ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Emerging Technologies in Wireless LANs: Theory, Design, and Deployment (Cambridge Concise Histories)

دانلود کتاب فن آوری های نوظهور در شبکه های بی سیم: نظریه ، طراحی و استقرار (تاریخچه مختصر کمبریج)

Emerging Technologies in Wireless LANs: Theory, Design, and Deployment (Cambridge Concise Histories)

مشخصات کتاب

Emerging Technologies in Wireless LANs: Theory, Design, and Deployment (Cambridge Concise Histories)

دسته بندی: تاریخ
ویرایش: 1 
نویسندگان:   
سری:  
ISBN (شابک) : 0521895847, 9780511371059 
ناشر:  
سال نشر: 2007 
تعداد صفحات: 897 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 17 مگابایت 

قیمت کتاب (تومان) : 44,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 18


در صورت تبدیل فایل کتاب Emerging Technologies in Wireless LANs: Theory, Design, and Deployment (Cambridge Concise Histories) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فن آوری های نوظهور در شبکه های بی سیم: نظریه ، طراحی و استقرار (تاریخچه مختصر کمبریج) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب فن آوری های نوظهور در شبکه های بی سیم: نظریه ، طراحی و استقرار (تاریخچه مختصر کمبریج)

ملاحظات عملی کلیدی را برای استقرار شبکه های محلی بی سیم و درک کاملی از فناوری های نوظهور ارائه می دهد.


توضیحاتی درمورد کتاب به خارجی

Provides the key practical considerations for deploying wireless LANs and a solid understanding of the emerging technologies.



فهرست مطالب

Half-title......Page 3
Title......Page 5
Copyright......Page 6
Contents......Page 7
Authorship by Chapter......Page 31
Foreword......Page 35
Organization of the Book......Page 37
Part III: 802.11 Security......Page 38
Part V: 802.11 Mesh Networks......Page 39
Part VI: 802.11/Cellular Interworking......Page 40
Part X: 802.11 Hardware Design......Page 41
Part XIII: Ultra WideBand (UWB)......Page 42
Part XIV: Public Wireless Broadband......Page 43
1.1 IEEE 802.11n: Enhancements for Higher Throughput......Page 45
1.1.1.3 Beam Forming......Page 46
1.1.1.5 Other 802.11n PHY Features......Page 47
1.1.2.1 High Throughput Support......Page 48
1.2 IEEE 802.11k: Radio Resource Measurement......Page 50
1.3 802.11p: Wireless Access for the Vehicular Environment......Page 51
1.5 802.11s: Wireless Mesh Networks......Page 52
1.6 802.11T: Wireless Performance Prediction......Page 53
1.8 802.11v: Wireless Network Management......Page 54
1.10 802.11y: Contention Based Protocol......Page 55
Disclaimer......Page 56
2.2 Overview of Wireless LANs......Page 57
2.2.1.1 802.11n......Page 58
2.2.2 WLAN Regulation......Page 59
2.2.3 Wireless LAN Topologies......Page 60
2.2.4 Establishing a Wireless Connection......Page 61
2.2.4.3 Association, Disassociation, and Reassociation......Page 62
2.2.5.1 Concepts of Secure Communications......Page 63
2.2.5.2 Confidentiality and Encryption......Page 64
2.2.6 Collision Avoidance and Media Access......Page 66
2.2.7.1 Radio frequencies and channels......Page 68
2.2.7.2 Signal and Noise Measurement......Page 70
2.2.7.3 Encoding and data rates......Page 71
2.2.8.1 Data Packet Structure......Page 72
2.3 Wireless Network Analysis......Page 73
2.3.1 Planning and designing a WLAN......Page 74
2.3.1.2 Initial deployment......Page 75
2.3.2.2 Managing Users......Page 76
2.3.3.1 Securing the WLAN......Page 78
2.3.4 Troubleshooting - Analyzing Higher Level Network Protocols......Page 79
2.3.4.1 Leveraging Existing Assets with AP Capture Adapters......Page 81
Appendix: Wireless Terms......Page 82
3.1 Introduction......Page 83
3.1.1 Terminology and Abbreviations......Page 84
3.2 Channel Access......Page 85
3.2.1.2 Legacy Polled Channel Access......Page 86
3.2.2 802.11e Contention-Based Channel Access......Page 87
3.2.2.1 TCMA MAC Protocol......Page 89
3.2.3 802.11e Polled Channel Access......Page 90
3.2.4 Illustrative Examples......Page 92
3.3 Admission Control......Page 93
3.3.1 Admission Control for Contention-Based Channel Access......Page 94
3.4 Power Management......Page 95
3.4.1 Legacy Power-Save Mechanism......Page 96
3.4.2.1 Scheduled APSD......Page 97
3.4.2.2 Full Unscheduled APSD......Page 98
3.4.2.3 Hybrid Unscheduled APSD......Page 99
3.4.3 Illustrative Examples......Page 100
3.5 QoS in Wireless Mesh Networks......Page 101
3.7 Endnote......Page 103
3.8 References......Page 105
4.1 Introduction......Page 107
4.2 IEEE 802.11 MAC Protocol......Page 108
4.2.1 DCF Overhead......Page 111
4.3.1 The Concept of Saturation Throughput......Page 113
4.3.2 Maximum Saturation Throughput......Page 115
4.3.2.1 Performance Bounds for 802.11b DCF......Page 118
4.3.3 Saturation Throughput Analysis......Page 120
4.3.3.1 Throughput Performance......Page 124
4.3.3.2 Delay Performance......Page 126
4.3.4 Non-Ideal Channel Conditions......Page 128
4.4 MAC Enhancements for QoS Support......Page 130
4.5 Performance Understanding of IEEE 802.11e EDCA......Page 133
4.5.3.1 Backoff Counter Decrement Rules......Page 139
4.5.3.2 Analysis of AC_BE Default Settings......Page 142
4.5.3.3 AIFSN=2 and Legacy DCF Stations......Page 143
4.6 Conclusions......Page 144
4.7 References......Page 145
5.1 Introduction......Page 149
5.2 Proposed Integrated Cross-Layer Video Streaming......Page 151
5.2.1 Wireless Multi-hop Mesh Topology Specification......Page 153
5.2.2 Link and Path Parameter Specification......Page 154
5.2.3 Application and Network-layer Parameter Specification......Page 155
5.3 Problem Formulation......Page 156
5.4.1 End-to-End Optimization......Page 158
5.5 Complexity and Information Requirements of the Different Alternatives......Page 163
5.6 Experimental Results......Page 165
5.7 Further Reading......Page 168
5.8 Conclusions......Page 169
5.9 Appendix – Derivation of (9)......Page 170
5.10 References......Page 171
6.1 Overview......Page 175
6.3 Understanding Wi-Fi Protected Access (WPA)......Page 176
6.3.1 WPA TKIP......Page 177
6.3.3 WPA Cracking Tools......Page 178
6.4 The Way Forward: Wi-Fi Protected Access 2 (WPA2) and 802.11i......Page 179
6.4.3 Failover Requirements......Page 180
6.5.1 WPA2 and 802.1X......Page 181
6.5.3 WPA2 and CCMP......Page 183
6.5.4.1 PMK Caching......Page 184
6.6 Opportunistic PMK Caching: Fast Roaming at Its Fastest......Page 185
6.7 Summary......Page 187
7.1 Introduction......Page 189
7.2 Current Application Solutions......Page 190
7.3.1 The TKIP Per-Packet Hash Function......Page 191
7.3.2 TKIP Temporal Key Derivation......Page 192
7.3.4 AES Based Encryption and Data Authentication......Page 193
7.5 Authentication......Page 194
7.5.1 802.1X EAP Authentication......Page 195
7.5.3 EAP-TTLS......Page 196
7.6.1 Security-related changes in the TGn High Throughput Amendment......Page 197
7.6.3 Security in the TGs Mesh Amendment......Page 198
7.7.1 Exploiting Wireless Device Drivers......Page 201
7.7.2 Discovering Driver Vulnerabilities......Page 203
7.7.3 Exploiting Driver Vulnerabilities......Page 207
7.7.4 Mitigating Driver Vulnerabilities......Page 208
7.8.1 Deployment Models......Page 210
