General Introduction / 1: |
History and Development / 1.1: |
Phase One: Theoretical Foundations / 1.1.1: |
Second Phase: Development and Applications / 1.1.2: |
Third Phase: Mobile Services for the General Public / 1.1.3: |
Evolution of Mobile Systems / 1.1.4: |
Equipment Development / 1.1.5: |
Differences Between Fixed Networks and Mobile Networks / 1.2: |
Limited Spectrum / 1.2.1: |
Fluctuating Quality of Radio Links / 1.2.2: |
Unknown and Variable Access Points / 1.2.3: |
Management of the Spectrum and Standardization / 1.3: |
International Organizations / 1.3.1: |
European Organizations / 1.3.2: |
Some U.S. Organizations / 1.3.3: |
Contents of the Book / 1.4: |
First Part (Chapters 2-8) / 1.4.1: |
Second Part (Chapters 9-14) / 1.4.2: |
Frequency Bands and Some Services and Applications / Appendix 1A: |
References |
Selected Bibliography |
Propagation in a Mobile Radio Environment / 2: |
Antenna Basic Elements / 2.1: |
Principal Antenna Characteristics / 2.1.1: |
Common Antennas / 2.1.2: |
Coupling Loss Between Antennas / 2.1.3: |
Parameters to Be Specified When Designing or Selecting Antennas / 2.1.4: |
Power (Link) Budget / 2.1.5: |
Mobile Radio Propagation / 2.2: |
Pathloss / 2.2.1: |
Attenuation Caused by Vegetation / 2.2.2: |
Attenuation Due to Atmosphere / 2.2.3: |
Diffraction and Fresnel Region / 2.2.4: |
Multipath / 2.2.5: |
Delay-spread / 2.2.6: |
Rayleigh Fading / 2.2.7: |
Doppler Shift / 2.2.8: |
Indoor Environment Propagation Characteristics / 2.2.9: |
Propagation in Dense Urban Environments / 2.2.10: |
Conclusions / 2.2.11: |
Interference and Noise / 2.3: |
Noise / 2.3.1: |
Interference / 2.3.2: |
Propagation Prediction Models / 2.4: |
Statistical Methods / 2.4.1: |
Exact Methods and Ray Tracing/Launching / 2.4.2: |
Noise That Can Affect Radio Reception / 2.5: |
Internal Noise Sources / 2A.1: |
External Noise Sources / 2A.2: |
Decibels / Appendix 2B: |
Determination of the Plane Earth Propagation Formula / Appendix 2C: |
Access--Radio Channel Definitions and Resource Access / 3: |
Multiple-Access Methods / 3.1: |
Definitions--Narrowband and Wideband Systems / 3.1.1: |
Frequency-Division Multiple Access / 3.1.2: |
Time-Division Multiple Access / 3.1.3: |
Code-Division Multiple Access / 3.1.4: |
Random Access Protocols / 3.1.5: |
Protocols Nonslotted and Without Carrier Sensing / 3.2.1: |
Carrier Sensing Protocols / 3.2.2: |
Non-Sensing Slotted Protocols / 3.2.3: |
Reservation-Based Framed Protocols / 3.2.4: |
TDMA System Measures of Efficiency / 3.3: |
Throughputs of Some Random Access Protocols / Appendix 3B: |
Protecting Against Channel Imperfections / 4: |
Mechanisms Implemented in the Transmission System / 4.1: |
Review of the Transmission System / 4.1.1: |
Modulation / 4.1.2: |
Error Control: ARQ and FEC / 4.1.3: |
Equalization / 4.1.4: |
Interleaving / 4.1.5: |
Diversity Techniques / 4.2: |
Microdiversity Techniques / 4.2.1: |
Macrodiversity Techniques / 4.2.2: |
Adaptive Antennas / 4.3: |
Array Antennas / 4.3.1: |
Smart Antennas / 4.3.2: |
Space-Division Multiple Access Technique (SDMA) / 4.3.3: |
Advantages and Drawbacks of Array Antennas / 4.3.4: |
Security / 4.4: |
Definitions and General Problems / 5.1: |
Complexity of the Problem / 5.1.1: |
