Details

Mobile and Wireless Networks


Mobile and Wireless Networks


1. Aufl.

von: Khaldoun Al Agha, Guy Pujolle, Tara Ali Yahiya

149,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 17.08.2016
ISBN/EAN: 9781119007562
Sprache: englisch
Anzahl Seiten: 352

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>This book presents the state of the art in the field of mobile and wireless networks, and anticipates the arrival of new standards and architectures. It focuses on wireless networks, starting with small personal area networks and progressing onto the very large cells of wireless regional area networks, via local area networks dominated by WiFi technology, and finally metropolitan networks. After a description of the existing 2G and 3G standards, with LTE being the latest release, LTE-A is addressed, which is the first 4G release, and a first indication of 5G is provided as seen through the standardizing bodies. 4G technology is described in detail along with the different LTE extensions related to the massive arrival of femtocells, the increase to a 1 Gbps capacity, and relay techniques. 5G is also discussed in order to show what can be expected in the near future.</p> <p>The Internet of Things is explained in a specific chapter due to its omnipresence in the literature, ad hoc and mesh networks form another important chapter as they have made a comeback after a long period of near hibernation, and the final chapter discusses a particularly recent topic: Mobile-Edge Computing (MEC) servers.</p>
<p>Preface xiii</p> <p>List of Acronyms  xvii</p> <p><b>Chapter 1. Introduction to Mobile and Networks  1</b></p> <p>1.1. Mobile and wireless generation networks 2</p> <p>1.1.1. First generation mobile technology: 1G 2</p> <p>1.1.2. Second generation mobile technology: 2G 3</p> <p>1.1.3. Third generation mobile technology: 3G 4</p> <p>1.1.4. Fourth generation mobile technology: 4G  5</p> <p>1.1.5. Fifth generation mobile technology: 5G 7</p> <p>1.2. IEEE technologies  7</p> <p>1.2.1. IEEE 802.15: WPAN  8</p> <p>1.2.2. IEEE 802.11: WLAN  8</p> <p>1.2.3. IEEE 802.16: WMAN  9</p> <p>1.2.4. IEEE 802.21: MIHS 10</p> <p>1.2.5. IEEE 802.22: WRAN  10</p> <p>1.3. Conclusion 11</p> <p>1.4. Bibliography  11</p> <p>1.4.1. Standards 11</p> <p>1.4.2. Selected bibliography  12</p> <p>1.4.3. Websites  13</p> <p><b>Chapter 2. Mobile Networks 15</b></p> <p>2.1. Cellular network 16</p> <p>2.1.1. Radio interface  17</p> <p>2.1.2. Cell design 19</p> <p>2.1.3. Traffic engineering  20</p> <p>2.2. Principles of cellular network functionalities 21</p> <p>2.3. 1G networks  23</p> <p>2.4. 2G networks  23</p> <p>2.5. 3G networks  25</p> <p>2.6. 4G networks  27</p> <p>2.7. 5G networks  29</p> <p>2.8. Bibliography 30</p> <p><b>Chapter 3. Long-Term Evolution  35</b></p> <p>3.1. Relevant features of LTE 36</p> <p>3.2. Network architecture and protocols 39</p> <p>3.2.1. Architecture reference model  40</p> <p>3.2.2. Functional description of a LTE network 41</p> <p>3.2.3. System architecture evolution  44</p> <p>3.2.4. Reference points 46</p> <p>3.3. Control and user planes  48</p> <p>3.3.1. User plane 48</p> <p>3.3.2. GPRS tunneling protocol  50</p> <p>3.3.3. Control plane 52</p> <p>3.4. Multimedia broadcast