Powell / Shim | Wireless Technology | E-Book | www2.sack.de
E-Book

E-Book, Englisch, Band 44, 260 Seiten

Reihe: Lecture Notes in Electrical Engineering

Powell / Shim Wireless Technology

Applications, Management, and Security
1. Auflage 2009
ISBN: 978-0-387-71787-6
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Applications, Management, and Security

E-Book, Englisch, Band 44, 260 Seiten

Reihe: Lecture Notes in Electrical Engineering

ISBN: 978-0-387-71787-6
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.

Powell / Shim Wireless Technology jetzt bestellen!

Weitere Infos & Material


1;Lecture Notes in Electrical Engineering;2
2;Preface;5
3;Contents;10
4;Contributors;12
5;Optimized Seed Node Locations for Infrastructure Wireless Mesh Networks;15
5.1;1 Introduction;15
5.2;2 The Seed Node Placement Problem;17
5.2.1;2.1 Network Model;17
5.3;3 Optimization;19
5.3.1;3.1 NSGA-II;21
5.3.2;3.2 Objective Functions;21
5.4;4 Experimental Results;22
5.4.1;4.1 Data Sets;22
5.4.2;4.2 Results;23
5.4.2.1;4.2.1 Parameter Tuning;23
5.4.2.2;4.2.2 Subscription probability;25
5.5;5 Conclusions and Future Directions;30
6;References;33
7;Use of Non-monotonic Utility in Multi-Attribute Network Selection;34
7.1;1 Introduction;34
7.1.1;1.1 Selection of MADM Algorithm;35
7.1.1.1;1.1.1 Accuracy of the Results Obtained from an Algorithm;36
7.1.1.2;1.1.2 Appropriateness of Applying the Algorithm to the Problem;36
7.1.2;1.2 Types of QoS Profiles;37
7.1.2.1;1.2.1 Service-Based QoS Profile;37
7.1.2.2;1.2.2 Subscription-Based QoS Profile;37
7.2;2 Use of Non-monotonic Utilities for Attributes in Network Selection;38
7.3;3 Comparison of MADM Algorithms for Use with Non-monotonic Utilities of Attributes;40
7.3.1;3.1 TOPSIS;40
7.3.2;3.2 ELECTRE;40
7.3.3;3.3 GRA;40
7.4;4 Theory of Gray Relational Space;42
7.5;5 Application of GRA Adapted to Network Selection with Non-monotonic Utility;42
7.6;6 Evaluation of Using Non-monotonic Utilities in a Heterogeneous Wireless Network Environment;45
7.6.1;6.1 Setting up GRA for Network Selection;46
7.6.1.1;6.1.1 Determine Reference Attribute Values for Different Service or User Categories;46
7.6.1.2;6.1.2 Determine Attribute Weights for Different Service or User Categories;46
7.7;7 Conclusion;51
8;References;52
9;RFID Indoor Tracking System Based on Inter-Tags Distance Measurements;53
9.1;1 Introduction;53
9.2;2 Indoor Propagation Model for Far-Field Passive RFID System;56
9.2.1;2.1 Backscattered Free-Space Link Budget;56
9.2.2;2.2 Indoor Large-Scale Propagation Model;57
9.3;3 The Proposed Algorithm;58
9.3.1;3.1 Inter-tags Distance Measurement Algorithm;58
9.3.2;3.2 Probabilistic RFID Map Generation;62
9.3.3;3.3 Adaptive Kalman Filtering;63
9.3.3.1;3.3.1 Motion Model;63
9.3.3.2;3.3.2 The Observation Model;64
9.4;4 Simulations and Evaluation;65
9.4.1;4.1 System Model Setup;66
9.4.2;4.2 Probabilistic RFID Map;67
9.4.3;4.3 Localization Performance Evaluation;67
9.4.4;4.4 Tracking Performance;69
9.5;5 Conclusions;72
10;References;73
11;Adaptive Virtual Queue Random Early Detectionin Satellite Networks;75
11.1;1 Introduction;75
11.2;2 Overview of PEP PEP ;77
11.3;3 Overview of AQM Methods;78
11.3.1;3.1 RED RED RED ;78
11.3.2;3.2 AVQ;79
11.4;4 Problems;80
11.4.1;4.1 Asynchronous Queuing Behavior;81
11.4.2;4.2 Global Synchronization;81
11.5;5 Solution;81
11.5.1;5.1 Asynchronous Queuing Behavior;83
11.5.2;5.2 Global Synchronization;83
11.6;6 Emulation Framework;83
11.6.1;6.1 Evaluation Methodologies;85
11.6.2;6.2 Parameter Settings;85
11.7;7 Emulation Results;86
