Wireless Data Technologies

Free Download

Authors:

ISBN: 9780470849491, 0470849495

Size: 2 MB (2219260 bytes)

Pages: 255/255

File format:

Language:

Publishing Year:

Category: Tags: ,

Vern A. Dubendorf, Vern Dubendorf9780470849491, 0470849495

The expansion and popularity of the Internet, along with the addition of wireless data functionality to wireless networks, has also contributed greatly to the growth of the wireless industry. In fact, the anticipated consumer demand for high bandwidth wireless data is commonly seen as the driving force behind current network upgrades and expansions. The number and types of companies aggressively investing in wireless technologies illustrate the importance of wireless data. Non-traditional telecommunications companies such as Cisco Systems, Intel, Microsoft, 3Com, and other professional services companies, are investing heavily in wireless product development and many have formed partnerships with wireless infrastructure manufacturers to help deliver wireless data services seamlessly to consumers.Written by a respected author this self-contained overview of wireless date technologies will provide a highly sought after technical reference to all those working within the main areas of Wireless Data Services. * Provides a self-contained reference which discusses the key wireless technologies including security * Presents an overview of the wireless industry and its key components such as GSM, GPRS, CDMA, TDMA, UMTS, cdma2000, and Spread Spectrum, 802.11, 15 and 16 standards * Discusses the currently hot topic of Wireless Security * Includes a Foreword by Dr Bill Hancock, Chief Security Officer, Exodus Communications/Cable & Wireless * Provides a ready reference as well as a reference to additional materials on each topic Essential reading for all staff working for Telecom companies: engineers, researchers, managers etc.

Table of contents :
Team DDU……Page 1
Contents……Page 8
Dedication……Page 16
Foreword……Page 18
Preface……Page 20
Acknowledgments……Page 22
1.2 Where it all began ¨C Marconi……Page 24
1.3 Packet Data……Page 27
1.5 Cellular Technologies……Page 29
2.1 Introduction……Page 30
2.2 What Spread Spectrum Does……Page 31
2.3 How Spread Spectrum Works……Page 32
2.4 Frequency Hopping Spread Spectrum……Page 33
2.5 Direct Sequence Spread Spectrum……Page 36
3.1 Introduction……Page 40
3.2 CDMA Overview……Page 41
3.3 Introduction to CDMA……Page 42
3.4 Principles of CDMA……Page 43
3.5 Common Air Interface……Page 44
3.8 Transmission Parameters……Page 45
3.9 Overhead Channels……Page 46
3.10 Soft Handoff……Page 47
3.14 Reverse CDMA Channel……Page 48
3.15 Signal Structure……Page 49
3.16 TDMA……Page 51
4.1 Introduction……Page 54
4.2 Overview……Page 55
4.3 Interfaces and Protocols……Page 59
5.1 Introduction……Page 70
5.3 Differences between GPRS/ GSM and cdmaOne……Page 72
6.2 What is iMode?……Page 74
6.3 Technology……Page 75
6.4 Impacts to Information Systems……Page 76
6.5 Why is iMode so Successful?……Page 77
6.7 iMode 4G……Page 78
6.8 Conclusion……Page 79
7.1 Introduction……Page 80
7.3 A Brief History of UMTS……Page 81
7.5 Phases Towards the Development of UMTS……Page 82
7.7 3G and UMTS Technology……Page 83
7.8 3G Network Planning……Page 84
7.9 Owners of the 3G Networks……Page 95
8 Wireless Data Networks……Page 104
8.1 Data Networks and Internetworking……Page 105
8.2 The OSI Layers……Page 111
8.4 Internetwork Addressing……Page 115
8.5 Introduction to Wireless Data Networks……Page 119
8.6 MAC……Page 121
8.7 PHY……Page 122
8.8 The 802.11 Standards ( WLAN or WI- FI)……Page 125
8.9 Security……Page 154
8.10 Overview of 802.11b Security Mechanisms……Page 155
8.11 Authentication and Association……Page 159
8.12 Wireless Tools……Page 161
8.13 Penetration Testing on 802.11……Page 162
8.14 The 802.15 WPAN Standard ( Bluetooth)……Page 170
8.16 Mobile IP……Page 181
9.1 Introduction……Page 184
10.1 Introduction……Page 206
10.2 LMDS……Page 207
11.1 Introduction……Page 210
11.2 Public Key Infrastructure ( PKI)……Page 211
11.3 What is a PKI?……Page 212
11.4 PKI and Other Security Methods……Page 213
11.5 Digital Certificates……Page 215
11.6 Wireless Transport Layer Security ( WTLS)……Page 216
11.7 Authentication and Integrity……Page 224
11.8 Security Threats……Page 225
11.9 HIPAA ( USA)……Page 227
12.1 CDMA2000……Page 228
12.2 CDMA2000 Types……Page 229
12.3 Operator Benefits of CDMA2000……Page 230
13.1 COPS……Page 232
13.2 Will Wireless LANS Hurt 3G?……Page 233
14 4th Generation……Page 234
References……Page 238
Acronyms and Abbreviations……Page 240
Glossary……Page 244
Index……Page 252

Reviews

There are no reviews yet.

Be the first to review “Wireless Data Technologies”
Shopping Cart
Scroll to Top