![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
The proliferation of wireless communications has led to mobile computing, a new era in data communication and processing allowing people to access information anywhere and anytime using lightweight computer devices. Aligned with this phenomenon, a vast number of mobile solutions, systems, and applications have been continuously developed. However, despite the opportunities, there exist constraints, challenges, and complexities in realizing the full potential of mobile computing, requiring research and experimentation. Algorithms, Methods, and Applications in Mobile Computing and Communications is a critical scholarly publication that examines the various aspects of mobile computing and communications from engineering, business, and organizational perspectives. The book details current research involving mobility challenges that hinder service applicability, mobile money transfer services and anomaly detection, and mobile fog environments. As a resource rich in information about mobile devices, wireless broadcast databases, and machine communications, it is an ideal source for computer scientists, IT specialists, service providers, information technology professionals, academicians, and researchers interested in the field of mobile computing.
5G Networks: Planning, Design and Optimization presents practical methods and algorithms for the design of 5G Networks, covering issues ranging from network resilience to how Big Data analytics can used in network design optimization. The book addresses 5G optimization issues that are data driven, high dimensional and clustered. The reader will learn: 5G concepts, how they are linked and their effect on the architecture of a 5G network Models of 5G at a network level, including economic aspects of operating a network The economic implications of scale and service diversity, and the incentive for optimal design and operational strategies Network topologies from a transport to a cloud perspective Theoretic foundations for network design and network optimization Algorithms for practical design and optimization of 5G subsystems based on live network projects Efficient Bayesian methods for network analytics The trade-off and multi-objective character of QoS management and cost saving Practical traffic and resilience measurement and QoS supervision Frameworks for performance analytics and network control This book will be an invaluable resource for telecom operators and service providers, university researchers, graduate students and network planners interested in practical methods for optimizing networks for large performance improvements and cost savings. Christofer Larsson works as an independent researcher and consultant in network design traffic engineering, network performance evaluation and optimization.
Discover and implement a system of your choice using Bluetooth Low Energy. About This Book * Learn the basics of Bluetooth Low Energy with its exciting new protocol stack and security. * Build customized Bluetooth Low Energy projects that make your web or mobile apps smarter in terms of networking and communications. * Using Android, iOS, and the Web, acquire key skills to harness the power of Bluetooth Low Energy in your IoT applications. Who This Book Is For The book is for developers and enthusiasts who are passionate about learning Bluetooth Low Energy technologies and want to add new features and services to their new or existing products. They should be familiar with programming languages such as Swift, Java, and JavaScript. Knowledge of debugging skills would be an advantage. What You Will Learn * Bluetooth Low Energy in theory. * Bluetooth Low Energy Hardware and Software Development Kits. * Implement Bluetooth low energy communication (central and peripheral) using Android. * Master BLE Beacons with examples implemented over Eddystone and iBeacons. * Implement indoor navigation using Estimote Beacons on iOS. * Implement Internet gateways to control BLE devices on a Wi-Fi network. * Understand BLE security mechanisms with a special focus on Bluetooth pairing, bonding, and key exchange to cover encryption, privacy, and user data integrity. * Implement Bluetooth Mesh using CSRMesh Technology. In Detail Bluetooth Low Energy (BLE) is a Wireless Personal Area network technology aimed at novel applications for smart devices. High-tech BLE profiles and services are being increasingly used by application developers and hardware enthusiasts to allow devices to interact with the surrounding world. This book will focus on a technical introduction to BLE and how it is reshaping small-distance communication. We will start with IoT, where many technologies such as BLE, Zigbee, and IEEE 802.15.4 Mesh will be introduced. The book will present BLE from an engineering perspective, from which the protocol stack, architecture, and layers are discussed. You will learn to implement customized projects for Peripheral/Central communication, BLE Beacons, indoor navigation using triangulation, and the Internet gateway for Bluetooth Low Energy Personal Network, all using various code samples and APIs on Android, iOS, and the Web. Finally, the book will conclude with a glimpse into future technologies destined to be prominent in years to come. Style and approach The book is a practical tutorial that will help you understand the background and technicalities of BLE and offers a friendly environment to build and create robust BLE projects. This hands-on approach will give you a clear vision of Bluetooth Low Energy and how it can be used in IoT.
Mobile data traffic is expected to exceed traffic from wired devices in the next couple of years. This emerging future will be empowered by revolutionary 5G radio network technologies with a focus on application-driven connectivity, transparently deployed over various technologies, infrastructures, users and devices to realise the vision of 'the Internet of Everything'. This book presents a roadmap of 5G, from advanced radio technologies to innovative resource management approaches and novel network architectures and system concepts. Topics covered include challenges for efficient multi-service coexistence for 5G below 6GHz; new quasi-deterministic approaches to channel modelling in millimetre-wave bands; large scale antenna systems; effects of densification and randomness of infrastructure deployment in cellular networks; wireless device-to-device (D2D) Links for machine-to-machine (M2M) communication; caching in large wireless networks; full duplexing; decoupled uplink and downlink access in heterogeneous networks; wireless networks virtualisation; and regulation, business and technology perspectives on licensed shared access (LSA) and three-tier spectrum sharing models. 5G Wireless Technologies is an essential guide to this emerging system for researchers, engineers and advanced students working in telecommunications and networking.
Wireless multi-hop networks have become an important part of many modern communication systems. Some of the earliest examples were military communication networks utilizing wireless relays in remote areas. More recently, many industries have used wireless multi-hop networks to create a multitude of fascinating tools and systems. Motivated by classical routing solutions in the Internet, conventional routing attempts to find a fixed path along which the packets are forwarded. Such fixed path schemes fail to take advantage of the broadcast nature and opportunities provided by the wireless medium, and result in unnecessary packet retransmissions. In opportunistic routing, decisions are made in an online manner by choosing the next relay based on the actual transmission outcomes as well as a rank ordering of neighboring nodes. Opportunistic Routing in Wireless Networks provides the motivation for opportunistic routing, and presents several different algorithms which achieve better performance, in most scenarios, than conventional shortest path routing. This comprehensive survey provides a starting point for all researchers and students wishing to learn the background and technical details of opportunistic routing.
Tackling problems from the least complicated to the most, Resource Allocation in Uplink OFDMA Wireless Systems provides readers with a comprehensive look at resource allocation and scheduling techniques (for both single and multi-cell deployments) in uplink OFDMA wireless networks--relying on convex optimization and game theory to thoroughly analyze performance. Inside, readers will find topics and discussions on: Formulating and solving the uplink ergodic sum-rate maximization problem Proposing suboptimal algorithms that achieve a close performance to the optimal case at a considerably reduced complexity and lead to fairness when the appropriate utility is used Investigating the performance and extensions of the proposed suboptimal algorithms in a distributed base station scenario Studying distributed resource allocation where users take part in the scheduling process, and considering scenarios with and without user collaboration Formulating the sum-rate maximization problem in a multi-cell scenario, and proposing efficient centralized and distributed algorithms for intercell interference mitigation Discussing the applicability of the proposed techniques to state-of-the-art wireless technologies, LTE and WiMAX, and proposing relevant extensions Along with schematics and figures featuring simulation results, Resource Allocation in Uplink OFDMA Wireless Systems is a valuable book for?wireless communications and cellular systems professionals and students.
Cooperative networks/relaying is a fundamental design approach that has been used to reduce path-loss and fading effects in conventional wireless communication systems. This book describes the use of this approach in new and emerging telecommunications technologies and new application areas. Topics covered include spatial modulation for cooperative networks; relaying for massive MIMO; relaying for outdoor to indoor in mmWave communications; precoding techniques for relaying with interference; relaying in full-duplex radio communication systems; relay selection in modern communication systems; relaying in green communications systems; energy-efficient relaying; cognitive radio with relaying; relaying in non-ideal conditions; relaying and physical layer secrecy; relaying technologies for smart grid; simultaneous wireless and power transfer for interference relay channel; relaying in visible light communication systems; and on-ground and on-board signal processing for multibeam. With contributions from an international panel of experts, this book is essential reading for researchers and advanced students in academia and industry working in telecommunications system design.
