NEW CONTENT TO THIS EDITION
• 150+ New pages, new illustrations and call flows • Covers 3GPP Release 9, 10 and 11 in addition to release 8 • Expanded coverage on Diameter protocol, interface and messages • Architecture overview • Positioning • User Data Management • eMBMS (LTE Broadcasting) • H(e)NodeB/Femto Cells • LIPA/SIPTO/Breakout architectures • Deployment Scenarios • WiFi interworking • VoLTE/MMTel, CS fallback and SRVCCSAE is the core network that supports LTE, the next key stage in development of the UMTS network to provide mobile broadband. It aims to provide an efficient, cost-effective solution for the ever-increasing number of mobile broadband subscribersThere is no other book on the market that covers the entire SAE network architecture; this book summarizes the important parts of the standards, but goes beyond mere description and offers real insight and explanation of the technologyFully updated with the latest developments since the first edition published, and now including additional material and insights on industry trends and views regarding future potential applications of SAE
This highly accessible and easy-to-read synthesis of complex subjects asks some of the obvious questions about money and finance that few of us stop to think about.
For instance, what is the real “value” of money? Well, astonishingly, nobody agrees. But most people seem to accept that it is lent into existence by the commercial banks. When you stash money in the bank, they must keep around 8 percent of that loan on deposit—in case there's a run on the bank—but all the rest is lent out again many times over. In other words, most of our mortgages and bank loans are created as if by magic by a stroke of the pen.
That's the strange truth behind modern money. We don't mine it, we don't find it on a beach, it bears no relation to anything real, but still some people have vast amounts of it and some people have none at all. And we hardly ever talk about it.
This book is an essential resource for professionals and students who need to understand the latest developments in SAE and EPC, the 'engine' that connects broadband access to the internet.
All of the authors have from their positions with Ericsson been actively involved in GPRS, SAE and 3GPP from a business and technical perspective for many years. Several of the authors have also been actively driving the standardization efforts within 3GPP.
"There is no doubt that this book, which appears just when the mobile industry starts its transition away from legacy GSM/GPRS and UMTS networks into the future will become the reference work on SAE/LTE. There are no better qualified persons than the authors of this book to provide both communication professionals and an interested general public with insights into the inner workings of SAE/LTE. Not only are they associated with one of the largest mobile network equipment vendors in the world, they have all actively contributed to and, in some cases, been the driving forces behind the development of SAE/LTE within 3GPP." - from the foreword by Dr. Ulf Nilsson, TeliaSonera R&D, Mobility Core and Connectivity
"The authors have done an excellent job in writing this book. Their familiarity with the requirements, concepts and solution alternatives, as well as the standardization work allows them to present the material in a way that provides easy communication between Architecture and Standards groups and Planning/ Operational groups within service provider organizations." - from the foreword by Dr. Kalyani Bogineni, Principal Architect, VerizonUp-to-date coverage of SAE including the latest standards developmentEasily accessible overview of the architecture and concepts defined by SAEThorough description of the Evolved Packet Core for LTE, fixed and other wireless accessesComprehensive explanation of SAE key concepts, security and Quality-of-ServiceCovers potential service and operator scenarios including interworking with existing 3GPP and 3GPP2 systemsDetailed walkthrough of network entities, protocols and proceduresWritten by established experts in the SAE standardization process, all of whom have extensive experience and understanding of its goals, history and vision
• Shows how to use RCS to create innovative applications for rapid uptake by end-users
• Covers service and operator scenarios for the IMS architecture
• Explains IMS architecture and protocols, from an application developer’s perspective
IMS Application Developer’s Handbook gives a hands-on view of exactly what needs to be done by IMS application developers to develop an application and take it "live" on an operator’s network. It offers practical guidance on building innovative applications using the features and capabilities of the IMS network, and shows how the rapidly changing development environment is impacting on the business models employed in the industry and how existing network solutions can be moved towards IMS. Elaborating on how IMS applies basic VoIP principles and techniques to realize a true multi-access, and multimedia network, this book ensures that developers know how to use IMS most effectively for applications.
