当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standar

Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standar

书名:Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standar

上传:石头

时间:2009-09-18

文件大小:5.1 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:Yan Zhang, Laurence T. Yang, Jianhua Ma
出版日期:August 28, 2008
出版社:其它
页数:424
ISBN:ISBN-10: 1420055372 ISBN-13: 978-1420055375
文件格式:PDF


Product Description
The goal of Unlicensed Mobile Access (UMA) is to provide seamlessaccess to GSM and GPRS mobile service networks via unlicensed spectrumtechnologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on thelevel of knowledge in this growing field, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards, and Applicationspresents the first complete cross-referenced resource exploring UMA andUMA-relevant technologies.When operating successfully, the technologysupporting dual-mode enabled mobile terminals allows subscribers toroam freely and seamlessly between cellular networks. However, varioustechnical challenges still occasionally impede clear communication.This book explores the complex issue of mobility management andemphasizes the need for intelligently designed vertical and horizontalhandoff algorithms that will improve adaptability in heterogeneouswireless environments. In addition, it reviews the various strategiesto guarantee Quality-of- Service (QoS) during movement and handoff.The first chapters introduce the basic technology of these systemsand discuss QoS, resource management, mobility management, and securityissues in UMA technology. The middle section concentrates on protocolsand security challenges in UMA-related technologies, which includeBluetooth, WirelessPAN, Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16).The final chapters present standard specifications and variousapplications.
Comprised of contributions from world-wide experts, this book is acomplete reference, offering guidance on all aspects of the technicaland practical issues in UMA technology.
About the Author
Simula Research Laboratory, Lysaker, Norway St. Francis XavierUniversity, Antigonish NS, Canada Hosei University, Koganei, Japan
Tags:ApplicationsMobileProtocolsSecurityTechnology


相关书籍

  • Inside Java 2 Platform Security, 2nd Second Edition (PDF英文版)
  • Web Services Security and E-business
  • The Myths of Security: What the Computer Security Industry Doesn’t Want You to K
  • Replicated Data Management for Mobile Computing (PDF 英文版)
  • Guide to Computer Network Security (Springer PDF英文版)

评论 (0) All

登陆 | 还没注册?