Mobile Computing. (Record no. 25678)

MARC details
000 -LEADER
fixed length control field 07702nam a22003613i 4500
001 - CONTROL NUMBER
control field EBC5127392
003 - CONTROL NUMBER IDENTIFIER
control field MiAaPQ
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190110102745.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 181231s1900 xx o ||||0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788131742129
Qualifying information (electronic bk.)
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC5127392
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL5127392
035 ## - SYSTEM CONTROL NUMBER
System control number (CaONFJC)MIL276870
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1027133532
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd
Classification number 621.38456
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Garg, Kumkum.
245 10 - TITLE STATEMENT
Title Mobile Computing.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (233 pages)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Mobile Computing -- Copyright -- Contents -- Preface -- Introduction to Mobility -- Process migration -- Mobile computing -- Mobile agents -- Technical issues for mobility -- Personal communication systems -- Context-aware computing -- Outline of the book -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Wireless and Cellular Communication -- The electromagnetic spectrum -- Radio waves -- Microwaves -- Infrared waves -- Lightwaves -- Communication satellites -- Geostationary satellites -- Medium earth orbit satellites -- Low earth orbit satellites -- Multiple-access schemes -- FDMA-Frequency division multiple access -- TDMA-Time division multiple access -- CDMA-Code division multiple access -- Cellular communication -- The first generation (1G): 1980 -- The second generation (2G): 1992 -- The 2.5 generation (2.5G): 1996 -- The third generation (3G): 2000+ -- The 3.5 generation (3.5G): 2000+ -- The fourth generation (4G): 2002+ -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Wireless Networks -- The need for new wireless standards -- IEEE 802.11 WLAN standard -- Physical layer -- MAC layer -- Frame structure -- Services -- Bluetooth -- Advantages of Bluetooth -- Bluetooth applications -- Bluetooth protocol stack -- Bluetooth tracking services -- Bluetooth frame structure -- Infrared systems -- HiperLAN -- The IEEE 802.16 WiMAX standard -- Comparison of wireless technologies -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Logical Mobility I-Migrating Processes -- What is a process? -- Process migration -- The steps in process migration -- The advantages of process migration -- Applications of process migration -- Alternatives to process migration -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Physical Mobility.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note The requirements for physical mobility -- Wireless communication -- Mobility -- Portability -- Overview of IPv4 and IPv6 -- IPv4 -- IPv6 -- Mobile IP -- Goals of mobile IP -- Applicability -- Mobility support in IPv4 -- Mobility support in IPv6 -- Cellular IP -- The cellular IP access network -- Routing and paging cache -- TCP for mobility -- Indirect TCP -- Snooping TCP -- Mobile TCP -- Mobile databases -- Design issues -- Problems in mobile databases -- Commercially available systems -- The CODA file system-A case study -- Cache manager Venus -- Venus states -- Design criteria -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Mobile Ad Hoc Networks -- MANET characteristics -- Classification of MANETs -- Technologies for ad hoc networks -- Routing in MANETs -- Traditional routing protocols -- Requirements for routing protocols -- Classification of routing protocols -- Proactive routing protocols-The DSDV protocol -- Example of DSDV operation -- Reactive routing protocols -- Dynamic source routing -- Route discovery in DSR -- Route maintenance in DSR -- Route cache in DSR -- Adaptive on-demand distance vector protocol -- Route discovery in AODV -- Route maintenance in AODV -- Comparison between DSR and AODV -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Wireless Sensor Networks -- Applications of wireless sensor networks -- Differences from mobile ad hoc networks -- Design issues -- WSN architecture -- Sensor hardware components -- WSN communications architecture -- Routing protocols for WSN -- Data-centric protocols -- Flooding and gossiping -- Sensor protocols for information via negotiation -- Hierarchical protocols -- Low-energy adaptive clustering hierarchy -- PEGASIS -- TEEN and APTEEN -- Location-based protocols -- Case study -- The MICA mote -- TinyOS -- Development work in WSN -- Summary.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Problems -- Multiple-choice questions -- Further reading -- Mobile Handheld Devices -- Characteristics of PDAs -- The ARM processor -- Network connectivity -- Palm handhelds -- The Palm OS operating system -- Memory management -- Communication and networking -- HP handhelds -- Windows CE -- Memory architecture -- Memory management -- Processes and threads -- Scheduling -- Real-time performance -- The Windows Mobile operating system -- Nokia handhelds -- Specifications of Nokia 9210 -- Features -- Symbian operating system -- Design -- Symbian structure -- Summary -- Problems -- Multiple-choice questions -- Further reading -- The Mobile Internet and Wireless Web -- The Web programming model -- The WAP programming model -- WAP protocol stack -- Information-mode -- WAP 2.0 -- WAP gateway -- Push operation -- Push message format -- Pull operation -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Logical Mobility II-Mobile Agents -- Mobile agents -- Characteristics of mobile agents -- Architecture -- Mobile code and agents -- Mobile agents and process migration -- Client/server and mobile agent architectures -- Requirements for mobile agent systems -- Portability -- Ubiquity -- Network communication -- Server security -- Agent security -- Resource accounting -- Mobile agent platforms -- Aglets -- Agent Tcl -- Agent Tcl applications -- PMADE -- Agent submitter -- Agent host -- Communication managers -- State managers -- Persistence manager -- Security manager -- Java and mobile agents -- Advantages of Java -- Shortcomings of Java -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Security Issuesin Mobile Computing -- Security threats to wireless networks -- IEEE 802.11 security through WEP -- WEP security features of 802.11 wireless LANs -- Authentication -- Confidentiality -- Integrity -- Bluetooth security.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note WAP 2.0 security -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Design andProgramming Projects -- Implementation of mobile IP -- Comparison between AODV and DSR protocols -- Bluetooth application -- Design of a WAP gateway -- Mobile agents for network monitoring -- An IEEE 802.11 LAN for a typical student hostel -- An application using wireless sensor networks -- Summary -- Problems -- Multiple-choice questions -- Further reading -- Appendices -- Appendix A -- Java programming language -- Socket programming -- Remote procedure call -- Remote method invocation -- Appendix B -- Index.
520 ## - SUMMARY, ETC.
Summary, etc An undergraduate text on mobile computing, covering all the basic concepts of mobile computing as well as mobile communication. The book also deals with the new concepts that have emerged in recent years like Bluetooth Security and topics on Nokia Handhelds (a topic exclusive to this book).
590 ## - LOCAL NOTE (RLIN)
Local note Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Garg, Kumkum
Title Mobile Computing
Place, publisher, and date of publication : Pearson India,c1900
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN)
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127392">https://ebookcentral.proquest.com/lib/cethalassery/detail.action?docID=5127392</a>
Public note Click to View
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification Onlin access     CENTRAL LIBRARY Digital Library Digital Library 10/01/2019   621.38456 GAR-M E0160 10/01/2019 10/01/2019 E- Books
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery