Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15. It details the LTE protocol stack of an IoT device, architecture and framework, how they are functioning and communicate with cellular infrastructure, and supported features and capability. NB-IoT is designed to connect a large number of devices in a wide range of application domains forming so-called Internet of Things (IoT). Connected devices are to communicate through cellular infrastructure. This technology is new within the 3GPP specifications and is part of upcoming new wireless technology known as 5G. Table of Contents Preface. Acknowledgments. Author. List of Abbreviations. 1. Internet of Things. 2. 4G and 5G Systems. 3. Radio Resource Control Sublayer. 4. Packet Data Convergence Protocol Sublayer. 5. Radio Link Control Sublayer. 6. Medium Access Control Sublayer. 7. Physical Sublayer. 8. Quality of Service Architecture. 9. Use Cases and Deployment. References. Index.
This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments. Femtocells will help mobile operators to provide a basis for the next generation of services which are a combination of voice, video, and data services to mobile users. This book discusses modelling traffic and deployment strategies in femtocells and provides a review for the use of femtocells and their applications in IoT environments. Moreover, it highlights the efficient real-time medium access, data delivery, caching and security aspects in smart spaces. It concludes by presenting open research issues associated with smart IoT-femtocell based applications.
This book features the major research advances on integrated networking, caching, and computing. Information-centric networking-based caching is one of the promising techniques for future networks. The cloud computing paradigm has been widely adopted to enable convenient, on-demand network access to a shared pool of configurable computing resources. In addition, fog/edge computing is proposed to deploy computing resources closer to end devices. From the perspective of applications, network, cache and compute are underlying enabling resources. How to manage, control and optimize these resources can have significant impacts on application performance.
This book gives an overview of best effort data and real-time multipath routing protocols in WMSN. It provides results of recent research in design issues affecting the development of strategic multipath routing protocols that support multimedia data traffic in WMSN from an IoT perspective, plus detailed analysis on the appropriate traffic models.
This book on SDP is the first of this kind that attempts to put all SDP related RFCs together with their mandatory and optional texts in a chronological systematic way as if people can use a single "super-SDP RFC" with almost one-to-one integrity from beginning to end to see the big picture of SDP in addition to base SDP functionalities.
Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks. It also proposes a Cooperative Hybrid Self-Healing scheme to enhance the confidentiality of the data collected by UWSN. It ends with a proposal called Self-Healing Cluster Controlled Mobility (SH-CCM) scheme based on hybrid cooperation between both Proactive and Reactive peers and the sick sensors at both network and cluster levels to guarantee the security in UWSN.
This book focuses on the most critical technical aspects of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. It covers the smart city concept and architecture and explains how V2V and V2I fit into it. It describes the wireless communication protocols for V2V and V2I. It then explains the hardware design process for vehicle communication transceiver and antenna systems. It explains next-generation wireless technologies and their requirements for vehicle communication protocols. Case studies provide the latest V2V and V2I commercial design details. Finally, it describes how to implement vehicle communication protocol from practical hardware design angle.
First Published in 2018. Routledge is an imprint of Taylor & Francis, an Informa company.
This book shows how to build a "INFelecPHY GPS Unit" (IEP-GPS) tracking system for fleet management that is based on 3G and GPRS modules. This model should provide reliability since it deals with several protocols: 1) HTTP and HTTPS to navigate, download and upload in real time the information to a web server, 2) FTTP and FTTPS to handle in a non-real time the files to the web application, and 3) SMTP and POP3 to send and receive email directly from the unit in case of any alert. Similar to a mobile device, but without screen for display, it is multifunctional because it links to a GPRS module, a camera, a speaker, headphone, a keypad and screen.
Beyond 2020, wireless communication systems will have to support more than 1,000 times the traffic volume of today's systems. This extremely high traffic load is a major issue faced by 5G designers and researchers. This challenge will be met by a combination of parallel techniques that will use more spectrum more flexibly, realize higher spectral efficiency, and densify cells. Novel techniques and paradigms must be developed to meet these goals. The book addresses diverse key-point issues of next-generation wireless communications systems and identifies promising solutions. The book's core is concentrated to techniques and methods belonging to what is generally called radio access network.
