Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Wireless Technology (eBook)

Applications, Management, and Security

Steven Powell, J.P. Shim (Herausgeber)

eBook Download: PDF
2009 | 2009
XVI, 260 Seiten
Springer US (Verlag)
978-0-387-71787-6 (ISBN)

Lese- und Medienproben

Wireless Technology -
Systemvoraussetzungen
149,79 inkl. MwSt
(CHF 146,30)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.
Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.

Lecture Notes in Electrical Engineering 2
Preface 5
Contents 10
Contributors 12
Optimized Seed Node Locations for Infrastructure Wireless Mesh Networks 15
1 Introduction 15
2 The Seed Node Placement Problem 17
2.1 Network Model 17
3 Optimization 19
3.1 NSGA-II 21
3.2 Objective Functions 21
4 Experimental Results 22
4.1 Data Sets 22
4.2 Results 23
4.2.1 Parameter Tuning 23
4.2.2 Subscription probability 25
5 Conclusions and Future Directions 30
References 33
Use of Non-monotonic Utility in Multi-Attribute Network Selection 34
1 Introduction 34
1.1 Selection of MADM Algorithm 35
1.1.1 Accuracy of the Results Obtained from an Algorithm 36
1.1.2 Appropriateness of Applying the Algorithm to the Problem 36
1.2 Types of QoS Profiles 37
1.2.1 Service-Based QoS Profile 37
1.2.2 Subscription-Based QoS Profile 37
2 Use of Non-monotonic Utilities for Attributes in Network Selection 38
3 Comparison of MADM Algorithms for Use with Non-monotonic Utilities of Attributes 40
3.1 TOPSIS 40
3.2 ELECTRE 40
3.3 GRA 40
4 Theory of Gray Relational Space 42
5 Application of GRA Adapted to Network Selection with Non-monotonic Utility 42
6 Evaluation of Using Non-monotonic Utilities in a Heterogeneous Wireless Network Environment 45
6.1 Setting up GRA for Network Selection 46
6.1.1 Determine Reference Attribute Values for Different Service or User Categories 46
6.1.2 Determine Attribute Weights for Different Service or User Categories 46
7 Conclusion 51
References 52
RFID Indoor Tracking System Based on Inter-Tags Distance Measurements 53
1 Introduction 53
2 Indoor Propagation Model for Far-Field Passive RFID System 56
2.1 Backscattered Free-Space Link Budget 56
2.2 Indoor Large-Scale Propagation Model 57
3 The Proposed Algorithm 58
3.1 Inter-tags Distance Measurement Algorithm 58
3.2 Probabilistic RFID Map Generation 62
3.3 Adaptive Kalman Filtering 63
3.3.1 Motion Model 63
3.3.2 The Observation Model 64
4 Simulations and Evaluation 65
4.1 System Model Setup 66
4.2 Probabilistic RFID Map 67
4.3 Localization Performance Evaluation 67
4.4 Tracking Performance 69
5 Conclusions 72
References 73
Adaptive Virtual Queue Random Early Detectionin Satellite Networks 75
1 Introduction 75
2 Overview of PEP PEP 77
3 Overview of AQM Methods 78
3.1 RED RED RED 78
3.2 AVQ 79
4 Problems 80
4.1 Asynchronous Queuing Behavior 81
4.2 Global Synchronization 81
5 Solution 81
5.1 Asynchronous Queuing Behavior 83
5.2 Global Synchronization 83
6 Emulation Framework 83
6.1 Evaluation Methodologies 85
6.2 Parameter Settings 85
7 Emulation Results 86
7.1 Link Utilization 86
7.2 Queue Size 87
7.3 Packet Drop 89
8 Mathematical Model 90
9 Conclusion and Future Work 92
References 93
News Corporation: Facing the Wireless World of the 21st Century 95
1 Introduction 95
2 News Corporation Worldwide Wireless Interests 96
3 Satellite TV and Satellite Mobile TV 97
4 Sports and Entertainment: Fuelling the Wireless ontent 98
5 The Management of the Wireless Omnipresence to Consumers 99
