Mobile Computing
Theory Hours:3 Practical Hours:2
Credits:5
Mobile Computing Introduction
History of Wireless Communications, Types, propagation modes Wireless network architecture, Applications, Security, Concerns and Standards, Benefits, Future. Evolution of mobile computing, What mobile users need, SOC and AOC client, Mobile computing OS, Architecture for mobile computing, Three tier architecture, design considerations for mobile computing, mobile computing through internet, making existing applications Mobile-Enabled.
Mobile Technologies
Bluetooth, Radio frequency identification(Rfid),Wireless Broadband, Mobile IP: Introduction, Advertisement, Registration, TCP connections, two level addressing, abstract mobility management model, performance issue, routing in mobile host, Adhoc networks, Mobile transport layer: Indirect TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission, transaction oriented TCP. ,IPv6 Global system for mobile communication, Global system for mobile communication, GSM architecture, GSM entities, call routing in GSM,PLMN interface, GSM addresses and identifiers, network aspects in GSM,GSM frequency allocation, authentication and security, Short message services, Mobile computing over SMS,SMS, value added services through SMS, accessing the SMS bearer
General packet radio service(GPRS)
GPRS and packet data network, GPRS network architecture, GPRS network operation, data services in GPRS, Applications of GPRS, Billing and charging in GPRS
Wireless Application Protocol(WAP) WAP,MMS,GPRS application CDMA and 3G
Spread-spectrum Technology, CDMA versus GSM, Wireless data, third generation networks, applications in 3G Wireless LAN, Wireless LAN advantages,IEEE802.11 standards ,Wireless LAN architecture, Mobility in Wireless LAN, Deploying Wireless LAN, Deploying Wireless LAN, Mobile ad hoc networks and sensor networks, wireless LAN security, WiFi v/s 3G Voice over Internet protocol and convergence, Voice over IP,H.323 framework for voice over IP,SIP, comparison between H.323 ad SIP, Real time protocols, convergence technologies, call routing, call routing, voice over IP applications, IMS, Mobile VoIP, Security issues in mobile Information security, security techniques and algorithms, security framework for mobile environment
No comments:
Post a Comment