and multicast service  53</p> <p>3.5. Stream Control Transmission Protocol 54</p> <p>3.6. Network discovery and selection  55</p> <p>3.7. Radio resource management 56</p> <p>3.8. Authentication and authorization  58</p> <p>3.8.1. User authentication, key agreement and key generation  59</p> <p>3.8.2. Signaling and user-plane security 61</p> <p>3.9. Fundamentals of the MAC layer in LTE  61</p> <p>3.9.1. Traffic classes and quality of service 61</p> <p>3.9.2. Mobility  62</p> <p>3.9.3. Resource scheduling algorithms  63</p> <p>3.10. Fundamentals of the LTE physical layer 64</p> <p>3.10.1. Slot and frame structure in LTE OFDMA  64</p> <p>3.10.2. Reference signals  68</p> <p>3.11. Conclusion69</p> <p>3.12. Bibliography 70</p> <p>3.12.1. Standards 70</p> <p>3.12.2. Selected bibliography  70</p> <p><b>Chapter 4. Long-Term Evolution Advanced  73</b></p> <p>4.1. HetNet in LTE Advanced  75</p> <p>4.2. Small cell concepts  77</p> <p>4.2.1. Picocell  77</p> <p>4.2.2. Femtocells 78</p> <p>4.2.3. Relays 78</p> <p>4.3. Femtocell and macrocell integration architecture  79</p> <p>4.4. Picocell and macrocell integration architecture 80</p> <p>4.5. Interference mitigation in heterogeneous networks 81</p> <p>4.5.1. Interference mitigation in the context of two-tier macrofemtocells  82</p> <p>4.5.2. Frequency spectral assignment  82</p> <p>4.6. Interference mitigation in the context of two-tier macropicocells  83</p> <p>4.7. Coordinated multi-point transmission/reception 84</p> <p>4.8. Carrier aggregation  85</p> <p>4.9. LTE Advanced evolution toward 5G 86</p> <p>4.10. Bibliography 87</p> <p>4.10.1. Standards  87</p> <p>4.10.2. Selected bibliography 87</p> <p>4.10.3. Websites 88</p> <p><b>Chapter 5. 5G 89</b></p> <p>5.1. From LTE Advanced to 5G: the big transition  90</p> <p>5.1.1. D2D communication  91</p> <p>5.1.2. Green activities saving energy 92</p> <p>5.1.3. LTE–WiFi integration for traffic offloading 92</p> <p>5.1.4. Vehicular communication 93</p> <p>5.2. Some characteristics envisioned for 5G  94</p> <p>5.2.1. Massive capacity support  94</p> <p>5.2.2. Ubiquitous communication support  94</p> <p>5.2.3. Improvement in radio characteristics 94</p> <p>5.3. 5G frequencies  95</p> <p>5.4. High and low platforms 96</p> <p>5.5. Cloud-RAN  98</p> <p>5.6. Bibliography  101</p> <p>5.6.1. Standard  101</p> <p>5.6.2. Selected bibliography  101</p> <p>5.6.3. Website  101</p> <p><b>Chapter 6. Small Cells 103</b></p> <p>6.1. Femtocell technology 105</p> <p>6.2. LTE femtocell architecture  108</p> <p>6.2.1. Home eNB or FAP  108</p> <p>6.2.2. HeNB gateway or FAP-GW 109</p> <p>6.2.3. HeNB management system or ACS  109</p> <p>6.2.4. Security gateway 110</p> <p>6.3. LTE femtocell deployment scenarios  110</p> <p>6.4. Femtocell access control strategy  112</p> <p>6.4.1. Closed subscriber group 112</p> <p>6.4.2. Femtocell access control modes  113</p> <p>6.4.3. Physical cell identity 113</p> <p>6.5. LTE femtocell challenges and technical issues  114</p> <p>6.5.1. Interference  114</p> <p>6.5.2. Spectrum allocation  115</p> <p>6.5.3. Access mode impact 117</p> <p>6.6. Security and privacy challenges 117</p> <p>6.7. Synchronization  120</p> <p>6.8. Mobility 121</p> <p>6.9. Passpoint  123</p> <p>6.10. The backhaul network  126</p> <p>6.11. Software radio and cognitive radio  128</p> <p>6.12. Custom cells  129</p> <p>6.13. Conclusion 130</p> <p>6.14. Bibliography 131</p> <p>6.14.1. Standards 131</p> <p>6.14.2. Selected bibliography  131</p> <p>6.14.3. Websites 133</p> <p><b>Chapter 7. WPAN and WiGig 135</b></p> <p>7.1. Wireless Personal Area Network  135</p> <p>7.2. IEEE 802.15  136</p> <p>7.3. Bluetooth  138</p> <p>7.4. UWB 142</p> <p>7.5. WiGig  147</p> <p>7.6. WirelesssHD  150</p> <p>7.7. Conclusion 151</p> <p>7.8. Bibliography  151</p> <p><b>Chapter 8. WLAN and WiFi 153</b></p> <p>8.1. IEEE 802.11  154</p> <p>8.2. WiFi architecture 156</p> <p>8.2.1. Physical layer 156</p> <p>8.2.2. Data link layer  157</p> <p>8.2.3. Access techniques  158</p> <p>8.2.4. The CSMA/CA protocol  159</p> <p>8.2.5. Handovers 162</p> <p>8.2.6. Security  163</p> <p>8.2.7. Wired Equivalent Privacy 164</p> <p>8.2.8. WPA and IEEE 802.11i 167</p> <p>8.3. Security and authentication 168</p> <p>8.3.1. Scalability and flexibility  168</p> <p>8.3.2. IEEE 802.11i 170</p> <p>8.3.3. Trading security policy 170</p> <p>8.4. Saving energy 172</p> <p>8.5. IEEE 802.11a, b and g  174</p> <p>8.5.1. IEEE 802.11b 175</p> <p>8.5.2. IEEE 802.11a 176</p> <p>8.5.3. IEEE 802.11n 176</p> <p>8.5.4. IEEE 802.11ac  179</p> <p>8.5.5. IEEE 802.11ad  182</p> <p>8.5.6. IEEE 802.11af  183</p> <p>8.5.7. IEEE 802.11ah  185</p> <p>8.6. Conclusion 187</p> <p>8.7. Bibliography  188</p> <p><b>Chapter 9. WMAN and WiMAX 191</b></p> <p>9.1. Background on IEEE 802.16e 192</p> <p>9.1.1. The medium access control layer 192</p> <p>9.1.2. Channel access mechanism 193</p> <p>9.1.3. Quality of service  194</p> <p>9.1.4. Mobility support 195</p> <p>9.2. The physical layer  195</p> <p>9.2.1. Subchannelization in mobile WiMAX: OFDMA  195</p> <p>9.2.2. Slot and frame structure in OFDMA-based mobile WiMAX 196</p> <p>9.2.3. OFDMA slot structure in AMC permutation mode  198</p> <p>9.3. An example of WiMAX and WiFi integration  200</p> <p>9.3.1. QoS management 202</p> <p>9.3.2. Qos support and classes 202</p> <p>9.4. Mechanisms of channel access 203</p> <p>9.4.1. WiFi access methods 204</p> <p>9.4.2. Mobile WiMAX access method  205</p> <p>9.4.3. Handover support 206</p> <p>9.5. IEEE 802.16m or mesh for WiMAX  206</p> <p>9.6. IEEE 802.16h or cognitive radio for WiMAX  207</p> <p>9.6.1. Uncoordinated coexistence mechanism  208</p> <p>9.6.2. Coordinated coexistence mechanism 209</p> <p>9.7. Bibliography  210</p> <p>9.7.1. Standards  210</p> <p>9.7.2. Selected bibliography  210</p> <p><b>Chapter 10. WRAN and Interconnection 213</b></p> <p>10.1. IEEE 802.22  213</p> <p>10.2. Interconnection between IEEE standards 216</p> <p>10.2.1. IEEE 802.21 framework  217</p> <p>10.2.2. IEEE 802.21 core architecture 218</p> <p>10.3. Bibliography 220</p> <p>10.3.1. Standards 220</p> <p>10.3.2. Selected bibliography  220</p> <p><b>Chapter 11. Internet of Things 223</b></p> <p>11.1. Sensor networks 224</p> <p>11.2. RFID  226</p> <p>11.2.1. Using RFID  228</p> <p>11.2.2. EPC global  229</p> <p>11.2.3. RFID security  231</p> <p>11.2.4. Mifare 231</p> <p>11.3. Near-field communication 232</p> <p>11.3.1. Mobile key  233</p> <p>11.3.2. NFC payment  234</p> <p>11.3.3. The Internet of