Figure 31.1: Multicell system with service area divided into cells (seven-cell cluster).
Figure 31.2: GSM architecture.
Figure 31.3: Frequency allocation for GSM.
Figure 31.4: TDMA frame format in GSM.
Figure 31.5: GSM PLMN serving two cities.
Chapter 32: Global Positioning System
Figure 32.1: Global Positioning System.
Figure 32.2: GPS receiver.
Figure 32.3: Differential GPS system.
Figure C.11: Digitized map.
Figure C.12: Screenshot showing the output of the program to calculate distance.
Chapter 33: Wireless Internet
Figure 33.1: Evolution to 3G.
Figure 33.2: WAP architecture.
Figure 33.3: WAP programming model.
Figure 33.4: Internet and WAP protocol stacks.
Figure 33.5: WAP gateway.
Figure 33.6: WAP 2.0 Protocol Architecture.
Figure 33.7: GSM circuit-switched data service.
Figure 33.8: GPRS architecture.
Figure 33.9: UMTS.
Figure 33.10: NTT DoCoMo's FOMA.
Figure C.13: Registration form for mobile push application.
Figure C.14: M-commerce application on a mobile phone.
Chapter 34: Multimedia Communication over IP Networks
Figure 34.1: Multimedia communication over IP network.
Figure 34.2: H.323 network.
Figure 34.3: H.323 terminal-side protocol stack.
Figure 34.4: Direct call model of H.323.
Figure 34.5: Gatekeeper-routed call model of H.323.
Figure 34.6: Protocol suite for voice and video over IP.
Figure 34.7: RTP data packet header format.
Figure 34.8: Interconnecting Internet and PSTN through gateway.
Figure 34.9: Fax interface unit.
Figure 34.10: Architecture for Voice, Video and Integrated Data (AVVID).
Figure 34.11: Architecture of JMF.
Figure C.15: NetMeeting.
Figure C.16: NetMeeting incoming call indication.
Figure C.17: NetMeeting video.
Figure C.18: Chat using NetMeeting.
Chapter 35: Computer Telephony Integration and Unified Messaging
Figure 35.1: Text-to-speech conversion.
Figure 35.2: Components of language.
Figure 35.3: Interactive voice response system.
Figure 35.4: Iceberg model of speech.
Figure 35.5: Speech recognition methodology.
Figure 35.6: Time normalization of test pattern and reference pattern: the warping function.
Figure 35.7: Call center architecture.
Figure 35.8: Unified messaging: a futuristic scenario.
Figure 35.9: Operation of voice-enabled Web.
Chapter 36: Wireless Personal/Home Area Networks
Figure 36.1: Wireless personal area network.
Figure 36.2: Bluetooth piconet (a) Point-to-Print Communication Between Master and Slave (b) Pont-to-Multipoint Communication Between Master and Multiple Slaves (c) Scatternet.
Figure 36.3: State transition diagram.
Figure 36.4: Bluetooth packet format.
Figure 36.5: Bluetooth protocol architecture.
Figure 36.6: HomeRF protocol layers.
Figure 36.7: HomeRF network.
Chapter 37: Telecommunications Management Network
Figure 37.1: A telecommunications management network.
Figure 37.2: Public networks with TMN.
Figure 37.3: TMN manager architecture.
Figure 37.4: TMN building blocks.
Figure 37.5: TMN Q-interface.
Figure 37.6: TMN Q-adapter.
Figure 37.7: Q-agent architecture.
Figure 37.8: Typical TMN architecture.
Chapter 38: Information Security
Figure 38.1: Information leaks.
Figure 38.2: Surveillance of Voice/Fax Communication by Security Agencies.
Figure 38.3: Surveillance of voice/fax communication by individual organizations.
Figure 38.4: Surveillance of data applications.
Figure 38.5: The SMS bomb.
Figure 38.6: Encryption using secret key.
Figure 38.7: Data Encryption Standard.
Figure 38.8: Public key encryption.
Figure 38.9: Secret message embedded in an image.
Figure 38.10: Process of steganography.
Figure 38.11: Layered architecture for secure multimedia communication.
Figure 38.12: Multimedia security products.
Figure 38.13: An example of biometrics and steganography.
Figure C.19: RSA algorithm output screen.
Chapter 39: Futuristic Technologies and Applications
Figure 39.1: Architecture of telecommunications networks.
Figure 39.2: Convergence of Networks.
Figure 39.3: Home studio.
Appendix C: Solutions to Selected Exercises
Figure C.1: Screenshot that displays the input text and equivalent ASCII code.
Figure C.2: Waveform of the noise signal.
Figure C.3: Screenshot that displays the original bit stream and the bit stream with errors.
Figure C.4: Screenshot to set the serial communication parameters.
Figure C.5: ASK waveform.
Figure C.6: FSK waveform.
Figure C.7: 1kHz sine wave.
Figure C.8: IP address of a computer.
Figure C.9: Selection of the network interface card.
Figure C.10: Local area network connection status.
Figure C.11: Digitized map.
Figure C.12: Screenshot showing the output of the program to calculate distance.
Figure C.13: Registration form for mobile push application.
Figure C.14: M-commerce application on a mobile phone.