Written by established experts in the IMS core network and IMS service layer, with roots in ISDN and GSM, with experience from working at Ericsson, who have been active in standardisation and technology development and who have been involved in many customer projects for the implementation of fixed mobile converged IMS network and service. The authors of this book bring their in-depth and extensive knowledge in the organizations involved in the IMS standardization and its architecture.Clear, concise and comprehensive view of the IMS and Rich Communication Suite (RCS) for developersWritten by established experts in the IMS services layer, who have been involved in many customer projects for the implementation of fixed mobile converged IMS network and serviceCovers potential service and operator scenarios for the IMS architecture; it is significantly more than merely a description of the IMS standards
These three types of quite diverse systems share a lot of commonalities on the one hand and, on the other hand, have some complementary aspects in common that make a combination of these systems into a coherent system vision promising. In particular, the important notions of control, heterogeneity, wireless communication, dynamic and ad-hoc nature and cost are prevalent to various degrees in each of these systems.
A future system concept needs to combine the strong points of all three system concepts in at least these functional aspects. It has to provide support for the control of physical processes like today’s embedded systems do, have as good support for device heterogeneity and spontaneity of usage as required by pervasive and ubiquitous computing approaches, and has to be as cost efficient and wirelessly agile as wireless sensor networks are. These new systems consist, therefore, of individual entities or objects that jointly strive to reach a common goal, which will typically be a goal in sensing or control, and are dynamically and loosely federating themselves for cooperation, taking care not to overtax their available resources.
This book presents a roadmap to these concepts which are summarized as cooperating objects.
The book presents of the main results provided by the corresponding European project "CONET".
Why are we still addicted to oil and petrol despite the disastrous consequences? Why, three generations after the Beveridge Report, are his Five Giants – Want, Disease, Idleness, Ignorance and Squalor – still so much with us? Why did teenage pregnancies go up despite the UK government spending up to £100 million over a decade to prevent them? Why do so few of the public clocks tell the right time or train lavatories have water in their taps?
There is a growing understanding, not that people are infallible, or that they are endlessly trustworthy and benevolent – but they are nonetheless what makes change possible. This book uses this idea to set out the Ten New Rules for organizations, reveals where they are working already – with the latest developments in ideas like system thinking and co-production. It explains the future in terms of the People Principle: If you employ imaginative and effective people, especially on the frontline, and give them the freedom to innovate, they will succeed. If you don't, they will fail.
Autonomic Communication explores conceptual models and associated technologies that will uphold the vision of autonomic communication where devices and applications blur the boundaries between virtual and real worlds as they seamlessly interconnect, intelligently cooperate, and autonomously manage themselves.
Written by leading international researchers, the contributions give testimony to the challenges and prospects of this rapidly growing area. The volume is composed of chapters covering a wide range of issues related to autonomic communication.
Part I Autonomic Communication Infrastructure
Social-based autonomic routing in opportunistic networks
A Collaborative Knowledge Plane for Autonomic Networks
A Rate Feedback Predictive Control Scheme Based on Neural Network and Control Theory for Autonomic Communication
Part II Autonomic Communication Services and Middleware
Hovering Information – Self-Organizing Information that Finds its Own Storage
The CASCADAS Framework for Autonomic Communications
Autonomic Middleware for Automotive Embedded Systems
Social Opportunistic Computing: Design for Autonomic User-Centric Systems
Programming and Validation Techniques for Reliable Goal-driven Autonomic Software
Part III Applications to Ad-Hoc (Sensor) Networks and Pervasive Systems
Autonomic Communication in Pervasive Multimodal Multimedia Computing System
Self-healing for Autonomic Pervasive Computing
Map-based Design for Autonomic Wireless Sensor Networks
An Efficient, Scalable and Robust P2P Overlay for Autonomic Communication
Autonomic and Coevolutionary Sensor Networking
Autonomic Communication provides a vital reference to both researchers and practitioners, particularly those in networking, future and emerging technologies, mobile systems, autonomous technologies, computational intelligence, and embedded systems. The book is also a useful tool for graduate students and senior undergraduate students in courses on networking, autonomous management web, services, network application modeling, knowledge-based systems, and evolutionary software.
