Guizani / Chen / Wang | The Future of Wireless Networks | E-Book | sack.de
E-Book

E-Book, Englisch, 462 Seiten

Reihe: Wireless Networks and Mobile Communications

Guizani / Chen / Wang The Future of Wireless Networks

Architectures, Protocols, and Services
Erscheinungsjahr 2015
ISBN: 978-1-4822-2095-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

Architectures, Protocols, and Services

E-Book, Englisch, 462 Seiten

Reihe: Wireless Networks and Mobile Communications

ISBN: 978-1-4822-2095-7
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



The exponential increase in mobile device users and high-bandwidth applications has pushed the current 3G and 4G wireless networks to their capacity. Moreover, it is predicted that mobile data traffic will continue to grow by over 300 percent by 2017. To handle this spectacular growth, the development of improved wireless networks for the future has been of paramount importance. The Future of Wireless Networks: Architectures, Protocols, and Services discusses the future of wireless networks, including the emerging network architectures, underlying protocols, services, and applications.

The first part of the book focuses on new wireless network architectures that are being developed, such as mobile SDN, wireless local area networks (i.e., 802.11), and wireless sensor networks for the Smart Grid. In the second part of the book, the authors discuss the new protocols and enabling technologies for the different wireless network architectures. These include wireless MAC protocols, resource allocation in cognitive radio networks, multicast transmission, and femtocells, which provide enhanced indoor coverage and increased network capacity.

The book’s final section discusses several new services and applications that are springing up, such as multisource selection for wireless peer-to-peer (P2P) networks and device-to-device (D2D) content sharing, which reduces duplicated downloads of the same contents on cellular links by offloading the traffic onto other networks. This section also covers the next generation of wireless security and privacy control techniques that service providers can use to ensure that their infrastructures and services are adequately protected against all kinds of threats.

Guizani / Chen / Wang The Future of Wireless Networks jetzt bestellen!

Zielgruppe


Anyone interested in wireless networks and mobile communications at all levels, including undergraduates, postgraduates, educators, scientists, researchers, developers, engineers, innovators, and research strategists.

Weitere Infos & Material


FUTURE WIRELESS NETWORK ARCHITECTURE

Future Cellular Network Architecture
Ying Li, Aris Papasakellariou, and Charlie Zhang

Introduction
Today’s Cellular Network Architecture
Radio Access Network (RAN)
Evolved Packet Core (EPC)
Future Radio Access Networks
UE’s Heterogeneous Traffic to Heterogeneous eNBs
Cloud-RAN
Adaptive and Self-Organized RAN with Drop-and-Play SmallCells
Future Evolved Core Network
Mobile SDN
Network Virtualization in EPC
Conclusion
References

Advanced Technologies in Gigabit Wireless LANs: An In-Depth Overview of 802.11ac
Michelle X. Gong, Eldad Perahia, Shiwen Mao, and Brian Hart

Introduction
802.11ac Channelization
802.11ac PHY Design
Channel Bonding and MAC Protection
Simulation Study
Downlink MU MIMO
802.11ac DL MU-MIMO
Performance Analysis
Simulation Study
Conclusion
References

Future Wireless Sensor Networks for the Smart Grid
Irfan Al-Anbagi, Melike Erol-Kantarci, and Hussein T. Mouftah

Introduction
Background
The Analytical Model
Star Topology
Cluster-Tree Topology
Priority and Delay-Aware Medium Access in WSNs
DRX and FDRX Schemes
Simulation and Analysis
Star Topology
Cluster-Tree Topology
DRX and FDRX Performance Evaluation
Case Study
Concluding Remarks
References

PROTOCOLS AND ENABLING TECHNOLOGIES FOR FUTURE WIRELESS NETWORKS

Cooperative Multiuser Networks
Zhiguo Ding, Kanapathippillai Cumanan, Bayan Sharif, and Gui Yun Tian

Introduction
Notation
Preliminaries
Single Source-Destination with Multiple Relays
Cooperative Protocols with Partial CSI
Cooperative Protocol with Full CSI
Cooperative Multiple Access Networks
Protocol Based on Sources Cooperation
A Relay-Assisted Cooperative Multiple Access Protocol
Cooperative Broadcast Networks
Cooperative Transmission Protocol without Direct S-D Links
Cooperative Transmission Protocol with Direct S-D Links
Network Coding for Cooperative Networks
Network Coding for Multiple Access Channels
Network Coding for Two-Way Relay Channels
Summary
References

Base Station Joint Transmission with Limited Backhaul Data Transfer for Multicell Networks
Jian Zhao, Tony Q. S. Quek, and Zhongding Lei

Introduction
System Model and Problem Formulation
System Model
Problem Formulation
Reweighted l1-Norm Minimization-Based Method
Iterative Link Removal-Based Method
l2-Norm Relaxation of Joint Clustering and Beamforming
Iterative Link Removal
Implementation Issues
Complexity Analysis
Simulation Results
Convergence Behavior
Cellular Network Simulations
Conclusion
References

