Image from Google Jackets

Ad Hoc Mobile Wireless Networks.

By: Material type: TextTextDescription: 1 online resource (323 pages)ISBN:
  • 9788131735275
Genre/Form: Additional physical formats: Print version:: Ad Hoc Mobile Wireless Networks: Protocols and SystemsDDC classification:
  • 23rd 621.38456
Online resources:
Contents:
Cover -- CONTENTS -- ABOUT THE AUTHOR -- PREFACE -- ACKNOWLEDGMENTS -- QUOTES & WORDS OF WISDOM -- 1 INTRODUCTION TO WIRELESS NETWORKS -- 1.1 Evolution of Mobile Cellular Networks -- 1.1.1 First-Generation Mobile Systems -- 1.1.2 Second-Generation Mobile Systems -- 1.1.3 2.5G Mobile Systems -- 1.1.4 Third-Generation Mobile Systems -- 1.2 Global System for Mobile Communications (GSM) -- 1.3 General Packet Radio Service (GPRS) -- 1.4 Personal Communications Services (PCSs) -- 1.5 Wireless LANs (WLANS) -- 1.6 Universal Mobile Telecommunications System (UMTS) -- 1.7 IMT2000 -- 1.8 IS-95, cdmaOne and cdma2000 Evolution -- 1.9 Organization of this Book -- 2 ORIGINS OF AD HOC: PACKET RADIO NETWORKS -- 2.1 Introduction -- 2.2 Technical Challenges -- 2.3 Architecture of PRNETs -- 2.4 Components of Packet Radios -- 2.5 Routing in PRNETs -- 2.5.1 Point-to-Point Routing -- 2.5.2 Broadcast Routing -- 2.5.3 Packet Forwarding -- 2.5.4 Impact of Mobility -- 2.6 Route Calculation -- 2.6.1 Principles of Packet Forwarding -- 2.7 Pacing Techniques -- 2.8 Media Access in PRNETs -- 2.9 Flow Acknowledgments in PRNETs -- 2.10 Conclusions -- 3 AD HOC WIRELESS NETWORKS -- 3.1 What Is an Ad Hoc Network? -- 3.2 Heterogeneity in Mobile Devices -- 3.3 Wireless Sensor Networks -- 3.4 Traffic Profiles -- 3.5 Types of Ad Hoc Mobile Communications -- 3.6 Types of Mobile Host Movements -- 3.6.1 Movements by Nodes in a Route -- 3.6.2 Movements by Subnet-Bridging Nodes -- 3.6.3 Concurrent Node Movements -- 3.7 Challenges Facing Ad Hoc Mobile Networks -- 3.7.1 Spectrum Allocation and Purchase -- 3.7.2 Media Access -- 3.7.3 Routing -- 3.7.4 Multicasting -- 3.7.5 Energy Efficiency -- 3.7.6 TCP Performance -- 3.7.7 Service Location, Provision, and Access -- 3.7.8 Security & Privacy -- 3.8 Conclusions -- 4 AD HOC WIRELESS MEDIA ACCESS PROTOCOLS -- 4.1 Introduction.
4.1.1 Synchronous MAC Protocols -- 4.1.2 Asynchronous MAC Protocols -- 4.2 Problems in Ad Hoc Channel Access -- 4.2.1 Hidden Terminal Problem -- 4.2.2 Shortcomings of the RTS-CTS Solution -- 4.2.3 Exposed Node Problem -- 4.3 Receiver-Initiated MAC Protocols -- 4.4 Sender-Initiated MAC Protocols -- 4.5 Existing Ad Hoc MAC Protocols -- 4.5.1 Multiple Access with Collision Avoidance (MACA) -- 4.5.2 MACA-BI (By Invitation) -- 4.5.3 Power-Aware Multi-Access Protocol with Signaling (PAMAS) -- 4.5.4 Dual Busy Tone Multiple Access (DBTMA) -- 4.6 MARCH: Media Access with Reduced Handshake -- 4.7 Conclusions -- 5 OVERVIEW OF AD HOC ROUTING PROTOCOLS -- 5.1 Table-Driven Approaches -- 5.2 Destination Sequenced Distance Vector (DSDV) -- 5.3 Wireless Routing Protocol (WRP) -- 5.4 Cluster Switch Gateway Routing (CSGR) -- 5.5 Source-Initiated On-Demand Approaches -- 5.6 Ad Hoc On-Demand Distance Vector Routing (AODV) -- 5.7 Dynamic Source Routing (DSR) -- 5.8 Temporally Ordered Routing Algorithm (TORA) -- 5.9 Signal Stability Routing (SSR) -- 5.10 Location-Aided Routing (LAR) -- 5.10.1 Shortcomings of LAR -- 5.11 Power-Aware Routing (PAR) -- 5.12 Zone Routing Protocol (ZRP) -- 5.13 Source Tree Adaptive Routing (STAR) -- 5.14 Relative Distance Microdiversity Routing (RDMAR) -- 5.15 Conclusions -- 6 ASSOCIATIVITY-BASED LONG-LIVED ROUTING -- 6.1 A New Routing Paradigm -- 6.2 Associativity-Based Long-Lived Routing -- 6.2.1 New Routing Metrics -- 6.2.2 Route Selection Rules -- 6.3 ABR Protocol Description -- 6.3.1 Route Discovery Phase -- 6.3.2 Route Reconstruction (RRC) Phase -- 6.3.3 Alternate Routes -- 6.3.4 Route Deletion Phase -- 6.3.5 ABR Headers and Tables -- 6.3.6 ABR Protocol Summary -- 6.4 Conclusions -- 7 IMPLEMENTATION OF AD HOC MOBILE NETWORKS -- 7.1 Introduction -- 7.2 ABR Protocol Implementation in Linux -- 7.2.1 System Components.
7.2.2 Software Layering Architecture -- 7.2.3 Implementing ABR Packet Headers and Beaconing -- 7.2.4 Implementing ABR Outflow and Inflow -- 7.2.5 Implementing ABR Routing Functions -- 7.3 Experimentation and Protocol Performance -- 7.3.1 Control Packet Overhead -- 7.3.2 Route Discovery Time -- 7.3.3 End-to-End Delay -- 7.3.4 Data Throughput -- 7.3.5 Effects of Beaconing on Battery Life -- 7.4 Important Deductions -- 7.5 Conclusions -- 8 COMMUNICATION PERFORMANCE OF AD HOC NETWORKS -- 8.1 Introduction -- 8.1.1 ABR Beaconing -- 8.2 Performance Parameters of Interest -- 8.3 Route Discovery (RD) Time -- 8.3.1 Impact of Beaconing Interval on RD Time -- 8.3.2 Impact of Route Length on RD Time -- 8.4 End-to-End Delay (EED) Performance -- 8.4.1 Impact of Packet Size on EED -- 8.4.2 Impact of Beaconing Interval on EED -- 8.4.3 Impact of Route Length on EED -- 8.5 Communication Throughput Performance -- 8.5.1 Impact of Packet Size on Throughput -- 8.5.2 Impact of Beaconing Interval on Throughput -- 8.5.3 Impact of Route Length on Throughput -- 8.6 Packet Loss Performance -- 8.6.1 Impact of Packet Size on Packet Loss -- 8.6.2 Impact of Beaconing Interval on Packet Loss -- 8.6.3 Impact of Route Length on Packet Loss -- 8.7 Route Reconfiguration/Repair Time -- 8.8 TCP/IP-Based Applications -- 8.8.1 Running TELNET over Ad Hoc -- 8.8.2 Running FTP over Ad Hoc -- 8.8.3 Running HTTP over Ad Hoc -- 8.9 Conclusions -- 9 ENERGY CONSERVATION: POWER LIFE ISSUES -- 9.1 Introduction -- 9.2 Power Management -- 9.2.1 Smart Batteries and Battery Characteristics -- 9.3 Advances in Device Power Management -- 9.3.1 Advance Power Management (APM) -- 9.3.2 Advance Configuration and Power Interface (ACPI) -- 9.4 Advances in Protocol Power Management -- 9.4.1 Power Conservation at the Data-Link Layer -- 9.4.2 Power Conservation at the Network Layer.
