Page 1

Page 5

Page 7

Visit us at to view more information and Page 8

Page 6

complete tables of contents for these and many other related books.

Sign up for email alerts. Page 9

Page 11

Stay up to date on our latest resources. Want to maximize your buying power? Order directly from our online store and

Receive FREE Standard Shipping with every order, big or small.

MBTEL30 MC_3.2.10rd

Explore the Cutting Edge in Telecommunications New! Coming Soon!

Underwater Acoustic Sensor Networks Yang Xiao The University of Alabama, Tuscaloosa, USA

Investigating the fundamental aspects of underwater acoustic communications, this volume discusses architectures for two and three-dimensional sensor networks. Prominent sensor network researchers discuss the key challenges with the development of underwater networking solutions and provide an effective cross-layer approach to the integration of communication functionalities. Underwater Acoustic Sensor Networks introduces a realistic acoustic model characterized by channel utilization efficiency that enables proper setting of the optimal packet size for underwater communications. Covering the wide range of topics relating to underwater acoustic sensor networks (UW-ASNs), this book reviews efficient distributed routing algorithms for delay-insensitive and delay-sensitive applications. It also: • Presents a novel distributed MAC protocol developed for UW-ASNs • Highlights the differences between terrestrial and underwater sensor networks • Investigates the topology control problem for sparse and dense 3D sensor networks • Examines optimal clustering in UW-ASNs

Contents: Research Challenges and Clustering. Optimal Clustering for Underwater Acoustic Sensor Networks. Topology Control and Routing. Topology Control of Three-Dimensional Underwater WSNs. Multipath Virtual Sink Architecture. Fault Tolerance and Time Synchronization. A Survey of Fault Tolerance in Ad-hoc Networks and Sensor Networks. Time Synchronization. Medium Access Control. MAC Protocol Design for Underwater Networks. Dynamic TDMA and MACA BASED Protocols for Distributed Topology. Medium Access Control Layer. Software, Hardware, and Channel Modeling. HW/SW Co-design of a Low-cost Underwater Sensor Node with Intelligent, Secure Acoustic Communication Capabilities. Channel Modeling. Catalog no. AU6711, May 2010, c. 352 pp., ISBN: 978-1-4200-6711-8, $89.95 / £57.99

Orthogonal Frequency Division Multiple Access Fundamentals and Applications Edited by

Tao Jiang Huazhong University of Science and Technology, Hubei, China

Lingyang Song Peking University, Beijing, China

Yan Zhang Simula Research Laboratory, Lysaker, Norway

Due to its many advantages, Orthogonal Frequency Division Multiple Access (OFDMA) is one of the most promising access technologies for wireless networks. It is currently employed in a number of international standards and is the candidate access method for the IEEE 802.22 "Wireless Regional Area Networks". This volume explains the foundations and applications in OFDMA, while also serving as a reference for those working with other multiuser communications systems. It provides an accessible introduction to all the key techniques and their applications in OFDMA system—presenting basics as well as exploring critical design issues. The authors point out open problems, detail possible solutions, and supply time-tested insight that will help readers understand OFDMA in a macro manner, while providing a systematic manual for those whose work is related directly to OFDMA projects.

Contents: Radio Channel Modeling. Nonlinearity Analysis. Game Theoretical Approaches for Resource Allocation. Spectrum Efficiency. Resource Allocation and Scheduling in IEEE 802.16 Mobile WiMAX. Resource Management in MIMO-OFDM. Differential Space Time Block Codes for MIMO-OFDM. Adaptive Modulation in OFDMA systems. Training Sequence Design in multi-user OFDM. Synchronization Techniques for MIMO-OFDMA. Multiuser CFOs Estimation in OFDMA Uplink Systems. Frequency Domain Equalization Strategies. MIMO Beamforming Schemes for Multiuser Access. Cooperative OFDMA in the Presence of Frequency Offsets. Relay-Assisted Cooperative OFDMA Networks. OFDM-MIMO Applications for High Altitude Platform Communications. OFDMA Systems and Applications. OFDMA-based Mobile WiMAX. Catalog no. AU8824, April 2010, c. 664 pp. ISBN: 978-1-4200-8824-3, $89.95 / £57.99

For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications New!

Overlay Networks Toward Information Networking Sasu Tarkoma Helsinki University of Technology, Espoo, Finland

An Accessible Introduction to Overlay Networks With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author’s articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the state of the art in applications, decentralized overlays, security, information routing, and information forwarding. The book provides an overview of networking technologies, the TCP/IP protocol suite, and networking basics. It also examines: • The foundations of structured overlays • Unstructured P2P overlay networks • Graph-based algorithms for information dissemination and probabilistic algorithms • Content-centric routing and a number of protocols and algorithms • Security challenges of P2P and overlay technologies—including solutions for mitigating risks Written by a scientist who is a university professor and a senior member of the Nokia research staff, this forward-looking resource covers advanced issues concerning performance and scalability. It highlights recent developments and discusses specific algorithms, including BitTorrent, Coolstream, BitOs, Chord, Content Addressable Network, Content Delivery Networks, Overlay multicast, and Peer-to-Peer SIP. Complete with a number of frequently-used probabilistic techniques and projections for the future, this authoritative reference provides the tools and understanding needed to create deployable solutions for processing and distributing the vast amounts of data that modern networks demand. Contents: Overlay Technology. Applications. Properties of Data. Network Technologies. Firewalls and NATs. Naming. Addressing. Routing. Multicast. Network Coordinates. Network Metrics. Properties of Networks and Data. Data on the Internet. Zipf’s Law. Scale-free Networks. Robustness. Small Worlds. Unstructured Overlays. Early Systems. Locating Data. Napster. Gnutella. Skype. BitTorrent. Cross-ISP BitTorrent. Freenet. Comparison. Foundations of Structured Overlays. Geometries. Consistent Hashing. Distributed Data Structures for Clusters. Distributed Hash Tables. APIs. Plaxton’s Algorithm. Chord. Pastry. Koorde. Tapestry. Kademlia. Content Addressable Network. Viceroy. Skip Graph. Comparison. Probabilistic Algorithms. Bloom Filters in Distributed Computing. Gossip Algorithms. Content-Based Networking and Publish/Subscribe. DHT-based Data-centric Communications. Content-based Routing. Router Configurations. Siena and Routing Structures. Hermes. Formal Specification of Content-based Routing Systems. Pub/sub Mobility. Security. Attacks and Threats. Securing Data. Security Issues in P2P Networks. Anonymous Routing. Security Issues in Pub/Sub Networks. Applications. Amazon Dynamo. Overlay Video Delivery. SIP and P2PSIP. CDN Solutions. Catalog no. K10708, February 2010, 260 pp., ISBN: 978-1-4398-1371-3, $99.95 / £60.99


SAVE 15% when you order online at

Explore the Cutting Edge in Telecommunications


Applied Aspects of Optical Communication and LIDAR Nathan Blaunstein, Shlomi Arnon, Arkadi Zilberman, and Natan Kopeika Ben-Gurion University of the Negev, Beer Sheva, Israel

Examines Numerous Situations in the Atmosphere— Including the Effects of Turbulence Exploring the practical aspects of atmospheric optical communication and light detection and ranging (LIDAR), this book details the role of atmospheric structures in propagation phenomena that influence the transmission of optical signals through perturbed atmospheric communication channels. It examines numerous situations in over-the-terrain atmospheric communication channels—including the effects of natural phenomena—and the corresponding features (turbulences and hydrometeors) on optical ray propagation. Bridging the gap between the parameters of optical communication links and signal information data streams, this concise reference addresses line-of-sight (LOS) as well as obstructive non-line-ofsight (NLOS) propagation conditions. It also: • Details the main characteristics of optical communication channels • Introduces the quasi-regular gaseous atmosphere • Describes numerous situations in the atmospheric communication channel • Explains the main characteristics of optical communication channels Complete with parameters for information data streams, the text also provides time-saving suggestions for determining which optical devices will work best for minimizing the deleterious effects of natural atmospheric phenomena. Whether you’re a researcher, an engineer, or student, this book provides you with the practical understanding required to use LIDAR to investigate all forms of atmospheric phenomena and to learn how to accurately predict primary parameters of atmospheric optical channels. Contents: Atmosphere: Structure and Processes. Vertical Profiles of Temperature, Pressure, and Number Density. Aerosols. Hydrometeor. Atmospheric Turbulence. Optical Wave Propagation in the Atmosphere. Refraction Phenomena. Effects of Aerosols. Aerosol Effects on Optical Wave Propagation. Effects of Hydrometeors. Effects of Atmospheric Turbulence on Optical Propagation. Measurements of Atmospheric Turbulence. Modeling of Atmospheric Optical Turbulence. Line-ofSight Bending Caused by Strong Atmospheric Turbulence. Applied Aspects of LIDAR. Turbulence Profile Measurement with LIDAR. LIDAR Research of Passive Scalar Field Fluctuations. LIDAR Measurement of Atmospheric Aerosol Parameters. Optical Communication Channels. Main Characteristics. Key Parameters Prediction. Mathematical and Statistical Description. Modulation Methods. Channel and Signal Data Parameters in Atmospheric Optical Communication Links. Irradiance PDF. Key Parameters of Data Stream in Optical Channels with Fading. Modeling of Key Parameters of the Channel and Information Data Summary. Abbreviations. Index Each chapter includes a "References" section Catalog no. AU0402, January 2010, 280 pp., ISBN: 978-1-4200-9040-6, $149.95 / £95.00

For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications

IP Communications and Services for NGN Johnson I. Agbinya ICT, Sydney, Australia

Provides the foundation for understanding, deploying, and using IP services Rapid deployment and acceptance of broadband networks, including the 802.11 a/b/g, 3G cellular networks, WiMAX, and emerging 4G cellular IP networks, have sparked a growing reliance on voice over IP and the quickly emerging IP TV and Mobile TV. Providing the necessary background and technical understanding to stay ahead of the IP trend, IP Communications and Services for NGN explores IP development for the delivery of nextgeneration mobile services. Discusses the Major IP protocols, Real-Time protocols, and Major IP Services Packed with detailed illustrations, this cutting-edge reference examines the primary IP protocols (IPv4 and IPv6), real-time protocols, and three major IP services (VoIP, IPTV, and Mobile TV). It clearly explains the different architectures of fixed, mobile, and wireless networks along with the major advantages and disadvantages of each. It includes coverage of the latest in: • The VoIP Market • SCTP and Vertical Handoff • RSVP: Resource Reservation Protocol • MPLS: Multiprotocol Label Switching • SIP: Session Initiation Protocol • IMS: IP Multimedia Subsystem • RTSP: Real-Time Streaming Protocol • RTP: Real-Time Transport Protocol • IPTV System Architectures and IPTV System Descriptions With a detailed listing of commonly used acronyms and a clear description of the role IP is likely to play in the development of next-generation mobile services, this book provides the ideal starting point for developing the understanding required to deploy, train, and use IP services effectively. Contents: List of Figures. List of Tables. List of Acronyms. Access Networks. Public Switched Telephone Network (PSTN). WiMAX: Worldwide Interoperability for Microwave Access. What Is Broadband Communication? SCTP and Vertical Handoff. Vertical Handoff. Mobility. Distinction between Mobility Types. IPv6. Quick Refresher in IPv4. RSVP: Resource Reservation Protocol. Resource Reservation Protocol (RSVP). MPLS: MultiProtocol Label Switching. MPLS Terminology and Concepts. QoS: Quality-of-Service. Bandwidth. Throughput. Delay. QoS Architectures and Models. SIP: Session Initiation Protocol. SIP: A Historical Snapshot. SIP Security. Threats from Vulnerability of SIP. SIP Quality-of-Service Performance. QoS Performance of SIP. Quality-of-Service and SIP. Mobility Management Using Mobile IP. Softswitch. Hard and Soft Switching. IMS: IP Multimedia Subsystem. Intelligent Multimedia Subsystem. Real-Time Protocols. RTP: Real-Time Transport Protocol. RTCP: Real-Time Control Protocol. RTCP. RTSP: Real-Time Streaming Protocol. Operation of RTSP. Global Control Messages. Content Request. RTSP Methods. VoIP: Voice over Internet Protocol. Fundamentals of VoIP Technology. The VoIP Market. The High Cost of Mobile Phone Access. IPTV: Internet Protocol Television. IPTV System Architecture. IPTV System Description. Index Each chapter includes a Summary, Practice Set: Review, Questions, Exercises, and References Catalog no. AU7090, January 2010, 411 pp., ISBN: 978-1-4200-7090-3, $69.95 / £44.99


SAVE 15% when you order online at

Explore the Cutting Edge in Telecommunications New!

Get Certified A Guide to Wireless Communication Engineering Technologies


Advances in Network Management

Edited by

Jianguo Ding

Syed A. Ahson

Norwegian University of Science & Technology, NTNU, Norway

Microsoft Corporation, Bellevue, Washington, USA

Mohammad Ilyas Florida Atlantic University, Boca Raton, USA

Presenting contributions from 50 wireless communications experts, this book provides an authoritative review of the seven areas of expertise covered on WCET exam. It covers the broad range of topics related to wireless communications to facilitate the technical competency required to achieve certification. The text outlines industry agreements, standards, policies, and regulations including licenses and permits, health and safety, and compliance. It also: • Considers engineering, propagation, and antennas, including measurements, evaluation and performance optimization • Details wireless technologies, their features and evolution, along with system design, bandwidth requirements and trade-offs • Describes network service architecture, management, security, and infrastructure requirements From basic concepts to research-grade material and future directions, this book provides a general overview of the evolution of wireless technologies, their impact on the profession, and common professional best practices. The book’s well-structured presentation along with suggestions for further study, make it an indispensible guide for attaining WCET certification and a comprehensive reference to keep pace with the ever-evolving standards in the field.

Contents: Access Methods. Adaptation Techniques for Wireless Communication Systems. Coding Techniques. Modulation Methods. Cellular Systems. An Overview of cdma2000, WCDMA, and ED GE. Universal Mobile for Telecommunication Systems. High-Speed Downlink Packet Access. IEEE 802.16Based Wireless MAN. 3GPP Long-Term Evolution. Mobile Internet Protocol. SIP: Advanced Media Integration. VoIP in a Wireless Mobile Network. IP Multimedia Subsystem (IMS). Location-Based Services. Authentication and Privacy in Wireless Systems. Network Management Tools. Blueprints and Guidelines for Telecommunication. Service Providers. Antenna Technology. Diversity. MultipleInput Multiple-Output Systems.

"The author raises essential issues at stake and brings the necessary expertise and experience identifying the challenges and proposing recommendations of great value…" —Latif Ladid, IPv6 Forum President

During the past two decades, while the business volume of hardware and software sales in the U.S has decreased by about 70 percent, the cost of management and support has grown from $20 billion to $140 billion. With the majority of this figure being spent on the management of legacy systems, improvements in the development of self-managing systems have become a cost-saving priority for corporations and an issue of strategic importance for many economies. Advances in Network Management provides the insight of a recognized expert into the fundamental concepts and contemporary challenges in network management. From basic concepts to research-level material, it details the evolution of network management solutions in network management paradigms, protocols, and techniques. The book also addresses dependencies between network management and application-level service management. This forward-looking resource investigates advanced networks and network services, including autonomic computing, context-aware systems management, and automatic techniques aiming at self-management (self-configuration, self-healing, self-optimization, and self-protection). With its breadth and depth of coverage, this book provides time-tested guidance for dealing with the growing complexity of network services while improving cost efficiencies in your IT department.

Contents: Evolution of Networks. Evolution in Network Management. Theories and Techniques for Network Management . Management of Emerging Networks and Services. Autonomic Computing and SelfManagement. A: Standard Organizations and Sections in Network Management. B: SNMPv3 RFCs. C: ITU-T TMN M.3000 Series for Network Management. D: IEEE 802 Working Group and Executive Committee Study Group. Abbreviations. Catalog no. AU6452, January 2010, 390 pp., ISBN: 978-1-4200-6452-0, $69.95 / £44.99

Catalog no. K10618, January 2010, 504 pp. ISBN: 978-1-4398-1226-6, $79.95 / £49.99

For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications Handbook of Mobile Broadcasting


Security of Mobile Communications


Borko Furht

Noureddine Boudriga

Florida Atlantic University, Boca Raton, USA

University of the 7th of November at Carthage, Tunisia

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels. Providing technicians and designers with a comprehensive resource, this book brings together the policies, practices, and guidelines needed to identify and address the security issues related to today’s wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems. It details the major mobile standards for securing mobile communications and examines the architectures able to provide data confidentiality, authentication, integrity, and privacy in various wireless environments. Professor Noureddine Boudriga, an internationally recognized authority, goes beyond analysis, standards, and guidelines to define the roles and responsibilities that network operators, service providers, and even customers need to fulfill to assure our mobile communications are as secure as they are prolific.

Contents: Basic Techniques for Mobile Communications and Security. Threats, Hacking, and Viruses in Mobile Communications. Access Control and Authentication in Mobile Communications. Common Techniques for Mobile Communications Security. Smart Card Security: The SIM/USIM Case. Attack and Protection Techniques in Mobile Communication Networks. Security of GSM Networks. Security of 3G Networks. Wireless Local Area Network Security. Security of Ad Hoc Networks. Security of Network-Based Services in Mobile Communications. Inter-System Roaming and Internetworking Security. Securing Mobile Services. Security of Mobile Sensor Networks. Security of Satellite Services. Protection Techniques for Mobile Applications. Security of Mobile Payments. Security of Mobile Voice Communications. Security of Multimedia Communications. Catalog no. AU7941, January 2010, 630 pp., ISBN: 978-0-8493-7941-3, $99.95 / £60.99


Syed A. Ahson Microsoft Corporation, Bellevue, Washington, USA

Operators are introducing mobile television and digital video content services globally. This handbook addresses all aspects of these services, providing a comprehensive reference on DVB-H, DMB, ISDB-T, and MediaFLO. Featuring contributions from experts in the field, the text presents technical standards and distribution protocols. It provides detailed coverage of video coding, including design methodology and error resilience techniques; state-of-the-art technologies such as signaling, optimization, implementation, and simulation; and applications of mobile broadcasting, including interactive services.

Features: • Addresses the video coding aspects of mobile broadcasting • Considers current and future applications of mobile broadcasting • Includes standards for large scale content distribution protocols

Contents: Standards. Emerging Digital Video BroadcastingHandheld. Digital Video Broadcasting via Satellite Services to Handhelds. Digital Multimedia Broadcasting for Terrestrial. Comparative Study of Mobile Broadcasting Protocols. Optimization and Simulation. Hardware and Software Architectures. Development of an H.264/AVC Main Profile Video Decoder Prototype Using a Platform-Based SOC Design Methodology. H.264/AVC Video Codec Design. Low-Power Analog-to-Digital Converters (ADCs). Application Layer Forward Error Correction for Mobile Multimedia Broadcasting. Technology. Time and Frequency Synchronization Schemes. Antenna Diversity Schemes. Soft Handover Techniques for Time-Slicing-Based Broadcast Systems. Transmission Aspects and Service Discovery Strategy for Seamless Handover in DVB-H. Radio Resource Management Schemes for Mobile Terrestrial and Satellite Broadcasting. Applications. DVB-H Systems and Receivers. Video Streaming and Related Applications. Live Video and On-Demand Streaming. Broadcasting Techniques. Catalog no. AU5386, 2008, 744 pp., ISBN: 978-1-4200-5386-9, $149.95 / £95.00

SAVE 15% when you order online at

Explore the Cutting Edge in Telecommunications Contemporary Coding Techniques and Applications for Mobile Communications

Optical Wireless Communications IR for Wireless Connectivity Roberto RamirezIniguez

Osman Nuri Ucan

Glasgow Caledonian University, Scotland

Istanbul University, Turkey

Sevia M. Idrus

Onur Osman

Universiti Teknologi Malaysia, Skudai Johor

Istanbul Commerce University, Turkey

Modern error control coding methods based on turbo coding have essentially solved the problem of reliable data communications over noisy channels. Contemporary Coding Techniques and Applications for Mobile Communications provides a clear, comprehensive, and practical grounding on the subject matter examining the fundamentals, theories, and applications of contemporary coding techniques. Written from the perspective that error control coding techniques will facilitate future digital data links, the book provides in-depth coverage of modulation techniques, multiplexing, channel models, MIMO systems, fundamental coding techniques, trellis coding modulation, turbo codes, and multilevel turbo codes.

Ziran Sun Newbury, UK

Based on its advantages over radio, interest in Infrared (IR) technology as a medium to convey information has grown considerably. Optical Wireless Communications examines some of the most important features of optical wireless communication systems. It considers the benefits and limitations of IR as a medium conveying information wirelessly and compares the advantages and disadvantages of infrared to microwave and other radio systems. It also details the evolution of IR communication systems and describes atmospheric and other types of data transmission limitations.

The first part of the text presents fundamental information on modulation, multiplexing, channel models, and traditional coding methods. The second part explains advanced coding techniques, provides simulation results, and compares them with related methods. The book also provides new coding algorithms and covers recent research, including image transmission.

The book presents design fundamentals of optical concentrators, as well as a review of some of the most important receiver optical front-ends (containing imaging or non-imaging concentrators and optical filters), including an explanation of the different sources of infrared noise and an introduction to eye safety. It also describes optical wireless transmitter and receiver design issues, typical modulation, coding, and multiple access techniques, and introduces IrDA protocols and wireless IR networking.



• Presents an overview of communication systems

• Reviews the optical wireless communication features for indoor and outdoor use

• Outlines effective image transmission techniques • Describes the coding techniques being applied in 3G mobile GSM communications • Examines turbo coding and related topics

Contents: Modulation Techniques. Multiplexing. Channel Models. Fundamental Coding Techniques. Trellis Coded Modulation. Turbo Codes. Multilevel Turbo Codes. Turbo Trellis Coded Modulation. Channel Equalization and Error Performance. Low Density Parity Check Codes. Coding Techniques Using Continuous Phase Modulation. Image Transmission Using Turbo Codes. Future Works on Coding Techniques. Catalog no. AU5461, 2009, 352 pp., ISBN: 978-1-4200-5461-3, $99.95 / £63.99

• Explains the benefits and the limitations of infrared links • Describes design fundamentals and different possible configurations • Addresses optical safety issues for optical wireless systems

Contents: Atmospheric Transmission Limitations. Data Transmission Limitations and Eye Safety. Fundamentals of Optical Concentration. Optical Concentrators. Optical Wireless Transmitter Design. Optical Wireless Receiver Design. Modulation, Coding and Multiple Access. IRDA Protocols. Wireless IR Networking. Catalog no. AU7209, 2008, 376 pp., ISBN: 978-0-8493-7209-4, $89.95 / £57.99

For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications MEMS and NanotechnologyBased Sensors and Devices for Communications, Medical and Aerospace Applications

Long Term Evolution

A.R. Jha

Microsoft Corporation, Bellevue, Washington, USA

Jha Technical Consulting Service, Cerritos, California, USA

A Comprehensive Resource on 3GPP LTE Technology

3GPP LTE Radio and Cellular Technology Edited by

Borko Furht Florida Atlantic University, Boca Raton, USA

Syed A. Ahson

“This comprehensive book on MEMS and nanotechnology (NT) provides a wide-lens perspective of the field. … It contains a wealth of synergistic information and insights relating to the innovative field of MEMS and NTs. … A.R. Jha, one of the most prolific writers, covers a wide range of emerging technical fields… ” —Dr. Ashok K. Sinha, Retired Senior Vice President, Applied Materials, Inc.

