Optimization Methods for User Admissions and Radio Resource Allocation for Multicasting over High Altitude Platforms
Title | Optimization Methods for User Admissions and Radio Resource Allocation for Multicasting over High Altitude Platforms PDF eBook |
Author | Ahmed Ibrahim |
Publisher | CRC Press |
Pages | 153 |
Release | 2022-09-01 |
Genre | Technology & Engineering |
ISBN | 1000792900 |
This book focuses on the issue of optimizing radio resource allocation (RRA) and user admission control (AC) for multiple multicasting sessions on a single high altitude platform (HAP) with multiple antennas on-board. HAPs are quasi-stationary aerial platforms that carry a wireless communications payload to provide wireless communications and broadband services. They are meant to be located in the stratosphere layer of the atmosphere at altitudes in the range 17-22 km and have the ability to fly on demand to temporarily or permanently serve regions with unavailable telecommunications infrastructure. An important requirement that the book focusses on is the development of an efficient and effective method for resource allocation and user admissions for HAPs, especially when it comes to multicasting. Power, frequency, space (antennas selection) and time (scheduling) are the resources considered in the problem over an orthogonal frequency division multiple access (OFDMA) HAP system.Due to the strong dependence of the total number of users that could join different multicast groups, on the possible ways we may allocate resources to these groups, it is of significant importance to consider a joint user to session assignments and RRA across the groups. From the service provider's point of view, it would be in its best interest to be able to admit as many higher priority users as possible, while satisfying their quality of service requirements. High priority users could be users subscribed in and paying higher for a service plan that gives them preference of admittance to receive more multicast transmissions, compared to those paying for a lower service plan. Also, the user who tries to join multiple multicast groups (i.e. receive more than one multicast transmission), would have preferences for which one he would favor to receive if resources are not enough to satisfy the QoS requirements.Technical topics discussed in the book include: • Overview on High Altitude Platforms, their different types and the recent works in this area Radio Resource Allocation and User Admission Control in HAPs Multicasting in a Single HAP System: System Model and Mathematical Formulation Optimization schemes that are designed to enhance the performance of a branch and bound technique by taking into account special mathematical structure in the problem formulation
Journal of Communications and Networks
Title | Journal of Communications and Networks PDF eBook |
Author | |
Publisher | |
Pages | 520 |
Release | 2006 |
Genre | Computer networks |
ISBN |
Index to Theses with Abstracts Accepted for Higher Degrees by the Universities of Great Britain and Ireland and the Council for National Academic Awards
Title | Index to Theses with Abstracts Accepted for Higher Degrees by the Universities of Great Britain and Ireland and the Council for National Academic Awards PDF eBook |
Author | |
Publisher | |
Pages | 648 |
Release | 2006 |
Genre | Dissertations, Academic |
ISBN |
Unmanned Aircraft Systems (Uas) in the Cyber Domain: Protecting Usa's Advanced Air Assets
Title | Unmanned Aircraft Systems (Uas) in the Cyber Domain: Protecting Usa's Advanced Air Assets PDF eBook |
Author | Julie J. C. H. Ryan |
Publisher | Independently Published |
Pages | 430 |
Release | 2018-09-14 |
Genre | Computers |
ISBN | 9781724077066 |
Unmanned Aircraft Systems (UAS) are an integral part of the US national critical infrastructure. They must be protected from hostile intent or use to the same level as any other military or commercial asset involved in US national security. However, from the Spratly Islands to Djibouti to heartland America, the expanding Chinese Unmanned Aircraft Systems (UAS / Drone) industry has outpaced the US technologically and numerically on all fronts: military, commercial, and recreational. Both countries found that there were large information security gaps in unmanned systems that could be exploited on the international cyber-security stage. Many of those gaps remain today and are direct threats to US advanced Air Assets if not mitigated upfront by UAS designers and manufacturers. The authors contend that US military / commercial developers of UAS hardware and software must perform cyber risk assessments and mitigations prior to delivery of UAS systems to stay internationally competitive and secure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This book will fully immerse and engage the reader in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). Topics covered include National Airspace (NAS) policy issues, information security, UAS vulnerabilities in key systems (Sense and Avoid / SCADA), collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions.
Handbook of Research on Heterogeneous Next Generation Networking: Innovations and Platforms
Title | Handbook of Research on Heterogeneous Next Generation Networking: Innovations and Platforms PDF eBook |
Author | Kotsopoulos, Stavros |
Publisher | IGI Global |
Pages | 608 |
Release | 2008-10-31 |
Genre | Computers |
ISBN | 1605661090 |
"This book presents state-of-the-art research, developments, and integration activities in combined platforms of heterogeneous wireless networks"--Provided by publisher.
Queueing Theory for Telecommunications
Title | Queueing Theory for Telecommunications PDF eBook |
Author | Attahiru Sule Alfa |
Publisher | Springer Science & Business Media |
Pages | 248 |
Release | 2010-07-28 |
Genre | Computers |
ISBN | 1441973141 |
Queueing theory applications can be discovered in many walks of life including; transportation, manufacturing, telecommunications, computer systems and more. However, the most prevalent applications of queueing theory are in the telecommunications field. Queueing Theory for Telecommunications: Discrete Time Modelling of a Single Node System focuses on discrete time modeling and illustrates that most queueing systems encountered in real life can be set up as a Markov chain. This feature is very unique because the models are set in such a way that matrix-analytic methods are used to analyze them. Queueing Theory for Telecommunications: Discrete Time Modelling of a Single Node System is the most relevant book available on queueing models designed for applications to telecommunications. This book presents clear concise theories behind how to model and analyze key single node queues in discrete time using special tools that were presented in the second chapter. The text also delves into the types of single node queues that are very frequently encountered in telecommunication systems modeling, and provides simple methods for analyzing them. Where appropriate, alternative analysis methods are also presented. This book is for advanced-level students and researchers concentrating on engineering, computer science and mathematics as a secondary text or reference book. Professionals who work in the related industries of telecommunications, industrial engineering and communications engineering will find this book useful as well.
Autonomous Control for a Reliable Internet of Services
Title | Autonomous Control for a Reliable Internet of Services PDF eBook |
Author | Ivan Ganchev |
Publisher | Springer |
Pages | 416 |
Release | 2018-05-30 |
Genre | Computers |
ISBN | 3319904159 |
This open access book was prepared as a Final Publication of the COST Action IC1304 “Autonomous Control for a Reliable Internet of Services (ACROSS)”. The book contains 14 chapters and constitutes a show-case of the main outcome of the Action in line with its scientific goals. It will serve as a valuable reference for undergraduate and post-graduate students, educators, faculty members, researchers, engineers, and research strategists working in this field. The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like SOA, SaaS, PaaS, IaaS, NaaS, and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the creation of new and innovative services that facilitate business processes and improve the quality of life. However, this also calls for new approaches to ensuring the quality and reliability of these services. The objective of this book is, by applying a systematic approach, to assess the state-of-the-art and consolidate the main research results achieved in this area.