7.8.1.2 WIDS Integrated Deployment Model......Page 211
7.8.2.1 Signature Analysis......Page 212
7.8.2.2 Trend Analysis......Page 213
7.8.2.3 Anomaly Analysis......Page 215
7.8.3 Upper-Layer Analysis Mechanisms......Page 216
7.8.4 Wireless Countermeasures......Page 217
7.8.4.1 Adversary Denial of Service......Page 218
7.9 References......Page 219
Acknowledgments......Page 221
8.1 Introduction......Page 223
8.2 IEEE 802.11n......Page 224
8.3 Preambles......Page 225
8.4 802.11n Transmitter......Page 229
8.5 LDPC Coding......Page 230
8.6 Space Time Block Coding......Page 231
8.8 MAC Enhancements......Page 232
8.10 MIMO-OFDM Performance Results......Page 233
8.12 References......Page 236
9.2 MIMO OFDM System Overview......Page 237
9.3 Spatial Spreading......Page 240
9.4.1 Eigenvector Beamforming......Page 241
9.4.2 Channel Sounding and Calibration......Page 242
9.5.1 Near-Optimal Iterative Receiver......Page 245
9.5.3 Linear Receivers......Page 247
9.6 Comparison of Spatial Spreading and Transmit Beamforming......Page 248
9.6.1 Simulation Setup......Page 249
9.6.3 Packet Error Rate Performance......Page 250
9.7 Complexity Analysis......Page 253
9.7.3 LSD Search......Page 255
9.7.6 Viterbi Decoding......Page 256
9.7.7 Examples......Page 257
9.8 Conclusions......Page 258
9.9 References......Page 259
10.1 Introduction......Page 261
10.3 Single-radio Shared Wireless Mesh......Page 263
10.4 Dual-radio Shared Wireless Mesh......Page 267
10.5 Multi-Radio Switched Wireless Mesh......Page 269
10.6 Conclusion......Page 273
10.7.1.1.1 Lower bound......Page 274
10.7.1.2.1 Lower bound......Page 275
10.7.2.1 Single-radio......Page 276
10.7.2.2.1 Lower bound......Page 277
10.7.3 Full mesh on rectilinear grid......Page 278
10.7.3.2.1 Lower bound......Page 280
10.7.3.3 Multi-Radio......Page 281
11.1 Introduction......Page 283
11.2 Evolution of mobile mesh networks......Page 284
11.3.1 Mobile Mesh Networks for Public Safety Services......Page 286
11.3.2 Disaster Relief Operations......Page 287
11.3.5 Logistics......Page 288
11.3.8 Video Surveillance......Page 289
11.4.2 Performance Metrics for Mobile Ad hoc Networks......Page 290
11.5. Design Challenges for Mobile Mesh Networks......Page 291
11.5.2 Medium and Mesh Network Access......Page 293
11.5.3 Routing and Multicasting......Page 294
11.5.4 Security......Page 295
11.5.5 IP addressing......Page 296
11.5.6 Roaming......Page 297
11.5.8 Quality of Service (QoS)......Page 298
11.5.9 Network Management......Page 299
11.7 References......Page 301
12.1 Introduction......Page 305
12.2 Wireless Mesh Networks......Page 306
12.3 Service Offerings......Page 307
12.3.2 Free Internet Access (Registered)......Page 309
12.3.4 Differentiated-Rate Fee-based Public Access......Page 311
12.5 Wireless Spectrum Preservation......Page 313
12.6 Public Safety......Page 315
12.7 Video Surveillance......Page 316
12.8 Mobile Government Users......Page 317
12.9 Virtual Private Networks (VPNs)......Page 318
12.11 Meter Reading......Page 319
12.13 Dedicated Internet Access......Page 320
12.15 Conclusion......Page 322
13.1 Introduction......Page 325
13.2 Wireless Broadband Initiatives......Page 326
13.3 Network Use Cases and Performance Requirements......Page 327
13.4 Multi-Tier Network Design Overview......Page 329
13.5 Wi-Fi Tier Design......Page 334
13.6 Mesh Tier Design......Page 337
13.7 Injection Tier Design......Page 341
13.8 Network-wide Seamless Mobility Support......Page 342
13.9 Conclusion......Page 346
13.10 References......Page 347