9.4.3 Power Conservation at the Transport Layer -- 9.5 Power Conservation by Mobile Applications -- 9.6 Periodic Beaconing On Battery Life -- 9.7 Standalone Beaconing -- 9.7.1 At High-Frequency (HF) Beaconing -- 9.7.2 At Low-Frequency (LF) Beaconing -- 9.7.3 Comparing HF and LF Standalone Beaconing -- 9.8 HF Beaconing with Neighboring Nodes -- 9.8.1 With One Neighor -- 9.8.2 With Two Neighbors -- 9.9 Comparison of HF Beaconing with and without Neighbors -- 9.9.1 With One Neighbor -- 9.9.2 With Two Neighbors -- 9.10 LF Beaconing with Neighboring Nodes -- 9.10.1 With One Neighbor -- 9.10.2 With Two Neighbors -- 9.11 Comparison of LF Beaconing with and without Neighbors -- 9.12 Deductions -- 9.13 Conclusions -- 10 AD HOC WIRELESS MULTICAST ROUTING -- 10.1 Multicasting in Wired Networks -- 10.1.1 IP Multicast Architecture -- 10.1.2 Multicast Tunnels and the MBone -- 10.1.3 Multicast Routing Algorithms -- 10.2 Multicast Routing in Mobile Ad Hoc Networks -- 10.3 Existing Ad Hoc Multicast Routing Protocols -- 10.3.1 Classification -- 10.3.2 DVMRP with Wireless Extension -- 10.3.3 AODV Multicast -- 10.3.4 Multicast Mesh: CAMP -- 10.3.5 Group-Based: ODMRP -- 10.3.6 Location-Based Multicast: LBM -- 10.4 ABAM: Associativity-Based Ad Hoc Multicast -- 10.4.1 Multicast Tree Formation -- 10.4.2 Handling Host Membership Dynamics (Join/Leave) -- 10.4.3 Dynamics Associated with Node Mobility -- 10.4.4 Deletion of Multicast Tree -- 10.4.5 ABAM Tree Reconfiguration -- 10.4.6 Complexity of ABAM -- 10.5 Comparisons of Multicast Routing Protocols -- 10.5.1 Protocol Differences -- 10.5.2 Operation and Performance Differences -- 10.5.3 Comparing Protocol Overhead -- 10.5.4 Time and Communication Complexity -- 10.6 Conclusions -- 11 TCP OVER AD HOC -- 11.1 Introduction to TCP -- 11.1.1 TCP Flow Control -- 11.1.2 TCP Congestion Control -- 11.1.3 Some Issues with TCP.
11.2 Versions of TCP -- 11.2.1 TCP Reno -- 11.2.2 TCP Tahoe -- 11.2.3 TCP Vegas -- 11.2.4 TCP SACK -- 11.3 Problems Facing TCP in Wireless Last-Hop -- 11.3.1 Indirect TCP -- 11.3.2 TCP Snoop -- 11.4 Problems Facing TCP in Wireless Ad Hoc -- 11.5 Approaches to TCP over Ad Hoc -- 11.5.1 TCP Feedback (TCP-F) -- 11.5.2 TCP-BuS -- 11.6 Conclusion -- 12 INTERNET & AD HOC SERVICE DISCOVERY -- 12.1 Resource Discovery in the Internet -- 12.2 Service Location Protocol (SLP) Architecture -- 12.2.1 User Agent -- 12.2.2 Directory Agent -- 12.2.3 Service Agent -- 12.3 SLPv2 Packet Format -- 12.4 Jini -- 12.5 Salutation Protocol -- 12.6 Simple Service Discovery Protocol (SSDP) -- 12.7 Service Discovery for Ad Hoc -- 12.7.1 Limitations of Existing Schemes -- 12.8 Ad Hoc Service Location Architectures -- 12.8.1 Service Co-Ordinator Based Architecture -- 12.8.2 Distributed Query-Based Architecture -- 12.8.3 Hybrid Service Location Architecture -- 12.9 Conclusions -- 13 BLUETOOTH TECHNOLOGY -- 13.1 Bluetooth Specifications -- 13.2 Bluetooth Architectures -- 13.2.1 Bluetooth Piconet -- 13.2.2 Bluetooth Scatternet -- 13.3 Bluetooth Protocols -- 13.4 Bluetooth Service Discovery -- 13.5 Bluetooth MAC -- 13.6 Bluetooth Packet Structure -- 13.7 Bluetooth Audio -- 13.8 Bluetooth Addressing -- 13.9 Bluetooth Limitations -- 13.10 Bluetooth Implementation -- 13.11 Conclusions -- 14 WIRELESS APPLICATION PROTOCOL (WAP) -- 14.1 The WAP Forum -- 14.2 The WAP Service Model -- 14.3 The WAP Protocol Architecture -- 14.4 The WWW Programming Model -- 14.5 The WAP Programming Model -- 14.6 Conclusions -- 15 AD HOC NOMADIC MOBILE APPLICATIONS -- 15.1 In the Office -- 15.2 While Traveling -- 15.3 Arriving Home -- 15.4 In the Car -- 15.5 Shopping Malls -- 15.6 The Modern Battlefield -- 15.7 Car-to-Car Mobile Communications -- 15.8 Mobile Collaborative Applications.
15.9 Location/Context Based Mobile Services.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Materials specified Status Barcode
Books Books CENTRAL LIBRARY General Stacks 621.38456 TOH-A Available 18271
Books Books CENTRAL LIBRARY General Stacks 621.38456 TOH-A Available 18272
Books Books CENTRAL LIBRARY General Stacks 621.38456 TOH-A Available 18273
Books Books CENTRAL LIBRARY General Stacks 621.38456 TOH-A Available 18274
Reference Reference CENTRAL LIBRARY Reference 621.38456 TOH-A Not for loan 18275
E- Books E- Books Digital Library Digital Library 621.38456 TOH-A Online Access Available E0089
Total holds: 0

Cover -- CONTENTS -- ABOUT THE AUTHOR -- PREFACE -- ACKNOWLEDGMENTS -- QUOTES & WORDS OF WISDOM -- 1 INTRODUCTION TO WIRELESS NETWORKS -- 1.1 Evolution of Mobile Cellular Networks -- 1.1.1 First-Generation Mobile Systems -- 1.1.2 Second-Generation Mobile Systems -- 1.1.3 2.5G Mobile Systems -- 1.1.4 Third-Generation Mobile Systems -- 1.2 Global System for Mobile Communications (GSM) -- 1.3 General Packet Radio Service (GPRS) -- 1.4 Personal Communications Services (PCSs) -- 1.5 Wireless LANs (WLANS) -- 1.6 Universal Mobile Telecommunications System (UMTS) -- 1.7 IMT2000 -- 1.8 IS-95, cdmaOne and cdma2000 