A basic question in wireless networking is how to optimize the wireless network resource allocation for utility maximization and interference management. How can we overcome interference to efficiently optimize fair wireless resource allocation, under various stochastic constraints on quality of service demands? Network designs are traditionally divided into layers. How does fairness permeate through layers? Can physical layer innovation be jointly optimized with network layer routing control? How should large complex wireless networks be analyzed and designed with clearly-defined fairness using beamforming? Wireless Network Optimization by Perron-Frobenius Theory provides a comprehensive survey of the models, algorithms, analysis, and methodologies using a Perron-Frobenius theoretic framework to solve wireless utility maximization problems. This approach overcomes the notorious non-convexity barriers in these problems, and the optimal value and solution of the optimization problems can be analytically characterized by the spectral property of matrices induced by nonlinear positive mappings. It can even solve several previously open problems in the wireless networking literature. This survey will be of interest to all researchers, students and engineers working on wireless networking.
Multi-way communication is a means to significantly improve the spectral efficiency of wireless networks. This monograph provides an overview of the developments in this research area since it was initiated by Claude Shannon. The basic two-way communication channel is considered first, followed by the two-way relay channel obtained by the deployment of an additional cooperative relay node to improve the overall communication performance. This basic setup is then extended to multi-user systems. For all these setups, fundamental limits on the achievable rates are reviewed, making use of a linear high-SNR deterministic channel model to provide valuable insights that are helpful when discussing of the coding schemes for Gaussian channel models in detail. Several tools and communication strategies are used in the process, including computation, signal-space alignment, and nested lattice codes. Finally, extensions of multi-way communication channels to multiple antenna settings are discussed. This monograph provides a starting point for any researcher or student in understanding this important topic central to wireless communication systems.
Leverage the powerful Arduino and XBee platforms to monitor and control your surroundings About This Book * Build your own low-power, wireless network using ready-made Arduino and XBee hardware * Create a complex project using the Arduino prototyping platform * A guide that explains the concepts and builds upon them with the help of examples to form projects Who This Book Is For This book is targeted at embedded system developers and hobbyists who have some working knowledge of Arduino and who wish to extend their projects using wireless connectivity. What You Will Learn * Interact with XBee boards using the XCTU program on Windows, OS X, or Linux * Make your Arduino boards communicate wirelessly, using XBee modules in the advanced API mode * Centrally collect and store measured sensor data, in the cloud or your own database * Connect the coordinator Arduino to the Internet and send data to web services * Control your environment automatically, based on sensor input from your network * Interact with off-the-shelf ZigBee Home Automation devices * Make your devices battery-powered and let them sleep to get months or even years of battery life In Detail Arduino has been established as the de facto standard microcontroller programming platform, being used for one-off do-it-yourself projects as well as prototypes for actual products. By providing a myriad of libraries, the Arduino community has made it very easy to interact with pretty much any piece of hardware out there. XBee offers a great range of low-power wireless solutions that are easy to work with, by taking all of the complexity of wireless (mesh) networking out of your hands and letting you focus on what to send without worrying about the how. Building wireless sensor networks is cost-effective as well as efficient as it will be done with Arduino support. The book starts with a brief introduction to various wireless protocols, concepts, and the XBee hardware that enables their use. Then the book expands to explain the Arduino boards to you, letting them read and send sensor data, collect that data centrally, and then even control your home from the Internet. Moving further more advanced topics such as interacting through the standard Zigbee Home Automation protocol, or making your application power-efficient are covered. By the end of the book, you will have all the tools needed to build complete, real-world solutions. Style and approach A hands-on guide, featuring a single home automation project that can be built as described or with endless variations. Every step is illustrated with complete examples and screenshots, allowing you to build the examples swiftly.
Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.
The modern world of ubiquitous communication devices has fueled recent research into the need to find technical solutions to address energy consumption concerns raised by various stakeholders. These include: The exponential increase of connected devices that wireless communications have been experiencing poses serious sustainable growth concerns. The rapid expansion of wireless networks causes environmental concerns. Economic concerns drive the development of novel energy-efficient ICT. This monograph focuses on energy-efficient wireless network design, including resource allocation, scheduling, precoding, relaying, and decoding. Starting from simple point-to-point (P2P) systems and then gradually moving towards more complex interference networks, the energy efficiency is defined and its properties characterized. The authors show how the energy efficiency is naturally defined by fractional functions, thus establishing that a key role in the modeling, analysis, and optimization of energy efficiency is played by fractional programming; a branch of optimization theory specifically concerned with the properties and optimization of fractional functions. The monograph introduces fractional programming theory, and illustrates how it can be used to formulate and handle energy efficiency optimization problems. It provides a comprehensive introduction to the theoretical and practical aspects of these problems and describes the solutions offered with this technique. It will be of use to all researchers and engineers working on modern communication systems.