11.7.1;7.1 Link Utilization;86
11.7.2;7.2 Queue Size;87
11.7.3;7.3 Packet Drop;89
11.8;8 Mathematical Model;90
11.9;9 Conclusion and Future Work;92
12;References;93
13;News Corporation: Facing the Wireless World of the 21st Century;95
13.1;1 Introduction;95
13.2;2 News Corporation Worldwide Wireless Interests;96
13.3;3 Satellite TV and Satellite Mobile TV;97
13.4;4 Sports and Entertainment: Fuelling the Wireless ontent;98
13.5;5 The Management of the Wireless Omnipresence to Consumers;99
13.6;6 The Global Media Marketplace and Wireless for News Corp;100
13.7;7 News Corporations Contribution to Secure Wireless Delivery;100
13.8;8 Conclusions;101
14;References;101
15;Delay Effect on Conversational Quality in TelecommunicationNetworks: Do We Mind?;103
15.1;1 Introduction;103
15.1.1;1.1 Delay in Modern Telecommunication Networks;104
15.1.2;1.2 Conversational Tests Versus Listening-only Tests;104
15.1.3;1.3 Conversational Interactivity Versus Delay Annoyance -- Test Scenarios;105
15.2;2 Performed Tests;106
15.3;3 Test Results;107
15.4;4 Discussion;107
15.5;5 Test Conditions with Talker Echo;108
15.6;6 Conclusion;109
16;References;110
17;Performance Evaluation of EVRC-Encoded Voice Traffic over CDMA EVDO Rev. A;111
17.1;1 Introduction;111
17.2;2 Main Thrust of the Chapter;112
17.2.1;2.1 EVRC-Encoded Voice Traffic;113
17.2.2;2.2 The Evaluation Methodology;115
17.2.3;2.3 Performance Evaluation;117
17.3;3 Future Trends;124
17.4;4 Conclusion;124
18;Reference;125
19;Efficient Structures for PLLs Loop Filter Design in FPGAs in High-Datarate Wireless Receivers Theory and Case Study;126
19.1;1 Introduction;126
19.2;2 Receiver Model;127
19.3;3 The Equivalent Linearized Hybrid or Digital PLL Model;128
19.4;4 The Analog PLL model a Starting Point;129
19.4.1;4.1 The Analog PLL Loop Filter;130
19.4.2;4.2 The VCO Transfer Function;130
19.4.3;4.3 The Open and Closed-Loop Transfer Functions;130
19.5;5 Digital Loop Filter Calculation and Basic Topology;131
19.6;6 Improvement of Topology Through Pipelining;132
19.7;7 Exact Implementational Parameters A Case Study;133
19.7.1;7.1 Binary Format;134
19.7.2;7.2 Coefficient Quantization;134
19.7.3;7.3 Input Quantization;134
19.7.4;7.4 Overflow Considerations;134
19.7.5;7.5 Detailed Implementational Diagram;136
19.8;8 Improvement of Logic Resource Utilization via Innovative Multiplier Implementation;136
19.8.1;8.1 The Basic Idea;137
19.8.2;8.2 State Machine Algorithm and Implementation;138
19.8.2.1;8.2.1 State Machine Algorithm for the Multiplier;138
19.8.2.2;8.2.2 Calculation of the Required State Machine Clock Rate;140
19.8.3;8.3 The Importance of the Pipeline Register;141
19.8.4;8.4 Triggering of the State Machine;141
19.9;9 Quantitative Logic Resource Savings Results;141
19.10;10 Conclusions;142
20;References;143
21;Finite Automata for Evaluating Testbed Resource Contention;144
21.1;1 Introduction;144
21.2;2 Main Thrust of the Chapter;145
21.2.1;2.1 Problem Formulation;146
21.2.2;2.2 Contribution;148
21.2.2.1;2.2.1 Review of Literature;149
21.2.2.2;2.2.2 Methodology;150
21.2.3;2.3 Experimental Results;151
21.2.4;2.4 Implementation;153
21.2.5;2.5 Future Trends;154
21.2.6;2.6 Biography;155
22;Reference;155
23;Performance Analysis of Interference for OFDM Systems;156
23.1;1 Introduction;156
23.2;2 OFDM System and Channel Model;157
23.3;3 The Effects of Various Interference for OFDM Systems;158
23.3.1;3.1 BNI Under AWGN;158
23.3.2;3.2 BNI Under Rayleigh Fading Channel with AWGN;159
23.3.3;3.3 PBI Under AWGN;160
23.3.4;3.4 PBI Under Rayleigh Fading Channel with AWGN;161