6 The Global Media Marketplace and Wireless for News Corp 100
7 News Corporations Contribution to Secure Wireless Delivery 100
8 Conclusions 101
References 101
Delay Effect on Conversational Quality in TelecommunicationNetworks: Do We Mind? 103
1 Introduction 103
1.1 Delay in Modern Telecommunication Networks 104
1.2 Conversational Tests Versus Listening-only Tests 104
1.3 Conversational Interactivity Versus Delay Annoyance -- Test Scenarios 105
2 Performed Tests 106
3 Test Results 107
4 Discussion 107
5 Test Conditions with Talker Echo 108
6 Conclusion 109
References 110
Performance Evaluation of EVRC-Encoded Voice Traffic over CDMA EVDO Rev. A 111
1 Introduction 111
2 Main Thrust of the Chapter 112
2.1 EVRC-Encoded Voice Traffic 113
2.2 The Evaluation Methodology 115
2.3 Performance Evaluation 117
3 Future Trends 124
4 Conclusion 124
Reference 125
Efficient Structures for PLLs Loop Filter Design in FPGAs in High-Datarate Wireless Receivers Theory and Case Study 126
1 Introduction 126
2 Receiver Model 127
3 The Equivalent Linearized Hybrid or Digital PLL Model 128
4 The Analog PLL model a Starting Point 129
4.1 The Analog PLL Loop Filter 130
4.2 The VCO Transfer Function 130
4.3 The Open and Closed-Loop Transfer Functions 130
5 Digital Loop Filter Calculation and Basic Topology 131
6 Improvement of Topology Through Pipelining 132
7 Exact Implementational Parameters A Case Study 133
7.1 Binary Format 134
7.2 Coefficient Quantization 134
7.3 Input Quantization 134
7.4 Overflow Considerations 134
7.5 Detailed Implementational Diagram 136
8 Improvement of Logic Resource Utilization via Innovative Multiplier Implementation 136
8.1 The Basic Idea 137
8.2 State Machine Algorithm and Implementation 138
8.2.1 State Machine Algorithm for the Multiplier 138
8.2.2 Calculation of the Required State Machine Clock Rate 140
8.3 The Importance of the Pipeline Register 141
8.4 Triggering of the State Machine 141
9 Quantitative Logic Resource Savings Results 141
10 Conclusions 142
References 143
Finite Automata for Evaluating Testbed Resource Contention 144
1 Introduction 144
2 Main Thrust of the Chapter 145
2.1 Problem Formulation 146
2.2 Contribution 148
2.2.1 Review of Literature 149
2.2.2 Methodology 150
2.3 Experimental Results 151
2.4 Implementation 153
2.5 Future Trends 154
2.6 Biography 155
Reference 155
Performance Analysis of Interference for OFDM Systems 156
1 Introduction 156
2 OFDM System and Channel Model 157
3 The Effects of Various Interference for OFDM Systems 158
3.1 BNI Under AWGN 158
3.2 BNI Under Rayleigh Fading Channel with AWGN 159
3.3 PBI Under AWGN 160
3.4 PBI Under Rayleigh Fading Channel with AWGN 161
3.5 MTI Under AWGN 162
3.6 MTI Under Rayleigh Fading Channel with AWGN 165
4 Simulation Results and Analysis 166
5 Conclusion 168
References 170
Maximum-Likelihood Carrier-Frequency Synchronizationand Channel Estimation for MIMO-OFDM Systems 172
1 Introduction 172
2 MIMO-OFDM Signal Model in the Presence of CFO 174
3 Frequency Offset and Channel Estimation 176
3.1 Conventional: ML Estimation of CFO 177
3.2 Proposal: ML Estimation of CFO and CIR 178
4 Performance Analysis 181
5 Simulation Results 182
6 Conclusions and Future Work 185
References 186
Wireless Communication Systems from the Perspectiveof Implantable Sensor Networks for Neural Signal Monitoring 188
1 Introduction 188
2 Neural Signal Processing 190
2.1 Neural Signals 190