14.1 MetroMesh Network Architecture......Page 351
14.2.3 RF spectrum management......Page 353
14.2.6 Dynamic rate-limiting and traffic management......Page 354
14.3.1 Client Usage......Page 355
14.3.3 Mesh Network Performance......Page 356
14.5 Summary......Page 358
14.6 References......Page 359
15.2 Three Generations of Mesh Architectures......Page 361
15.4 Latency/Jitter Degradation on Single Channel Backhauls......Page 363
15.5 Frequency Agility through Distributed Intelligence......Page 366
15.6 Radio Agnostic Mesh......Page 368
15.7 New Applications Enabled by Third Generation Wireless Mesh......Page 370
15.8 Conclusions......Page 371
16.1.1 History......Page 373
16.1.3 Some Typical Deployment Scenarios......Page 374
16.2.1 Network Structure......Page 376
16.2.3 Medium Access Contention......Page 377
16.2.4 Mesh Routing and Forwarding......Page 378
16.2.5 Mesh Security......Page 380
16.2.6 Congestion Control......Page 382
16.2.9 Voice over Mesh......Page 383
16.3 Mesh Deployment Issues......Page 385
16.4.1 Overview......Page 386
16.4.3 Mesh Discovery......Page 387
16.4.5 Mesh Security......Page 388
16.4.7 Routing and Metrics......Page 389
16.4.9 Interworking......Page 391
16.5 Conclusion......Page 392
Disclaimer......Page 393
17 WLAN Interworking with 2G/3G Systems......Page 395
17.1 Introduction......Page 396
17.2.1 3GPP2......Page 397
17.2.2 3GPP......Page 398
17.3 WLAN Interworking Plumbing......Page 401
17.3.1 WLAN Association......Page 404
17.3.1.4 Access Point Sets Definition......Page 406
17.3.1.6 Scan Types......Page 407
17.3.1.8 RSSI Filtering......Page 409
17.3.1.10 Active Set Selection......Page 410
17.3.2 WLAN De-Selection......Page 411
17.3.2.2. IP Address Assignment......Page 412
17.3.4 Tunnel establishment procedures......Page 413
17.3.4.2 Error Scenario 2: IPSec Tunnel Establishment H-AAA authentication failure......Page 419
17.3.5 UDP Encapsulation to Support NAT Traversal......Page 420
17.3.7 Rekeying Procedures......Page 422
17.3.7.1 Rekeying of IKE_SA......Page 423
17.3.7.2 Rekeying of CHILD_SA......Page 424
17.3.8.1 MS-initiated tunnel disconnection......Page 425
17.3.8.2 PDIF-initiated tunnel disconnection......Page 426
17.3.8.3 H-AAA-initiated tunnel disconnection......Page 427
17.3.9 Application specific Child SA support......Page 428
17.3.11 Voice call establishment procedures......Page 429
17.3.11.1 Voice call establishment procedures for the packet-switched domain......Page 430
17.3.12 Supporting mobility without the VCC feature......Page 431
17.3.12.1 Solutions supporting mobility......Page 432
17.3.13 Voice Call Continuity......Page 441
17.3.14.1 IMS Registration in the IP-CAN domain......Page 445
17.3.14.2 Circuit-Switched Registration in the CS domain......Page 446
17.3.15 Active Call Handoff......Page 449
17.4 Mobility between the 2G/3G and WLAN domains......Page 456
17.4.1 MS Operational Modes......Page 458
17.4.1.1 Activation modes......Page 459
17.4.1.2 WLAN Operating Modes......Page 460
17.4.2.1 GSM/GPRS/EDGE......Page 461
17.4.4.1 Entry Criteria......Page 462
17.5 MS is paged over the non-preferred domain......Page 463
17.6 Conclusion......Page 464
17.7 References......Page 465
17.8 Appendix A: NAT Types......Page 466
17.9 Appendix B: Single and Dual Subscription......Page 467
17.9.2 Single Subscription......Page 468
17.9.2.2 Two private identities......Page 469
17.10 Glossary......Page 470
18.1 Introduction......Page 473
18.2 Related Work......Page 474
18.3.1 Solution Space......Page 475
