and wideband characteristics of the low-profile antenna with high performances. Covers high gain printed antenna for Terahertz application. Showcases electrical modeling of smart antennas. Pedagogical features such as review questions based on practical experiences are included at the end of each chapter. The book comprehensively discusses fractal engineering in printed antennas for miniaturization and enhancement of performance factors. It further covers the modeling of electrically small antennas, circuit modeling, modeling of factual-based Ultra-Wide Band antennas, and modeling of reconfigurable micro-electromechanical system-based patch antennas. The book highlights performance metrics of multiple-input-multiple-output antennas. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in fields including electrical engineering, electronics, communications engineering, and computer engineering.

    1 in stock

    £46.54

  • Computational Modeling and Simulation of Advanced

    Out of stock

    £150.00

  • CRC Press Cyber Insecurity

    1 in stock

    Book SynopsisCyber Insecurity: Examining the Past, Defining the Future deals with the multifaceted world of cybersecurity, starting with the premise that while perfection in cybersecurity may be unattainable, significant improvements can be made through understanding history and fostering innovation. The author, Dr. Leonas, shares his journey from Moscow to Australia, highlighting his academic and professional milestones.Then the book covers the evolution of cybersecurity from the late 1960s to the present, detailing significant events and technological advancements. It emphasizes the importance of simplicity in technology projects, citing complexity as a major hindrance to success. This book also discusses the impact of the digital revolution, using the example of a global IT outage caused by a faulty software update.Project management methodologies are explored, tracing their origins from ancient civilizations to modern techniques like CPM and PERT. The concept of cloud computing is examined, highlighting its benefits and potential security issues. The evolution and advantages of SaaS solutions are also discussed, noting their increased adoption during the COVID-19 pandemic.The author then addresses supply chain challenges, using real-world examples to illustrate vulnerabilities. It traces the history of communication methods leading up to TCP/IP and discusses the development and importance of DNS. The differences between compliance and conformance in cybersecurity are clarified, emphasizing that compliance does not equate to security.Key cybersecurity standards like the NIST CSF and ISO/IEC 27000 series are examined. The book also covers the Essential 8, a set of cybersecurity controls developed by the Australian Signals Directorate. The convergence of OT and IoT is discussed, highlighting the cybersecurity risks associated with this integration.Emerging threats from AI and quantum computing are explored, noting their potential to both advance and threaten cybersecurity. The evolving legal landscape of cybersecurity is also covered, emphasizing the need for international cooperation and innovative legal solutions.In conclusion, the book stresses the importance of critical thinking and a holistic approach to cybersecurity, advocating for simplicity and foundational practices to enhance security.

    1 in stock

    £46.54

  • Artificial Intelligence and Cloud Computing Applications in Biomedical Engineering

    1 in stock

    £48.44

  • Random Matrix Methods for Wireless Communications

    Cambridge University Press Random Matrix Methods for Wireless Communications

    15 in stock

    Book SynopsisBlending theoretical results with practical applications, this book provides an introduction to random matrix theory and shows how it can be used to tackle a variety of real-world problems in wireless communications. Intuitive yet rigorous, it demonstrates how to choose the correct approach for obtaining mathematically accurate results.Table of Contents1. Introduction; Part I. Theoretical Aspects: 2. Random matrices; 3. The Stieltjes transform method; 4. Free probability theory; 5. Combinatoric approaches; 6. Deterministic equivalents; 7. Spectrum analysis; 8. Eigen-inference; 9. Extreme eigenvalues; 10. Summary and partial conclusions; Part II. Applications to Wireless Communications: 11. Introduction to applications in telecommunications; 12. System performance of CDMA technologies; 13. Performance of multiple antenna systems; 14. Rate performance in multiple access and broadcast channels; 15. Performance of multi-cellular and relay networks; 16. Detection; 17. Estimation; 18. System modeling; 19. Perspectives; 20. Conclusion.

    15 in stock

    £89.99

  • Signalling Across Space Without Wires

    Cambridge University Press Signalling Across Space Without Wires

    15 in stock

    Book SynopsisIn 1894, Heinrich Hertz died aged only thirty-seven. His legacy was the wireless transmission of radio waves: the foundation of modern radio technology. This revised treatise, published in 1900, explains his work from the very basics of radio waves to the cutting edge of wireless telegraphy.Table of Contents1. Royal Institution lecture on the work of Hertz and some of his successors; 2. Application of Hertz waves and coherer signalling to telegraphy; 3. Details of other telegraphic developments; 4. A history of the coherer principle; 5. Communications with respects to coherer phenomena on a large scale; 6. Photo-electric researches of Drs. Elster and Geitel; 7. Photo-electric researches of Professor Right; Electrical precipitation: a lecture delivered before the Institute of Physics.

    15 in stock

    £25.41

  • Talks about Wireless With Some Pioneering History and Some Hints and Calculations for Wireless Amateurs Cambridge Library Collection  Technology

    Cambridge University Press Talks about Wireless With Some Pioneering History and Some Hints and Calculations for Wireless Amateurs Cambridge Library Collection Technology

    15 in stock

    Book SynopsisIn the 1860s, radio waves were predicted by James Clerk Maxwell in his work on electromagnetism. It took a further twenty years for the first experiments to produce a working demonstration. In this guide to radio technology, first published in 1925, eminent physicist Sir Oliver Lodge (1851â1940) provides a concise history of the development of the wireless radio, explains the theory behind it, and includes some practical tips for amateurs. Having lived through and contributed to the discovery, he explains the difficulty of the early experiments, which took place in a time when terms like 'frequency' and 'inductance', now taken for granted, did not exist in the scientific vocabulary. His first-hand account reveals the incredible efforts poured into the development of a revolutionary modern technology, rekindling the sense of wonder that once surrounded this strange new science.Table of ContentsPreface; Introduction; Part I. Radio in General: 1. On broadcasting; 2. Early pioneering work in radio waves; 3. The discovery of the waves; 4. The development of radiotelegraphy; 5. Wireless achievement and anticipation; 6. Vast range of ether vibrations; 7. The transmission of wireless waves; 8. Wave peculiarities; 9. On the general theory of ether waves; 10. Earth transmission; 11. The Heaviside layer; Part II. Details that Make for Efficiency: 12. Some points about capacity and inductance; 13. Conditions for maximum inductance; 14. The importance of good contact; 15. Advantage of low resistance and stranded wire; 16. Some disadvantages of reaction; 17. Stray capacities and couplings; 18. The use of iron in transformers; 19. Contrasting methods of aerial excitation; 20. Phase difference in different kinds of coupling; 21. The grid as traffic regulator; Part III. Calculations for Amateur Constructors: 22. Comparison of the absolute magnitudes of capacity and inductance; 23. A plea for easy specification; 24. On self-induction and its maximum value; 25. Desiderata for inductance coil of receiver; 26. How to calculate the conductance of coils; 27. On the use of a simple formula for maximum inductance; 28. To estimate the capacity of an aerial; 29. Calculation of aerial capacity; 30. On the damping of vibrations by coils of wire; 31. The romance of wireless; Index.

    15 in stock

    £26.99

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account