Mobile and Wireless Systems Beyond 3G
Latest Publications


TOTAL DOCUMENTS

12
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781591405702, 9781591405450

Author(s):  
Marco Cremonini ◽  
Ernesto Damiani ◽  
Sabrina De Capitani di Vimercati ◽  
Angelo Corallo ◽  
Gianluca Elia

Mobile systems and applications are raising some important information security and privacy issues. This chapter discusses the need for privacy and security in mobile systems and presents technological trends which highlight that this issue is of growing concern.


Author(s):  
Bardo Fraunholz ◽  
Chandana Unnithan ◽  
Jürgen Jung

With dynamic growth and acceptance of mobile devices, many innovative business applications are beginning to emerge. Tracking and tracing seems to be one of the popular applications which many organisations have initiated, often facilitated by location based services provided by mobile network operators. However, there are many issues associated with the provisioning of this application with current technologies and business models. Small and Medium-size Enterprises (SMEs) that make up a significant segment of businesses worldwide do not yet seem able to benefit widely from these services. In this chapter, we initially review current technologies/ applications and the issues associated with them, drawing from research and the experiences of a long term ongoing action research project with SMEs in the trade sector. Subsequently, we explore the opportunities offered by 3G services/business applications to SMEs, and provide a broad critical outlook on future opportunities for SMEs to benefit from 3G services.


Author(s):  
Phillip Olla

This chapter will describe how space technologies can be incorporated into terrestrial 3G /4G mobile telecommunication infrastructure to provide convergent innovative applications and services. The utilization of space applications for non-military use has the potential to generate significant economic, social and environmental benefits on a global scale. The satellite infrastructure will become a key enabling factor in a growing range of mobile products such as: voice services, broadband Internet services, navigation, and observation systems. The chapter presents a framework derived from the literature to aid the development of viable business models expected from the amalgamation of mobile telecommunication and space infrastructure. The chapter also identifies the various actors involved in the delivery of these services which include: technology actors, service providers, network operators, consumers, and regulators.


Author(s):  
Spiros Louvros ◽  
Athanassios C. Iossifides

In this chapter, a multi-layer ATM architecture is proposed for the interconnection of current and future mobile communications nodes. Consisting of different ATM node types with respect to switching capability, the proposed architecture is adapted to current 2G and evolving 3G systems as well as future 4G wireless systems, as a common and shared backbone transmission network interconnecting core and access nodes between each other and Internet or PLMN/PSTN. Moreover, facing the huge expansion of transmission interconnection network that will support current and future generation mobile communications, a modification of the standard ATM cell structure is introduced in order to efficiently support user mobility functional procedures. The proposed ATM architecture is integrated over a suitable, with respect to region and capacity, physical interface, consisting of SDH or SONET for wide area topologies, wireless links for outdoor areas and LED-POF combination for indoor areas. Being an interesting alternative over copper or traditional fiber, POF characteristics and performance issues are analyzed.


Author(s):  
Holtjona Galanxhi-Janaqi ◽  
Fiona F.H. Nah

Ubiquitous commerce, also referred to as “u-commerce” or “über-commerce”, is the combination of electronic, wireless/mobile, television, voice, and silent commerce. It extends traditional commerce (geographic, electronic, and mobile) to a world of ubiquitous networks and universal devices. This chapter introduces the basic ideas and characteristics underlying the concept of u-commerce. It discusses market drivers and applications of u-commerce as well as the underlying technology of u-commerce. It highlights the benefits and challenges of u-commerce and provides specific research directions for future research.


Author(s):  
John Schormans ◽  
Chi M. Leung

New business opportunities for mobile, wireless, and fixed networks are going to require managed packet based services; this requires SLAs that relate to the level of QoS purchased, and the measurement (monitoring) of information loss and delay at the packet level. In this chapter we investigate the two available measurement techniques: passive and active monitoring. We show that passive monitoring techniques can provide excellent accuracy with minimal computational overhead. However, it also has the disadvantage that it is necessary to have access to all the routers in all measured end to end paths, so severely limiting scalability. Alternatively active monitoring techniques can provide global reach; however it is critical that we go on to show that this technique has the disadvantage that (under many circumstances) the measured results may be very inaccurate. Finally we propose some ideas which may enhance accuracy.


