3G, 4G and Beyond : Bringing Networks, Devices and the Web Together

  • ISBN13:


  • ISBN10:


  • Edition: 2nd
  • Format: Hardcover
  • Copyright: 2013-02-18
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $118.00 Save up to $11.80
  • Rent Book $106.20
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Extensively updated evaluation of current and future network technologies, applications and devices Written in a clear, concise style, this second edition of the successful Beyond 3G: Bringing Networks, Terminals And The Web Together; LTE, WiMAX, IMS, 4G Terminals and the Mobile Web 2.0 is fully updated and expanded to include new sections including VoLTE, the evolution to 4G, mobile internet access, LTE-Advanced, Wi-Fi security and backhaul for wireless networks 3G, 4G and Beyond: Bringing Networks, Devices and the Web Together, 2nd Edition : Describes the successful commercialization of Web 2.0 services such as Facebook, and the emergence of app stores, tablets and smartphones Includes a new section on Voice over DSL and Cable with Femtocells from the perspective of both the user and the network provider, using the latest information on standards development and first rollouts from Vodaphone UK and AT&T Examines the evolution of mobile devices and operating systems, including ARM and x86 architecture and their applications to voice-optimized and multimedia devices A "must read" for telecommunication engineers, telecom consultants, professionals and researchers.

Author Biography

Martin Sauter works in the telecommunication industry as a thought leader, researcher, book author and blogger and is based in Cologne.  His interests are focused on mobile communication networks, multimedia applications and especially the wireless Internet.

Table of Contents


1 Evolution from 2G over 3G to 4G

1.1 First Half of the 1990s—Voice-Centric Communication

1.2 Between 1995 and 2000: The Rise of Mobility and the Internet

1.3 Between 2000 and 2005: Dot Com Burst, Web 2.0, Mobile Internet

1.4 Between 2005 and 2010: Global Coverage, Fixed Line VoIP, and Mobile Broadband

1.5 2010 and Beyond

1.6 All over IP in Mobile—The Biggest Challenge

1.7 Summary

2 Beyond 3G Network Architectures

2.1 Overview

2.2 UMTS, HSPA, and HSPA+

2.2.1 Introduction

2.2.2 Network Architecture

2.2.3 Air Interface and Radio Network

2.2.4 HSPA (HSDPA and HSUPA)

2.2.5 HSPA+ and other Improvements: Competition for LTE

2.2.6 Competition for LTE in 5 MHz

2.3 LTE

2.3.1 Introduction

2.3.2 Network Architecture

2.3.3 Air Interface and Radio Network

2.3.4 Basic Procedures

2.3.5 Summary and Comparison with HSPA

2.3.6 LTE-Advanced

2.4 802.11 Wi-Fi

2.4.1 Introduction

2.4.2 Network Architecture

2.4.3 The Air Interface—From 802.11b to 802.11n

2.4.4 Air Interface and Resource Management

2.4.5 Basic Procedures

2.4.6 Wi-Fi Security

2.4.7 Quality of Service: 802.11e

2.4.8 Gigabit Speeds with 802.11ac and 802.11ad

2.4.9 Summary

3 Network Capacity and Usage Scenarios

3.1 Usage in Developed Markets and Emerging Economies

3.2 How to Control Mobile Usage

3.2.1 Per Minute Charging

3.2.2 Volume Charging

3.2.3 Split Charging

3.2.4 Small Screen Flat Rates

3.2.5 Strategies to Inform Users when their Subscribed Data Volume is Used Up

3.2.6 Mobile Internet Access and Prepaid

3.3 Measuring Mobile Usage from a Financial Point of View

3.4 Cell Capacity in Downlink

3.5 Current and Future Frequency Bands for Cellular Wireless

3.6 Cell Capacity in Uplink

3.7 Per-User Throughput in Downlink

3.8 Per-User Throughput in Uplink

3.9 Traffic Estimation Per User

3.10 Overall Wireless Network Capacity

3.11 Network Capacity for Train Routes, Highways, and Remote Areas

3.12 When will GSM be Switched Off?

3.13 Cellular Network VoIP Capacity

3.14 Wi-Fi VoIP Capacity

3.15 Wi-Fi and Interference

3.16 Wi-Fi Capacity in Combination with DSL, Cable, and Fiber

3.17 Backhaul for Wireless Networks

3.18 A Hybrid Cellular/Wi-Fi Network Today and in the Future

4 Voice over Wireless

4.1 Circuit-Switched Mobile Voice Telephony

4.1.1 Circuit Switching

4.1.2 A Voice-Optimized Radio Network

4.1.3 The Pros of Circuit Switching

4.1.4 The Bearer Independent Core Network Architecture

4.2 Packet-Switched Voice Telephony

4.2.1 Network and Applications are Separate in Packet-Switched Networks

4.2.2 Wireless Network Architecture for Transporting IP Packets

4.2.3 Benefits of Migrating Voice Telephony to IP

4.2.4 Voice Telephony Evolution and Service Integration

4.2.5 Voice Telephony over IP: The End of the Operator Monopoly

4.3 SIP Telephony over Fixed and Wireless Networks

4.3.1 SIP Registration

4.3.2 Establishing a SIP Call between Two SIP Subscribers

4.3.3 Session Description

4.3.4 The Real-Time Transfer Protocol

4.3.5 Establishing a SIP Call between a SIP and a PSTN Subscriber

4.3.6 Proprietary Components of a SIP System

4.3.7 Network Address Translation and SIP

4.4 Voice and Related Applications over IMS

4.4.1 IMS Basic Architecture

4.4.2 The P-CSCF

4.4.3 The S-CSCF and Application Servers

4.4.4 The I-CSCF and the HSS

4.4.5 Media Resource Functions

4.4.6 User Identities, Subscription Profiles, and Filter Criteria

4.4.7 IMS Registration Process

4.4.8 IMS Session Establishment

4.4.9 Voice Telephony Interworking with Circuit-Switched Networks

4.4.10 Push-to-Talk, Presence, and Instant Messaging

4.4.11 Voice Call Continuity, Dual Radio, and Single Radio


4.4.12 IMS with Wireless LAN Hotspots and Private Wi-Fi Networks

4.4.13 IMS and TISPAN

4.4.14 IMS on the Mobile Device

4.4.15 Rich Communication Service (RCS-e)

4.4.16 Voice over LTE (VoLTE)

4.4.17 Challenges for IMS Rollouts

4.4.18 Opportunities for IMS Rollouts

4.5 Voice over DSL and Cable with Femtocells