23.3.5;3.5 MTI Under AWGN;162
23.3.6;3.6 MTI Under Rayleigh Fading Channel with AWGN;165
23.4;4 Simulation Results and Analysis;166
23.5;5 Conclusion;168
24;References;170
25;Maximum-Likelihood Carrier-Frequency Synchronizationand Channel Estimation for MIMO-OFDM Systems;172
25.1;1 Introduction;172
25.2;2 MIMO-OFDM Signal Model in the Presence of CFO;174
25.3;3 Frequency Offset and Channel Estimation;176
25.3.1;3.1 Conventional: ML Estimation of CFO;177
25.3.2;3.2 Proposal: ML Estimation of CFO and CIR;178
25.4;4 Performance Analysis;181
25.5;5 Simulation Results;182
25.6;6 Conclusions and Future Work;185
26;References;186
27;Wireless Communication Systems from the Perspectiveof Implantable Sensor Networks for Neural Signal Monitoring;188
27.1;1 Introduction;188
27.2;2 Neural Signal Processing;190
27.2.1;2.1 Neural Signals;190
27.2.2;2.2 Neural Signal Compression;192
27.2.3;2.3 Compression Results;195
27.3;3 Wireless Transmission;197
27.3.1;3.1 Bluetooth Wireless Transmission;197
27.3.1.1;3.1.1 Java Standard API for Bluetooth: JSR-82;199
27.3.2;3.2 Transmission Over 3G;199
27.3.3;3.3 Transmission Results;200
27.4;4 Neural Signal Post-processing;202
27.4.1;4.1 Decoding and Signal Reconstruction;203
27.4.2;4.2 Classification;203
27.4.3;4.3 Classification Results;205
27.5;5 Conclusions and Future Trends;208
28;References;210
29;The Modified Max-Log-MAP Turbo Decoding Algorithmby Extrinsic Information Scaling for Wireless Applications;213
29.1;1 Introduction;213
29.1.1;1.1 Turbo Encoder;214
29.1.2;1.2 Turbo Decoder;215
29.1.3;1.3 The MAP Algorithm;216
29.1.4;1.4 The Log-MAP Algorithm;217
29.1.5;1.5 The Max-Log-MAP Algorithm;218
29.2;2 Extrinsic Information Scaling;218
29.2.1;2.1 Simulation Results;218
29.3;3 Trends and Applications of Turbo Codes;219
29.4;4 Conclusions;222
30;References;222
31;Getting Network Simulation Basics Right A Note on Seed Setting Effects for the ns-2 Random Number Generator;224
31.1;1 Introduction;224
31.2;2 The ns-2 Random Number Generator;226
31.2.1;2.1 Theoretical Background;227
31.2.2;2.2 General Effects;228
31.3;3 Practical Effects on Network Simulation;229
31.3.1;3.1 Scenario 1: Wired Topology;231
31.3.2;3.2 Scenario 2: Wireless Multi-Hop Topology;232
31.4;4 Getting it Right;234
31.5;5 Conclusion;236
32;References;237
33;Topology-Based Routing for Xmesh in Wireless Sensor Networks;238
33.1;1 Introduction;238
33.2;2 Routing for Cayley Graphs;239
33.2.1;2.1 Cayley Graph Overview;240
33.2.2;2.2 Shortest Path Algorithm for Cayley Graph;241
33.3;3 Topology-Based Routing with Xmesh;241
33.3.1;3.1 Introduction to Xmesh;242
33.3.2;3.2 Topology-Based Routing with Xmesh;243
33.4;4 Simulation Results and Analysis;243
33.4.1;4.1 Power TOSSIM;243
33.4.2;4.2 Simulation and Results;243
33.4.3;4.3 Power Consumption Analysis;244
33.5;5 Conclusions;247
34;References;247
35;Modeling Cell Placement and Coverage for Heterogeneous3G Services;249
35.1;1 Introduction;249
35.2;2 Evaluating Coverage in CDMA-Based Networks;251
35.2.1;2.1 Downlink Model;252
35.2.2;2.2 Test Point Coverage and Cell Load;253
35.2.3;2.3 Algorithmic Approach;254
35.2.4;2.4 Complexity;255
35.3;3 Demonstration of Evaluation;255
35.3.1;3.1 Test Problems;255
35.3.2;3.2 Algorithm Behaviour;256
35.3.3;3.3 Services Requested and User Coverage;258
35.3.4;3.4 Effect of Priorities for Admission and User Coverage;258
35.3.5;3.5 Services Requested and Load;259
35.3.6;3.6 Summary;259
35.4;4 Future Trends;262
35.5;5 Conclusions;263
36;References;263
37;Index;265



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.