While 3G has been an outstanding success, the growing demand for higher data rates and higher quality mobile communication services continues to fuel conflict between the growing number of users and limited bandwidth resources. With coverage ranging from basic concepts to research grade material, this handbook is a complete reference for technical information on all aspects of 3GPP LTE.

This book explores the potential of using MEMS and NT in sensors and devices. It describes packaging details, materials and their properties, and fabrication requirements vital for design, development, and testing. The book encompasses various types of MEMSand NT-based sensors and devices, including micropumps, accelerometers, photonic bandgap devices, acoustic sensors, CNT-based transistors, photovoltaic cells, and smart sensors. It also discusses how these sensors and devices are used in a number of applications, including weapons’ health, battlefield monitoring, cancer research, stealth technology, chemical detection, and drug delivery.

Containing contributions from experts in the field, the text details low chip rate, high-speed downlink/uplink packet access (HSxPA)/TDSCDMA EV 1x, LTE TDD, and 3G TDD. It introduces new technologies and covers methodologies to study the performance of frequency allocation schemes. Presenting information clearly and concisely, the book discusses the proposed architecture of Mobile IPRR and distributed dynamic architecture in the wireless communication and assesses performance evaluation of the TD-SCDMA LTE System.


Evolution from TD-SCDMA to FuTURE. RadioInterface Physical Layer. Architecture and Protocol Support for Radio Resource Management (RRM). MIMO OFDM Schemes for 3GPP LTE. Single-Carrier Transmission for UTRA LTE Uplink. Cooperative Transmission Schemes. Multihop Extensions to Cellular Networks—the Benefit of Relaying for LTE. User Plane Protocol Design for LTE System with Decode-Forward Type of Relay. Radio Access Network VoIP Optimization and Performance on 3GPP HSPA/LTE. Early Real-Time Experiments and Field Trial Measurements with 3GPP-LTE Air Interface Implemented on Reconfigurable Hardware Platform. Measuring Performance of 3GPP LTE Terminals and Small Base Stations in Reverberation Chambers.

Highlights and Chronological Developmental History of MEMS Devices Involving Nanotechnology. Potential Actuation Mechanisms, Their Performance Capabilities, and Applications. Latest and Unique Methods for Actuation. Packaging, Processing, and Material Requirements for MEMS Devices. RF-MEMS Switches Operating at Microwave and mm-Wave Frequencies. RF/Microwave MEMS Phase Shifter. Applications of Micropumps and Microfluidic. Miscellaneous MEMS/Nanotechnology Devices and Sensors for Commercial and Military Applications. Materials for MEMS- and Nanotechnology-Based Sensors and Devices. Catalog no. AU8069, 2008, 432 pp., ISBN: 978-0-8493-8069-3, $129.95 / £82.00



Catalog no. AU7210, 2009, 488 pp., ISBN: 978-1-4200-7210-5, $99.95 / £60.99

SAVE 15% when you order online at

Explore the Cutting Edge in Telecommunications Millimeter Wave Technology in Wireless PAN, LAN, and MAN Edited by

Shao-Qiu Xiao, Ming-Tuo Zhou, and Yan Zhang Driven by the demand for high data rate, millimeter wave technologies with broad bandwidth are being explored in high-speed wireless communications. As a result of this technological push, standard organizations are actively calling for specifications of millimeter wave applications in the above wireless systems. Providing the guidance needed to help navigate through these new technologies, Millimeter Wave Technology in Wireless PAN, LAN, and MAN covers the fundamental concepts, recent advances, and potential that these millimeter wave technologies will offer with respect to circuits design, system architecture, protocol development, and standardization activities. The book presents essential challenges and solutions related to topics that include millimeter wave monolithic integrated circuit (MMIC), packaging technology of millimeter wave system and circuits, and millimeter wave channel models. With numerous figures, tables and references, this text allows speedy access to the fundamental problems, key challenges, open issues, future directions, and further readings on millimeter wave technologies in relation to WPAN, WLAN, and WMAN.

Contents: Millimeter-Wave Monolithic Integrated Circuit for Wireless LAN. Package Technology for MillimeterWave Circuits and Systems. Antennas and Channel Modelling. MAC Protocols for Millimeter-Wave Wireless LAN and PAN. Millimeter-Wave for Wireless Networks. The Wimedia Standard for Wireless Personal Area Networks. Millimeter-Wave Based IEEE 802.16 Wireless Man. Millimeter-Wave Dedicated Short Range Communications (DSRC): Standard, Application and Experiment Study. Interference in Millimeter-Wave Wireless Man Cellular Configurations. Millimeter-Wave Radar: Principles and Applications. Optical Generation and Transmission of Millimeter-Wave Signals. Catalog no. AU8227, 2008, 448 pp., ISBN: 978-0-8493-8227-7, $129.95 / £82.00

Vehicular Networks Techniques, Standards, and Applications Edited by

Hassnaa Moustafa France Telecom Research and Development, Cedex

Yan Zhang Simula Research Laboratory, Lysaker, Norway

Vehicular networks have special behavior and characteristics, distinguishing them from other types of mobile networks. This book illustrates their benefits and real-life applications. It examines possible services that these networks can provide and presents their possible deployment architectures, while also showing the roles of the involved contributors (networks operators, car manufacturers, service providers, and governmental authorities). The book explores the technical challenges in deployment, such as MAC protocols, routing, information dissemination, dynamic IP autoconfiguration, mobility management, security, and the privacy of drivers and passengers. In addition, it considers the possible business models for deploying such networks.

Features: • Presents vehicular network basics and advanced concepts • Covers new techniques for development and practical deployment • Investigates promising radio technologies in addition to current standardization activities • Examines security challenges, including authentication, access control, security architectures, and secure data transfer

Contents: Vehicular Network Applications and Services. Medium Access Control Protocols for Vehicular Networks. Heterogeneous Wireless Communications for Vehicular Networks. Routing in Vehicular Networks. Routing in Vehicular Networks: A User’s Perspective. Data Dissemination in Vehicular Networks. Message Scheduling within Vehicular Networks. IP Address Autoconfiguration in Vehicular Networks. Network Mobility in Vehicular Networks. Mobile Ad Hoc NEMO. Security In Vehicular Networks. Confidence Management in Vehicular Networks. Geocast in Vehicular Networks. Market Introduction and Deployment Strategies. Catalog no. AU8571, 2009, 450 pp., ISBN: 978-1-4200-8571-6, $99.95 / £60.99

For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications Cooperative Wireless Communications

Ad Hoc Mobile Wireless Networks

Edited by

Principles, Protocols and Applications

Yan Zhang Simula Research Laboratory, Lysaker, Norway

Subir Kumar Sarkar

Hsiao-Hwa Chen

Jadavpur University, Calcutta, India

National Cheng Kung University, Taiwan

T.G. Basavaraju

Mohsen Guizani

Sapthagiri College of Engineering, Bangalore, India

Western Michigan University, Kalamazoo, USA

C. Puttamadappa

Considering the wide range of applications, strategies, and benefits associated with cooperative wireless communications, researchers and product developers need a succinct understanding of relevant theory, fundamentals, and techniques to navigate this challenging field. This comprehensive reference provides just that.

Manipal Institute of Technology, India

The text provides readers with the background needed to develop and implement cooperative mechanisms for infrastructure-based wireless systems and self-organizing, multi-hop wireless networks (e.g., ad hoc, mesh, peer-to-peer, and sensor networks). It introduces key cooperative strategies and details recent improvements to a variety of cooperative mechanisms and frameworks applicable in diverse scenarios. Addressing fundamentals and techniques, this invaluable reference: • Covers the technical, practical, and deployment aspects of cooperative strategies, including the latest IEEE standard specifications • Explores key challenges and solutions in 3G, B3G, 4G WiMAX, as well as ad hoc, mesh, and sensor networks • Covers cooperative diversity, virtual MIMO, cognitive radio networks, and resource and mobility management • Discusses energy efficiency, relaying strategy, routing, MAC, topology control, and security Introducing different cooperative mechanisms, cooperation frameworks in diverse scenarios, and recent improvements to wireless network performance, this one-stop reference consolidates the essential information that readers will need to resolve key challenges in various protocol issues from a cooperation perspective. Catalog no. AU6469, 2009, 528 pp., ISBN: 978-1-4200-6469-8, $99.95 / £60.99


". . . a considerable source of information about MANET protocols and principles. It contains a lot of information, mostly gathered from international conferences, RFCs, and journal papers. Extensive bibliography sections for deeper reading are attached to the end of all chapters." —Marek Natkaniec, in IEEE Communications Magazine, May 2009

Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications offers techniques, solutions, and support regarding the design and performance of ad hoc wireless networks. This book presents the fundamentals of wireless networks, covering Bluetooth, IrDA, HomeRF, WiFi, WiMax, wireless Internet, and Mobile IP. Each chapter provides relevant examples and problems to illustrate concepts. It addresses quality of service, energy management, cross layer design issues, and recent developments. The book also provides mobility models for multi-hop ad hoc wireless networks and explores various protocols such as MAC layer, transport layer, routing, and multicast routing.

Contents: MAC Layer Protocols for Ad Hoc Wireless Networks. Routing Protocols for Ad Hoc Wireless Networks. Multicast Routing Protocols for Mobile Ad Hoc Networks. Transport Protocols for Ad Hoc Networks. Quality of Service Ad Hoc Networks. Energy Management System in Ad Hoc Wireless Networks. Mobility Models for Multi-Hope Wireless Networks. Cross Layer Design Issues for Ad Hoc Wireless Networks. Applications and Recent Developments in Ad Hoc Networks. Catalog no. AU6221, 2008, 336 pp., ISBN: 978-1-4200-6221-2, $134.95 / £86.00

SAVE 15% when you order online at

Explore the Cutting Edge in Telecommunications The Internet of Things From RFID to the Next-Generation Pervasive Networked Systems Edited by

Lu Yan Cambridge, UK

Yan Zhang Simula Research Laboratory, Lysaker, Norway

Laurence T. Yang St. Francis Xavier University, Nova Scotia, Canada

Huansheng Ning Beijing University of Aeronautics & Astronautics, China

This book provides comprehensive guidance that covers the fundamentals in pervasive networked systems. It addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies, experience reports, and best practices, it contains information on emerging technologies, market opportunities, and policy implications. Addressing technological developments and defining the Internet of Things, this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs, it’s a practical guide to pervasive networked systems.


Cognitive Radio Networks Edited by

Yang Xiao and Fei Hu The University of Alabama, Tuscaloosa, USA

Fueled by ongoing and increasing consumer demand, the explosive growth in spectrum-based communications continues to tax the finite resources of the available spectrum. One possible solution, Cognitive Radio Network (CRN), allows unlicensed users opportunistic access to licensed bands without interfering with existing users. Cognitive Radio Networks presents state-of-the-art approaches and novel technologies for cognitive wireless radio networks and sheds light on future developments. Comprising the contributions of prominent cognitive radio researchers, this book covers all CRN essentials including spectrum sensing, spectrum handoff, spectrum sharing, and CRN routing schemes. Divided into five parts, the book addresses the physical layer, medium access control, the routing layer, cross-layer considerations, and advanced topics in cognitive radio networks. The chapters also review research, management, support, and cognitive techniques such as position and network awareness, infrastructure, and physical and link layer concerns.

• Explores ubiquitous networks, next-generation networks, and ubiquitous computing


• Examines RFID, sensor technologies, smart things, nanotechnology, and miniaturizations

• Reviews ultra-wideband cognitive radio

• Discusses spectrum-sensing algorithms

• Discusses the market potential of these technologies, factors inhibiting market growth, and new business models

• Examines mission-oriented communications properties

• Reviews the implications for society, such as growing concerns over privacy


• Covers the benefits these technologies offer and how lifestyles may be transformed during the next decade

Physical Layer of Cognitive Radio Networks. Medium Access Control (MAC) Layer of Cognitive Radio Networks. Routing Layer of Cognitive Radio Networks. Cross-Layer Considerations in Cognitive Radio Networks. Advanced Topics in Cognitive Radio Networks.

Contents: RFID Tags. RFID Automatic Identification and Data Capture. RFID Data Warehousing and Analysis. RFID Data Management Issues, Solutions, and Directions. RFID Security: Threats and Solutions. RFID Specification Revisited. RFIG Geometric Context of Wireless Tags. RFID Application in Animal Monitoring. RFID Enabled Logistics Services.

• Explores new applications and system control

Catalog no. AU6420, 2009, 478 pp., ISBN: 978-1-4200-6420-9, $89.95 / £57.99

Catalog no. AU5281, 2008, 336 pp., ISBN: 978-1-4200-5281-7, $99.95 / £63.99

For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications Converging NGN Wireline and Mobile 3G Networks with IMS

IMS A New Model for Blending Applications Mark Wuthnow, Jerry Shih, and Matthew Stafford

Converging NGN and 3G Mobile Rebecca Copeland

AT&T Mobility, USA

Strategic IMS Solution Consultant, Warwickshire, UK

“… a very timely contribution to this field. It is suitable for both lay people wanting to understand the building blocks and drivers of IMS as well as more skilled practitioners wanting to brush up on technical details and close some gaps in their knowledge.” —Mick Reeve, Fellow of the International Engineering Consortium and the Royal Academy of Engineering, Retired Chief Architect of BT Group CTO

Focusing on the future network architecture and its main principles, this book provides comprehensive coverage of the methods, functions, network elements, and the interfaces that enable the building of a service agnostic and access agnostic session control layer based on IMS standards. After an introduction to IMS principles with market trends, technological innovations, migration issues, and global standards, the book describes converged session control and multimedia handling with ID management, service profiles, and event and applications triggering. Subsequent chapters tackle the all-important aspects of IP charging mechanisms, service-based quality of service, security, border control, and legacy services. Wherever possible, the author points out the convergence of standards and details different specifications and terminology for TISPAN and 3GPP. Delivering deep insight into the role of IMS in fixed line and mobile networks, this book explains the new technologies from concepts to detailed techniques to give a clear understanding of how the next generation of converged communication can be achieved with managed quality, security, and chargeability.

Contents: IMS Concepts. IMS Standards. Session Control. Network Admission. Profiles and ID Management. Policy and Quality-of-Service Control. The IP Border and Security. Charging. Circuit-Switched Network Interworking. WLAN Interworking. Appendices.

"Mark Wuthnow, Matt Stafford, and Jerry Shih are well respected within the telecommunications industry and have been at the forefront of IMS for the operator industry for several years. Collectively, they cover many technologies related to IMS or interacting with IMS. Their expertise will provide readers with a unique insight and perspective on IMS." —Paul Mankiewich, CTO, Alcatel-Lucent America

IP Multimedia Subsystem (IMS) technology, which merges the Internet with interactive telecommunications, represents the here and now for today’s packet-switched networks. Rather than offer the usual explanation of the standard itself, the authors address how IMS-based services might be deployed in an operator’s network. They delineate the application layers and the applications that can be implemented using an IMS network. For those unfamiliar with IMS, they provide an overview of its key components and the signaling standards used for the implementation of an end-to-end IMS service. Significant concepts are conveyed through real-life vignettes that describe how end users might actually use interactive IMS applications in the course of their day. This approach mimics the way an operator’s marketing organization might go about building a business case for IMS application deployment. While technical enough to meet the needs of engineers, this approach will greatly assist marketing, sales, and managerial professionals with gaining a basic understanding of IMS, as well as a sense of the numerous applications driving the field forward.

Contents: Components of an IMS Architecture. IMS Signaling Primer. IMS/OMA Based Enablers. Catalog no. AU9285, January 2010, 368 pp., ISBN: 978-1-4200-9285-1, $69.95 / £44.99

Catalog no. AU9250, 2009, 518 pp., ISBN: 978-0-8493-9250-4, $89.95 / £57.99


SAVE 15% when you order online at

Explore the Cutting Edge in Telecommunications Mobile WiMAX

Edited by

WiMAX Network Planning and Optimization

Yan Zhang

Edited by

Toward Broadband Wireless Metropolitan Area Networks

Simula Research Laboratory, Lysaker, Norway

Hsiao-Hwa Chen National Cheng Kung University, Taiwan

This popular reference examines the basic concepts and standard specifications pertinent to WirelessMANs—emphasizing IEEE 802.16-based WiMAX. After introducing the basics of WirelessMAN, the book addresses topics in three accessible parts. The first part focuses on radio frequency (RF), signal processing, multiple in-multiple out (MIMO) technology, and identifying challenges and possible solutions in the physical layer. An examination of protocol issues follows, including those involving medium access control (MAC), quality of service (QoS) in point-to-multi-point (PMP) and mesh networks, cross layer optimization, mobility management, handoff in heterogeneous networks, energy management, and link adaptation mechanisms. The final part considers issues regarding security, economy, and system capacity.


Yan Zhang Simula Research Laboratory, Lysaker, Norway

WiMAX Network Planning and Optimization offers a comprehensive explanation on how to dimension, plan, and optimize WiMAX networks. Comprised of two complementary parts, this book introduces and explains key concepts and major mechanisms, including network architecture, physical layer, standard, protocols, security mechanisms, and related radio access technologies. In particular, it covers system framework, topology, capacity, mobility management, and handoff management. It also addresses congestion control, medium access control (MAC), scheduling, Quality of Service (QoS), WiMAX mesh networks, and security. The second part presents practical examples and illustrative figures to explain planning techniques and optimization algorithms to enable easy understanding of discussed concepts and technologies. Both theoretical and practical information is provided to ensure in-depth and realistic results.

• Analyzes different layers of the protocol stack • Identifies basic concepts, advanced techniques, and future directions • Offers numerous illustrative figures • Details specific techniques for performance improvement

Contents: IEEE 802.16-Based WirelessMAN. RF System and Circuit Challenges for WiMAX. Physical Layer Specifications. MIMO for WirelessMAN. MIMO Spectral Efficiency of the Mobile WiMAX Downlink. Medium Access Control. QoS Services Provisioning at MAC Layer in WiMax Systems. Radio Resource Management in IEEE 802.16 WiMAX Mesh Networks. Cross-Layer Design in WirelessMAN. Mobility Management in Mobile WiMAX. Dynamic Network Selection in Wireless LAN/MAN Heterogeneous Networks. Mobility Support. Energy Management in the IEEE 802.16e WirelessMAN. Link Adaptation Mechanisms. Analysis of Threats to WiMax/802.16 Security. Techno-Economic Analysis of Fixed WiMAX Networks. Capacity of OFDMABased WirelessMAN.

An invaluable reference, this book predicts, investigates, and measures WiMAX network performance, providing essential information for a wide-ranging professional, technical, and academic audience interested in successful network planning and optimization. Beyond its application to WiMAX rollout, this book is also an excellent reference for the planning and optimization efforts of other radio networks.

Features: • Explains WiMAX networks planning with practical examples and illustrative figures • Analyzes WiMAX performance with capacity enhancement techniques • Provides essential information on network planning for mobile service providers, wireless system operators, and telecommunication equipment manufacturers • Includes detailed theoretical and practical information on WiMAX planning and optimization Catalog no. AU6662, 2009, 451 pp., ISBN: 978-1-4200-6662-3, $119.95 / £72.99

Catalog no. AU2624, 2008, 472 pp., ISBN: 978-0-8493-2624-0, $104.95 / £66.99

For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications Mobile Telemedicine A Computing and Networking Perspective

Understanding Broadband over Power Line

Edited by

Gilbert Held

Yang Xiao

4-Degree Consulting, Macon, Georgia, USA

The University of Alabama, Tuscaloosa, USA

Understanding Broadband over Power Line explores all aspects of the technology that enables electric utilities to provide support for high-speed data communications via their power infrastructure. This book examines the two methods used to connect consumers and businesses to the Internet through the utility infrastructure: the existing electrical wiring of a home or office; and a wireless local area network (WLAN) access point.

Hui Chen

Written in a practical style that can be understood by network engineers and non-technologists alike, this volume offers tutorials on electric utility infrastructure and home wiring, to ensure that all readers have a common base of knowledge. It reviews power line operations, analyzing how electricity is generated and delivered to consumers, and how the wiring inside buildings forms individual circuits. It also: • Provides a comparison of BPL versus competitive Internet access methods • Discusses the basics of power line operation— including current, measurement, transformers, service methods, and service panels • Analyzes BPL system architecture, transmission methods, modulation techniques, and network access • Reviews the pros and cons of power line transmission, interference with certain radio frequencies, opposition to BPL, and the resulting FCC regulatory effort • Examines the HomePlug standard, exploring specifications, power line adapters, HomePlug AV, and IEEE Wireless LANs • Investigates the offerings of various equipment vendors, and highlights the results of real-world field trials • Details IEEE standards, several organizing bodies, and the future of BPL Catalog no. AU9846, 2006, 200 pp., ISBN: 978-0-8493-9846-9, $83.95 / £53.99


Virginia State University, Petersburg, USA

Despite the strides that have been made in utilizing telemedicine technology, there remain a number of limitations and weaknesses that must be overcome before this treatment paradigm can reach its full potential. In Mobile Telemedicine: A Computing and Networking Perspective, noted computer scientists Yang Xiao and Hui Chen examine the computing and networking dilemmas arising from wireless and mobile telemedicine. Comprised of the contributions of prominent international researchers, this book discusses the relative merits and limitations of the existing technology and sheds light on future developments. The book begins with a discussion of patient care and monitoring through items such as personal alarm systems. It then reviews the current methods available to monitor cardiac and diabetic patients, analyzes the security and privacy considerations that arise with respect to the transmission of sensitive information, and examines issues relating to networking support. Finally, it concludes with a section on the opportunities and challenges faced by those involved at this intersection of healthcare and communications. By bridging the fields of medicine and information technology, this volume serves as a useful springboard for those pioneering IT researchers looking for a comprehensive reference. The book also provides information for those involved with either communications or healthcare who want to learn about the current state and potential use of this technology.

Contents: Patient Care and Monitoring. Cardiology. Diabetes. Security and Privacy in Telemedicine. Networking support. Challenges and opportunities. Catalog no. AU6046, 2008, 440 pp., ISBN: 978-1-4200-6046-1, $79.95 / £49.99

SAVE 15% when you order online at

Explore the Cutting Edge in Telecommunications Security in RFID and Sensor Networks

Security in Wireless Mesh Networks

Edited by

Edited by

Yan Zhang

Yan Zhang

Simula Research Laboratory, Lysaker, Norway

Simula Research Laboratory, Norway

Paris Kitsos

Jun Zheng

Hellenic Open University, Patras, Greece

City University of New York, USA

Exposes Security Risks and Offers Viable Solutions

Shanghai Research Center for Wireless Communications, China

Offering a comprehensive discussion of the security challenges in RFID, WSNs, and integrated RFID & WSNs, this book starts by highlighting the security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and a host of other topics related to RFID safety.

This volume provides an introduction to security issues, recent advances, and future directions in Wireless Mesh Networks (WMNs). Exploring key security challenges set in diverse scenarios, it examines the emerging standards of security. It addresses authentication, access control and authorization, attacks, privacy and trust, encryption, key management, identity management, DoS attacks, intrusion detection and protection, secure routing, security standards, and security policy. Complete with numerous case studies and applications, this comprehensive guide examines security mechanisms in IEEE 802.11, IEEE 802.15, IEEE 802.16, and IEEE 802.20 standards.

The text then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications. In each chapter, the contributors propose effective solutions to the security challenges that confront users, offering practical examples to aid in intuitive understanding. The final section reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.


Honglin Hu

Features: • Covers basic concepts, protocols, and architectures • Explores emerging standardization activities, security specifications, and security enhancements • Identifies future directions in the security of WMN


Security in RFID. Security in Wireless Sensor Networks. Security in Integerated RFID and WSN.

Mesh Networking in Wireless PANs, LANs, MANs, and WANs. Security Protocols and Techniques. Attacks and Security Mechanisms. Intrusion Detection. Secure Routing in Wireless Mesh Networks. Hop Integrity. Privacy Preservation. Providing Authentication, Trust, and Privacy. NonInteractive Key Establishment. Key Management. Security Standards, Applications, and Enabling Technologies. Security in Wireless PAN Mesh Networks. Security in Wireless LAN Mesh Networks. Security in IEEE 802.15.4 Cluster-Based Networks. Security in Wireless Sensor Networks.

Catalog no. AU6839, 2009, 560 pp., ISBN: 978-1-4200-6839-9, $99.95 / £60.99

Catalog no. AU8250, 2009, 552 pp., ISBN: 978-0-8493-8250-5, $89.95 / £57.99

• Includes detailed case studies to clarify material • Examines security risks in RFID, WSNs, and integrated RFID and WSNs • Explores architectures, protocols, standards, security, and applications


For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications Security in Distributed, Grid, Mobile, and Pervasive Computing

Physical Principles of Wireless Communications

Yang Xiao

Victor L. Granatstein

The University of Alabama, Tuscaloosa, USA

University of Maryland, College Park, USA

Addresses Security Issues in Distributed, GRID, and Pervasive Computing

Based on the author's course in the physics of wireless communications, Physical Principles of Wireless Communications provides a solid foundation in wireless communication systems. It offers rigorous analyses of the devices and physical mechanisms that constitute the physical layers of these systems.

Despite advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems.

Presents the Security Implications of Basic Usage Patterns A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.

Contents: Security in Distributed Computing. Security in Mobile Computing. Security in Grid Computing. Security in Pervasive Computing.

Starting with a review of Maxwell's equations, the text details the operation of antennas and antenna arrays, explaining how to perform the necessary design calculations. It also explores the propagation of electromagnetic waves, leading to important descriptions of mean path loss. The book reviews the principles of probability theory, enabling readers to calculate the margins that must be allowed to account for statistical variation in path loss. In addition, it covers the physics of Geostationary Earth Orbiting (GEO) satellites and Low Earth Orbiting (LEO) satellites to enable readers to evaluate and make first-order designs of satellite communications (SATCOM) systems. The book also includes problem sets, sample solutions, and access to a full set of viewgraphs on author's website.

Contents: Introduction to Modern Wireless Communications. Noise in Wireless Communications. Antennas. Radio Frequency (RF) wave propagation. Statistical Considerations in Designing Cell Phone Systems and Wireless Local Area Networks (WLANS). Tropospheric and Ionospheric Effects in Long-Range Communications. Catalog no. AU3259, 2008, 288 pp., ISBN: 978-0-8493-3259-3, $104.95 / ÂŁ66.99

Catalog no. AU7921, 2007, 440 pp., ISBN: 978-0-8493-7921-5, $93.95 / ÂŁ59.99


SAVE 15% when you order online at

Explore the Cutting Edge in Telecommunications New Edition of a Bestseller!

Introduction to Communications Technologies

Ionosphere and Applied Aspects of Radio Communication and Radar

A Guide for Non-Engineers, Second Edition

Nathan Blaunstein

Stephan Jones, Ron Kovac, and Frank M. Groom

Eugeniu Plohotniuc

Ball State University, Muncie, Indiana, USA

This book describes the main aspects of radio propagation due to different natural and manmade phenomena occurring in ionospheric plasma. It discusses the possibility of stable radio communication links based on local scattering at field-elongated plasma inhomogeneities including natural inhomogeneities as well as artificial inhomogeneities. The text also explains how inhomogeneities can create focusing effects and can capture and channel radio waves in the ionosphere-ground surface waveguides and transmit information over long distances.

Used in the core curriculum at Ball State University’s graduate professional program in Information and Communication Sciences, this book is intended for readers who do not necessarily have a high level of technical expertise, but need to have some understanding of the technical functions of information and communication technologies. Various sections address streaming video, Internet Protocol-defined voice communications, advanced wireless data networking and the convergence of various communication methods to be delivered on a single platform. A chapter on Multi-Protocol Label Switching (MPLS) provides readers with a valuable understanding of what should be expected from vendor services for external network offerings in the near-term, ways in which the core of the network is changing, and how traffic engineering is impacted by MPLS-defined virtual private networks (VPNs). Avoiding complicated equations and the need for difficult calculus, this text provides a firm background and the broad understanding necessary to work within the ever-changing communications industry.

Contents: Systems and Models of Communications Technologies: Shannon–Weaver, von Neumann, and the OSI Model. Basic Concepts of Electricity. Current. Modulation Schemes. Signaling Formats, Multiplexing, and Digital Transmissions. Multiplexing. PSTN to CPE. Circuit Switching. Mobile Wireless Technologies. Packet Switching and Local Area Network Technology. The Language of the Internet: TCP/IP. Network Security and Management. Voice-Over-IP. Wireless Local Area Networks. Video Basics. Digital Media. The Basics of MPLS Networking. Catalog no. AU4684, 2009, 328 pp., ISBN: 978-1-4200-4684-7, $69.95 / £44.99

Ben-Gurion University of the Negev, Beer Sheva, Israel Universitatea de Stat "Alecu Russo" din Balti, Moldova

Features: • Describes the main aspects of radio propagation due to different natural and manmade phenomena in the ionospheric plasma • Explains how inhomogeneities can capture and channel radio waves in the ionosphere-ground surface waveguides • Considers the possibility of stable radio communication links based on local scattering at natural plasma inhomogeneities • Addresses problems of artificially devising long distance ionospheric channels for radio wave propagation

Contents: The Regular Ionosphere. Nonlinear Phenomena and Plasma Instabilities in the Disturbed Irregluar Ionosphere. Radio Signal Presentation in the Ionospheric Communication Channel. Fading Phenomena in Ionospheric Communications Channels. Evolution of Plasma Irregularities in the Ionosphere. Modern Radiophysical Methods of Investigation of Ionospheric Irregularities. Performance of Radio Communications in Ionospheric Channels. Optical and Radio Systems for Investigation of the Ionosphere and Ionospheric Communication Channels. Performance of LandSatellite Communication Links Passing through the Irregular Ionosphere. Catalog no. AU5514, 2008, 600 pp., ISBN: 978-1-4200-5514-6, $149.95 / £95.00

For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications Unlicensed Mobile Access Technology

Multimedia Content Encryption

Protocols, Architectures, Security, Standards and Applications

Techniques and Applications Shiguo Lian

Edited by

France Telecom R&D, Beijing, China

Yan Zhang Simula Research Laboratory, Lysaker, Norway

Laurence T. Yang St. Francis Xavier University, Antigonish NS, Canada

Jianhua Ma Hosei University, Koganei, Japan

When operating successfully, the technology supporting dual-mode enabled mobile terminals allows subscribers to roam freely and seamlessly between cellular networks. However, various technical challenges still occasionally impede clear communication. This book explores the complex issue of mobility management and emphasizes the need for intelligently designed vertical and horizontal handoff algorithms that will improve adaptability in heterogeneous wireless environments. In addition, it reviews the various strategies to guarantee Quality-of- Service (QoS) during movement and handoff. The first chapters introduce the basic technology of these systems and discuss QoS, resource management, mobility management, and security issues in UMA technology. The middle section concentrates on protocols and security challenges in UMA-related technologies, which include Bluetooth, WirelessPAN, Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16). The final chapters present standard specifications and various applications. Comprised of contributions from world-wide experts, this complete reference offers guidance on all aspects of UMA technology.

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: Techniques and Applications begins with the history of multimedia encryption and then examines general performance requirements of encryption and fundamental encrypting techniques. It discusses common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, the author reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. An exploration of open issues, up-and-coming topics, and areas for further research rounds out the coverage.