4.5.1 Femtocells from the Network Operator’s Point of View

4.5.2 Femtocells from the User’s Point of View

4.5.3 Conclusion

4.6 Unlicensed Mobile Access and Generic Access Network

4.6.1 Technical Background

4.6.2 Advantages, Disadvantages, and Pricing Strategies

4.7 Network Operator Deployed Voice over IP Alternatives

4.7.1 CS Fallback

4.7.2 Voice over LTE via GAN

4.7.3 Dual-Radio Devices

4.8 Over-the-Top (OTT) Voice over IP Alternatives

4.9 Which Voice Technology will Reign in the Future?

5 Evolution of Mobile Devices and Operating Systems

5.1 Introduction

5.1.1 The ARM Architecture

5.1.2 The x86 Architecture for Mobile Devices

5.1.3 Changing Worlds: Android on x86, Windows on ARM

5.1.4 From Hardware to Software

5.2 The System Architecture for Voice-Optimized Devices

5.3 The System Architecture for Multimedia Devices

5.4 Mobile Graphics Acceleration

5.4.1 2D Graphics

5.4.2 3D Graphics

5.5 Hardware Evolution

5.5.1 Chipset

5.5.2 Process Shrinking

5.5.3 Displays

5.5.4 Batteries

5.5.5 Camera and Optics

5.5.6 Global Positioning, Compass, 3D Orientation

5.5.7 Wi-Fi

5.5.8 Bluetooth

5.5.9 NFC, RFID, and Mobile Payment

5.5.10 Physical Keyboards

5.5.11 TV Receivers

5.5.12 TV-Out, Mobile Projectors, and DLNA

5.6 Multimode, Multifrequency Terminals

5.7 Wireless Notebook Connectivity

5.8 Impact of Hardware Evolution on Future Data Traffic

5.9 Power Consumption and User Interface as the Dividing Line

in Mobile Device Evolution

5.10 Feature Phone Operating Systems

5.10.1 Java Platform Micro Edition

5.10.2 BREW

5.11 Smartphone Operating Systems

5.11.1 Apple iOS

5.11.2 Google Android

5.11.3 Android, Open Source, and its Positive Influence on Innovation

5.11.4 Other Smartphone Operating Systems

5.11.5 Fracturization

5.12 Operating System Tasks

5.12.1 Multitasking

5.12.2 Memory Management

5.12.3 File Systems and Storage

5.12.4 Input and Output

5.12.5 Network Support

5.12.6 Security

6 Mobile Web 2.0, Apps, and Owners

6.1 Overview

6.2 (Mobile) Web 1.0—How Everything Started

6.3 Web 2.0—Empowering the User

6.4 Web 2.0 from the User’s Point of View

6.4.1 Blogs

6.4.2 Media Sharing

6.4.3 Podcasting

6.4.4 Advanced Search

6.4.5 User Recommendation

6.4.6 Wikis—Collective Writing

6.4.7 Social Networking Sites

6.4.8 Web Applications

6.4.9 Mashups

6.4.10 Virtual Worlds

6.4.11 Long-Tail Economics

6.5 The Ideas behind Web 2.0

6.5.1 The Web as a Platform

6.5.2 Harnessing Collective Intelligence

6.5.3 Data is the next Intel Inside

6.5.4 End of the Software Release Cycle

6.5.5 Lightweight Programing Models

6.5.6 Software above the Level of a Single Device

6.5.7 Rich User Experience

6.6 Discovering the Fabrics of Web 2.0

6.6.1 HTML

6.6.2 AJAX

6.6.3 Aggregation

6.6.4 Tagging and Folksonomy

6.6.5 Open Application Programing Interfaces

6.6.6 Open Source

6.7 Mobile Web 2.0—Evolution and Revolution of Web 2.0

6.7.1 The Seven Principles of Web 2.0 in the Mobile World

6.7.2 Advantages of Connected Mobile Devices

6.7.3 Access to Local Resources for Web Apps

6.7.4 2D Barcodes and Near Field Communication (NFC)

6.7.5 Web Page Adaptation for Mobile Devices

6.8 (Mobile) Web 2.0 and Privacy and Security Considerations

6.8.1 On-Page Cookies

6.8.2 Inter-Site Cookies

6.8.3 Flash Shared Objects

6.8.4 Session Tracking

6.8.5 HTML5 Security and Privacy Considerations

6.8.6 Private Information and Personal Data in the Cloud

6.9 Mobile Apps

6.9.1 App Stores and Ecosystem Approaches

6.10 Android App Programing Introduction

6.10.1 The Eclipse Programing Environment

6.10.2 Android and Object Oriented Programing

6.10.3 A Basic Android Program

6.11 Impact of Mobile Apps on Networks and Power Consumption

6.12 Mobile Apps Security and Privacy Considerations

6.12.1 Wi-Fi Eavesdropping

6.12.2 Access to Private Data by Apps

6.12.3 User Tracking by Apps and the Operating System

6.12.4 Third-Party Information Leakage

6.13 Summary

7 Conclusion


Rewards Program

Write a Review