18.3.2 Mobility Security Association Bootstrapping......Page 477
18.3.3 Performance Optimization......Page 478
18.4 Evaluation......Page 479
18.4.1 Results......Page 480
18.6 References......Page 482
19.1 Introduction......Page 485
19.2.1 Loose Coupling Architecture......Page 486
19.2.2 Tight Coupling Architecture......Page 488
19.2.3 Hybrid Coupling Architecture......Page 489
19.2.4 IMS Architecture for 3GPP/3GPP2-WLAN Interworking......Page 490
19.3.1.1 Model Assumptions......Page 492
19.3.1.3 Traffic Equations in the Cellular Network......Page 493
19.3.1.4 Traffic Equations in the WLAN......Page 494
19.3.1.5 Performance Measures......Page 495
19.3.2.1 Model Assumptions......Page 496
19.3.2.2 Performance Measures......Page 497
19.4.1 WLAN Capacity......Page 498
19.4.2.2 A Cell Residence Time Model for Two-Tier Integrated Wireless Networks......Page 500
19.4.3 Models with General Distributions......Page 502
19.4.3.1 Traffic Equations of Handoff Rates......Page 503
19.4.3.2 Channel Holding Times......Page 505
19.5 Simulation Models......Page 506
19.6 Open Issues......Page 507
19.7 Conclusions......Page 508
19.8 References......Page 509
20.2 Overview of Unlicensed Frequency Bands......Page 513
20.2.1 ISM and U-NII Frequency Bands......Page 514
20.2.2 The 3650 MHz Frequency Band......Page 516
20.2.3 VHF and UHF Television Frequency Bands......Page 517
20.3.1 Wireless Local Area Network (WLAN)......Page 518
20.3.2 Wireless Personal Area Network (WPAN)......Page 520
20.3.3 Wireless Metropolitan Area Network (WMAN)......Page 521
20.3.4 Wireless Regional Area Network (WRAN)......Page 522
20.4 History of Unlicensed Wireless Coexistence......Page 523
20.5 How to Evaluate the Coexistence of Wireless Networks......Page 524
20.6 Methods of Improving Coexistence......Page 530
20.7 Coexistence Assessment – IEEE 802.15.4b......Page 532
20.8 Coexistence Assessment – Draft IEEE 802.11n......Page 533
20.9 Dynamic Spectrum Access......Page 535
20.10 Conclusions......Page 542
20.11 References......Page 543
21.1 Introduction......Page 545
21.2 Geometric Analysis......Page 546
21.3 Temporal Analysis......Page 551
21.4 Combined Geometric and Temporal Analysis......Page 556
21.6 Conclusion......Page 558
21.7 References......Page 559
22.1 Introduction......Page 561
22.2 802.11k Measurements......Page 562
22.2.2 Measurement Pilot......Page 563
22.2.8 Measurement Pause......Page 564
22.3 The 11k Interface to Upper Layers......Page 565
22.4 Impact of the 11k Standard......Page 566
23.1 Introduction......Page 567
23.2 Evolution of the Cognitive WLAN......Page 569
23.2.1 WLAN Architecture – Independent APs......Page 570
23.2.2 WLAN Architecture – Dependent APs......Page 571
23.3.1 Cognitive WLAN Goals......Page 573
22.3.2.2 RF Analysis......Page 575
22.3.2.3 Integrity Management......Page 576
23.5 The Vision for the Future......Page 577
24.2 Defining Range and Coverage......Page 579
24.3 Range Basics......Page 580
24.4 Antenna Design......Page 581
24.6.1 Interference......Page 583
24.6.2 Multipath......Page 584
24.6.3 Attenuation......Page 585
24.6.4 Hidden Node......Page 586
24.7 Signal to Noise Ratio (SNR)......Page 587
24.8 Range versus Capacity......Page 588
24.9 Site Surveys and Dead Spots......Page 590
24.10 Future Technologies......Page 591
24.11 Long Range Wi-Fi Case Study......Page 593
24.12 Summary......Page 594
25.1 Introduction......Page 595
25.2 Architecture......Page 596
25.3.1 Receiver......Page 597
25.3.2 Transmitter......Page 598
25.3.3 Synthesizer......Page 600
25.4.2 Noise isolation......Page 601
25.5 Experimental Results......Page 602
25.7 References......Page 605
26.1 Introduction......Page 607
26.1.1 Source of Radiation......Page 608
26.1.2.1 Conductor Area......Page 609
26.1.2.3 Radiation Efficiency......Page 610
26.1.3.1 Chu-Harrington Limit on Q......Page 611
26.1.3.2 Fundamental Gain Limitation......Page 612
26.1.3.4 Q-Volume Space......Page 613
26.1.3.5 Q-Volume Space: Example Antennas......Page 614
26.1.4 WLAN/WWAN Antenna Requirements......Page 615
26.1.4.2 Antenna Location Selection......Page 616
26.1.4.3 Example Gain and Radiation Patterns......Page 617
26.2 Power Statistics of Small Scale Fading in Rayleigh Radio Channels......Page 620
26.3 Diversity Architectures......Page 622
26.4 Rician Channel Power Statistics......Page 625
26.4.1 Diversity Gain of Omni-Antennas in Rician Channels......Page 627
26.4.2 Diversity Gains of Multiple Antennas under Rician Fading......Page 629
26.6 References......Page 630
27.2.1 Overview of Commercial Hotspots......Page 633
27.2.2 Overview of Free Hotspots......Page 634
27.2.4 Advantages of Wi-Fi......Page 635
27.3.1 Hotspot Service Management......Page 636
27.3.3 Network and Data Management Services......Page 637
27.3.5 Obtaining a Host Address......Page 638
27.3.6.1 Authentication......Page 639
27.3.7 User Login Page......Page 640
27.4.1 Per User QoS......Page 641
27.4.2.2 Price Plan......Page 642
27.4.5 Customer Care......Page 643
27.5.1 Centralized Control over Services for Wi-Fi Networks......Page 644
27.5.3 Additional revenue generation opportunities......Page 646
27.5.4 Session Intercepts and “HotLining”......Page 648
27.7 Security in Wi-Fi......Page 649
27.8.2 Managed Services Platform......Page 650
27.9 Summary......Page 651
28.1 Introduction......Page 653
28.2 Access Control......Page 655
28.3.1 Trends in Wi-Fi Enabled Devices......Page 658
28.3.2 Trends Multi-Purpose Access......Page 659
28.4 Architecture......Page 660
28.5 Trends in Municipal Wi-Fi......Page 661
28.7 Trends in WiMax......Page 662
28.8.1 Phishing......Page 663
28.8.3 Worms and Viruses......Page 664
28.8.5 Port Isolation......Page 665
28.8.7 DMCA......Page 666
28.8.8 “Whack a mole”......Page 667
28.10 References......Page 668
29.1 Retail Service Offerings......Page 669
29.1.3 Subscriptions......Page 670
29.2.1 Neutral Host Overview......Page 671
29.2.4 Smart Client Roaming “Standards” – WISPr and GIS......Page 672
29.3.2 Laptops......Page 673
29.3.4 Dual-Mode Mobile Phones and Wi-Fi VoIP Phones......Page 674
29.3.5 Other Mobile Devices (cameras, MP3 players, gaming consoles)......Page 675
30.1 Introduction......Page 677
30.2.1 Sensor Network Specific Radios and Standards......Page 678
30.2.2 Radio Range and Network Scalability......Page 679
30.3 802.11 Ad-hoc Mode: An Enabler for Sensor Networks......Page 681
30.4 802.11 Power Usage Suitability for Sensor Networks......Page 684
30.5 A WLAN for a Field of Sonobuoys......Page 685
30.5.1 The Requirements of the NEASW WLAN......Page 687
30.5.2 Radio Range on the Ocean Surface......Page 688
30.5.3 Inter-Buoy Communication Throughput......Page 690
30.5.4 Buoy Energy Availability......Page 692
30.5.5 NEASW Hardware and Software System......Page 693
30.5.6 NEASW Mobile Adhoc Network (MANET)......Page 694
30.5.7 NEASW Disruption Tolerant Transport Mechanism......Page 695
30.5.8 NEASW WLAN Demonstration and Results......Page 697
30.7 References......Page 700