Evolution -- 1.9 Organization of this Book -- 2 ORIGINS OF AD HOC: PACKET RADIO NETWORKS -- 2.1 Introduction -- 2.2 Technical Challenges -- 2.3 Architecture of PRNETs -- 2.4 Components of Packet Radios -- 2.5 Routing in PRNETs -- 2.5.1 Point-to-Point Routing -- 2.5.2 Broadcast Routing -- 2.5.3 Packet Forwarding -- 2.5.4 Impact of Mobility -- 2.6 Route Calculation -- 2.6.1 Principles of Packet Forwarding -- 2.7 Pacing Techniques -- 2.8 Media Access in PRNETs -- 2.9 Flow Acknowledgments in PRNETs -- 2.10 Conclusions -- 3 AD HOC WIRELESS NETWORKS -- 3.1 What Is an Ad Hoc Network? -- 3.2 Heterogeneity in Mobile Devices -- 3.3 Wireless Sensor Networks -- 3.4 Traffic Profiles -- 3.5 Types of Ad Hoc Mobile Communications -- 3.6 Types of Mobile Host Movements -- 3.6.1 Movements by Nodes in a Route -- 3.6.2 Movements by Subnet-Bridging Nodes -- 3.6.3 Concurrent Node Movements -- 3.7 Challenges Facing Ad Hoc Mobile Networks -- 3.7.1 Spectrum Allocation and Purchase -- 3.7.2 Media Access -- 3.7.3 Routing -- 3.7.4 Multicasting -- 3.7.5 Energy Efficiency -- 3.7.6 TCP Performance -- 3.7.7 Service Location, Provision, and Access -- 3.7.8 Security & Privacy -- 3.8 Conclusions -- 4 AD HOC WIRELESS MEDIA ACCESS PROTOCOLS -- 4.1 Introduction.

4.1.1 Synchronous MAC Protocols -- 4.1.2 Asynchronous MAC Protocols -- 4.2 Problems in Ad Hoc Channel Access -- 4.2.1 Hidden Terminal Problem -- 4.2.2 Shortcomings of the RTS-CTS Solution -- 4.2.3 Exposed Node Problem -- 4.3 Receiver-Initiated MAC Protocols -- 4.4 Sender-Initiated MAC Protocols -- 4.5 Existing Ad Hoc MAC Protocols -- 4.5.1 Multiple Access with Collision Avoidance (MACA) -- 4.5.2 MACA-BI (By Invitation) -- 4.5.3 Power-Aware Multi-Access Protocol with Signaling (PAMAS) -- 4.5.4 Dual Busy Tone Multiple Access (DBTMA) -- 4.6 MARCH: Media Access with Reduced Handshake -- 4.7 Conclusions -- 5 OVERVIEW OF AD HOC ROUTING PROTOCOLS -- 5.1 Table-Driven Approaches -- 5.2 Destination Sequenced Distance Vector (DSDV) -- 5.3 Wireless Routing Protocol (WRP) -- 5.4 Cluster Switch Gateway Routing (CSGR) -- 5.5 Source-Initiated On-Demand Approaches -- 5.6 Ad Hoc On-Demand Distance Vector Routing (AODV) -- 5.7 Dynamic Source Routing (DSR) -- 5.8 Temporally Ordered Routing Algorithm (TORA) -- 5.9 Signal Stability Routing (SSR) -- 5.10 Location-Aided Routing (LAR) -- 5.10.1 Shortcomings of LAR -- 5.11 Power-Aware Routing (PAR) -- 5.12 Zone Routing Protocol (ZRP) -- 5.13 Source Tree Adaptive Routing (STAR) -- 5.14 Relative Distance Microdiversity Routing (RDMAR) -- 5.15 Conclusions -- 6 ASSOCIATIVITY-BASED LONG-LIVED ROUTING -- 6.1 A New Routing Paradigm -- 6.2 Associativity-Based Long-Lived Routing -- 6.2.1 New Routing Metrics -- 6.2.2 Route Selection Rules -- 6.3 ABR Protocol Description -- 6.3.1 Route Discovery Phase -- 6.3.2 Route Reconstruction (RRC) Phase -- 6.3.3 Alternate Routes -- 6.3.4 Route Deletion Phase -- 6.3.5 ABR Headers and Tables -- 6.3.6 ABR Protocol Summary -- 6.4 Conclusions -- 7 IMPLEMENTATION OF AD HOC MOBILE NETWORKS -- 7.1 Introduction -- 7.2 ABR Protocol Implementation in Linux -- 7.2.1 System Components.

7.2.2 Software Layering Architecture -- 7.2.3 Implementing ABR Packet Headers and Beaconing -- 7.2.4 Implementing ABR Outflow and Inflow -- 7.2.5 Implementing ABR Routing Functions -- 7.3 Experimentation and Protocol Performance -- 7.3.1 Control Packet Overhead -- 7.3.2 Route Discovery Time -- 7.3.3 End-to-End Delay -- 7.3.4 Data Throughput -- 7.3.5 Effects of Beaconing on Battery Life -- 7.4 Important Deductions -- 7.5 Conclusions -- 8 COMMUNICATION PERFORMANCE OF AD HOC NETWORKS -- 8.1 Introduction -- 8.1.1 ABR Beaconing -- 8.2 Performance Parameters of Interest -- 8.3 Route Discovery (RD) Time -- 8.3.1 Impact of Beaconing Interval on RD Time -- 8.3.2 Impact of Route Length on RD Time -- 8.4 End-to-End Delay (EED) Performance -- 8.4.1 Impact of Packet Size on EED -- 8.4.2 Impact of Beaconing Interval on EED -- 8.4.3 Impact of Route Length on EED -- 8.5 Communication Throughput Performance -- 8.5.1 Impact of Packet Size on Throughput -- 8.5.2 Impact of Beaconing Interval on Throughput -- 8.5.3 Impact of Route Length on Throughput -- 8.6 Packet Loss Performance -- 8.6.1 Impact of Packet Size on Packet Loss -- 8.6.2 Impact of Beaconing Interval on Packet Loss -- 8.6.3 Impact of Route Length on Packet Loss -- 8.7 Route Reconfiguration/Repair Time -- 8.8 TCP/IP-Based Applications -- 8.8.1 Running TELNET over Ad Hoc -- 8.8.2 Running FTP over Ad Hoc -- 8.8.3 Running HTTP over Ad Hoc -- 8.9 Conclusions -- 9 ENERGY CONSERVATION: POWER LIFE ISSUES -- 9.1 Introduction -- 9.2 Power Management -- 9.2.1 Smart Batteries and Battery Characteristics -- 9.3 Advances in Device Power Management -- 9.3.1 Advance Power Management (APM) -- 9.3.2 Advance Configuration and Power Interface (ACPI) -- 9.4 Advances in Protocol Power Management -- 9.4.1 Power Conservation at the Data-Link Layer -- 9.4.2 Power Conservation at the Network Layer.

9.4.3 Power Conservation at the Transport Layer -- 9.5 Power Conservation by Mobile Applications -- 9.6 Periodic Beaconing On Battery Life -- 9.7 Standalone Beaconing -- 9.7.1 At High-Frequency (HF) Beaconing -- 9.7.2 At Low-Frequency (LF) Beaconing -- 9.7.3 Comparing HF and LF Standalone Beaconing -- 9.8 HF Beaconing with Neighboring Nodes -- 9.8.1 With One Neighor -- 9.8.2 With Two Neighbors -- 9.9 Comparison of HF Beaconing with and without Neighbors -- 9.9.1 With One Neighbor -- 9.9.2 With Two Neighbors -- 9.10 LF Beaconing with Neighboring Nodes -- 9.10.1 With One Neighbor -- 9.10.2 With Two Neighbors -- 9.11 Comparison of LF Beaconing with and without Neighbors -- 9.12 Deductions -- 9.13 Conclusions -- 10 AD HOC WIRELESS MULTICAST ROUTING -- 10.1 Multicasting in Wired Networks -- 10.1.1 IP Multicast Architecture -- 10.1.2 Multicast Tunnels and the MBone -- 10.1.3 Multicast Routing Algorithms -- 10.2 Multicast Routing in Mobile Ad Hoc Networks -- 10.3 Existing Ad Hoc Multicast Routing Protocols -- 10.3.1 Classification -- 10.3.2 DVMRP with Wireless Extension -- 10.3.3 AODV Multicast -- 10.3.4 Multicast Mesh: CAMP -- 10.3.5 Group-Based: ODMRP -- 10.3.6 Location-Based Multicast: LBM -- 10.4 ABAM: Associativity-Based Ad Hoc Multicast -- 10.4.1 Multicast Tree Formation -- 10.4.2 Handling Host Membership Dynamics (Join/Leave) -- 10.4.3 Dynamics Associated with Node Mobility -- 10.4.4 Deletion of Multicast Tree -- 10.4.5 ABAM Tree Reconfiguration -- 10.4.6 Complexity of ABAM -- 10.5 Comparisons of Multicast Routing Protocols -- 10.5.1 Protocol Differences -- 10.5.2 Operation and Performance Differences -- 10.5.3 Comparing Protocol Overhead -- 10.5.4 Time and Communication Complexity -- 10.6 Conclusions -- 11 TCP OVER AD HOC -- 11.1 Introduction to TCP -- 11.1.1 TCP Flow Control -- 11.1.2 TCP Congestion Control -- 11.1.3 Some Issues with TCP.

