Flylib.com
Wireless Internet Handbook: Technologies, Standards, and Applications (Internet and Communications)
Wireless Internet Handbook: Technologies, Standards, and Applications (Internet and Communications)
ISBN: 0849315026
EAN: 2147483647
Year: 2003
Pages: 239
BUY ON AMAZON
Table of Contents
BackCover
Wireless Internet Handbook - Technologies, Standards, and Applications
Preface
Part I: Basic Concepts
Chapter 1: The Fundamentals of the Wireless Internet
1.1 Introduction
1.2 Principles of Wireless Communications
1.3 Modulation Techniques
1.4 Wireless Internet Architectures
1.5 Wireless Devices and Standards
1.6 Wireless Internet Applications
1.7 Future of Wireless Technology
1.8 Conclusions
References
Chapter 2: Wireless Internet Wireless Internet
2.1 Introduction
2.2 WLANs and Cellular Networks: Comparison and Contrast
2.3 Framework for Technology Creation
2.4 Research Initiatives
2.5 Conclusions
References
Chapter 3: Wireless Internet Security
3.2 Who is using the Wireless Internet?
3.3 What Types of Applications are Available?
3.4 How Secure are the Transmission Methods?
3.5 How Secure are Wireless Devices?
3.6 How Secure are the Network Infrastructure Components?
3.7 Conclusion
Bibliography
Part II: Technologies and Standards
Chapter 4: Multimedia Streaming Over Mobile Networks: European Perspective
4.2 End-to-End System Architecture
4.3 The Challenges of Mobile Networks
4.4 Standards for Mobile Streaming
4.5 Performance Issues of Mobile Streaming
4.6 Conclusions
References
Chapter 5: Streaming Video over Wireless Networks
5.2 Video Compression Standards
5.3 Protocols
5.4 Streaming Video over the Internet
5.5 Wireless Networks and Challenges
5.6 Adaptation by Cross Layer Design
5.7 Integrating the Adaptation for Streaming Video over Wireless Networks
5.8 Conclusions
References
Chapter 6: Clustering and Roaming Techniques for IEEE 802.11 Wireless LANs
6.1 Introduction
6.2 Wireless LANs Clustering
6.3 Location-Based Clustering
6.4 Graph-Based Clustering
6.5 Quasihierarchical Routing
6.6 Strict Hierarchical Routing
6.7 Conclusion
References
Chapter 7: VoIP Services in Wireless Networks
7.2 Wireless Networks
7.3 Basis of Voice Coding
7.4 Network Quality Requirements
7.5 Overview of the H.323 Protocol
7.6 Overview of SIP
7.7 RLP
7.8 H.323 Implementation Architecture
7.9 Media Packet-Blocking Analysis in GPRS
7.10 Conclusion
References
Chapter 8: Wireless Application Protocol (WAP) and Mobile Wireless Access
8.2 Wireless Application Protocol
8.3 WAP Solution Benefits
8.4 Some Constraints of a WAP-Enabled Wireless Network
8.5 Preparing for the Move Forward
8.6 Recent WAP Developments and Applications
8.7 Summary
Part III: Networks and Architectures
Chapter 9: User Mobility in IP Networks: Current Issues and Recent Developments
9.2 A Contemporary View of User Mobility
9.3 Challenges and Recent Developments of Terminal Mobility
9.4 Challenges and Recent Developments of Personal Mobility
9.5 Concluding Remarks
References
Chapter 10: Wireless Local Access to the Mobile Internet
10.2 Local Access Technologies
10.3 Mobility and the Internet Protocols
10.4 Perspectives and Conclusions
References
Chapter 11: Location Prediction Algorithms for Mobile Wireless Systems
11.1 Introduction
11.2 Preliminaries
11.3 Domain-Independent Algorithms
11.4 Domain-Specific Heuristics
11.5 Conclusions
Acknowledgments
References
Chapter 12: Handoff and Rerouting in Cellular Data Networks
12.2 Analysis of Rerouting Schemes
12.3 Performance Evaluation of Rerouting Schemes
12.4 Mobile-Mobile Rerouting in Connection-Oriented Networks
12.5 Performance of Mobile-Mobile Rerouting
12.6 Conclusion
References
Chapter 13: Wireless Communications using Bluetooth
13.2 Overview
13.3 Protocol Stack
13.4 Bluetooth Profiles Specification
13.5 Additional Considerations
13.6 Concluding Remarks
Acknowledgment
References
Chapter 14: Multiantenna Technology for High-Speed Wireless Internet Access
14.2 Fundamental Limits to Mobile Data Access
14.3 Models
14.4 Single-User Throughput
14.5 System Throughput
14.6 Implementation: Realizing the MTMR Potential
14.7 Summary
References
Chapter 15: Location Management in Mobile Wireless Networks
15.1 Paging
15.2 Intelligent Paging Scheme
15.3 Other Paging Schemes
15.4 Intersystem Paging
15.5 IP Micromobility and Paging
15.6 Location Update
15.7 Location Management
15.8 Location Area Planning
References
Chapter 16: Mobile Ad Hoc Networks: Principles and Practices
16.2 A Wireless Ad Hoc Network Application
