Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security
- 出版商: CRC
- 出版日期: 2016-12-06
- 售價: $5,660
- 貴賓價: 9.5 折 $5,377
- 語言: 英文
- 頁數: 748
- 裝訂: Hardcover
- ISBN: 1498726356
- ISBN-13: 9781498726351
-
相關分類:
Wireless-networks、資訊安全
海外代購書籍(需單獨結帳)
相關主題
商品描述
Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security provides a broad overview of wireless network spectrum sharing in seven distinct sections: The first section examines the big picture and basic principles, explaining the concepts of spectrum sharing, hardware/software function requirements for efficient sharing, and future trends of sharing strategies.
The second section contains more than 10 chapters that discuss differing approaches to efficient spectrum sharing. The authors introduce a new coexistence and sharing scheme for multi-hop networks, describe the space-time sharing concept, introduce LTE-U, and examine sharing in broadcast and unicast environments. They then talk about different cooperation strategies to achieve mutual benefits for primary users (PU) and secondary users (SU), discuss protocols in a spectrum sharing context, and provide different game theory models between PUs and SUs.
The third section explains how to model the interactions of PUs and SUs, using an efficient calculation method to determine spectrum availability. Additionally, this section explains how to use scheduling models to achieve efficient SU traffic delivery. The subject of the fourth section is MIMO-oriented design. It focuses on how directional antennas and MIMO antennas greatly enhance wireless network performance. The authors include a few chapters on capacity/rate calculations as well as beamforming issues under MIMO antennas.
Power control is covered in the fifth section which also describes the interference-aware power allocation schemes among cognitive radio users and the power control schemes in cognitive radios. The sixth section provides a comprehensive look at security issues, including different types of spectrum sharing attacks and threats as well as corresponding countermeasure schemes. The seventh and final section covers issues pertaining to military applications and examines how the military task protects its data flows when sharing the spectrum with civilian applications.