, , , e.a.

Mobile and Wireless Networks

Gebonden Engels 2016 9781848217140
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book presents the state of the art in the field of mobile and wireless networks, and anticipates the arrival of new standards and architectures. It focuses on wireless networks, starting with small personal area networks and progressing onto the very large cells of wireless regional area networks, via local area networks dominated by WiFi technology, and finally metropolitan networks. After a description of the existing 2G and 3G standards, with LTE being the latest release, LTE–A is addressed, which is the first 4G release, and a first indication of 5G is provided as seen through the standardizing bodies. 4G technology is described in detail along with the different LTE extensions related to the massive arrival of femtocells, the increase to a 1 Gbps capacity, and relay techniques. 5G is also discussed in order to show what can be expected in the near future.

The Internet of Things is explained in a specific chapter due to its omnipresence in the literature, ad hoc and mesh networks form another important chapter as they have made a comeback after a long period of near hibernation, and the final chapter discusses a particularly recent topic: Mobile–Edge Computing (MEC) servers.

Specificaties

ISBN13:9781848217140
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:352

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Preface xiii</p>
<p>List of Acronyms&nbsp; xvii</p>
<p>Chapter 1. Introduction to Mobile and Networks&nbsp; 1</p>
<p>1.1. Mobile and wireless generation networks 2</p>
<p>1.1.1. First generation mobile technology: 1G 2</p>
<p>1.1.2. Second generation mobile technology: 2G 3</p>
<p>1.1.3. Third generation mobile technology: 3G 4</p>
<p>1.1.4. Fourth generation mobile technology: 4G&nbsp; 5</p>
<p>1.1.5. Fifth generation mobile technology: 5G 7</p>
<p>1.2. IEEE technologies&nbsp; 7</p>
<p>1.2.1. IEEE 802.15: WPAN&nbsp; 8</p>
<p>1.2.2. IEEE 802.11: WLAN&nbsp; 8</p>
<p>1.2.3. IEEE 802.16: WMAN&nbsp; 9</p>
<p>1.2.4. IEEE 802.21: MIHS 10</p>
<p>1.2.5. IEEE 802.22: WRAN&nbsp; 10</p>
<p>1.3. Conclusion 11</p>
<p>1.4. Bibliography&nbsp; 11</p>
<p>1.4.1. Standards 11</p>
<p>1.4.2. Selected bibliography&nbsp; 12</p>
<p>1.4.3. Websites&nbsp; 13</p>
<p>Chapter 2. Mobile Networks 15</p>
<p>2.1. Cellular network 16</p>
<p>2.1.1. Radio interface&nbsp; 17</p>
<p>2.1.2. Cell design 19</p>
<p>2.1.3. Traffic engineering&nbsp; 20</p>
<p>2.2. Principles of cellular network functionalities 21</p>
<p>2.3. 1G networks&nbsp; 23</p>
<p>2.4. 2G networks&nbsp; 23</p>
<p>2.5. 3G networks&nbsp; 25</p>
<p>2.6. 4G networks&nbsp; 27</p>
<p>2.7. 5G networks&nbsp; 29</p>
<p>2.8. Bibliography 30</p>
<p>Chapter 3. Long–Term Evolution&nbsp; 35</p>
<p>3.1. Relevant features of LTE 36</p>
<p>3.2. Network architecture and protocols 39</p>
<p>3.2.1. Architecture reference model&nbsp; 40</p>
<p>3.2.2. Functional description of a LTE network 41</p>
<p>3.2.3. System architecture evolution&nbsp; 44</p>
<p>3.2.4. Reference points 46</p>
<p>3.3. Control and user planes&nbsp; 48</p>