16.3 Issues for Protocol Layers in Manets
16.4 Manet Implementation: Related Technologies and Standards
16.5 Conclusion
Acknowledgments
References
Chapter 17: Managing Location in Universal Location-Aware Computing
17.2 Location Resolution and Management Techniques in Pervasive Computing Applications
17.3 Pervasive Computing Requirements and Appropriate Location Representation
17.4 Optimal Location Tracking and Prediction in Symbolic Space
17.5 Conclusion
Acknowledgment
References
Part IV: Applications
Chapter 18: Mobile and Wireless Internet Services: From Luxury to Commodity
18.2 Evolution of Mobile Internet Services
18.3 Slow Motion Over Plain Old Cellular
18.4 Web Clipping Over Pager Networks
18.5 Primitive Digital Data Over Packet-Switching Networks
18.6 Moderate Speeds Over Wireless WANs
18.7 2.5G: Half-Step Forward to Wireless Broadband
18.8 I-Mode: Wireless Internet Phenomenon
18.9 3G: Redefining Wireless Internet Services
18.10 High-Speed Wi-Fi: A Different Type of Wireless
18.11 Applications are Key to Wireless Internet Growth
Chapter 19: Wireless Technology Impacts the Enterprise Network
19.2 Wireless Communications
19.3 Wireless Office Services (WOS)
19.4 More Integration
19.5 A New Standard
19.6 Wireless Internet Access
19.7 Broadband Internet Access
19.8 Who Uses Wireless Technology?
19.9 Searching for a Wireless Solution
19.10 Summary
Chapter 20: An Efficient WAP-Enabled Transaction Processing Model for Mobile Database Systems
20.1 Introduction
20.2 Background
20.3 Mobility Applications
20.4 The WAP-Enabled Transaction Model
20.5 A Sample Application
20.6 Simulation Results
20.7 Conclusion
Acknowledgments
References
Chapter 21: Mobile Video Telephony
21.2 End-to-End System Architecture
21.3 Mobile Networks for Video Telephony
21.4 Standards for Mobile Video Telephony
21.5 Performance Issues in Mobile Video Telephony
21.6 Conclusions
Acknowledgments
References
Chapter 22: WAP: Transitional Technology for M-Commerce
22.1 Introduction
22.2 Will WAP-Enabled Phones Dominate the Personal Computer Marketplace?
22.3 WAP: A Global Standard
22.4 Operating Systems for WAP
22.5 WAP Forum
22.6 Arguments for WAP
22.7 Arguments Against WAP
22.8 Are Mobile Telephones Hazardous to Health?
22.9 Poor Security?
22.10 WAP and M-Commerce
22.11 Critical Success Factors for M-Commerce
22.12 Future Impact: Generation W in a Wireless World
References
Chapter 23: Wireless Internet in Telemedicine
23.2 Telemedicine Applications
23.3 Wireless Internet in Telemedicine
23.4 Case Study: WAP in Telemedicine
23.5 Issues to be Resolved
References
Chapter 24: Delivering Music over the Wireless Internet: From Song Distribution to Interactive Karaoke on UMTS Devices
24.1 Introduction
24.2 System Issues
24.3 A Wireless Internet Application for Music Distribution
24.4 An Experimental Study
24.5 Related Work and Comparison
24.6 Concluding Remarks
Acknowledgments
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Y
Index_Z
List of Figures
List of Tables
Wireless Internet Handbook: Technologies, Standards, and Applications (Internet and Communications)
ISBN: 0849315026
EAN: 2147483647
Year: 2003
Pages: 239
BUY ON AMAZON
ADO.NET 3.5 Cookbook (Cookbooks (OReilly))
Connecting to a Microsoft Excel Workbook
Filtering and Sorting Data
Loading a Windows PictureBox with Images Stored by Access as OLE Objects
Creating a Table in the Database from a DataTable Schema
A.2. Classes
SQL Tips & Techniques (Miscellaneous)
Using Keys and Constraints to Maintain Database Integrity
Understanding SQL Subqueries
Retrieving and Manipulating Data Through Cursors
Understanding Triggers
Working with Ms-sql Server Information Schema View
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Complex application Using Boost.Build
Creating an Interface with an Abstract Base Class
Finding the Greatest or Least Value in a Container
Multiplying Matricies
Introduction
Java for RPG Programmers, 2nd Edition
The Java Onion
Structured Operations And Statements
Arrays And Vectors
Database Access
More Java
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Media Simulation
Credibility and Computers
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Understanding Digital Signal Processing (2nd Edition)
Chapter Three. The Discrete Fourier Transform
DFT FREQUENCY AXIS
OPTIMIZED IIR FILTER DESIGN METHOD
Chapter Thirteen. Digital Signal Processing Tricks
A/D CONVERTER TESTING TECHNIQUES
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies