Smart Phone and Next Generation Mobile Computing -  Lionel Ni,  Pei Zheng

Smart Phone and Next Generation Mobile Computing (eBook)

eBook Download: PDF
2010 | 1. Auflage
350 Seiten
Elsevier Science (Verlag)
978-0-08-045834-2 (ISBN)
Systemvoraussetzungen
48,95 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This in-depth technical guide is an essential resource for anyone involved in the development of smart mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. Smart Phone and Next-Generation Mobile Computing shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur.

+ Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side
+ Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs
+ Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux
+ Considers the limitations of existing terminal designs and several pressing application design issues
+ Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks
+ Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing
This in-depth technical guide is an essential resource for anyone involved in the development of "e;smart? mobile wireless technology, including devices, infrastructure, and applications. Written by researchers active in both academic and industry settings, it offers both a big-picture introduction to the topic and detailed insights into the technical details underlying all of the key trends. Smart Phone and Next-Generation Mobile Computing shows you how the field has evolved, its real and potential current capabilities, and the issues affecting its future direction. It lays a solid foundation for the decisions you face in your work, whether you're a manager, engineer, designer, or entrepreneur. Covers the convergence of phone and PDA functionality on the terminal side, and the integration of different network types on the infrastructure side Compares existing and anticipated wireless technologies, focusing on 3G cellular networks and wireless LANs Evaluates terminal-side operating systems/programming environments, including Microsoft Windows Mobile, Palm OS, Symbian, J2ME, and Linux Considers the limitations of existing terminal designs and several pressing application design issues Explores challenges and possible solutions relating to the next phase of smart phone development, as it relates to services, devices, and networks Surveys a collection of promising applications, in areas ranging from gaming to law enforcement to financial processing

Front cover 1
Title page 4
Copyright page 5
Table of contents 6
About the Authors 18
Preface 20
Scope and Outline of the Book 21
Part I: A Detailed Survey of Emerging Mobile Wireless Technologies 21
Part II: An In-Depth Discussion of Mobile Computing Challenges and Approaches 23
Audience 25
Industry Technical Managers and Software Architects and Engineers 25
Technology Evangelists, Strategists, and Analysts 25
Academic Researchers 26
Acknowledgments 28
1 Introduction to Smart Phone and Mobile Computing 30
1.1 Smart Phone and Mobile Computing 31
1.1.1 Definitions 31
1.1.1.1 Mobile Computing 31
1.1.1.2 Wireless Communication 33
1.1.1.3 Smart Phone 33
1.1.2 Smart Phone: The Universal Mobile Terminal 35
1.1.2.1 Convergence of Computing and Communication 35
1.1.2.2 Pervasive Computing 38
1.2 Emerging Mobile Technologies and Applications 40
1.2.1 Cellular Networks 40
1.2.2 802.11 Wireless LAN 41
1.2.3 Wireless Mesh Network 42
1.2.4 WiMax 42
1.2.5 Wireless Sensor Network 43
1.2.6 RFID 43
1.2.7 WPAN 44
1.3 Issues and Challenges 45
1.3.1 Mobile Localization and Location-Based Services 45
1.3.2 Ad Hoc Networks 45
1.3.3 Integration of Heterogeneous Wireless Networks 46
1.3.4 Security and Privacy 46
1.3.5 Multimedia on Mobile Devices 46
1.3.6 Smart Devices and Smart Space 47
1.3.7 Context-Aware Computing 48
1.3.8 HCI and Middleware 48
1.4 Summary 49
References 49
2 The Next Wave of Computing 52
2.1 The Evolution of Cellular Networks and Cell Phones 52
2.1.1 The History of Cellular Systems 53
2.1.1.1 First-Generation (1G) Systems 54
2.1.1.2 Second-Generation (2G) Systems 56
2.1.1.3 Third- and Fourth-Generation Systems 59
2.1.1.4 The Theme of Technological Advances in the Wireless Industry 60
2.1.2 The Evolution of Cell Phones 61
2.2 The Evolution of PDAs 64
2.2.1 Apple Newton 65
2.2.2 The History of PDAs 66
2.2.2.1 Handwriting Recognition 68
2.2.2.2 Communication Interfaces 69
2.3 PDAs Versus Cell Phones 71
2.4 The Convergence of Mobile Devices 73
2.4.1 The Convergence of PDAs and Cell Phones 73
2.4.2 The Convergence of Cell Phones and Mobile Entertainment Devices 75
2.4.3 Smart Phone: The Universal Mobile Terminal 78
2.5 Smart Phone Applications and Services 80
2.5.1 First-Generation Smart Phone Applications 80
2.5.2 Second-Generation Smart Phone Applications 82
2.6 The Vision of Next-Generation Mobile Computing 85
2.6.1 Pervasive Computing 86
2.6.2 Convergence of Mobile Access 91
2.6.3 Limitations of Convergence 93
2.6.4 Pervasiveness of Mobile Intelligence 94
2.6.4.1 Enabling Ubiquitous Mobile Access 95
2.6.4.2 Context-Aware Information Retrieval and Processing 95
2.6.4.3 Large-Scale Data Collection and Dissemination 96
2.7 Mobile Computing Challenges 97
2.7.1 Integration of Wireless and Wired Networks 98
2.7.2 Mobile Security and Privacy 102
2.7.3 Location-Awareness Mobile Computing 106
2.7.4 Human-Computer Interface of Mobile Applications 108
2.7.5 Context-Aware Software Design 111
2.7.6 Low-Power Mobile Computing 114
2.7.6.1 Low-Power Mobile Computing 115
2.7.6.2 Power Management in Mobile Computing 116
2.8 Notable Mobile Computing Projects 116
2.8.1 Oxygen 116
2.8.2 Smart Dust 118
2.8.3 AURA 119
2.8.4 Wireless Grid 120
2.9 Summary 121
Further Reading 122
References 124
3 Supporting Wireless Technologies 128
3.1 The Frequency Spectrum 128
3.1.1 Public Media Broadcasting 130
3.1.2 Cellular Communication 133
3.1.3 Wireless Data Communication 133
3.1.4 Other Fixed or Mobile Wireless Communications 134
3.2 Wireless Communication Primer 135
3.2.1 Signal Propagation 135
3.2.1.1 Attenuation 136
3.2.1.2 Noise 137
3.2.1.3 Multi-Path Propagation 138
3.2.2 Modulation 138
3.2.2.1 Amplitude Modulation 139
3.2.2.2 Frequency Modulation 139
3.2.2.3 Phase Modulation 139
3.2.3 Multiplexing 141
3.2.3.1 Frequency-Division Multiplexing 142
3.2.3.2 Time-Division Multiplexing 142
3.2.3.3 Code-Division Multiplexing 143
3.3 Spread Spectrum 143
3.3.1 Direct-Sequence Spread Spectrum 145
3.3.2 Frequency-Hopping Spread Spectrum 145
3.4 Global System for Mobile and General Packet Radio Service 147
3.4.1 Global System for Mobile 148
3.4.1.1 GSM Network Architecture 150
3.4.1.2 Location Area Update 152
3.4.1.3 Call Routing 152
3.4.1.4 Handoff 153
3.4.2 General Packet Radio Service 155
3.4.2.1 Packet Switching 155
3.4.2.2 GPRS Architecture 156
3.4.2.3 GPRS Services 158
3.4.2.4 GPRS Terminals 158
3.4.2.5 Packet Data Protocol Context 159
3.4.2.6 Enhanced Data Rates for Global Evolution 160
3.4.2.7 High-Speed, Circuit-Switched Data 160
3.5 Code-Division Multiple Access 161
3.5.1 Code-Division Multiple Access Concept 161
3.5.2 IS-95 162
3.5.3 Software Handoff 163
3.5.4 Road to 4G 164
3.6 GSM Versus CDMA 166
3.7 3G Cellular Systems 166
3.7.1 UMTS/WCDMA Versus cdma2000 169
3.7.2 UMTS/WCDMA 169
3.7.3 cdma2000 171
3.7.4 4G Cellular Systems 173
3.8 2G Mobile Wireless Services 174
3.8.1 WAP and iMode 174
3.8.2 Short Message Service 176
3.9 Wireless Technologies Landscape 178
3.10 802.11 Wireless LANs 180
3.10.1 Architecture and Protocols 181
3.10.2 Frame Format 185
3.10.3 Beacon Frame 187
3.10.4 Roaming in a Wireless LAN 188
3.10.5 IEEE 802.11 Family 190
3.10.6 Security in Wireless LANs 193
3.11 Bluetooth 193
3.11.1 Architecture and Protocols 193
3.11.2 Bluetooth Overview 194
3.11.3 Bluetooth Architecture 195
3.11.4 Radio and Baseband 198
3.11.5 L2CAP and Frame Format 199
3.11.6 RFCOMM 200
3.11.7 SDP 201
3.11.8 Bluetooth Evolution 202
3.12 Ultra-Wideband 203
3.12.1 UWB Standards 205
3.12.2 UWB Applications 205
3.13 Radio Frequency Identi.cation 206
3.13.1 RFID System 207
3.13.2 RFID Applications 208
3.14 Wireless Metropolitan Area Networks 211
3.14.1 Wireless Broadband: IEEE 802.16 212
3.14.2 WiMax 214
3.15 Satellite 217
3.15.1 Satellite Communication 217
3.15.2 Satellite Systems 217
3.16 Wireless Sensor Networks 219
3.16.1 WSN Applications 220
3.16.1.1 Environmental Sensing 221
3.16.1.2 Object Sensing 221
3.16.1.3 Sensing with Intelligence 221
3.16.2 Wireless Sensor Node 222
3.16.3 Self-Organized Networks 223
3.16.4 ZigBee 225
3.17 Standardization in the Wireless World 226
3.17.1 Cellular Standard Groups 228
3.17.2 IEEE Standards 228
3.17.3 Standards War 230
3.18 Summary 231
Further Reading 232
References 233
4 Mobile Terminal Platforms 236
4.1 Mobile Hardware 236
4.1.1 Mobile Processors 237
4.1.1.1 ARM 238
4.1.1.2 MIPS 239
4.1.1.3 x86 and Centrino 240
4.1.1.4 Transmeta Crusoe and Efficeon 240
4.1.1.5 Other Mobile Processors 241
4.1.2 Mobile Processor Performance 241
4.1.3 Memory and Storage 242
4.1.4 Extension Interfaces 244
4.1.4.1 Input Device 245
4.1.4.2 Display 247
4.2 Software Platforms 249
4.3 Symbian 251
4.4 Palm OS 253
4.5 Microsoft Windows Mobile 256
4.5.1 Windows Mobile 257
4.5.2 .Net Compact Framework for Mobile Devices 260
4.6 Embedded Linux 261
4.7 Java 2 Micro Edition (J2ME) 263
4.7.1 Java Primer 264
4.7.2 J2ME Configurations 266
4.8 BREW 269
4.9 Comparisons of Mobile Software Platforms 270
4.10 Supporting Tools 272
