4G roadmap and emerging communication technologies 电子书下载
Kim and Prasad`s contribution to 4G is to explain it in sufficient detail that you can usefully consider possible future applications. You might be working for an existing cellphone provider, for example. Or you might be an individual or company looking to get into the service business for 4G.
4G is essentially a network of networks. It is still a somewhat hazy view of where to go, beyond the current 2G and 3G deployments. Seamless nomadic usage and ubiquitous access are key characteristics. Along with bandwidth of 50-100 Mbps. All by 2010, at least in Asia, by one schedule. While another schedule has this deployed in Europe by 2015. The reader will be struck by the US being at some later unspecified date. While you may be used to the US leading in other technological fields, in the wireless sphere, it is an also-ran by a wide margin.
Mobile IP is suggested by the text as one of the needed technologies. The discussion reveals that it runs best using IPv6, not the current IPv4. Using it under IPv4 is very cumbersome. If you have been following IPv6, you might think its deployment has been slow. A large demand for Mobile IP could be one of the key drivers for an accelerated rollout. (Finally!)
The book suggests that Digital Rights Management will be an important consideration for 4G; more so than under 3G. Its take on DRM is brief. What it does not say is that DRM is intrinsically very hard. Some companies, like music publishers, might have to use DRM to protect their assets on the new phones. But if you are considering a new 4G business to be in, perhaps look for something that does not depend on DRM. A service approach, like multiplayer games. Where the entire issue of DRM is moot.
For SMS and MMS, there could have been more discussion of the problems of spam and phishing. Spam already exists as a considerable problem in SMS in China. While, in general, if MMS takes off, its ability to show images and hyperlinks means it becomes an HTML equivalent. Which increases the attraction of spam and phishing.
尊敬的读者:
欢迎您访问我们的网站。本站的初衷是为大家提供一个共享学习资料、交换知识的平台。每位用户都可以将文件上传至网盘并分享。
然而,随着用户上传的资料增多,我们发现部分不宜或版权问题的书籍被分享到了本站。
为此,我们已经关闭了分享入口,并进行了多次书籍审查,但仍有部分内容未能彻底审查到位。
在此,我们恳请广大读者与我们共同监督,如发现任何不宜内容,请 点击此处 进行举报,我们会第一时间处理并下架相关内容。
希望我们能共建一个文明社区!感谢您的理解与支持!
猜你喜欢
- 《运营其实很简单:互联网运营进阶之道》郑文博修正版 电子书下载
- 《新编Office 2016应用大全》华文科技实战精华版文字版 电子书下载
- 《如何想到又做到》肖恩 • 扬 文字版 电子书下载
- 《陪孩子终身成长》樊登 电子书下载
- 《美顺与长生》毛建军 电子书下载
- 《从赫尔利到马歇尔》牛军典藏版 电子书下载
- 《经济战争与战争经济》卡尔‧赫弗里希 电子书下载
- 《国家的歧路:日本帝国毁灭之谜》马国川文字版 电子书下载
- 《外星屠异》奥森·斯科特·卡德 电子书下载
- 《黄帝内经中的女人养生养颜经》 王昕文字版 电子书下载
- 《思维故事:掌控人生剧本》黄征宇全新修订版 电子书下载
- 《罗杰疑案》[英] 阿加莎·克里斯蒂 电子书下载