Media Access Control Protocol in Wireless Networks
IEEE 802.11 MAC Protocol
MAC Architecture
MAC Frame
DCF
IEEE 802.15 MAC Protocol
IEEE 802.15.4
IEEE 802.15.4 MAC Protocol
IEEE 802.15.6 MAC Protocol
IEEE 802.16 MAC Protocol
IEEE 802.22 MAC Protocol
Introduction to IEEE 802.22
IEEE 802.22 MAC Protocol
MAC Mechanisms in Literature
Relay/Cooperative MAC
Energy-Efficient MAC
Cognitive MAC
References
Resource Allocation in Cognitive Radio Networks
An Introduction of Cognitive Radio Networks
The Definition of Cognitive Radio
The Advantages and Challenges of Cognitive Radio
Dynamic Resource Allocation in OFDM-Based CR Networks
Resource Allocation for Spectral Efficiency
General System Model of CR Networks
Problem 1: Resource Allocation for CR System with Single SU
Problem 2: Resource Allocation for Multiuser OFDM-Based Cognitive Radio Networks with Heterogeneous Services
Problem 3: Resource Allocation for Heterogeneous Cognitive Radio Networks with Imperfect Spectrum Sensing
Conclusion
References

Advanced Multicast Transmissions for Future Wireless Networks
Yiqing Zhou, Hang Liu, Zhengang Pan, Lin Tian, and Jinling Shi

Development of Multicast Services
Recent Advances in Multicast Transmission
Conventional Multicast
Multicast Broadcast Single-Frequency Network
Layered Multicast
Reliable Multicast Based on Digital Fountain Coding
Cooperative Multicast
Spectral and Energy-Efficient Cooperative Multicast
Optimized Two-Stage CM for High User Density
MR Arrangement Based on Sector Ring Structures
Relationship between PBS,C and N(i)
Numerical Search for Optimal PBS,C
Theoretical Estimation
Performance Evaluation
Discussions and Future Work
References

Mobility Management in Femtocell Networks
Mahmoud H. Qutqut and Hossam S. Hassanein

Introduction
Femtocells
What Are Femtocells?
Brief History and Current Status
Comparison between Femtocells and Other Coverage Solutions
Benefits of Using FBSs for Users and Operators
Femtocell Network Architecture and Functionalities
Deployment Configurations
Femtocell Challenges and Open Issues
Mobility Management in Femtocell Networks
Mobility Management in WBNs
Femtocell Mobility Elements
Access Control
Paging
Idle Mode, Cell Selection, and Cell Reselection
Connected Mode and Handoff
Mobility Management Issues
Related Work
Mobility Management Techniques
Evaluation Criteria
Proposed Mobility Management Schemes
Conclusion and Open Issues
References

SERVICES AND APPLICATIONS IN FUTURE WIRELESS NETWORKS

Multimedia Streaming over Mobile Networks
Lin Xing, Wei Wang, Sunho Lim, Onyeka Ezenwoye, and Kun Hua

Introduction
Problem Statement
Coordinative Multisource Distortion Analysis
Quality-Driven Coordinative Multisource Selection
Channel Coding Resource Allocation
Revised Algorithm with Reduced Complexity
Simulation Study, Numerical Results, and Discussion
Summary
References

SNS-Based Mobile Traffic Offloading by Opportunistic Device-to-Device Sharing
Xiaofei Wang and Victor C. M. Leung

Introduction
Related Work
Opportunistic Sharing in DTNs/MSNs
Mobile Traffic Offloading
Information/Content Spreading in SNSs
Details of TOSS Framework
Preliminaries
Mobility Impact in the Offline MSN
Spreading Impact in the Online SNS
Access Delays of Users
System Optimization
Trace-Driven Measurements
Measurement of Mobility Impact, IM
Measurement of Spreading Impact, IS
Measurement of Access Delay, Ai(t)
Performance Evaluation
Mapping Schemes of Online SNSs and Offline MSNs
Initial Pushing Strategies
Satisfying 100, 90, and 80% of Users
On-Demand Delivery
Discussion of Practical Deployment
Conclusion
References

Wireless Security
Juan Chen and Xiaojiang Du

Introduction
Security in 4G Wireless System
Security Objectives, Requirements, and Challenges
Security Systems
Possible Threats on 4G
Security in Ad Hoc Networks
Vulnerabilities of the Ad Hoc Networks
Security Requirements to Ad Hoc Networks
Attacks to Ad Hoc Networks
Security Solutions to Ad Hoc Networks
Challenges in Ad Hoc Networks
Security in Wireless Sensor Networks
Privacy Preservation in WSNs
Security in Unattended Wireless Sensor Networks
Security in Underwater Wireless Networks
Security in Wireless Multimedia Sensor Networks
Conclusion
References

Content Dissemination and Security in Device-to-Device (D2D) Communication
Aiqing Zhang, Jianxin Chen, and Liang Zhou

Introduction
D2D Communication Technical Specifications
Network Architecture
Key Technologies of D2D Communication
Content Dissemination
System Architecture of Content Dissemination
Content Dissemination Strategies
Challenges and Open Issues
Security in D2D Communication
Threat Models
Security Requirements
Security Solutions
Challenges and Open Issues
Conclusions
References



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.