<p>3.3.1. User plane 48</p>
<p>3.3.2. GPRS tunneling protocol&nbsp; 50</p>
<p>3.3.3. Control plane 52</p>
<p>3.4. Multimedia broadcast and multicast service&nbsp; 53</p>
<p>3.5. Stream Control Transmission Protocol 54</p>
<p>3.6. Network discovery and selection&nbsp; 55</p>
<p>3.7. Radio resource management 56</p>
<p>3.8. Authentication and authorization&nbsp; 58</p>
<p>3.8.1. User authentication, key agreement and key generation&nbsp; 59</p>
<p>3.8.2. Signaling and user–plane security 61</p>
<p>3.9. Fundamentals of the MAC layer in LTE&nbsp; 61</p>
<p>3.9.1. Traffic classes and quality of service 61</p>
<p>3.9.2. Mobility&nbsp; 62</p>
<p>3.9.3. Resource scheduling algorithms&nbsp; 63</p>
<p>3.10. Fundamentals of the LTE physical layer 64</p>
<p>3.10.1. Slot and frame structure in LTE OFDMA&nbsp; 64</p>
<p>3.10.2. Reference signals&nbsp; 68</p>
<p>3.11. Conclusion69</p>
<p>3.12. Bibliography 70</p>
<p>3.12.1. Standards 70</p>
<p>3.12.2. Selected bibliography&nbsp; 70</p>
<p>Chapter 4. Long–Term Evolution Advanced&nbsp; 73</p>
<p>4.1. HetNet in LTE Advanced&nbsp; 75</p>
<p>4.2. Small cell concepts&nbsp; 77</p>
<p>4.2.1. Picocell&nbsp; 77</p>
<p>4.2.2. Femtocells 78</p>
<p>4.2.3. Relays 78</p>
<p>4.3. Femtocell and macrocell integration architecture&nbsp; 79</p>
<p>4.4. Picocell and macrocell integration architecture 80</p>
<p>4.5. Interference mitigation in heterogeneous networks 81</p>
<p>4.5.1. Interference mitigation in the context of two–tier macrofemtocells&nbsp; 82</p>
<p>4.5.2. Frequency spectral assignment&nbsp; 82</p>
<p>4.6. Interference mitigation in the context of two–tier macropicocells&nbsp; 83</p>
<p>4.7. Coordinated multi–point transmission/reception 84</p>
<p>4.8. Carrier aggregation&nbsp; 85</p>
<p>4.9. LTE Advanced evolution toward 5G 86</p>
<p>4.10. Bibliography 87</p>
<p>4.10.1. Standards&nbsp; 87</p>
<p>4.10.2. Selected bibliography 87</p>
<p>4.10.3. Websites 88</p>
<p>Chapter 5. 5G 89</p>
<p>5.1. From LTE Advanced to 5G: the big transition&nbsp; 90</p>
<p>5.1.1. D2D communication&nbsp; 91</p>
<p>5.1.2. Green activities saving energy 92</p>
<p>5.1.3. LTE WiFi integration for traffic offloading 92</p>
<p>5.1.4. Vehicular communication 93</p>
<p>5.2. Some characteristics envisioned for 5G&nbsp; 94</p>
<p>5.2.1. Massive capacity support&nbsp; 94</p>
<p>5.2.2. Ubiquitous communication support&nbsp; 94</p>
<p>5.2.3. Improvement in radio characteristics 94</p>
<p>5.3. 5G frequencies&nbsp; 95</p>
<p>5.4. High and low platforms 96</p>
<p>5.5. Cloud–RAN&nbsp; 98</p>
<p>5.6. Bibliography&nbsp; 101</p>
<p>5.6.1. Standard&nbsp; 101</p>
<p>5.6.2. Selected bibliography&nbsp; 101</p>
<p>5.6.3. Website&nbsp; 101</p>
<p>Chapter 6. Small Cells 103</p>
<p>6.1. Femtocell technology 105</p>
<p>6.2. LTE femtocell architecture&nbsp; 108</p>
<p>6.2.1. Home eNB or FAP&nbsp; 108</p>
<p>6.2.2. HeNB gateway or FAP–GW 109</p>
<p>6.2.3. HeNB management system or ACS&nbsp; 109</p>
<p>6.2.4. Security gateway 110</p>
<p>6.3. LTE femtocell deployment scenarios&nbsp; 110</p>
<p>6.4. Femtocell access control strategy&nbsp; 112</p>
<p>6.4.1. Closed subscriber group 112</p>
<p>6.4.2. Femtocell access control modes&nbsp; 113</p>