Author(s):  
G.K. Roberts ◽  
James B. Pick

This chapter identifies the technology and non-technology factors that companies consider important in deciding to adopt and deploy wireless devices designed for mobile telephony and information services, the extent of current use of cell phones, the extent of existing utilization and/or planning for Web-enabled cell phone use, the constraining factors in their deployment decisions, how such decisions are made, and the practical technology implications for decision-making, including beyond 3G. This chapter seeks to help decision makers by shedding light on the adoption process. The conceptual model combines the TAM and innovation adoption/diffusion models, adding the factors of security, cost, reliability, digital standards/regulatory environment, technology product suitability, and future Web connectivity. Case study methodology is utilized for five manufacturing and technology firms. A key finding is that the most important technology decision factors are security, reliability, and Web connectivity. Although the current uses are dominated by voice, Web-enabled capability dominates future decision-making.


Author(s):  
Elizabeth Fife ◽  
Francis Pereira

The evaporation of dramatic growth forecasts for mobile data services highlights the need for greater understanding of user’s behavior, needs and attitudes to technology, as well as their environment and other contextual factors. By examining sectors where a value proposition for mobile data services has been identified and yet adoption rates have varied, we discuss requirements for uptake to occur in specific sectors. Adoption of mobile data services refers to organizational-related solutions as well as service innovations related to the product or service delivered to end-users who in these cases include customers, patients, and students. Using frameworks for innovation diffusion, we examine promising mobile services in the areas of health, construction, and education. The underlying behavioral, cultural, and economic factors affecting demand for mobile technology in these markets is investigated. This exploratory research contributes to theory-building for understanding technology adoption from the user’s context.


Author(s):  
Ioannis P. Chochliouros ◽  
Anastasia S. Spiliopoulou-Chochliourou

Mobile communications are fundamental to business operations, individual lifestyles and the welfare of the European economy. The proposed work aims to investigate some among the current technical, business, financial, and regulatory visions associated with the effective evolution of third generation (3G) networks and services, in particular to fulfil the great market realities, the expectations and 3G’s significant potential in building the EU Information Society. The work depicts data related to the current state of play for 3G communications in Europe, with specific emphasis given to the underlying technologies and probable standardization options (both for network and terminal equipment). Wireless mobile technologies are a major driver to realize the way forward to a knowledge-based economy, in terms of consumer demand, productivity, competitiveness and job creation. Under suitable terms, this may create enormous potential and significant investment incentives, for the full recovery of the wider ICT sector. 3G is likely to play a key role in providing widespread access to the Internet and to interactive services, thus maximizing consumer choices and providing flexibility for the market itself. Furthermore, we evaluate the related EU regulatory perspectives, to support innovation, competition, legal certainty and proportionality, the consolidation of the Single Market and the removal of technical barriers to international trade.


Author(s):  
Göran Pulkkis ◽  
Kaj J. Grahn ◽  
Jonny Karlsson ◽  
Mikko Martikainen ◽  
Daniel E. Daniel

This chapter is a topical overview of wireless local area network security evolution. WLAN security threats are surveyed. Covered standards include 802.11/WEP, 802.1X/EAP, 802.11i/WPA and 802.11i/WPA2. Special attention is given to user authentication schemes and to protection of data communication. WPA is also compared with the present WLAN security protocol WEP. Other covered issues are available WPA supported technology and open source WLAN security software. A WPA secured WLAN test network is described and tested. A WLAN designed according to the new security standards is a real alternative to a secure enterprise LAN and also a reliable platform for e-commerce. Finally, WLAN security management and current research related to WLAN security are surveyed.


Sign in / Sign up

Export Citation Format

Share Document