Mobile users are demanding fast and efficient ubiquitous connectivity supporting data applications. This connectivity has to be provided by various different networks and protocols which guarantee that mobile networks function efficiently, performing routing and handoff for mobile users.Hac proposes
Mobile telecommunications protocols for data networks
β Scribed by Anna HacΜ
- Publisher
- J. Wiley
- Year
- 2003
- Tongue
- English
- Leaves
- 258
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
MOBILE TELECOMMUNICATIONS PROTOCOLS FOR DATA NETWORKS......Page 1
COVER......Page 2
BACKCOVER......Page 3
Contents......Page 4
Preface......Page 8
About the Author......Page 12
1.1 MOBILE AGENT PLATFORMS......Page 13
1.1.2 Aglets......Page 14
1.2 MULTIAGENT SYSTEMS......Page 15
1.2.1 Agent-based load control strategies......Page 17
1.3 SUMMARY......Page 21
PROBLEMS TO CHAPTER 1......Page 22
2.1 AGENT-BASED SERVICE IMPLEMENTATION......Page 23
2.2 AGENT-BASED MIDDLEWARE......Page 29
2.3 MOBILE AGENT-BASED SERVICE CONFIGURATION......Page 35
2.4 MOBILE AGENT IMPLEMENTATION......Page 40
PROBLEMS TO CHAPTER 2......Page 41
3.1 VIRTUAL LANs......Page 45
3.1.1 Workgroup management......Page 47
3.1.2 Multicast groups......Page 48
3.2.1 Wideband wireless data access based on OFDM and dynamic packet assignment......Page 49
3.2.2 Wireless services support in local multipoint distribution systems......Page 51
3.2.4 IEEE 802.11......Page 53
3.2.5 ETSI HIPERLAN......Page 56
3.2.6 Dynamic slot assignment......Page 58
3.3 SUMMARY......Page 62
PROBLEMS TO CHAPTER 3......Page 63
4. Wireless protocols......Page 67
4.2 MAC PROTOCOL......Page 68
4.3 BROADBAND RADIO ACCESS INTEGRATED NETWORK......Page 70
4.4 HYBRID AND ADAPTIVE MAC PROTOCOL......Page 71
4.5 ADAPTIVE REQUEST CHANNEL MULTIPLE ACCESS PROTOCOL......Page 72
4.6 REQUEST/ACKNOWLEDGEMENT PHASE......Page 73
4.7 PERMISSION/TRANSMISSION PHASE......Page 74
4.8 PERFORMANCE ANALYSIS......Page 77
4.9 PERFORMANCE MEASURES......Page 79
4.10 SUMMARY......Page 81
PROBLEMS TO CHAPTER 4......Page 82
5.1 WIRELESS APPLICATIONS AND DEVICES......Page 85
5.2 MOBILE ACCESS......Page 91
5.3 XML PROTOCOL......Page 92
5.4 DATA ENCAPSULATION AND EVOLVABILITY......Page 94
5.5 WIRELESS APPLICATION PROTOCOL (WAP)......Page 97
5.6 SUMMARY......Page 100
PROBLEMS TO CHAPTER 5......Page 101
6.1 WAE ARCHITECTURE......Page 105
6.2 WTA ARCHITECTURE......Page 110
6.3 WAP PUSH ARCHITECTURE......Page 117
PROBLEMS TO CHAPTER 6......Page 121
7.1 XML DOCUMENT......Page 123
7.2 RESOURCE DESCRIPTION FRAMEWORK (RDF)......Page 126
7.3 CC/PP-USER SIDE FRAMEWORK FOR CONTENT NEGOTIATION......Page 131
7.4 CC/PP EXCHANGE PROTOCOL BASED ON THE HTTP EXTENSION FRAMEWORK......Page 141
7.5 REQUIREMENTS FOR A CC/PP FRAMEWORK,AND THE ARCHITECTURE......Page 144
PROBLEMS TO CHAPTER 7......Page 147
8. Architecture of wireless LANs......Page 151
8.1 RADIO FREQUENCY SYSTEMS......Page 152
8.3.1 Direct sequence spread spectrum......Page 153
8.3.3 WLAN industry standard......Page 154
8.4 IEEE 802.11 WLAN ARCHITECTURE......Page 155
