Vern A. Dubendorf, Vern Dubendorf9780470849491, 0470849495
Table of contents :
Team DDU……Page 1
Contents……Page 8
Dedication……Page 16
Foreword……Page 18
Preface……Page 20
Acknowledgments……Page 22
1.2 Where it all began ¨C Marconi……Page 24
1.3 Packet Data……Page 27
1.5 Cellular Technologies……Page 29
2.1 Introduction……Page 30
2.2 What Spread Spectrum Does……Page 31
2.3 How Spread Spectrum Works……Page 32
2.4 Frequency Hopping Spread Spectrum……Page 33
2.5 Direct Sequence Spread Spectrum……Page 36
3.1 Introduction……Page 40
3.2 CDMA Overview……Page 41
3.3 Introduction to CDMA……Page 42
3.4 Principles of CDMA……Page 43
3.5 Common Air Interface……Page 44
3.8 Transmission Parameters……Page 45
3.9 Overhead Channels……Page 46
3.10 Soft Handoff……Page 47
3.14 Reverse CDMA Channel……Page 48
3.15 Signal Structure……Page 49
3.16 TDMA……Page 51
4.1 Introduction……Page 54
4.2 Overview……Page 55
4.3 Interfaces and Protocols……Page 59
5.1 Introduction……Page 70
5.3 Differences between GPRS/ GSM and cdmaOne……Page 72
6.2 What is iMode?……Page 74
6.3 Technology……Page 75
6.4 Impacts to Information Systems……Page 76
6.5 Why is iMode so Successful?……Page 77
6.7 iMode 4G……Page 78
6.8 Conclusion……Page 79
7.1 Introduction……Page 80
7.3 A Brief History of UMTS……Page 81
7.5 Phases Towards the Development of UMTS……Page 82
7.7 3G and UMTS Technology……Page 83
7.8 3G Network Planning……Page 84
7.9 Owners of the 3G Networks……Page 95
8 Wireless Data Networks……Page 104
8.1 Data Networks and Internetworking……Page 105
8.2 The OSI Layers……Page 111
8.4 Internetwork Addressing……Page 115
8.5 Introduction to Wireless Data Networks……Page 119
8.6 MAC……Page 121
8.7 PHY……Page 122
8.8 The 802.11 Standards ( WLAN or WI- FI)……Page 125
8.9 Security……Page 154
8.10 Overview of 802.11b Security Mechanisms……Page 155
8.11 Authentication and Association……Page 159
8.12 Wireless Tools……Page 161
8.13 Penetration Testing on 802.11……Page 162
8.14 The 802.15 WPAN Standard ( Bluetooth)……Page 170
8.16 Mobile IP……Page 181
9.1 Introduction……Page 184
10.1 Introduction……Page 206
10.2 LMDS……Page 207
11.1 Introduction……Page 210
11.2 Public Key Infrastructure ( PKI)……Page 211
11.3 What is a PKI?……Page 212
11.4 PKI and Other Security Methods……Page 213
11.5 Digital Certificates……Page 215
11.6 Wireless Transport Layer Security ( WTLS)……Page 216
11.7 Authentication and Integrity……Page 224
11.8 Security Threats……Page 225
11.9 HIPAA ( USA)……Page 227
12.1 CDMA2000……Page 228
12.2 CDMA2000 Types……Page 229
12.3 Operator Benefits of CDMA2000……Page 230
13.1 COPS……Page 232
13.2 Will Wireless LANS Hurt 3G?……Page 233
14 4th Generation……Page 234
References……Page 238
Acronyms and Abbreviations……Page 240
Glossary……Page 244
Index……Page 252
Reviews
There are no reviews yet.