This book will have a broad appeal in the area of Wireless Networking-Based Control. Various engineering disciplines, control and communication science organizations will be interested in purchasing the book with a new, emerging, and important theme. Also, industry such as Honeywell and those (e.g. power industry, automotive industry, aerospace industry) interested in implementing wireless network control to express interest in purchasing this book.
This book gathers selected high-quality research papers presented at International Conference on Paradigms of Communication, Computing and Data Sciences (PCCDS 2022), held at Malaviya National Institute of Technology Jaipur, India, during 05 - 07 July 2022. It discusses high-quality and cutting-edge research in the areas of advanced computing, communications and data science techniques. The book is a collection of latest research articles in computation algorithm, communication and data sciences, intertwined with each other for efficiency.
The book is a collection of best selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2022) held during 28 - 29 March 2022 at CMR Institute of Technology, Hyderabad, Telangana, India. This book will contain the articles on current trends of machine learning, internet of things, and smart cities applications emphasizing on multi-disciplinary research in the area of artificial intelligence and cyber physical systems. The book is a great resource for scientists, research scholars and PG students to formulate their research ideas and find the future directions in these areas. Further, this book serves as a reference work to understand the latest technologies by practice engineers across the globe.
The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Design Next-Generation Wireless Networks Using the Latest TechnologiesFully updated throughout to address current and emerging technologies, standards, and protocols, Wireless Networks, Third Edition, explains wireless system design, high-speed voice and data transmission, internet working protocols, and 4G convergence. New chapters cover LTE, WiMAX, WiFi, and backhaul. You'll learn how to successfully integrate LTE, WiMAX, UMTS, HSPA, CDMA2000/EVDO, and TD-SCDMA into existing cellular/PCS networks. Configure, manage, and optimize high-performance wireless networks with help from this thoroughly revised, practical guide. Comprehensive coverage includes: Overview of 3G wireless systems UMTS (WCDMA) and HSPA CDMA2000 and EVDO TD-SCDMA and TD-CDMA LTE WiMAX VoIP WiFi Broadband system RF design considerations Network design considerations Backhaul Antenna system selection, including MIMO System design for UMTS, CDMA2000 with EVDO, TD-SCDMA, TD-CDMA, LTE, and WiMAX Communication sites including in-building and colocation guidelines 5G and beyond
This detailed, up-to-date introduction to heterogeneous cellular networking introduces its characteristic features, the technology underpinning it and the issues surrounding its use. Comprehensive and in-depth coverage of core topics catalogue the most advanced, innovative technologies used in designing and deploying heterogeneous cellular networks, including system-level simulation and evaluation, self-organisation, range expansion, cooperative relaying, network MIMO, network coding and cognitive radio. Practical design considerations and engineering tradeoffs are also discussed in detail, including handover management, energy efficiency and interference management techniques. A range of real-world case studies, provided by industrial partners, illustrate the latest trends in heterogeneous cellular networks development. Written by leading figures from industry and academia, this is an invaluable resource for all researchers and practitioners working in the field of mobile communications.
"Wifi, WiMAX, and Cellular Multihop Network"s presents an overview of WiFi-based and WiMAX-based multihop relay networks. As the first text to cover IEEE 802.16j multihop hop relay technology, this revolutionary resource explores the latest advances in multi-hop and ad-hoc networking. Not only does this reference provide the technological aspects, but also the applications for the emerging technology and architectural issues. Ranging from introductory material to advanced topics, this guidebook, plus PowerPoint slides, is essential for engineers, researchers, and students interested in learning more about WiFi and WiMAX multihop relay networks.
This book is written in an easy-to-read style, with a strong emphasis on real-world, practical examples. Step-by-step explanations are provided for performing important administration tasks. If you are Cisco Unified Communications administrators or engineers looking forward for advanced recipes to perform important administration tasks, then this is the best guide for you. This book assumes familiarity with the basics of Cisco's Unified Communications Manager architecture. |
![]() ![]() You may like...
Bobby Fischer Goes To War - How A Lone…
David Edmonds, John Eidinow
Paperback
Birds of Kenya and Northern Tanzania
Dale A Zimmerman, David J Pearson, …
Paperback
|