31.2 Benefits of Tracking......Page 705
31.3.1 A Review of RFID/RTLS Development......Page 706
31.3.5 How RTLS works?......Page 707
31.4.1 The angle of arrival approach (AOA)......Page 708
31.5.2 The Cell ID approach......Page 709
31.5.4 Ekahau Estimation Technology......Page 710
31.5.6 Ekahau Rail Tracking™......Page 711
31.5.8 Configuring Access Points......Page 712
31.5.10 Associating with the Host Network......Page 713
31.6 Conclusion......Page 714
32.1 Introduction......Page 715
32.2.2 Mobile users behave fundamentally different from Desktop users......Page 716
32.2.3 Mobile devices are not Laptops......Page 717
32.2.5 Mobile services to have a different life cycle then desktop services......Page 718
32.3.1 Foundation features......Page 719
32.4 Scientific theories vs. practical implementations......Page 721
32.5 Context-aware Over-the-Air Service Provisioning (OTA)......Page 722
32.6 Context-aware Over-the-Air Service Synchronization......Page 725
32.7.2 Context aware Voice over IP......Page 726
32.8.1 Network Configuration......Page 727
32.9.1 Stockholm Metro......Page 729
32.9.1.1 The Solution......Page 730
32.9.1.2 The impact......Page 731
32.9.2.2 A Context-Aware Wireless Emergency Response Solution......Page 733
32.9.2.3 The Value of Context......Page 734
32.9.3.3 The Value of Context......Page 735
32.9.4.1 Operational and Productivity Gains using Context......Page 736
32.10 References......Page 737
33 Experiments Using Small Unmanned Aircraft to Augment a Mobile Ad Hoc Network......Page 739
33.1 Introduction......Page 740
33.2 AUGNet Architecture......Page 742
33.2.1 The Mesh Network Node (MNN)......Page 743
33.2.2 The Test-Bed Monitoring Agent......Page 744
33.2.3 The Ares UA......Page 745
33.3 Test Bed Experiment Plan......Page 746
33.4.1 Experiment 1.1, Fixed Ground Nodes......Page 749
33.4.3 Experiment 1.3, Fixed Ground Nodes with UA......Page 750
33.5.3 Experiment 2.3, Disconnected Groups......Page 751
33.6.2 Experiment 3.2, UA-Ground Range......Page 752
33.7 Experimentation Results......Page 753
33.7.1 Communication Range......Page 754
33.7.2 Throughput......Page 755
33.7.4 Congestion......Page 756
33.7.5 Connectivity......Page 757
33.7.6 Subjective Tests......Page 758
33.9 References......Page 759
34.1 Introduction......Page 763
34.2 Regulators Weigh in on UWB......Page 764
34.2.1 Summary of US Rules on UWB......Page 765
34.2.3 Summary of the EC Decision on UWB......Page 766
34.2.4 UWB Definitions......Page 768
34.3 UWB Radio Technologies......Page 769
34.3.1 Continuous-pulse UWB Technology......Page 770
34.3.2 CWaveTM UWB Technology......Page 772
34.3.3 IEEE P802.15.4a UWB Technology......Page 774
34.3.4 Direct Sequence UWB......Page 775
34.3.5 TM-UWB Technology......Page 776
34.3.7 A Multi-band Approach to UWB......Page 777
34.3.8 TRD-UWB Technology......Page 778
34.4.1 UWB Wavelet Radiation......Page 779
34.4.2 Radiation of a UWB Elementary Dipole and Loop......Page 780
34.5 Propagation of UWB Signals......Page 782
34.5.3 An In-Room Ray Tracing Model......Page 783
34.6 Recovering UWB Impulse Energy......Page 785
34.8 UWB Applications and Target Markets......Page 786
34.8.3 Low-Rate Communications and High-Precision Location and Tracking......Page 787
About the Authors......Page 788
34.10 References......Page 789
35.1 Introduction......Page 793
35.2.1 The Increasing Need for Higher Date Rates......Page 794
35.2.2 Applications areas......Page 795
35.3.2 From Interference Perspective......Page 796
35.4 Overview of the WiMedia 1.0 MAC......Page 797
35.5.2 Band Hopping and Time Frequency Codes (TFCs)......Page 798
35.5.3 WiMedia OFDM Parameters and Sub-carrier Allocation Scheme......Page 800
35.5.4 PLCP Layer......Page 801
35.5.4.1 PLCP Preamble......Page 802
35.5.4.3 Encoding of PSDU......Page 803
35.5.4.4 Dual Carrier Modulation (DCM)......Page 804
35.5.4.5 Frequency Domain and Time Domain Spreading......Page 805
35.6.1 Top-level Structure......Page 806
35.6.2.2 Auto-correlation......Page 807
35.6.2.3 Hierarchical Delayed-correlation......Page 808
35.6.2.4 Hierarchical Cross-Correlation (H-Xcorr)......Page 809
35.6.2.5 Second-stage Correlator......Page 810
35.6.2.6 Burst Detection......Page 811
35.6.2.8 Timing (Optimum Start of the FFT Window)......Page 814
35.6.5 Common-Phase Error Estimation and Tracking......Page 815
35.6.7.1 Channel Estimation for Different TFCs......Page 816
35.6.8 In-band Interference Mitigation......Page 818
35.6.9 Improved Channel Estimation and Noise Variance Estimation......Page 822
35.6.9.2 Generating the reference header symbols from the Viterbi decoder output (iterative decoding)......Page 824
35.6.10 Multiple Antenna Receiver......Page 825
35.7.1 Higher-order Constellation......Page 826
35.7.4 Brute-force approach......Page 827
35.8.1 60 GHz......Page 828
About the authors......Page 829
35.9 References......Page 830
Foreword: A World Without Wires......Page 833
Unplugged and Recharged......Page 834
36.1.1 What is in it for local authorities?......Page 835
36.2 The council worker and the resident......Page 836
36.3 The business traveller and the mobile worker......Page 838
36.4 Wi-Fi changing the profile of gaming......Page 840
36.6 The Wi-Fi tourist – Giving your area a competitive edge......Page 841
36.7 Wi-Fi art thou Romeo? – The Bard goes broadband......Page 842
36.8 The application challenge......Page 843
36.8.2 Creating an agile infrastructure......Page 844
36.8.5 Examples of applications......Page 845
36.9.2 When is the right time for me to roll out a wireless network?......Page 846
36.9.6 Are there any public health issues with wireless networks?......Page 847
36.9.7 How can local authorities avoid restricting competition?......Page 848
37.1 Introduction......Page 849
37.2 Mobilizing traditional and emerging media, communications and commerce business models......Page 850
37.3 Role of licensed and unlicensed technologies for the mobilization of the Internet......Page 851
37.3.1 WiFi-mesh and ad hoc networking......Page 854
37.3.2 WiFi is an anchor point for Fixed Mobile Convergence......Page 855
37.3.4 Municipal WiFi networks - more than a real estate play!......Page 857
37.4 Regulatory challenges for convergence and 4G......Page 858
37.5 The Emergence of Mobile WiMAX......Page 859
37.5.1 Integration of WiMAX and WiFi......Page 860
37.6.1 Smart antennas......Page 862
37.6.2 Cognitive Radio Technologies......Page 863
37.7 Conclusion......Page 865
38.1 Introduction......Page 867
38.2 What is Public Ownership?......Page 868
38.3.1 That Was Then......Page 869
38.3.2 This is Now......Page 870
38.4 Why Public Ownership?......Page 872
38.5 Broadband Access and Competition: Truth and Fiction......Page 881
38.6 Evaluating “Public-Private Partnerships” and Other Private Business Models......Page 882
38.7 The Dollars and Sense of Public Ownership......Page 884
38.7.1 Risk......Page 886
38.7.2 A Note About Municipal “'Failures”......Page 888
Epilogue......Page 891
Index......Page 893




نظرات کاربران