4.10.1 Mobile Web and Markup Languages 272
4.10.2 Mobile Device Emulators and Simulators 274
4.11 Summary 275
Further Reading 277
References 278
5 Mobile Networking Challenges 280
5.1 Mobile IP 281
5.1.1 Mobile IPv6 282
5.2 Wireless TCP 284
5.2.1 Wireless TCP Challenges 285
5.2.2 Wireless TCP Protocols 286
5.3 Convergence of Heterogeneous Wireless Networks 289
5.3.1 Integration of Cellular Network and Wireless LANs 289
5.3.2 Internetworking Systems Architecture 291
5.3.3 Integration of UMTS Networks and Wireless LANs 294
5.3.4 Integration of cdma2000 Networks and Wireless LANs 299
5.3.5 Integration of Wireless LANs and Cellular Networks for Enterprise 301
5.3.6 Integration of Wireless LANs and Corporate IP PBX 303
5.4 Wireless LAN and Bluetooth Coexistence 304
5.4.1 Frequency Overlapping 304
5.4.2 PTA and Adaptive Frequency Hopping 305
5.5 Mobile Next-Generation Networks 307
5.5.1 Mobile IP for Macromobility 308
5.5.2 Mobile IP for Micromobility 309
5.5.3 Link Layer Mobility Management 311
5.6 Mobile Ad Hoc Networks 313
5.6.1 MANET Categories 315
5.6.2 Topology Control in a MANET 316
5.6.3 Routing in MANET 322
5.6.3.1 Routing Basics: Link State and Distance Vector Algorithms 323
5.6.3.2 Proactive Routing: DSDV and OLSR 324
5.6.3.3 On-Demand Routing: DSR 325
5.6.3.4 On-Demand Routing: AODV 326
5.6.3.5 TORA 327
5.6.3.6 Hybrid Routing Protocols (Gradient, Clustering) 327
5.6.3.7 Location-Based Routing Protocols 329
5.6.3.8 Multicast Routing 331
5.6.3.9 Broadcasting 331
5.6.3.10 Power-Aware Routing Protocols 333
5.6.3.11 Security in Ad Hoc Routing 334
5.6.4 Service Discovery 337
5.6.5 Mobile Ad Hoc Networks in the Real World 342
5.7 Quality of Service in Mobile Computing 344
5.7.1 An Overview of QoS 345
5.7.2 End-to-End QoS Support in Mobile Computing 349
5.7.2.1 QoS in Wireless Access Networks 352
5.7.2.2 QoS in Mobile Ad Hoc Networks 353
5.7.2.3 QoS in Fixed Wireless Mesh Networks 355
5.8 Summary 356
Further Reading 356
References 358
6 Mobile Security and Privacy 364
6.1 Security Primer 365
6.1.1 Ciphers and Message Con.dentiality 370
6.1.2 Cryptographic Hash Algorithms and Message Integrity 373
6.1.3 Authentication 377
6.1.3.1 Digital Signature 377
6.1.3.2 PKI and Digital Certificate 379
6.1.4 Key Management 381
6.1.4.1 Diffie–Hellman Key Exchange Protocol 381
6.1.4.2 RSA 382
6.1.4.3 Elliptic Curve Cryptography 383
6.1.5 Nonrepudiation 384
6.1.6 Network Security Protocols 385
6.1.6.1 Password 385
6.1.6.2 Challenge and Response 386
6.1.6.3 Kerberos 386
6.1.6.4 Internet Protocol Security 387
6.1.6.5 Secure Socket Layer 389
6.1.7 General Considerations of Mobile Security and Privacy 389
6.2 Cellular Network Security 391
6.2.1 Secure Wireless Transmission 391
6.2.2 Secure Wireless Transaction 395
6.2.2.1 Wireless Transport Layer Security 395
6.2.2.2 WAP Identi.cation Module 397
6.2.2.3 IPSec/SSL VPNs 398
6.3 Wireless LAN Security 399
6.3.1 Common 802.11 Security Myths 400
6.3.2 WEP Vulnerability 402
6.3.3 802.11 Authentication Vulnerabilities 404
6.3.4 802.1X, WPA, and 802.11i 405
6.4 Bluetooth Security 409
6.4.1 Bluetooth Security Architecture 409
6.4.2 Bluetooth Weakness and Attacks 412