The book introduces optical wave propagation in the irregular turbulent atmosphere and the relations to laser beam and LIDAR applications for both optical communication and imaging. It examines atmosphere fundamentals, structure, and content. It explains specific situations occurring in the irregular atmosphere and for specific natural phenomena that affect optical ray and laser beam propagation. It emphasizes how to use LIDAR to investigate atmospheric phenomena and predict primary parameters of the irregular turbulent atmosphere and suggests what kinds of optical devices to operate in different atmospheric situations to minimize the deleterious effects of natural atmospheric phenomena.
The International Conference on Communications, Management, and Information Technology (ICCMIT'16) provides a discussion forum for scientists, engineers, educators and students about the latest discoveries and realizations in the foundations, theory, models and applications of systems inspired on nature, using computational intelligence methodologies, as well as in emerging areas related to the three tracks of the conference: Communication Engineering, Knowledge, and Information Technology. The best 25 papers to be included in the book will be carefully reviewed and selected from numerous submissions, then revised and expanded to provide deeper insight into trends shaping future ICT.
Opportunistic networking, by definition, allows devices to communicate whenever a window of opportunity is available. Many emerging technologies employ opportunistic exchanges of information. This book addresses this trend in communications engineering, taking into account three specific areas-vehicular, device-to-device (D2D), and cognitive radio-while describing the opportunistic communication methods of each. From smart homes to smart cities, smart agriculture to never-die-networks and beyond, the text explores the state of the art of opportunistic networking, providing the latest research, developments, and practices in one concise source.
C-RAN and virtualized Small Cell technology poses several major research challenges. These include dynamic resource allocation, self-configuration in the baseband pool, high latency in data transfer between radio unit and baseband unit, the cost of data delivery, high volume of data in the network, software networking aspects, potential energy savings, security concerns, privacy of user's personal data at a remote place, limitations of virtualized environment, etc. This book provides deeper insights into the next generation RAN architecture and surveys the coexistence of SDN, C-RAN and Small Cells solutions proposed in the literature at different levels.
Convex Optimization for Signal Processing and Communications: From Fundamentals to Applications provides fundamental background knowledge of convex optimization, while striking a balance between mathematical theory and applications in signal processing and communications. In addition to comprehensive proofs and perspective interpretations for core convex optimization theory, this book also provides many insightful figures, remarks, illustrative examples, and guided journeys from theory to cutting-edge research explorations, for efficient and in-depth learning, especially for engineering students and professionals. With the powerful convex optimization theory and tools, this book provides you with a new degree of freedom and the capability of solving challenging real-world scientific and engineering problems.
Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security provides a broad overview of wireless network spectrum sharing in seven distinct sections: The first section examines the big picture and basic principles, explaining the concepts of spectrum sharing, hardware/software function requirements for efficient sharing, and future trends of sharing strategies. The second section contains more than 10 chapters that discuss differing approaches to efficient spectrum sharing. The authors introduce a new coexistence and sharing scheme for multi-hop networks, describe the space-time sharing concept, introduce LTE-U, and examine sharing in broadcast and unicast environments. They then talk about different cooperation strategies to achieve mutual benefits for primary users (PU) and secondary users (SU), discuss protocols in a spectrum sharing context, and provide different game theory models between PUs and SUs. The third section explains how to model the interactions of PUs and SUs, using an efficient calculation method to determine spectrum availability. Additionally, this section explains how to use scheduling models to achieve efficient SU traffic delivery. The subject of the fourth section is MIMO-oriented design. It focuses on how directional antennas and MIMO antennas greatly enhance wireless network performance. The authors include a few chapters on capacity/rate calculations as well as beamforming issues under MIMO antennas. Power control is covered in the fifth section which also describes the interference-aware power allocation schemes among cognitive radio users and the power control schemes in cognitive radios. The sixth section provides a comprehensive look at security issues, including different types of spectrum sharing attacks and threats as well as corresponding countermeasure schemes. The seventh and final section covers issues pertaining to military applications and examines how the military task protects its data flows when sharing the spectrum with civilian applications.
The accurate design of earth-space systems requires a comprehensive understanding of the various propagation media and phenomena that differ depending on frequencies and types of applications. The choice of the relevant channel models is crucial in the design process and constitutes a key step in performance evaluation and testing of earth-space systems. The subject of this book is built around the two characteristic cases of satellite systems: fixed satellites and mobile satellite systems. Radio Wave Propagation and Channel Modeling for Earth-Space Systems discusses the state of the art in channel modeling and characterization of next-generation fixed multiple-antennas and mobile satellite systems, as well as propagation phenomena and fade mitigation techniques. The frequencies of interest range from 100 MHz to 100 GHz (from VHF to W band), whereas the use of optical free-space communications is envisaged. Examining recent research advances in space-time tropospheric propagation fields and optical satellite communication channel models, the book covers land mobile multiple antennas satellite- issues and relative propagation campaigns and stratospheric channel models for various applications and frequencies. It also presents research and well-accepted satellite community results for land mobile satellite and tropospheric attenuation time-series single link and field synthesizers. The book examines aeronautical communications channel characteristics and modeling, relative radio wave propagation campaigns, and stratospheric channel model for various applications and frequencies. Propagation effects on satellite navigation systems and the corresponding models are also covered.
Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications fills a gap in the existing literature by combining a plethora of WSN-based emerging technologies into a single source so that researchers can form opinions regarding these technologies. It presents different types of emerging communication technologies based on WSNs and describes how wireless sensor networks can be integrated with other communication technologies. It covers many of the new techniques and demonstrates the application of WSNs. The book's 14 chapters are divided into four parts. The first part covers the basics of wireless sensor networks and their principal working methods. The authors then move on to discuss different types of WSNs, characteristics of different types of emerging technologies based on WSNs, renewable energy sources, battery replenishment strategies, and application-specific energy challenges of WSNs. The second part is dedicated to issues related to wireless body area networks (WBANs). It discusses wearable WSNs and their applications, standards, and research trends. The authors also discuss routing schemes devised for WBANs and thermal-aware routing protocols for WBANs. The third part focuses on different emerging communication technologies based on WSNs, including electromagnetic wireless nanosensor networks, WSNs in the IoT, management of WSNs through satellite networks, WSNs in smart homes, and cognitive radio technology in conjunction with WSNs. The last part of the book covers topics generally related to typical WSNs, including energy-efficient data collection in WSNs, key distribution mechanisms in WSNs, distributed data gathering algorithms for mobile WSNs, and finally, a novel mobility scheme for WSNs that supports IPv6.
Opportunities in 5G Networks: A Research and Development Perspective uniquely focuses on the R&D technical design of 5th-generation (5G) networks. It is written and edited by researchers and engineers who are world-renown experts in the design of 5G networks. The book consists of four sections: The first section explains what 5G is, what its real uses are, and the effects of 5G for mobile operators. It provides an overview of the evolution from 4G to 5G and discusses the services, visions, requirements, and key enabling technologies for 5G networks. The second section covers the nuts and bolts of 5G design, including cellular network deployment policies, directional antennas for cellular networks, and vertical sectoring. It discusses the development of quality-of-service management principles at the network level in the new Third Generation Partnership Project releases and their implementation in 5G networks. It covers massive multiple-in multiple-out systems-a key enabling technology for 5G, and looks at issues associated with channel estimation and channel feedback in massive multiple-in multiple-out. It also addresses converged management of radio and optical resources. The third section provides an overview of candidate physical layer technologies for 5G systems, nonorthogonal multiple access, and Nyquist signaling rates. The final section covers the centimeter-wave (cmWave) concept (below 30 GHz), the 5G cmWave concept for small cells, fundamental technology components such as optimized frame structure, dynamic scheduling of uplink/downlink transmission, interference suppression receivers, and rank adaptation. Finally, it examines millimeter-wave (mmWave) models along with medium access control design, 5G mmWave communications, and high-directional new medium access control mechanisms for directional mmWave wireless systems.
