WAP (wireless) technology Books
NY Research Press Mobile Security: A Comprehensive Guide to
Book Synopsis
£107.42
Nova Science Publishers Inc Personal Digital Archiving: Guidance &
Book Synopsis
£63.74
Nova Science Publishers Inc Wireless Networks
Book SynopsisA comprehensive textbook for teaching and learning wireless networks. Assuming no prior knowledge of networks on the part of the reader, this book contains a rich collection of protocols to help one master wireless networks. Features: Student friendly; this book is written in a clear, concise and lucid manner; A sincere attempt has been made to introduce the basic concepts; Each chapter is organized into small sections that address key topics; Emphasis on in-depth coverage and good style in protocols; Aims to motivate the unmotivated; Explains the philosophy behind the creation of the networks; Covers both elementary as well as advanced networks; Helps to understand concepts by providing diagrams and definition listings wherever necessary; Logical flow of concepts starting from preliminary topics to advanced topics.
£113.59
Murphy & Moore Publishing Advances in Wireless Communication Networks
Book Synopsis
£104.61
Murphy & Moore Publishing Current Trends in Optical Fiber and Wireless
Book Synopsis
£106.72
Murphy & Moore Publishing Fundamentals of Mobile Computing
Book Synopsis
£106.72
Murphy & Moore Publishing Microwave Systems: Design and Applications
Book Synopsis
£106.69
Murphy & Moore Publishing Recent Advances in Wireless Power Transfer
Book Synopsis
£103.22
Murphy & Moore Publishing Telecommunications: An Engineering Perspective
Book Synopsis
£108.11
Murphy & Moore Publishing Wireless Communications
Book Synopsis
£109.46
Murphy & Moore Publishing Wireless Sensor Networks: A Systems Perspective
Book Synopsis
£105.30
Murphy & Moore Publishing Wireless Communications: Propagation and Smart
Book Synopsis
£116.63
States Academic Press Ad Hoc Networks: Current Status and Future Trends
Book Synopsis
£106.72
States Academic Press Handbook of 5g Wireless Networks
Book Synopsis
£108.80
States Academic Press Mobile Computing
Book Synopsis
£102.56
States Academic Press Wireless Communication Networks and Systems
Book Synopsis
£108.07
States Academic Press Optical Fibre Communications: Devices, Circuits
Book Synopsis
£112.27
Larsen and Keller Education Wireless Communications and Networking: Concepts,
Book Synopsis
£103.95
Clanrye International Understanding Digital Signal Processing
Book Synopsis
£101.14
Willford Press Digital Signal Processing
Book Synopsis
£104.64
Willford Press Wimax Systems: Current Technologies
Book Synopsis
£100.49
Willford Press 5g Wireless Communications and Internet of Things
Book Synopsis
£111.54
IGI Global Multidisciplinary Applications of
Book SynopsisComputer-mediated communication (CMC) refers to human communication mediated by electronic devices. CMC can be broken down into two forms: synchronous and asynchronous. Synchronous CMC provides opportunities for direct communication between involved parties. In contrast, asynchronous CMC refers to communication that takes place when the message sender does not receive an immediate response from the recipient. Further study is required to fully understand the uses and applications of this communication. Multidisciplinary Applications of Computer-Mediated Communication considers the future use of CMC and recent applications of CMC in different contexts in the world with implications for further development. Covering key topics such as learning environments, business communication, and social media, this reference work is ideal for industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.
£186.00
£11.63
Apple Academic Press Inc. Mobile, Wireless and Sensor Networks: A
Book SynopsisWireless networking covers a variety of topics involving many challenges. The main concern of clustering approaches for mobile wireless sensor networks (WSNs) is to prolong the battery life of the individual sensors and the network lifetime. For a successful clustering approach, the need of a powerful mechanism to safely elect a cluster head remains a challenging task in many research works that take into account the mobility of the network. In Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety, the authors use an approach based on computing of the weight of each node in the network as the proposed technique to deal with this problem. They present a virtual laboratory platform (VLP) of baptized mercury, allowing students and researchers to make practical work (PW) on different aspects of mobile wireless sensor networks. The authors’ choice of WSNs is motivated mainly by the use of real experiments needed in most college courses on WSNs. These usual experiments, however, require an expensive investment and many nodes in the classroom. The platform presented here aims at showing the feasibility, the flexibility, and the reduced cost using the authors’ approach. The authors demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs.The book will be a valuable resource for students in networking studies as well as for faculty and researchers in this area. Table of ContentsWireless Sensor Networks: A Survey. Clustering Techniques. Security in Wsns. Wsns Routing Protocols. A Distributed and Safe Weighted Clustering Algorithm. Results and Discussion.
£111.60
ISTE Ltd and John Wiley & Sons Inc The Art and Science of NFC Programming
Book SynopsisNFC is a world standard since 2004 which is now within every smartphone on the market. Such a standard enables us to do mobile transactions (mobile payment) in a secure way along with many other information- based tap’n play operations. This book has a double role for computer scientists (from bachelor students in CS to IT professionals).Table of ContentsForeword vii Preface xi Introduction xv Chapter 1. State-of-the-Art of NFC1 1.1. Future mobiquitous digital services 2 1.1.1. The era of mobiquity 3 1.1.2. Toward a world of contactless communicating objects 6 1.2. NFC equipment 7 1.2.1. NFC tag 7 1.2.2. NFC smart card 8 1.2.3. NFC smartphone 13 1.2.4. Reader/encoder: NFC transaction terminals 14 1.2.5. “Smart cities” and sustainable development 14 1.2.6. Cashless payment with NFC 15 1.3. NFC standards 16 1.3.1. Analog signal and NFC digital transposition 18 1.3.2. The three standardized modes of NFC 21 1.3.3. NFC forum standards 25 1.3.4. GlobalPlatform (GP) 36 1.3.5. SIMAlliance and open mobile API 42 Chapter 2. Developing NFC Applications with Android 45 2.1. Introduction to Android programming using Eclipse 46 2.1.1. Android in a nutshell 46 2.1.2. Android in Eclipse IDE 49 2.1.3. Intents and Android context 60 2.1.4. The Activity class of Android 61 2.1.5. Android graphical interface: “layout” files 64 2.1.6. Compiling and testing an Android application 67 2.2. Implementing NFC with Android 70 2.2.1. Android manifest declarations 71 2.2.2. Implementing the NFC reader/writer mode 71 2.2.3. Implementing the NFC P2P mode with Android 83 2.2.4. Implementing the NFC card emulation mode with Android 87 2.2.5. Developing NFC services with Android HCE 97 Chapter 3. NFC Use Cases 107 3.1. Usage of the NFC reader/writer mode 107 3.1.1. Use case: management of equipment loans 108 3.2. Usage of the NFC P2P mode 112 3.2.1. Use case: NFC pairing 112 3.3. Usage of NFC card emulation mode 114 3.3.1. Use case: digital wallet in the SE 115 3.4. Usage of the HCE mode 118 3.4.1. Use case: SE in the Cloud with HCE 119 Conclusion 121 Bibliography 125 Index 129
£125.06
ISTE Ltd and John Wiley & Sons Inc Queues Applied to Telecoms: Courses and Exercises
Book SynopsisFrom queues to telecoms. Queues are, of course, omnipresent in our world, at the bank, the supermarket, the shops, on the road... and yes, they also exist in the domain of telecoms. Queues Applied to Telecoms studies the theoretical aspect of these queues, from Poisson processes, Markov chains and queueing systems to queueing networks. The study of the use of their resources is addressed by the theory of teletraffic. This book also outlines the basic ideas in the theory of teletraffic, presenting the teletraffic of loss systems and waiting systems. However, some applications and explanations are more oriented towards the field of telecommunications, and this book contains lectures and more than sixty corrected exercises to cover these topics. On your marks....Table of ContentsNotations xi Preface xxi Part 1 Typical Processes in Queues 1 Chapter 1 The Poisson Process 3 1.1 Review of the exponential distribution 3 1.1.1 Definitions 3 1.1.2 The properties of an exponential distribution 4 1.2 Poisson process 10 1.2.1 Definitions 10 1.2.2 Properties of the Poisson process 12 1.3 Exercises 16 Chapter 2 Markov Chains 21 2.1 Markov chains in discrete time 21 2.1.1 Definitions 21 2.1.2 Evolution of a stochastic vector over time 26 2.1.3 Asymptotic behavior 30 2.1.4 Holding time in a state 32 2.1.5 Time-reversible chain 33 2.1.6 Reversible Markov chains 34 2.1.7 Kolmogorov’s criterion 34 2.2 Markov chains in continuous time 35 2.2.1 Definitions 35 2.2.2 Evolution over time 38 2.2.3 Resolving the state equation 41 2.2.4 Asymptotic behavior 42 2.3 Birth and death process 43 2.3.1 Definition 43 2.3.2 Infinitesimal stochastic generator 43 2.3.3 Stationary distribution 44 2.4 Exercises 45 Part 2 Queues 51 Chapter 3 Common Queues 53 3.1 Arrival process of customers in a queue 53 3.1.1 The Poisson process 53 3.1.2 Using the Poisson distribution Rho(lambda) 54 3.1.3 Exponential distribution of delay times 55 3.2 Queueing systems 57 3.2.1 Notation for queueing systems 58 3.2.2 Little distributions 59 3.2.3 Offered traffic 60 3.3 M/M/1 queue 60 3.3.1 Stationary distribution 61 3.3.2 Characteristics of the M/M/1 queue 62 3.3.3 Introducing a factor of impatience 64 3.4 M/M/(Infinity) queue 65 3.5 M/M/n/n queue 66 3.5.1 Stationary distribution 67 3.5.2 Erlang-B formula 67 3.5.3 Characteristics of the M/M/n/n queue 68 3.6 M/M/n queue 68 3.6.1 Stationary distribution 69 3.6.2 Erlang-C formula 70 3.6.3 Characteristics of the M/M/n queue 70 3.7 M/GI/1 queue 71 3.7.1 Stationary distribution 71 3.7.2 Characteristics of the M/GI/1 queue 73 3.8 Exercises 74 Chapter 4 Product-Form Queueing Networks 79 4.1 Jackson networks 80 4.1.1 Definition of a Jackson network 80 4.1.2 Stationary distribution 81 4.1.3 The particular case of the Jackson theorem for open networks 84 4.1.4 Generalization of Jackson networks: BCMP networks 84 4.2 Whittle networks 85 4.2.1 Definition of a Whittle network 85 4.2.2 Stationary distribution 88 4.2.3 Properties of a Whittle network 88 4.3 Exercise 89 Part 3 Teletraffic 91 Chapter 5 Notion of Teletraffic 93 5.1 Teletraffic and its objectives 93 5.2 Definitions 94 5.2.1 Measures in teletraffic 94 5.2.2 Sources and resources 95 5.2.3 Requests and holding time 96 5.2.4 Traffic 97 5.3 Measuring and foreseeing traffic 101 5.3.1 Traffic and service quality 101 5.3.2 Measuring traffic 102 5.3.3 Markovian model of traffic 102 5.3.4 Economy and traffic forecasting 103 5.4 Exercises 103 Chapter 6 Resource Requests and Activity 107 6.1 Infinite number of sources 107 6.1.1 Distribution of requests in continuous time 107 6.1.2 Distribution of requests in discrete time 110 6.1.3 Duration of activity distributions 113 6.1.4 Distribution of busy sources 115 6.2 Finite number of sources 115 6.2.1 Modeling with birth and death processes 116 6.2.2 Distribution of requests 117 6.3 Traffic peaks and randomness 118 6.3.1 Traffic peaks 118 6.3.2 Pure chance traffic 119 6.4 Recapitulation 119 6.5 Exercises 120 Chapter 7 The Teletraffic of Loss Systems 123 7.1 Loss systems 124 7.1.1 Definitions 124 7.1.2 Blocking and loss 124 7.2 The Erlang model 126 7.2.1 Infinite number of resources 127 7.2.2 Finite number of resources 128 7.2.3 Erlang-B formula 131 7.2.4 Dimensioning principles 132 7.3 Engset model 133 7.3.1 Sufficient number of resources 133 7.3.2 Insufficient number of resources 135 7.3.3 On the Engset loss formula 137 7.4 Imperfect loss systems 137 7.4.1 Loss probability in an imperfect system with limited and constant accessibility 137 7.4.2 Losses in a system with limited and variable accessibility 138 7.5 Exercises 138 Chapter 8 Teletraffic in Delay Systems 143 8.1 Delay system 143 8.1.1 Description 143 8.1.2 Characteristics of delay 144 8.2 Erlang model 145 8.2.1 Infinitely long queue 145 8.2.2 Erlang-C formula 146 8.2.3 Distribution of delays 147 8.3 Finite waiting capacity model 150 8.3.1 Queues of finite length 150 8.3.2 Limitations affecting the delay 151 8.4 Palm model 151 8.4.1 M/M/n/N/N queue 152 8.4.2 Characteristics of traffic 153 8.5 General distribution model for activity 153 8.5.1 The Pollaczek--Khinchine formula 153 8.5.2 Activity with a constant duration 154 8.6 Exercises 155 Part 4 Answers to Exercises 161 Chapter 9 Chapter 1 Exercises 163 Chapter 10 Chapter 2 Exercises 171 Chapter 11 Chapter 3 Exercises 185 Chapter 12 Chapter 4 Exercise 197 Chapter 13 Chapter 5 Exercises 201 Chapter 14 Chapter 6 Exercises 205 Chapter 15 Chapter 7 Exercises 207 Chapter 16 Chapter 8 Exercises 211 Part 5 Appendices 219 Appendix 1 221 Appendix 2 227 References 233 Index 235
£112.50
IGI Global Innovative Perspectives on Interactive
Book SynopsisDigital communication has become increasingly prominent in numerous disciplines throughout society due to the high usage levels of interactive systems. Professionals continue to apply trending technologies to their traditional practices as social interaction becomes more computerized. As new innovations are continually being discovered, researchers and practitioners in various areas of work need to stay up to date on the latest findings within interactive communication systems. Innovative Perspectives on Interactive Communication Systems and Technologies is a collection of innovative research on the interdisciplinary methods of internet-based social interaction technologies and their impact on communicative practices in various professional fields. While highlighting topics including health communication, small group settings, and design philosophies, this book is ideally designed for industry experts, researchers, engineers, scientists, policymakers, practitioners, academicians, and students seeking research on modern advancements of interactive communication technologies through real-world applications.
