Skip to:Content
|
Bottom
Cover image for Unlicensed mobile access technology : protocols, architectures, security, standards and applications
Title:
Unlicensed mobile access technology : protocols, architectures, security, standards and applications
Series:
Wireless networks and mobile communications series
Publication Information:
London, UK : Auerbach Publications, 2009
Physical Description:
xiii, 405 p. : ill. ; 26 cm.
ISBN:
9781420055375
General Note:
An Auerbach book

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010185212 QA76.59 U55 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

The goal of Unlicensed Mobile Access (UMA) is to provide seamless access to GSM and GPRS mobile service networks via unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on the level of knowledge in this growing field, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards, and Applications presents the first complete cross-referenced resource exploring UMA and UMA-relevant technologies.

When operating successfully, the technology supporting dual-mode enabled mobile terminals allows subscribers to roam freely and seamlessly between cellular networks. However, various technical challenges still occasionally impede clear communication. This book explores the complex issue of mobility management and emphasizes the need for intelligently designed vertical and horizontal handoff algorithms that will improve adaptability in heterogeneous wireless environments. In addition, it reviews the various strategies to guarantee Quality-of-Service (QoS) during movement and handoff.

The first chapters introduce the basic technology of these systems and discuss QoS, resource management, mobility management, and security issues in UMA technology. The middle section concentrates on protocols and security challenges in UMA-related technologies, which include Bluetooth, WirelessPAN, Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16). The final chapters present standard specifications and various applications.

Comprised of contributions from world-wide experts, this book is a complete reference, offering guidance on all aspects of the technical and practical issues in UMA technology.


Author Notes

Yan Zhang, Laurence T. Yang, Jianhua Ma


Table of Contents

Introductions
Architectures
Protocols
Security
Applications, Standardization, and Enabling Technologies
Go to:Top of Page