11.2 Versions of TCP -- 11.2.1 TCP Reno -- 11.2.2 TCP Tahoe -- 11.2.3 TCP Vegas -- 11.2.4 TCP SACK -- 11.3 Problems Facing TCP in Wireless Last-Hop -- 11.3.1 Indirect TCP -- 11.3.2 TCP Snoop -- 11.4 Problems Facing TCP in Wireless Ad Hoc -- 11.5 Approaches to TCP over Ad Hoc -- 11.5.1 TCP Feedback (TCP-F) -- 11.5.2 TCP-BuS -- 11.6 Conclusion -- 12 INTERNET & AD HOC SERVICE DISCOVERY -- 12.1 Resource Discovery in the Internet -- 12.2 Service Location Protocol (SLP) Architecture -- 12.2.1 User Agent -- 12.2.2 Directory Agent -- 12.2.3 Service Agent -- 12.3 SLPv2 Packet Format -- 12.4 Jini -- 12.5 Salutation Protocol -- 12.6 Simple Service Discovery Protocol (SSDP) -- 12.7 Service Discovery for Ad Hoc -- 12.7.1 Limitations of Existing Schemes -- 12.8 Ad Hoc Service Location Architectures -- 12.8.1 Service Co-Ordinator Based Architecture -- 12.8.2 Distributed Query-Based Architecture -- 12.8.3 Hybrid Service Location Architecture -- 12.9 Conclusions -- 13 BLUETOOTH TECHNOLOGY -- 13.1 Bluetooth Specifications -- 13.2 Bluetooth Architectures -- 13.2.1 Bluetooth Piconet -- 13.2.2 Bluetooth Scatternet -- 13.3 Bluetooth Protocols -- 13.4 Bluetooth Service Discovery -- 13.5 Bluetooth MAC -- 13.6 Bluetooth Packet Structure -- 13.7 Bluetooth Audio -- 13.8 Bluetooth Addressing -- 13.9 Bluetooth Limitations -- 13.10 Bluetooth Implementation -- 13.11 Conclusions -- 14 WIRELESS APPLICATION PROTOCOL (WAP) -- 14.1 The WAP Forum -- 14.2 The WAP Service Model -- 14.3 The WAP Protocol Architecture -- 14.4 The WWW Programming Model -- 14.5 The WAP Programming Model -- 14.6 Conclusions -- 15 AD HOC NOMADIC MOBILE APPLICATIONS -- 15.1 In the Office -- 15.2 While Traveling -- 15.3 Arriving Home -- 15.4 In the Car -- 15.5 Shopping Malls -- 15.6 The Modern Battlefield -- 15.7 Car-to-Car Mobile Communications -- 15.8 Mobile Collaborative Applications.

15.9 Location/Context Based Mobile Services.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

Share
Powered by Koha ILS
Page Design & Customization: Library Web Team CE Thalassery