| |
| |
Preface | |
| |
| |
Acknowledgments | |
| |
| |
| |
Introduction | |
| |
| |
| |
Mobility of Bits and Bytes | |
| |
| |
| |
Wireless-The Beginning | |
| |
| |
| |
Mobile Computing | |
| |
| |
| |
Dialogue Control | |
| |
| |
| |
Networks | |
| |
| |
| |
Middleware and Gateways | |
| |
| |
| |
Application and Services (Contents) | |
| |
| |
| |
Developing Mobile Computing Applications | |
| |
| |
| |
Security in Mobile Computing | |
| |
| |
| |
Standards-Why is it Necessary? | |
| |
| |
| |
Standard Bodies | |
| |
| |
| |
Players in the Wireless Space | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Mobile Computing Architecture | |
| |
| |
| |
History of Computers | |
| |
| |
| |
History of Internet | |
| |
| |
| |
Internet-The Ubiquitous Network | |
| |
| |
| |
Architecture for Mobile Computing | |
| |
| |
| |
Three-Tier Architecture | |
| |
| |
| |
Design Considerations for Mobile Computing | |
| |
| |
| |
Mobile Computing through Internet | |
| |
| |
| |
Making Existing Applications Mobile-Enabled | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Mobile Computing Through Telephony | |
| |
| |
| |
Evolution of Telephony | |
| |
| |
| |
Multiple Access Procedures | |
| |
| |
| |
Mobile Computing through Telephone | |
| |
| |
| |
Developing an IVR Application | |
| |
| |
| |
Voice XML | |
| |
| |
| |
Telephony Application Programming Interface (TAPI) | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Emerging Technologies | |
| |
| |
| |
Introduction | |
| |
| |
| |
Bluetooth | |
| |
| |
| |
Radio Frequency Identification (Rfid) | |
| |
| |
| |
Wireless Broadband (WiMAX) | |
| |
| |
| |
Mobile IP | |
| |
| |
| |
Internet Protocol Version 6 (IPv6) | |
| |
| |
| |
Java Card | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Global System for Mobile Communications (GSM) | |
| |
| |
| |
Global System for Mobile Communications | |
| |
| |
| |
GSM Architecture | |
| |
| |
| |
GSM Entities | |
| |
| |
| |
Call Routing in GSM | |
| |
| |
| |
PLMN Interfaces | |
| |
| |
| |
Gsm Addresses and Identifiers | |
| |
| |
| |
Network Aspects in GSM | |
| |
| |
| |
GSM Frequency Allocation | |
| |
| |
| |
Authentication and Security | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Short Message Service (SMS) | |
| |
| |
| |
Mobile Computing over SMS | |
| |
| |
| |
Short Message Services (SMS) | |
| |
| |
| |
Value Added Services through SMS | |
| |
| |
| |
Accessing the SMS Bearer | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
General Packet Radio Service (GPRS) | |
| |
| |
| |
Introduction | |
| |
| |
| |
GPRS and Packet Data Network | |
| |
| |
| |
GPRS Network Architecture | |
| |
| |
| |
GPRS Network Operations | |
| |
| |
| |
Data Services in GPRS | |
| |
| |
| |
Applications for GPRS | |
| |
| |
| |
Limitations of GPRS | |
| |
| |
| |
Billing and Charging in GPRS | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Wireless Application Protocol (WAP) | |
| |
| |
| |
Introduction | |
| |
| |
| |
WAP | |
| |
| |
| |
MMS | |
| |
| |
| |
GPRS Applications | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
CDMA and 3G | |
| |
| |
| |
Introduction | |
| |
| |
| |
Spread-Spectrum Technology | |
| |
| |
| |
Is-95 | |
| |
| |
| |
Cdma versus GSM | |
| |
| |
| |
Wireless Data | |
| |
| |
| |
Third Generation Networks | |
| |
| |
| |
Applications on 3G | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Wireless Lan | |
| |
| |
| |
Introduction | |
| |
| |
| |
Wireless LAN Advantages | |
| |
| |
| |
IEEE 802.11 Standards | |
| |
| |
| |
Wireless LAN Architecture | |
| |
| |
| |
Mobility in Wireless LAN | |
| |
| |
| |
Deploying Wireless LAN | |
| |
| |
| |
Mobile Ad Hoc Networks and Sensor Networks | |
| |
| |
| |
Wireless LAN Security | |
| |
| |
| |
WiFi Versus 3G | |
| |
| |
Reference/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Intelligent Networks and Interworking | |
| |
| |
| |
Introduction | |
| |
| |
| |
Fundamentals of Call Processing | |
| |
| |
| |
Intelligence in the Networks | |
| |
| |
| |
SS#7 Signaling | |
| |
| |
| |
IN Conceptual Model (INCM) | |
| |
| |
| |
Softswitch | |
| |
| |
| |
Programmable Networks | |
| |
| |
| |
Technologies and Interfaces for IN | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Client Programming | |
| |
| |
| |
Introduction | |
| |
| |
| |
Moving Beyond the Desktop | |
| |
| |
| |
A Peek under the Hood: Hardware Overview | |
| |
| |
| |
Mobile Phones | |
| |
| |
| |
PDA | |
| |
| |
| |
Design Constraints in Applications for Handheld Devices | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Programming for the Palm OS | |
| |
| |
| |
Introduction | |
| |
| |
| |
History of Palm OS | |
| |
| |
| |
Palm OS Architecture | |
| |
| |
| |
Application Development | |
| |
| |
| |
Communication in Palm OS | |
| |
| |
| |
Multimedia | |
| |
| |
| |
Enhancements in the Current Release | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Wireless Devices with Symbian OS | |
| |
| |
| |
Introduction to Symbian OS | |
| |
| |
| |
Symbian OS Architecture | |
| |
| |
| |
Applications for Symbian | |
| |
| |
| |
Controls and Compound Controls | |
| |
| |
| |
Active Objects | |
| |
| |
| |
Localization | |
| |
| |
| |
Security on the Symbian OS | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
J2ME | |
| |
| |
| |
JAVA in the Handset | |
| |
| |
| |
The Three-Prong Approach to Java Everywhere | |
| |
| |
| |
Java 2 Micro Edition (J2ME) Technology | |
| |
| |
| |
Programming for CLDC | |
| |
| |
| |
GUI in MIDP | |
| |
| |
| |
UI Design Issues | |
| |
| |
| |
Multimedia | |
| |
| |
| |
Record Management System | |
| |
| |
| |
Communication in MIDP | |
| |
| |
| |
Security Considerations in MIDP | |
| |
| |
| |
Optional Packages | |
| |
| |
| |
Conclusion | |
| |
| |
References/Further Readings | |
| |
| |
Review Questions | |
| |
| |
| |
Wireless Devices with Windows CE | |
| |
| |
| |
Introduction | |
| |
| |
| |
Different Flavors of Windows CE | |
| |
| |
| |
Windows CE Architecture | |
| |
| |
| |
Windows CE Development Environment | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Voice over Internet Protocol and Convergence | |
| |
| |
| |
Voice over IP | |
| |
| |
| |
H.323 Framework for Voice over IP | |
| |
| |
| |
Session Initiation Protocol (SIP) | |
| |
| |
| |
Comparison between H.323 and SIP | |
| |
| |
| |
Real Time Protocols | |
| |
| |
| |
Convergence Technologies | |
| |
| |
| |
Call Routing | |
| |
| |
| |
Voice over IP Applications | |
| |
| |
| |
IP Multimedia Subsystem (IMS) | |
| |
| |
| |
Mobile VoIP | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
| |
Security Issues in Mobile Computing | |
| |
| |
| |
Introduction | |
| |
| |
| |
Information Security | |
| |
| |
| |
Security Techniques and Algorithms | |
| |
| |
| |
Security Protocols | |
| |
| |
| |
Public Key Infrastructure | |
| |
| |
| |
Trust | |
| |
| |
| |
Security Models | |
| |
| |
| |
Security Frameworks for Mobile Environment | |
| |
| |
References/Further Reading | |
| |
| |
Review Questions | |
| |
| |
List of Abbreviations | |
| |
| |
Index | |