Intrinsic and Extrinsic Protection / 5.1.2: |
Attacks and Origin of Security Problems / 5.1.3: |
Security Services and Mechanisms as Defined in the OSI Model / 5.1.4: |
Confidentiality Problems / 5.2: |
Confidentiality Levels / 5.2.1: |
Data to Be Protected / 5.2.2: |
Protection Methods / 5.3: |
Communications Confidentiality: Ciphering or Encryption / 5.3.1: |
Location Confidentiality by Use of Implicit Addresses / 5.3.2: |
Access Security: Integrity and Authentication / 5.3.3: |
Personalization and Telepersonalization / 5.3.4: |
Some Methods in the Struggle Against Fraud / 5.3.5: |
Examples of Security Feature Implementation / 5.3.6: |
Authentication in the CT2 and DECT Systems / 5.4.1: |
Authentication in Cellular Systems / 5.4.2: |
Conclusions--Future Systems Security Features / 5.5: |
Cryptographic Key Distribution Methods / Appendix 5A: |
Selected Bibliography on Cryptography |
Resource Management in Cellular Systems / 6: |
History / 6.1: |
The Cellular Concept / 6.2: |
Frequency Reuse / 6.2.1: |
Reuse Distance and Number of Cells per Cluster / 6.2.2: |
Capacities / 6.2.3: |
Link Budget / 6.2.4: |
System Capacity Expansion Techniques and Network Quality Improvement / 6.2.5: |
Frequency Hopping / 6.3.1: |
Discontinuous Transmission and Packet Transmission Mode / 6.3.2: |
Power Control / 6.3.3: |
Dynamic Channel Allocation / 6.3.4: |
Basic Cellular System Architecture / 6.4: |
The Network Subsystem / 6.4.1: |
The BSS / 6.4.2: |
Cellular Planning and Engineering / 7: |
Cellular Planning Elements / 7.1: |
Importance of the Cellular Planning Process / 7.1.1: |
Objectives and Problems in Cellular Planning / 7.1.2: |
Coverage Objectives / 7.1.3: |
Main Steps / 7.1.4: |
Traffic Dimensioning Basics / 7.2: |
Traffic Load Prediction / 7.2.1: |
Quality of Service Parameters / 7.2.2: |
Cell Dimensioning / 7.2.3: |
Dimensioning Process for a GSM Network / 7.2.4: |
Conclusion / 7.2.5: |
Planning Stages of a Cellular Network / 7.3: |
Radio Planning / 7.3.1: |
Fixed Network Planning / 7.3.2: |
System Tuning: Example of the GSM BSS / 7.3.3: |
Increasing the Capacity of a Cellular Network / 7.5: |
Adding New Channels / 7.5.1: |
Channel Borrowing / 7.5.2: |
Modification of the Cell Reuse Pattern / 7.5.3: |
Cell Splitting / 7.5.4: |
Sectorization / 7.5.5: |
Down-Tilting / 7.5.6: |
Cell Layering / 7.5.7: |
Trends Toward the Microcellular Techniques / 7.5.8: |
Capacity Solutions Comparison / 7.5.9: |
Quality of Service / 7.6: |
Erlang Formulas / Appendix 7B: |
Erlang Table Example / Appendix 7C: |
Mobility Management / 8: |
Management of Radio Mobility: The Handover Procedure / 8.1: |
Basic Handover Principle / 8.1.1: |
Growing Importance of the Handover Procedure / 8.1.2: |
The Various Handover Phases / 8.1.3: |
Various Kinds of Handover Seen by the Network / 8.1.4: |
Evaluation of the Handover Procedure / 8.1.5: |
Handover Traffic / 8.1.6: |
Handover Procedures in Analog Systems / 8.1.7: |
Handover in Second-Generation Systems / 8.1.8: |
Handover in Third-Generation Systems / 8.1.9: |
Network Mobility: Cell Selection and Roaming / 8.1.10: |
Cell Selection/Reselection Process / 8.2.1: |
Location Management / 8.2.2: |
