1. Trang chủ
  2. » Công Nghệ Thông Tin

Advanced wireless networks 4g technologies phần 1 pptx

89 185 1

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 89
Dung lượng 2,91 MB

Nội dung

[...]... with imperfections 4 .1. 11 Sensitivity of state probabilities to hysteresis region width 4 .1. 12 Estimation process and estimate error 4 .1. 13 Feedback process and acquisition errors 47 47 50 51 52 53 56 57 57 58 60 60 61 64 65 65 65 66 66 68 69 70 77 78 79 82 84 86 87 87 90 93 10 1 10 1 10 3 10 3 10 5 10 7 10 8 11 0 11 1 11 1 11 2 11 2 11 4 11 5 11 8 CONTENTS 4.2 Adaptive Transmission in Ad Hoc Networks 4.3 Adaptive... 5.3 .10 Message passing 5.4 MAC for Ad Hoc Networks 5.4 .1 Carrier sense wireless networks 5.4.2 Interaction with upper layers References 14 9 14 9 15 0 15 3 15 8 16 0 16 1 16 1 16 2 16 2 16 3 16 4 16 5 16 5 16 6 16 8 17 0 17 4 17 5 6 Teletraffic Modeling and Analysis 6 .1 Channel Holding Time in PCS Networks References 17 9 17 9 18 8 7 Adaptive Network Layer 7 .1 Graphs and Routing Protocols 7 .1. 1 Elementary concepts 7 .1. 2... 714 714 714 715 715 715 715 715 717 723 19 Network Information Theory 19 .1 Effective Capacity of Advanced Cellular Networks 19 .1. 1 4G cellular network system model 19 .1. 2 The received signal 727 727 729 730 xvi CONTENTS 19 .2 19 .3 19 .4 19 .5 19 .6 19 .7 19 .1. 3 Multipath channel: near–far effect and power control 19 .1. 4 Multipath channel: pointer tracking error, rake receiver and interference canceling 19 .1. 5... 299 11 Mobility Management 11 .1 Introduction 11 .1. 1 Mobility management in cellular networks 11 .1. 2 Location registration and call delivery in 4G 11 .2 Cellular Systems with Prioritized Handoff 11 .2 .1 Channel assignment priority schemes 11 .2.2 Channel reservation – CR handoffs 11 .2.3 Channel reservation with queueing – CRQ handoffs 11 .2.4 Performance examples 11 .3 Cell Residing Time Distribution 11 .4... CONTENTS 12 .2 12 .3 12 .4 12 .5 12 .6 12 .1. 4 Hybrid channel borrowing schemes 12 .1. 5 Dynamic channel allocation 12 .1. 6 Centralized DCA schemes 12 .1. 7 Cell-based distributed DCA schemes 12 .1. 8 Signal strength measurement-based distributed DCA schemes 12 .1. 9 One-dimensional cellular systems 12 .1. 10 Fixed reuse partitioning 12 .1. 11 Adaptive channel allocation reuse partitioning (ACA RUP) Resource Management in 4G. .. coexistence 12 .6.8 Channel estimation/imperfections 12 .6.9 Signal and interference model 12 .6 .10 Receiver structure 12 .6 .11 Interference rejection circuit model 12 .6 .12 Performance analysis 12 .6 .13 Performance examples References xiii 442 443 443 444 446 4 51 4 51 457 13 Ad Hoc Networks 13 .1 Routing Protocols 13 .1. 1 Routing protocols 13 .1. 2 Reactive protocols 13 .2 Hybrid Routing Protocol 13 .2 .1 Loop-back... concepts 7 .1. 2 Directed graph 7 .1. 3 Undirected graph 7 .1. 4 Degree of a vertex 7 .1. 5 Weighted graph 7 .1. 6 Walks and paths 19 1 19 1 19 1 19 1 19 2 19 2 19 3 19 3 x CONTENTS 7 .1. 7 Connected graphs 7 .1. 8 Trees 7 .1. 9 Spanning tree 7 .1. 10 MST computation 7 .1. 11 Shortest path spanning tree 7.2 Graph Theory 7.3 Routing with Topology Aggregation 7.4 Network and Aggregation Models 7.4 .1 Line segment representation 7.4.2... Sharing in Wireless Networks 12 .6 .1 Channel capacity 12 .6.2 Channel models 12 .6.3 Diversity reception 12 .6.4 Performance evaluation 12 .6.5 Multiple access techniques and user capacity 12 .6.6 Multiuser detection 373 375 376 379 380 382 384 385 388 389 392 395 400 404 406 408 408 409 410 411 412 412 414 415 416 417 418 425 426 427 428 430 4 31 432 432 433 435 436 439 439 440 440 4 41 4 41 442 CONTENTS 12 .6.7... Sensor Networks References 539 5 41 5 41 543 548 550 5 51 553 556 557 557 5 61 563 563 564 564 567 5 71 572 15 Security 15 .1 Authentication 15 .1. 1 Attacks on simple cryptographic authentication 15 .1. 2 Canonical authentication protocol 15 .2 Security Architecture 15 .3 Key Management 15 .3 .1 Encipherment 15 .3.2 Modification detection codes 15 .3.3 Replay detection codes 15 .3.4 Proof of knowledge of a key 15 .3.5... Routing 13 .7 .1 Wireless links reliability 13 .7.2 Routing 13 .7.3 Routing information 13 .7.4 Token-based routing 13 .7.5 Delay-constrained routing 13 .7.6 Tokens 13 .7.7 Forwarding the received tokens 13 .7.8 Bandwidth-constrained routing 13 .7.9 Forwarding the received tickets 13 .7 .10 Performance example References 465 465 468 472 485 487 488 489 4 91 4 91 494 496 497 5 01 5 01 503 505 512 514 520 5 21 5 21 5 21 522 . 17 9 References 18 8 7 Adaptive Network Layer 19 1 7 .1 Graphs and Routing Protocols 19 1 7 .1. 1 Elementary concepts 19 1 7 .1. 2 Directed graph 19 1 7 .1. 3 Undirected graph 19 2 7 .1. 4 Degree of a vertex 19 2 7 .1. 5. delay 11 1 4 .1. 9 Feedback process and mode command reception 11 2 4 .1. 10 Link service rate with imperfections 11 2 4 .1. 11 Sensitivity of state probabilities to hysteresis region width 11 4 4 .1. 12 Estimation. SCAC system 411 12 .4.9 Dynamic SCAC system with QoS differentiation 412 12 .4 .10 Example of a single-class system 412 12 .4 .11 NRT packet access control 414 12 .4 .12 Assumptions 415 12 .4 .13 Estimation

Ngày đăng: 14/08/2014, 09:21

TỪ KHÓA LIÊN QUAN