This book, Mobile Computing, has been written to provide the readers various aspects of computing in mobile environments. This book is structured to cover the key aspects of the mobile computing and discusses the principles, designing and development of Mobile Computing Systems. The book has been divided into nine chapters. The very first chapter builds the foundation for mobile computing and the concept behind telephony system. Second chapter describes GSM & GPRS technologies. Basic concept of WLAN or WiFi technology is discussed in third chapter while fourth chapter deals with the concept of Multiple Access Protocol, Data Broadcasting and WAP. Fifth chapter introduces data management in mobile computing environment. Sixth chapter discusses the adaptive clustering for mobile wireless networks and distributed file system and seventh chapter deals with the conceptual view of mobile agents. Concept, features and security goals of Ad-Hoc networks are described in eighth chapter while ninth chapter introduces classification of routing protocols in Ad-Hoc networks.
About the Author :
Rajesh Kumar Maurya, MCA, M.Tech (Computer Science and Engg.) is working as a Senior Assistant Professor in MCA Department at ABES Engineering College, Ghaziabad (U.P) and has teaching experience of 10 years. His various papers have been published in reputed research journals on topics like “Network Mobility over Mobile IP”, “Important Aspects of Software Testing in SDLC” and the likes. He has attended and presented papers in several national and international conferences and seminars on electronics and mobile computing.
Chapter 1 Mobile Computing Wireless Telephony
1.1 Introduction 1.2 Mobile Computing 1.2.1 Definitions of Mobile Computing 1.2.2 Differences between Wired Networks & Mobile Networks 1.2.3 Why Go for Mobility? 1.2.4 What is Mobility? 1.2.5 Characteristics of Mobile Computing 1.2.6 Mobile Applications 1.2.7 Mobile Computing Devices 1.2.8 Wireless Standard Development (Generation of mobile technology) 1.2.9 Difference between Different Generations 1.3 Technical and Other Limitations of Mobile Computing(Issues on Mobile Computing) 1.4 Wireless Telephony 1.4.1 Cordless Phone 1.4.2 Pager 1.4.3 Cellular Telephone System 1.5 Cellular Concept 1.5.1 Why Cellular? 1.5.2 Why Approximate Cells by Hexagons? 1.6 Multiple Access Techniques Technologies for Cellular System 1.6.1 Frequency Division Multiple Access (FDMA) 1.6.2 Time Division Multiple Access (TDMA) 1.6.3 Space Division Multiple Access (SDMA) 1.6.4 Code Division Multiple Access (CDMA) 1.7 Types of Spread Spectrum 1.7.1 Direct Sequence Spread Spectrum (DSSS) 1.7.2 Frequency Hopping Spread Spectrum(FHSS) 1.8 Handoff 1.8.1 Advantages 1.8.2 Disadvantages 1.8.3 Types of Handoff 1.9 Summary 1.10 Questions
Chapter 2 GSM and GPRS
2.1 Introduction 2.2 GSM (Global System for Mobile Communication) 2.2.1 The Objectives of GSM 2.2.2 History of GSM 2.2.3 Architecture of GSM 2.2.4 What is SIM? 2.2.5 Characteristics of GSM Standard 2.2.6 Advantages of GSM over Analog System 2.2.7 Application of GSM Mobile 2.3 GPRS (General Packet Radio Service) 2.3.1 GPRS Class Types 2.3.2 Benefits of GPRS 2.3.3 Salient Features of GPRS 2.3.4 High Data Rate 2.3.5 GPRS Services 2.3.6 GPRS Terminals 2.3.7 GPRS Network Elements 2.3.8 Applications of GPRS 2.3.9 Advanced Consumer Applications 2.3.10 Differences between GSM and GPRS 2.3.11 Other Differences 2.4 Summary 2.5 Questions
Chapter 3 Wireless LAN & IEEE 802.11 Standards
3.1 Introduction 3.1.1 Wireless LAN (WLAN) 3.1.2 IEEE 802.11 Standards 3.1.3 Bluetooth Technology 3.2 Wireless LAN 3.2.1 Wireless Networks Usage 3.2.2 WLAN Range (or Radius of Coverage) 3.2.3 Throughput 3.2.4 History of WLAN 3.2.5 Advantages of WLAN /Benefits of WLANs. 3.2.6 Disadvantages of WLAN/ Drawbacks of WLAN 3.2.7 Architecture of WLAN 3.2.8 Standards of WLAN 3.2.9 Categories of WLAN/Types of WLAN 3.3 IEEE 802.11 3.3.1 What makes a Wireless LAN unique? 3.3.2 IEEE Wireless Networking Specifications 3.3.3 Types of IEEE Wireless Networking Specifications 3.3.4 The IEEE 802.11 Wireless LAN Architecture 3.4 Bluetooth Technology 3.4.1 Key Points 3.4.2 Advantages of Bluetooth Technology 3.4.3 Disadvantages of Bluetooth Technology 3.4.4 Application of Bluetooth 3.4.5 Future Application Domains 3.4.6 Type of connection that is formed between two or more luetooth-enabled d 3.4.7 Architecture of Bluetooth 3.5 Summary 3.6 Questions with Answers 3.7 Questions