By providing a careful balance between the theory and the practical aspects, this book has been authored by several experts from academia and industry, thereby offering a valuable understanding of the vision, the domain, the processes and the results of the research. It has several illustrations and tables to clearly exemplify the concepts and results examined in the text and these are supported by four real-life case-studies.
We are witnessing rapid advances in the industrial automation, mainly driven by business needs towards agility and supported by new disruptive advances both on the software and hardware side, as well as the cross-fertilization of concepts and the amalgamation of information and communication technology-driven approaches in traditional industrial automation and control systems. This book is intended for technology managers, application designers, solution developers, engineers working in industry, as well as researchers, undergraduate and graduate students of industrial automation, industrial informatics and production engineering.
Projects and tutorials include:Controlling devices over BluetoothUsing Python and Arduino programming environments on EdisonTracking objects with a webcam and OpenCVResponding to voice commands and talking backUsing and configuring Linux on Edison
The book is aimed at mobile telecommunication professionals, who want to understand what LTE is and how it works. It is invaluable for engineers who are working on LTE, notably those who are transferring from other technologies such as UMTS and cdma2000, those who are experts in one part of LTE but who want to understand the system as a whole, and those who are new to mobile telecommunications altogether. It is also relevant to those working in non technical roles, such as project managers, marketing executives and intellectual property consultants. On completing the book, the reader will have a clear understanding of LTE, and will be able to tackle the more specialised books and the 3GPP specifications with confidence.
Key features -Covers the latest developments in release 10 of the 3GPP specifications, including the new capabilities of LTE-Advanced Includes references to individual sections of the 3GPP specifications, to help readers understand the principles of each topic before going to the specifications for more detailed information Requires no previous knowledge of mobile telecommunications, or of the mathematical techniques that LTE uses for radio transmission and reception
Iridium the satellite system was a mind-boggling technical accomplishment, surely the future of communication. The only problem was that Iridium the company was a commercial disaster. Only months after launching service, it was $11 billion in debt, burning through $100 million a month and crippled by baroque rate plans and agreements that forced calls through Moscow, Beijing, Fucino, Italy, and elsewhere. Bankruptcy was inevitable—the largest to that point in American history. And when no real buyers seemed to materialize, it looked like Iridium would go down as just a “science experiment.”
That is, until Dan Colussy got a wild idea. Colussy, a former head of Pan-Am now retired and working on his golf game in Palm Beach, heard about Motorola’s plans to “de-orbit” the system and decided he would buy Iridium and somehow turn around one of the biggest blunders in the history of business.
In Eccentric Orbits, John Bloom masterfully traces the conception, development, and launching of Iridium and Colussy’s tireless efforts to stop it from being destroyed, from meetings with his motley investor group, to the Clinton White House, to the Pentagon, to the hunt for customers in special ops, shipping, aviation, mining, search and rescue—anyone who would need a durable phone at the end of the Earth. Impeccably researched and wonderfully told, Eccentric Orbits is a rollicking, unforgettable tale of technological achievement, business failure, the military-industrial complex, and one of the greatest deals of all time.
—Tom Vanderbilt, New York Times bestselling author of Traffic
In Tubes, Andrew Blum, a correspondent at Wired magazine, takes us on an engaging, utterly fascinating tour behind the scenes of our everyday lives and reveals the dark beating heart of the Internet itself. A remarkable journey through the brave new technological world we live in, Tubes is to the early twenty-first century what Soul of a New Machine—Tracy Kidder’s classic story of the creation of a new computer—was to the late twentieth.
