Unlicensed Mobile Access Technology
Protocols, Architectures, Security, Standards and Applications
Book Details:
Pages: | 424 |
Published: | Aug 28 2008 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 9.74 MB |
Book Description:
The goal of Unlicensed Mobile Access (UMA) is to provide seamless access to GSM and GPRS mobile service networks via unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on the level of knowledge in this growing field, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards, and Applications presents the first complete cross-referenced resource exploring UMA and UMA-relevant technologies. When operating successfully, the technology supporting dual-mode enabled mobile terminals allows subscribers to roam freely and seamlessly between cellular networks. However, various technical challenges still occasionally impede clear communication. This book explores the complex issue of mobility management and emphasizes the need for intelligently designed vertical and horizontal handoff algorithms that will improve adaptability in heterogeneous wireless environments. In addition, it reviews the various strategies to guarantee Quality-of-Service (QoS) during movement and handoff. The first chapters introduce the basic technology of these systems and discuss QoS, resource management, mobility management, and security issues in UMA technology. The middle section concentrates on protocols and security challenges in UMA-related technologies, which include Bluetooth, WirelessPAN, Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16). The final chapters present standard specifications and various applications. Comprised of contributions from world-wide experts, this book is a complete reference, offering guidance on all aspects of the technical and practical issues in UMA technology.
A Systems Approach to Understanding IEEE 802.16m Radio Access Technology
Presenting the new IEEE 802.16m standard, this is the first book to take a systematic, top-down approach to describing Mobile WiMAX and its next generation, giving detailed algorithmic descriptions together with explanations of the principles behind the operation of individual air-interface protocols and network components. Features: A systematic and detailed, top-down approach to the design of 4G cellular systems based on IEEE 802.16m and 3GPP LTE/LTE-Advanced technologies A systematic approach to understanding IEEE 802.16m radio access network and mobile WiMAX network architecture and protocols The first comprehensive technical reference on the design, development and performance evaluation of IMT-Advanced systems, including the theoretical backgro...
Real-world solutions for Cisco IOS Mobile IP configuration, troubleshooting, and management Understand the concept of mobility and the requirements of mobility protocols Learn necessary components of a Mobile IP network, including features, functions, and message flows Examine security concepts related to Mobile IP, including protocol authentication and dynamic keying Evaluate high availability solutions and integration with AAA servers in campus networks Explore the features of metro mobility, including reverse tunneling, firewall, NAT traversal, and integration with VPN technologies Configure IOS Mobile IP networks, including integration topics such as redundancy, QoS, and VPN Manage the Mobile IP infrastructure, including Home Address management,...
Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations.AAA and Network Security for Mobile Access:Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment.Discusses public key infrastructures an...
2007 - 2021 © eBooks-IT.org