Mobile IP technology for M-business
Saved in:
Author / Creator: | Norris, Mark. |
---|---|
Imprint: | Boston : Artech House, c2001. |
Description: | xi, 291 p. : ill. ; 24 cm. |
Language: | English |
Series: | Artech House telecommunications library |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/4823972 |
Table of Contents:
- Acknowledgements
- 1. The mobile explosion
- 1.1. The mobile telephone network
- 1.1.1. The GSM standard
- 1.1.2. GSM in operation
- 1.1.3. Evolving standards
- 1.2. The addition of data
- 1.2.1. GPRS components
- 1.2.2. GPRS in action
- 1.3. State of the market
- 1.3.1. Some recent history
- 1.3.2. Market dynamics
- 1.4. About this book
- 1.5. Summary
- Selected bibliography
- 2. A segmented market
- 2.1. GPRS revisited
- 2.1.1. The big picture
- 2.1.2. Interfaces and information
- 2.1.3. It will all end in tiers
- 2.2. Deployment configuration options
- 2.2.1. Direct connection
- 2.2.2. Indirect connection
- 2.3. A deployment scenario
- 2.4. Summary
- Selected bibliography
- 3. Mobile IP
- 3.1. Basic operation
- 3.2. The care-of address
- 3.2.1. Discovery
- 3.2.2. Registration
- 3.2.3. Tunneling
- 3.2.4. Termination
- 3.3. Location information
- 3.3.1. Keeping information current
- 3.4. The end-to-end view
- 3.5. Status of mobile IP
- 3.6. Summary
- Selected bibliography
- 4. Addressing
- 4.1. IP addressing basics
- 4.1.1. Class A addresses
- 4.1.2. Class B addresses
- 4.1.3. Class C addresses
- 4.2. Registered and unregistered addresses
- 4.2.1. Benefits of private addressing
- 4.2.2. Disadvantages of private addressing
- 4.3. Static and dynamic addressing
- 4.3.1. Benefits of dynamic addressing
- 4.3.2. Disadvantages of dynamic addressing
- 4.4. Address management
- 4.5. Summary
- Selected bibliography
- 5. Routing
- 5.1. IP routing basics
- 5.1.1. Router attributes
- 5.1.2. Exterior/interior gateway routing protocols
- 5.1.3. Distance vector protocols
- 5.1.4. Path vector protocols
- 5.1.5. Link state protocols
- 5.2. Distance vector protocols in detail
- 5.2.1. Routing information protocol
- 5.2.2. Interior gateway routing protocol
- 5.2.3. Enhanced interior gateway routing protocol
- 5.3. Path vector
- 5.4. Link state protocols
- 5.4.1. Open shortest path first
- 5.4.2. OSPF in operation
- 5.4.3. Integrated intermediate system to intermediate system
- 5.5. Choosing the right protocol
- 5.5.1. Convergence
- 5.5.2. CPU utilization
- 5.5.3. Bandwidth efficiency
- 5.5.4. Memory overhead
- 5.5.5. Scalability
- 5.5.6. Stability
- 5.5.7. Technology/service independence
- 5.5.8. Interoperability/open standards support
- 5.5.9. Security
- 5.6. Summary
- Selected bibliography
- 6. M-business
- 6.1. The spectrum of m-business
- 6.1.1. Business travel
- 6.1.2. Commercial on-line services
- 6.2. The back-end components of m-business
- 6.2.1. Catalogs
- 6.2.2. Payment systems
- 6.2.3. Settlement
- 6.2.4. Presentation
- 6.3. Design requirements
- 6.3.1. Ensuring network performance
- 6.3.2. Maintaining the network
- 6.4. Security
- 6.4.1. Understanding the threat
- 6.4.2. Guarding against attack
- 6.4.3. Security solutions
- 6.4.4. Security technology
- 6.5. Summary
- Selected bibliography
- 7. Future prospects
- 7.1. Deployment issues
- 7.1.1. Transparent mode
- 7.1.2. Nontransparent mode
- 7.1.3. The corporate VPN in transparent mode
- 7.2. Overview of end-to-end VPN operation
- 7.2.1. Business aspects
- 7.2.2. Partnering
- 7.2.3. Billing models
- 7.3. Into the future
- 7.4. Summary
- Selected bibliography
- Appendix A. The Internet Protocol, Versions 4 and 6
- A.1. Overview of the Internet Protocol
- A.1.1. Addressing
- A.1.2. Routing
- A.1.3. Mapping IP addresses to physical locations
- A.1.4. Moving data from the network to the application
- A.1.5. Naming and addressing
- A.1.6. Using names instead of IP addresses
- A.2. IP Version 4 limitations and constraints
- A.3. IP Version 6 development and features
- A.3.1. Addressing
- A.3.2. Performance
- A.3.3. Security
- A.3.4. Autoconfiguration
- A.4. Impact of IP Version 6 on mobile data
- A.4.1. Security
- A.4.2. Route optimization
- A.4.3. Source routing
- Selected bibliography
- Appendix B. Short-range interconnection technology
- B.1. Technologies compared
- B.2. Bluetooth
- B.3. IrDA
- B.4. Summary
- Selected bibliography
- Appendix C. The third-generation mobile network
- C.1. A brief guide to UMTS
- C.2. Perspectives on the third generation
- C.3. Migrating to the third generation
- C.3.1. From GSM
- C.3.2. From CDMA
- C.3.3. From TDMA
- C.4. Implications for mobile data
- C.5. Summary
- Selected bibliography
- Appendix D. Mobile devices
- D.1. Handheld devices
- D.2. Security
- D.2.1. Link security
- D.2.2. Device security--smart cards
- D.3. Mobile operating systems
- D.4. Delivering m-business
- D.4.1. Telecommunications Information Networking Architecture
- D.4.2. Jini
- D.4.3. Wireless Knowledge
- D.4.4. IBM Transcode
- Selected bibliography
- Web sites
- Glossary
- About the author
- Index