This second edition introduces new material for the current state of the industry, such as the new features of LTE in Releases 11 and 12, notably coordinated multipoint transmission and proximity services; the main short- and long-term solutions for LTE voice calls, namely circuit switched fallback and the IP multimedia subsystem; and the evolution and current state of the LTE market. It also extends some of the material from the first edition, such as inter-operation with other technologies such as GSM, UMTS, wireless local area networks and cdma2000; additional features of LTE Advanced, notably heterogeneous networks and traffic offloading; data transport in the evolved packet core; coverage and capacity estimation for LTE; and a more rigorous treatment of modulation, demodulation and OFDMA. The author breaks down the system into logical blocks, by initially introducing the architecture of LTE, explaining the
techniques used for radio transmission and reception and the overall operation of the system, and concluding with more specialized topics such as LTE voice calls and the later releases of the specifications. This methodical approach enables readers to move on to tackle the specifications and the more advanced texts with confidence.
LTE for UMTS is one of the first books to provide a comprehensive guide to the standards and technologies of LTE. Key features of the book include:Covers all the key aspects of LTE in a systematic manner Presents full description of 3GPP Release 8 LTE Examines the expected performance of LTE Written by experts actively involved in the 3GPP standards and product development.
This edition has been thoroughly revised and updated to reflect the large extensions to LTE as introduced in 3GPP Releases 12 and 13 and the role of LTE in the upcoming 5G era. New to this edition includes updated content on:
4G and 5G Radio Access Spectrum for 4G and 5G Machine-Type Communication Device-to-Device Communication License-assisted Access Full-dimension MIMOSmall-cell enhancements, eIMTA, FDD+TDD aggregation, dual connectivity Requirements on and general structure of 5G wireless access, addressing the existing and new usage scenarios for 5GTechnical solutions for the new 5G radio-access technology
The authors of this book all work at Ericsson Research and have been deeply involved in 3G and 4G development and standardization. They are leading experts in the field and are today actively contributing to the standardization of 4G and 5G within 3GPP.The leading book on 3GPP specifications for LTE, LTE-Advanced, and LTE-Advanced Pro covering up to and including Release 13, written by Ericsson engineers who are heavily involved in the development of 3GPP specificationsTen new chapters and coverage of all major features introduced with Release 12 and 13Two completely new chapters on 5G wireless access including a detailed description of the key technology components under development by 3GPP
Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate information.Provides a practical, fast-track approach to protecting a mobile device from security threats Discusses important topics such as specific hacker protection, loss/theft protection, backing up and restoring data, and more Offers critical advice for deploying enterprise network protection for mobile devices Walks you through the advantages of granular application access control and enforcement with VPN
Business can be mobile without being vulnerable?and Mobile Device Security For Dummies shows you how.
RF (radio frequency) and wireless technologies drive communication today. This technology and its applications enable wireless phones, portable device roaming, and short-range industrial and commercial application communication such as the supply chain management wonder, RFID. Up-to-date information regarding software defined RF, using frequencies smarter, and using more of the spectrum, with ultrawideband technology is detailed.A 360-degree view from best-selling authors including Roberto Aiello, Bruce Fette, and Praphul ChandraHot topics covered including ultrawideband and cognitive radio technologiesThe ultimate hard-working desk reference: all the essential information, techniques, and tricks of the trade in one volume
To move to higher-speed networks that can cater to customer demand for mobile broadband multimedia applications, the 3GPP has developed the latest LTE-Advanced (LTE Release 10) standard, which will be fixed in December 2010. This book focuses on LTE and LTE-Advanced, and provides engineers with real insight and understanding into the why and how of the standard and its related technologies. This book is written by engineers from Ericsson--the world's leading telecommunications supplier--who was heavily involved in the development of the standard.Follow-up to the very successful 3G Evolution, now focusing on LTE and LTE Advanced standard and its accompanying technologies Complete and clear explanation of LTE Advanced by the people who played a leading role in its development, which will enable engineers to quickly grasp the latest 3GPP Release 10 standard and implement it in their products Not a contributed book as most others on this topic are: this book gives an integrated introduction to the technologies and the standard
The book has been written with intent to grasp the basic understanding of theoretical as well as practical aspects of electromagnetic wave propagation and antenna engineering. The text has been aptly scripted considering the requirements of average students who can easily grasp and comprehend the basics of wave propagation and radiation mechanism of varieties of antennas coupled with their critical functionalities, utilities, advantages/disadvantages without any external assistance of teachers or other reference books. The book broaches very well on practical methods of parametric measurements of antenna with right measuring test equipment and associated tools. The last chapter of the book is dedicated to advance technology adopted in design and development of modern antenna.
