CRASH COURSE
ROMAN KIKTA
AL FISHER
MICHAEL P. COURTNEY
McGraw-Hill
New York Chicago San Francisco Lisbon
London Madrid Mexico City Milan New Delhi
San Juan Seoul Singapore Sydney Toronto
Copyright 2002 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the
United States of America. Except as permitted under the United States Copyright Act of 1976, no
part of this publication may be reproduced or distributed in any form or by any means, or stored
in a database or retrieval system, without the prior written permission of the publisher.
0-07-139468-0
The material in this eBook also appears in the print version of this title: 0-07-138212-7.
All trademarks are trademarks of their respective owners. Rather than put a trademark symbol
after every occurrence of a trademarked name, we use names in an editorial fashion only, and to
the benefit of the trademark owner, with no intention of infringement of the trademark. Where
such designations appear in this book, they have been printed with initial caps.
McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales
promotions, or for use in corporate training programs. For more information, please contact
George Hoare, Special Sales, at [email protected] or (212) 904-4069.
TERMS OF USE
This is a copyrighted work and The McGraw-Hill Companies, Inc. ("McGraw-Hill") and its
licensors reserve all rights in and to the work. Use of this work is subject to these terms. Except
as permitted under the Copyright Act of 1976 and the right to store and retrieve one copy of the
work, you may not decompile, disassemble, reverse engineer, reproduce, modify, create
derivative works based upon, tran smit, distribute, disseminate, sell, publish or sublicense the
work or any part of it without McGraw-Hills prior consent. You may use the work for your own
noncommercial and personal use; any other use of the work is strictly prohibited. Your right to
use the work may be terminated if you fail to comply with these terms.
THE WORK IS PROVIDED "AS IS." McGRAW-HILL AND ITS LICENSORS MAKE NO
GUARANTEES OR WARRANTIES AS TO THE ACCURACY, ADEQUACY OR
COMPLETENESS OF OR RESULTS TO BE OBTAINED FROM USING THE WORK,
INCLUDING ANY INFORMATION THAT CAN BE ACCESSED THROUGH THE WORK VIA
HYPERLINK OR OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. McGraw-Hill and its
licensors do not warrant or guarantee that the functions contained in the work will meet your
requirements or that its operation will be uninterrupted or error free. Neither McGraw-Hill nor its
licensors shall be liable to you or anyone else for any inaccuracy, error or omission, regardless
of cause, in the work or for any damages resulting therefrom. McGraw-Hill has no responsibility
for the content of any information accessed through the work. Under no circumstances shall
McGraw-Hill and/or its licensors be liable for any indirect, incidental, special, punitive,
consequential or similar damages that result from the use of or inability to use the work, even if
any of them has been advised of the possibility of such damages. This limitation of liability shall
apply to any claim or cause whatsoever whether such claim or cause arises in contract, tort or
otherwise.
DOI: 10.1036/0071394680
CONTENTS
Foreword
ix
Preface
xii
Acknowledgments
xxii
11
13
17
19
20
Terminal Technologies
24
Infrastructure Challenges
Circuit-switched vs. All-IP
Service Provisioning
Network Switch Requirements
25
25
27
28
35
36
37
38
41
42
45
47
47
50
51
55
v
vi
CONTENTS
J2ME
Symbian
WinCE
58
60
61
62
62
63
63
64
64
Proprietary Networks
Ardis (DataTAC)
Ricochet
Mobitex or RAM Mobile Data
OmniSky
Wireless LANs and Personal Area Networks
Bluetooth
IEEE 802.11
HiperLAN and HiperLAN2
Home RF
64
64
64
65
66
66
67
68
71
75
76
76
77
78
81
81
85
Computer Sales
89
93
95
95
96
97
98
103
103
104
In a Nut Shell
105
CONTENTS
vii
107
108
110
Mobility Value
110
111
Emerging Devices
112
Mobile Portals
115
117
Personalization
119
Content Delivery
120
Personalized Communications
Mobile Electronic Mail
Instant Messaging
Electronic Calendar
Mobile Electronic Wallet
Identification or Security Access
Electronic Photo Album
News and Information
Entertainment and Lifestyle
Location-Based Services
Access and Connectivity-Enabled Solutions
Manufacturing
Telemedicine
Distance Learning
Security Video Monitoring
121
121
122
125
126
126
126
128
130
138
140
144
145
147
151
153
155
156
157
159
160
162
163
164
165
165
viii
CONTENTS
166
167
Protecting Content
Digital Rights Management
168
168
A Final Word
171
173
174
175
178
180
180
Economic Power
188
188
190
190
191
192
194
195
195
196
Multimedia Messaging
196
Wireless Efficiency
Its All About Emotion
No, I Dont Want to See What You Did Last Summer
Eroding Emotion
Speed Influences the Volume of Communication
Real Time Adds Value
197
197
198
198
199
199
200
200
201
APPENDIX A
203
APPENDIX B
205
Glossary
213
Index
225
FOREWORD
any people worldwide experience Internet connectivity
on their computers at work, enjoying a high-speed, seamless connection through corporate networking. However, less
than 1015% of these same people enjoy a broadband connection for personal Internet access at home; the number of
broadband mobile users is significantly less than that at this
point. Many of these individuals who delight in high-speed
access at work are disappointed with their home experience
and highly disappointed with their mobile access experience.
This results in a limitation of personal use or SOHO work
objectives. Today, the primary options available to fixed broadband customers are cable, DSL, satellite, or point-to-point and
point-to-multipoint wireless. These are good technologies but
insufficient to address all global broadband needs due to range,
flexibility, or physical connection requirements. In many cases,
there is a virtual monopoly of these existing broadband solutions that makes them expensive and potentially unattractive to
the end user. Mobile users have even fewer choices for broadband access but the marketplace is changing. Competition and
market penetration require new technology for wireless mobile
and fixed broadband access systems. This is the dawn of the
Wireless Internet. The team here at Navini Networks believes
that narrowband, slow-speed connections will be things of the
past in a few years and that wireless solutions must be a significant part of that change.
The world of wired telecommunications has developed for
well over 100 years and continues to advance daily at an astonishing pace. At the same time user behavior is also evolving and
untethered access is considered an increasingly important
requirement. Although wireless telecommunications has existed for the last 3050 years, it only became popular with the
advent of mobile cellular communications in the last 15 years.
Today, the majority of voice calls are divided between cordless
phones and cellular phones, skipping the basic wired phones of
ix
Copyright 2002 by The McGraw-Hill Companies, Inc.
Click here for terms of use.
FOREWORD
the traditional wired world of telecommunications. The transfer over to wireless options has been especially acute in the last
5 years as the price/performance of wireless technologies
makes them an acceptable alternative to wired technologies.
The rush to wireless in the last mile has been dominated by
voice, with multimedia data services in most cases restricted to
niche opportunities due to cost and throughput (bits per second). However, the utility of nomadic and mobile access that
wired solutions could not provide is intrinsic to all uses of wireless solutions including multimedia. At the same time it is
highly unlikely that the end user will agree to pay more than a
fair increment in price for that benefit while at the same time
tolerating significantly lower throughput compared to wired
options. However, it appears, that wireless technologies are at
the point now where they will be able to deliver the price/performance to meet an ever-increasing number of users multimedia needs. A wired broadband Internet user typically stays
online 2 to 3 times longer than a dial-up user. Imagine a further multiplier of use if the wires are removed and data speeds
are still significantly greater than dial-up! This paradigm is
what can be characterized as the Wireless Internet, a world of
always on, always connected, and untethered by wires.
In mid-2001 we are provided glimpses of the possibilities of
what the Wireless Internet could be with services like
Docomos i-mode and Sprints Wireless Web, but these are just
the early covered wagon days. Now imagine as throughputs
over wireless migrate from 14.4kbps to 10 times that with
mobility and then 100+ times that with other Wireless Internet
technologies like 802.11 and MMDS Generation 2 systems.
You are now imagining the equivalent of the space age.
A key observation regarding enabling technologies that is
highly useful is that you usually cannot anticipate all the
potential uses; basically, we do not possess a crystal ball to predict the future. Therefore, the killer apps of the Wireless
Internet will either evolve or change from what the predictions
anticipated. Wireless broadband access and all forms of the
Wireless Internet will produce significant changes in the way
we interact with the Internet and even each other. It will gen-
FOREWORD
xi
PREFACE
The wireless industry is on the threshold of a fascinating era
a convergence of wireless communications and the Internet
that enables connectivity from anywhere. Connectivity from
anywhere is the truly unique value-added component that wireless brings to the equation. The wireless telecommunication
industry is experiencing record growth. Over 860 million
mobile phones are in use worldwide and this number is growing at an average rate of 18 percent per year. We believe the
Wireless Internet will be a key driver of industry growth for the
next decade. As new technologies, applications, and content
abound, even seasoned industry veterans find it difficult to
keep abreast of the latest developments. Many new protocols
have emerged such as Wireless Application Protocol (WAP),
Compact HTML (c-HTML), i-Mode, and J2ME just to name a
few. Each of these protocols is aimed to merge the Internet and
wireless communications into a tool portfolio of Internet
access for the mobile user. More to the point, many of these
protocols proclaim to be the de facto standard for accessing
Internet content from a wireless device. Not a single day passes without multiple articles about one or the other standard
surfacing in various wireless trade publications. Many experts
are very positive about the particular protocol in question and
many others are quick to point out its shortcomings.
This book was written as a tutorial on the many key issues
and opportunities relating to the Wireless Internet, pro and con.
It is not meant to be a conclusive reference for software developers for any one protocol. There are many excellent books on
how to for c-HTML, WAP, or one of the many other protocols.
(See Appendix A for a list of reference publications.) Wireless
Internet Crash Course is written for wireless telecom managers,
developers, network managers, engineers, technicians, sales
and marketing personnel, investors, and entrepreneurs. We
hope to not only impart information but hopefully, to inspire the
more innovative to generate an idea or two. Many of you will
xiii
Copyright 2002 by The McGraw-Hill Companies, Inc.
Click here for terms of use.
xiv
PREFACE
find some chapters of more interest than others; some will probably skip certain chapters, to the disappointment of the authors,
but thats why we included so many different topics.
Each chapter presents a topic in a thorough, yet not overly
complicated manner. Reading standards documents can be
very challenging: we have participated in many standards meetings and witnessed first hand, the nodding heads, the drooping
eyelids, and the disruptive noises of engineers as they doze.
Fortunately, they do wake and complete the standards because
we have the proof in the finished documents!
We want this book to be readable without overburdening
the reader. It is meant to be as complete and up-to-date as possible. In Appendix B are URL references to many interesting
sites containing developer tool kits, complete standards documents, sources of Wireless Internet devices, and some other
darned interesting information. The material presented in this
book makes this a virtual, single source toolkit for information
on the Wireless Internet. Visit these Web sites often because
they are constantly updated with the latest information available about the Wireless Internet. For your convenience, we
have also established a Web site with links to the sites listed in
Appendix B at www.genesiscampus.com/appendixb.htm so that
you may let your mouse do the work.
Chapter 1 is an introduction to the Wireless Internet. No
book on this subject could be complete without a brief history
of communications and the Internet, so we take an historical
look at how it all started, why it was started, and some basic
details on how it works. Any discussion on the Wireless
Internet must also mention some of the participating companies that are the driving force behind it. (Actually, wed gladly
mention all companies but therein lies a big problem. Between
the time that we started this book and the time it appears on
your booksellers shelves, many new or existing companies will
enter and probably just about as many will cease to participate
in this dynamic market!)
We define what the Wireless Internet is and perhaps what
is it not. Trends toward an increasingly mobile society using
wireless communications are making world standards bodies
PREFACE
xv
xvi
PREFACE
PREFACE
xvii
xviii
PREFACE
more rewarding, and more relevant experiences. The importance of the wireless device as an instrument for information,
entertainment, and transactions will increase as physical
boundaries dissolve. We identify many of these new services
and the wireless devices needed to access them.
A large part of the success of the Internet has come from
the ability to connect with users on a wide range of devices.
Chapter 5 explores interoperability issues and some of the current problems surrounding the various technologies. Wireless
Internet standards seem to be anything but standard today:
Each manufacturer views implementation differently, and this
leads to consumer confusion when no two devices work the
same ways. (In fact, many models manufactured by the same
company have different characteristics in user interface and
feature implementations.) This chapter deals with the new
challenges that mobility adds to the ability to exchange data
between devices and systems that lack common input and output capabilities.
Although new advances in wireless computing and applications excite us, we all know that none will survive without a
secure revenue stream and an acceptable billing strategy.
Privacy and security will be crucial to the uptake of value-added
access and m-commerce services. This chapter discusses the
need for digital rights management and the kind of distribution
that will be enabled by secure and protected content.
With technology also comes threats to the social fabric of our
lives. The idea of Big Brother watching over us has never been
more accurate. The advent of Global Positioning Service (GPS)
combined with two-way mobile communications has created
new marketing opportunities for location-dependent advertising.
Many companies are mining the data resulting from GPS location information and other Wireless Internet activities to create
an advertising profile on the mobile user. The social and legal
ramifications of these issues are discussed in this chapter.
The future is about communications but communications
has always been about the future! The future is not only about
great technologies but also equally about how and why consumers and businesspeople use it. Chapter 6 explores the social
PREFACE
xix
xx
PREFACE
ACKNOWLEDGMENTS
he authors could not have completed this book without the
help of many people. The authors wish to acknowledge
those whose help and advise were paramount to our completion of the task. We appreciate all of the confidence, encouragement, support, and patience of our editor, Steve Chapman
of McGraw-Hill Professional Book Group and to Patty
Wallenburg for putting up with all of our editing changes. We
also thank Lawrence Harte at APDG Inc. for encouraging us to
embark on book authorship, Sudhir Gupta and Jane Bixler at
Spatial Wireless for their keen insight into the world of IP,
VoIP, and softswitch technologies, and Ari Reubin and Jeffrey
Wolf at Sensatex for the look into personalized, mobile information processing.
