Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

Google Book Preview
The Future of Wireless Networks: Architectures, Protocols, and Services
— —
Mohesen Guizani (Qatar University, Doha) Hsiao-Hwa Chen (National Cheng Kung University, Tainan City, Taiwan)
The Future of Wireless Networks: Architectures, Protocols, and Services by Mohesen Guizani (Qatar University, Doha) at Abbey's Bookshop,

The Future of Wireless Networks: Architectures, Protocols, and Services

Mohesen Guizani (Qatar University, Doha) Hsiao-Hwa Chen (National Cheng Kung University, Tainan City, Taiwan) Chonggang Wang (InterDigital Communications, King of Prussia, Pennsylvania, USA)


Apple Academic Press Inc.

WAP (wireless) technology;
WAP networking & applications


442 pages

We can order this in for you
How long will it take?
order qty:  
Add this item to my basket

The exponential increase in mobile device users and high-bandwidth applications has pushed the current 3G and 4G wireless networks to their capacity. Moreover, it is predicted that mobile data traffic will continue to grow by over 300 percent by 2017. To handle this spectacular growth, the development of improved wireless networks for the future has been of paramount importance. The Future of Wireless Networks: Architectures, Protocols, and Services discusses the future of wireless networks, including the emerging network architectures, underlying protocols, services, and applications.

The first part of the book focuses on new wireless network architectures that are being developed, such as mobile SDN, wireless local area networks (i.e., 802.11), and wireless sensor networks for the Smart Grid. In the second part of the book, the authors discuss the new protocols and enabling technologies for the different wireless network architectures. These include wireless MAC protocols, resource allocation in cognitive radio networks, multicast transmission, and femtocells, which provide enhanced indoor coverage and increased network capacity.

The book's final section discusses several new services and applications that are springing up, such as multisource selection for wireless peer-to-peer (P2P) networks and device-to-device (D2D) content sharing, which reduces duplicated downloads of the same contents on cellular links by offloading the traffic onto other networks. This section also covers the next generation of wireless security and privacy control techniques that service providers can use to ensure that their infrastructures and services are adequately protected against all kinds of threats.

Edited by:   Mohesen Guizani (Qatar University Doha), Hsiao-Hwa Chen (National Cheng Kung University, Tainan City, Taiwan), Chonggang Wang (InterDigital Communications, King of Prussia, Pennsylvania, USA)
Imprint:   Apple Academic Press Inc.
Country of Publication:   Canada
Volume:   21
Dimensions:   Height: 235mm,  Width: 156mm,  Spine: 30mm
Weight:   794g
ISBN:   9781482220940
ISBN 10:   1482220946
Series:   Wireless Networks and Mobile Communications
Pages:   442
Publication Date:   September 2015
Audience:   College/higher education ,  Professional and scholarly ,  Further / Higher Education ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active

FUTURE WIRELESS NETWORK ARCHITECTURE Future Cellular Network Architecture Ying Li, Aris Papasakellariou, and Charlie Zhang Introduction Today's Cellular Network Architecture Radio Access Network (RAN) Evolved Packet Core (EPC) Future Radio Access Networks UE's Heterogeneous Traffic to Heterogeneous eNBs Cloud-RAN Adaptive and Self-Organized RAN with Drop-and-Play SmallCells Future Evolved Core Network Mobile SDN Network Virtualization in EPC Conclusion References Advanced Technologies in Gigabit Wireless LANs: An In-Depth Overview of 802.11ac Michelle X. Gong, Eldad Perahia, Shiwen Mao, and Brian Hart Introduction 802.11ac Channelization 802.11ac PHY Design Channel Bonding and MAC Protection Simulation Study Downlink MU MIMO 802.11ac DL MU-MIMO Performance Analysis Simulation Study Conclusion References Future Wireless Sensor Networks for the Smart Grid Irfan Al-Anbagi, Melike Erol-Kantarci, and Hussein T. Mouftah Introduction Background The Analytical Model Star Topology Cluster-Tree Topology Priority and Delay-Aware Medium Access in WSNs DRX and FDRX Schemes Simulation and Analysis Star Topology Cluster-Tree Topology DRX and FDRX Performance Evaluation Case Study Concluding Remarks References PROTOCOLS AND ENABLING TECHNOLOGIES FOR FUTURE WIRELESS NETWORKS Cooperative Multiuser Networks Zhiguo Ding, Kanapathippillai Cumanan, Bayan Sharif, and Gui Yun Tian Introduction Notation Preliminaries Single Source-Destination with Multiple Relays Cooperative Protocols with Partial CSI Cooperative Protocol with Full CSI Cooperative Multiple Access Networks Protocol Based on Sources Cooperation A Relay-Assisted Cooperative Multiple Access Protocol Cooperative Broadcast Networks Cooperative Transmission Protocol without Direct S-D Links Cooperative Transmission Protocol with Direct S-D Links Network Coding for Cooperative Networks Network Coding for Multiple Access Channels Network Coding for Two-Way Relay Channels Summary References Base Station Joint Transmission with Limited Backhaul Data Transfer for Multicell Networks Jian Zhao, Tony Q. S. Quek, and Zhongding Lei Introduction System Model and Problem Formulation System Model Problem Formulation Reweighted 1-Norm Minimization-Based Method Iterative Link Removal-Based Method 2-Norm Relaxation of Joint Clustering and Beamforming Iterative Link Removal Implementation Issues Complexity Analysis Simulation Results Convergence Behavior Cellular Network Simulations Conclusion References Media Access Control Protocol in Wireless Networks IEEE 802.11 MAC Protocol MAC Architecture MAC Frame DCF IEEE 802.15 MAC Protocol IEEE 802.15.4 IEEE 802.15.4 MAC Protocol IEEE 802.15.6 MAC Protocol IEEE 802.16 MAC Protocol IEEE 802.22 MAC Protocol Introduction to IEEE 802.22 IEEE 802.22 MAC Protocol MAC Mechanisms in Literature Relay/Cooperative MAC Energy-Efficient MAC Cognitive MAC References Resource Allocation in Cognitive Radio Networks An Introduction of Cognitive Radio Networks The Definition of Cognitive Radio The Advantages and Challenges of Cognitive Radio Dynamic Resource Allocation in OFDM-Based CR Networks Resource Allocation for Spectral Efficiency General System Model of CR Networks Problem 1: Resource Allocation for CR System with Single SU Problem 2: Resource Allocation for Multiuser OFDM-Based Cognitive Radio Networks with Heterogeneous Services Problem 3: Resource Allocation for Heterogeneous Cognitive Radio Networks with Imperfect Spectrum Sensing Conclusion References Advanced Multicast Transmissions for Future Wireless Networks Yiqing Zhou, Hang Liu, Zhengang Pan, Lin Tian, and Jinling Shi Development of Multicast Services Recent Advances in Multicast Transmission Conventional Multicast Multicast Broadcast Single-Frequency Network Layered Multicast Reliable Multicast Based on Digital Fountain Coding Cooperative Multicast Spectral and Energy-Efficient Cooperative Multicast Optimized Two-Stage CM for High User Density MR Arrangement Based on Sector Ring Structures Relationship between PBS,C and N(i) Numerical Search for Optimal PBS,C Theoretical Estimation Performance Evaluation Discussions and Future Work References Mobility Management in Femtocell Networks Mahmoud H. Qutqut and Hossam S. Hassanein Introduction Femtocells What Are Femtocells? Brief History and Current Status Comparison between Femtocells and Other Coverage Solutions Benefits of Using FBSs for Users and Operators Femtocell Network Architecture and Functionalities Deployment Configurations Femtocell Challenges and Open Issues Mobility Management in Femtocell Networks Mobility Management in WBNs Femtocell Mobility Elements Access Control Paging Idle Mode, Cell Selection, and Cell Reselection Connected Mode and Handoff Mobility Management Issues Related Work Mobility Management Techniques Evaluation Criteria Proposed Mobility Management Schemes Conclusion and Open Issues References SERVICES AND APPLICATIONS IN FUTURE WIRELESS NETWORKS Multimedia Streaming over Mobile Networks Lin Xing, Wei Wang, Sunho Lim, Onyeka Ezenwoye, and Kun Hua Introduction Problem Statement Coordinative Multisource Distortion Analysis Quality-Driven Coordinative Multisource Selection Channel Coding Resource Allocation Revised Algorithm with Reduced Complexity Simulation Study, Numerical Results, and Discussion Summary References SNS-Based Mobile Traffic Offloading by Opportunistic Device-to-Device Sharing Xiaofei Wang and Victor C. M. Leung Introduction Related Work Opportunistic Sharing in DTNs/MSNs Mobile Traffic Offloading Information/Content Spreading in SNSs Details of TOSS Framework Preliminaries Mobility Impact in the Offline MSN Spreading Impact in the Online SNS Access Delays of Users System Optimization Trace-Driven Measurements Measurement of Mobility Impact, IM Measurement of Spreading Impact, IS Measurement of Access Delay, Ai(t) Performance Evaluation Mapping Schemes of Online SNSs and Offline MSNs Initial Pushing Strategies Satisfying 100, 90, and 80% of Users On-Demand Delivery Discussion of Practical Deployment Conclusion References Wireless Security Juan Chen and Xiaojiang Du Introduction Security in 4G Wireless System Security Objectives, Requirements, and Challenges Security Systems Possible Threats on 4G Security in Ad Hoc Networks Vulnerabilities of the Ad Hoc Networks Security Requirements to Ad Hoc Networks Attacks to Ad Hoc Networks Security Solutions to Ad Hoc Networks Challenges in Ad Hoc Networks Security in Wireless Sensor Networks Privacy Preservation in WSNs Security in Unattended Wireless Sensor Networks Security in Underwater Wireless Networks Security in Wireless Multimedia Sensor Networks Conclusion References Content Dissemination and Security in Device-to-Device (D2D) Communication Aiqing Zhang, Jianxin Chen, and Liang Zhou Introduction D2D Communication Technical Specifications Network Architecture Key Technologies of D2D Communication Content Dissemination System Architecture of Content Dissemination Content Dissemination Strategies Challenges and Open Issues Security in D2D Communication Threat Models Security Requirements Security Solutions Challenges and Open Issues Conclusions References

My Shopping Basket
Your cart does not contain any items.