<p>6.4.3. Physical cell identity 113</p>
<p>6.5. LTE femtocell challenges and technical issues&nbsp; 114</p>
<p>6.5.1. Interference&nbsp; 114</p>
<p>6.5.2. Spectrum allocation&nbsp; 115</p>
<p>6.5.3. Access mode impact 117</p>
<p>6.6. Security and privacy challenges 117</p>
<p>6.7. Synchronization&nbsp; 120</p>
<p>6.8. Mobility 121</p>
<p>6.9. Passpoint&nbsp; 123</p>
<p>6.10. The backhaul network&nbsp; 126</p>
<p>6.11. Software radio and cognitive radio&nbsp; 128</p>
<p>6.12. Custom cells&nbsp; 129</p>
<p>6.13. Conclusion 130</p>
<p>6.14. Bibliography 131</p>
<p>6.14.1. Standards 131</p>
<p>6.14.2. Selected bibliography&nbsp; 131</p>
<p>6.14.3. Websites 133</p>
<p>Chapter 7. WPAN and WiGig 135</p>
<p>7.1. Wireless Personal Area Network&nbsp; 135</p>
<p>7.2. IEEE 802.15&nbsp; 136</p>
<p>7.3. Bluetooth&nbsp; 138</p>
<p>7.4. UWB 142</p>
<p>7.5. WiGig&nbsp; 147</p>
<p>7.6. WirelesssHD&nbsp; 150</p>
<p>7.7. Conclusion 151</p>
<p>7.8. Bibliography&nbsp; 151</p>
<p>Chapter 8. WLAN and WiFi 153</p>
<p>8.1. IEEE 802.11&nbsp; 154</p>
<p>8.2. WiFi architecture 156</p>
<p>8.2.1. Physical layer 156</p>
<p>8.2.2. Data link layer&nbsp; 157</p>
<p>8.2.3. Access techniques&nbsp; 158</p>
<p>8.2.4. The CSMA/CA protocol&nbsp; 159</p>
<p>8.2.5. Handovers 162</p>
<p>8.2.6. Security&nbsp; 163</p>
<p>8.2.7. Wired Equivalent Privacy 164</p>
<p>8.2.8. WPA and IEEE 802.11i 167</p>
<p>8.3. Security and authentication 168</p>
<p>8.3.1. Scalability and flexibility&nbsp; 168</p>
<p>8.3.2. IEEE 802.11i 170</p>
<p>8.3.3. Trading security policy 170</p>
<p>8.4. Saving energy 172</p>
<p>8.5. IEEE 802.11a, b and g&nbsp; 174</p>
<p>8.5.1. IEEE 802.11b 175</p>
<p>8.5.2. IEEE 802.11a 176</p>
<p>8.5.3. IEEE 802.11n 176</p>
<p>8.5.4. IEEE 802.11ac&nbsp; 179</p>
<p>8.5.5. IEEE 802.11ad&nbsp; 182</p>
<p>8.5.6. IEEE 802.11af&nbsp; 183</p>
<p>8.5.7. IEEE 802.11ah&nbsp; 185</p>
<p>8.6. Conclusion 187</p>
<p>8.7. Bibliography&nbsp; 188</p>
<p>Chapter 9. WMAN and WiMAX 191</p>
<p>9.1. Background on IEEE 802.16e 192</p>
<p>9.1.1. The medium access control layer 192</p>
<p>9.1.2. Channel access mechanism 193</p>
<p>9.1.3. Quality of service&nbsp; 194</p>
<p>9.1.4. Mobility support 195</p>
<p>9.2. The physical layer&nbsp; 195</p>
<p>9.2.1. Subchannelization in mobile WiMAX: OFDMA&nbsp; 195</p>
<p>9.2.2. Slot and frame structure in OFDMA–based mobile WiMAX 196</p>
<p>9.2.3. OFDMA slot structure in AMC permutation mode&nbsp; 198</p>
<p>9.3. An example of WiMAX and WiFi integration&nbsp; 200</p>
<p>9.3.1. QoS management 202</p>
<p>9.3.2. Qos support and classes 202</p>
<p>9.4. Mechanisms of channel access 203</p>
<p>9.4.1. WiFi access methods 204</p>
<p>9.4.2. Mobile WiMAX access method&nbsp; 205</p>
<p>9.4.3. Handover support 206</p>
<p>9.5. IEEE 802.16m or mesh for WiMAX&nbsp; 206</p>
<p>9.6. IEEE 802.16h or cognitive radio for WiMAX&nbsp; 207</p>
<p>9.6.1. Uncoordinated coexistence mechanism&nbsp; 208</p>
<p>9.6.2. Coordinated coexistence mechanism 209</p>
<p>9.7. Bibliography&nbsp; 210</p>
<p>9.7.1. Standards&nbsp; 210</p>
<p>9.7.2. Selected bibliography&nbsp; 210</p>
<p>Chapter 10. WRAN and Interconnection 213</p>