• Explores standardization activities and specifications in UMA and UMA-related wireless technologies

Shiguo Lian is the author or co-author of more than fifty peer-reviewed journal and conference articles covering topics of network security and multimedia content protection, including cryptography, secure P2P content sharing, digital rights management (DRM), encryption, watermarking, digital fingerprinting, and authentication. By following the techniques outlined in this book, users will be better able to protect the integrity of their multimedia data and develop greater confidence that their data will not be misappropriated.

• Details particular techniques to improve UMA performance

Catalog no. AU6527, 2009, 224 pp., ISBN: 978-1-4200-6527-5, $99.95 / £63.99

Features: • Introduces basic concepts, efficient techniques, and future directions

• Includes a plethora of illustrations to facilitate understanding Catalog no. AU5537, 2009, 424 pp., ISBN: 978-1-4200-5537-5, $99.95 / £63.99


SAVE 15% when you order online at

Explore the Cutting Edge in Telecommunications Satellite Systems Engineering in an IPv6 Environment

Security in an IPv6 Environment

Daniel Minoli

Jake Kouns

SES Americom, Princeton, New Jersey, USA

Markel Corporation, Glen Allen, Virginia, USA

A practical guide to satellite transmission engineering, this book has three distinguishing features. It focuses more on practical results and less on the actual derivation of the mathematical equations, highlights the use of satellite transmission in an ipv6 environment, and applies the theory to sensor networks, IPTV distribution, and DVB-H-based delivery of TV signals to phones. Topics include electromagnetic propagation, modulation and multiplexing techniques, link budget analysis, IPv6 and TCP/IPv6 issues, and very small aperture terminals systems. The book concludes with coverage of applications such as sensor networks, IP multicast, IPTV, and DVB-H.

Covers Critical IPv6 Security Considerations.

Features: • Provides a detailed overview of IPv6, focusing on the key aspects of satellite transmission engineering • Details special considerations that must be made to optimize throughput for TCP traffic • Explores electromagnetic propagation, basic antenna engineering and theory, as well as modulation and multiplexing techniques at the physical, data-link, and packet layers • Discusses forward error correction, critical link budget analysis, and TCP/IPv6 issues and considerations related to IPv6 support in satellite environments • Addresses a wide range of concerns and topics useful to U.S. government agencies, satellite companies, equipment manufacturers, content providers, aggregators, and venture capitalists

Contents: Introduction to Satellite Communications. Electromagnetic Propagation and Reception. Antenna Engineering Basics. Modulation and Multiplexing Techniques. Error Correction Techniques. Link Budget Analysis. IPv6 Overview. Carrying IPv4, IPv6 and TCP over Satellite Links. Satellite Communication in IPv6 Environments. Catalog no. AU7868, 2009, 360 pp., ISBN: 978-1-4200-7868-8, $99.95 / £63.99

Daniel Minoli SES Engineering, Princeton, New Jersey, USA

Dan Minoli, author of more than 50 books on telecommunications and networks, and Jake Kouns, Chairman, CEO and CFO of the Open Security Foundation, discuss IPv6 security vulnerabilities, considerations, and mechanisms, and survey approaches for ensuring reliable and controlled IPv6 migration. The authors pool knowledge from industry resources, RFCs, and their own considerable security experience, discussing key IPv6 features, security issues, and potential exploitation of IPv6 protocol. They examine use of firewalls and encryption, and the fundamental topic of IPSec in IPv6 environments.

Protect Networks from New and Growing Threats An increasing amount of mission-critical commercial and military operations are supported by distributed, mobile, always-connected, hybrid public-private networks, especially IPv6-based networks. The number of attackers or inimical agents continues to grow, and all computing environments must feature high-assurance security mechanisms. Even administrators in pure IPv4 environments require at least a rudimentary understanding of IPv6 security principles to safeguard traditional networks. This comprehensive book explains why security savvy approaches are indispensible and includes considerations for mixed IPv4 and IPv6 migration environments. More than an exhaustive treatment of IPv6 and security topics, this text is a point of departure for anyone adjusting to this technological transition and subtending security considerations.

Contents: Introduction, Overview, and Motivations. Basic IPv6 Protocol Mechanisms. More Advanced IPv6 Protocol Mechanisms. Security Mechanisms and Approaches. Basic IPv6 Security Considerations. IPsec and Its Use in IPv6 Environments. Firewall Use in IPv6 Environments. Security Considerations for Migrations/Mixed IPv4-IPv6 Networks. Catalog no. AU2294, 2009, 288 pp., ISBN: 978-1-4200-9229-5, $79.95 / £49.99

For more information and complete contents, visit


Explore the Cutting Edge in Telecommunications Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications

Security in Sensor Networks Edited by

Yang Xiao The University of Alabama, Tuscaloosa, USA

Edited by

Yan Zhang Simula Research Laboratory, Lysaker, Norway

Honglin Hu Shanghai Research Center for Wireless Communication, China

Masayuki Fujise National Institute of Information & Communication Technology, Singapore

This book examines the inherent constraint of limited bandwidth and unreliable time-varying physical link in the wireless system. It discusses the demand to realize the service continuity in the single-hop or multi-hop wireless networks and explores trusted communication in mobile computing scenarios. Focusing on the background, technique survey, protocol design, and analytical methods, the book discusses standards in 802.11x/3G/4G, HotSpot Wireless, Bluetooth sensor networks, and access control in wireless Ad Hoc networks. Other topics include call admission control (CAC), routing, multicast, medium access control (MAC), scheduling, bandwidth adaptation, handoff management, location management, network mobility, secure routing, key management, authentication, security, privacy, and performance simulation and analysis. This book is a comprehensive source of information on basic concepts, major issues, design approaches, future research directions, and the interaction between these components. With its broad coverage allowing for easy cross reference, the book also provides detailed techniques for eliminating bandwidth insufficiency, increasing location management performance, and decreasing the associated authentication traffic.


Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing 13 invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and cross-layer. It offers insight into attacking and defending routing mechanisms in ad hoc and sensor networks, and analyzes MAC layer attacks in 802.15.4 sensor networks.

Features: • Covers all aspects of sensor security and related topics • Examines encryption, authentication, and watermarking • Reviews components of key management such as group key management in sensor networks and key management in hostile environments • Analyzes secure routing issues along with scalable security in wireless sensor and actuator networks (WSANs) • Explores secure in-network processing and secure localization • Discusses cross-layer design for the hardening of network security


• Offers information on resource, mobility, and security management in wireless networks

Attacks. Encryption, Authentication, and Watermarking. Key Managements. Secure Routing. Secure Aggregation, Location, and Cross-Layer.

• Addresses the challenges in key management of wireless sensor networks

Catalog no. AU7058, 2007, 341 pp., ISBN: 978-0-8493-7058-8, $104.95 / £66.99

• Explains how to provide effective and efficient authentication and key agreements for cellular access security Catalog no. AU8036, 2007, 618 pp., ISBN: 978-0-8493-8036-5, $114.95 / £72.99


SAVE 15% when you order online at

“… an extensive, scholarly, professional level resource to the practical applications of electrical engineering technology for telephones, communication networks, data recording, source compression, and much more. … strongly recommended as being an utterly exhaustive reference resource which is packed from cover to cover with extensive in-depth science and technical applications.” —Michael's Bookshelf From acoustic communications and data compression to optical fibers and wireless sensor networks, the Encyclopedia of Wireless and Mobile Communications provides a substantial overview of more than 200 essential topics in the wireless communications field. Presented in three easily searchable volumes written by global experts, this bestselling encyclopedia covers a complete range of fundamental and advanced topics in telecommunications. Catalog no. AU4326, 2008, 1856 pp. in three volumes ISBN: 978-1-4200-4326-6, $2995.00 / £1908.00 For information on your online subscription options, contact us at: or 1-888-318-2367

SAVE 15%!

Use this Promo Code when ordering to

6000 Broken Sound Parkway, NW, Suite 300 Boca Raton, FL 33487, USA

Page 4

Page 14

For a complete list of Telecommunications books please visit

Page 3

Presorted Standard US Postage PAID Permit 382 South Holland IL


Explore the Cutting Edge in Telecommunications