£159.75
Imperial College Press Ultrawideband Antennas: Design And Applications
Book SynopsisUltrawideband (UWB) technology, positioned as the cutting edge of research and development, paves the way to meet the emerging demands set by broadband wireless applications, such as high-speed data transmission, medical imaging, short-range radars, electromagnetic testing, etc.This breathtaking resource builds upon the basics of UWB technology to provide a complete compilation of figures of merit along with a vital state-of-the-art of the different antenna alternatives that are to be employed according to the specific application. Without excessive recourse to mathematics, this volume emphasizes on the UWB antenna design and equips readers with practical prediction techniques based on simple formulas and models. The big picture of UWB antenna technology would not be complete without addressing its applications, and this will serve to provide consultants with key clues for market gap analysis. Containing over 150 supporting illustrations and figures, this comprehensive overview of UWB technology, antenna design and applications is a vital source of information and reference for R&D organizations, researchers, practitioners, consultants, RF professionals and communication engineers.Table of ContentsBroadband and UWB Antenna Topologies (D Puente); Broadband Antenna Measurements: Figures of Merit (D Puente); UWB Monopole Antenna Analysis (D Valderas & I Sancho); Maximization of Bandwidth Operation (D Valderas & I Sancho); Upper Frequency Limit Determination (D Valderas & I Sancho); Folded Sheet Antennas (D Valderas & I Sancho); Revolution Antennas (D Valderas & I Sancho); Printed Antennas (D Valderas & I Sancho); Applications of UWB Antennas (X Chen).
£76.95
ISTE Ltd and John Wiley & Sons Inc Autonomic Networks
Book SynopsisAs the Internet becomes larger and larger, and consequently more difficult to control and to manage, telecommunication operators, manufacturers and companies require tools to perform management and control tasks. A large number of tools coming from different areas have been proposed, but these are not sufficient to handle an evolving and dynamic environment. This book presents and explains all the techniques which integrate a certain level of intelligence (through intelligent software agents for example) in order to represent knowledge, take appropriate decisions, communicate with other entities and achieve a self-managing network.Table of ContentsIntroduction xv Chapter 1. Artificial Intelligence and Monitoring of Telecommunications Networks1 Hassine MOUNGLA 1.1. Introduction 1 1.2. Network management goals 2 1.3. Monitoring needs of telecommunications networks 3 1.4. The telecommunications management network (TMN) 6 1.4.1. TMN management functions 6 1.4.2. TMN architecture 7 1.5. Control in telecommunications networks 7 1.6. Some AI techniques for monitoring telecommunications networks 9 1.6.1. Chronos: an expert system generator for monitoring telecommunications networks 9 1.6.2. Monitoring with model-based techniques 11 1.6.3. Agent technology 12 1.6.4. Example of agent-based telecommunications network monitoring architecture 14 1.6.5. Telecommunications network management with mobile agents 15 1.7. Conclusion 18 1.8. Bibliography 18 Chapter 2. Adaptive and Programmable Management of IP Quality of Service 23 Miguel CASTRO, Dominique GAÏTI, Abdallah M’HAMED and Djamal ZEGHLACHE 2.1. Introduction 23 2.2. Open and programmable network technology 24 2.3. Active and programmable QoS management over IP 25 2.3.1. Programmable modules 28 2.4. Architecture for adaptive and programmable management 31 2.4.1. Legacy mechanisms 33 2.4.2. MMB 33 2.4.3. MAPI 34 2.4.4. Management kernel 34 2.4.5. Core control 34 2.4.6. Hardware 35 2.5. CLAM: a new language for adaptive and programmable management 35 2.6. Related studies 36 2.6.1. Behavioral networks 36 2.6.2. Smart packets 36 2.6.3. SENCOMM 37 2.6.4. General evaluation 38 2.7. Case studies 39 2.7.1. Case study 1: web service optimization 39 2.7.2. Case study 2: maximization of a given objective function 45 2.7.3. Case study 3: adaptive control of equity 49 2.8. Conclusion and perspectives 57 2.9. Bibliography 58 Chapter 3. Software Agents for IP Management 61 Anneli LENICA 3.1. Introduction 61 3.2. IP networks and their management 62 3.2.1. IP networks 62 3.2.2. IP network evolution and associated problems 63 3.2.3. IP network management 65 3.3. The multi-agent paradigm 66 3.3.1. What is an agent? 66 3.3.2. When should MAS be used? 68 3.4. MAS for IP network management 71 3.4.1. MAS for specific network problems 71 3.4.2. Existing applications 72 3.5. Perspectives and conclusion 78 3.6. Bibliography 79 Chapter 4. The Use of Agents in Policy-based Management 83 Francine KRIEF 4.1. Introduction 83 4.2. Policy-based management 85 4.2.1. The policies 85 4.2.2. Information model 86 4.2.3. Architecture 87 4.2.4. COPS protocol 88 4.2.5. Advantages and challenges 89 4.2.6. The agents and their advantage in network management 90 4.3. Provisioning and service control 91 4.3.1. Dynamic QoS provisioning in wired networks 92 4.3.2. Dynamic QoS provisioning in wireless networks 95 4.3.3. Prediction layer 95 4.3.4. Adaptation layer 96 4.3.5. Monitoring layer 96 4.3.6. Mobile agents for policy-based QoS provisioning 97 4.3.7. Dynamic service provisioning for mobile users 98 4.3.8. Intelligent agents for dynamic security control 99 4.4. Agents and service contract negotiation 100 4.4.1. Service contract 100 4.4.2. An intelligent negotiation interface 101 4.4.3. Client-provider dynamic negotiation 104 4.4.4. Dynamic negotiation between providers 105 4.4.5. Dynamic services negotiation for mobile users 107 4.5. Management of emerging services 107 4.5.1. Emerging services 108 4.5.2. Dynamic management of emerging services 109 4.5.3. Dynamic management of group multimedia services 110 4.6. Conclusion 111 4.7. Bibliography 112 Chapter 5. Multi-agent Platforms 117 Zeina EL FERKH JRAD 5.1. Introduction 117 5.2. Towards a standardization of multi-agent technology 118 5.2.1. FIPA model 118 5.2.2. KAOS model 121 5.2.3. General Magic model 122 5.3. Characteristics of a multi-agent platform 122 5.3.1. Methodological requirements for a multi-agent simulation platform 123 5.3.2. Other forms of requirements for an agent platform 124 5.4. Multi-agent platform evaluation 125 5.5. Examples of MAS platforms 127 5.5.1. Platforms for simulation 127 5.5.2. Implementation platforms 131 5.5.3. Mobility platforms 138 5.6. Conclusion 139 5.7. Bibliography 140 Chapter 6. Behavioral Modeling and Multi-agent Simulation 143 Leila MERGHEM-BOULAHIA 6.1. Introduction 143 6.2. Traditional network modeling and simulation approaches 144 6.2.1. Queuing theory 145 6.2.2. Modeling by Petri nets 145 6.2.3. Modeling by process algebra 145 6.2.4. Limits 146 6.3. Multi-agent modeling and simulation 147 6.3.1. Multi-agent simulation steps 147 6.3.2. Contributions 148 6.4. Behavioral modeling 149 6.4.1. Principle 149 6.4.2. Contributions 150 6.5. Two-level behavioral model of a network node 151 6.5.1. Introduction 151 6.5.2. Role of the two behavioral levels 153 6.5.3. Agents 154 6.5.4. Model of two behavioral levels. 154 6.5.5. Ensuring adaptability 156 6.6. Perspectives and conclusion 158 6.7. Bibliography 159 Chapter 7. Behavioral Modeling and Simulation: An Example in Telecommunications Networks 163 Leila MERGHEM-BOULAHIA 7.1. Introduction 163 7.2. Basic behaviors adapted to networks 164 7.2.1. Queue management basic behaviors 164 7.2.2. Scheduling basic behaviors 167 7.2.3. Routing basic behaviors 168 7.3. Metabehaviors 169 7.3.1. Queue management metabehavior 169 7.3.2. Scheduling metabehavior 170 7.3.3. Routing metabehavior 171 7.4. Simulation components and parameters 171 7.4.1. Objects 171 7.4.2. Agents 172 7.4.3. Parameters 173 7.5. A few results 174 7.5.1. Impact of queue management basic behaviors 174 7.5.2. Impact of scheduling basic behaviors 176 7.5.3. Impact of queue management metabehavior rules 178 7.5.4. Impact of scheduling metabehavior rules 179 7.6. Discussion 179 7.7. Conclusion and perspectives 181 7.8. Bibliography 182 Chapter 8. Multi-agent System in a DiffServ Network: Behavioral Models and Platform 185 Nada MESKAOUI 8.1. Introduction 185 8.2. Quality of service – existing solutions and their problems 186 8.2.1. RTP/RTCP 186 8.2.2. IntServ/RSVP 187 8.2.3. DiffServ 187 8.3. Agents, multi-agent systems and architectures 188 8.3.1. Agents 188 8.3.2. MAS 190 8.4. Towards intelligent and cooperative telecommunications networks 191 8.4.1. Node structure 192 8.4.2. Agent components 193 8.4.3. Agent behavioral model 194 8.5. Simulation – platform, topology and results 200 8.5.1. Platform 200 8.5.2. Topology and configuration 201 8.5.3. Simulation results 203 8.6. Conclusion 209 8.7. Bibliography 209 Chapter 9. Intelligent Agent Control Simulation in a Telecommunications Network 213 Hugues LECARPENTIER 9.1. Introduction 213 9.2. Network management and control by intelligent software agents 215 9.2.1. Agent-based admission control 215 9.2.2. Project Tele-MACS 215 9.2.3. Project Hybrid 215 9.2.4. Route selection by mobile agents 216 9.2.5. Cooperative mobile agents for network mapping 216 9.2.6. Project MAGNA 216 9.3. Simulating the behavior of intelligent agents in a communication network 217 9.3.1. Simulation of behavioral quality of service network control 217 9.3.2. Intelligent control simulation of a DiffServ network 217 9.3.3. Comparison and choice of a platform 218 9.4. Detailed simulator presentation 218 9.4.1. Structure of an INET node 219 9.5. Software agent architecture 224 9.5.1. Events monitor 226 9.5.2. Cleaner 227 9.5.3. Message interface 227 9.5.4. Task interface 229 9.5.5. Manager 229 9.6. Illustration 229 9.6.1. Quality of service control for voice over IP 229 9.6.2. Presentation of agents and routers used 230 9.7. Conclusion 231 9.8. Bibliography 231 Chapter 10. Agents and 3rd and 4th Mobile Generations 233 Badr BENMAMMAR 10.1. Introduction 233 10.2. Agent technology 234 10.2.1. Definition of an agent 234 10.3. Introduction to UMTS 238 10.3.1. VHE 239 10.3.2. Application of agents in UMTS 241 10.4. Introduction to WLAN 253 10.4.1. Application of agents in wireless networks 254 10.4.2. Problems related to the application of MAS in wireless environments 256 10.5. 4th generation mobile network 256 10.5.1. Definition of 4th generation 256 10.5.2. User expectations for mobile 4G networks 257 10.5.3. Technical conditions to achieve 4th mobile generation 258 10.5.4. Application of agents in 4G mobile networks 258 10.6. Conclusion 263 10.7. Bibliography 264 Chapter 11. Learning Techniques in a Mobile Network 267 Sidi-Mohammed SENOUCI 11.1. Introduction 267 11.2. Learning 269 11.2.1. Unsupervised learning 269 11.2.2. Supervised learning 269 11.2.3. Reinforcement learning 270 11.3. Call admission control 275 11.3.1. Problem formulation 275 11.3.2. Implementation of algorithm 276 11.3.3. Experimental results 278 11.4. Dynamic resource allocation 280 11.4.1. Problem formulation 281 11.4.2. Algorithm implementation 282 11.4.3. Experimental results 283 11.5. Conclusion 284 11.6. Bibliography 286 Chapter 12. An Experimental Example of Active Networks: The Amarrage Project 289 Nadjib ACHIR, Yacine GHAMRI-DOUDANE and Mauro FONSECA 12.1. Introduction 289 12.2. Description of the Amarrage project 291 12.2.1. Objectives 291 12.2.2. Contributions 292 12.3. Active networks: active architecture example for the control and management of DiffServ networks 296 12.3.1. DiffServ 298 12.3.2. Policy-based control 300 12.3.3. Description of architecture components 302 12.3.4. Capsule filtering at the level of data plan 305 12.3.5. Active router resource monitoring 305 12.3.6. Definition of QoS policies 306 12.3.7. Definition and deployment of TCB 307 12.3.8. Sensor deployment 309 12.3.9. Implementation of DACA architecture 310 12.3.10. Evaluation of DACA architecture behavior 312 12.4. Conclusion 315 12.5. Bibliography 315 List of Authors 317 Index 319