8.4.1 IEEE 802.11a and IEEE 802.11b......Page 157
8.5 BLUETOOTH......Page 158
8.5.1 Bluetooth architecture......Page 159
8.5.2 Bluetooth applications......Page 164
8.5.3 Bluetooth devices......Page 166
8.6 SUMMARY......Page 169
PROBLEMS TO CHAPTER 8......Page 170
9. Routing protocols in mobile and wireless networks......Page 175
9.1.1 Destination-sequenced distance-vector routing......Page 176
9.1.3 Global state routing......Page 178
9.1.5 Hierarchical state routing......Page 179
9.1.7 Cluster-head gateway switch routing protocol......Page 180
9.2.1 Temporally ordered routing algorithm......Page 181
9.2.2 Dynamic source routing protocol......Page 183
9.2.3 Cluster-based routing protocol......Page 185
9.2.4 Ad hoc on-demand distance-vector routing......Page 186
9.2.5 Signal stability-based adaptive routing......Page 187
9.2.6 Associativity-based routing......Page 188
9.2.8 Zone routing protocol......Page 189
9.2.9 Virtual subnets protocol......Page 190
PROBLEMS TO CHAPTER 9......Page 191
10. Handoff in mobile and wireless networks......Page 193
10.1 SIGNALING HANDOFF PROTOCOL IN WATM NETWORKS......Page 196
10.2 CROSSOVER SWITCH DISCOVERY......Page 197
10.3 REROUTING METHODS......Page 199
10.4 OPTIMIZED COS DISCOVERY THROUGH CONNECTION GROUPING......Page 200
10.6 HANDOFF IN LOW EARTH ORBIT (LEO) SATELLITE NETWORKS......Page 201
10.7 PREDICTIVE RESERVATION POLICY......Page 202
10.8.2 Chaining followed by make-break......Page 203
10.9 ANALYSIS OF CHAINING HANDOFF APPROACHES......Page 205
PROBLEMS TO CHAPTER 10......Page 206
11.1 A MODEL OF WATM NETWORK......Page 209
11.2 CHAIN ROUTING ALGORITHM......Page 211
11.3 IMPLEMENTATION OF THE HANDOFF SCHEME......Page 214
11.4.1 Comparison of chain routing algorithm with Hop-limited method......Page 215
11.4.2 Analysis of the signaling traffic cost......Page 217
11.4.3 Handoff latency......Page 219
PROBLEMS TO CHAPTER 11......Page 222
12. Two-phase combined QoS-based handoff scheme......Page 225
12.1 WIRELESS ATM ARCHITECTURE......Page 226
12.2 MOBILITY SUPPORT IN WIRELESS ATM......Page 229
12.3 COMPARISON OF REROUTING SCHEMES......Page 234
12.4 MAINTAINING THE CELL SEQUENCE DURING PATH OPTIMIZATION......Page 236
12.5 COMBINED QoS-BASED PATH OPTIMIZATION SCHEME......Page 239
PROBLEMS TO CHAPTER 12......Page 242
References......Page 245
Index......Page 251
π SIMILAR VOLUMES
<p>This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on th
Offers a comprehensive and detailed description of digital wireless and mobile radio systems focussing specifically on the network-oriented functions of all systems currently existing or planned for the near future. Building on the author's own academic and industrial experience in the field, partic
The continuing growth of the Global System for Mobile Communications (GSM) based mobile telephones has brought with it increasingly rapid growth in interest in mobile communications interconnect problems and standards. For the rapid proliferation of mobile communications to be sustained without over
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques