Tải bản đầy đủ (.pdf) (465 trang)

IGI global selected readings on telecommunication and networking sep 2008 ISBN 1605660949 pdf

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (12.4 MB, 465 trang )


Selected Readings on
Telecommunications
and Networking
Jairo Gutierrez
University of Auckland, New Zealand

InformatIon scIence reference
Hershey • New York


Director of Editorial Content:
Managing Development Editor:
Senior Managing Editor:
Managing Editor:
Assistant Managing Editor:
Typesetter:
Cover Design:
Printed at:

Kristin Klinger
Kristin M. Roth
Jennifer Neidig
Jamie Snavely
Carole Coulson
Lindsay Bergman
Lisa Tosheff
Yurchak Printing Inc.

Published in the United States of America by
Information Science Reference (an imprint of IGI Global)


701 E. Chocolate Avenue, Suite 200
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail:
Web site:
and in the United Kingdom by
Information Science Reference (an imprint of IGI Global)
3 Henrietta Street
Covent Garden
London WC2E 8LU
Tel: 44 20 7240 0856
Fax: 44 20 7379 0609
Web site:
Copyright © 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by
any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does
not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
Library of Congress Cataloging-in-Publication Data
Selected readings on telecommunications and networking / Jairo Gutierrez, editor.
p. cm.
Includes bibliographical references and index.
Summary: "This book presents quality articles focused on key issues concerning the planning, design, maintenance, and management of
telecommunications and networking technologies"--Provided by publisher.
ISBN 978-1-60566-094-3 (hard cover) -- ISBN 978-1-60566-095-0 (ebook)
1. Wireless communication systems. 2. Information networks. I. Gutiérrez, Jairo, 1960TK5103.2.S45 2009
621.382--dc22
2008019468
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of
the publisher.

If a library purchased a print copy of this publication, please go to for information on activating
the library's complimentary electronic access to this publication.


Table of Contents

Prologue .............................................................................................................................................. xix

Section I
Fundamental Concepts and Theories
Chapter I
A Brief Overview of Wireless Systems and Standards............................................................................ 1

Sundar G. Sankaran, Atheros Communications, USA
Chapter II
Propagating the Ideal: The Mobile Communication Paradox.................................................................. 8

Imar de Vries, Utrecht University, The Netherlands
Chapter III
Teaching and Learning Wi-Fi Networking Fundamentals Using Limited Resources .......................... 22

Wilson Siringoringo, Auckland University of Technology, New Zealand

Nurul I. Sarkar, Auckland University of Technology, New Zealand
Chapter IV
Mobile Advertising: A European Perspective ....................................................................................... 41


Tawfik Jelassi, Ecole Nationale des Ponts et Chaussées, France

Albrecht Enders, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany

Section II
Development and Design Methodologies
Chapter V
Developing a Telecommunication Operation Support System (OSS): The Impact of a Change
in Network Technology.......................................................................................................................... 54

James G. Williams, University of Pittsburgh, USA

Kai A. Olsen, Molde College and University of Bergen, Norway


Chapter VI
A Component-Based Data Management and Knowledge Discovery Framework for Aviation
Studies.................................................................................................................................................... 74

M. Brian Blake, Georgetown University, USA & Center for Advanced Aviation System
Development, The MITRE Corporation, USA

Lisa Singh, Georgetown University, USA

Andrew B. Williams, Spelman College, USA

Wendell Norman, Center for Advanced Aviation System Development,
The MITRE Corporation, USA

Amy L. Silvan, Georgetown University, USA

Chapter VII
Waleli: Bringing Wireless Opportunities to Life................................................................................... 87

Paul Kirwan, Nikos, University of Twente, The Netherlands

Peter van der Sijde, Nikos, University of Twente, The Netherlands

Aard Groen, Nikos, University of Twente, The Netherlands
Chapter VIII
Designing a Resilient and High Performance Network....................................................................... 105

Abid Al Ajeeli, University of Bahrain, Bahrain

Yousif Al-Bastaki, University of Bahrain, Bahrain

Chapter IX
Collaboration Challenges in Community Telecommunication Networks........................................... 120

Sylvie Albert, Laurentian University, Canada

Rolland LeBrasseur, Laurentian University, Canada
Chapter X
A Generic Framework for Bluetooth Promoted Multimedia on Demand (BlueProMoD).................. 142

Panayotis Fouliras, University of Macedonia, Greece

Nikolaos Samaras, University of Macedonia, Greece

Section III
Tools and Technologies

Chapter XI
Using Mobile Phones and PDAs in Ad Hoc Audience Response Systems......................................... 157

Matt Jones, University of Waikato, New Zealand

Gary Marsden, University of Cape Town, South Africa

Dominic Gruijters, University of Cape Town, South Africa


Chapter XII
An Evaluation of U.S. City Government Wireless Networks for Mobile Internet Access.................. 169

Ben Coaker, Whiting-Turner Contracting Company, USA

Candace Deans, University of Richmond, USA
Chapter XIII
Information-Theoretic Methods for Prediction in the Wireless and Wired Web................................. 182

Dimitrios Katsaros, Aristotle University of Thessaloniki, Greece
Chapter XIV
Empirical Prediction of Computer-Network Evolution....................................................................... 198

Sami J. Habib, Kuwait University, Kuwait

Section IV
Utilization and Application
Chapter XV
New Computer Network Paradigms and Virtual Organizations.......................................................... 214


Guillermo Agustín Ibáñez Fernández, Universidad Carlos III, Spain
Chapter XVI
Software Agent Technology for Supporting Ad Hoc Virtual Enterprises............................................ 224

Jarogniew Rykowski, The Poznan University of Economics, Poland
Chapter XVII
Wireless Networks Based on WiFi and Related Technologies............................................................ 250

Rajendra V. Boppana, University of Texas at San Antonio, USA

Suresh Chalasani, University of Wisconsin-Parkside, USA
Chapter XVIII
An Immune Systems Approach for Classifying Mobile Phone Usage................................................ 266

Hanny Yulius Limanto, Nanyang Technological University, Singapore

Tay Joc Cing, Nanyang Technological University, Singapore

Andrew Watkins, Mississippi State University, USA
Chapter XIX
Collecting Consumer Behavior Data with WLAN.............................................................................. 277

Patrik Skogster, Rovaniemi University of Applied Sciences, Finland

Varpu Uotila, Turku School of Economics, Finland


Section V
Critical Issues
Chapter XX

Distributed Resources Management in Wireless LANs....................................................................... 293

Ghassan Kbar, American University in Dubai, UAE

Wathiq Mansoor, Zayed University, UAE
Chapter XXI
An Empirical Examination of the Impact of Wireless Local Area Networks on Organization
of Users................................................................................................................................................ 305

Lei-da Chen, Creighton University, USA

Ravi Nath, Creighton University, USA
Chapter XXII
Supporting Real-Time Service in Packet-Switched Wireless Networks............................................. 324

Maode Ma, Nanyang Technological University, Singapore

Zheng Xiang, Nanyang Technological University, Singapore
Chapter XXIII
Effect of Wireless Channels on the Performance of Ad Hoc Networks.............................................. 333

Q. Nasir, University of Sharjah, UAE

M. Al-Dubai, University of Sharjah, UAE

S. Harous, University of Sharjah, UAE
Chapter XXIV
Key Issues in Mobile Marketing: Permission and Acceptance............................................................ 346
Stuart J. Barnes, University of East Anglia, UK



Eusebio Scornavacca, Victoria University of Wellington, New Zealand
Chapter XXV
Consumer Perceptions and Attitudes Towards Mobile Marketing...................................................... 357

Amy Carroll, Victoria University of Wellington, New Zealand

Stuart J. Barnes, University of East Anglia, UK

Eusebio Scornavacca, Victoria University of Wellington, New Zealand
Chapter XXVI
Trust Models for Ubiquitous Mobile Systems..................................................................................... 369

Mike Burmester, Florida State University, USA


Section VI
Emerging Trends
Chapter XXVII
Optical Network Survivability............................................................................................................. 376

N. S. C. Correia, University of Algarve, Portugal

M. C. R. Medeiros, University of Algarve, Portugal
Chapter XXVIII
Fractal Geometry and Computer Science............................................................................................ 385

Nicoletta Sala, Università della Svizzera Italiana, Switzerland & Università dell’Insubria,
Italy
Chapter XXIX

Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive /
Social Interaction in an Online Information Security Risk Assessment Class.................................... 405

Cindy S. York, Purdue University, USA

Dazhi Yang, Purdue University, USA

Melissa Dark, Purdue University, USA
Chapter XXX
A Mobile Intelligent Agent-Based Architecture for E-Business.......................................................... 416

Zhiyong Weng, University of Ottawa, Canada

Thomas Tran, University of Ottawa, Canada
Index.................................................................................................................................................... 433


Detailed Table of Contents

Prologue ............................................................................................................................................. xix

Section I
Fundamental Concepts and Theories
Chapter I
A Brief Overview of Wireless Systems and Standards ........................................................................... 1
Sundar G. Sankaran, Atheros Communications, USA
This chapter provides a brief overview of wireless systems and standards. The evolution of wireless
systems from voice-centric circuit-switched systems to data-centric packet-switched systems is discussed.
The first- and second-generation wireless systems were designed primarily for voice service. The data
rate supported by these systems is very limited. The 2.5G systems were developed to retrofit secondgeneration systems to support higher data rate applications. The third-generation systems are designed

to meet the demands of the Internet era. A wide range of IP-based services is provided using these systems. IEEE 802.16 standard-based systems, commonly referred to as WiMAX, are being proposed as
an alternative to third-generation systems for carrying data traffic. Popular wireless LAN and wireless
PAN standards are also discussed.
Chapter II
Propagating the Ideal: The Mobile Communication Paradox................................................................. 8
Imar de Vries, Utrecht University, The Netherlands
In this chapter, visions of mobile communication are explored by focusing on idealised concepts surrounding wireless technology. By examining sources on the development, marketing, and use of wireless technology, the author contextualises these visions within earlier accounts of ideal communication
found in media history and isolates the regularities that are part of these accounts. On close examination,
a paradox reveals itself in these regularities, one that can be described as resulting from an uneasiness
in the human communication psyche: an unfulfilled desire for divine togetherness that clashes with
individual communication needs.


Chapter III
Teaching and Learning Wi-Fi Networking Fundamentals Using Limited Resources ......................... 22
Wilson Siringoringo, Auckland University of Technology, New Zealand
Nurul I. Sarkar, Auckland University of Technology, New Zealand
Wi-Fi networking has been becoming increasingly popular in recent years, both in terms of applications
and as the subject of academic research papers and articles in the IT press. It is important that students
grasp the basic concepts of both Wi-Fi networking and wireless propagation measurements. Unfortunately, the underlying concepts of wireless networking often intimidate students with their apparently
overwhelming complexity, thereby discouraging the students from learning in-depth this otherwise exciting and rewarding subject. This chapter provides a tutorial on Wi-Fi networking and radio propagation
measurements using wireless laptops and access points.
Chapter IV
Mobile Advertising: A European Perspective ...................................................................................... 41

TawfikJelassi,Ecole Nationale des Ponts et Chaussées, France
Albrecht Enders, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany
This chapter is based on research conducted in cooperation with 12Snap, the leading European mobile
marketing company, which has implemented large-scale mobile advertising campaigns with companies such as McDonald’s, Nestlé, Microsoft, Coca-Cola, Adidas, and Sony. To set the overall stage,
the authors first discuss the advantages and disadvantages of the mobile phone in comparison to other

marketing media. Then we propose a framework of different types of advertising campaigns that can
be supported through the usage of mobile devices. Drawing from these experiences, the authors then
discuss a number of key management issues that need to be considered when implementing mobile
marketing campaigns.

Section II
Development and Design Methodologies
Chapter V
Developing a Telecommunication Operation Support System (OSS): The Impact of a Change
in Network Technology ......................................................................................................................... 54

JamesG.Williams,UniversityofPittsburgh,USA
Kai A. Olsen, Molde College and University of Bergen, Norway
The Telecommunications Act of 1996 opened competition in the telecommunications market in the
United States and forced the incumbent telecommunications companies to open both their physical and
logical infrastructure for Competitive Local Exchange Carriers (CLECs). In this case study, the authors
focus on the problems that face a CLEC with regard to designing an information system and getting a
back office system, called an Operations Support Systems (OSS), operational in a highly competitive,
complex, fast-paced market in a compressed time frame.


Chapter VI
A Component-Based Data Management and Knowledge Discovery Framework for Aviation
Studies ................................................................................................................................................... 74
M. Brian Blake, Georgetown University, USA & Center for Advanced Aviation System
Development, The MITRE Corporation, USA
Lisa Singh, Georgetown University, USA
Andrew B. Williams, Spelman College, USA
Wendell Norman, Center for Advanced Aviation System Development,
The MITRE Corporation, USA

Amy L. Silvan, Georgetown University, USA
Organizations are beginning to apply data mining and knowledge discovery techniques to their corporate
data sets, thereby enabling the identification of trends and the discovery of inductive knowledge. Since
traditional transaction databases are not optimized for analytical processing, they must be transformed.
This chapter proposes the use of modular components to decrease the overall amount of human processing and intervention necessary for the transformation process. Our approach configures components to
extract data-sets using a set of “extraction hints.” Our framework incorporates decentralized, generic
components that are reusable across domains and databases. Finally, we detail an implementation of our
component-based framework for an aviation data set.
Chapter VII
Waleli: Bringing Wireless Opportunities to Life .................................................................................. 87
Paul Kirwan, Nikos, University of Twente, The Netherlands
Peter van der Sijde, Nikos, University of Twente, The Netherlands
Aard Groen, Nikos, University of Twente, The Netherlands
This chapter tells the development story of Waleli, a high-tech company utilizing the latest proven developments in wireless communications to bring innovations to the market. It presents the journey of the
firm through the entrepreneurial process, from initial idea right through to value creation. Furthermore,
it looks at the roles and origins of network contacts and how these both impact the entrepreneur’s effort
to accumulate the necessary resources to establish and subsequently develop the firm.
Chapter VIII
Designing a Resilient and High Performance Network ...................................................................... 105
Abid Al Ajeeli, University of Bahrain, Bahrain
Yousif Al-Bastaki, University of Bahrain, Bahrain
This chapter describes the detailed configuration and LAN infrastructure design at the University of
Bahrain (UOB). The authors describe the configuration based on the new setup and migration requirements and indicate how the design satisfies those requirements. The chapter explains the detailed configuration of the design process of the distribution layer switches and shows how these switches can
be configured in the final implementation. The chapter also discusses the modifications that occurred
during the implementation/migration phase. The design of the network at UOB campuses incorporates
resiliency into the network core in order to manage problems effectively.


Chapter IX
Collaboration Challenges in Community Telecommunication Networks .......................................... 120

Sylvie Albert, Laurentian University, Canada
Rolland LeBrasseur, Laurentian University, Canada
This chapter reviews the literature on networks and, more specifically, on the development of community
telecommunication networks. It strives to understand the collaboration needed for innovative projects
such as intelligent networks. Guided by a change management framework, collaboration within a community network is explored in terms of the formation and performance phases of its development. The
context, content, and process of each phase is analyzed, as well as the interaction of the two phases. User
involvement and technology appropriation are discussed and collaboration challenges are identified and
linked to the sustainability of the community network.
Chapter X
A Generic Framework for Bluetooth Promoted Multimedia on Demand (BlueProMoD) ................. 142
Panayotis Fouliras, University of Macedonia, Greece
Nikolaos Samaras, University of Macedonia, Greece
In recent years, many technologies have converged to integrated solutions and one of the most frequently discussed topics has been the deployment of wireless personal area networks (WPANs). In this
chapter, the authors present a generic architecture scheme that allows voice and other real-time traffic
to be carried over longer distances. The proposed scheme, Bluetooth Promoted Multimedia on Demand
(BlueProMoD) is a novel framework that combines a wired backbone network including Bluetooth access points (APs) with the mobile Bluetooth-enabled devices of the end users.

Section III
Tools and Technologies
Chapter XI
Using Mobile Phones and PDAs in Ad Hoc Audience Response Systems ........................................ 157

MattJones,UniversityofWaikato,NewZealand
Gary Marsden, University of Cape Town, South Africa
Dominic Gruijters, University of Cape Town, South Africa
This chapter investigates how to create ad hoc audience response systems using nonspecialist devices.
The chapter revolves around two case studies: one involving the use of mobile phones, and the other
based on PDAs. Both case studies are carried out in tertiary education institutions, showing how these
devices can be used to facilitate audience participation using devices that students might, themselves,
bring to lectures. Both are evaluated from the perspective of the student and the educator, using a mixture

of observational and interview-based techniques.


Chapter XII
An Evaluation of U.S. City Government Wireless Networks for Mobile Internet Access ................. 169
Ben Coaker, Whiting-Turner Contracting Company, USA
Candace Deans, University of Richmond, USA
The purpose of this chapter is to provide guidelines for city governments considering implementing
large-scale wireless networks to provide Internet access for their citizens and businesses. Case studies
of cities in the United States that have implemented wireless networks will be evaluated in the context
of opportunities and potential challenges. Some key considerations discussed in this chapter involve free
versus fee-based models, security considerations, conflicts with local telecommunications companies,
and network support.
Chapter XIII
Information-Theoretic Methods for Prediction in the Wireless and Wired Web ................................ 182
Dimitrios Katsaros, Aristotle University of Thessaloniki, Greece
Discrete sequence modeling and prediction is an important goal and challenge for Web environments,
both wired and wireless. Web clients’ data-request forecasting and mobile location tracking in wireless cellular networks are characteristic application areas of sequence prediction in such environments.
Accurate data-request prediction results in effective data prefetching, which combined with a caching
mechanism can reduce user-perceived latencies as well as server and network loads. This chapter presents
information-theoretic techniques for discrete sequence prediction. It surveys, classifies, and compares
the state-of-the-art solutions, suggesting routes for further research by discussing the critical issues and
challenges of prediction in wired and wireless networks.
Chapter XIV
Empirical Prediction of Computer-Network Evolution ...................................................................... 198

SamiJ.Habib,KuwaitUniversity,Kuwait
This chapter presents a computer-aided integration tool, iCAD, that can predict a network evolution.
iCAD is connected to four device libraries, each of which contains a distinct set of network-technology devices, such as Ethernet hubs, ATM switches, IP routers, and gateways. As a network technology
changes, each device library is updated. This chapter presents empirical results from 1999 until 2005

recording the network evolution progress, where the lower and upper bounds of network evolution came
out to be 10% to 25% and 57% to 74% respectively in terms of network-design cost reduction.

Section IV
Utilization and Application
Chapter XV
New Computer Network Paradigms and Virtual Organizations ......................................................... 214
Guillermo Agustín Ibáñez Fernández, Universidad Carlos III, Spain


A computer network consists of computers that communicate via any physical media through a network
formed by links and nodes, the nodes being the computers. Computer networks have evolved along their
short history. Computer networks have changed drastically in mission and implementation from the early
projects supported by the Advanced Research Projects Agency (ARPA) and from other organizations,
tracing back the origins to 1962. This chapter demonstrates how Recent advances in P2P applications
like Skype, high speed (10 Gb Ethernet) fixed and wireless mesh networks and the development of
pervasive computing are changing the scenario for virtual organizations. When combined with wireless
mobile mesh and ad hoc networks, they will make possible ubiquitous virtual networks.
Chapter XVI
Software Agent Technology for Supporting Ad Hoc Virtual Enterprises ........................................... 224

JarogniewRykowski,ThePoznanUniversityofEconomics,Poland
This chapter introduces a new idea of using software agents for supporting ad hoc virtual enterprises
and similar forms of temporal business-to-business collaboration. It seems that current information and
telecommunication technologies, based on information interchange and local data processing, are not
flexible enough to deal with modern business requirements, especially dynamic and temporal business
relations, heterogeneity of hardware, software and communication means, and data complexity. The
proposed approach differs in the distribution of both data and programs for data treatment at-the-place
and just-in-time. The distributed and remotely executed programs, software agents, are autonomous
entities, targeted on obtaining preprogrammed goals, and working in the name and under the authority

of their owners.
Chapter XVII
Wireless Networks Based on WiFi and Related Technologies ........................................................... 250
Rajendra V. Boppana, University of Texas at San Antonio, USA
Suresh Chalasani, University of Wisconsin-Parkside, USA
Multihop wireless networks based on WiFi technology offer flexible and inexpensive networking possibilities. Applications of multihop wireless networks range from personal networks within consumer
homes to citywide departmental networks to wide-area vehicular ad hoc networks. This chapter focuses
on multihop ad hoc networks with communication among user devices and access points, where available, without the restriction that the user devices need to be within the radio range of access points.
Chapter XVIII
An Immune Systems Approach for Classifying Mobile Phone Usage ............................................... 266

HannyYuliusLimanto,NanyangTechnologicalUniversity,Singapore

TayJocCing,NanyangTechnologicalUniversity,Singapore
Andrew Watkins, Mississippi State University, USA
With the recent introduction of third generation (3G) technology in the field of mobile communications,
mobile phone service providers will have to find an effective strategy to market this new technology.
One approach is to analyze the current profile of existing 3G subscribers to discover common patterns
in their usage of mobile phones. With these usage patterns, the service provider can effectively target


certain classes of customers who are more likely to purchase their subscription plans. To discover these
patterns, the authors use a novel algorithm called Artificial Immune Recognition System (AIRS) that
is based on the specificity of the human immune system. In the current experiment, the algorithm performs well, achieving an accuracy rate in the range of 80% to 90%, depending on the set of parameter
values used.
Chapter XIX
Collecting Consumer Behavior Data with WLAN ............................................................................. 277
Patrik Skogster, Rovaniemi University of Applied Sciences, Finland
Varpu Uotila, Turku School of Economics, Finland
Knowing consumers’ shopping paths is an essential part of successful retailing. Good space management

requires accurate data about consumer behavior. Traditionally, these data have been collected through,
for example, panel interviews, camera tracking, and in-store observation. Their nature is more or less
subjective. Modern technology makes it possible to use more objective methods, such as wireless local
area network (WLAN) and radio frequency identification (RFID). This chapter examines the possibilities WLAN provides information systems studies. The results show that WLAN has great potential for
accurate and objective data collection processes and modeling data in retailing.

Section V
Critical Issues
Chapter XX
Distributed Resources Management in Wireless LANs...................................................................... 293
Ghassan Kbar, American University in Dubai, UAE
Wathiq Mansoor, Zayed University, UAE
This chapter introduces a new radio resource management technique based on distributed dynamic
channel assignment, and sharing load among Access Points (AP). Deploying wireless LANs (WLAN)
on a large scale is mainly affected by reliability, availability, and performance. These parameters will
be a concern for most managers who want to deploy WLANs. In order to address these concerns, a new
radio resource management technique can be used in a new generation of wireless LAN equipment.
This technique would include distributed dynamic channel assignment, and load sharing among Access
Points (AP), which improves the network availability and reliability compared to centralized management techniques. In addition, it will help to increase network capacities and improve performance,
especially in large-scale WLANs
Chapter XXI
An Empirical Examination of the Impact of Wireless Local Area Networks on Organization
of Users ............................................................................................................................................... 305
Lei-da Chen, Creighton University, USA
Ravi Nath, Creighton University, USA


In recent years, the concept of nomadic computing has received considerable attention from the business
community. As an early form of nomadic information environment (NIE), wireless local area network
(WLAN) has gained tremendous popularity with organizations. Using mostly anecdotal evidences,

WLAN equipment manufacturers and practitioners claimed that WLAN brought dramatic improvements
in the forms of productivity gains and attainment of convenience, flexibility, mobility, and time saving
to organizations and their employees. By surveying end-users and managers, this study investigates the
impact of WLAN on users and their work. Finally, recommendations to researchers, managers, WLAN
technology providers, and equipment manufacturers also are provided.
Chapter XXII
Supporting Real-Time Service in Packet-Switched Wireless Networks ............................................ 324
Maode Ma, Nanyang Technological University, Singapore
Zheng Xiang, Nanyang Technological University, Singapore
The requirement of providing real-time data service by wireless networks is a critical issue in the design
of current wireless networks. Distributed Queueing Request Update Multiple Access (DQRUMA) has
been proposed as a demand assignment medium access control (MAC) protocol to efficiently control
the medium sharing by multiple mobile users. With the help of a packet transmission policy, DQRUMA
has a potential to provide QoS service for the time-constrained burst data traffic. This chapter studies the
problem of providing real-time service to fixed-size packets with or without time constraints in wireless
networks. In particular, a novel scheduling scheme for the DQRUMA protocol to control the packet
transmission in packet-switched wireless networks is proposed.
Chapter XXIII
Effect of Wireless Channels on the Performance of Ad Hoc Networks ............................................. 333
Q. Nasir, University of Sharjah, UAE
M. Al-Dubai, University of Sharjah, UAE

S.Harous,UniversityofSharjah,UAE
Mobile ad hoc (MANET) network is a collection of wireless mobile nodes dynamically forming a
temporary network without the use of any existing network infrastructure or centralized administration. To accomplish forwarding a packet to its destination, a routing protocol is used to discover routes
between these nodes. This chapter presents a variety of results for packet-level simulations for the
popular protocol—dynamic source routing (DSR)—when different channel models are used. Different
radio propagation models representing the wireless channel have been proposed over the years, each
one being suitable for a certain situation. The simplest model that represents wireless propagation is the
freespace model. Other propagation models are the tworay ground reflection model and the shadowing

model. Simulation results show that the performance metrics are highly affected by the channel model
used, even the energy left or the number of nodes left alive are also different.
Chapter XXIV
Key Issues in Mobile Marketing: Permission and Acceptance ........................................................... 346

StuartJ.Barnes,UniversityofEastAnglia,UK
Eusebio Scornavacca, Victoria University of Wellington, New Zealand


The growth and convergence of wireless telecommunications and ubiquitous networks has created a
tremendous potential platform for providing business services. In consumer markets, mobile marketing is likely to be a key growth area. Mobile marketing permission and acceptance are core issues that
marketers have yet to fully explain or resolve. This chapter provides direction in this area. After briefly
discussing some background on mobile marketing, the chapter conceptualises key characteristics for
mobile marketing permission and acceptance. The chapter concludes with predictions on the future of
mobile marketing and some core areas of further research.
Chapter XXV
Consumer Perceptions and Attitudes Towards Mobile Marketing ..................................................... 357
Amy Carroll, Victoria University of Wellington, New Zealand

StuartJ.Barnes,UniversityofEastAnglia,UK
Eusebio Scornavacca, Victoria University of Wellington, New Zealand
Mobile marketing is an area of m-commerce expected to experience tremendous growth in the next 5
years. This chapter explores consumers’ perceptions and attitudes towards mobile marketing via SMS
through a sequential, mixed-methods investigation. Four factors were identified and proven as all having
a significant impact on mobile marketing acceptance—permission, content, wireless service provider
(WSP) control, and the delivery of the message, which guided the development of a revised and
empirically tested model of m-marketing consumer acceptance. The findings also suggest that marketers
should be optimistic about choosing to deploy mobile marketing, but exercise caution around the factors
that will determine consumer acceptance.
Chapter XXVI

Trust Models for Ubiquitous Mobile Systems .................................................................................... 369
Mike Burmester, Florida State University, USA
This chapter introduces the notion of trust as a means to establish security in ubiquitous mobile network
systems. It argues that trust is an essential requirement to enable security in any open network environments, and in particular, in wireless ad hoc environments where there is no network topology. In general
it may be hard, or even impossible, to establish, recall, and maintain trust relationships. It is therefore
important to understand the limitations of such environments and to find mechanisms that may support
trust either explicitly or implicitly.

Section VI
Emerging Trends
Chapter XXVII
Optical Network Survivability ............................................................................................................ 376
N. S. C. Correia, University of Algarve, Portugal
M. C. R. Medeiros, University of Algarve, Portugal


In optical networks, survivability becomes very important because of the huge amount of traffic carried
by fibers. Therefore, the prevention of service interruption, or the reduction of the service loss, must
now be an integral part of the network design and operations strategy. In this chapter, optical network
survivability is discussed and special emphasis has been given to WDM lightpath protection.
Chapter XXVIII
Fractal Geometry and Computer Science ........................................................................................... 385
Nicoletta Sala, Università della Svizzera Italiana, Switzerland & Università dell’Insubria,
Italy
Fractal geometry can help us to describe the shapes in nature (e.g., ferns, trees, seashells, rivers, mountains) exceeding the limits imposed by Euclidean geometry. Fractal geometry is quite young: The first
studies are the works by the French mathematicians Pierre Fatou (1878-1929) and Gaston Julia (18931978) at the beginning of the 20th century. However, only with the mathematical power of computers
has it become possible to realize connections between fractal geometry and other disciplines. Recent
studies apply this geometry to controlling traffic in computer networks (LANs, MANs, WANs, and the
Internet). The aim of this chapter is to present fractal geometry, its properties (e.g., self-similarity), and
their applications in computer science.

Chapter XXIX
Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive /
Social Interaction in an Online Information Security Risk Assessment Class ................................... 405
Cindy S. York, Purdue University, USA
Dazhi Yang, Purdue University, USA
Melissa Dark, Purdue University, USA
This chapter briefly reviews two important goals in online education: interaction and presence. These
are important goals in online education because they are linked to learning and motivation to learn. The
chapter provides guidelines and an extended example of how to design an online course in information security in a manner that will enhance interaction and presence. This chapter’s contribution is to
provide guidelines with a corresponding extended and concrete example for those who are tasked with
designing and delivering online courses. Although the guidelines and example were targeted to the field
of information security, they can be readily adopted by other disciplines.
Chapter XXX
A Mobile Intelligent Agent-Based Architecture for E-Business ......................................................... 416
Zhiyong Weng, University of Ottawa, Canada
Thomas Tran, University of Ottawa, Canada
This chapter proposes a mobile intelligent agent-based e-business architecture that allows buyers and
sellers to perform business at remote locations. This proposed architecture promises a number of benefits.
First, it provides great convenience for traders as business can be conducted anytime and anywhere. Second, since the task of finding and negotiating with appropriate traders is handled by a mobile, intelligent


agent, the user is freed from this time-consuming task. Third, this architecture addresses the problem of
limited and expensive connection time for mobile devices: A trader can disconnect a mobile device from
its server after generating and launching a mobile intelligent agent. Later on, the trader can reconnect
and call back the agent for results, therefore minimizing the connection time. Finally, by complying with
the standardization body FIPA, this flexible architecture increases the interoperability between agent
systems and provides high scalability design for swiftly moving across the network.
Index.................................................................................................................................................... 433



xix

Prologue

IntroductIon
The field of telecommunications and networking continues to produce a rich set of contributions to industry and the research community as this selection of readings demonstrates. The book has compiled a
series of recent submissions that cover a range of aspects in this dynamic field. The chapters are divided
in six themes: (1) Fundamental Concepts and Theories, (2) Development and Design Methodologies,
(3) Tools and Technologies, (4) Application and Utilization, (5) Critical Issues, and 6) Emerging Trends.
The resulting volume is a valuable and multi-faceted resource that gives the reader a good insight about
where the technology is going and a sample of some of the most interesting applications and developments exploiting that emerging technology base. In the next few paragraphs, I’d like to highlight some
of the most interesting issues being raised in telecommunications and networking research and perhaps
speculate somewhat about directions for further enquiry that may have a long-term effect of how we
use and deploy telecommunications and networking solutions that contribute to an increasingly connected world.

ubIquItous networkIng
The exponential growth of the Internet has diminished the difficulties associated with communication
between distant places, allowing people to participate in the digital economy regardless of their geographical limitations. Additionally, developments in wireless technologies are freeing people from using
wires for communicating. For example, the conveniences of wireless connections have converted mobile
phones in a commodity, rather than a luxury item (Weatherall and Jones, 2002). Juniper Research’s
global m-commerce revenue projections for 2009 include global revenues of US$88 billion, ticket purchases of US$39 billion, and phone-based retail POS sales US$299 million (Juniper Research, 2008).
The idea of “anywhere, anytime, by anything and anyone” (or 4As) networking is at the core of a new
emerging networking technology, referred to as a “Ubiquitous Networking”. The concept of Ubiquitous
Networking originated from the concept of Ubiquitous Computing, which was aimed to “make many
computers available throughout the physical environment, while making them effectively invisible to
the user” (Weiser, 1993; Wikipedia, 2008). Additionally, Weiser highlighted 4 important “networking”
issues when focusing on ubiquitous computing, namely: wireless media access, wide-bandwidth range,


xx


real-time capabilities for multimedia over standard networks, and packet routing. All of these research
areas are well-covered in this selected readings collection.
The world of Ubiquitous Networking creates new business opportunities for the development of
services and applications that maximise the freedom offered by the technology. Evolving networking
technologies will change our daily lives, both in social and economical terms. The potential demand
includes, but is not limited to services such as ubiquitous health / concierge systems, ubiquitous automobile systems and ubiquitous education / learning systems.

network Infrastructure Issues
The core of a ubiquitous networking environment is the underlying networking infrastructure that is
capable of meeting the requirements of users. In general, networking technologies can be divided into
two broad categories, (1) wired networks and (2) wireless networks. The key functional distinction
between the two types of networks is the speed, where wired networking technologies are capable of
providing much higher speed communications compared to wireless networking technologies. The
technologies supporting wireless networks will always be “resource-poor” when compared with those
supporting wired networks (Satyanarayanan, 1996). Below is the list of key wired and wireless networking technologies.








Fibre Technologies (e.g., FTTH, FTTC)
Wireless LANs (802.11g/n, 802.16)
Wireless MANs (Fixed wireless, LMDS, 802.20)
Wireless WANs (3G/4G, GPRS, UMTS, GPS, mesh networks)
Short-distance wireless communication technologies (Wireless PAN) (e.g., Bluetooth, 802.15.3)
Satellite Systems (e.g., Motorola’s Iridium)

Sensor networks

Drew (2002) argues that wired networks are necessary while considering wireless networks as a
supplement. However, in a ubiquitous network environment, the role of wireless networks matches
the importance of wired networks. In a ubiquitous networking environment, wired networks act as the
backbone providing high to very high speed connection to end-users. However, wired networks are very
restricted in terms of mobility. Wireless networks address this deficiency, and provide high mobility to
users although with lower speeds than wired networks. Thus, in a ubiquitous networking environment,
wired and wireless networking technologies form a symbiotic relationship, by compensating for the
deficiencies of each other.
In a ubiquitous networking environment, the networking technologies are not limited to providing
“person to person” communications; they also need to address “person to object” and “object to object”
communications (MIAC, 2005). The convergence of wired and wireless technologies will provide an
appropriate use of networking technologies for those three different types of communications, maximising the potential of ubiquitous networking. That convergence is a key characteristic of environments
which support the spontaneous appearance of entities, in other words “persons” or “objects” that move
into range and initiate participation in the ubiquitous network (Kindberg & Fox, 2002). A vital area of
research is associated with the viable business models along with the potential applications and services
that could be offered as part of a ubiquitous networking environment.


xxi

evolutIon of telecommunIcatIons and networks
The promising benefits and attractive proposals of applications and services for ubiquitous networking
environments have sparked the interest of many countries around the world and have also attracted the
attention of the International Telecommunications Union (ITU), the organisation that is well known for
its standardisation efforts in the telecommunications field. Recently, the ITU have addressed the idea of
the “Ubiquitous Network Society” as part of their “New Initiatives Programme” which aims to identify
the emerging trends in the telecommunications environment (ITU, 2005a). In that ITU programme South
Korea and Japan were selected to illustrate early implementations of ubiquitous networking.

Why these two countries? As discussed above the networking infrastructure is the critical factor for
ubiquitous networking. According to the ITU, South Korea is the world’s broadband leader by a significant margin; along with a high number of mobile subscribers that even outnumbers fixed line subscribers
(ITU, 2005b). Similar statistics apply to Japan (ITU, 2005c). The high penetration rate of broadband
and the widely use of wireless technologies around the country allows facilitates the implementation
of “anywhere, anytime by anything, anyone” ubiquitous networking. The success factors for these two
countries are explained in detail in the ITU’s case studies (ITU, 2005a; ITU, 2005b). In South Korea,
the Ministry of Information and Communication has the intention of realising their “digital home plan”,
in which digital home appliances with communications capabilities are installed in apartment houses
as a total, integrated system (Murakami, 2004). In the private sector, plans for ubiquitous networking
are also emerging: the Dongtan Ubiquitous Networking city plan, supported by the Samsung group,
involves 40,000 households (Murakami, 2004). At the university level a number of institutions have
successfully implemented ubiquitous networking environments, usually labelled “u-campuses”. For
example, at Sukmyung Woman’s University, students can download “credit-card” functionality to their
PDA or mobile phone and use the device as a medium for payment (Jung, 2004).
The strong focus and national level of support towards ubiquitous networking in South Korea and
Japan are driving other countries to adopt similar strategies. In Europe, the project Amigo is addressing
the idea of ubiquitous networking, stating that it is an “integrated project that will realize the full potential
of home networking to improve people’s lives” (Amigo Project, 2004). Active participants in this project
include companies from various countries, among them France, Germany, Spain and the Netherlands.
However, these efforts are limited to the commercial sector without the stronger government and country-wide support found in South Korea and Japan. According to the ITU, Italy and Singapore are the two
other countries that are actively participating in achieving a ubiquitous networking environment (ITU,
2005d; ITU 2005e), with relatively well- established infrastructure throughout their territories.
The ubiquitous networking technology is still in its very early stages and there are numerous issues
that need to be addressed before achieving a perfect operating environment. One of the major issues is
to maintain interoperability between different networking technologies. For example, an office employee
may have a Bluetooth device that connects with her laptop, use a Wireless LAN based on 802.11g, a
Wireless WAN based on 3G, and a wired connection using ADSL. To maximise the benefits from a
ubiquitous networking environment, these various technologies should be able to communicate without
any disruptions. Additionally, processing power of mobile devices and issue of security is one of other
concerns for true ubiquitous networking environment. Currently, significant research emphasis is given

to the security and middleware side of ubiquitous networking to address this, and it is highly related
with improvements in the processing power of mobile devices.
The selection of networks in a ubiquitous networking environment is one of the main operating
issues with this technology. For example, in a ubiquitous networking environment, a cordless phone
may substitute your mobile phone when you are outside the house. Choosing the best network based


xxii

solely on the user requirements complicates the selection of the “ideal” network for a particular connection time and location. The user-initiated selection of a provider also generates the issue of billing.
Currently customers “subscribe” to the desired services, and get billed based on the usage. However, in
a ubiquitous networking environment, there is no need to “subscribe” for a desired service, but rather
users have the capability to employ ad-hoc type services when needed. This adds complexity to existing billing systems however these requirements need to be addressed to achieve a truly ubiquitous
networking environment.
Another key issue for the success of ubiquitous network services is the issue of assigning prices to
those services. Furthermore, ubiquitous services based on a network of complementary technologies,
both fixed and wireless, have created the expectation of services that can be obtained dynamically and
automatically with the minimum possible of interaction between the users and potentially complex
network systems. Intelligent agents would negotiate the best conditions to make sure the user obtains
always the best possible connection (Voinov and Valladares, 2003). This best possible connection would
be selected by comparing the different services, quality of the services offered, prices and reaching a
decision based on the policies the user has configured in her intelligent agent and in conjunction with
the policies being presented by the different service providers.
It is clear that, from the technical point of view, the scenario depicted above is feasible. There has
been continued progress on the integration of technologies such as WiFi, “Mesh” and “Ad-Hoc” networks
with the traditional phone networks and fixed sub-networks based on the TCP/IP family of protocols.
Telecommunication companies have exploited the popularity of WiFi “hot spots” as access ramps to
their 3G services (Legard, 2003). However, there is work to be done in the area of agreeing how to price
network services, especially when that “network” is supplied by different organizations and potential
users may not have contractual agreements with all the players involved.

The current telecommunications environment, in which virtual operators re-sell network services,
in which some firms are customers of a traditional “Telco” while at the same time offering services to
many other smaller organizations, forces us to redefine many of the business models that had been used
so far. Long term contracts are being challenged by many other arrangements that give more flexibility
to the users. These changes, in most cases promoted by users’ requirements and further “pushed” by
competitive, and innovative, new entrants into the telecommunications arena have resulted on a profound
transformation in the way services are acquired and billed. This fact will always clash with the tendency
of traditional “Telcos” to keep billing as simple as possible (Meyer, 2003).
It is entirely possible that the much vaunted convergence of the Internet and Telco worlds will push
companies competing in that field to adjust the way they do business (Panagiotakis et al., 2005). An
optimistic view of these changes argues that network operators will be able to obtain additional revenues
by pricing quality services (with guaranteed levels of performance or guaranteed security) at a premium
and that selected customers will be more that willing to foot the bill for a better service.
The ubiquitous networking environment creates new challenges in security and requires development
of new approaches to address both existing and new security problems (Van Dyke and Koc, 2003). Heterogeneous networking environments add several levels of complexity to existing security mechanisms,
and different techniques needs to be developed to ensure optimum levels of security in the ubiquitous
networking environment (Privat, 2005).
The advancements in handheld devices are one of the key drivers of ubiquitous networking, and these
devices are improving its capabilities at exponential rates. However, due mainly to their size restrictions, these devices suffer from a number of limitations. These limitations include but are not limited
to: inadequate processing capability, restricted battery life, limited memory space, slow expensive connections and confined host bandwidth (Sharmin, Ahmed & Ahmed, 2006). To address these limitations,


xxiii

middleware can be play an essential role. For example, rather than delegating processing responsibility
to the light-weight handheld devices, core processing can be performed by the middleware applications.
Currently developed middleware applications are capable of providing services such as security, data
backup services, resource discovery services and ad-hoc communication services, to list a few (Sharmin,
Ahmed and Ahmed, 2006). Given that middleware is the most viable solution to minimise limitations
of handheld devices, a large number of middleware applications are under research by both academics

and practitioners (Yau, Wang and Karim, 2002; Murphy, Picco and Roman, 2001; Sharmin, Ahmed and
Ahmed, 2006).
Finally, security has always been a critical issue within the area of networking, and this is not an
exception for the evolving telecommunications scenarios. In fact, security in this type of environments
requires more emphasis than what has been perceived in traditional networks. The convenience of handheld devices, such as PDAs, means that people are storing personal data on these devices, which means
that more stringent security mechanisms to protect these data are required. The typical characteristics
of handheld devices also create security concerns (Raghunathan, Ravi, Hattangady and Quisquarter,
2003):




Mobile communications uses a public transmission medium, which creates opportunity for hackers
to eavesdrop communications more easily than with secured private connections
Mobile devices are vulnerable to theft, loss and corruptibility
Processing power limitations on mobile devices can imply restrictions on security features (e.g.
Algorithm selection)

To address these issues various methods have been proposed and refined during the last few years but
numerous challenges, associated with the proliferation of different networks and the secure and seamless integration of those technologies, are still being actively investigated in research and development
facilities throughout the world.

conclusIon
It is clear that “anywhere, anytime by anything and anyone” (4As) networking will not arrive overnight.
It will be an incremental process that requires commitment, careful planning and preparation. Viable
implementations will initially take place at a relatively small scale, in apartment buildings or university
campuses before extending to a wider environment. Eventually, a world-wide level of ubiquitous networking will be reached, allowing people to use the same device everywhere.
Developments in networking have changed our everyday lives, especially with the introduction and
popularity of the Internet. High demand from individual users and organisations has brought the concept
of ubiquitous networking to the front as seen in the cases of South Korea and Japan. The importance

of the underlying networking infrastructure is one of the key success factors for establishing ubiquitous networking environments along, of course, with successful applications and services. Ubiquitous
networking is not without problems and there are a number of critical issues that need to be resolved.
However, as illustrated by several of the readings included in this selection, the technology offers great
promise and it will eventually reach us, converting our “4As” networking dreams into reality.


xxiv

references
Amigo Project (2004). Ambient intelligence for the networked home environment: Summary. Amigo
Project. Dec. 2004. Available from the World-Wide Web: />amigo/
Drew Jr, W. (2002). Wireless Networks: New meaning to ubiquitous computing. University of New
York. Jun 2002, pp. 1 - 11
Juniper Research (2008). Global mCommerce Revenue Projections For 2009. Available from the WorldWide Web: />International Telecommunication Union (2005a). New Initiatives Programmes, Feb 2005. International
Telecommunication Union. Available from the World-Wide Web: />International Telecommunication Union (2005b). ITU Workshop on Ubiquitous Network Societies: The
Case of the Republic of Korea. International Telecommunication Union. Apr 2005, pp. 10 – 45
International Telecommunication Union (2005c). ITU Workshop on Ubiquitous Network Societies: The
Case of the Japan. International Telecommunication Union. Apr 2005, pp. 13 – 45
International Telecommunication Union (2005d). ITU Workshop on Ubiquitous Network Societies: The
Case of the Italian Republic. International Telecommunication Union. Apr 2005, pp. 25 – 50
International Telecommunication Union (2005e). ITU Workshop on Ubiquitous Network Societies: The
Case of the Republic of Singapore. International Telecommunication Union. Apr 2005, pp. 21 – 39
Jung, K. U. (2004). Community, S&A Research Group, Research Group Notice Board: Ubiquitous
Campus in Korea. Ubiquitous IT Korea Forum. Dec. 2004, Available from the World-Wide Web: http://
www.ukoreaforum.or.kr/
Kindberg, T. and Fox, A. (2002). System Software for Ubiquitous Computing. IEEE Pervasive Computing, January, pp. 70-81
Legard, D. (2003). SingTel, NTT DoCoMo tie up to push 3G, IDG News Service.
Meyer, D. (2003). AT&T wireless tries simple rate plans, fewer freebies. RCR Wireless News, 22(7).
Ministry of Internal Affairs and Communications, Japan (2005). Tokyo Ubiquitous Networking conference: Program (Session 5) Ubiquitous Network Society. May 2005. Available from the World-Wide Web:
/>Murakami, T. (2004), NRI Papers: Ubiquitous Networking: Business Opportunities and Strategic Issues,

Nomura Research Institute. Aug 2004, pp. 1 – 24
Murphy, A L.; Picco, G P.; Roman G C. (2001). Time: A Middleware for Physical and Logical Mobility.
Proceedings of the 21st International Conference on Distributed Computing Systems, May.
Panagiotakis, S., Koutsopoulou, M. and Alonistioti, A. (2005). Business Models and Revenue Streams
in 3G Market. IST Mobile Communication Summit 2005, Dresden, Germany, June.
Privat, G. (2005). Ubiquitous Network & Smart devices: New Telecom Services & Evolution of Human
Interfaces. ITU Ubiquitous Network Societies Workshop. Apr 2005. Available from the World-Wide Web:


×