£167.15
ISTE Ltd and John Wiley & Sons Inc Mobile Access Safety: Beyond BYOD
Book SynopsisOver recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise. Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context.Table of ContentsIntroduction ix Chapter 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility 1 1.1. A busy day 1 1.2. The ups and downs of the day 3 1.3. What actually happened? 3 Chapter 2. Threats and Attacks 7 2.1. Reconnaissance phase 9 2.1.1. Passive mode information gathering techniques 10 2.1.2. Active mode information gathering techniques 14 2.2. Identity/authentication attack 22 2.2.1. ARP spoofing 22 2.2.2. IP spoofing 22 2.2.3. Connection hijacking 29 2.2.4. Man in the middle 29 2.2.5. DNS spoofing 30 2.2.6. Replay attack 31 2.2.7. Rebound intrusion 31 2.2.8. Password hacking 32 2.2.9. The insecurity of SSL/TLS 34 2.3. Confidentiality attack 38 2.3.1. Espionage software 39 2.3.2. Trojans 41 2.3.3. Sniffing 43 2.3.4. Cracking encrypted data 44 2.4. Availability attack 49 2.4.1. ICMP Flood 50 2.4.2. SYN Flood 50 2.4.3. Smurfing 52 2.4.4. Log Flood 52 2.4.5. Worms 53 2.5. Attack on software integrity 55 2.6. BYOD: mixed-genre threats and attacks 57 2.7. Interception of GSM/GPRS/EDGE communications 61 Chapter 3. Technological Countermeasures 65 3.1. Prevention 66 3.1.1. Protection of mobile equipment 67 3.1.2. Data protection 71 3.2. Detection 81 3.2.1. Systems of intrusion detection 81 3.2.2. Honeypot 88 3.2.3. Management and supervision tools 91 3.3. Reaction 95 3.3.1. Firewall 95 3.3.2. Reverse proxy 102 3.3.3. Antivirus software 104 3.3.4. Antivirus software: an essential building block but in need of completion 107 3.4. Organizing the information system’s security 108 3.4.1. What is security organization? 109 3.4.2. Quality of security, or the attraction of ISMS 110 Chapter 4. Technological Countermeasures for Remote Access 113 4.1. Remote connection solutions 114 4.1.1. Historic solutions 115 4.1.2. Desktop sharing solutions 115 4.1.3. Publication on the Internet 116 4.1.4. Virtual Private Network (VPN) solutions 118 4.2. Control of remote access 137 4.2.1. Identification and authentication 139 4.2.2. Unique authentication 155 4.3. Architecture of remote access solutions 157 4.3.1. Securing the infrastructure 157 4.3.2. Load balancing/redundancy 161 4.4. Control of conformity of the VPN infrastructure 162 4.5. Control of network admission 166 4.5.1. Control of network access 166 4.5.2. ESCV (Endpoint Security Compliancy Verification) 167 4.5.3. Mobile NAC 170 Chapter 5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary 173 5.1. The attack at Mr Rowley’s house 173 5.1.1. Securing Mr Rowley’s PC 173 5.1.2. Securing the organizational level 174 5.1.3. Detection at the organizational level 175 5.1.4. A little bit of prevention 175 5.2. The attack at the airport VIP lounge while on the move 176 5.3. The attack at the café 176 5.4. The attack in the airport VIP lounge during Mr Rowley’s return journey 178 5.5. The loss of a smartphone and access to confidential data 180 5.6. Summary of the different security solutions that should have been implemented 181 Conclusion 187 APPENDICES 189 Appendix 1 191 Appendix 2 197 Bibliography 223 Index 233
£125.06
ISTE Ltd and John Wiley & Sons Inc Energy Efficiency in Wireless Networks
Book SynopsisThe last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network “traffic” generated over network infrastructures. This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate “always on” reliable high-speed wireless access from anywhere, at anytime to accommodate the new paradigm of the “Internet of Things” (IoT). The pervasive and exponential growth of Wi-Fi and the impact of bandwidth-intensive applications on the energy consumption of Wi-Fi-enabled devices are discussed along with energy harvesting as an advantageous option to power WAHNs. The book aims to serve as a useful reference for researchers, students, regulatory authorities, and educators.Table of ContentsPREFACE ix CHAPTER 1. ENERGY EFFICIENCY IN CELLULAR NETWORKS 1 1.1. Overview of cellular communication networks 1 1.2. Metrics for measuring energy efficiency in cellular wireless communication systems 4 1.3. Energy efficiency in base stations 4 1.4. Energy-efficient cellular network design 10 1.5. Interference management and mitigation 11 1.6. Enabling technologies 12 1.6.1. Energy-efficient communication via cognitive radio 12 1.6.2. Using cooperative relays to support energy-efficient communication 13 1.6.2.1. Enabling energy-efficient communication via fixed relays 14 1.6.2.2. Communications in cellular networks via user cooperation 15 CHAPTER 2. ENERGY EFFICIENCY IN WIRELESS AD HOC NETWORKS 17 2.1. Overview of wireless ad hoc networks 17 2.2. Metrics for measuring energy efficiency in wireless ad hoc networks 18 2.3. Energy losses in wireless ad hoc networks 19 2.4. Energy efficiency in wireless sensor networks 20 2.4.1. Energy efficiency in wireless sensor networks 21 2.5. Mobile ad hoc networks (MANETs) 32 2.5.1. Energy efficiency in mobile ad hoc networks 33 CHAPTER 3. ENERGY EFFICIENCY IN WIRELESS LOCAL AREA NETWORKS 37 3.1. Overview of wireless local area networks 37 3.2. Energy consumption metrics for WLANs 39 3.3. Energy efficiency in WLANs 40 3.3.1. Physical layer-based energy-efficient schemes 40 3.3.2. Medium access control (MAC) layer-based energy-efficient schemes 40 3.3.3. Cross-layer-based energy-efficient schemes 43 3.4. Energy efficiency strategies in IEEE 802.11n 46 CHAPTER 4. ENERGY HARVESTING IN WIRELESS SENSOR NETWORKS 49 4.1. Energy harvesting 49 4.1.1. The harvesting concept 53 4.1.1.1. Universal energy-harvesting model 54 4.2. Harvesting techniques 55 4.2.1. Mechanical energy sources 55 4.2.2. Thermal energy sources 57 4.2.3. Radiation energy sources 58 4.2.4. Comparison of harvesting sources 60 4.3. Energy harvesting storage devices 61 4.4. Power management for EH-WSN 62 4.4.1. Discussion on power management for energy harvesting systems 63 4.5. Conclusion 64 CHAPTER 5. FUTURE CHALLENGES AND OPPORTUNITIES 65 5.1. Energy efficiency in cellular networks 65 5.1.1. Low-energy spectrum sensing 66 5.1.2. Energy-aware medium access control and energy-efficient routing 66 5.1.3. Energy-efficient resource management in heterogeneous cellular networks 67 5.1.4. Cross-layer design and optimization 67 5.1.5. Energy considerations in practical deployments of cooperative and cognitive radio systems 68 5.2. Energy efficiency in ad hoc networks 69 5.2.1. Sampling techniques 69 5.2.2. MAC protocols 70 5.2.3. Routing 70 5.2.4. Mobility challenges 71 5.2.5. Cognitive radio technology applied in wireless ad hoc networks 71 5.3. Energy efficiency in WLAN 71 5.3.1. IEEE 802.11ac (gigabit Wi-Fi) 71 5.3.2. MIMO-based WLAN 72 5.3.3. Super Wi-Fi (IEEE 802.22) 72 5.4. Energy harvesting in wireless sensor networks 73 5.4.1. Challenges for energy harvesting in harsh conditions 73 5.4.2. Radiation-based energy harvesters 74 5.4.3. Mechanical sources 74 5.4.4. Thermal sources 75 5.4.5. Medical energy harvesting for wireless sensor devices 75 5.5. Energy efficiency for wireless technologies for developing countries 76 BIBLIOGRAPHY 79 LIST OF ACRONYMS 97 INDEX 101
£132.00
ISTE Ltd and John Wiley & Sons Inc Radio Resource Allocation and Dynamic Spectrum
Book SynopsisWe are currently witnessing an increase in telecommunications norms and standards given the recent advances in this field. The increasing number of normalized standards paves the way for an increase in the range of services available for each consumer. Moreover, the majority of available radio frequencies have already been allocated. This explains the emergence of cognitive radio (CR) – the sharing of the spectrum between a primary user and a secondary user. In this book, we will present the state of the art of the different techniques for spectrum access using cooperation and competition to solve the problem of spectrum allocation and ensure better management of radio resources in a radio cognitive context. The different aspects of research explored up until now on the applications of multi-agent systems (MAS) in the field of cognitive radio are analyzed in this book. The first chapter begins with an insight into wireless networks and mobiles, with special focus on the IEEE 802.22 norm, which is a norm dedicated to CR. Chapter 2 goes into detail about CR, which is a technical field at the boundary between telecommunications and Artificial Intelligence (AI). In Chapter 3, the concept of the “agent” from AI is expanded to MAS and associated applications. Finally, Chapter 4 establishes an overview of the use of AI techniques, in particular MAS, for its allocation of radio resources and dynamic access to the spectrum in CR. Contents 1. Wireless and Mobile Networks. 2. Cognitive Radio. 3. Multi-agent Systems. 