Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Preface | p. ix |
About the Author | p. xiii |
Introduction | p. 1 |
Mobile Computing Applications | p. 2 |
Evolution of Wireless Networks and Services | p. 6 |
Summary | p. 9 |
Cellular Network Architecture | p. 11 |
UMTS Architecture | p. 13 |
Public Land Mobile Network Interfaces | p. 20 |
User Authentication | p. 22 |
Frequency Reuse | p. 23 |
Channel Assignment | p. 23 |
Location Registration and Update | p. 24 |
Handover Procedures | p. 25 |
CDMA | p. 37 |
The Move toward 3G Networks | p. 38 |
Wireless Local Area Networks | p. 41 |
IEEE 802.11 Standard | p. 41 |
IEEE 802.11b Standard (Wi-Fi) | p. 45 |
IEEE 802.11a Standard | p. 46 |
IEEE 802.11g Standard | p. 47 |
HIPERLAN/2 | p. 47 |
IEEE 802.1x Standard | p. 52 |
IEEE 802.11i Standard | p. 52 |
IEEE 802.11e Standard | p. 53 |
Security Issues | p. 55 |
IP over 802.11 WLAN | p. 58 |
Integrating 802.11 WLAN and UMTS | p. 59 |
Summary | p. 63 |
Wireless Personal Area Networks | p. 65 |
HomeRF | p. 65 |
Bluetooth Technology | p. 67 |
IEEE 802.15.3 Standard | p. 77 |
Home Area Networks | p. 78 |
Summary | p. 81 |
Wireless Sensor Networks | p. 83 |
Applications of WSNs | p. 84 |
Requirements for WSNs | p. 85 |
WSN Architecture | p. 85 |
The 802.15.4 Standard | p. 86 |
The ZigBee Protocol | p. 92 |
Power Conservation Techniques | p. 95 |
Network and Communications | p. 98 |
Configuration of Sensor Networks | p. 99 |
WSN and Emergency Response Applications | p. 103 |
Summary | p. 106 |
Mobile Ad Hoc Networks | p. 109 |
AODV | p. 109 |
DSR | p. 116 |
OLSR | p. 119 |
TBRPF | p. 125 |
Summary | p. 131 |
Mobile IP | p. 133 |
An Overview | p. 133 |
Agent Advertisement Message | p. 134 |
Home Network Configurations | p. 135 |
Registration Messages | p. 136 |
Routing and Tunneling | p. 140 |
Security Issues in Mobile IP | p. 145 |
Mobile IP and Ad Hoc Networks | p. 149 |
Summary | p. 150 |
Issues in Mobile Computing | p. 153 |
Bandwidth | p. 154 |
Adaptive Behavior | p. 154 |
Power Management | p. 160 |
Interface Design | p. 166 |
Heterogeneity of Devices and Environments | p. 173 |
Seamless Mobility over Heterogeneous Wireless Networks | p. 175 |
Other Issues in Mobile Application Design | p. 177 |
Summary | p. 187 |
Location-Sensing and Location Systems | p. 191 |
Location-Sensing Techniques | p. 191 |
A Taxonomy of Location Systems | p. 195 |
GPS: An Example of a Positioning System | p. 199 |
Active Badge: An Example of a Tracking System | p. 200 |
Modeling Location-Tracking Application | p. 202 |
Location-Aware Application for Medical Workers | p. 205 |
Summary | p. 207 |
Wireless Network Security | p. 211 |
Overview of Wireless Security Issues | p. 211 |
Security of Data Transmission | p. 214 |
Next-Generation Hackers | p. 216 |
Summary | p. 218 |
Acronyms | p. 221 |
Index | p. 231 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.