Mobile computing theory and practice

"The book covers all basic concepts of mobile computing and communication and also deals with latest concepts like Bluetooth Security and Nokia Handhelds"--Resource description page.

Bibliographic Details
Other Authors: Garg, Kumkum Author (author)
Format: eBook
Language:Inglés
Published: [Place of publication not identified] Dorling Kindersley India 2010
Edition:1st edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628331806719
Table of Contents:
  • Cover
  • Mobile Computing
  • Copyright
  • Contents
  • Preface
  • Introduction to Mobility
  • Process migration
  • Mobile computing
  • Mobile agents
  • Technical issues for mobility
  • Personal communication systems
  • Context-aware computing
  • Outline of the book
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Wireless and Cellular Communication
  • The electromagnetic spectrum
  • Radio waves
  • Microwaves
  • Infrared waves
  • Lightwaves
  • Communication satellites
  • Geostationary satellites
  • Medium earth orbit satellites
  • Low earth orbit satellites
  • Multiple-access schemes
  • FDMA-Frequency division multiple access
  • TDMA-Time division multiple access
  • CDMA-Code division multiple access
  • Cellular communication
  • The first generation (1G): 1980
  • The second generation (2G): 1992
  • The 2.5 generation (2.5G): 1996
  • The third generation (3G): 2000+
  • The 3.5 generation (3.5G): 2000+
  • The fourth generation (4G): 2002+
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Wireless Networks
  • The need for new wireless standards
  • IEEE 802.11 WLAN standard
  • Physical layer
  • MAC layer
  • Frame structure
  • Services
  • Bluetooth
  • Advantages of Bluetooth
  • Bluetooth applications
  • Bluetooth protocol stack
  • Bluetooth tracking services
  • Bluetooth frame structure
  • Infrared systems
  • HiperLAN
  • The IEEE 802.16 WiMAX standard
  • Comparison of wireless technologies
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Logical Mobility I-Migrating Processes
  • What is a process?
  • Process migration
  • The steps in process migration
  • The advantages of process migration
  • Applications of process migration
  • Alternatives to process migration
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Physical Mobility.
  • The requirements for physical mobility
  • Wireless communication
  • Mobility
  • Portability
  • Overview of IPv4 and IPv6
  • IPv4
  • IPv6
  • Mobile IP
  • Goals of mobile IP
  • Applicability
  • Mobility support in IPv4
  • Mobility support in IPv6
  • Cellular IP
  • The cellular IP access network
  • Routing and paging cache
  • TCP for mobility
  • Indirect TCP
  • Snooping TCP
  • Mobile TCP
  • Mobile databases
  • Design issues
  • Problems in mobile databases
  • Commercially available systems
  • The CODA file system-A case study
  • Cache manager Venus
  • Venus states
  • Design criteria
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Mobile Ad Hoc Networks
  • MANET characteristics
  • Classification of MANETs
  • Technologies for ad hoc networks
  • Routing in MANETs
  • Traditional routing protocols
  • Requirements for routing protocols
  • Classification of routing protocols
  • Proactive routing protocols-The DSDV protocol
  • Example of DSDV operation
  • Reactive routing protocols
  • Dynamic source routing
  • Route discovery in DSR
  • Route maintenance in DSR
  • Route cache in DSR
  • Adaptive on-demand distance vector protocol
  • Route discovery in AODV
  • Route maintenance in AODV
  • Comparison between DSR and AODV
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Wireless Sensor Networks
  • Applications of wireless sensor networks
  • Differences from mobile ad hoc networks
  • Design issues
  • WSN architecture
  • Sensor hardware components
  • WSN communications architecture
  • Routing protocols for WSN
  • Data-centric protocols
  • Flooding and gossiping
  • Sensor protocols for information via negotiation
  • Hierarchical protocols
  • Low-energy adaptive clustering hierarchy
  • PEGASIS
  • TEEN and APTEEN
  • Location-based protocols
  • Case study
  • The MICA mote
  • TinyOS
  • Development work in WSN
  • Summary.
  • Problems
  • Multiple-choice questions
  • Further reading
  • Mobile Handheld Devices
  • Characteristics of PDAs
  • The ARM processor
  • Network connectivity
  • Palm handhelds
  • The Palm OS operating system
  • Memory management
  • Communication and networking
  • HP handhelds
  • Windows CE
  • Memory architecture
  • Memory management
  • Processes and threads
  • Scheduling
  • Real-time performance
  • The Windows Mobile operating system
  • Nokia handhelds
  • Specifications of Nokia 9210
  • Features
  • Symbian operating system
  • Design
  • Symbian structure
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • The Mobile Internet and Wireless Web
  • The Web programming model
  • The WAP programming model
  • WAP protocol stack
  • Information-mode
  • WAP 2.0
  • WAP gateway
  • Push operation
  • Push message format
  • Pull operation
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Logical Mobility II-Mobile Agents
  • Mobile agents
  • Characteristics of mobile agents
  • Architecture
  • Mobile code and agents
  • Mobile agents and process migration
  • Client/server and mobile agent architectures
  • Requirements for mobile agent systems
  • Portability
  • Ubiquity
  • Network communication
  • Server security
  • Agent security
  • Resource accounting
  • Mobile agent platforms
  • Aglets
  • Agent Tcl
  • Agent Tcl applications
  • PMADE
  • Agent submitter
  • Agent host
  • Communication managers
  • State managers
  • Persistence manager
  • Security manager
  • Java and mobile agents
  • Advantages of Java
  • Shortcomings of Java
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Security Issuesin Mobile Computing
  • Security threats to wireless networks
  • IEEE 802.11 security through WEP
  • WEP security features of 802.11 wireless LANs
  • Authentication
  • Confidentiality
  • Integrity
  • Bluetooth security.
  • WAP 2.0 security
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Design andProgramming Projects
  • Implementation of mobile IP
  • Comparison between AODV and DSR protocols
  • Bluetooth application
  • Design of a WAP gateway
  • Mobile agents for network monitoring
  • An IEEE 802.11 LAN for a typical student hostel
  • An application using wireless sensor networks
  • Summary
  • Problems
  • Multiple-choice questions
  • Further reading
  • Appendices
  • Appendix A
  • Java programming language
  • Socket programming
  • Remote procedure call
  • Remote method invocation
  • Appendix B
  • Index.