4. Dynamic Spectrum Access. About the Authors Badr Benmammar has been Associate Professor at UABT (University Abou Bekr Belkaïd Tlemcen), Algeria since 2010 and was a research fellow at CNRS LaBRI Laboratory of the University of Bordeaux 1 until 2007. He is currently carrying out research at the Laboratory of Telecommunications of Tlemcen (LTT), UABT, Algeria. His main research activities concern the cognitive radio network, Quality of Service on mobile and wireless networks, end-to-end signaling protocols and agent technology. His work on Quality of Service has led to many publications in journals and conference proceedings. Asma Amraoui is currently a PhD candidate; she is preparing a doctoral thesis on a topic of research that explores the use of artificial intelligence techniques in cognitive radio networks. She is attached to the Laboratory of Telecommunications of Tlemcen (LTT) in Algeria.Table of ContentsACRONYMS ix INTRODUCTION xiii CHAPTER 1. WIRELESS AND MOBILE NETWORKS 1 1.1. Introduction 1 1.2. Wireless networks 2 1.2.1. Definition 2 1.2.2. Function of a wireless network 3 1.2.2.1. Network with infrastructure 3 1.2.2.2. Network without infrastructure 4 1.2.3. Types of wireless networks 5 1.2.3.1. Wireless personal area network 6 1.2.3.2. Wireless local area network 6 1.2.3.3. Wireless metropolitan area network 6 1.2.3.4. Wireless wide area network 6 1.2.3.5. Wireless regional area network 6 1.2.4. Different types of existing wireless networks 7 1.2.4.1. Networks using infrared waves 7 1.2.4.2. Networks using radio waves 7 1.2.5. IEEE 802.22 standard 12 1.3. Mobile networks 12 1.3.1. Wireless and mobility 12 1.3.2. Mobility 13 1.3.3. Cellular architecture 13 1.3.4. Architecture of a cellular network 14 1.3.5. Telephony 15 1.3.6. Development of cellular systems 16 1.3.6.1. First generation 16 1.3.6.2. Second generation 16 1.3.6.3. Third generation 18 1.3.6.4. Fourth generation 18 1.4. WiMAX mobile and 4G 19 1.5. Conclusion 20 CHAPTER 2. COGNITIVE RADIO 23 2.1. Introduction 23 2.2. Software radio 24 2.2.1. Software-defined radio 24 2.3. Introduction to cognitive radio 24 2.3.1. History 24 2.3.2. Definition 25 2.3.3. Relationship between cognitive radio and software-defined radio 26 2.3.4. Structure 27 2.3.5. Cognition cycle 29 2.3.6. Components of cognitive radio 31 2.3.7. Functions of cognitive radio 32 2.4. Languages of cognitive radio 35 2.5. Domains of cognitive radio applications 36 2.6. Conclusion 38 CHAPTER 3. MULTI-AGENT SYSTEMS 39 3.1. Introduction 39 3.2. Definition of an agent 39 3.2.1. The multidimensional characteristics of an agent 40 3.2.2. An agent’s concrete architecture 41 3.2.2.1. Architecture of logical agents 41 3.2.2.2. Reactive architecture 42 3.2.2.3. BDI architecture 42 3.2.2.4. Multilevel architecture 44 3.2.3. Model of an agent 45 3.3. Multi-agent systems 46 3.3.1. Communication between agents 46 3.3.1.1. Coordination protocols 46 3.3.1.2. Cooperation protocols 47 3.3.1.3. Negotiation 47 3.4. Application of MAS in telecommunications 48 3.4.1. MAS applications on the Web 48 3.4.2. Application of MAS in virtual private networks 49 3.4.3. Using MAS in the setting of third generation mobiles 50 3.4.4. Application of MAS in network supervision and management 50 3.5. Conclusion 50 CHAPTER 4. DYNAMIC SPECTRUM ACCESS 53 4.1. Introduction 53 4.2. Intelligent algorithms 54 4.2.1. Neural networks 55 4.2.2. Fuzzy logic 56 4.2.3. Genetic algorithms 57 4.3. Dynamic spectrum access 58 4.3.1. Spectrum access using the auction approach 58 4.3.2. Spectrum access using game theory 59 4.3.3. Spectrum access using Markov’s approach 60 4.3.4. Spectrum access using multi-agent systems 61 4.4. Conclusion 64 BIBLIOGRAPHY 67 FURTHER READING 75 INDEX 77
£132.00
ISTE Ltd and John Wiley & Sons Inc Dynamic Wireless Sensor Networks
Book SynopsisIn this title, the authors leap into a novel paradigm of scalability and cost-effectiveness, on the basis of resource reuse. In a world with much abundance of wirelessly accessible devices, WSN deployments should capitalize on the resources already available in the region of deployment, and only augment it with the components required to meet new application requirements. However, if the required resources already exist in that region, WSN deployment converges to an assignment and scheduling scheme to accommodate for the new application given the existing resources. Such resources are polled from many fields, including multiple WSNs already in the field, static networks (WiFi, WiMAX, cellular, etc) in addition to municipal, industrial and mobile resources.The architecture, framework and pricing policy, as well as approaches for backward compatibility with existing deployments, are presented in this book. We elaborate on the formalization of the problem, and contrast with existing work on coverage. This paradigm adopts optimal assignments in WSNs and exploits dynamic re-programming for boosting post-deployment and backward compatible protocols.Table of Contents1. Evolution of Wireless Sensor Networks. 2. Shifting to Dynamic WSN Paradigms. 3. Resilience and Post-Deployment Maintenance. 4. Current Hindrances in WSNs. 5. Cloud-Centric WSNs. 6. The Resource-Reuse WSN Paradigm. 7. Component-Based WSNs: a Resilient Architecture. 8. Dynamic WSNs – Utilizing Ubiquitous Resources. 9. Realizing a Synergetic WSN Architecture for All Resources. 10. Future Directions in Sensor Networks.
£125.06
ISTE Ltd and John Wiley & Sons Inc Wireless Telecommunication Systems
Book SynopsisWireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures. We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunications systems. Contents 1. Radio Propagation. 2. F/TDMA and GSM. 3. CDMA and UMTS. 4. OFDM and LTE. 5. MIMO and Beamforming. 6. UWB. 7. Synchronization. 8. Digital Communications Fundamentals. 9. Erlang B Tables. About the Authors Michel Terré received his engineering degree from Télécom SudParis, his phD in electronics and telecommunications from Conservatoire National des Arts et Métiers (CNAM), and his habilitation to conduct researches from Paris XIII University. He is a full professor at Conservatoire National des Arts et Métiers. He his responsabile of CNAM’s Master of Science in radiocommunicationssystems. Mylène Pischella received her engineering degree and her phD in electronics and telecommunications from Télécom ParisTech. She is an associate professor at Conservatoire National des Arts et Métiers (CNAM). Emmanuelle Vivier received her engineering degree from Institut Supérieur d’Electronique de Paris (ISEP) and her PhD in radiocommunications from Conservatoire National des Arts et Métiers (CNAM). She is an associate professor at ISEP, where she is responsible of networks and telecommunications teaching majors.Table of ContentsForeword ix Preface xi Chapter 1 Radio Propagation 1 1.1 Free-space loss link budget and capacity 2 1.2 Link budget and free-space loss 7 1.3 Linear expression of the Okumura-Hata model 9 1.4 Frequency, distance and propagation model 11 1.5 Link budget and diffraction 13 1.6 Link budget and refraction 15 1.7 Link budget and diffusion 18 1.8 Frequency and time selectivity 20 1.9 Doppler effect 21 Chapter 2 F/TDMA and GSM 23 2.1 Maximum transmitter–receiver distance 24 2.2 Extended maximum transmitter-receiver distance 26 2.3 Reuse distance, interference reduction factor K and regular pattern 26 2.4 Radio resources dimensioning in GSM 32 2.5 Link budget in an isolated GSM cell 33 2.6 Deployment of a GSM network along a highway 36 2.7 GSM network dimensioning and planning in a rural area 41 2.8 GSM network dimensioning and planning in an urban area 44 2.9 SMS transmission in a GSM network 46 2.10 Frequency reuse pattern determination 48 2.11 Traffic and Erlang for GSM cell dimensioning 50 2.12 Signal to noise plus interference ratio 52 Chapter 3 CDMA and UMTS 59 3.1 Spreading and CDMA 63 3.2 Hadamard spreading codes: a perfect orthogonality between the users? 64 3.3 Relation between Eb/N0 and the reception threshold in UMTS networks 69 3.4 Required number of codes in CDMA 70 3.5 UMTS link budget 71 3.6 Cell breathing in UMTS networks 77 3.7 Intersite distance calculation in UMTS networks for different frequency reuse patterns 80 3.8 Case study in UMTS networks 83 Chapter 4 OFDM and LTE 95 4.1 Useful throughput of an OFDM waveform 96 4.2 OFDM and PAPR 100 4.3 Frequency selectivity and OFDM dimensioning 104 4.4 OFDM dimensioning 106 4.5 OFDM dimensioning for 4G networks and data rate evaluations 107 4.6 LTE data rates evaluation 110 4.7 LTE link budget 113 4.8 LTE link budget taking into account the number of users 120 4.9 Modulation-coding scheme relation, spectral efficiency and SINR in LTE networks 123 Chapter 5 MIMO and Beamforming 129 5.1 Beamforming and signal-to-noise ratio 133 5.2 Space diversity and chi-square distribution 140 5.3 MIMO and capacity 149 Chapter 6 UWB 155 6.1 Impulse UWB 157 6.2 UWB and OFDM 161 6.3 Link budget for UWB transmission 163 Chapter 7 Synchronization 167 7.1 Cramer–Rao bound 168 7.2 Modified Cramer–Rao bound 170 7.3 Constant parameter estimation 170 7.4 Radio burst synchronization 174 7.5 Phase estimation for QPSK modulation 176 Chapter 8 Digital Communications Fundamentals 179 8.1 Review of signal processing for signal--to-noise ratio 179 8.2 Review of digital modulations 179 8.3 Review of equalization 180 8.4 Signal-to-noise ratio estimation 181 8.5 ASK 2 modulation error probability 184 8.6 Spectral occupancy, symbol rate and binary throughput 187 8.7 Comparison of two linear digital modulations 189 8.8 Comparison of two-PSK modulation and power evaluations 191 8.9 Zero-forcing linear equalization 194 8.10 Minimum mean square error linear equalization 196 8.11 Noise factor in equipments 200 8.12 Data rate calculations 203 Chapter 9 Erlang B Tables 205 Bibliography 209 Index 211
£125.06
ISTE Ltd and John Wiley & Sons Inc LTE Standards
Book SynopsisLTE (long-term evolution) mobile communication system is offering high bitrates in IP communications. Fourth Generation Mobile Communications/LTE describes various aspects of LTE as well as the change of paradigm, which it is bringing to mobile communications. The book is a vital resource for the entire mobile communication community. Coverage includes: LTE standards and architecture, Radio access sub-system, Signaling on the radio path, Macrocells, microcells, femtocells, SIM card and security, SIM card description, GPS driven applications, The Apple model, and much more more.Table of ContentsLIST OF FIGURES xi LIST OF TABLES xix INTRODUCTION xxi CHAPTER 1. LTE STANDARDS AND ARCHITECTURE 1 1.1. 3rd generation partnership project (3GPP) 1 1.1.1. 3GPP history 1 1.1.2. 3GPP, the current organization 3 1.1.3. 3GPP releases 8 1.2. LTE – numbering and addressing 10 1.2.1. The network IDs 11 1.2.2. The MME IDs 11 1.2.3. The tracking area IDs 11 1.2.4. The Cell IDs 12 1.2.5. The mobile equipment ID 12 1.3. LTE architecture overview 13 1.3.1. Overall high level description of LTE 14 1.3.2. LTE performance 22 1.3.3. LTE – QoS architecture 23 1.3.4. FDD, TDD, LTE advanced 23 1.3.5. Frequencies for LTE 24 1.3.6. Basic parameters of LTE 25 1.4. Radio access subsystem: eUTRAN (also called eUTRA) 26 1.4.1. LTE visualization tool from Rohde and Schwartz 28 1.4.2. eUTRAN characteristics 28 1.4.3. eUTRAN interfaces 30 1.4.4. Signaling on the radio path 35 1.4.5. Physical layer 46 1.4.6. RLC and MAC layer 49 1.4.7. Dynamic radio resource management in LTE 51 1.4.8. MIMO 52 1.4.9. Macrocells, microcells and femtocells 53 1.5. Core network 54 1.5.1. LTE network elements 57 1.5.2. LTE interfaces [TS 23.401] 59 1.5.3. Functional split between the E-UTRAN and the EPC 69 1.5.4. S1 interface-based handover 70 1.6. LTE – roaming architecture 83 1.6.1. LTE network mobility management 87 1.7. SIM for communications privacy 89 1.7.1. SIM 89 1.7.2. USIM 95 1.7.3. ISIM 96 1.8. Glossary 96 1.9. Appendix 1: Complete submission of 3GPP LTE release 10 and beyond (LTE-advanced) under step 3 of the IMT-advanced process 98 1.9.1. Summary of the candidate submission.98 1.9.2. Classification of the candidate submission 100 1.9.3. Detailed checklist for the required elements for each candidate RIT within the composite SRIT and/or for the composite SRIT of the candidate submission (to fulfill section 3.1 of ITU-R Report M.2133) 100 1.9.4. Additional supporting information 102 1.9.5. Contact person 102 1.10. Appendix 2: GPRS Tunneling Protocol (GTP) 102 1.11. Appendix 3: The SGW implementation by CISCO 107 1.12. Appendix 4: AT&T has LTE small cells “in the lab”: Source Dan Janes, Site Editor, Light Reading mobile [JON 13] 110 CHAPTER 2. OFDMA 113 2.1. What is OFDM/OFDMA?.113 2.1.1. Claimed OFDMA advantages 115 2.1.2. Recognized disadvantages of OFDMA 116 2.1.3. Characteristics and principles of operation 117 2.2. General principles 118 2.2.1. Cyclic prefixes 122 2.3. LTE channel: bandwidths and characteristics 124 2.3.1. LTE OFDM cyclic prefix, CP 125 2.3.2. LTE OFDMA in the downlink 126 2.3.3. Downlink carriers and resource blocks 127 2.3.4. LTE SC-FDMA in the uplink 128 2.3.5. Transmitter and receiver structure of LP-OFDMA/SC-FDMA 130 2.4. OFDM applied to LTE 132 2.4.1. General facts 132 2.4.2. LTE downlink 133 2.4.3. Uplink 136 2.5. OFDMA in the LTE radio subsystem: OFDMA and SCFDMA in LTE 138 2.5.1. The downlink physical-layer processing of transport channels 138 2.5.2. Downlink multi-antenna transmission 139 2.5.3. Uplink basic transmission scheme 140 2.5.4. Physical-layer processing 141 2.6. Appendix 1: the constraints of mobile radio 143 2.6.1. Doppler effect 144 2.6.2. Rayleigh/Rice fading 145 2.6.3. Area of service 151 2.6.4. Shadow effect 153 2.7. Appendix 2: Example of OFDM/OFDMA technological implementation Innovative DSP 153 2.8. Appendix 3: LTE error correction on the radio path [WIK 14d] 154 2.8.1. Hybrid ARQ with soft combining 156 2.9. Appendix 4: The 700 MHz frequencies in the USA for LTE 157 2.9.1. Upper and lower 700 MHz 158 CHAPTER 3. THE FULL IP CORE NETWORK 159 3.1. Fixed mobile convergence 159 3.2. IP multimedia subsystem 160 3.2.1. General description of IMS 160 3.2.2. Session Initiation Protocol 162 3.2.3. IMS components and interfaces 163 3.3. Evolved packet system in 3GPP standards182 3.3.1. Policy and charging rules function 182 3.3.2. Release 8 system architecture evolution and evolved packet system 184 3.4. Telephony processing 192 3.4.1. Enhanced voice quality 192 3.4.2. Circuit-switched fallback (CSFB) 192 3.4.3. Simultaneous voice and LTE (SVLTE) 192 3.4.4. Over-The-Top (OTT) applications 193 3.5. The requirements of VoLTE and V.VoIP applications 195 3.6. Voice and video over LTE are achieved using voice on IP channels (VoLTE) 196 3.7. Cut down version of IMS 201 3.8. Latency management 202 3.9. Appendix 1: VoIP tests in UK 205 CHAPTER 4. LTE SECURITY. SIM/USIM SUBSYSTEM 207 4.1. LTE security 207 4.1.1. Principles of LTE security 209 4.1.2. LTE EPC security 210 4.1.3. Interfaces protection 214 4.1.4. Femtocells and relays 215 4.1.5. Specifications 215 4.2. SIM card 216 4.2.1. SIM-lock 218 4.2.2. Electronic component of the UICC 219 4.2.3. Form factor 219 4.2.4. SIM card physical interface 221 4.2.5. UICC communication protocol 221 4.2.6. Operating system (OS) and virtual machines 223 4.2.7. (U)SIM authentication 224 4.2.8. LTE USIM 225 4.2.9. ISIM 226 4.2.10. Over the Air Activation (OTA) 228 4.2.11. Security services 228 4.2.12. USIM directories 228 4.2.13. The UICC/SIM/USIM/ISIM industry 237 4.2.14. EAP-SIM and EAP 237 APPENDIX 239 BIBLIOGRAPHY 253 INDEX 257
£125.06
ISTE Ltd and John Wiley & Sons Inc Wireless Power Transfer via Radiowaves
Book SynopsisRecent advances in Wireless Power Transmission (WPT) technologies have enabled various engineering applications with potential product implementation. WPT can be utilized to charge batteries in various pieces of equipment without the need for a wired connection. Energy can be harvested from ambient RF and microwave radiation and 1 million kW microwaves can be transmitted from space to the ground.This book covers all the theory and technologies of WPT, such as microwave generators with semi-conductors and microwave tubes, antennas, phased arrays, beam efficiency, and rectifiers (rectenna). The authors also discuss coupling WPT. Applications, such as energy harvesting, sensor networks, point-to-point WPT, WPT to moving targets (airplane, vehicle, etc.) and Solar Power Satellite are also presented.Table of ContentsIntroduction ix Chapter 1. History, Present and Future of WPT 1 1.1. Theoretical predictions and the first trial in the 19th Century 1 1.2. Rejuvenated WPT by microwaves in the 1960s 3 1.3. Inductive coupling WPT projects in the 20th Century 10 1.4. WPT as a game-changing technology in the 21st Century 12 Chapter 2. Theory of WPT 21 2.1. Theoretical background 21 2.2. Beam efficiency and coupling efficiency 22 2.2.1. Beam efficiency of radiowaves 22 2.2.2. Theoretical increase of beam efficiency 26 2.2.3. Coupling efficiency at very close coupling distance 31 2.3. Beam forming 33 2.3.1. Beam-forming theory for the phased array and its error 33 2.3.2. Target detecting via radiowaves 42 2.4. Beam receiving 47 Chapter 3. Technologies of WPT 53 3.1. Introduction 53 3.2. Radio frequency (RF) generation – HPA using semiconductors 56 3.3. RF generation – microwave tubes 62 3.3.1. Magnetrons 63 3.3.2. Traveling wave tube/traveling wave tube amplifier 78 3.3.3. Klystron 80 3.4 Beam-forming and target-detecting technologies with phased array 81 3.4.1. Introduction 81 3.4.2. Phased array in the 1990s 82 3.4.3. Phased array in the 2000s 88 3.4.4. Phased array using magnetrons 98 3.4.5. Retrodirective system 105 3.5. RF rectifier – rectenna and tube type 110 3.5.1. General rectifying theory of rectenna 110 3.5.2. Various rectennas I – rectifying circuits 118 3.5.3. Various rectennas II – higher frequency and dual bands 123 3.5.4. Various rectennas III – weak power and energy harvester 129 3.5.5. Rectenna array 133 3.5.6. Rectifier using vacuum tube 138 Chapter 4. Applications of WPT 143 4.1. Introduction 143 4.2. Energy harvesting 145 4.3. Sensor network 152 4.4. Ubiquitous power source 156 4.5. MPT in a pipe 160 4.6. Microwave buildings 164 4.7. 2D WPT 169 4.8. Wireless charging for electric vehicles 171 4.9. Point-to-point WPT 177 4.10. WPT to moving/flying target 178 4.11. Solar power satellite 185 4.11.1. Basic concept 185 4.11.2. SPS as clean energy source of CO2-free energy and for sustainable humanosphere 187 4.11.3. MPT on SPS. 190 4.11.4. Various SPS models 192 Bibliography 213 Index 237
£125.06
ISTE Ltd and John Wiley & Sons Inc Advanced Routing Protocols for Wireless Networks
Book SynopsisThis text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.Table of ContentsPREFACE ix INTRODUCTION xi CHAPTER 1. WIRELESS NETWORKING BASIC ASPECTS 1 1.1. Introduction 1 1.2. Link layer 1 1.2.1. Contention-based protocols 2 1.2.2. Contention-free protocols 5 1.3. Physical layer 6 1.4. IEEE 802.11 9 1.4.1. Link layer 9 1.4.2. Physical layer 11 1.5. Summary 12 CHAPTER 2. BASIC ROUTING CONCEPTS 13 2.1. Introduction 13 2.2. Distance-vector-based algorithms 14 2.3. Link-state-based algorithms 15 2.4. Summary 15 CHAPTER 3. AD HOC ROUTING 17 3.1. Introduction 17 3.2. Architecture 18 3.3. Routing metrics 19 3.4. Routing protocols 20 3.4.1. Proactive protocols 21 3.4.2. Reactive protocols 24 3.4.3. Hybrid protocols 28 3.5. Summary 30 CHAPTER 4. MESH ROUTING 31 4.1. Introduction 31 4.2. Architecture 33 4.3. Routing metrics 36 4.4. Routing protocols 44 4.4.1. Ad-hoc-based protocols 44 4.4.2. Controlled flooding protocols 47 4.4.3. Opportunistic protocols 49 4.4.4. Traffic-aware protocols 53 4.5. Summary 56 CHAPTER 5. VEHICULAR ROUTING 57 5.1. Introduction 57 5.2. Architecture 58 5.3. Routing metrics 58 5.4. Routing protocols 58 5.4.1. Topology-based protocols 59 5.4.2. Position-based protocols 61 5.4.3. Opportunistic protocols 64 5.4.4. Information dissemination protocols 67 5.5. Summary 70 CHAPTER 6. SENSOR ROUTING 71 6.1. Introduction 71 6.2. Architecture 72 6.3. Routing metrics 73 6.4. Routing protocols 75 6.4.1. Data-centric protocols 76 6.4.2. Hierarchical or cluster-based protocols 81 6.4.3. Location-based protocols 85 6.4.4. QoS-aware protocols 89 6.5. Summary 92 CHAPTER 7. DELAY- AND DISRUPTION-TOLERANT NETWORK ROUTING 93 7.1. Introduction 93 7.2. Architecture 96 7.3. Routing metrics 99 7.4. Routing protocols 101 7.4.1. Opportunistic protocols 102 7.4.2. History-based protocols 105 7.4.3. Model-based protocols 109 7.4.4. Social-based protocols 110 7.5. Summary 115 CONCLUSION 117 BIBLIOGRAPHY 119 INDEX 129
£125.06
ISTE Ltd and John Wiley & Sons Inc MMSE-Based Algorithm for Joint Signal Detection,