Mobility Management in the Fixed and Mobile Networks: The UPT Concept / 8.2.3: |
Location Management Methods for Third-Generation Systems / 8.3: |
Memoryless Methods / 8A.1: |
Database Architecture / 8A.1.1: |
Optimizing Fixed Network Architecture / 8A.1.2: |
Combining Location Areas and Paging Areas / 8A.1.3: |
Multi-layer LAs / 8A.1.4: |
A Procedure for Reducing Signaling Message Exchanges / 8A.1.5: |
Memory-Based Methods / 8A.2: |
Short-Term Observation for Dynamic LA and PA Sizes Assigning/Adjusting / 8A.2.1: |
Individual User Patterns / 8A.2.2: |
Predicting Short-Term Movements of the Subscriber / 8A.2.3: |
Mobility Statistics / 8A.2.4: |
Main UPT Features / Appendix 8B: |
Professional Mobile Radio / 9: |
Historic and General Background / 9.1: |
Definition and General Background / 9.1.1: |
PMR Categories According to User Needs / 9.1.2: |
Categorization of Users and Organizations / 9.1.3: |
PMR General Categorization / 9.1.4: |
PMR Categorization According to Their Operation / 9.1.5: |
PMR Services / 9.2: |
PMR Characteristics / 9.2.1: |
Services Offered / 9.2.2: |
Conventional PMR Systems / 9.2.3: |
Architecture of Conventional Radio Networks / 9.3.1: |
Weaknesses of Conventional Radio Systems / 9.3.2: |
Trunk Radio Networks / 9.4: |
History of Trunked Systems / 9.4.1: |
Efficiency of the Trunking Method / 9.4.2: |
Trunking Architecture / 9.4.3: |
Engineering / 9.4.4: |
TETRA / 9.4.5: |
TETRAPOL / 9.4.6: |
Conventional PMRs Comparison/Analog Trunk/Digital Trunk / 9.4.7: |
Short-Range Business Radio / 9.4.8: |
PMR Evolution / 9.5: |
Cordless Systems and Applications / 10: |
Basic Principles and Applications / 10.1: |
Characteristics / 10.1.1: |
Applications / 10.1.2: |
Examples of Cordless Systems / 10.2: |
CT2 / 10.2.1: |
DECT / 10.2.2: |
PHS / 10.2.3: |
PACS System / 10.2.4: |
Paging Systems / 10.3: |
Concepts and Basic Principles / 11.1: |
Architecture / 11.1.1: |
Signaling Methods / 11.1.2: |
Transmission Channels / 11.1.3: |
Services / 11.1.4: |
Examples of One-Way Paging Systems / 11.1.5: |
Eurosignal / 11.2.1: |
POCSAG / 11.2.2: |
Ermes / 11.2.3: |
Cellular Networks / 11.3: |
First-Generation Systems / 12.1: |
Radiocom 2000 System / 12.1.1: |
AMPS / 12.1.2: |
NMT System / 12.1.3: |
Second-Generation Systems / 12.2: |
The GSM System / 12.2.1: |
The D-AMPS System / 12.2.2: |
The IS-95 System / 12.2.3: |
Personal Digital Cellular System / 12.2.4: |
GSM Functionality in Its Different Phases / 12.3: |
Wireless Data Networks / 13: |
Wireless Local Area Networks / 13.1: |
Types of Wireless LAN Systems / 13.1.1: |
Classification According to the Technique Used / 13.1.2: |
Wireless LANs Applications / 13.1.3: |
The HIPERLAN Standard / 13.1.4: |
The 802.11 Standard / 13.1.5: |
Wide Area Wireless Data Networks / 13.1.6: |
Types of Systems and Evolution / 13.2.1: |
ARDIS / 13.2.2: |
The Mobitex System / 13.2.3: |
Cellular Digital Packet Data / 13.2.4: |
General Packet Radio Service / 13.2.5: |
About The Author / 13.3: |
Index |
General Introduction / 1: |
History and Development / 1.1: |
Phase One: Theoretical Foundations / 1.1.1: |
Second Phase: Development and Applications / 1.1.2: |
Third Phase: Mobile Services for the General Public / 1.1.3: |
Evolution of Mobile Systems / 1.1.4: |