We wish also to thank Alastair Westgarth of Navini
Networks, B.J. Rone of Tatum CFO Partners, Harry Blount at
Lehman Brothers, Allan Coon at Anritsu, Monica Paolini at
Analysys Research, Steve Sievert at Compaq, Cherie Gary at
Nokia Mobile Phones, Wendy Roberts at Kyocera Wireless,
Robert Elston at Ericsson Inc., and Juli Burba at Motorola.
We would also like to extend a special thanks to the city of
Richardson, mayor Gary Slagel, and city manager Bill Keffler.
Also our gratitude goes to the Technology Business Counsel,
particularly Ron Robinson, John Jacobs, and Mike Chism for
their comments and encouragement. Finally, we could not have
completed this book without to support of Wu-Fu Chen and
Junli Wu at Genesis Campus.
xxi
Copyright 2002 by The McGraw-Hill Companies, Inc.
Click here for terms of use.
C H A P T E R
O N E
HISTORY OF
MODERN
COMMUNICATIONS
1
Copyright 2002 by The McGraw-Hill Companies, Inc.
Click here for terms of use.
CHAPTER ONE
CHAPTER ONE
Mors
e
teleg invents
raph
First
p
teleg ublic
raph
Bell
in
telep vents
hone
Bell
te
comp lephone
any c
reate
d
First
radio
broad
cast
First
comp
uter
Tran
s
creat istor
ed
Sput
n
launc ik
hed
DAR
P
Inter A starts
net
Mod
e
starte rn cellula
r
d
Mod
e
bega rn Intern
n
et
First
2
cellu .65G
lar
1837
1876
1947
1957
1962
1983
1989
2001
1844
FIGURE 1-1
1877
1906
1946
Communications milestones.
CHAPTER ONE
A
1
Handoffs between
cells sites during
travel from A to C
FIGURE 1-2
Cellular concepts.
Cellular radio got its name from the physical layout of a system in a pattern resembling a honeycomb figuratively. In
Figure 1-2, a vehicle traveling from point A to C, will initially
be communicating through cellsite 1. As it moves to position B,
communications is handed off to cell site 2 and similarly for
position C. Each cell site will operate on a different frequency
so that neighboring cells do not interfere with one another.
However, frequencies can be re-used if they are separate by
sufficient distance. This is referred to as the re-use pattern.
CHAPTER ONE
1
N
1
1
Source
A and B
Destination
A and B
2
N
FIGURE 1-3
can route the packets through multiple nodes and multiple networks successfully, even if the nodes or networks operate with
different standards.
The principles behind TCP/IP and the Internet are that
data can go many different paths. Figure 1-3 shows how two
different data sources, A and B, can travel along separate paths
1 and 2, through multiple nodes (n), and them come together
at the destination.
Concurrent to the development of this vast network of
supercomputers was the invention of the personal computer in
the early 1980s. Suddenly thousands of individuals had access
to a computer on their desktop or in their homes. This played
heavily in expanding the ARPANET although it remained
closely controlled until 1983, when the Defense Department
split off the MILNET. By this time many groups of people had
access to computers and through the simplicity of TCP/IP public-domain protocols, they could link to the network and essentially add another node. Thus the network of networks was
created which ultimately became known as the Internet.
By 1984 the National Science Foundation (NSF) jumped
into the fray, promoting technological advances for ARPANET.
Faster speeds were achieved through upgraded links and newer
supercomputers. Other government agencies joined in expanding the network and the cumulative knowledge base of information. A method of identifying users was devised to create
domains with unique identifiers such as com, gov, org, mil, edu,
10
CHAPTER ONE
11
12
CHAPTER ONE
13
14
CHAPTER ONE
FIGURE 1-4
FIGURE 1-5A
FIGURE 1-5B
15
16
CHAPTER ONE
FIGURE 1-6A
FIGURE 1-6B
Ericsson 2001.
17
Millions
1400
1200
1000
800
600
400
200
0
1999
2000
2001
2002
2003
FIGURE 1-7
Source: Compilation
enabled handsets by about 2003, see Figure 1-7 (600 million wireless Internet users: source Dataquest).
The only way to currently get Internet content into most of
todays Wireless Internet devices is to squeeze content as
shown in Figure 1-8.
TRENDS IN NEXT-GENERATION
MOBILE COMMUNICATIONS
Shortly after cellular first launched, third-party entrepreneurs
began offering modems for cellular data transmission. These
modems resemble the standard analog modems circa 1985.
They transmitted data at 300 baud, used a special cellular protocol called MNP-10, and an AT command set. MNP-10 made
these modems different from regular modems because they
had to be fault-tolerant to cellular hand-offs and the in-band
signaling tones used in analog cellular. One such modem was
18
CHAPTER ONE
INET
Content
FIGURE 1-8
Streaming
Video
Squeezing content.
19
TO
2G CELLULAR
In 1989, the cellular industry began the task of migrating cellular from an analog technology to one of several digital technologies, primarily to increase capacity in several cities that
were in danger of running out of voice capacity (as in New York
and Los Angeles). Data was not the overriding concern for the
standard bodies, and unfortunately, not every region adopted
the same migration path. This created a challenge to the network designers working to maintain uniformity of operation.
The European community chose collectively to migrate
their existing networks to Global System for Mobile
Communications (GSM) for their first-generation digital networks. Meanwhile North America chose to develop a digital
standard in two parts. The first was referred to as Interim
Standard-54 (IS-54) or North American Digital Cellular. This
standard, based on a version of Time Division Multiple Access
(TDMA), is similar to GSM but incompatible. IS-54 was
developed during the early 1990s and was soon followed with
IS-136. The difference between the two was that IS-54 continued to use analog control channels and used both analog
and digital traffic channels. IS-136 contained both digital and
analog channels for control and traffic. IS-54 was not widely
popular because it lacked clear advantages to the user. The
promise of greater battery life with IS-136 alone was inducement enough to win customers over even had it lacked other
advantages.
Having two different network architectures wasnt too bad
but waittheres a new show in town. Here comes a company
out of San Diego that no one has ever heard of before, and
they claim to have a better solution to digital cellular. The
company was Qualcomm and the solution proposed was Code
Division Multiple Access (CDMA). Today, Europe still has
GSM and North America has TDMA, CDMA, and a little
20
CHAPTER ONE
TO
2.5G AND 3G
The next step to higher data rates for each technology was
dubbed 2.5G and was to be closely followed by 3G. (The G
of course stands for generation.) 3G is not just a standard for
higher data rates: It is also meant to bring global standardization to cellular. Our choice of words here is very deliberate:
closely followed has been defined by some as within two
years of 2.5G, whereas others say that the two standards are
practically on top of one another. The simple fact is that it
costs a lot of time and money to upgrade a cellular system and
it may make more business sense to skip interim steps. Just as
IS-54 was quickly replaced by IS-136, carriers may find 2.5G
unpalatable financially. In other words, they may skip 2.5G and
go directly to 3G. That makes sense but what happens when
industry skips an interim solution or worse yet, adds another?
Do we add a 2.75G?
The truth is that in the interests of harmonizing all of the
different proposals for 3G, the cellular industry has skipped
some steps or in some cases, changed direction altogether. Like
21
22
FIGURE 1-9
Amps
3G roadmap.
IS-95
IS-54
GSM
PDC
IS-136
UWC-136
IS-95B
CDMA 2000
IS-136+
IS-136HS
Edge
UTRA (WCDMA)
GPRS
WCDMA
WCDMA
Frequency
Division
Duplexing
Multicarrier
Multicode
Time Division
Duplexing
23
24
CHAPTER ONE
TERMINAL TECHNOLOGIES
Early attempts at data transmission used either an analog
modem or CDPD, but these never really proved financially
rewarding to the carriers. The analog modems are very slow and
do not warrant further discussion. CDPD transmitted packet
data over an analog network. It was a niche market rather than
a mass market: Data rates were moderate (19.2 Kbps), phones
and modems were expensive, applications were very limited,
and most people never even knew that it existed. CDPD is still
in use as a slow-speed (by todays standards), Wireless Internet
connection on analog and dual-mode phones.
Newer equipment and protocols have resulted in many
wireless transmission schemes, some competitive (directly or
indirectly) and some complementary to the others. For limited
mobility applications, we have wireless local and personal area
networks (WLANs and PANs) with standards such as Home
RF, IEEE 802.11, or Bluetooth. Mobile data networks such as
Mobitex and Ardis, for public or private wide area networks are
used mostly for dispatch and service industries. Wireless PDAs
(Palm, Handspring, etc.) and Pocket PCs (Compaq, HP, etc.)
have their own data networks such as OmniSky or they use a
cellular phone with a modem. In the cellular networks themselves, SMS, WAP, I-Mode, and J2ME compete as data application platforms. GPRS competes with CDPD or other modem
technology on cellular phones. Yet, all of these technologies are
needed to make wireless mobility truly ubiquitous. (A more indepth description of the technical characteristics of these significant technologies follows in Chapter 2.)
With the proliferation of so many standards as shown in
Figure 1-10, there is an increasing need for convergence. Users
will demand that their Wireless Internet service be simple, fast
and uninterrupted. Many locations such as inside buildings are
very difficult for wireless carriers to provide adequate coverage.
One possible solution maybe the construction of public
WLANs. Wireless LANs are currently being built because the
technology is fast, proven, inexpensive and available. Wireless
Internet users who operate within a WLAN environment can
get better coverage than that promised by 3G. The bandwidth
100Mbit/s
25
Fixed LAN
Transmission rate
50Mbit/s
802.11a and
HiperLAN2
10Mbit/s
802.11b/WiFi
1Mbit/s
HomeRF
500kbit/s
UMTS
Bluetooth
Ricochet
GPRS
50kbit/s
GSM
Blackberry (US)
Stationary
Walking
speed
Driving
speed
FIGURE 1-10
INFRASTRUCTURE CHALLENGES
CIRCUIT-SWITCHED
VS. ALL-IP
26
CHAPTER ONE
circuit-switched connections and packet networks. Circuitswitched connections require a real time end-to-end session,
whether the transmission is a voice conversation or a data
transfer session. Whatever goes into one end always comes out
the other in the same order. It may be degraded by static or
noise, but its original order is maintained. If there is a loss of
voice or data, a repeat transmission can take place instantly to
guarantee the reliability of the connection.
Internet Protocol (IP) works entirely differently in the
transmission of data, whether using Voice-over-IP (VoIP) or a
binary data file. The data is broken up into small entities called
packets and each one carries a sequence number so that if they
arrive out of sequence, they can be reassembled. They can also
take different paths to the final destination, so there may be
delays in the arrival.
We do not wish to imply that packet is better than circuit
switched. The method selected depends on the application.
HSCSD allows wireless data to be transmitted at up to 38.4
Kbps or more over GSM networks by allocating multiple
time slots to a user. Although this is better than todays average data rate over most Wireless Internet access methods, it
will not really support true multimedia content. HSCSD,
however, is well suited for time-sensitive, real-time services
such as large file transfers. Packet is well suited to short file
transfers, messaging, or for longer file transfers where time
is not critical.
IP packet-switched networks operate as distributed networksafter all, that was the reason for the creation of the
Internet in the beginning. Distributed networks allow for the
decentralized control of key elements required of a network
such as applications, management, and billing. Packet networks are typically connectionless networks. The path that a
packet takes through the network can vary from packet to packet. Circuit-switched networks are connection oriented. A connection is set at the beginning of a session and remains until
the session ends. From a network point of view, connectionless
is a far more efficient use of the network resources because
resources are shared with all users dynamically. Circuit-
27
switched networks use distance, location, and time as yardsticks to measure the billing rate for sessions. In packet networks, distance, time, and location are not as important as the
number of packets transferred through the network.
Usage billing becomes far more important in packet networks. Circuit-switched networks are generally more proprietary, legacy-based systems, whereas packet networks are much
less complex. Service provisioning is far more difficult for circuit-switched networks.
SERVICE PROVISIONING
The whole concept of service provisioning for packet networks
and IP billing requires new technology to meet the needs of
service providers and customers. Initially, these new technologies augmented those of circuit-switched equipment and later
supplanted them. Telecommunications based on Internet
Protocol (IP) allow carriers to create grades of service and variable pricing to reflect real market conditions.
Currently, data from switches is formatted into billable
event detail records through a mediation function. The big difference between the circuit-switched and the IP network is
that IP billing must handle many more variables. Just as circuit-switched billing is derived from call detail records
(CDRs), IP-based billing is derived from Internet usage
records (IURs). However, IURs must contain far greater information. Future bills will include usage-based billing based on
IP information.
Customers can receive value-added information and services with real-time billing. Provisioning of services can take place
online for wireless users, satisfying the customer who wants
added services. It also benefits the service provider by adding
incremental revenue for a given customer and by providing
more accurate and timely billing.
To implement IP billing, however, techniques must be
developed to retrieve and analyze IP data. Because this holds
true whether its wired or wireless IP, many companies are
working on solutions to this problem today.
28
CHAPTER ONE
29
the evolution of wireless networks to 3G and packet networkingand thereafter to all-IP networksis leading to the addition of more core switching network elements. The end result is
a very complex core network, as depicted in Figure 1-11.
Next generation networks will be comprised of really three
types2, 2.5G, and 3G networks. Each network adds features
and therefore requires different interfaces. Compound this
with support for circuit switched and packet switched and you
have a major headache to connect.
This patchwork approach leads to duplicity of functional
blocks and unnecessary capital expense (CAPEX) and operation expense (OPEX) costs for the operator. Furthermore, the
service logic of voice and data and 2G and 3G remain disparate; this results in slow roll-out of new services. Separate
service logic for voice and data also makes it nearly impossible
to deliver hybrid multimedia services that require voicedata
service integration.
Incumbent core network vendors are not addressing adequately the migration to 3G networks because all their 2G
products (as well as some of their 3G products) are still based
on old, highly proprietary platforms and their approach to
adding new functionality is evolutionary rather than revolutionary.
New products are needed to simplify and streamline the network. A cohesive technology is required to build the next generation, packet-based, unified core switching platform that will
satisfy all the voice and data core switching needs of the wireless operator. This new network architecture will lead them to
profitability by significantly reducing OPEX and CAPEX and
enabling rapid deployment of unique new services.
SOFT SWITCHES AND MEDIA GATEWAYS. Soft switches are
poised to replace the call processing functions of the Class 4 and
5 switches previously used by the telecommunications industry.
This new breed of switch is smaller, less expensive, less power
consuming, more reliable, more flexible, and more efficient than
its predecessors. A soft switch can be placed in a closet, whereas the equivalent Class 5 switch functionality would fill a building to achieve the same capacity. The proliferation of control
30
FIGURE 1-11
IP
lu ps
AAL2/ATM
lu cs
RTP/IP
SIP
Gb/RP
SCP
3G SGSN
Multimedia
Call Server
2G SGSN
IP
3G GGSN IP
3G G-MSC
VHE
3G V-MSC
2G G-MSC
2G SGSN
2G V-MSC
UTRAN
RNC
IP-RAN
RNC
BSC
GSM/GPRS
Home
Environment
External
IP Network
PSTN
31
protocols makes soft switches the ideal solution for todays market. Because soft switches derive their name from the soft in
software, they can support many protocols at once.
By utilizing soft-switch technology along with a media gateway, a simplified network architecture could be developed (see
Figure 1-12). A single core switching product is needed to support both voice and data for 2G, 3G, and future all-IP networks.
The support for all three generations of networks is still a
requirement but the interfaces are much simpler.
The solution may be based on state-of-the art, high density, scalable, soft-switch technology and utilize a multimedia
session initiation protocol (SIP) session manager as the basic
building block for services. This architecture is all-IP ready
and fully compatible with 2G, 2.5G, and 3G voice and data
specifications. It could support present operator needs yet
allow for seamless evolution to future technologies.
A soft-switch/media gateway product developed by Spatial
Wireless in shown in Figure 1-13. This product is designed for
next generation marketspacket-based core switching for the
GSM, CDMA, UMTS and All-IP wireless markets. These elements enable unique voice/data converged services, help maintain service transparency across different wireless generations,
and can result in more than 50 percent savings in capital and
operational expenditures. The Spatials Portico product is an
overlay gateway product that supports the introduction of
voice, data and converged services.
As we have seen in this overview of the history of modern communications, competing standards and protocols both drive
and hinder the development of a truly ubiquitous Wireless
Internet. Chapter 2 explores the evolution of these technologies in greater depth.
32
FIGURE 1-12
ATM
lu cs, lu ps
IP
RANAP
SCP
GSM-A, GPRS Gb
RTP/IP
SIP
GSM BSSAP
A wireless solution.
IP-RAN
RNC
IP-RAN
RNC
BSC
GSM
Wireless
Media
Gateway
IP
Wireless
Soft
Switch
VHE
Megaco+
Home
Environment
TDM
External
IP Network
PSTN
33
C H A P T E R
T W O
DRIVING
TECHNOLOGIES:
COMPETING AND
COMPLEMENTARY
Access technologies
Application protocols and languages
IP network design and equipment
36
CHAPTER TWO
wireless LANs should not compete with cellular or PDA wireless access, rather they should complement or extend its usefulness. Some of the leading WLAN technologies also will be
discussed.
37
38
CHAPTER TWO
FIGURE 2-1A
CDPD MODEMS
Early cellular manufacturers and operators recognized the
need for data communications, and the first modems were very
similar to standard modems used in homes and offices.
FIGURE 2-1B
FIGURE 2-2A
39
However, cellular uses a valuable, shared commodityspectrum. (Fixed telephone lines or wires may be shared, but they
can always be increased in number if necessary.) CDPD was
created as a digital packet data service over an analog cellular
telephone: It uses the same analog channels as voice, but with
FIGURE 2-2B
40
CHAPTER TWO
different modulation applied to the air interface. Traffic channels not being used for voice calls may be used for CDPD calls.
CDPD was the first digital data application to use packet data
for cellular, and it is still very much in use today by carriers
such as AT&T Wireless Services.
CDPD is fully compatible with analog cellular and is colocated with AMPS systems. Therefore, the analog infrastructure,
such as frequency spectrum, cell sites, towers, and antennas,
can be shared. The CDPD network elements overlay parallel to
the analog infrastructure (see Figure 2-3). Analog voice or analog data using an AMPS modem or digital data using a CDPD
modem shares the same frequency spectrum. External modems
are most common for CDPD communications, typically existing
as PCMCIA cards for laptop computers, as accessories for PDA
devices, or as external modems for connection to an analog
phone. Some manufacturers actually include CDPD modems
into their cellular telephone. This makes a 2G digital phone
Internet ready because all TDMA and CDMA phones also
include AMPS analog compatibility, and CDPD is carried on
AMPS channels.
Two key design criteria were used to develop the CDPD
protocol. From its inception, it was designed to use TCP/IP, the
Internet protocol, making it transparent to Internet data. It was
also designed to overlay an AMPS network, taking advantage of
CDPD
Network
MD-IS
MDBS
Digital
Data
Internet
MBS
Voice
MTSO
FIGURE 2-3
PSTN
41
42
CHAPTER TWO
43
HLR
MSC
Voice
Mail
STP
AIR
Interface
MSC
Web
SMSC
E-mail
MSC
Other
ESMEs
STP
AIR
Interface
MSC
HLR
FIGURE 2-4
44
CHAPTER TWO
A second problem area is billing. Billing impacts the adoption of SMS because most consumers will be unsure of the
need for SMS and will not have any reference point for usage.
Billing can be in buckets of messages, per SMS, or free.
Most carriers will launch SMS with a period of free SMS messages before moving to the primary offer of a bucket of SMS
messages (200800) for $4 to 8 per month.
Speed and latency offer another potential problem area in
the United States. This was a problem in Europe six years ago,
but because SMS is a mature technology in Europe, latency
has been fine-tuned out. A typical SMS message is very fast
less than 5 seconds from send to receive. At times in the
United States, however, the SMS traffic is so heavy (holidays,
etc.) that the delay is measured in hours not seconds. SMS
quickly loses value as latency increases. Carriers control latency by adding processing power to the Short Message Service
Center (SMSC).
Every technology-based service such as cellular or the
Internet constantly evolves into something different and, hopefully, better. SMS is no different; it will migrate to newer versions such as Smart Messaging, Instant Messaging,
Multimedia Messaging, and Enhanced SMS (EMS or E-SMS).
SMS is characterized by out-of-band packet delivery and
low-bandwidth message transfer, which results in a highly efficient means for transmitting short bursts of data. Initial applications of SMS focused on eliminating alphanumeric pagers by
permitting two-way general-purpose messaging and notification services, primarily for voice mail. As technology and networks evolved, a variety of services has been introduced,
including email, fax, and paging integration, interactive banking, information services such as stock quotes, and integration
with Internet-based applications. Wireless data applications
include downloading of subscriber identity module (SIM)
cards for activation, debit, profile-editing purposes, wireless
points of sale (POS), and other field-service applications such
as automatic meter reading, remote sensing, and locationbased services. Additionally, integration with the Internet
spurred the development of Web-based messaging and other
45
46
CHAPTER TWO
Circuit-switched Path
PSTN
BTS
A
Interface
BTS
GMSC
TDM
TDM
BTS
BTS
BTS
MSC
BSC
Gb
Interface
FR
GGSN
Intranet/
Internet
IP
FIGURE 2-5
47
are shared with voice resourcesfor any given cell site, channels must be divided between voice users and GPRS users. If all
voice channels are in use and file transfers are taking place on
all packet-data channels, there is no more capacity for that particular cell site until someone stops using some of the resources.
Dynamic allocation of resources can only do so much.
APPLICATION PROGRAMMING
LANGUAGES AND PROTOCOLS
Many application protocols exist for wireless devices, such as
the most widely discussed WAP and i-Mode. However, other
application platforms have also achieved popular support, such
as J2ME and Symbian. The strange fact is that these do not
really compete with WAP or i-Mode; they can be integrated
into them. We discuss each protocol briefly here.
A WORD ABOUT MARK-UP LANGUAGES
Hypertext Markup Language (HTML) was not the first descriptive text language to be used. Computer programmers have long
used formatting codes, control codes or macros in software to
direct document formatting. By the 1960s, generic coding began
with descriptive tags rather than cryptic names. One example
would be heading instead of format-17. Many people were working on similar ideas during the 1960s including scientists at
IBM. A Generalized Markup Language (GML) was developed as
a means of allowing the text editing, formatting, and information
retrieval subsystems to share documents. GML introduced the
concept of a formally-defined document type with an explicit
nested element structure. Of course, GML was implemented for
the mainframe computers circa late 1960s. At that time IBM
was the worlds second largest publisher and they produced over
90 percent of their documents with GML. Over the next few
years, several new concepts were developed such as short references, concurrent document types, and link processes.
During the 1970s the American National Standards
Institute (ANSI) established a committee to develop a stan-
48
CHAPTER TWO
49
50
CHAPTER TWO
<?xml version="1.0"?>
<anotherhelloworld>
<speaker1>Say <quote>Hello World.</quote></speaker1>
<speaker2><quote>Hello World.</quote></speaker2>
<yawn/>
</anotherhelloworld>
FIGURE 2-6
51
CHAPTER TWO
Client
WAP Gateway
WML
WML
Script
etc.
FIGURE 2-7
Web Server
WML Encoder
WAP
HTTP
WML Script
Encoder
Protocol
Adapters
CGI
Scripts
etc.
Content
WML Decks
with WML Script
52
53
LIBRIS
Formed
Dec
1994
FIGURE 2-8
First
Commercial
First WAP Server and
Prototype
Browser
Mar
1995
Sept
1997
WAP milestones.
WAP
Forum
Created
WAP 1.0
Published
Jan
1998
May
1998
Microsoft
WAP
Joins
Forum
WAP
Surpasses
Forum 250 Members
May
1999
Dec
1999
54
CHAPTER TWO
55
OR C-HTML)
56
CHAPTER TWO
i-Mode is a clientserver protocol similar to WAP and illustrated in Figure 2-10. It allows users to navigate a series of
menus on their phone display in order to access Internet content on i-Mode sites.
One very important comment must be included here about
i-Mode. NTT DoCoMo created i-Mode as a proprietary protocol without international standards body cooperation. The
result is a tightly controlled application environment that NTT
DoCoMo designs and markets to their best advantage. It should
also be noted that DoCoMo is one of the first carriers to offer
usage-based billing for i-Mode. Because i-Mode is packetbased, they charge for the actual volume of data transmitted.
i-Mode phones in Japan operate on the Personal Digital
Cellular (PDC) network, which is very similar to the North
American TDMA network. Therefore, the data rate is limited
to 9.6 Kbps. In the future, when W-CDMA is launched in
Japan, much higher data rates will become available.
Although i-Mode can only be used on phones inside
Japan, NTT DoCoMo clearly intends to make it a world standard for Web browsing on wireless devices. Their recent
investment in AT&T Wireless, the agreement giving AT&T
access to i-Mode technology, and the purchase of an ISP
Verio Communicationsdemonstrates that they will be very
proactive in advancing i-Mode throughout the world. They
have also taken a 15 percent stake in Dutch KPN Mobile and
claimed 20 percent of Hutchison 3G.
DoCoMo Network
JAVA Program
Download
(HTTP)
JAVA
Application
Packet Net
i-Mode Server
i-Mode Compatible
JAVA Handset
JAVA
Application
FIGURE 2-10
Content
Provider
Sites
Internet
JAVA Program
Communication
(HTTP)
57
<html>
<head>
<META http-equiv="Content-Type" content="text/html; charset=utf-8">
<META name="CHTML" content="yes">
<META name="description" content="sample cHTML document">
<title>Sample cHTML document</title>
</head>
<body text="#000000">
<center>Links</center>
<hr>
Select an option<br>
<a href="message.chtml" accesskey="1">1</A>Messages<BR>
<a href="mail.chtml" accesskey="2">2</A>Mail<BR>
<hr>
<center>
<a href="admin@chtmldemo">email: admin@chtmldemo </a><br>
</center>
</body>
</html>
FIGURE 2-11
58
CHAPTER TWO
59
J2ME
Profile
J2ME Configuration
J2ME
Libraries
FIGURE 2-12
60
CHAPTER TWO
SYMBIAN
Symbian is a generic operating system developed for wireless
communications devices. Included is a set of common core
Application Programming Interfaces (APIs). Symbian makes a
distinction between the generic technology used in any
Wireless Information Device (WID) and the Graphical User
Interface (GUI) tailored for a particular design. A generic
design is the heart of Symbian. Technology is shared between
all reference designs.
The operating system includes a kernel; middleware for
communications, data management, and graphics; the lower
levels of the GUI framework; and application engines.
Products such Ericssons R380, Nokias 9210 Communicator,
and Psions Series 5mx were created with very little modification to the Symbian OS. Two reference designs were created,
one for information-centric products such as the Nokia
Communicator and another for voice-centric products such as
smart phones, mobile handsets with built-in browsers.
Symbians latest version includes support for GPRS and
WAP 1.2.1.; tablet or keyboard entry; and application development using C++, J2ME, WAP, or HTML. Support for protocols
such as TCP/IP, WAP, GSM, GPRS, Bluetooth, IrDA, or RS232 is built into the operating system. Many other features
such as security, font and text formatting, and a rich suite of
application engines are included.
Symbian uses a generic technology for the specific requirements of wireless devices. The requirements are tailored to use
device resources efficiently, and to be reliable and adaptable to
device needs. The architecture is illustrated in Figure 2-13.
Manufacturers may use Symbian reference designs and
operating system to reduce time-to-market for new product
development. Support for almost every conceivable wireless
device is included, and any application development platform
can be overlaid on the operating system, such as WAP or
J2ME.
61
Application Engines
Media Server
JAVA
Connectivity
Browsing
Messaging
Communications
Connectivity
Base (Tools)
Application Framework
Base (Runtime)
PC
WINCE
Windows CE is the modular real-time embedded operating system from Microsoft. It is a scaled-down, multitasking, multithreading look-alike of the popular Windows Operating System
designed for 32-bit devices or information appliances.
However, it does not require an Intel x86 family microprocessor. Several manufacturers, including Compaq, are currently
marketing products using this operating system. Although it
looks similar to Windows, it does not necessarily run all
Windows applications without modifications. When applications are run on devices other than PCs, some Windows applications will not run at all but this does not mean that it does
not serve as a useful tool.
The most important thing to remember about WinCE is
that the interfaces run a shell that is very similar to the standard Windows shell, with the same windowing look-and-feel
and a taskbar at the bottom that can be used to launch and
control applications. Unlike PDAs (like Palm), where a new
interface must be learned, WinCE has a familiar look and
feel. One major criticism, however, haunts WinCEthe large
amount of memory required.
62
CHAPTER TWO
63
64
CHAPTER TWO
HP
Wireless Internet solutions for HP products, PDAs, and Pocket
PCs are CDPD modems sold by third parties.
COMPAQ
Compaq Pocket PC products have the greatest number of
options for Wireless Internet of all PDAs and Pocket PCs.
Through third-party suppliers, a user may select PCMCIA
modems using CDPD, Ricochet, or CDMA networks.
PROPRIETARY NETWORKS
ARDIS (DATATAC)
Advanced Radio Data Information Services (Ardis) sometimes
referred to as the DataTAC network, is a two-way radio service
that is based on Motorolas RD-LAP technology. It was originally created and jointly owned by Motorola and IBM to serve
IBM field technicians. Coverage includes about 90 percent of
the urban business population in the U.S with more than 400
metropolitan areas in the United States, Puerto Rico, and the
Virgin Islands.
The network is based on packet-data transfer using data
rates as high as 19.2 Kbps. Some areas may not offer rates as
high as 19.2 Kbps if they are not enhanced with RD-LAP.
Frequencies and protocols are proprietary to Motorola.
Modulation at the physical layer is Gaussian Frequency Shift
Keying (GFSK).
RICOCHET
Ricochet is the only wireless packet data network today that
was built from the ground up to handle high speed data, up to
128 Kbps. Modems are available from third-party sources that
allow connection to laptop computers by at least one Pocket
PC. The network has about 41,000 customers in 15 markets as
65
of July 2001 but the parent company, Metricom, has filed for
Chapter 11 in bankruptcy court, so anything could happen to
Ricochet. On August 8, 2001, Metricom ceased operations of
Ricochet but the company is negotiating with third parties to
buy the Ricochet network. If a third party can buy the network
at a really good price, then Ricochet may continue in some
form. As of the publishing of this book, the outcome is
unknown. The high costs of building out a nationwide network
far exceeded the revenue, and current economic conditions
make financing very difficult.
The Ricochet radio network utilizes several elements
including microcell radios and wired access points. This provides true Wireless Internet access to informationregardless
of where it resides either on the Web or the intranet, in an
email message or a video clip.
In many ways the Ricochet network functions similarly to a
wireless Ethernet network. Acquisition is a necessary first step
for each radio on the network. The user radio, when first turned
on, must locate neighboring radios and Ricochet modems by
sending out synchronization packets. On acknowledgment from
neighboring radios, it must then get the authorization from the
name server. Only then does it join the network.
The network operates in two Industrial, Scientific, Medical
(ISM) bands of regulated, unlicensed spectrum, the 900 MHz
band and the 2.4 GHz band, in addition to the licensed 2.3
GHz Wireless Communications Systems (WCS) spectrum. The
physical layer uses Frequency Hopping Spread Spectrum
(FHSS) technology.
MOBITEX
OR
66
CHAPTER TWO
67
68
CHAPTER TWO
almost 2,500 members with nearly every major communications company represented.
Bluetooth computer and telecom consumer products will
appear in late 2001 or early 2002. Products in other industry
sectors will become available later in 2002.
The Bluetooth Specification addresses two ranges: short
(around 10 m) and medium (around 100 m). The radio link is
capable of voice or data transmission to a maximum capacity of
720 Kbps per channel. The radio spectrum used is in the unlicensed ISM band at 2.4 GHz. Modulation is Frequency
Hopping Spread Spectrum (FHSS).
Because Bluetooth encompasses many applications, there is
no single competitive technology. Infrared is a competitor in some
cases but it requires line of sight, whereas wireless LANs have
much greater range. Perhaps the closest competitor is Home RF
but it too is more a wireless LAN than a personal area network.
IEEE 802.11
Wireless Ethernet is IEEE 802.11b today, the IEEE standard
for wireless LANs. IEEE 802.11b operates in the ISM band at
11 Mbps. However, several new versions of the standard is
being developed, 802.11a, which supports data rates of up to
54 Mbps, and operates in the 5-GHz UNII (Unlicensed
National Information Infrastructure) band. Another version
802.11g is currently being developed which will support up to
20+ Mbps. Table 2-1 summarizes the different versions of
802.11 and includes HiperLAN2 for comparison. It should
also be noted that the IEEE is working on 802.11e, a standard
that spans home and business environments with QoS and
multimedia support while maintaining full backward compatibility with 802.11b and 802.11a. This version will support
voice and include a higher level of security than 802.11b. The
release date for the standard is unclear at this time.
The IEEE802.11b specification was finalized in 1999 and
quickly adopted by many companies. However, it was just as
quickly discovered that there are two problems: the security is
weak and the theoretical transmission speeds of 11 Mbps falls
shortreal world speed is only about 7 Mbps.
69
802.11
2.4 GHz
2.4 GHz
IEEE
All manufacturers
1997
Band
Data Rate
Standard Body
Proponents
Release Date
IEEE802.11 Versions
VERSION
TABLE 2-1
1999
All manufacturers
IEEE
11 Mbps
2.4 GHz
802.11B
IEEE
20+ Mbps
2.4 Ghz
802.11G
4Q2001 (maybe)
2002?
IEEE
54 Mbps
5 GHz
802.11A
2002
European manufacturers
ETSI
45 Mbps
5 GHz
HIPERLAN2
70
CHAPTER TWO
Application
Presentation
Session
Network
Operating
System
(NOS)
Transport
TCP
Network
IP
Data
Link
802.11
Physical
FIGURE 2-14
71
Frequency Hopping Spread Spectrum (FHSS). The frequency changes in a pseudo-random manner based on a predefined code.
Direct Sequence Spread Spectrum (DSSS). The data signal
is broken up into sequences and transmitted to the receiver,
which reassembles the sequences into the data signal.
72
CHAPTER TWO
MODULATION
CODE
BPSK
BPSK
QPSK
QPSK
16QAM
16QAM
64QAM
1/2
3/4
1/2
3/4
9/16
3/4
3/4
RATE
PHY
6
9
12
18
27
36
54
BIT RATE
Mbps
Mbps
Mbps
Mbps
Mbps
Mbps
Mbps
BYTES/OFDM
3.0
4.5
6.0
9.0
13.5
18.0
27.0
OFDM is particularly efficient in time-dispersive environments, i.e. where the radio signals are reflected from many points
such as in offices. The basic idea of OFDM is to transmit broadband, high data rate information by dividing the data into several interleaved, parallel bit streams, and let each bit stream
modulate a separate subcarrier. HiperLAN2 is time-division multiplexed and connection-oriented. It can be used for point-topoint or point-to-multipoint connections. A dedicated broadcast
channel is also included. Each connection can be assigned either
a simple relative priority level or a specific QoS in terms of bandwidth, delay, jitter, bit error rate, etc. Hiperlan2 uses an approach
for the Access Channel that differs from the OSI model but is
very similar to the IEEE 802-11 standard as seen in Figure 2-15.
73
Application
Presentation
Higher Layer Protocols
Session
Transport
Network
Landscape topography
Elevations that might cause shadows
Multi-path from signal-reflection surfaces
Signal loss through absorbing surfaces
Quality and placement of the wireless equipment
74
CHAPTER TWO
Number of stations
Interference
Etc.
AP
AP
MT
FIGURE 2-16
A HiperLAN2 network.
AP
AP
MT
75
76
CHAPTER TWO
INFRASTRUCTURE PROTOCOLS
AND APPLICATIONS
H.323
H.323 defines packet standards for terminal equipment and
services for multimedia communications over local and wide
area networks communicating with systems connected to
telephony networks such as ISDN. The initial version of this
standard came from the International Telecommunications
Union (ITU) in June 1996.
It defines communication over IP-based local area networks (LANs). A later version (v2), adopted in January 1998,
extended it over wide area use and general-purpose IP networks. Several subprotocols are included under H.323 relating
to call setup and signaling.
Four components for a multimedia communication system
as shown in Figure 2-17 include terminals, gateways, gatekeepers, and multipoint control units (MCU). Gateways and
gatekeepers are used in negotiation for PSTN connections,
whereas MCUs enable multiparty audio and videoconferences.
One drawback of H.323 is that it is somewhat complex and
inflexible. However, it is ISDN-based and relatively easy to
build applications across it. For many applications, H.323 is
H.323 Gateway
H.323
Endpoint
FIGURE 2-17
H.323
Endpoint
H.323 interface.
Protocol
Translation
and
Media
Transcoding
Non-H.323
Endpoint
Non-H.323
Endpoint
77
Media
Gateway
MGCP/MEGACO
Media
Gateway
FIGURE 2-18
Megaco interface.
Media
Gateway
78
CHAPTER TWO
HLR SCP
MSC
SIP Server
MAP
GAP
SIP
SIP
Client
SIP
to AT
Adaptor
MMG
GPRS
Class B
MT
SGSN
FIGURE 2-19
SIP interface.
SIP
Client
79
C H A P T E R
T H R E E
THE WIRELESS
INTERNET MARKET
82
CHAPTER THREE
PERCENTAGE OF PEOPLE
WITH INTERNET ACCESS
AT HOME OR WORK
(AGE 16+)
Country
Australia
Austria
Belgium
Denmark
Finland
France
Germany
Hong Kong
Ireland
Italy
Netherlands
New Zealand
Norway
Singapore
Spain
South Korea
Sweden
Switzerland
Taiwan
UK
ACCESS AT HOME
ACCESS AT WORK
Percent
50
42
39
58
49
22
35
58
46
34
56
51
53
56
20
57
61
43
50
46
Percent
30
27
23
38
37
17
22
23
25
14
28
31
38
21
11
17
41
31
19
26
Source: Nielsen/NetRatings
83
reach 7.74 million residential customers and 1.83 million business lines, for a total of 9.57 million DSL lines deployed by 2003.
High-speed connectivity is a commodity. As service providers
adapt their networks and strategies to meet the demand for
high-bandwidth services and applications at reduced cost, some
are attempting to capture high-bandwidth customers by offering
access to key information service providers (e.g., a specific
Internet service or digital video provider).
The customers key interest in high-bandwidth service
includes speeding up large file transfers, viewing high-resolution
images and enabling multimedia applications such as streaming
audio and video. The attempt of service providers to restrict
access to certain information content providers is likely to divert
attention from developing cost-effective high-speed networks
and create opportunities for other providers to offer access to
other information content providers.
Early adopters of broadband services are affluent. Of broadband users, 21 percent of these households have annual
incomes over $100,000. Broadband users are also twice as likely to be active online purchasers when compared to low-speed
users.* Additionally, most of these users also have cellular
phones, PDAs, and other handheld devices such as digital cameras and music players.
In a recent survey of online consumers, 80 percent stated
that they would pay approximately $25 per month for broadband access alone; 26 percent of those said that they would pay
$50 or $60 for a package of broadband-enabled applications
(including premium quality downloadable music or video files)
in addition to the cost of broadband access. Tables 3.2 and 3.3
show the number of users and market penetration of wireless
access worldwide.
As cellular technology connects phones, PDAs, and other
devices across networks, wide area networks (WAN), local area
networks (LAN) and the personal area network (PAN), we see
the emergence of IEEEs 802.11B as the de facto wireless
* Jupiter Communications Consumer Survey.
Jupiter Communications 1999.
84
CHAPTER THREE
NUMBER
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Source: refreq.com
MARKET
USA
Japan
China
Italy
South Korea
United Kingdom
Germany
France
Spain
Brazil
Taiwan
Turkey
Mexico
Australia
Netherlands
Canada
Sweden
South Africa
Portugal
Argentina
SUBSCRIBERS
PENETRATION (%)
93,650,000
57,950,000
46,500,000
31,118,321
27,500,000
25,517,000
25,000,000
21,082,000
16,370,150
14,438,963
11,452,541
9,234,976
8,694,500
7,824,560
7,139,000
7,000,000
5,353,000
5,300,000
4,804,671
4,683,522
34
43.36
3.7
52.2
53.3
42.9
30.2
35.5
41
8.3
51.6
14
8.6
40.8
44.9
22.4
60
12.2
47.8
12.7
TABLE 3-3
85
NUMBER COMPANY
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
AT&T Wireless
SBC Wireless
Vodafone Air touch
Bell Atlantic Mobile
GTE Wireless
Alltel
BellSouth Wireless
United States Cellular
Western Wireless
Century Tel
Dobson Cellular
Systems
Centennial
Communications
Price Communications
Rural Cellular Corp.
Trito Cellular Partners
Wireless One Network
Cellcom Cellular
Midwest Wireless
Plateau Wireless
Bluegrass Cellular
SUBSCRIBERS
MARKETS
TECHNOLOGY
105
167
150
75
141
266
93
139
96
44
67
TDMA
TDMA
TDMA/CDMA
CDMA
CDMA
CDMA
TDMA/CDMA
TDMA
CDMA
TDMA
TDMA/CDMA
526,000
31
TDMA/CDMA
450,000
260,000
210,000
180,000
165,000
160,000
70,000
66,000
16
20
20
6
8
12
5
3
TDMA
TDMA
TDMA
TDMA
TDMA
TDMA
TDMA
TDMA
11 million
10.3 million
9 million
8 million
5 million
5 million
4.9 million
2.6 million
840,000
708,000
661,000
86
CHAPTER THREE
200
Millions
175
150
125
100
2000
2001
2002
2003
2004
2005
Year
Source: Yankee Group
FIGURE 3-1
87
Middle East
& Africa
6%
North America
19%
Asia-Pacific
33%
North America
17%
Asia-Pacific
32%
Latin America
& Caribbean
9%
Europe
35%
Latin America
& Caribbean
13%
Europe
32%
2001
2004
Source: Ovum, 2000
FIGURE 3-2
120,000,000
69,209,321
33,785,661
24,134,421
11,032,753
7,557,148
5,283,055
3,508,944
2,069,441
1,230,855
340,213
681,825
20,000,000
16,009,461
40,000,000
44,042,992
60,000,000
55,312,293
80,000,000
86,047,003
100,000,000
122,603,529
109,478,031
0
1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001
Source: Cellular Telecommunications Industry Association
88
CHAPTER THREE
TABLE 3-4
DATE
USERS
PERCENT
OF POP.
SOURCE
December 2000
November 2000
October 2000
September 2000
August 2000
July 2000
June 2000
February 2000
January 2000
July 1999
May 1999
April 1999
April 1999
March 1999
January 1999
October 1998
August 1998
February 1998
November 1997
June 1997
April 1997
1995
164.4 million
153.84 million
149.6 million
148.03 million
146.9 million
143.96 million
134.2 million
123.6 million
122.8 million
106.3 million
101 million
95.8 million
92 million
83 million
79.4 million
73 million
79 million
62 million
56 million
51 million
40 45 million
18 million
59.86
53.8359.66
54.29
53.72
53.31
52.24
48.7
45.33
45.04
39.37
37.4
35.4
34
30.7
29.3
27.8
29
23.0
21.0
19.17
16.16
6.7
NielsenNetRatings
NielsenNetRatings
***NielsenNetRatings
***NielsenNetRatings
***NielsenNetRatings
***NielsenNetRatings
***NielsenNetRatings
*** NielsenNetRatings
*** NielsenNetRatings
*** NielsenNetRatings
*** NielsenNetRatings
*** NielsenNetRatings
* CommerceNet/Nielsen
* IntelliQuest
* IntelliQuest
* IntelliQuest
* CommerceNet/Nielsen
* IntelliQuest
* IntelliQuest
* IntelliQuest
* FIND/SVP
* CommerceNet/Nielsen
* Figures quoted are for adult population only (age 16 and over). They do not
include number of children online.
** Figures are for Internet users age 12 and older.
*** The Nielsen/NetRatings Internet universe is defined as all members (2 years
of age or older) of United States households that currently have access to the
Internet.
89
COMPUTER SALES
In 2000, according the IDC, approximately 101.4 million desktop PCs were shipped, generating $141 billion in revenues.
Many new consumers were attracted by low prices, higher
capabilities, and stylish colorful designs. During the same period, a total of 26 million notebook computers, valued at $57.7
billion, were shipped worldwide, based on IDC research.
Additionally, most PC vendors support at least one wireless protocol and many offer services to facilitate the transition to a
wireless computing environment. It is projected by many lead-
120
100
Millions
80
60
40
20
0
2000
2001
2002
2003
2004
2005
Year
Source: Investment Banking Reports
FIGURE 3-4 Estimated number of United States Wireless Internet users, using
SMS, WAP, email, or browsing at least once per month.
90
CHAPTER THREE
100
Percent
80
60
40
20
0
United States
Year
2000
Japan
Asia-Pacific
Western
Europe
Rest of
World
Total
Region
Source: ARC Group 2000
2001
2002
FIGURE 3-5
ing market research firms that within the next two to three
years, the desktop PC market will decline in favor of wirelessenabled portable PCs, handheld Pocket PCs, and other devices.
Wireless phones, PDAs, pagers, and modems are expected
to surpass PCs as the most popular Internet access devices.
Shipments of Wireless Internet devices will sustain doubleand triple-digit growth over the next few years. Mobile electronics sales may rise to $10.5 million in 2001, as consumers
continue to enjoy the ease with which they can access information and entertainment and stay in touch with friends and
family. Wireless phones maintain the largest share of that category, with sales forecast at $3.7 billion in 2001, a 16 percent
increase over 2000, according to the Consumer Electronics
Association (CEA). While the PDA market in the United States
continue to be strong, the Yankee Group projects 13 million to
be sold in 2001, growing to over 26 million in 2003.
Approximately 11 percent of PDAs had Internet access, while
91
92
CHAPTER THREE
93
25
Percent
20
15
10
5
0
2000
2001
2002
2003
2004
2005
2006
2007
Year
FIGURE 3-6
94
6.3
331
2.7
142
7.9
851
3.6
388
480
10,769
11,249
328,255
76,745
18.9
416,249
405,000
2000
Source: IDC, GartnerGroup, Company Reports, and U.S. Bancorp Piper Jaffray Estimates.
0
0
555
5.250
5,805
SmartPhones
Handheld Data/PDA
Total Smart Handheld Devices
655
4,334
4,989
237,649
51,894
17.9
295,348
289,543
1999
168,413
163,424
1998
11.5
1,646
5.3
759
1,418
14,314
15,732
232,970
190,612
45.0
439,314
423,582
2001E
TABLE 3-5
15.8
3,368
8.5
1,812
3,901
21,316
25,216
177,135
328,965
65.0
531,316
506,099
2002E
22.3
6,367
12.3
3,512
9,556
28,552
38,108
107,047
428,189
80.0
573,344
535,236
2003E
28.2
9,989
16.4
5,809
20,546
35,421
55,967
59,616
536,540
90.0
652,124
596,156
2004E
95
recognition technologies.) Personalization will be key for customer adoption of voice processing technology. Just as users
personalize their information on the Web, customizing their
voice portal will reduce lengthy set-up menu processes and permit users to quickly move to the desired content. Better delivery and performance and more dynamic content will contribute
to greater acceptance. According to Giga, voice recognition
services will grow at 70 percent annually, and revenue from
voice portal applications will grow to $45 billion by 2005.
96
CHAPTER THREE
97
98
CHAPTER THREE
THE
The Japanese market has given the world a glimpse of what the
Wireless Internet might look like, and it is a prime force in the
direction and momentum of the Wireless Internet market. NTT
DoCoMo is Japans leading mobile phone operator and largest
ISP and the worlds leader in Wireless Internet access. Since
starting its data service (called i-Mode) in February 1999, NTT
DoCoMo has seen its subscriber base grow to top 26 million as
of August 2001; it averages 40,000 to 50,000 new subscribers
per day. This spectacular growth is driving NTT to implement
3G technologies that will provide for greater capacity and allow
creation of new applications. Only about 15 percent of Japanese
consumers and business people access the Internet via PCs.
Thus to many of NTTs i-Mode customers, the i-Mode is synonymous with the Internet. According to NTT DoCoMo, the i
stands for interactive, Internet, and independence.
TABLE 3-6
3G
1S-95
PDC/PHS
ANALOG
TOTAL
Source: Lehman Brothers
MILLIONS)
0
1
48
6
55
MILLIONS)
99
Millions
20
15
10
5
0
February September January
1999
1999
2000
April
2000
September
2000
Year
March
2001
August
2001
i-Mode
EZ Web
J-Sky
Total
0
10
20
30
40
50
Million
Source: Mobile Media Japan.com
FIGURE 3-8
100
CHAPTER THREE
FIGURE 3-9
101
102
CHAPTER THREE
CONTENT TYPE
PERCENTAGE
Stored in Database
13.6
Transactions
20.7
13.2
Entertainment
52.5
EXAMPLES
Dictionary search, remote mail, restaurant
guides, recipes, telephone directories, city
information
Airline ticket and hotel reservations, credit
card bill inquiry, stock searching and trading, balance checking, money transfer, bill
payment
Business news, television listings, sports
news and weather forecasts
Network games, downloading avatars and
game characters, fortune telling, karaoke,
downloading ring tone melody and FM onair information.
Internet access of
unofficial sites
32%
103
E-mail access
36%
Internet access of
official sites
32%
104
CHAPTER THREE
FIGURE 3-11
105
and corporate systems. These benefits include reduced administrative overhead, increased efficiency, and a more rapid distribution of information throughout an organization.
For mobile professionals, a wireless device allows access to all
sales literature, provides answers to questions about unfamiliar
products or services, and permits check-in with the home office
for timely reports, expenses, and inventory status, among other
things. Enterprises are using wireless devices with an Internet
browser to provide remote access to corporate dataup-to-date
access to recent sales, current orders, proposals in progress, and
accounts receivables. The key to ensure the acceptance and
usability of these devices is to design them be customized for the
precise information needed by the user; thus, only relevant information is displayed rather than the wealth of information usually
displayed on management information systems.
IN A NUT SHELL
The potential market for the Wireless Internet, by all accounts,
will be a substantial and sustainable one as people embrace
what may be gained by anywhere, anytime connectivity to the
varied content found on todays Web.
106
CHAPTER THREE
C H A P T E R
F O U R
WIRELESS
INTERNET
APPLICATIONS,
SERVICES, AND
ACCESS-ENABLED
SOLUTIONS
107
Copyright 2002 by The McGraw-Hill Companies, Inc.
Click here for terms of use.
108
CHAPTER FOUR
WIRELESS INTERNET
109
companies, service providers, devices manufacturers, and content developers are focused on identifying and developing the
Killer App.
Its important to clarify the difference between wireless
Internet access or transport and wireless applications. Access
or transport is simply a wireless connection to the Internet that
allows users to access the same content and applications they
would from a fixed-wire connection. Wireless access adds value
to users of those laptop PCs that are capable of displaying and
running applications that have been designed for PCs. This
type of wireless access allows many new methods of conducting business in places that do not have wired connections available such as remote job sites, airports, and in cars.
Whereas mobility adds value to the Internet, not everyone
would consider a laptop to be the most convenient mobile
device to carry with them. Size and weight are important to
mobility and therefore smaller devices are more suited to
mobile usage although not as capable for running applications
designed for the large screens, abundant processing, and large
storage enjoyed by the typical personal computer.
Smaller devices such as smart cellular phones and PDAs
are much easier to carry and are small enough to fit into a
pocket or purse with little difficulty. Small size is great for
mobility but not so good when it comes to using and viewing
applications made for PCs. For the wireless customer, gateways
and middleware players are being developed to enable content
from traditional Web sites to be usable and viewable on wireless devices. Vertical applications are being developed that are
specific to users wireless needs. Many of these new information content services and applications are specifically tailored
to a fast-paced, mobile lifestyle that provides for accessibility
anytime, anywhere.
The Wireless Internet enables applications to fulfill the
needs or desires of end-users with a variety of smaller devices.
And although these devices have access or connectivity to the
Internet, its the applications that make the difference.
Consumers do not care or need to know how underlying
communication and Internet technology networks function or
110
CHAPTER FOUR
Personalized communications
News and information
Entertainment and lifestyle
Location-based services
Access and connectivity services
MOBILITY VALUE
As the Wireless Internet adds new value to staying connected,
short response times assure the validity of information.
Productivity is no longer confined to a specific location. There
are potentially hundreds of applications that will drive the
demand for Wireless Internet access, including multimedia
messaging, which will make it possible to combine conventional text messages with richer content typesphotographs,
images, voice clips, and eventually video clips. Two of the
fastest-growing industries in the worldentertainment and
mobile communicationsmay profit hugely as lifestyles
change, with people experiencing more and rapid bursts of free
time. Fast access to entertainment is increasingly appealing to
all sections of society and many wireless handsets and devices
WIRELESS INTERNET
111
are already used for entertainment. SMS services led the revolution in enjoying entertainment on the move, but we are now
on the edge of a new era, as the Wireless Internet begins to
offer even more sophisticated services.
Increasing demand for Wireless Internet access comes from
the convergence of Internet and cellular telephony. The
Internet or World Wide Web (WWW) has had a profound
impact on our lives, both on a personal and business level.
112
CHAPTER FOUR
PC applications moved from simple text menudriven programs to applications that use color, pointing devices, multimedia images, and concert quality soundand these are just
the tax preparation programs! Modern day computer games are
capable of experiences that are closely approach virtual reality.
Wireless Internet devices will follow the same path, albeit
in a condensed timeframe. The first nonvoice wireless applications will be those that use simple textdisplays have become
larger with better resolution to accommodate even this simple
text. The next stage will be very simple graphics not unlike the
simple graphics first experienced on PCsif you look too
closely, youll see the same jagged edges and low resolution. As
network data speeds, device processing power, memory, and
displays improve we will see wireless applications that can take
advantage of still images, sound files, and finally the 3G vision
of fully wireless multimedia.
This gradual evolution is important for the adoption of applications. In part this will allow consumers to experiment and
learn how best to utilize this new method of Internet access. Its
difficult for most consumers to assess the value of wireless applications that they have not yet experienced. In turn, this makes it
hard to determine exactly what applications users will be willing
to pay for and even harder to understand how much they will pay.
Even applications that enable relatively obvious services such as
weather alerts or driving directions cannot be fully appreciated
out of the context of a real world usage situation.
EMERGING DEVICES
A broad range of applications for the Wireless Internet will warrant a variety, of access devices. The incumbent handset manufacturersEricsson, Motorola, and Nokiahave the benefit of
years of experience in building consumer terminals, integrated
voice service, and have expertise in next-generation wireless air
interface standards. Many of todays products already offer
WAP microbrowsers and SMS. Competition will be intense
among the many manufacturers vying for market share, and this
will ultimately benefit consumers through lower prices.
WIRELESS INTERNET
FIGURE 4-1
113
114
CHAPTER FOUR
Basic wireless phone. The primary functions of basic wireless phones include voice calls, Caller ID, voice mail, short
messaging, basic address lists, and Web browsing. The units
have small displays.
WIRELESS INTERNET
FIGURE 4-2
115
MOBILE PORTALS
Now that devices are moving towards an operating system that
makes it easy to download and run applications designed for
small mobile devices, users need a point of entry to the Internet.
116
CHAPTER FOUR
WIRELESS INTERNET
117
118
CHAPTER FOUR
Screen size
Navigation
Text input
Billing
Interconnection
Roaming
WIRELESS INTERNET
FIGURE 4-3
119
PERSONALIZATION
Many of these applications and services are increasingly being
tailored to individual tastes. As people customize services to suit
their use of the Internet, its usefulness will increase considerably. The wireless device tends to be a personal device with a
120
CHAPTER FOUR
single primary user, unlike personal computers that are commonly shared among users. Because mobile devices are frequently used and almost always with the user, wireless operators
can exploit the wireless devices access to time- and locationcritical information. As these services, content, and applications
become more personalized and location based, users have richer, more rewarding, and more relevant experiences. This information will be based on the users own informationmy
news, my banking, my investment portfolioto make it
absolutely specific and relevant to the user.
Additionally, every user will be able to create his own content including video, animation, still images, and text and all
the information will be in digital, transferable form. User-generated content will be a very important portion of the multimedia Wireless Internet business model. The importance of
the Wireless Internet device as an instrument for information,
entertainment, and transactions will increase as physical
boundaries dissolve.
CONTENT DELIVERY
Content delivery involves the transport of information from a
source (content provider) to its destination (customer). The
customer usually selects to receive content (such as travel
directions or flight status information). The service provider
may charge a fee for access or may receive a percentage of the
fee paid by the recipient to the content provider (royalty fee).
Some of the more popular content providers include mapping
companies (for directions), music, flight status, weather information, and other real-time or near realtime information
sources. The actual information content is often provided
through an application service provider (ASP) and transferred
through an Internet portal (gateway). The ASP usually manages and updates the content, and the wireless provider provides the transport to the end customer.
WIRELESS INTERNET
121
PERSONALIZED COMMUNICATIONS
Personalized communications consist of applications and services that are based on access to and manipulation of the users personal data. This includes services such as personal information
management, calendar and scheduler management, email messaging, unified messaging, chat, and community participation.
Wireless Internet applications will add value to personalized communications by increasing a users ability to access
personal data while mobile. Weve all experienced situations
where some small piece of data isnt there when we need it. But
no matter how hard we wish we had not forgotten that contact
name, phone number, date, or account number, it still refuses
to magically appear. Wireless applications will enable users to
wirelessly retrieve data that may be typically stored in various
other digital systems. These applications will often be a substitute for another method of access but will add value by retrieving just enough data to get the task done.
Key drivers for personalized communication applications are:
Time sensitive data. Data that has a very short useful life
wait too long and youll miss out on some opportunity.
Security and privacy. Data that you might not want to carry a
hardcopy of for fear of losing itaccount numbers, passwords, and personal information that youd rather not carry
with you.
Access to others. Applications that allow users to contact and
receive messages from others regardless of the method used
by the senderemails, faxes, voice mail, instant messages,
electronic reminders, and other personal communication.
122
CHAPTER FOUR
WIRELESS INTERNET
123
IM allows the wireless user to send and receive text messages to any person logged into the IM system with either a
wireless device or PC. The online population of global IM
users is about 130 million, which increases the size and value
of the network.
Wireless IM requires the user to have the ability to connect
to an IM system. This connection can occur over a number
of different transports such as SMS, circuit-switched data, or
packet-based connections. Some of these methods require
the carrier to have or connect to an IM system that routes
messages between PCs and wireless devices and provides
presence information to users.
A continuous user interface. Text messaging with SMS can be
very useful for sending short messages back and forth but the
effort required to open and close the application when sending more than one or two messages to the same recipient in
a short time can be cumbersome. One way to improve the
SMS process is via a continuous user interface that can save
keystrokes and provide a better user experience. This simply
means that the screen scrolls the text as the two users send
each other messages. This eliminates the need to repeat the
process of opening, closing, and addressing messages to the
same person for the duration of the text discussion.
Presence information. The majority of the value of IM over
simple SMS lies in the ability to utilize presence information.
Presence information is simply the ability to know who is
present and able to chat and who is not present and
therefore not available. Availability is key to making instant
messaging instant. The instant comes largely from being
able to identify who is available to chat and not waste time in
sending messages to those who are not.
Have you ever sent or received an email that required
action right away? Getting a time-sensitive message such as
We are going to go get lunch, do you want to join us? offers
both sender and receiver little value if the message is not
received, and replied to or acted on, in short order.
Although, IM is currently only used for text messaging it
will evolve beyond text very quickly. Text is a form of data.
124
CHAPTER FOUR
WIRELESS INTERNET
125
FIGURE 4-4
126
CHAPTER FOUR
OR
SECURITY ACCESS
Whether you work in a large or small company or have a membership to a gym or country club, security access badges have
become part of our personal wardrobe. These access cards typically identify who we are and give us access to areas that are limited to authorized persons only. Wireless applications will soon
be able to store these same permissions and offer electronic
identification with an extra touch of security. Badges are typically passive devices that only need to be swiped or passed over a
reader. Security applications in wireless devices will have the
ability to require users to enter passwords to activate the access
ID. Wireless also enables lost access devices to be recovered easily. Lost wireless devices that are used for security or identification purposes may also have GPS location technology that
pinpoints the exact location of the lost or stolen device or simply
confirms that the user has not entered an area that is off-limits.
ELECTRONIC PHOTO ALBUM
A picture may be worth a thousand words, especially if youre
on the phone trying to describe something. Wireless applications will allow users to carry or access images that are stored
locally on the device or on a remote server. The number of pho-
WIRELESS INTERNET
127
FIGURE 4-5
Ericsson.
128
CHAPTER FOUR
WIRELESS INTERNET
129
130
CHAPTER FOUR
WIRELESS INTERNET
131
132
CHAPTER FOUR
average user with a dial-up modem. The market for digital distribution of music in 20022003 is estimated at approximately
$150 million. With 3G broadband wireless data, it will be possible to download entire music CDs in less than 2 minutes.*
The sale of compact discs (CDs) and tapes via online services is expected to grow to $2.6 billion (14 percent of total U.S.
music sales of $18.4 billion by 2003). Online shopping allows
customers to easily preview content or details of a product such
as tracks on music albums. In 1998, music industry revenue
topped $13.5 billion in the United States, with online sales
totaling $157 million, up 315 percent from 1997s figure of
$37 million. As 3G wireless networks and other broadband systems are deployed, consumers will shift their acquisition from
purchasing CDs or tapes to downloading their favorite music
content to their media player.
By 2000, more than half of the users on the Internet had listened to music audio on a personal computer (PC). Of these, 36
percent have downloadable music and 5 percent have transferred unauthorized (pirated) music files to their hard disk drive.
As an interim approach to music content delivery on the
Internet, companies are offering digitally compressed music in
MP3 form. In 2000, MP3.com launched subscription music
channels on the Internet. For a monthly fee of less than $10,
users have access to thousands of music tracks to listen to.
GAMBLING. Online gambling is the interactive process of
allowing customers to wager money or credits in return for
games that have standardized odds. Online gambling has the
potential to be one of the largest interactive services. In 2000,
the global gambling market was valued at over $900 billion. A
growing portion of the gambling industry is moving towards
online gambling. Customers with a credit card and an Internet
connection are able to gamble on casino games, lotteries, and
sports books (horse and dog racing, boxing, team sports betting, etc.) almost anywhere in the world.
Although there are some issues about the legality of gambling online, the majority of online gamblers are located in
* Jupiter Communications; The Recording Industry Association of America (RIAA).
WIRELESS INTERNET
FIGURE 4-6
133
countries with regulations favorable to online gambling companies. Many of these companies operate in places such as the
Caribbean, Europe, Australia, and South Africa. It is projected
that over $10 billion will be gambled online by 2002 as operators take advantage of the huge audience reach and cost savings of the Internet.*
NETWORKED GAMES. Since 1997, networked games have
become a big opportunity on the Internet. Networked games
allow users to play games against friends who are connected to
the Internet. Almost any computer game that can be played by
two or more people can be played online. It is estimated that
by 2002, 60 percent of children online (over 16 million) will be
playing games, and they will spend over $70 per year for game
services. Adult will spend $140 per year for an estimated total
of $622 million for online game services. Wireless high-bandwidth services allow for substantially improved game services
through streaming video and audio, and permit its players to
engage in games virtually from anywhere.
* Data monitor.
134
CHAPTER FOUR
WIRELESS INTERNET
135
* www.electricvillage.com.
136
CHAPTER FOUR
FIGURE 4-7
VIRTUAL TELEVISION STATIONS. Virtual television stations distribute digital video and audio through the Internet to groups of
viewers. With broadband digital video access, the Internet will
become a new avenue of distribution for broadcasters that hope
to target previously unreachable mobile audiences.
Since 1999, there has been growing public interest in interactive TV (iTV). This has been led by satellite and cable systems
deploying subscriber equipment and infrastructure capable of
delivering a variety of interactive services. Some of these early
interactive functions include an electronic program guide (EPG)
and parental control through channel-locking features. A type of
one-way datacasting on virtual television stations allows viewers to
choose from limited, primarily text-based, supplementary content.
Other virtual television features and functions may include
game or quiz show audience participation. These features and
functions all present new opportunities as well as challenges to
programmers, advertisers, and providers of interactive services
as they navigate through a maze of complex platform landscapes defined by a complicated mix of networks, set-top boxes,
and software. Its projected that 35 percent of U.S. households
(over 25 million homes) will use some form of interactive TV
services by the end of 2005.*
IMAGE AND VIDEO PRODUCTION. Images and video can be
captured in electronic form and transferred to other locations.
* Jupiter Communications.
WIRELESS INTERNET
FIGURE 4-8
137
138
CHAPTER FOUR
WIRELESS INTERNET
FIGURE 4-9
139
TARGETED ADVERTISING. Targeted advertising is the customizing and individual tracking of advertising to the specific
recipient of the advertisement. Wireless Internet systems can
customize, deliver, and track multimedia advertising to specific groups of individuals.
Advertising is traditionally associated with the promotion of
branded goods and services. Because of the intolerance issues
of users in the wireless environment such as paying for incoming calls and airtime privacy invasion, advertising should be
positioned differently with different associations. Advertising
over wireless should be linked to content, location, and e-commerce, which will enable advertising to be positioned as a useful service.
ENTERPRISE LOGISTICS. Wireless networks offer the ability to
track the position of mobile phones (within a limited distance)
and provide information services based on the determination of
the location. Navigation and tracking service are highly valued
by users in key market sectors such as truck dispatch management and public vehicle management (e.g., buses).
140
CHAPTER FOUR
WIRELESS INTERNET
141
FIGURE 4-10
142
CHAPTER FOUR
REMOTE CORPORATE NETWORK CONNECTIONS. Remote corporate network connections allow company employees to
access company networks and receive services (e.g., rapid file
transfer) as they would experience if they were located (working) at the corporation. The rise in virtual corporations has
resulted from increased worker productivity, reduced facilities
costs, and satisfaction of environmental and regulatory requirements for reduced number of commuters. It is estimated that
over 7 percent of all workers in the United States spend at least
some or all of their time as teleworkers. This growth in the
home-based work environment has been a major driver for
home and business network interconnection speed.
BUSINESS KIOSKS. Business kiosks are remote locations for
business retail centers. Business kiosks may be unmanned or
satellite offices that require connection to a head office or
stand-alone information centers that require periodic information updating.
The use of business kiosks allows companies to expand
their market territories without significant risk or capital
investment. By utilizing wireless data connectivity, kiosks can
be installed quickly and at low cost.
Public Internet Kiosks are a type of pay phone booth that contains a computer terminal that can access the Internet. For a nominal price, a customer can check email or browse the Internet.
Most public Internet kiosks are scattered throughout public places
such as airports, train stations, convention centers, hotels, office
building lobbies, and shopping malls. These public Internet kiosks
can be used as a media center for information services.
Internet kiosks can be multipurpose or adapted to satisfy
specific needs. They can be used as automated teller machines,
travel service providers, ticket centers, and to provide other
business services.
In 1998, there were approximately 10,000 kiosks in the
United States, and the number is expected to rise to more than
100,000 by 2002. The typical cost of a kiosk is $35,000 to
$55,000, in addition to monthly space rental fees.*
* Summit Report.
WIRELESS INTERNET
143
144
CHAPTER FOUR
digital assistant (PDA) that allows a field service representative to access various forms of media.
MANUFACTURING
Telecommunication systems have long been used in manufacturing processes to monitor and control production to ensure
quality. Manufacturing systems can benefit from wireless production monitoring and low-cost data communication systems.
Production monitoring is the process of using data devices
or sensors (e.g., video cameras and keypads) that transfer information via communications lines to keep records of physical
production. The Internet and other communication networks
are moving onto the factory floor to provide companies with an
inexpensive means to link workers and the machines they operate to remote repositories of information. Distant managers
can watch whats going on, literally, from wherever they are,
WIRELESS INTERNET
145
146
CHAPTER FOUR
WIRELESS INTERNET
147
148
CHAPTER FOUR
WIRELESS INTERNET
149
ernment agencies. It is the goal of many public education programs to provide the same education opportunity to all the
members of a society, regardless of the economic status of its
students or the demographic structure of a community.