Things in a medical environment 236</p> <p>11.4. The Internet of Things in the home  237</p> <p>11.5. Fog networking  238</p> <p>11.6. Connection of things 240</p> <p>11.6.1. Specific proprietary solution: SIGFOX example  241</p> <p>11.6.2. LoRa 242</p> <p>11.7. Conclusion  245</p> <p>11.8. Bibliography 245</p> <p><b>Chapter 12. Ad Hoc and Mesh Networks  247</b></p> <p>12.1. Ad hoc networks 248</p> <p>12.2. Routing  250</p> <p>12.2.1. Ad hoc in the link layer  253</p> <p>12.2.2. Ad hoc mode in WiFi 253</p> <p>12.2.3. Bluetooth link layer  256</p> <p>12.3. Ad hoc routing protocols  258</p> <p>12.3.1. Reactive protocols 261</p> <p>12.3.2. Ad hoc on-demand distance vector 261</p> <p>12.3.3. Dynamic source routing  262</p> <p>12.4. Proactive protocols 263</p> <p>12.4.1. Optimized link state routing protocol  263</p> <p>12.4.2. Topology dissemination based on reverse-path forwarding  264</p> <p>12.5. Quality of service in ad hoc networks  265</p> <p>12.6. Models for QoS in MANET  266</p> <p>12.7. Mesh networks  270</p> <p>12.8. VANET networks  273</p> <p>12.9. Green PI: wearable Device2Device networks 274</p> <p>12.9.1. Observation of traffic 276</p> <p>12.9.2. Embedded Internet and 5G  277</p> <p>12.9.3. Green PI: wearable and embedded Internet  278</p> <p>12.9.4. Distributed TCP/IP 279</p> <p>12.9.5. Wearable YOI  280</p> <p>12.10. Bibligraphy 281</p> <p><b>Chapter 13. Mobile-Edge Computing  283</b></p> <p>13.1. Network virtualization 283</p> <p>13.2. Network virtualization technology  285</p> <p>13.2.1. Xen  286</p> <p>13.2.2. OpenFlow  288</p> <p>13.3. Using network virtualization 292</p> <p>13.3.1. Isolation 293</p> <p>13.3.2. Extensive network virtualization 294</p> <p>13.3.3. The Cloud 296</p> <p>13.4. Mobile-edge computing 298</p> <p>13.4.1. Use case 1: active device location tracking 299</p> <p>13.4.2. Use case 2: augmented reality content delivery  300</p> <p>13.4.3. Use case 3: video analytics  301</p> <p>13.4.4. Use case 4: RAN-aware content optimization 301</p> <p>13.4.5. Use case 5: distributed content and DNS caching 302</p> <p>13.4.6. Use case 6: application-aware performance optimization  302</p> <p>13.4.7. MEC server placement 303</p> <p>13.5. Conclusion 305</p> <p>13.6. Bibliography 305</p> <p>Conclusion 307</p> <p>Index 309</p>
<b>Khaldoun Al Agha</b> is the Co-founder and CEO of Green Communications. He is also Professor at the University of Paris-Sud in Orsay, France. <p><b>Guy Pujolle</b> is currently Professor at University Pierre and Marie Curie in France and a distinguished Visiting Professor at UFRJ (University Federal of Rio de Janeiro) in Brazil.</p> <p><b>Tara Ali-Yahiya</b> is Associate Professor in the Laboratoire de Recherche en Informatique (Computer Science Research Laboratory) at the University of Paris-Sud in Orsay, France.</p>

Diese Produkte könnten Sie auch interessieren:

Pulsed Power
Pulsed Power
von: Gennady A. Mesyats
PDF ebook
341,33 €
High-Frequency Oscillator Design for Integrated Transceivers
High-Frequency Oscillator Design for Integrated Transceivers
von: J. van der Tang, Dieter Kasperkovitz, Arthur H.M. van Roermund
PDF ebook
149,79 €
MEMS Vibratory Gyroscopes
MEMS Vibratory Gyroscopes
von: Cenk Acar, Andrei Shkel
PDF ebook
181,89 €