Book SynopsisThis book presents an algorithm for the detection of an orthogonal frequency division multiplexing (OFDM) signal in a cognitive radio context by means of a joint and iterative channel and noise estimation technique. Based on the minimum mean square criterion, it performs an accurate detection of a user in a frequency band, by achieving a quasi-optimal channel and noise variance estimation if the signal is present, and by estimating the noise level in the band if the signal is absent. Organized into three chapters, the first chapter provides the background against which the system model is presented, as well as some basics concerning the channel statistics and the transmission of an OFDM signal over a multipath channel. In Chapter 2, the proposed iterative algorithm for the noise variance and the channel estimation is detailed, and in Chapter 3, an application of the algorithm for the free-band detection is proposed. In both Chapters 2 and 3, the principle of the algorithm is presented in a simple way, and more elaborate developments are also provided. The different assumptions and assertions in the developments and the performance of the proposed method are validated through simulations, and compared to methods of the scientific literature.Table of ContentsIntroduction ix Chapter 1. Background and System Model 1 1.1. Channel model 1 1.1.1. The multipath channel 1 1.1.2. Statistics of the channel 2 1.2. Transmission of an OFDM signal 7 1.2.1. Continuous representation 7 1.2.2. Discrete representation 9 1.2.3. Discrete representation under synchronization mismatch 12 1.3. Pilot symbol aided channel and noise estimation 12 1.3.1. The pilot arrangements 12 1.3.2. Channel estimation 15 1.3.3. Noise variance estimation 19 1.4. Work motivations 22 Chapter 2. Joint Channel and Noise Variance Estimation in the Presence of the OFDM Signal 25 2.1. Presentation of the algorithm in an ideal approach 25 2.1.1. Channel covariance matrix 25 2.1.2. MMSE noise variance estimation 27 2.1.3. Proposed algorithm: ideal approach 27 2.1.4. Simulation results: ideal approach 41 2.2. Algorithm in a practical approach 48 2.2.1. Proposed algorithm: realistic approach 48 2.2.2. Convergence of the algorithm 51 2.2.3. Simulations results: realistic approach 60 2.3. Summary 65 Chapter 3. Application of the Algorithm as a Detector For Cognitive Radio Systems 67 3.1. Spectrum sensing 67 3.1.1. Non-cooperative methods 69 3.1.2. Cooperative methods 71 3.2. Proposed detector 73 3.2.1. Detection hypothesis 73 3.2.2. Convergence of the MMSE-based algorithm under the hypothesis H0 74 3.2.3. Decision rule for the proposed detector 79 3.3. Analytical expressions of the detection and false alarm probabilities 82 3.3.1. Probability density function of M under H1 82 3.3.2. Probability density function of M under H0 85 3.3.3. Analytical expressions of Pd and Pfa 86 3.4. Simulations results 88 3.4.1. Choice of the threshold ς 88 3.4.2. Effect of the choice of eσ on the detector performance 89 3.4.3. Detector performance under non-WSS channel model and synchronization mismatch 92 3.4.4. Receiver operating characteristic of the detector 94 3.5. Summary 98 Conclusion 99 Appendices 101 Bibliography 109 Index 119
£125.06
ISTE Ltd and John Wiley & Sons Inc Mobile and Wireless Networks
Book SynopsisThis book presents the state of the art in the field of mobile and wireless networks, and anticipates the arrival of new standards and architectures. It focuses on wireless networks, starting with small personal area networks and progressing onto the very large cells of wireless regional area networks, via local area networks dominated by WiFi technology, and finally metropolitan networks. After a description of the existing 2G and 3G standards, with LTE being the latest release, LTE-A is addressed, which is the first 4G release, and a first indication of 5G is provided as seen through the standardizing bodies. 4G technology is described in detail along with the different LTE extensions related to the massive arrival of femtocells, the increase to a 1 Gbps capacity, and relay techniques. 5G is also discussed in order to show what can be expected in the near future. The Internet of Things is explained in a specific chapter due to its omnipresence in the literature, ad hoc and mesh networks form another important chapter as they have made a comeback after a long period of near hibernation, and the final chapter discusses a particularly recent topic: Mobile-Edge Computing (MEC) servers.Table of ContentsPreface xiii List of Acronyms xvii Chapter 1. Introduction to Mobile and Networks 1 1.1. Mobile and wireless generation networks 2 1.1.1. First generation mobile technology: 1G 2 1.1.2. Second generation mobile technology: 2G 3 1.1.3. Third generation mobile technology: 3G 4 1.1.4. Fourth generation mobile technology: 4G 5 1.1.5. Fifth generation mobile technology: 5G 7 1.2. IEEE technologies 7 1.2.1. IEEE 802.15: WPAN 8 1.2.2. IEEE 802.11: WLAN 8 1.2.3. IEEE 802.16: WMAN 9 1.2.4. IEEE 802.21: MIHS 10 1.2.5. IEEE 802.22: WRAN 10 1.3. Conclusion 11 1.4. Bibliography 11 1.4.1. Standards 11 1.4.2. Selected bibliography 12 1.4.3. Websites 13 Chapter 2. Mobile Networks 15 2.1. Cellular network 16 2.1.1. Radio interface 17 2.1.2. Cell design 19 2.1.3. Traffic engineering 20 2.2. Principles of cellular network functionalities 21 2.3. 1G networks 23 2.4. 2G networks 23 2.5. 3G networks 25 2.6. 4G networks 27 2.7. 5G networks 29 2.8. Bibliography 30 Chapter 3. Long-Term Evolution 35 3.1. Relevant features of LTE 36 3.2. Network architecture and protocols 39 3.2.1. Architecture reference model 40 3.2.2. Functional description of a LTE network 41 3.2.3. System architecture evolution 44 3.2.4. Reference points 46 3.3. Control and user planes 48 3.3.1. User plane 48 3.3.2. GPRS tunneling protocol 50 3.3.3. Control plane 52 3.4. Multimedia broadcast and multicast service 53 3.5. Stream Control Transmission Protocol 54 3.6. Network discovery and selection 55 3.7. Radio resource management 56 3.8. Authentication and authorization 58 3.8.1. User authentication, key agreement and key generation 59 3.8.2. Signaling and user-plane security 61 3.9. Fundamentals of the MAC layer in LTE 61 3.9.1. Traffic classes and quality of service 61 3.9.2. Mobility 62 3.9.3. Resource scheduling algorithms 63 3.10. Fundamentals of the LTE physical layer 64 3.10.1. Slot and frame structure in LTE OFDMA 64 3.10.2. Reference signals 68 3.11. Conclusion69 3.12. Bibliography 70 3.12.1. Standards 70 3.12.2. Selected bibliography 70 Chapter 4. Long-Term Evolution Advanced 73 4.1. HetNet in LTE Advanced 75 4.2. Small cell concepts 77 4.2.1. Picocell 77 4.2.2. Femtocells 78 4.2.3. Relays 78 4.3. Femtocell and macrocell integration architecture 79 4.4. Picocell and macrocell integration architecture 80 4.5. Interference mitigation in heterogeneous networks 81 4.5.1. Interference mitigation in the context of two-tier macrofemtocells 82 4.5.2. Frequency spectral assignment 82 4.6. Interference mitigation in the context of two-tier macropicocells 83 4.7. Coordinated multi-point transmission/reception 84 4.8. Carrier aggregation 85 4.9. LTE Advanced evolution toward 5G 86 4.10. Bibliography 87 4.10.1. Standards 87 4.10.2. Selected bibliography 87 4.10.3. Websites 88 Chapter 5. 5G 89 5.1. From LTE Advanced to 5G: the big transition 90 5.1.1. D2D communication 91 5.1.2. Green activities saving energy 92 5.1.3. LTE–WiFi integration for traffic offloading 92 5.1.4. Vehicular communication 93 5.2. Some characteristics envisioned for 5G 94 5.2.1. Massive capacity support 94 5.2.2. Ubiquitous communication support 94 5.2.3. Improvement in radio characteristics 94 5.3. 5G frequencies 95 5.4. High and low platforms 96 5.5. Cloud-RAN 98 5.6. Bibliography 101 5.6.1. Standard 101 5.6.2. Selected bibliography 101 5.6.3. Website 101 Chapter 6. Small Cells 103 6.1. Femtocell technology 105 6.2. LTE femtocell architecture 108 6.2.1. Home eNB or FAP 108 6.2.2. HeNB gateway or FAP-GW 109 6.2.3. HeNB management system or ACS 109 6.2.4. Security gateway 110 6.3. LTE femtocell deployment scenarios 110 6.4. Femtocell access control strategy 112 6.4.1. Closed subscriber group 112 6.4.2. Femtocell access control modes 113 6.4.3. Physical cell identity 113 6.5. LTE femtocell challenges and technical issues 114 6.5.1. Interference 114 6.5.2. Spectrum allocation 115 6.5.3. Access mode impact 117 6.6. Security and privacy challenges 117 6.7. Synchronization 120 6.8. Mobility 121 6.9. Passpoint 123 6.10. The backhaul network 126 6.11. Software radio and cognitive radio 128 6.12. Custom cells 129 6.13. Conclusion 130 6.14. Bibliography 131 6.14.1. Standards 131 6.14.2. Selected bibliography 131 6.14.3. Websites 133 Chapter 7. WPAN and WiGig 135 7.1. Wireless Personal Area Network 135 7.2. IEEE 802.15 136 7.3. Bluetooth 138 7.4. UWB 142 7.5. WiGig 147 7.6. WirelesssHD 150 7.7. Conclusion 151 7.8. Bibliography 151 Chapter 8. WLAN and WiFi 153 8.1. IEEE 802.11 154 8.2. WiFi architecture 156 8.2.1. Physical layer 156 8.2.2. Data link layer 157 8.2.3. Access techniques 158 8.2.4. The CSMA/CA protocol 159 8.2.5. Handovers 162 8.2.6. Security 163 8.2.7. Wired Equivalent Privacy 164 8.2.8. WPA and IEEE 802.11i 167 8.3. Security and authentication 168 8.3.1. Scalability and flexibility 168 8.3.2. IEEE 802.11i 170 8.3.3. Trading security policy 170 8.4. Saving energy 172 8.5. IEEE 802.11a, b and g 174 8.5.1. IEEE 802.11b 175 8.5.2. IEEE 802.11a 176 8.5.3. IEEE 802.11n 176 8.5.4. IEEE 802.11ac 179 8.5.5. IEEE 802.11ad 182 8.5.6. IEEE 802.11af 183 8.5.7. IEEE 802.11ah 185 8.6. Conclusion 187 8.7. Bibliography 188 Chapter 9. WMAN and WiMAX 191 9.1. Background on IEEE 802.16e 192 9.1.1. The medium access control layer 192 9.1.2. Channel access mechanism 193 9.1.3. Quality of service 194 9.1.4. Mobility support 195 9.2. The physical layer 195 9.2.1. Subchannelization in mobile WiMAX: OFDMA 195 9.2.2. Slot and frame structure in OFDMA-based mobile WiMAX 196 9.2.3. OFDMA slot structure in AMC permutation mode 198 9.3. An example of WiMAX and WiFi integration 200 9.3.1. QoS management 202 9.3.2. Qos support and classes 202 9.4. Mechanisms of channel access 203 9.4.1. WiFi access methods 204 9.4.2. Mobile WiMAX access method 205 9.4.3. Handover support 206 9.5. IEEE 802.16m or mesh for WiMAX 206 9.6. IEEE 802.16h or cognitive radio for WiMAX 207 9.6.1. Uncoordinated coexistence mechanism 208 9.6.2. Coordinated coexistence mechanism 209 9.7. Bibliography 210 9.7.1. Standards 210 9.7.2. Selected bibliography 210 Chapter 10. WRAN and Interconnection 213 10.1. IEEE 802.22 213 10.2. Interconnection between IEEE standards 216 10.2.1. IEEE 802.21 framework 217 10.2.2. IEEE 802.21 core architecture 218 10.3. Bibliography 220 10.3.1. Standards 220 10.3.2. Selected bibliography 220 Chapter 11. Internet of Things 223 11.1. Sensor networks 224 11.2. RFID 226 11.2.1. Using RFID 228 11.2.2. EPC global 229 11.2.3. RFID security 231 11.2.4. Mifare 231 11.3. Near-field communication 232 11.3.1. Mobile key 233 11.3.2. NFC payment 234 11.3.3. The Internet of Things in a medical environment 236 11.4. The Internet of Things in the home 237 11.5. Fog networking 238 11.6. Connection of things 240 11.6.1. Specific proprietary solution: SIGFOX example 241 11.6.2. LoRa 242 11.7. Conclusion 245 11.8. Bibliography 245 Chapter 12. Ad Hoc and Mesh Networks 247 12.1. Ad hoc networks 248 12.2. Routing 250 12.2.1. Ad hoc in the link layer 253 12.2.2. Ad hoc mode in WiFi 253 12.2.3. Bluetooth link layer 256 12.3. Ad hoc routing protocols 258 12.3.1. Reactive protocols 261 12.3.2. Ad hoc on-demand distance vector 261 12.3.3. Dynamic source routing 262 12.4. Proactive protocols 263 12.4.1. Optimized link state routing protocol 263 12.4.2. Topology dissemination based on reverse-path forwarding 264 12.5. Quality of service in ad hoc networks 265 12.6. Models for QoS in MANET 266 12.7. Mesh networks 270 12.8. VANET networks 273 12.9. Green PI: wearable Device2Device networks 274 12.9.1. Observation of traffic 276 12.9.2. Embedded Internet and 5G 277 12.9.3. Green PI: wearable and embedded Internet 278 12.9.4. Distributed TCP/IP 279 12.9.5. Wearable YOI 280 12.10. Bibligraphy 281 Chapter 13. Mobile-Edge Computing 283 13.1. Network virtualization 283 13.2. Network virtualization technology 285 13.2.1. Xen 286 13.2.2. OpenFlow 288 13.3. Using network virtualization 292 13.3.1. Isolation 293 13.3.2. Extensive network virtualization 294 13.3.3. The Cloud 296 13.4. Mobile-edge computing 298 13.4.1. Use case 1: active device location tracking 299 13.4.2. Use case 2: augmented reality content delivery 300 13.4.3. Use case 3: video analytics 301 13.4.4. Use case 4: RAN-aware content optimization 301 13.4.5. Use case 5: distributed content and DNS caching 302 13.4.6. Use case 6: application-aware performance optimization 302 13.4.7. MEC server placement 303 13.5. Conclusion 305 13.6. Bibliography 305 Conclusion 307 Index 309
