Mobile IP technology for M-business /

Saved in:
Bibliographic Details
Author / Creator:Norris, Mark.
Imprint:Boston : Artech House, ©2001.
Description:1 online resource (xi, 291 pages) : illustrations.
Language:English
Series:Artech House mobile communications series
Artech House mobile communications series.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11115328
Hidden Bibliographic Details
ISBN:1580534589
9781580534581
1580533019
9781580533010
Notes:Includes bibliographical references and index.
Restrictions unspecified
Electronic reproduction. [S.l.] : HathiTrust Digital Library, 2010.
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212
digitized 2010 HathiTrust Digital Library committed to preserve
Print version record.
Summary:Here's a first-of-its-kind book that introduces you to the next generation of mobile networks, where IP data capability and mobile communications become integrated to form new, cutting-edge mobile IP networks. This unique resource offers you a thorough understanding of the convergence of mobile and data technology. It explains how the prospect of continuous connectivity adds a new dimension to e-business, moving it towards m-business, which promises to give users access to network services as they travel from one location to another.
Other form:Print version: Norris, Mark. Mobile IP technology for M-business. Boston : Artech House, ©2001 1580533019
Table of Contents:
  • Acknowledgements
  • 1. The mobile explosion
  • 1.1. The mobile telephone network
  • 1.1.1. The GSM standard
  • 1.1.2. GSM in operation
  • 1.1.3. Evolving standards
  • 1.2. The addition of data
  • 1.2.1. GPRS components
  • 1.2.2. GPRS in action
  • 1.3. State of the market
  • 1.3.1. Some recent history
  • 1.3.2. Market dynamics
  • 1.4. About this book
  • 1.5. Summary
  • Selected bibliography
  • 2. A segmented market
  • 2.1. GPRS revisited
  • 2.1.1. The big picture
  • 2.1.2. Interfaces and information
  • 2.1.3. It will all end in tiers
  • 2.2. Deployment configuration options
  • 2.2.1. Direct connection
  • 2.2.2. Indirect connection
  • 2.3. A deployment scenario
  • 2.4. Summary
  • Selected bibliography
  • 3. Mobile IP
  • 3.1. Basic operation
  • 3.2. The care-of address
  • 3.2.1. Discovery
  • 3.2.2. Registration
  • 3.2.3. Tunneling
  • 3.2.4. Termination
  • 3.3. Location information
  • 3.3.1. Keeping information current
  • 3.4. The end-to-end view
  • 3.5. Status of mobile IP
  • 3.6. Summary
  • Selected bibliography
  • 4. Addressing
  • 4.1. IP addressing basics
  • 4.1.1. Class A addresses
  • 4.1.2. Class B addresses
  • 4.1.3. Class C addresses
  • 4.2. Registered and unregistered addresses
  • 4.2.1. Benefits of private addressing
  • 4.2.2. Disadvantages of private addressing
  • 4.3. Static and dynamic addressing
  • 4.3.1. Benefits of dynamic addressing
  • 4.3.2. Disadvantages of dynamic addressing
  • 4.4. Address management
  • 4.5. Summary
  • Selected bibliography
  • 5. Routing
  • 5.1. IP routing basics
  • 5.1.1. Router attributes
  • 5.1.2. Exterior/interior gateway routing protocols
  • 5.1.3. Distance vector protocols
  • 5.1.4. Path vector protocols
  • 5.1.5. Link state protocols
  • 5.2. Distance vector protocols in detail
  • 5.2.1. Routing information protocol
  • 5.2.2. Interior gateway routing protocol
  • 5.2.3. Enhanced interior gateway routing protocol
  • 5.3. Path vector
  • 5.4. Link state protocols
  • 5.4.1. Open shortest path first
  • 5.4.2. OSPF in operation
  • 5.4.3. Integrated intermediate system to intermediate system
  • 5.5. Choosing the right protocol
  • 5.5.1. Convergence
  • 5.5.2. CPU utilization
  • 5.5.3. Bandwidth efficiency
  • 5.5.4. Memory overhead
  • 5.5.5. Scalability
  • 5.5.6. Stability
  • 5.5.7. Technology/service independence
  • 5.5.8. Interoperability/open standards support
  • 5.5.9. Security
  • 5.6. Summary
  • Selected bibliography
  • 6. M-business
  • 6.1. The spectrum of m-business
  • 6.1.1. Business travel
  • 6.1.2. Commercial on-line services
  • 6.2. The back-end components of m-business
  • 6.2.1. Catalogs
  • 6.2.2. Payment systems
  • 6.2.3. Settlement
  • 6.2.4. Presentation
  • 6.3. Design requirements
  • 6.3.1. Ensuring network performance
  • 6.3.2. Maintaining the network
  • 6.4. Security
  • 6.4.1. Understanding the threat
  • 6.4.2. Guarding against attack
  • 6.4.3. Security solutions
  • 6.4.4. Security technology
  • 6.5. Summary
  • Selected bibliography
  • 7. Future prospects
  • 7.1. Deployment issues
  • 7.1.1. Transparent mode
  • 7.1.2. Nontransparent mode
  • 7.1.3. The corporate VPN in transparent mode
  • 7.2. Overview of end-to-end VPN operation
  • 7.2.1. Business aspects
  • 7.2.2. Partnering
  • 7.2.3. Billing models
  • 7.3. Into the future
  • 7.4. Summary
  • Selected bibliography
  • Appendix A. The Internet Protocol, Versions 4 and 6
  • A.1. Overview of the Internet Protocol
  • A.1.1. Addressing
  • A.1.2. Routing
  • A.1.3. Mapping IP addresses to physical locations
  • A.1.4. Moving data from the network to the application
  • A.1.5. Naming and addressing
  • A.1.6. Using names instead of IP addresses
  • A.2. IP Version 4 limitations and constraints
  • A.3. IP Version 6 development and features
  • A.3.1. Addressing
  • A.3.2. Performance
  • A.3.3. Security
  • A.3.4. Autoconfiguration
  • A.4. Impact of IP Version 6 on mobile data
  • A.4.1. Security
  • A.4.2. Route optimization
  • A.4.3. Source routing
  • Selected bibliography
  • Appendix B. Short-range interconnection technology
  • B.1. Technologies compared
  • B.2. Bluetooth
  • B.3. IrDA
  • B.4. Summary
  • Selected bibliography
  • Appendix C. The third-generation mobile network
  • C.1. A brief guide to UMTS
  • C.2. Perspectives on the third generation
  • C.3. Migrating to the third generation
  • C.3.1. From GSM
  • C.3.2. From CDMA
  • C.3.3. From TDMA
  • C.4. Implications for mobile data
  • C.5. Summary
  • Selected bibliography
  • Appendix D. Mobile devices
  • D.1. Handheld devices
  • D.2. Security
  • D.2.1. Link security
  • D.2.2. Device security--smart cards
  • D.3. Mobile operating systems
  • D.4. Delivering m-business
  • D.4.1. Telecommunications Information Networking Architecture
  • D.4.2. Jini
  • D.4.3. Wireless Knowledge
  • D.4.4. IBM Transcode
  • Selected bibliography
  • Web sites
  • Glossary
  • About the author
  • Index