Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
62,708
result(s) for
"Mobile communication systems"
Sort by:
An introduction to LTE
by
Cox, Christopher
in
Long-Term Evolution (Telecommunications)
,
Mobile communication systems
,
Mobile communication systems -- Standards
2012
An Introduction to LTE explains the technology used by 3GPP Long Term Evolution. The book covers the whole of LTE, both the techniques used for radio communication between the base station and the mobile phone, and the techniques used for signalling communication and data transport in the evolved packet core. It avoids unnecessary detail, focussing instead on conveying a sound understanding of the entire system.
The book is aimed at mobile telecommunication professionals, who want to understand what LTE is and how it works. It is invaluable for engineers who are working on LTE, notably those who are transferring from other technologies such as UMTS and cdma2000, those who are experts in one part of LTE but who want to understand the system as a whole, and those who are new to mobile telecommunications altogether. It is also relevant to those working in non technical roles, such as project managers, marketing executives and intellectual property consultants. On completing the book, the reader will have a clear understanding of LTE, and will be able to tackle the more specialised books and the 3GPP specifications with confidence.
Key features -
* Covers the latest developments in release 10 of the 3GPP specifications, including the new capabilities of LTE-Advanced
* Includes references to individual sections of the 3GPP specifications, to help readers understand the principles of each topic before going to the specifications for more detailed information
* Requires no previous knowledge of mobile telecommunications, or of the mathematical techniques that LTE uses for radio transmission and reception
MDM : Fundamentals, Security, and the Modern Desktop : Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
\"The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop--for PCs, tablets, and phones--through the common Mobile Device Management (MDM) layer. MDM gives organizations a way to configure settings that achieve their administrative intent without exposing every possible setting. One benefit of MDM is that it enables organizations to apply broader privacy, security, and application management settings through lighter and more efficient tools. MDM also allows organizations to target Internet-connected devices to manage policies without using Group Policy (GP) that requires on-premises domain-joined devices. This makes MDM the best choice for devices that are constantly on the go. With Microsoft making this shift to using Mobile Device Management (MDM), a cloud-based policy-management system, IT professionals need to know how to do similar tasks they do with Group Policy, but now using MDM, with its differences and pitfalls...Renowned expert and Microsoft Group Policy and Enterprise Mobility MVP Jeremy Moskowitz teaches you MDM fundamentals, essential troubleshooting techniques, and how to manage your enterprise desktops.\"--provided by publisher.
Fundamentals of 5G Mobile Networks
by
Rodriguez, Jonathan
in
Communication, Networking and Broadcast Technologies
,
Mobile communication systems
,
Mobile communication systems -- Technological innovations
2015
Fundamentals of 5G Mobile Networks provides an overview of the key features of the 5th Generation (5G) mobile networks, discussing the motivation for 5G and the main challenges in developing this new technology. This book provides an insight into the key areas of research that will define this new system technology paving the path towards future research and development. The book is multi-disciplinary in nature, and aims to cover a whole host of intertwined subjects that will predominantly influence the 5G landscape, including the future Internet, cloud computing, small cells and self-organizing networks (SONs), cooperative communications, dynamic spectrum management and cognitive radio, Broadcast-Broadband convergence , 5G security challenge, and green RF. This book aims to be the first of its kind towards painting a holistic perspective on 5G Mobile, allowing 5G stakeholders to capture key technology trends on different layering domains and to identify potential inter-disciplinary design aspects that need to be solved in order to deliver a 5G Mobile system that operates seamlessly.