The economics of traditional public education systems limit
the offering of specific courses to regions that have a sufficient
density of students. To ensure that each student can be offered
the same education opportunities, distance education can offer
more courses to each student. Distance education also allows
students to interact with other students with similar interests
and needs at remote locations. Distance learning applications
delivered through the Internet can provide access to standardized courses that provide equal education opportunities to
most students. Additional e-books will provide students the
ability to carry a single book.
By the end of 1998, approximately 89 percent of all public
secondary and 76 percent of elementary schools in the United
States were connected to the Internet. Since then, public schools
continue to make progress toward meeting the goal of connecting
every school to the Internet by the year 2000. (In 1994 only 35
percent of public schools in the United States were connected to
the Internet.) In addition to having every school connected to the
Information Superhighway, a second goal is to have every classroom, library, and media-lab connected to the Internet. Schools
are making great strides to achieve this; and in 1998, 51 percent
of instructional rooms in public schools were connected.*
Connection speed is one of the key determinants of the
extent to which schools make use of the Internet. In 1998,
higher speed connections using a dedicated line were used by
65 percent of public schools. Additionally, large schools with
Internet access are more likely to connect using broadband
access technology.
COLLEGE AND UNIVERSITY EDUCATION. Since the Internet
was pioneered at universities to facilitate information sharing,
its not surprising that an increasing number of them are cre* U.S. Department of Education; National Center for Education Statistics.
U.S. Department of Education.
150
CHAPTER FOUR
WIRELESS INTERNET
151
152
CHAPTER FOUR
FIGURE 4-12
C H A P T E R
F I V E
BILLING AND
SECURITY ISSUES
153
Copyright 2002 by The McGraw-Hill Companies, Inc.
Click here for terms of use.
154
CHAPTER FIVE
155
156
CHAPTER FIVE
their marketing efforts while others welcome official or unofficial affiliates that point to their site.
The effect of Metcalfes law in reverse reduces value for all
parties involved. The networks users lose the value of a larger
more complete network. The networks not only lose value individually but as a (now separate) group as well. Because of
Metcalfes law, the largest network always wins over smaller
networks even when the smaller network initially offers value
creating features or benefits. As the larger networks grow, the
value of the sheer number of reachable users, services and content ultimately favors the larger networks. Since the Internet is
the largest network of them all, it will not only eventually win
over smaller proprietary networks (wired or wireless) but the
wired internet and wireless internet will only benefit each other
as they join together into a common network.
Attempts to create walled gardens of content and services
for wireless Internet users have failed (and even been declared
illegal) in many European and Asian countries. Service
providers will only succeed in creating long-term value by
focusing on quality of services instead of limiting access to
other perhaps better services.
157
UNIVERSAL MESSAGING
HAVE IT YOUR WAY
The history of voice telephony has had little differentiation
local versus long distance, similar input and output devices
voice in, voice out. We spoke with our mouths and listened
with our ears. A louder handset for the hard of hearing, a tape
recorder for storing the data, and eventually the ability to
share voice with more than one person was as innovative as
it got (and this hampered by the fact that no one seems to like
being put on speakerphone).
158
CHAPTER FIVE
159
160
CHAPTER FIVE
THE
CASH REGISTER
Free
Flat rate (all you can eat)
Usage based (ala carte)
161
FREE. Someone else pays for what the users get. Maybe its
the content owners who forego payment in hopes of some
other future value, or sponsors might help defray costs via
advertising. This method is great for encouraging trials, but it
is difficult to sell that which had been free yesterday. Weve all
encountered free stuffremember those home cooked meals
as a kid? What do you think would have happened if mom
decided to start charging you after all these years? Can you
imagine your dad charging companies to advertise to you during dinner in an attempt to defray household expenses?
FLAT RATE ACCESS, ALL YOU CAN EAT OR BUCKET PLANS. These
plans offer either unlimited access or at least more access than
the service provider thinks you are likely to consume. The
advent of the bucket plan rocked the cellular industry by giving users a large enough bucket of voice minutes so that they
became less sensitive to the time spent on wireless calls.
Price is not dependent on how much is consumed. Light
users subsidize heavy users and everyone pays the same entry
fee. These plans are great for heavy users who worry about
going over budget and want predictable expenses. These pricing plans are bad for light or infrequent users who dont want
a periodic fee for less frequent usage.
These plans have worked well for voice in large part
because everyone understands how much they might usenot
everyone is sure of how much they will use new data services.
For this reason, flat rate plans can be bad for encouraging
a trial of new services when end users expect usage to be low.
Its hard to assess how often youll use new content or services
until you have tried them for a while. But who wants to pay for
the month upfront before you know? Difficulty in canceling
subscriptions adds to the barrier for new services. Flat rate or
bucket plans are great for encouraging the trial of new services when end users expect usage to be high or for frequent users
after they become familiar with typical usage and want to control costs.
ALA CARTE OVERTURNS THE BUFFET. Usage based billing isnt
only about volume but will increasingly be about quality, speed
162
CHAPTER FIVE
and privacy. Voice telephony has historically been incredibly consistent in terms of quality. Weve not really had the need to think
of what level of quality we desired when making a voice callthey
were all essentially the same. The future will offer many new
choices for voice and data quality as systems will be increasingly
varied, each with its own particular application and price points.
Users needs are very diverse and willingness to pay is widely varied. Similar versions of content are already billed differently in media other than the Internet: One might pay $75 to
attend a concert in person, $40 for a pay-per-view showing on
TV, $30 for a recorded videotape, $20 for the CD, or choose to
listen to the same songs on the radio for free.
Although no one would argue that the concert is likely the
best quality, not all users are able or willing to attend. They can
still find value in alternative methods of accessing an artists
content. The same will be true in the Wireless Internet world.
Some will be willing to pay for multimedia news clips that show
full-motion video highlights of the news, sports, and weather.
Others may opt for a less expensive voice and still-image version or a free simple text version.
163
164
CHAPTER FIVE
late at night so that she could avoid having any of her students
observe her buying beer and cigarettes: She protected her privacy by controlling her actions.
This attempt at privacy didnt render my friend anonymous; privacy and anonymity are often confused because their
purposes overlap considerably. Dictionary.com defines them as
follows:
165
DATA STORAGE
The next stage in the possible invasion of privacy is data storage.
Data storage is becoming cheaper and cheaper. This is a great
thing when consumers want to store personal content like digital pictures, tax records, and other accounting info. The bad
news is that data storage has become so cheap that there is little incentive to throw data away. The majority of these systems
are built to collect and aggregate data automatically, without
much emphasis on error checking or data correction.
Data, both correct and incorrect, can now live on forever
errors in credit reports, medical histories, purchases, and travel records can all be accessed long after you have forgotten or
even knew of them. Trails and histories of what actions took
place and what content was accessed or requested become
almost permanent. The digital world is unlike the physical
world in that it doesnt forget the past until told to erase it. In
the physical world one can be reasonably assured that eventually nobody will remember you ever visited that unique store
or alternative nightclub back in college. Now, however, there is
a digital trail back to those questionable Web sites that lives
practically forever. (Or until someone deletes it, which could
take even longer.)
DATA ANALYSIS AND PROFILING
Software is getting better and better at slicing and dicing and
turning data into information. Databases can help companies
build profiles of user behavior based on billions of statistically
analyzed data points. Data fusion is also a popular way of adding
value to data by combining two or more data sources. Your shopping history could be compared with your medical records to
reveal a statistical correlation between your rising weight and
your purchases of ice cream and snack foods. Processing the
records of others with similar histories could result in a profile
that companies could use against you. Imagine, while in line at
the checkout counter, you happen to get a wireless email from
your health insurance provider threatening to cancel your coverage unless you put the Ben & Jerrys back where you found it!
166
CHAPTER FIVE
The very fact that Wireless Internet use will create another
source of consumer data is troubling when we look at the
money that is going into creating this system. The cost of new
networks and services can be at least partially alleviated with
revenue gained from selling this personalized data to companies that are experts in data fusion and profiling and that specialize in processing and selling consumer information.
Wonder why more consumers havent revolted and refused
to participate or even understand what is happening to their
data? Weve been bought off with the convenience and savings
that these loyalty programs and electronic systems offer. Until
consumer awareness of the potential dangers increases most
will likely continue to sign away bits and pieces of personal data.
We believe it will take a series of high profile abuses of personal data before many consumers will trade off that grocery store
loyalty card 20 percent discount on soda and chips in exchange
for greater privacy.
PERSONALIZATION GOES BOTH WAYS
Personal computers that access the Web open the door to
intrusion, but the Wireless Internet will likely produce more
valuable data because most devices can be tied to a person and
not just a household or fixed work location. The fact that content destined for a wireless device is most often altered and filtered to conform to smaller screens and limited navigation
provides even more specific data than PC surfing would generate. A PC data trail may only show a visit to a Web directory
page that contains listings for entertainment; the wireless
device would likely go a level deeper and reveal that a user was
looking at listings for gambling entertainment. Location-based
services will also add another layer of very valuable informationthe history of exactly where you have been for how long.
Because technology and the data generated can be used for
legitimate purposes as well as abused, we will likely not see this
process of collection, storage, and analysis disappear. It may,
however, eventually come under the guidance of laws and regulation that limit the potential for abuse.
167
OF
EXPRESSION
168
CHAPTER FIVE
PROTECTING CONTENT
Not all the security focus is on protecting the user of the
Wireless Internet; plenty of activity is aimed at protecting the
content that users are accessing. Much of the content initially
available over the Wireless Internet has been that which is available on the fixed Internetfree but not always of great value.
Studies show that Wireless Internet users are not eager to
pay for the same content they can get for free on a PC. A large
opportunity does exist to deliver content that users would be
willing to pay for, but methods of securing this content are
needed. In a physical distribution world the methods of protection are clearpay for it and they let you leave the store
with it. What you do with it after that is typically up to you
(within reason).
DIGITAL RIGHTS MANAGEMENT
Digital Rights Management (DRM) focuses on methods of protecting content from theft and unauthorized distribution.
DRM gives digital content publishers the ability to securely distribute high-value content such as music, books, photos, and
videos in a manner that controls access and distribution. This
control is central to protecting the creators and publishers
ability to collect payments for their work.
The public has not only become used to the idea that anything found on the Internet is free but many have also shown
that they will disregard copyright protection if it is convenient
to do so. Software piracy has been an issue since the advent of
169
170
CHAPTER FIVE
171
A FINAL WORD
As you can see there are many issues that will impact the adoption of the Wireless Internet regardless of which protocol is
used or how cool the devices look. Some of these issues, such
as security and privacy, will be partially sorted out in the PC
world but mobility will add a layer of complexity that the Wired
Internet industry has not yet begun to tackle.
The dot.com era has certainly reminded us that no matter
how cool and interesting the technology, the talk will eventually turn to how to make it profitable. Content that has value
must be protected from unauthorized use and copying.
Mobility will challenge how pricing can be structured, bills presented, and revenue gathered in ways that do not inhibit trial
and adoption.
C H A P T E R
S I X
COMMUNICATION
PAST AND FUTURE
173
Copyright 2002 by The McGraw-Hill Companies, Inc.
Click here for terms of use.
174
CHAPTER SIX
175
INTO
Wireless service providers have traditionally owned and operated the entire wireless system. This system included elements
such as the radio transmission equipment, subscriber management systems, billing, and customer care and, of course, the
license to use a certain amount of wireless spectrum. The service provider created a brand (not always with a plan for their
brand, some had more of an accidental reputation than a
strategic branding effort) and ran the whole system of buying
spectrum, building a network and billing system, selling wireless handsets, signing up customers, and setting up customer
care department to answer the phones and solve customer
issues. Some service providers were better at various parts of
this process than others.
Several factors have made this process more difficult as the
industry matures.
Spectrum has always been and still is limited. The sheer size
and financial requirements needed to purchase spectrum in
todays world favor the larger entities.
Consumers that originally had two wireless carriers to choose
from (if they were lucky) are now faced with upwards of 35
options in the larger metropolitan markets.
176
CHAPTER SIX
177
Voicemail systems
Billing systemsprepaid or subscription
Customer care centers
WAP servers and gateways
Retail facilities
178
CHAPTER SIX
179
The mixing of voice and data will allow features and services that truly fit the users needs and preferences about convenience, detail, and environment.
180
CHAPTER SIX
181
182
CHAPTER SIX
FIGURE 6-1
Smart shirt.
The Technology
The System incorporates the Wearable Motherboard
Smart Shirt (the Smart Shirt or garment), a novel electrooptical garment funded by the Defense Advanced Research
Projects Agency (DARPA) and developed at the Georgia
Institute of Technology, and an advanced communications
and data management infrastructure. Together, this integrated solution provides an extremely versatile network for
sensing, monitoring, and information processing devices
that can enable a wide range of products.
The Smart Shirt permits the seamless acquisition and
disposition of sensory and environmental data to and from a
wearer; and the communications and data management
infrastructure permits the transmission of this data over
wired and wireless networks. The Smart Shirts
Interconnection Technology provides a flexible bus structure that allows a potentially enormous array of sensors,
whether physical, environmental, or biological, as well as
information processing devices, to be mounted or embedded
at any location. These flexible capabilities permit data to be
collected from the wearer in an unobtrusive fashion and
routed to and from the communications and data management network. By providing hands-free bi-directional data
transmission, data processing systems, and optimized wireless communications using an expedient array of protocols,
Sensatex offers a total solution that is virtually transparent,
but ubiquitously available to the end user.
The Products
By offering a customizable range of information processing
capabilities under mobile settings, wearable computing
technology finds applicability across the consumer reassurance, lifestyle enhancement, and healthcare monitoring
markets. A wide breadth of the population, from infants to
the elderly, can use devices such as the Smart Shirt System
to enjoy meaningful improvements in the quality of life.
