Mobile Computing. (Record no. 25678)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07702nam a22003613i 4500 |
001 - CONTROL NUMBER | |
control field | EBC5127392 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20190110102745.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 181231s1900 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788131742129 |
Qualifying information | (electronic bk.) |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC5127392 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL5127392 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaONFJC)MIL276870 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1027133532 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23rd |
Classification number | 621.38456 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Garg, Kumkum. |
245 10 - TITLE STATEMENT | |
Title | Mobile Computing. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (233 pages) |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Mobile Computing -- Copyright -- Contents -- Preface -- Introduction to Mobility -- Process migration -- Mobile computing -- Mobile agents -- Technical issues for mobility -- Personal communication systems -- Context-aware computing -- Outline of the book -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Wireless and Cellular Communication -- The electromagnetic spectrum -- Radio waves -- Microwaves -- Infrared waves -- Lightwaves -- Communication satellites -- Geostationary satellites -- Medium earth orbit satellites -- Low earth orbit satellites -- Multiple-access schemes -- FDMA-Frequency division multiple access -- TDMA-Time division multiple access -- CDMA-Code division multiple access -- Cellular communication -- The first generation (1G): 1980 -- The second generation (2G): 1992 -- The 2.5 generation (2.5G): 1996 -- The third generation (3G): 2000+ -- The 3.5 generation (3.5G): 2000+ -- The fourth generation (4G): 2002+ -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Wireless Networks -- The need for new wireless standards -- IEEE 802.11 WLAN standard -- Physical layer -- MAC layer -- Frame structure -- Services -- Bluetooth -- Advantages of Bluetooth -- Bluetooth applications -- Bluetooth protocol stack -- Bluetooth tracking services -- Bluetooth frame structure -- Infrared systems -- HiperLAN -- The IEEE 802.16 WiMAX standard -- Comparison of wireless technologies -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Logical Mobility I-Migrating Processes -- What is a process? -- Process migration -- The steps in process migration -- The advantages of process migration -- Applications of process migration -- Alternatives to process migration -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Physical Mobility. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | The requirements for physical mobility -- Wireless communication -- Mobility -- Portability -- Overview of IPv4 and IPv6 -- IPv4 -- IPv6 -- Mobile IP -- Goals of mobile IP -- Applicability -- Mobility support in IPv4 -- Mobility support in IPv6 -- Cellular IP -- The cellular IP access network -- Routing and paging cache -- TCP for mobility -- Indirect TCP -- Snooping TCP -- Mobile TCP -- Mobile databases -- Design issues -- Problems in mobile databases -- Commercially available systems -- The CODA file system-A case study -- Cache manager Venus -- Venus states -- Design criteria -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Mobile Ad Hoc Networks -- MANET characteristics -- Classification of MANETs -- Technologies for ad hoc networks -- Routing in MANETs -- Traditional routing protocols -- Requirements for routing protocols -- Classification of routing protocols -- Proactive routing protocols-The DSDV protocol -- Example of DSDV operation -- Reactive routing protocols -- Dynamic source routing -- Route discovery in DSR -- Route maintenance in DSR -- Route cache in DSR -- Adaptive on-demand distance vector protocol -- Route discovery in AODV -- Route maintenance in AODV -- Comparison between DSR and AODV -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Wireless Sensor Networks -- Applications of wireless sensor networks -- Differences from mobile ad hoc networks -- Design issues -- WSN architecture -- Sensor hardware components -- WSN communications architecture -- Routing protocols for WSN -- Data-centric protocols -- Flooding and gossiping -- Sensor protocols for information via negotiation -- Hierarchical protocols -- Low-energy adaptive clustering hierarchy -- PEGASIS -- TEEN and APTEEN -- Location-based protocols -- Case study -- The MICA mote -- TinyOS -- Development work in WSN -- Summary. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Problems -- Multiple-choice questions -- Further reading -- Mobile Handheld Devices -- Characteristics of PDAs -- The ARM processor -- Network connectivity -- Palm handhelds -- The Palm OS operating system -- Memory management -- Communication and networking -- HP handhelds -- Windows CE -- Memory architecture -- Memory management -- Processes and threads -- Scheduling -- Real-time performance -- The Windows Mobile operating system -- Nokia handhelds -- Specifications of Nokia 9210 -- Features -- Symbian operating system -- Design -- Symbian structure -- Summary -- Problems -- Multiple-choice questions -- Further reading -- The Mobile Internet and Wireless Web -- The Web programming model -- The WAP programming model -- WAP protocol stack -- Information-mode -- WAP 2.0 -- WAP gateway -- Push operation -- Push message format -- Pull operation -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Logical Mobility II-Mobile Agents -- Mobile agents -- Characteristics of mobile agents -- Architecture -- Mobile code and agents -- Mobile agents and process migration -- Client/server and mobile agent architectures -- Requirements for mobile agent systems -- Portability -- Ubiquity -- Network communication -- Server security -- Agent security -- Resource accounting -- Mobile agent platforms -- Aglets -- Agent Tcl -- Agent Tcl applications -- PMADE -- Agent submitter -- Agent host -- Communication managers -- State managers -- Persistence manager -- Security manager -- Java and mobile agents -- Advantages of Java -- Shortcomings of Java -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Security Issuesin Mobile Computing -- Security threats to wireless networks -- IEEE 802.11 security through WEP -- WEP security features of 802.11 wireless LANs -- Authentication -- Confidentiality -- Integrity -- Bluetooth security. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | WAP 2.0 security -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Design andProgramming Projects -- Implementation of mobile IP -- Comparison between AODV and DSR protocols -- Bluetooth application -- Design of a WAP gateway -- Mobile agents for network monitoring -- An IEEE 802.11 LAN for a typical student hostel -- An application using wireless sensor networks -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Appendices -- Appendix A -- Java programming language -- Socket programming -- Remote procedure call -- Remote method invocation -- Appendix B -- Index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | An undergraduate text on mobile computing, covering all the basic concepts of mobile computing as well as mobile communication. The book also deals with the new concepts that have emerged in recent years like Bluetooth Security and topics on Nokia Handhelds (a topic exclusive to this book). |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Print version: |
Main entry heading | Garg, Kumkum |
Title | Mobile Computing |
Place, publisher, and date of publication | : Pearson India,c1900 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127392">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127392</a> |
Public note | Click to View |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Materials specified (bound volume or other part) | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Onlin access | CENTRAL LIBRARY | Digital Library | Digital Library | 10/01/2019 | 621.38456 GAR-M | E0160 | 10/01/2019 | 10/01/2019 | E- Books |