• A fairly large number of well labelled diagrams to provide practical understanding of the concepts.
• The placement of numericals at appropriate places develops confidence among readers and enthuses them further to read in depth to crack any regular or competitive examinations.
• Chapter summary highlights important points for quick recap and revision before examination.
• Well-crafted multiple choice questions with answers at the end of each chapter to stimulate thought process and prepare better for viva-voce and competitive examinations.
• Appropriate number of unsolved numerical problems with answers to improve problem solving skill of students.
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.
Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.
Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.
New to this edition:
• Examples of near-metal antenna techniques
• Discussion of the wakeup challenge for battery-assisted tags, with a BAT architecture example
• Latest development of protocols: EPC Gen 1.2.0
• Update 18000-6 discussion with battery-assisted tags, sensor tags, Manchester tags and wakeup provisionsNamed a 2012 Notable Computer Book for Computer Systems Organization by Computing ReviewsThe only book to give an understanding of radio communications, the underlying technology for radio frequency identification (RFID)Praised for its readability and clarity, it balances breadth and depth of coverage New edition includes latest developments in chip technology, antennas and protocols
Mixing Secrets For The Small Studio is a down-to-earth primer for small-studio enthusiasts who want chart-ready sonics in a hurry. Drawing on the back-room strategies of more than 100 famous names, this entertaining guide leads you step-by-step through the entire mixing process. On the way, you'll unravel the mysteries of every type of mix processing, from simple EQ and compression through to advanced spectral dynamics and 'fairy dust' effects. User-friendly explanations introduce technical concepts on a strictly need-to-know basis, while chapter summaries and assignments are perfect for school and college use.
* Learn the subtle editing, arrangement, and monitoring tactics which give industry insiders their competitive edge, and master the psychological tricks which protect you from all the biggest rookie mistakes.
* Find out where you don't need to spend money, as well as how to make a limited budget really count.
* Pick up tricks and tips from leading-edge engineers working on today's multi-platinum hits, including Michael Brauer, Serban Ghenea, the Lord-Alge brothers, Tony Maserati, Manny Marroquin, Dave 'Hard Drive' Pensado, Jack Joseph Puig, Mark 'Spike' Stent, Phil Tan, Andy Wallace, and many, many more...
Mike Senior is a professional engineer who has worked with Wet Wet Wet, The Charlatans, Reef, Therapy, and Nigel Kennedy. He specialises in adapting the techniques of top producers for those working on a budget. Since 2007 he has transformed dozens of amateur productions for Sound On Sound magazine's popular 'Mix Rescue' column, proving time and again that you can achieve commercial-grade results with affordable gear -- once you know how!
Reflector antennas are extraordinary devices that combine high gain with geometrical simplicity, and can operate in broad frequency bands. Their performance, however, depends on the electrical characteristics of the feed system with which they operate. This comprehensive volume provides you with a solid understanding of feed system theory, design, and analysis.
Featuring chapters authored by experts in each aspect of feed systems, this book takes you from fundamental mathematical techniques, electrically small and large dual reflectors, feed geometry and telemetry, tracking and command antennas, and more. Throughout the book numerous examples are provided to guide you in the practical aspects of feed design.
For the first time in history, the tools for cooperating on a global scale are not solely in the hands of governments or institutions. The spread of the internet and mobile phones are changing how people come together and get things done—and sparking a revolution that, as Clay Shirky shows, is changing what we do, how we do it, and even who we are. Here, we encounter a whoman who loses her phone and recruits an army of volunteers to get it back from the person who stole it. A dissatisfied airline passenger who spawns a national movement by taking her case to the web. And a handful of kids in Belarus who create a political protest that the state is powerless to stop. Here Comes Everybody is a revelatory examination of how the wildfirelike spread of new forms of social interaction enabled by technology is changing the way humans form groups and exist within them. A revolution in social organization has commenced, and Clay Shirky is its brilliant chronicler.