<p>10.1. IEEE 802.22&nbsp; 213</p>
<p>10.2. Interconnection between IEEE standards 216</p>
<p>10.2.1. IEEE 802.21 framework&nbsp; 217</p>
<p>10.2.2. IEEE 802.21 core architecture 218</p>
<p>10.3. Bibliography 220</p>
<p>10.3.1. Standards 220</p>
<p>10.3.2. Selected bibliography&nbsp; 220</p>
<p>Chapter 11. Internet of Things 223</p>
<p>11.1. Sensor networks 224</p>
<p>11.2. RFID&nbsp; 226</p>
<p>11.2.1. Using RFID&nbsp; 228</p>
<p>11.2.2. EPC global&nbsp; 229</p>
<p>11.2.3. RFID security&nbsp; 231</p>
<p>11.2.4. Mifare 231</p>
<p>11.3. Near–field communication 232</p>
<p>11.3.1. Mobile key&nbsp; 233</p>
<p>11.3.2. NFC payment&nbsp; 234</p>
<p>11.3.3. The Internet of Things in a medical environment 236</p>
<p>11.4. The Internet of Things in the home&nbsp; 237</p>
<p>11.5. Fog networking&nbsp; 238</p>
<p>11.6. Connection of things 240</p>
<p>11.6.1. Specific proprietary solution: SIGFOX example&nbsp; 241</p>
<p>11.6.2. LoRa 242</p>
<p>11.7. Conclusion&nbsp; 245</p>
<p>11.8. Bibliography 245</p>
<p>Chapter 12. Ad Hoc and Mesh Networks&nbsp; 247</p>
<p>12.1. Ad hoc networks 248</p>
<p>12.2. Routing&nbsp; 250</p>
<p>12.2.1. Ad hoc in the link layer&nbsp; 253</p>
<p>12.2.2. Ad hoc mode in WiFi 253</p>
<p>12.2.3. Bluetooth link layer&nbsp; 256</p>
<p>12.3. Ad hoc routing protocols&nbsp; 258</p>
<p>12.3.1. Reactive protocols 261</p>
<p>12.3.2. Ad hoc on–demand distance vector 261</p>
<p>12.3.3. Dynamic source routing&nbsp; 262</p>
<p>12.4. Proactive protocols 263</p>
<p>12.4.1. Optimized link state routing protocol&nbsp; 263</p>
<p>12.4.2. Topology dissemination based on reverse–path forwarding&nbsp; 264</p>
<p>12.5. Quality of service in ad hoc networks&nbsp; 265</p>
<p>12.6. Models for QoS in MANET&nbsp; 266</p>
<p>12.7. Mesh networks&nbsp; 270</p>
<p>12.8. VANET networks&nbsp; 273</p>
<p>12.9. Green PI: wearable Device2Device networks 274</p>
<p>12.9.1. Observation of traffic 276</p>
<p>12.9.2. Embedded Internet and 5G&nbsp; 277</p>
<p>12.9.3. Green PI: wearable and embedded Internet&nbsp; 278</p>
<p>12.9.4. Distributed TCP/IP 279</p>
<p>12.9.5. Wearable YOI&nbsp; 280</p>
<p>12.10. Bibligraphy 281</p>
<p>Chapter 13. Mobile–Edge Computing&nbsp; 283</p>
<p>13.1. Network virtualization 283</p>
<p>13.2. Network virtualization technology&nbsp; 285</p>
<p>13.2.1. Xen&nbsp; 286</p>
<p>13.2.2. OpenFlow&nbsp; 288</p>
<p>13.3. Using network virtualization 292</p>
<p>13.3.1. Isolation 293</p>
<p>13.3.2. Extensive network virtualization 294</p>
<p>13.3.3. The Cloud 296</p>
<p>13.4. Mobile–edge computing 298</p>
<p>13.4.1. Use case 1: active device location tracking 299</p>
<p>13.4.2. Use case 2: augmented reality content delivery&nbsp; 300</p>
<p>13.4.3. Use case 3: video analytics&nbsp; 301</p>
<p>13.4.4. Use case 4: RAN–aware content optimization 301</p>
<p>13.4.5. Use case 5: distributed content and DNS caching 302</p>
<p>13.4.6. Use case 6: application–aware performance optimization&nbsp; 302</p>
<p>13.4.7. MEC server placement 303</p>
<p>13.5. Conclusion 305</p>
<p>13.6. Bibliography 305</p>
<p>Conclusion 307</p>
<p>Index 309</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Mobile and Wireless Networks