6.5 Ad Hoc Network Security 414
6.5.1 Link Layer Ad Hoc Security 415
6.5.2 Key Management 415
6.5.3 Wireless Sensor Network Security 418
6.6 Mobile Privacy 421
6.6.1 Identity and Anonymity 422
6.6.2 Location Privacy 426
6.7 Summary 429
Further Reading 430
References 431
7 Mobile Application Challenges 436
7.1 Location-Aware Mobile Computing 437
7.1.1 Location Representation 438
7.1.2 Localization Techniques 439
7.1.2.1 Triangulation 439
7.1.2.2 Scene Analysis 442
7.1.2.3 Proximity 443
7.1.3 Global Positioning System 444
7.1.4 Cellular Network Triangulation 446
7.1.5 Indoor Location Sensing 446
7.1.5.1 Diffuse Infrared 447
7.1.5.2 Ultrasound 448
7.1.5.3 Radio Frequency Identification 449
7.1.5.4 802.11 Wireless LAN 451
7.1.5.5 Ultra-Wideband 453
7.1.5.6 Bluetooth 454
7.1.6 Wireless Sensor Location Sensing 454
7.1.7 Localization Analysis in Mobile Computing 456
7.1.8 Localization Techniques Comparison 459
7.1.9 Building Location-Based Services 461
7.1.9.1 Localization 462
7.1.9.2 Location Information Database 463
7.1.9.3 LBS Delivery 465
7.2 Mobile Messaging 467
7.2.1 Short Message Service Applications 468
7.2.2 Instant Messaging 469
7.2.3 SIP/SIMPLE Versus XMPP 473
7.2.3.1 Session Initialization Protocol 473
7.2.3.2 SIP for Instant Messaging and Presence Leveraging Extensions 475
7.2.3.3 Extensible Messaging and Presence Protocol 476
7.2.4 Mobile Instant Messaging 478
7.2.4.1 Wireless Village 479
7.2.4.2 Wireless IM Server Issues 481
7.3 Mobile Multimedia Streaming 482
7.3.1 Multimedia Primer 484
7.3.2 Packet-Switched Streaming in 3GPP 487
7.3.2.1 DRM in PSS 490
7.3.3 Mobile Broadcasting and Multicasting 491
7.3.3.1 Digital Video Broadcasting for Handheld 492
7.3.3.2 Multimedia Broadcast/Multicast Service 493
7.4 M-Commerce 494
7.4.1 M-Commerce Applications 495
7.4.2 M-Commerce Architecture 498
7.4.3 M-Commerce Client Issues 500
7.4.3.1 Mobile User Interface Design 500
7.4.3.2 Middleware 501
7.4.3.3 Mobile Client Security 503
7.4.4 Network Infrastructure Issues 507
7.4.5 M-Commerce Systems and Services 509
7.4.5.1 M-Payment 510
7.4.5.2 Mobile Banking 516
7.5 Mobile Enterprise 518
7.5.1 Mobile Enterprise Overview 518
7.5.2 Mobile Enterprise Applications 521
7.6 Wireless Application Gateway 524
7.6.1 Wireless Application Gateway Architecture 525
7.6.2 Wireless Application Models 527
7.6.3 Device-Independent Content Adaptation 528
7.7 Telematics 531
7.7.1 Telematics Systems 532
7.7.2 Telematics Issues 533
7.8 Summary 534
7.9 What’s Ahead 536
Further Reading 538
References 539
Index 542

Erscheint lt. Verlag 19.7.2010
Sprache englisch
Themenwelt Sachbuch/Ratgeber
Mathematik / Informatik Informatik Netzwerke
Mathematik / Informatik Informatik Programmiersprachen / -werkzeuge
Mathematik / Informatik Informatik Software Entwicklung
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
ISBN-10 0-08-045834-3 / 0080458343
ISBN-13 978-0-08-045834-2 / 9780080458342
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 2,9 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Martin Linten; Axel Schemberg; Kai Surendorf

eBook Download (2023)
Rheinwerk Computing (Verlag)
29,90