Mobile and Wireless Networks
close menu
Bookswagon
search
My Account
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Science, Technology & Agriculture > Electronics and communications engineering > Communications engineering / telecommunications > Mobile phone technology > Mobile and Wireless Networks
Mobile and Wireless Networks

Mobile and Wireless Networks


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

This book presents the state of the art in the field of mobile and wireless networks, and anticipates the arrival of new standards and architectures. It focuses on wireless networks, starting with small personal area networks and progressing onto the very large cells of wireless regional area networks, via local area networks dominated by WiFi technology, and finally metropolitan networks. After a description of the existing 2G and 3G standards, with LTE being the latest release, LTE-A is addressed, which is the first 4G release, and a first indication of 5G is provided as seen through the standardizing bodies. 4G technology is described in detail along with the different LTE extensions related to the massive arrival of femtocells, the increase to a 1 Gbps capacity, and relay techniques. 5G is also discussed in order to show what can be expected in the near future.

The Internet of Things is explained in a specific chapter due to its omnipresence in the literature, ad hoc and mesh networks form another important chapter as they have made a comeback after a long period of near hibernation, and the final chapter discusses a particularly recent topic: Mobile-Edge Computing (MEC) servers.



Table of Contents:

Preface xiii

List of Acronyms  xvii

Chapter 1. Introduction to Mobile and Networks  1

1.1. Mobile and wireless generation networks 2

1.1.1. First generation mobile technology: 1G 2

1.1.2. Second generation mobile technology: 2G 3

1.1.3. Third generation mobile technology: 3G 4

1.1.4. Fourth generation mobile technology: 4G  5

1.1.5. Fifth generation mobile technology: 5G 7

1.2. IEEE technologies  7

1.2.1. IEEE 802.15: WPAN  8

1.2.2. IEEE 802.11: WLAN  8

1.2.3. IEEE 802.16: WMAN  9

1.2.4. IEEE 802.21: MIHS 10

1.2.5. IEEE 802.22: WRAN  10

1.3. Conclusion 11

1.4. Bibliography  11

1.4.1. Standards 11

1.4.2. Selected bibliography  12

1.4.3. Websites  13

Chapter 2. Mobile Networks 15

2.1. Cellular network 16

2.1.1. Radio interface  17

2.1.2. Cell design 19

2.1.3. Traffic engineering  20

2.2. Principles of cellular network functionalities 21

2.3. 1G networks  23

2.4. 2G networks  23

2.5. 3G networks  25

2.6. 4G networks  27

2.7. 5G networks  29

2.8. Bibliography 30

Chapter 3. Long-Term Evolution  35

3.1. Relevant features of LTE 36

3.2. Network architecture and protocols 39

3.2.1. Architecture reference model  40

3.2.2. Functional description of a LTE network 41

3.2.3. System architecture evolution  44

3.2.4. Reference points 46

3.3. Control and user planes  48

3.3.1. User plane 48

3.3.2. GPRS tunneling protocol  50

3.3.3. Control plane 52

3.4. Multimedia broadcast and multicast service  53

3.5. Stream Control Transmission Protocol 54

3.6. Network discovery and selection  55

3.7. Radio resource management 56

3.8. Authentication and authorization  58

3.8.1. User authentication, key agreement and key generation  59

3.8.2. Signaling and user-plane security 61

3.9. Fundamentals of the MAC layer in LTE  61

3.9.1. Traffic classes and quality of service 61

3.9.2. Mobility  62

3.9.3. Resource scheduling algorithms  63

3.10. Fundamentals of the LTE physical layer 64

3.10.1. Slot and frame structure in LTE OFDMA  64

3.10.2. Reference signals  68

3.11. Conclusion69

3.12. Bibliography 70

3.12.1. Standards 70

3.12.2. Selected bibliography  70

Chapter 4. Long-Term Evolution Advanced  73

4.1. HetNet in LTE Advanced  75

4.2. Small cell concepts  77

4.2.1. Picocell  77

4.2.2. Femtocells 78

4.2.3. Relays 78

4.3. Femtocell and macrocell integration architecture  79

4.4. Picocell and macrocell integration architecture 80

4.5. Interference mitigation in heterogeneous networks 81

4.5.1. Interference mitigation in the context of two-tier macrofemtocells  82

4.5.2. Frequency spectral assignment  82

4.6. Interference mitigation in the context of two-tier macropicocells  83

4.7. Coordinated multi-point transmission/reception 84

4.8. Carrier aggregation  85

4.9. LTE Advanced evolution toward 5G 86

4.10. Bibliography 87

4.10.1. Standards  87

4.10.2. Selected bibliography 87

4.10.3. Websites 88

Chapter 5. 5G 89

5.1. From LTE Advanced to 5G: the big transition  90

5.1.1. D2D communication  91

5.1.2. Green activities saving energy 92

5.1.3. LTE–WiFi integration for traffic offloading 92

5.1.4. Vehicular communication 93

5.2. Some characteristics envisioned for 5G  94

5.2.1. Massive capacity support  94

5.2.2. Ubiquitous communication support  94

5.2.3. Improvement in radio characteristics 94

5.3. 5G frequencies  95

5.4. High and low platforms 96

5.5. Cloud-RAN  98

5.6. Bibliography  101

5.6.1. Standard  101

5.6.2. Selected bibliography  101

5.6.3. Website  101

Chapter 6. Small Cells 103

6.1. Femtocell technology 105

6.2. LTE femtocell architecture  108

6.2.1. Home eNB or FAP  108

6.2.2. HeNB gateway or FAP-GW 109

6.2.3. HeNB management system or ACS  109

6.2.4. Security gateway 110

6.3. LTE femtocell deployment scenarios  110

6.4. Femtocell access control strategy  112

6.4.1. Closed subscriber group 112

6.4.2. Femtocell access control modes  113

6.4.3. Physical cell identity 113

6.5. LTE femtocell challenges and technical issues  114

6.5.1. Interference  114

6.5.2. Spectrum allocation  115

6.5.3. Access mode impact 117

6.6. Security and privacy challenges 117

6.7. Synchronization  120

6.8. Mobility 121

6.9. Passpoint  123

6.10. The backhaul network  126

6.11. Software radio and cognitive radio  128

6.12. Custom cells  129

6.13. Conclusion 130

6.14. Bibliography 131

6.14.1. Standards 131

6.14.2. Selected bibliography  131

6.14.3. Websites 133

Chapter 7. WPAN and WiGig 135

7.1. Wireless Personal Area Network  135

7.2. IEEE 802.15  136

7.3. Bluetooth  138

7.4. UWB 142

7.5. WiGig  147

7.6. WirelesssHD  150

7.7. Conclusion 151

7.8. Bibliography  151

Chapter 8. WLAN and WiFi 153

8.1. IEEE 802.11  154

8.2. WiFi architecture 156

8.2.1. Physical layer 156

8.2.2. Data link layer  157

8.2.3. Access techniques  158

8.2.4. The CSMA/CA protocol  159

8.2.5. Handovers 162

8.2.6. Security  163

8.2.7. Wired Equivalent Privacy 164

8.2.8. WPA and IEEE 802.11i 167

8.3. Security and authentication 168

8.3.1. Scalability and flexibility  168

8.3.2. IEEE 802.11i 170

8.3.3. Trading security policy 170

8.4. Saving energy 172

8.5. IEEE 802.11a, b and g  174

8.5.1. IEEE 802.11b 175

8.5.2. IEEE 802.11a 176

8.5.3. IEEE 802.11n 176

8.5.4. IEEE 802.11ac  179

8.5.5. IEEE 802.11ad  182

8.5.6. IEEE 802.11af  183

8.5.7. IEEE 802.11ah  185

8.6. Conclusion 187

8.7. Bibliography  188

Chapter 9. WMAN and WiMAX 191

9.1. Background on IEEE 802.16e 192

9.1.1. The medium access control layer 192

9.1.2. Channel access mechanism 193

9.1.3. Quality of service  194

9.1.4. Mobility support 195

9.2. The physical layer  195

9.2.1. Subchannelization in mobile WiMAX: OFDMA  195

9.2.2. Slot and frame structure in OFDMA-based mobile WiMAX 196

9.2.3. OFDMA slot structure in AMC permutation mode  198

9.3. An example of WiMAX and WiFi integration  200

9.3.1. QoS management 202

9.3.2. Qos support and classes 202

9.4. Mechanisms of channel access 203

9.4.1. WiFi access methods 204

9.4.2. Mobile WiMAX access method  205

9.4.3. Handover support 206