£132.26
ISTE Ltd and John Wiley & Sons Inc Design Constraints for NFC Devices
Book SynopsisNear field communication (NFC) can appear to be a simple intuitive technology for exchanging data between close devices. In reality, these contactless structures that combine components and antennas must respect important and specific working constraints. Illustrated by a number of detailed technological examples, this book discusses the multiple normative (ISO, CEN, NFC Forum, EMVCo, etc.) and regulatory (ERC, FCC, ETSI, radiofrequency, private and ecological pollution, etc.) constraints, as well as the applied, typological, functional, structural, environmental or interoperability constraints that a NFC device might face. Design Constraints for NFC Devices also presents techniques that enable us to free ourselves from the technological constraints of current NFC operations encountered in banking, public transport, administration, automotive, industrial, communicating object and Internet of Things applications.Table of ContentsAcknowledgements xi Preface xiii Introduction xvii Part 1. Introduction to – and Reminders About – NFC 1 Introduction to Part 1 3 Chapter 1. Recap of the Principles Employed in NFC 5 1.1. The physical fundaments of “contactless” and NFC 5 1.1.1. Phenomenon of propagation and radiation 5 1.1.2. Classification of fields and spatial regions 6 1.1.3. Spatial regions 6 1.1.4. Far field: r >> λ/2π (Fraunhofer zone) 6 1.1.5. Intermediary field: r approximately equal to λ (Fresnel zone) 7 1.1.6. Near field: r << λ/2π (Rayleigh zone) and the origin of NFC 7 1.1.7. Remarks on contactless, RFID and NFC applications 7 1.2. The concept of NFC 9 1.2.1. Biot–Savart law 10 1.2.2. Field H at a point on the axis of a circular antenna 10 1.2.3. Decrease in the field H as a function of “d” 13 1.2.4. Field H at a point on the axis of a rectangular antenna 14 Chapter 2. Normative Constraints of NFC 17 2.1. Introduction 17 2.1.1. Normative, regulatory and NFC market constraints 17 2.1.2. A little bit of vocabulary 18 2.1.3. Norm 19 2.1.4. Standard 19 2.2. Normative constraints 19 2.2.1. Uplink from initiator to targets 20 2.2.2. “Contactless” normative constraints on NFC device antennae 27 2.3. Conclusion 36 Chapter 3. Regulatory Constraints and Recommendations 39 3.1. Regulatory constraints specific to NFC and NFC antennas 39 3.1.1. State of RF regulations 39 3.1.2. Constraints pertaining to radiation and pollution by NFC 41 3.1.3. The ERC 70 03 recommendation and the ETSI 300 330 norm 41 3.2. Constraints due to recommendations 45 3.2.1. Exposure of the human body to EM fields 46 3.2.2. Societal constraints due to individual freedoms (privacy) 48 3.2.3. Environmental constraints 50 3.3. Constraints of the NFC market 52 3.3.1. NFC applications of short range devices 52 3.3.2. Costs and market prices desired by users 52 3.3.3. Beware of false advertising 53 Part 2. Constraints Due to the Field of Applications of NFC 55 Introduction to Part 2 57 Chapter 4. Applicational Typologies of the NFC and their Consequences 59 4.1. Applicational typologies of the NFC 59 4.1.1. Technologies 59 4.1.2. “NFC Forum Devices” and “NFC Forum Tags” 60 4.1.3. “Modes” of communication of an NFC Forum Device 62 4.1.4. Role of an NFC Forum Device 63 4.1.5. Applicational typological possibilities and their constraints 64 4.2. Application consequences and their direct constraints 67 4.2.1. Touch & Go typology 67 4.2.2. Touch & Confirm typology 67 4.2.3. Touch & Connect typology 67 4.2.4. Touch & Explore typology 68 Chapter 5. Constraints Due to Fields of Application 69 5.1. Range of technical possibilities of applications 69 5.1.1. In architectures and electronic functions 69 5.1.2. Shapes, dimensions and form factors (publicity aside) 70 5.1.3. Remarks and some clarifications about the table 70 5.1.4. Targets/tags for the monitoring of long-distance races 72 5.1.5. Targets/tags for monitoring luxury items 72 5.2. Segmentation, typologies of markets, their problems and their incidences, and direct technical constraints on NFC devices 73 5.2.1. Market sectors and typologies 74 5.3. Mobile telephony 75 5.4. Banks/money matters/payments 77 5.5. Transport 78 5.5.1. 1st case: card emulation mode in battery-assisted and then flat battery 81 5.5.2. 2nd case: card emulation mode with battery out 81 5.5.3. 3rd case: collisions and loading effects 82 5.6. Automobiles 82 5.6.1. Consumer electronics 85 5.7. Healthcare 88 5.8. Communicating objects 89 5.8.1. NFC tablets 89 5.8.2. NFC USB key 90 5.8.3. NFC communication and promotional objects 91 5.8.4. “Add-on” NFC devices, sticks, and stickers 92 Part 3. Applicational Constraints Needing to be Solved when Designing NFC Systems and their Antennas 95 Introduction to Part 3 97 Chapter 6. Structural Constraints in NFC 99 6.1. Constraints due to the form factors of the antennas 99 6.2. Constraints due to variations of the operating distance 100 6.2.1. Distances and magnetic couplings 100 6.3. Constraint of the maximum acceptable value of the quality coefficient Q of the initiator antenna 100 6.4. Constraint of the value of return (retro) modulation voltage 102 6.4.1. Passive Load Modulation (PLM) 103 6.4.2. Active Load Modulation (ALM) 106 Chapter 7. Functional Applicational Constraints 111 7.1. Antenna tuning/detuning constraints 111 7.1.1. The case of an initiator 111 7.1.2. Electrical representation of the target 112 7.1.3. “Tuned”, “untuned” and “detuned” mobile phones 120 7.2. Constraints and influences of the environment 124 7.2.1. Physical influence of the environment 124 7.2.2. Impacts of the environment on the antenna and its performance 124 7.2.3. Electrical fields E 125 7.2.4. Magnetic field 128 Part 4. Conformity and Interoperability Constraints 137 Introduction to Part 4 139 Chapter 8. Conformity Constraints 141 8.1. Conformity tests for NFC devices 141 8.2. Norms of “conformity” tests for NFC IPx 142 8.2.1. ISO 23917 tests (NFC IP1 protocol) 143 8.2.2. ISO 22536 tests (NFC IP1 RF interface) 143 8.3. Electrical characterizations of the initiator antenna 146 8.3.1. The antenna’s inductance and resistance 146 8.3.2. Quality coefficient 149 8.3.3. Bandwidth 149 8.3.4. Tuning of the antenna and its impedance matching 149 8.4. Method of adjustment of the target antenna 154 8.4.1. Absorption threshold, H_thr 154 8.4.2. Absorption in reading mode, H_read 154 8.4.3. Resonance frequency, f_res 154 8.4.4. Bandwidth 155 8.5. Measuring methods for use with the target 155 8.6. Electrical measurements of the initiator antenna 156 8.6.1. Measuring the magnetic field H radiated by the initiator 156 8.6.2. Measurement of the quality coefficient – Q 158 8.6.3. Measuring Q in the application 162 8.6.4. Measuring the bandwidth in the application 163 8.7. Method for adjustment of whole systems 165 8.7.1. Measurements needing to be performed 165 8.7.2. Order in which the measurements must be taken 165 8.7.3. Energy domains, zero lines, and safe operating areas 165 8.8. Measuring tools 166 Chapter 9. Interoperability Constraints 169 9.1. Norms and interoperability 169 9.2. Problems of the tests; JNCF ISO vs EMV vs NFC Forum; etc 170 9.2.1. EMV conformity tests . 171 9.3. In practice: a few simple examples of measurements 178 9.3.1. Example 1 179 9.3.2. Example 2 181 9.3.3. Conformity tests of the NFC Forum 185 9.3.4. NFC Forum testing and certification methods for the lower levels 186 9.3.5. Testing the conformity of NFC with the CEN – Comité européen de normalisation (European Standardizing Committee) 187 9.3.6. What about overall interoperability? 188 Conclusion 189 Bibliography 197 Index 199
£125.06
ISTE Ltd and John Wiley & Sons Inc VoLTE and ViLTE: Voice and Conversational Video
Book SynopsisThis book presents the architecture of two networks that make up the backbone of the telephone service VoLTE and video service ViLTE. The 4G mobile network makes it possible to construct bearers through which IP packets, containing either telephone signals (SIP, SDP) or voice or video media (RTP stream), are transported. The IMS network performs the processing of the telephone signal to provide VoLTE and ViLTE services, including call routing and the provision of additional services. Different procedures are described: the set-up and termination of a session, interconnection with third-party networks, roaming and intra-system handover. The inter-system handover PS-CS is a special case that occurs when the mobile loses 4G network coverage over the course of a session. The e-SRVCC mechanism enables continuity of the service during the switch of the telephone communication to the 2G or 3G networks. The SMS service for short messages, which is a special telephone service in itself, is provided by two structures, one relying on the IMS network, and a second on the CSFB functionality.Table of ContentsPreface ix List of Abbreviations xv Chapter 1. Network Architecture 1 1.1. EPS network 1 1.1.1. Functional architecture 1 1.1.2. Protocol architecture 5 1.1.3. Bearers 8 1.2. IMS network 12 1.2.1. Functional architecture 12 1.2.2. Protocol architecture 17 1.3. Databases 18 1.3.1. Functional architecture 18 1.3.2. Protocol architecture 18 1.4. Charging associated with IMS network 19 1.4.1. Functional architecture 19 1.4.2. Protocol architecture 21 1.5. PCC function 21 1.5.1. Functional architecture 21 1.5.2. Protocol architecture 22 1.6. DIAMETER routers 23 1.7. ENUM system 24 1.8. IPX network 25 Chapter 2. Signaling Protocols 27 2.1. NAS protocol 27 2.1.1. EMM messages 28 2.1.2. ESM messages 30 2.2. RRC protocol 32 2.2.1. System information 36 2.2.2. Control of RRC connection 37 2.2.3. Measurement report 39 2.3. S1-AP protocol 40 2.3.1. Context management 42 2.3.2. Bearer management 43 2.3.3. Mobility management 43 2.3.4. S1-MME interface management 45 2.4. X2-AP protocol 45 2.4.1. Mobility management 46 2.4.2. Load management 47 2.4.3. X2 interface management 48 2.5. GTPv2-C