Chapter 4 Wireless Multiple Access Protocols
4.1 Introduction 4.2 Wireless Multiple Access Protocols 4.2.1 Overview 4.2.2 Types of Multiple Access Protocols 4.2.3 Random Accesses 4.2.4 ALOHA 4.2.5 Carrier Sense Multiple Access/ Collision Detection (CSMA/CD) 4.3 TCP over Wireless 4.3.1 Inside TCP/IP 4.3.2 TCP Uses a Fixed Connection 4.3.3 IP is Connection-Less 4.3.4 IP Routers 4.3.5 TCP/IP 4.3.6 IP Addresses 4.4 Data Broadcasting 4.4.1 Need of Broadcasting 4.4.2 What is Data Broadcast? 4.4.3 Broadcasting the Signal with DVB 4.4.4 Broadcasting the Signal with VBI 4.5 Wireless Application Protocol (WAP) 4.5.1 WAP Overview 4.5.2 Objectives of WAP 4.5.3 Scopes of WAP 4.5.4 Advantages of WAP 4.5.5 Disadvantages of WAP 4.5.6 Architectural Goal of WAP 4.5.7 Architecture of WAP 4.5.8 Micro Browsers 4.5.9 Mobile Browsers 4.6 Mobile IP 4.6.1 Mobile IP Entities 4.6.2 Mobile IP Support Services 4.6.3 Mobile IP Operation 4.6.4 Tables Maintained on Routers 4.6.5 Application of mobile IP 4.6.6 Security in Mobile IP 4.6.7 Difference between IPv4 & IPv6 4.7 Summary 4.8 Questions
Chapter 5 Data Management
5.1 Introduction 5.2 Data Management 5.2.1 Role of Data Management Team 5.2.2 Data Modeling 5.2.3 Data Warehousing 5.2.4 Data Movement 5.2.5 Database Administration 5.2.6 Data Mining 5.2.7 What is Enterprise Data Management? 5.3 Data Management Issues in Mobile Computing 5.3.1 Mobility 5.3.2 Wireless medium 5.3.3 Portability and Mobile Element 5.4 General Transaction Processing System (TPS) 5.4.1 Stages of Transaction Processing Cycle 5.5 Mobile Transaction Processing 5.5.1 Properties of Good Transaction System 5.5.2 Issues of Mobile Transaction 5.6 Data Replication 5.6.1 Role of Replica 5.6.2 Why data Replication? 5.6.3 Consistency Levels 5.6.4 Types of Replication 5.6.5 Events During Replication 5.6.6 Characteristics of Two-tier Caching 5.6.7 Two-Tier Replication 5.6.8 Two-Layer Transactions 5.6.9 Benefits of Database Replication 5.2.10 Application of Replication 5.2.11 Synchronous Versus Asynchronous Replication 5.7 Summary 5.8 Questions
Chapter 6 Adaptive Clustering for Mobile Wireless Networks & File system
6.1 Introduction 6.2 Adaptive Clustering for Mobile Wireless Networks 6.2.1 Clustering 6.2.2 Cluster Formation 6.2.3 Working of Adaptive Clustering for Mobile Wireless Networks 6.3 Coda Files System 6.3.1 Distributed File Systems 6.3.2 Features of Coda File System 6.3.3 Processes in Coda File System 6.3.4 Inter Process Communication in Coda 6.3.5 Naming 6.3.6 Disconnected Operation 6.4 Summary 6.5 Questions
Chapter 7 Mobile Agents Computing
7.1 Introduction 7.2 Mobile Agent 7.2.1 Advantages of Mobile Agent Paradigms 7.2.2 Level of Mobility 7.2.3 Characteristics of Mobile Agent 7.2.4 Types of Agents 7.2.5 Components of Mobile Agent &a
Mobile Computing : Principles, Designing and Development
The book summary and image may be of a different edition or binding of the same title.
Book reviews are added by registered customers. They need not necessarily buy book.
These books are NOT available for reading online or for free download in PDF or ebook format.
Price can change due to reprinting, price change by publisher or sourcing cost change for imported books.
www.infibeam.com/Books is the biggest online bookstore in India for sale of books at best price - fiction, literature, audiobooks, study guides, novels,
story books, rare books, textbooks and books by popular authors. These are available in various editions and bindings e.g. paperback and at best discount.