"Drawing from anthropology, economic theory and keen observation, [Shirky] makes a strong case that new communication tools are making once-impossible forms of group action possible . . . [an] extraordinarily perceptive new book." -Minneapolis Star Tribune
"Mr. Shirky writes cleanly and convincingly about the intersection of technological innovation and social change." -New York Observer
Features:A systematic and detailed, top-down approach to the design of 4G cellular systems based on IEEE 802.16m and 3GPP LTE/LTE-Advanced technologies A systematic approach to understanding IEEE 802.16m radio access network and mobile WiMAX network architecture and protocols The first comprehensive technical reference on the design, development and performance evaluation of IMT-Advanced systems, including the theoretical background and design principles as well as implementation considerations
About the author:
The author, chief architect and technical lead of the IEEE 802.16m project at Intel Corporation, initiated and masterminded the development of the IEEE 802.16m standard and has been one of the leading technical drivers in its standardization process in IEEE. The author was also a leading technical contributor to the definition and development of requirements and evaluation methodology for the IMT-Advanced systems in ITU-R. Reflecting the author’s 20+ years expertise and experience, the book provides an in-depth, systematic and structured technical reference for professional engineers, researchers, and graduate students working in cellular communication systems, radio air-interface technologies, cellular communications protocols, advanced radio access technologies for 4G systems, and broadband cellular standards.A systematic and detailed, top-down approach to the design of 4G cellular systems based on IEEE 802.16m and 3GPP LTE/LTE-Advanced technologiesA systematic approach to understanding IEEE 802.16m radio access network and mobile WiMAX network architecture and protocolsThe first comprehensive technical reference on the design, development and performance evaluation of IMT-Advanced systems, including the theoretical background and design principles as well as implementation considerations
The appendices contain such vital data as U.S., European, and Japanese technical and regulatory standards for wireless networks, measurements in wireless networks, reflection and matching of transmission lines, determining power density, and much more. No matter what type of wireless network you design—Bluetooth, UWB, or even metropolitan area network (MAN)—this book is the one reference you can’t do without!The A-to-Z guide to wireless network engineering—covers everything from basic electromagnetic theory to modulation techniques to network planning and implementation!Engineering and design principles covered are applicable to any type of wireless network, including 802.11, 802.16, 802.20, and Bluetooth.Discusses state-of-the-art modulation techniques such as ultra wideband (UWB) and orthogonal frequency-division multiplexing (OFDM).
Communications engineers need to master a wide area of topics to excel. The Wireless Security Know It All covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
• A 360-degree view from our best-selling authors
• Topics include Today’s Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices
• The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume
Optical Wireless Communications examines some of the most important features of optical wireless communication systems. It considers the benefits and limitations of IR as a medium conveying information wirelessly and compares the advantages and disadvantages of infrared to microwave and other radio systems. It also details the evolution of IR communication systems and describes atmospheric and other types of data transmission limitations.
The book presents design fundamentals of optical concentrators, as well as a review of some of the most important receiver optical front-ends (containing imaging or non-imaging concentrators and optical filters), including an explanation of the different sources of infrared noise and an introduction to eye safety. It also describes optical wireless transmitter and receiver design issues, typical modulation, coding, and multiple access techniques, and introduces IrDA protocols and wireless IR networking.
Get Connected to the WiMAX Revolution
WiMAX/MobileFi: Advanced Research and Technology brings together the world’s leading WiMAX researchers to present progressive techniques in the design, analysis, and optimization of protocols for WiMAX. This ground-breaking, previously unpublished, collection of papers addresses topics such as connection admission control, integration with WiFi Networks, QoS support, handoff management, scheduling algorithms, and load-balancing just to name a few.
Written under the leadership of editor Yang Xiao, member of the IEEE 802.11 working group, WiMAX/MobileFi: Advanced Research and Technology represents the most cutting-edge survey of WiMAX technologies. It provides a foundation to support currently emerging applications as well as fuel the development of future innovations.