protocol 49 2.5.1. Bearer management 51 2.5.2. Mobility management 52 2.6. SIP protocol 53 2.6.1. Requests 53 2.6.2. Responses 57 2.7. SDP protocol 60 2.8. DIAMETER protocol 61 2.8.1. Application to EPS network 61 2.8.2. Application to IMS network 62 2.8.3. Application to PCC function 64 Chapter 3. Basic Procedures 69 3.1. Attachment 69 3.2. Registration 75 3.3. Deregistration 84 3.4. Detachment 85 3.5. Establishment of VoLTE session 87 3.5.1. Originating side 87 3.5.2. Terminating side 94 3.6. Termination of VoLTE session 98 3.6.1. Initiated side 99 3.6.2. Received side 100 3.7. Establishment of ViLTE session 101 3.8. Termination of ViLTE session 104 3.9. Emergency call 106 Chapter 4. Radio Interface Procedures 109 4.1. Radio interface 109 4.1.1. Data link sub-layer 110 4.1.2. Logical channels 113 4.1.3. Transport channels 114 4.1.4. Physical layer 114 4.1.5. Physical signals 121 4.1.6. Physical channels 122 4.2. Procedures 124 4.2.1. Access control 124 4.2.2. Data transfer 130 Chapter 5. Service Profiles 147 5.1. Subscription data 147 5.1.1. Subscription to the EPS network 147 5.1.2. Subscription to the IMS network 148 5.2. VoLTE profile service 150 5.2.1. Supplementary telephone services 150 5.2.2. Audio flow 167 5.3. ViLTE profile service 170 5.3.1. Supplementary conversational video service 170 5.3.2. Video flow 171 Chapter 6. Interconnections 173 6.1. Interconnection CS network 173 6.1.1. Functional architecture 173 6.1.2. Protocol architecture 175 6.1.3. Session establishment 181 6.1.4. Session termination 190 6.2. Interconnection with IMS network 192 6.2.1. Functional architecture 192 6.2.2. Session establishment 193 Chapter 7. Handover 199 7.1. Introduction 199 7.2. Handover based on X2 201 7.2.1. Handover based on X2 without relocation 201 7.2.2. Handover based on X2 with relocation 205 7.3. Handover based on S1 207 7.3.1. Handover based on S1 without relocation 207 7.3.2. Handover based on S1 with relocation 211 7.4. PS-PS inter-system handover 218 7.4.1. Functional architecture 218 7.4.2. Procedure. 220 Chapter 8. Roaming 223 8.1. Functional architecture 223 8.1.1. Roaming applied to the EPS network 223 8.1.2. Roaming applied to the IMS network 224 8.2. Procedures 228 8.2.1. Session establishment for nominal routeing 228 8.2.2. Session establishment for optimal routeing 235 Chapter 9. Service Centralization and Continuity 243 9.1. ICS function 243 9.1.1. Functional architecture 243 9.1.2. Procedures 246 9.2. e-SRVCC function 255 9.2.1. Functional architecture 255 9.2.2. Procedures 260 Chapter 10. Short Message Service 273 10.1. Message structure 273 10.1.1. SM-TL layer 274 10.1.2. SM-RL layer 275 10.1.3. SM-CL layer 275 10.2. SMS over SGsAP 276 10.2.1. Functional architecture 276 10.2.2. Procedures 277 10.3. SMS over SIP 282 10.3.1. Functional architecture 282 10.3.2. Procedures 283 Bibliography 289 Index 295
£125.06
ISTE Ltd and John Wiley & Sons Inc Analytical Modeling of Wireless Communication
Book SynopsisWireless networks represent an inexpensive and convenient way to connect to the Internet. However, despite their applications across several technologies, one challenge still remains: to understand the behavior of wireless sensor networks and assess their performance in large-scale scenarios. When a large number of network nodes need to interact, developing suitable analytical models is essential to ensure the appropriate coverage and throughput of these networks and to enhance user mobility. This is intrinsically difficult due to the size and number of different network nodes and users. This book highlights some examples which show how this problem can be overcome with the use of different techniques. An intensive parameter analysis shows the reader how to the exploit analytical models for an effective development and management of different types of wireless networks.Table of ContentsPreface ix Introduction xi List of Acronyms xv Part 1. Sensor Networks 1 Chapter 1. Fluid Models and Energy Issues 3 1.1. The fluid-based approach 4 1.1.1. Sensor density and traffic generation 5 1.1.2. Data routing 5 1.1.3. Local and relay traffic rates 6 1.1.4. Channel contention and data transmission 6 1.1.5. Mean packet delivery delay 7 1.1.6. Sensor active/sleep behavior 7 1.2. Network scenario 7 1.3. The sensor network model 11 1.3.1. A minimum energy routing strategy: computing u(r:r) 11 1.3.2. Channel contention and data transmission: computing s(r) and PR(r) 17 1.3.3. Mean packet delivery delay: computing q(r) 22 1.4. Results 24 1.4.1. Model validation 25 1.4.2. Model exploitation 28 1.4.3. Model solution complexity and accuracy 35 Chapter 2. Hybrid Automata for Transient Delay Analysis 37 2.1. Event detection in WSNs 37 2.1.1. The 802.15.4 MAC protocol 39 2.2. Model for single-hop network topologies 40 2.2.1. Single message transfer 40 2.2.2. Multiple message transfers 43 2.3. Solution technique 44 2.3.1. Time discretization 44 2.3.2. Transient solution 46 2.3.3. Performance metrics computation 49 2.4. Model for multi-hop network topologies 50 2.5. Model validation and exploitation results 52 2.6. Discussion 57 Part 2. Vehicular Networks 59 Chapter 3. Safety Message Broadcasting 61 3.1. System description 62 3.2. Dissemination of safety messages 63 3.2.1. The spatial differentiation approach 63 3.2.2. The safety application 64 3.3. Assumptions and notations 65 3.4. Model outline 66 3.5. Computation of the block probability 67 3.6. Computation of the probability of first reception 69 3.6.1. A Gaussian approximation to the transient system behavior 73 3.7. Performance evaluation 77 3.7.1. The impact of power capture 77 3.7.2. The case of occupation probability ρ = 1 79 3.7.3. The case of homogeneous occupation probability ρ < 1 80 3.7.4. The case of inhomogeneous occupation probability 83 3.7.5. The impact of the forwarding policy 85 Chapter 4. Modeling Information Sharing 89 4.1. System scenario 89 4.2. Modeling information exchange in IVN 90 4.2.1. Model description 91 4.3. Computation of the probability of successful information retrieval 93 4.4. Model validation and exploitation 98 Part 3. Cellular Networks 103 Chapter 5. Multi-RAT Algorithms 105 5.1. RAT network 106 5.1.1. Scenario 107 5.1.2. RAT selection strategy 108 5.2. Network model 109 5.2.1. Functional rates 110 5.3. Model solution 115 5.3.1. Analytical approach 115 5.3.2. Computation of performance metrics 117 5.4. Performance evaluation 118 5.4.1. Setting and results 119 Bibliography 123 Index 127
£125.06
Mike Murach & Associates Inc. Murach's Android Programming
Book Synopsis
£44.24
Bookstorm A History of Telecommunications
Book Synopsis‘Mr Watson, come here, I want to see you.’It’s been almost 150 years since Alexander Graham Bell said these immortal words on the first ever phone call, to his assistant in the next room. Between 10 March 1876 and now, the world has changed beyond recognition. And telecommunications, which has played a fundamental role in this change, has itself evolved into an industry that was the sole preserve of science fiction.When the world’s first modern mobile telephone network was launched in 1979, there were just over 300 million telephones. Today, there are more than eight billion, most of which are mobile. Most people in most countries can now contact each other in a matter of seconds. Soon we’ll all be connected, to each other, and to complex computer networks that provide us with instant information, but also observe and record our actions. No other phenomenon touches so many of us, so directly, each and every day of our lives.This book describes how this transformation came about. It considers the technologies that underpin telecommunications – microcircuits, fibre-optics and satellites – and touches on financial aspects of the industry: privatisations, mergers and takeovers that have helped shape the $2-trillion telecom market. But for the most part, it’s a story about us and our need to communicate.
£52.50
Bookstorm Connected: A Brief History of Global
Book Synopsis‘Mr Watson, come here, I want to see you.’It’s been almost 150 years since Alexander Graham Bell said these immortal words on the first ever phone call, to his assistant in the next room. Between 10 March 1876 and now, the world has changed beyond recognition. And telecommunications, which has played a fundamental role in this change, has itself evolved into an industry that was the sole preserve of science fiction.When the world’s first modern mobile telephone network was launched in 1979, there were just over 300 million telephones. Today, there are more than eight billion, most of which are mobile. Most people in most countries can now contact each other in a matter of seconds. Soon we’ll all be connected, to each other, and to complex computer networks that provide us with instant information, but also observe and record our actions. No other phenomenon touches so many of us, so directly, each and every day of our lives.A concise edition of John Tysoe and Alan Knott-Craig’s magnum opus, A History of Telecommunications, this book gives you the information you need to know about what keeps us connected and how we got here.
£11.96
BenBella Books Wireless Wars: China's Dangerous Domination of 5G
Book Synopsis
£20.96
Springer Nature Switzerland AG Practical Channel-Aware Resource Allocation: With
Book SynopsisThis book dives into radio resource allocation optimizations, a research area for wireless communications, in a pragmatic way and not only includes wireless channel conditions but also incorporates the channel in a simple and practical fashion via well-understood equations. Most importantly, the book presents a practical perspective by modeling channel conditions using terrain-aware propagation which narrows the gap between purely theoretical work and that of industry methods. The provided propagation modeling reflects industry grade scenarios for radio environment map and hence makes the channel based resource allocation presented in the book a field-grade view. Also, the book provides large scale simulations that account for realistic locations with terrain conditions that can produce realistic scenarios applicable in the field. Most portions of the book are accompanied with MATLAB code and occasionally MATLAB/Python/C code. The book is intended for graduate students, academics, researchers of resource allocation in mathematics, computer science, and electrical engineering departments as well as working professionals/engineers in wireless industry.Table of ContentsIntroduction.- Utility Functions and Resource Allocation.- Resource Allocation without Channel.- Distributed or Centralized.- Channel Conditions and Resource Allocation.- Propagation Modeling .- Simulation.- Conclusion.
£71.24