Unlicensed mobile access technology : protocols, architecture, security, standards and applications
Author(s)
Bibliographic Information
Unlicensed mobile access technology : protocols, architecture, security, standards and applications
(Wireless networks and mobile communications series)
CRC Press, c2009
- : hard cover
Available at 1 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
"An Auerbach book"
Includes bibliographical references and index
Description and Table of Contents
Description
The goal of Unlicensed Mobile Access (UMA) is to provide seamless access to GSM and GPRS mobile service networks via unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on the level of knowledge in this growing field, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards, and Applications presents the first complete cross-referenced resource exploring UMA and UMA-relevant technologies.
When operating successfully, the technology supporting dual-mode enabled mobile terminals allows subscribers to roam freely and seamlessly between cellular networks. However, various technical challenges still occasionally impede clear communication. This book explores the complex issue of mobility management and emphasizes the need for intelligently designed vertical and horizontal handoff algorithms that will improve adaptability in heterogeneous wireless environments. In addition, it reviews the various strategies to guarantee Quality-of-Service (QoS) during movement and handoff.
The first chapters introduce the basic technology of these systems and discuss QoS, resource management, mobility management, and security issues in UMA technology. The middle section concentrates on protocols and security challenges in UMA-related technologies, which include Bluetooth, WirelessPAN, Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16). The final chapters present standard specifications and various applications.
Comprised of contributions from world-wide experts, this book is a complete reference, offering guidance on all aspects of the technical and practical issues in UMA technology.
Table of Contents
Architectures. UMA Technology: Architecture, Applications and Security. UMA and Related Technologies - The Road Ahead. Quality of Service Management in UMA. Radio Resource Management in IEEE 802.11-based UMA Networks. Security in IEEE 802.11-based UMA Networks,. Mobility Management between UMA Networks and Cellular Networks. Protocols and Security. Protocols and Decision Processes for Vertical Handovers. Piconet inter-connection strategies in IEEE 802.15.3 networks. Quality of Service in Wireless Local and Metropolitan Area Networks. Fast MAC Layer Handoff schemes in Wireless LANs. Security in Wireless LANs. Interference Mitigation in license-exempt 802.16 systems: a distributed approach. QoS capabilities in MANETs. Standards and Applications. WiMAX Architecture, Protocols, Security, and Privacy. A Detailed DSRC-WAVE Architecture. Supporting Heterogeneous Services in Ultra-Wideband based WPAN. A New UMA Paradigm: Class 2 Opportunistic Networks.
by "Nielsen BookData"