Telecom 101 covers the core knowledge set required in the telecommunications business today: the technologies, the players, the products and services, jargon and buzzwords, and most importantly, the underlying ideas... and how it all fits together.
The course materials for Teracom’s famous Course 101 Telecom, Datacom and Networking for Non-Engineers, augmented with additional topics and bound in this one volume bring you consistency, completeness and unbeatable value.
Our approach can be summed up with a simple philosophy: Start at the beginning. Progress in a logical order. Build one concept on top of another. Finish at the end. Avoid jargon. Speak in plain English.
Bust the buzzwords, demystify jargon, and cut through doubletalk!
Fill gaps and build a solid base of structured knowledge.
Understand how everything fits together.
... knowledge and understanding that lasts a lifetime.
Ideal for anyone needing a book covering all major topics in telecom, data communications, IP and networking… in plain English.
A wealth of clear, concise, organized knowledge, impossible to find in one place anywhere else!
Join thousands of satisfied customers. Get your copy today!
7" x 9" softcover textbook • 488 pages
4th edition • Published March 2016
print ISBN 9781894887038
eBook ISBN 9781894887786
Print quantities are limited. Order today to avoid disappointment.
Your Go-To Telecommunications Resource
Covering all major topics, we begin with the Public Switched Telephone Network (PSTN), then
• progress in a logical order, building one concept on top of another,
• from voice and data fundamentals to digital, packets, IP and Ethernet, VoIP,
• fiber and wireless, DSL and cable, routers and networks, MPLS, ISPs and CDNs,
• and finish with the Brave New World of IP Telecom, where voice, data and video are the same thing.
• An invaluable day-to-day reference handbook
• Learn and retain more reading a hard copy, professionally printed and bound
• Up-to-date: published 2016
• Allows you to study and review topics before attending a course
• An economical and convenient way to self-study
... these are the materials to an instructor-led course that costs $1395 to attend.
• The Certification Study Guide for the prestigious Telecommunications Certification Organization (TCO) Certified Telecommunications Analyst (CTA) telecommunications certification.
Written by our top instructor, Eric Coll, M.Eng., Telecom 101 contain 35 years of knowledge and learning distilled and organized into an invaluable study guide and practical day-to-day reference for non-engineers.
Looking through the chapter list and detailed outline below, you'll see that many chapters of Telecom 101 are like self-contained reference books on specific topics, like the PSTN, IP, LANs, MPLS and cellular.
You can get all of these topics bound in one volume for one low price.
Compare this to hunting down and paying for multiple books by different authors that may or may not cover what you need to know- and you'll agree this is a very attractive deal.
Career- and productivity-enhancing training... an investment that will be repaid many times over.
Telecom 101 is composed of three parts: Fundamentals of Telecommunications, Telecommunications Technologies, and the IP Telecommunications Network.
PART I FUNDAMENTALS OF TELECOMMUNICATIONS
2 FUNDAMENTALS OF TELEPHONY
4 THE TELECOMMUNICATIONS INDUSTRY
We begin with the fundamentals of telephony and the telephone network – the basis for understanding everything else.
First is the Public Switched Telephone Network (PSTN): loops and trunks, circuit-switching, analog, the voiceband and Plain Ordinary Telephone Service (POTS). Plus, new for the fourth edition: Voice over IP (VoIP) is now part of the fundamentals.
Next is switching, starting with traditional telephone switches: Centrex, PBX and PBX trunks, and how that relates to the newer ideas of softswitches, Hosted PBX and SIP trunking.
This part is completed with a chapter on the telecommunications business: Local Exchange Carriers and Inter-Exchange Carriers, ILECs and CLECs, the main players and how carriers interconnect.
PART II TELECOMMUNICATIONS TECHNOLOGIES
6 TRANSMISSION SYSTEMS
7 THE NETWORK CLOUD AND SERVICE PROVISIONING
8 FIBER OPTICS
9 DSL AND CABLE MODEMS: LAST MILE ON COPPER
The second part is devoted to telecommunications technologies: the actual methods used to implement circuits and services.