5G for the Connected World
by
Henri Orland
,
Devaki Chandramouli
,
Rainer Liebhart
in
Broadband communication systems
,
Communication, Networking and Broadcast Technologies
,
Components, Circuits, Devices and Systems
2019
<p><b>COMPREHENSIVE HANDBOOK DEMYSTIFIES 5G FOR TECHNICAL AND BUSINESS PROFESSIONALS IN MOBILE TELECOMMUNICATION FIELDS</b> <p>Much is being said regarding the possibilities and capabilities of the emerging 5G technology, as the evolution towards 5G promises to transform entire industries and many aspects of our society. <i>5G for the Connected World</i> offers a comprehensive technical overview that telecommunication professionals need to understand and take advantage of these developments. <p>The book offers a wide-ranging coverage of the technical aspects of 5G (with special consideration of the 3GPP Release 15 content), how it enables new services and how it differs from LTE. This includes information on potential use cases, aspects of radio and core networks, spectrum considerations and the services primarily driving 5G development and deployment. <p>The text also looks at 5G in relation to the Internet of Things, machine to machine communication and technical enablers such as LTE-M, NB-IoT and EC-GSM. Additional chapters discuss new business models for telecommunication service providers and vertical industries as a result of introducing 5G, and strategies for staying ahead of the curve. Other topics include: <ul> <li>Key features of the new 5G radio such as descriptions of new waveforms, massive MIMO and beamforming technologies, as well as spectrum considerations for 5G radio regarding all possible bands</li> <li>Drivers, motivations and an overview of the new 5G system – especially RAN architecture and technology enablers (e.g. service-based architecture, compute-storage split and network exposure) for native cloud deployments</li> <li>Mobile edge computing, Non-3GPP access, Fixed-Mobile Convergence</li> <li>Detailed overview of mobility management, session management and Quality of Service frameworks</li> <li>5G security vision and architecture</li> <li>Ultra-low latency and high reliability use cases and enablers, challenges and requirements (e.g. remote control, industrial automation, public safety and V2X communication)</li> <li>An outline of the requirements and challenges imposed by a massive number of devices connected to cellular networks</li> </ul> <p>While some familiarity with the basics of 3GPP networks is helpful, <i>5G for the Connected World</i> is intended for a variety of readers. It will prove a useful guide for telecommunication professionals, standardization experts, network operators, application developers and business analysts (or students working in these fields) as well as infrastructure and device vendors looking to develop and integrate 5G into their products, and deploy 5G radio and core networks.
A Comprehensive Guide to 5G Security
by
Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila, Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
in
Communication, Networking and Broadcast Technologies
,
Components, Circuits, Devices and Systems
,
Computing and Processing
2018
<p> <strong>The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices </strong> <p> Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. <p> 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. <p>Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: <ul> <li>Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it</li> <li>Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks</li> <li>Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views</li> <li>Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts</li> </ul> <br> <p> Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, <em>A Comprehensive Guide to 5G Security</em> is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
Coordinated multi-point in mobile communications : from theory to practice
\"A self-contained guide to coordinated multi-point (CoMP), this comprehensive book covers everything from theoretical basics to practical implementation. Addressing a wide range of topics, it highlights the potential gains of CoMP, the fundamental degrees of freedom involved and the key challenges of using CoMP in practice. The editors and contributors bring unique real-world experience from running the world's first and largest test beds for LTE-Advanced, and recent field trial results from these tests are presented. With detailed insight into the realistic potential of CoMP as a key technology for LTE-Advanced and beyond, this is a must-read resource for professionals and students who want the big picture on CoMP or require in-depth knowledge of how to build cellular communication systems for the future\"--Provided by publisher.
Taken for grantedness : the embedding of mobile communication into society
2012
An examination of how the mobile phone has become part of the fabric of society-as did such earlier technologies as the clock and the car.Why do we feel insulted or exasperated when our friends and family don't answer their mobile phones? If the Internet has allowed us to broaden our social world into a virtual friend-net, the mobile phone is an instrument of a more intimate social sphere. The mobile phone provides a taken-for-granted link to the people to whom we are closest; when we are without it, social and domestic disarray may result. In just a few years, the mobile phone has become central to the functioning of society. In this book, Rich Ling explores the process by which the mobile phone has become embedded in society, comparing it to earlier technologies that changed the character of our social interaction and, along the way, became taken for granted.Ling, drawing on research, interviews, and quantitative material, shows how the mobile phone (and the clock and the automobile before it) can be regarded as a social mediation technology, with a critical mass of users, a supporting ideology, changes in the social ecology, and a web of mutual expectations regarding use. By examining the similarities and synergies among these three technologies, Ling sheds a more general light on how technical systems become embedded in society and how they support social interaction within the closest sphere of friends and family.