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
Directional antenna technologies have made significant advancements in the last decade. These advances have opened the door to many exciting new design opportunities for wireless networks to enhance quality of service (QoS), performance, and network capacity. In this book, experts from around the world present the latest research and development in wireless networks with directional antennas. Their contributed chapters provide detailed coverage of the models, algorithms, protocols, and applications of wireless networks with various types of directional antennas operating at different frequency bands. Wireless Network Performance Enhancement via Directional Antennas: Models, Protocols, and Systems identifies several interesting research problems in this important field, providing an opportunity to learn about solid solutions to these issues. It also looks at a number of practical hardware designs for the deployment of next-generation antennas, as well as efficient network protocols for exploitation of directional communications. The book is organized into six sections: Directional Antennas - covers the hardware design of different types of antennas Directional MAC - focuses on the principles of designing medium access control (MAC) protocols for directional networks Millimeter Wave - explores different design aspects of millimeter wave (mm-Wave) systems, which operate in higher-frequency bands (such as 60 GHz) MIMO - explains how to establish a multiple-input, multiple-output (MIMO) antenna system and describes how it operates in a cognitive radio network Advanced Topics - looks at additional topics such as beamforming in cognitive radio networks, multicast algorithm development, network topology management for connectivity, and sensor network lifetime issues Applications - illustrates some important applications, such as military networks and airborne networking, that benefit from directional networking designs With this book, researchers and engineers will be well-equipped to advance the research and development in this important field. If you're new to this field, you will find this book to be a valuable reference on basic directional networking principles, engineering design, and challenges.
Wireless sensor networks (WSNs) are a special class of ad hoc network in which network nodes composed of tiny sensors pass data such as temperature, pressure, and humidity through the network to a central location. Wireless sensor multimedia networks (WSMNs) are a special category of WSNs in which the sensor nodes are small cameras and microphones that can send voice, image, or video data through the network. This book presents the latest advances and research in WSMN architecture, algorithms, and protocols. WSMNs are attracting great attention from academia and industry due to the variety of applications in which they can be deployed. Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications explores the many benefits of WSMNs and the variety of applications in which they can be used-surveillance, traffic monitoring, advanced healthcare (blood pressure and heart rate monitoring), habitat monitoring, and localization services (finding missing children or wanted criminals). The contributed chapters in this book explore current research into key areas such as New quality-of-service-aware routing protocols that support a high data rate in WSMNs Cognitive radio capability that increases efficiency of spectrum utilization and decreases the probability of collision and contention Multimedia streaming optimization techniques New security schemes for real-time video streaming Various ways of optimizing power consumption in WSMNs Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications discusses open research issues and future trends in WSMNs. With this book, academic researchers, engineers, and graduate students will be well-equipped to advance the research in this emerging field.
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must for researchers, practitioners, system designers, policy makers, system managers, and administrators, there has been a need for a comprehensive and up-to-date source of research and information on cyber-physical systems. This book fills that need. Cyber-Physical Systems: From Theory to Practice provides state-of-the-art research results and reports on emerging trends related to the science, technology, and engineering of CPS, including system architecture, development, modeling, simulation, security, privacy, trust, and energy efficiency. It presents the research results of esteemed professionals on cutting-edge advances in cyber-physical systems that include communications, computing, and control. The book consists of eight sections, each containing chapters contributed by leading experts in the field. Each section covers a different area that impacts the design, modeling, and evaluation of CPS, including: Control systems Modeling and design Communications and signal processing Mobility issues Architecture Security issues Sensors and applications Computing issues The book's coverage includes cyber-physical system architecture, mobile cyber-physical systems, cyber-physical systems for intelligent (road/air) transportation, and cyber-physical system applications and standardization. With the CPS field advancing so rapidly, this book is an ideal reference to help researchers, system designers, and practitioners manufacture devices that are compatible with CPS standards. Presenting numerous examples that illustrate practical applications derived from theory, the book is also suitable for use as a textbook in upper undergraduate and graduate-level university courses.
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.
This book presents insights, interpretations, concepts, and interdependent views-in the landscape of mobile connectivity and service-that emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary domains of science and art. Mobile Evolution: Insights on Connectivity and Service explores the forward-looking and enabling capabilities of mobile connectivity and service in the context of long term evolution (LTE) systems and multimedia services, as viewed through a lens of human experience. It provides information and guidelines pertaining to the strategies and technologies associated with the next-generation mobile ecosystem. The book examines the intersection between the technology and the human dimension in the context of the ever-changing landscape. It arms you with ideas that you can apply to design, innovation, strategy, and business models for the various facets of mobile communication connectivity and service. |
You may like...
The Lie Of 1652 - A Decolonised History…
Patric Tariq Mellet
Paperback
(7)
Robert - A Queer And Crooked Memoir For…
Robert Hamblin
Paperback
(1)
Better Choices - Ensuring South Africa's…
Greg Mills, Mcebisi Jonas, …
Paperback
Women In Solitary - Inside The Female…
Shanthini Naidoo
Paperback
(1)
|