We begin with digital: what digital is, how voice and video are digitized, and how digitized information is actually transmitted.
The next chapter is transmission systems: the high-capacity systems developed to carry many users’ traffic. This starts with the installed base of channelized systems, the hierarchy of DS0, DS1 and DS3 rates and an overview of T1, T3, SONET and ISDN.
Then our attention turns to the new generation packetized systems, introducing the concepts of overbooking and bandwidth on demand instead of channels, how this is implemented with frames and packets, coexistence and transition from channels to packets.
Then we understand the “Network Cloud”, how services are actually implemented, the three basic types of services and the equipment used for each.
Completing this part are chapters on the technologies used to implement the network:
Fiber Optics, including fundamentals of fiber, wave-division multiplexing, the network core, Metropolitan Area Networks, Passive Optical Networks and fiber to the premise.
Last Mile on Copper: DSL and Cable Modems, including fundamentals of modems, DSLAMs, VDSL, broadband and cable modems.
Wireless, concentrating on mobile communications: cellular and mobility concepts, the technologies TDMA, CDMA and OFDM, the generations from 1G to 4G, and the systems GSM, UMTS, 1X and LTE. This chapter is completed with WiFi and satellite.
PART III THE IP PACKET-SWITCHED TELECOM NETWORK (IP-PSTN)
11 "DATA" COMMUNICATIONS CONCEPTS
12 CODING, FRAMES AND PACKETS
13 THE OSI LAYERS AND PROTOCOL STACKS
14 ETHERNET, LANS AND VLANS
15 IP NETWORKS, ROUTERS AND ADDRESSES
16 MPLS AND CARRIER NETWORKS
17 THE INTERNET
18 WRAPPING UP
The third part of Telecom 101 is dedicated to the new-generation IP telecommunications network.
We begin by understanding how convergence was achieved by treating voice and video like data – then accordingly, cover the fundamentals of what used to be called “data communications”: DTEs, DCEs, LANs and WANs and the crucial concepts of packets and frames.
There are so many functions that need to be performed to implement phone calls, television, web browsing, email and everything else over the IP network, a structure is necessary to be able to identify and discuss separate issues separately. For this purpose, there is a chapter on the OSI Reference Model and its layers, identifying what the layers are, examples of protocols for each layer and how they work together in a protocol stack.
Then we begin moving up the layers. The next chapter is on Ethernet, LANs and VLANs (Layer 2), including MAC addresses and MAC frames, LAN cables, Optical Ethernet, LAN switches and how VLANs are used to separate traffic.
The next chapter is all about IP (Layer 3): how routers implement the network, routing tables, IP addresses, subnets, IPv4 address classes, static addresses, dynamic addresses and DHCP; public addresses, private addresses and NAT; and an overview of IP version 6.
On a real-world telecom network, a traffic management system is required. This is implemented with a technique called in general virtual circuits, and in particular with MPLS. The next chapter in the book covers the fundamentals, briefly reviews legacy technologies X.25, Frame Relay and ATM, then focuses on MPLS and how it is used to implement VPNs, Class of Service, service integration and traffic aggregation.
The last main chapter is on the Internet: its origins, what an ISP is and how an ISP connects to the rest of the Internet via transit and peering, the web, the Domain Name System, HTML and HTTP, SSL, MIME and base- 64 encoding for email, Internet telephony and Internet VPNs vs. business customer “MPLS service”.
The final chapter is a summary and wrap-up, covering technology deployment from the top down, useful reference charts listing all of the technologies, standard network designs and ending with a look at The Future.
Telecommunications technology is in constant change – and some technologies that used to be of prime importance are not so important today, and so have been moved from the main part of the book into appendices.
The very last part of the book provides a comprehensive list decoding mainstream acronyms and abbreviations used in telecom.
A ALL ABOUT T1
B LEGACY VOICE SERVICES AND JARGON
C ACRONYMS AND ABBREVIATIONS
7" x 9" softcover textbook • 488 pages
4th edition • Published March 2016
print ISBN 9781894887038
eBook ISBN 9781894887786
Get your copy today!