2.2 Neural Signal Compression 192
2.3 Compression Results 195
3 Wireless Transmission 197
3.1 Bluetooth Wireless Transmission 197
3.1.1 Java Standard API for Bluetooth: JSR-82 199
3.2 Transmission Over 3G 199
3.3 Transmission Results 200
4 Neural Signal Post-processing 202
4.1 Decoding and Signal Reconstruction 203
4.2 Classification 203
4.3 Classification Results 205
5 Conclusions and Future Trends 208
References 210
The Modified Max-Log-MAP Turbo Decoding Algorithmby Extrinsic Information Scaling for Wireless Applications 213
1 Introduction 213
1.1 Turbo Encoder 214
1.2 Turbo Decoder 215
1.3 The MAP Algorithm 216
1.4 The Log-MAP Algorithm 217
1.5 The Max-Log-MAP Algorithm 218
2 Extrinsic Information Scaling 218
2.1 Simulation Results 218
3 Trends and Applications of Turbo Codes 219
4 Conclusions 222
References 222
Getting Network Simulation Basics Right A Note on Seed Setting Effects for the ns-2 Random Number Generator 224
1 Introduction 224
2 The ns-2 Random Number Generator 226
2.1 Theoretical Background 227
2.2 General Effects 228
3 Practical Effects on Network Simulation 229
3.1 Scenario 1: Wired Topology 231
3.2 Scenario 2: Wireless Multi-Hop Topology 232
4 Getting it Right 234
5 Conclusion 236
References 237
Topology-Based Routing for Xmesh in Wireless Sensor Networks 238
1 Introduction 238
2 Routing for Cayley Graphs 239
2.1 Cayley Graph Overview 240
2.2 Shortest Path Algorithm for Cayley Graph 241
3 Topology-Based Routing with Xmesh 241
3.1 Introduction to Xmesh 242
3.2 Topology-Based Routing with Xmesh 243
4 Simulation Results and Analysis 243
4.1 Power TOSSIM 243
4.2 Simulation and Results 243
4.3 Power Consumption Analysis 244
5 Conclusions 247
References 247
Modeling Cell Placement and Coverage for Heterogeneous3G Services 249
1 Introduction 249
2 Evaluating Coverage in CDMA-Based Networks 251
2.1 Downlink Model 252
2.2 Test Point Coverage and Cell Load 253
2.3 Algorithmic Approach 254
2.4 Complexity 255
3 Demonstration of Evaluation 255
3.1 Test Problems 255
3.2 Algorithm Behaviour 256
3.3 Services Requested and User Coverage 258
3.4 Effect of Priorities for Admission and User Coverage 258
3.5 Services Requested and Load 259
3.6 Summary 259
4 Future Trends 262
5 Conclusions 263
References 263
Index 265

Erscheint lt. Verlag 11.8.2009
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XVI, 260 p.
Verlagsort New York
Sprache englisch
Themenwelt Mathematik / Informatik Informatik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Wirtschaft Betriebswirtschaft / Management Wirtschaftsinformatik
Schlagworte code division multiple access • Interference • Long-Term-Evolution • MIMO • Orthogonal frequency-division multiplexing • Radio-Frequency Identification (RFID) • RFID • sensor networks • wireless Internet • Wireless Network Modeling • wireless sensor network • Wireless technology
ISBN-10 0-387-71787-0 / 0387717870
ISBN-13 978-0-387-71787-6 / 9780387717876
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 8,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Einsatz und Management von Public Cloud Services

von Stefan Brassel; Andreas Gadatsch

eBook Download (2023)
Springer Vieweg (Verlag)
CHF 14,65
Wie Sie Daten für die Steuerung von Unternehmen nutzen

von Mischa Seiter

eBook Download (2023)
Vahlen (Verlag)
CHF 38,95
Wie Sie Daten für die Steuerung von Unternehmen nutzen

von Mischa Seiter

eBook Download (2023)
Vahlen (Verlag)
CHF 38,95