4G roadmap and emerging communication technologies 电子书下载
Kim and Prasad`s contribution to 4G is to explain it in sufficient detail that you can usefully consider possible future applications. You might be working for an existing cellphone provider, for example. Or you might be an individual or company looking to get into the service business for 4G.
4G is essentially a network of networks. It is still a somewhat hazy view of where to go, beyond the current 2G and 3G deployments. Seamless nomadic usage and ubiquitous access are key characteristics. Along with bandwidth of 50-100 Mbps. All by 2010, at least in Asia, by one schedule. While another schedule has this deployed in Europe by 2015. The reader will be struck by the US being at some later unspecified date. While you may be used to the US leading in other technological fields, in the wireless sphere, it is an also-ran by a wide margin.
Mobile IP is suggested by the text as one of the needed technologies. The discussion reveals that it runs best using IPv6, not the current IPv4. Using it under IPv4 is very cumbersome. If you have been following IPv6, you might think its deployment has been slow. A large demand for Mobile IP could be one of the key drivers for an accelerated rollout. (Finally!)
The book suggests that Digital Rights Management will be an important consideration for 4G; more so than under 3G. Its take on DRM is brief. What it does not say is that DRM is intrinsically very hard. Some companies, like music publishers, might have to use DRM to protect their assets on the new phones. But if you are considering a new 4G business to be in, perhaps look for something that does not depend on DRM. A service approach, like multiplayer games. Where the entire issue of DRM is moot.
For SMS and MMS, there could have been more discussion of the problems of spam and phishing. Spam already exists as a considerable problem in SMS in China. While, in general, if MMS takes off, its ability to show images and hyperlinks means it becomes an HTML equivalent. Which increases the attraction of spam and phishing.
尊敬的读者:
欢迎您访问我们的网站。本站的初衷是为大家提供一个共享学习资料、交换知识的平台。每位用户都可以将文件上传至网盘并分享。
然而,随着用户上传的资料增多,我们发现部分不宜或版权问题的书籍被分享到了本站。
为此,我们已经关闭了分享入口,并进行了多次书籍审查,但仍有部分内容未能彻底审查到位。
在此,我们恳请广大读者与我们共同监督,如发现任何不宜内容,请 点击此处 进行举报,我们会第一时间处理并下架相关内容。
希望我们能共建一个文明社区!感谢您的理解与支持!
猜你喜欢
- 《无穷小:一个危险的数学理论如何塑造了现代世界》阿米尔・亚历山大中文版 电子书下载
- 《华文全球史帝国篇(第四季12册)》查尔斯欧曼等文字版 电子书下载
- 《死魂灵》果戈理著全译文字版 电子书下载
- 《如何思考:用“自由技艺”软技能解决生活工作中的难题》迈克尔D.C.卓特文字版 电子书下载
- 《高效的秘密》查尔斯·都希格文字版 电子书下载
- 《情绪革命》约翰・辛德莱尔全译珍藏版 电子书下载
- 《找回你的生命礼物》克里斯多福•孟文字版 电子书下载
- 《国家地理终极观星指南》霍华德・施耐德文字版 电子书下载
- 《绑架游戏》东野圭吾 电子书下载
- 《汉尼拔》[美]托马斯·哈里斯中文版 电子书下载
- 《月童度河》安妮宝贝(庆山) 电子书下载
- 《先发制人》布伦特・格里森文字版 电子书下载