9.5. IEEE 802.16m or mesh for WiMAX  206

9.6. IEEE 802.16h or cognitive radio for WiMAX  207

9.6.1. Uncoordinated coexistence mechanism  208

9.6.2. Coordinated coexistence mechanism 209

9.7. Bibliography  210

9.7.1. Standards  210

9.7.2. Selected bibliography  210

Chapter 10. WRAN and Interconnection 213

10.1. IEEE 802.22  213

10.2. Interconnection between IEEE standards 216

10.2.1. IEEE 802.21 framework  217

10.2.2. IEEE 802.21 core architecture 218

10.3. Bibliography 220

10.3.1. Standards 220

10.3.2. Selected bibliography  220

Chapter 11. Internet of Things 223

11.1. Sensor networks 224

11.2. RFID  226

11.2.1. Using RFID  228

11.2.2. EPC global  229

11.2.3. RFID security  231

11.2.4. Mifare 231

11.3. Near-field communication 232

11.3.1. Mobile key  233

11.3.2. NFC payment  234

11.3.3. The Internet of Things in a medical environment 236

11.4. The Internet of Things in the home  237

11.5. Fog networking  238

11.6. Connection of things 240

11.6.1. Specific proprietary solution: SIGFOX example  241

11.6.2. LoRa 242

11.7. Conclusion  245

11.8. Bibliography 245

Chapter 12. Ad Hoc and Mesh Networks  247

12.1. Ad hoc networks 248

12.2. Routing  250

12.2.1. Ad hoc in the link layer  253

12.2.2. Ad hoc mode in WiFi 253

12.2.3. Bluetooth link layer  256

12.3. Ad hoc routing protocols  258

12.3.1. Reactive protocols 261

12.3.2. Ad hoc on-demand distance vector 261

12.3.3. Dynamic source routing  262

12.4. Proactive protocols 263

12.4.1. Optimized link state routing protocol  263

12.4.2. Topology dissemination based on reverse-path forwarding  264

12.5. Quality of service in ad hoc networks  265

12.6. Models for QoS in MANET  266

12.7. Mesh networks  270

12.8. VANET networks  273

12.9. Green PI: wearable Device2Device networks 274

12.9.1. Observation of traffic 276

12.9.2. Embedded Internet and 5G  277

12.9.3. Green PI: wearable and embedded Internet  278

12.9.4. Distributed TCP/IP 279

12.9.5. Wearable YOI  280

12.10. Bibligraphy 281

Chapter 13. Mobile-Edge Computing  283

13.1. Network virtualization 283

13.2. Network virtualization technology  285

13.2.1. Xen  286

13.2.2. OpenFlow  288

13.3. Using network virtualization 292

13.3.1. Isolation 293

13.3.2. Extensive network virtualization 294

13.3.3. The Cloud 296

13.4. Mobile-edge computing 298

13.4.1. Use case 1: active device location tracking 299

13.4.2. Use case 2: augmented reality content delivery  300

13.4.3. Use case 3: video analytics  301

13.4.4. Use case 4: RAN-aware content optimization 301

13.4.5. Use case 5: distributed content and DNS caching 302

13.4.6. Use case 6: application-aware performance optimization  302

13.4.7. MEC server placement 303

13.5. Conclusion 305

13.6. Bibliography 305

Conclusion 307

Index 309



About the Author :
Khaldoun Al Agha is the Co-founder and CEO of Green Communications. He is also Professor at the University of Paris-Sud in Orsay, France.

Guy Pujolle is currently Professor at University Pierre and Marie Curie in France and a distinguished Visiting Professor at UFRJ (University Federal of Rio de Janeiro) in Brazil.

Tara Ali-Yahiya is Associate Professor in the Laboratoire de Recherche en Informatique (Computer Science Research Laboratory) at the University of Paris-Sud in Orsay, France.


Best Sellers


Product Details
  • ISBN-13: 9781119007555
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Standards Information Network
  • Language: English
  • ISBN-10: 1119007550
  • Publisher Date: 17 Aug 2016
  • Binding: Digital (delivered electronically)
  • No of Pages: 352


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Mobile and Wireless Networks
John Wiley & Sons Inc -
Mobile and Wireless Networks
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Mobile and Wireless Networks

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!