REASSURANCE PRODUCTS
Infant/Toddler/Active Child Monitor
The Sensatex Child Monitor is a digital umbilical cord
that allows parents to keep track of active children. The initial products in this category will offer parents two forms of
functionalitycontinuous two-way voice communications
with children in the home environment and/or ubiquitous
communications with children, regardless of the parents
location. The next generation product of the Sensatex Child
Monitor, whether local or wide area, will provide the added
features of vital signs monitoring and GPS-based locator
services.
Geriatric Monitor
The Sensatex Geriatric Monitor provides reassurance to
seniors and their families by continuously monitoring vital
183
184
CHAPTER SIX
duced and wireless local area networks and Bluetooth technology proliferate, Sensatex will be able to facilitate the
deployment of the PAN using the Interconnection
Technology of its Smart Shirt and the unique features of its
communications and data management infrastructure. The
Systems unique advantage is its ability to interface with
devices both wirelessly and with wires, thus permitting a
total solution to generate optimal connectivity.
MEDICAL PRODUCTS
Infant Vital Signs Monitoring
The Smart Shirt System will support the unobtrusive collection of vital signs data (EKG, respiration rate) for the detection of various disorders in infants, such as apnea,
prematurity, respiratory synctial virus, gastroesophageal
reflux, and seizure disorders. The data collected off the
infants body is transmitted wirelessly to a processing location that will utilize analysis software provided by an existing infant monitor manufacturer.
Sleep Studies
Despite a vast number of U.S. adults with sleep disorders,
such as adult apnea, insomnia, and narcolepsy, only a small
fraction seek diagnosis due largely to the discomfort and
inconvenience of hospital-based testing. The Smart Shirt
System offers test subjects a comfortable and unobtrusive
means by which to have their vital signs monitored and
transmitted for the diagnosis of these disorders.
Hospital/Nursing Home Monitoring
Sensatex will partner with patient monitor manufacturers to
develop a Smart Shirt System that transmits vital signs data
either with or without wire to the vendors stationary or
portable monitoring unit(s). This includes retrofitting monitors already manufactured and sold by the vendor to hospitals, nursing homes, or skilled nursing facilities. By acting
as a single platform for all sensory components, the Shirt
185
186
CHAPTER SIX
187
FIGURE 6-2
188
CHAPTER SIX
ECONOMIC POWER
The Wireless Internet raises consumer power. By using the
Wireless Internet, people will become used to having as much
information as they need when making a significant buying
decision. Their information searching and digestion no longer
needs to be done at home: They will be able to access more
information outside the home, virtually anywhere, and at the
right time. For example, when buying a car, a user could have
all the latest information, including price quotes from competing dealers, when visiting a dealer for a test drive.
189
190
CHAPTER SIX
BUT
For devices that are too small or unable to provide the power
needed to operate a WLAN card there is a new technology in
the works called Bluetooth. Similar to WLAN technology,
Bluetooth is designed for smaller devices with lower power
consumption. This lower power means a shorter range of transmission; Blue tooth will initially be limited to approximately 30
feet. With potential throughput on par with WLAN, Bluetooth
will compete with WLAN for short range access for laptop PCs
and printers. Bluetooth will be more suitable for smaller
devices and operates on a peer-to-peer configuration that
establishes a piconet (a series of connected devices that pass
the data along to one another in a kind of fire brigade manner)
to extend the reach back to a network when available.
Bluetooth will be used more often in scenarios where data is to
be exchanged between two or more devices such as between
multiple PDAs or between a PDA, cell phone, and a printer.
CELLULAR THREAT
OR
BENEFIT?
191
tralized network management, subscriber identification, security, and roaming systems in place to manage this last portion
of the wireless transmission. WLANs could be configured to
cache frequently accessed content and reduce the data traffic
carried by the backbone of the system that would be using
licensed spectrum.
Other issues ill need to be overcome for WLAN technology
to peacefully exist with other systems that use the unlicensed
spectrum. Congestion is a real possibility as there is no limit to
the number of networks and traffic that could try to use the
frequency in a given area. Security is an issue that is growing
in importance as more and more users have a WLAN card and
can easily walk or drive within range of many corporate systems. Many of these systems have been installed with no
change to the equipments factory settings enabling anyone that
knows the common factory settings and passwords to gain
access to corporate networks. Interference will also be a challenge especially for companies such as Starbucks since other
devices such as Microwave ovens can generate frequencies
close enough to 2.4 GHz to disrupt the WLAN transmission
every time they heat up a muffin.
192
CHAPTER SIX
193
The poor cannot afford to buy the necessary equipment needed to be connected to the Internet.
The infrastructure of developing countries may be so poor
that a significant portion of the population is not able to connect even if equipment is available.
The poor may not be literate enough to make use of equipment and connectivity even when available.
Access vs. ownership. The assumption that users must purchase equipment to have access to the Internet must be challenged. In the New Economy the true economic benefit
comes from access to sources of knowledge and competence,
not from ownership of the access device.
A phenomenon is developing in several developing countries where the trend is for individuals with equipment and
access to create a business around providing access. Local
entrepreneurs in India (mostly women) are operating payper-use telephone services that provide traveling access to
remote and other underserved areas. With little more than a
mobile phone, these entrepreneurs have made access to the
telephone possible for a large number of urban poor and people in remote villages. Many are now adding fax and PC services to their portfolio of services.
Rational trade offs. While many of us would opt for direct ownership of a PC or cellular phone, trading currency for convenience, the poor make an equally logical trade-off by exchanging
personal convenience for low-cost, no-investment access.
194
CHAPTER SIX
This approach may also make sense for those who are able
to purchase, because technology seems to advance at a rate
that quickly makes equipment obsolete!
In an age of ever-changing PC features, individual ownership may not be the best choice after all.
The connectivity leapfrog. Many developing countries have
never had far-reaching telephony systems due in part to the
cost of infrastructure needed to cover sparse or difficult terrain. Without a legacy wireline system in place, users are
unable to access even simple communications. With infrastructure costs less than half that of a wireline system, wireless is becoming the telephony system of choice for many
regions that lack existing copper connections to homes and
businesses. The Wireless Internet will help overcome connectivity issues in countries that lack adequate physical
wiring.
Multimedia literacy. Its well known that the Internet started
as largely an English-language medium to the exclusion of
many languages, especially those that use a non-Arabic
alphabet. The tide is slowly turning and more Web sites are
publishing content in local languages.
The move towards multimedia will also help alleviate this
issue for those who are not able to read text but can communicate verbally and visually. Many cultures have unique
dialects that are difficult and costly to translate into text but
that can be published at lower cost in a voice format.
Multimedia will enable communication to take place in ways
that accommodate the needs of the user by integrating text,
audio, and video in ways that the individual user can utilize.
WIRELESS BRIDGES
THE
DIVIDE
A Wireless Internet can play an important role in transforming the digital divide into the digital dividend. The flexibility of
wireless infrastructure allows carriers to provide coverage in
difficult terrain as well as access in established buildings with
minimal labor and installation time. Equipment costs are
much less than for the PCs typically used to access the fixed
195
WIRELESS INTERNET
THIS TIME ITS PERSONAL!
Our personal information is increasingly found in digital formatpictures, letters, bills, receipts, videosdigital means its
easier to share not only content but the impact of content,
whether the content is informational, educational, entertaining, or emotional.
Internet users today can create messages that incorporate
many media types: emails can include attachments of sound,
picture, audio, and pure data files. But lets think about what
we would send and when we send it once we have the ability to
compose and send while mobile. In short, real-time distribution will result in an increase in the quality and frequency of
communication.
LIFE TURNS DIGITAL
We possess increasingly more personal digital contentdigital
photos and video clips, digital music clips, and even cherished
emails. (Admit ityouve saved more than one personal email
for no other reason that to read it over and over, you softie!)
The Wireless Internet will encourage the collection of a growing amount of personal digital content. Some of the newer
wireless devices have already announced plans for MP3 players, audio-recording capabilities, and built-in digital cameras.
We will soon have the tools to digitally capture and share
like never before. Just as the world was forever changed with
196
CHAPTER SIX
MULTIMEDIA MESSAGING
One of the Wireless Internet technologies on the near horizon
is Multimedia Messaging (MMS). MMS is an application that
uses a data call to a wireless device that delivers a message
capable of incorporating any of the following in an organized
and choreographed presentation:
197
Pictures
Data
Text
Audio
Video
Voice
Whereas SMS messaging typically uses a digital control channel, MMS will be one of the first applications that make use of the
carriers higher speed data capabilities available in 2.5 and 3G systems. MMS will take advantage of combinations of media to allow
users to communicate with more detail, emotion, and efficiency.
Its important to understand how wireless mobility adds value to
multimedia by allowing the timely exchange of information.
MMS will be used to communicate in ways that even a digital voice call cant achieve. Though many of us have tried to
explain the sights and sounds around us while on a simple
voice call we can agree that the effect is poor at best. Just as
SMS will be the first nonvoice communications most of us
encounter, MMS will be one of the first 3G communications
we use in a wireless fashion.
WIRELESS EFFICIENCY
As we mentioned earlier, humans have always sought to communicate efficiently. Who wants to endlessly repeat something
or have to deal with not being understood? The most successful persons throughout history have been those who communicated well on some level. Perhaps it wasnt through speechan
engineer might choose a technical drawing to entirely communicate an idea and avoid talking at all.
ITS ALL ABOUT EMOTION
We all remember the AT&T long distance ads on television that
encouraged us to reach out and touch someone. Despite
198
CHAPTER SIX
what AT&T might have charged back in the good old days of
the long distance monopoly, we must admit that they had figured out the most important driver of communication. They
realized that personal communication is largely an emotional
activity, and people will pay to share emotions. Now, we arent
saying that communication should make you cry, but communications can allow the kind of sharing that people will value.
NO, I DONT WANT
TO
199
THE
VOLUME
OF
COMMUNICATION
200
CHAPTER SIX
ciency, and emotion and to allow the person on the other end
to better understand you.
THE
In an age where rapid technology development produces concepts and innovations that disappear often as quickly as they
come its only natural to ask the questionWill the Wireless
Internet survive? We believe the Wireless Internet will eventually disappear.
It will be out of sight, but it will still exist. Not as the
wired or wireless Internet, but simply as the Internet or the
network. Access method and device will eventually become
irrelevant.
As the Wireless Internet evolves and embeds itself in the
society and culture of our modern world, the phrase Wireless
Internet will quietly go away. When is the last time you heard
someone refer to the electric light? Or the gasoline powered automobile? Or even indoor plumbing? The descriptors of how eventually fall away as society gets used to
assuming the obvious or irrelevant. What will matter in the
201
OVER
BANDWIDTH
APPENDIX A
SUGGESTED FURTHER READING
3G Wireless Demystified, Lawrence Harte, Richard Levine and
Roman Kikta, McGraw-Hill, 2001, ISBN: 0-07-136301-7.
Delivering xDSL, Lawrence Harte and Roman Kikta, McGraw-Hill,
2001, ISBN: 0-07-134837-9.
CDMA IS-95 for Cellular and PCS: Technology, Applications, and
Resource Guide, Lawrence Harte, Roman Kikta, and Daniel
McLaughlin, McGraw-Hill, 1999, ISBN: 0-07-027070-8.
Inside WAP Programming Applications with WML and WML Script
(With CD-ROM), Pekka Niskanen, Addison-Wesley Pub Co,
2000, ISBN: 0201725916.
Beginning WAP: Wireless Markup Language & Wireless Markup
Language Script, Soo Mee Foo, Ted Wugofski, Wei Meng Lee,
Foo Soo Mee, Karli Watson, Wrox Press Inc, 2000, ISBN:
1861004583.
WCDMA: Towards IP Mobility and Mobile Internet, Tero Ojanpera,
Ramjee Prasad, Artech House, 2001, ISBN: 1580531806.
Wireless Computing : A Managers Guide to Wireless Networking, Ira
Brodsky, John Wiley & Sons, 1997, ISBN: 0471286567.
Wireless Lan Systems (The Artech House Telecommunications
Library), A. Santamaria, F.J. Lopez-Hernandez, Asuncion
Santamarie, Artech House, 1994, ISBN: 0890066094.
Wireless Web: A Managers Guide, Frank P. Coyle, Addison-Wesley
Pub Co, 2001, ISBN: 0201722178.
Advanced Internet Programming, Sergei Dunaev, Charles River
Media, 2001, ISBN: 1584500603.
Bluetooth Demystified (McGraw-Hill Telecom), Nathan J. Muller,
McGraw-Hill Professional Publishing, 2000, ISBN: 0071363238.
Bluetooth Revealed: The Insiders Guide to an Open Specification for
Global Wireless Communications, Brent A. Miller, Chatschik
203
Copyright 2002 by The McGraw-Hill Companies, Inc.
Click here for terms of use.
204
APPENDIX A
APPENDIX B
WIRELESS NEWS/OPINION
Unstrung
www.unstrung.com
Red Herring Wireless Watch
www.wired.com/news/wireless
Unwired News
www.redherring.com
About Telecom
www.telecom.about.com
Wireless Newsfactor
www.refreq.com/industrylinks.htm
3G Newsroom.com
www.3GNewsroom.com
205
Copyright 2002 by The McGraw-Hill Companies, Inc.
Click here for terms of use.
206
APPENDIX B
Wireless Review
www.wirelessreview.com
Wireless Internet Magazine
www.wirelessinternetmagazine.com/
Broadband Wireless News
www.shorecliffcommunications.com/magazine/index.asp
EMAIL NEWSLETTERS
Unstrung
www.unstrung.com/index.php3
CTIA Daily News
www.wow-com/news
WIRELESS DEVICES
AllNetDevices
www.allnetdevices.com
PDABuzz
www.pdabuzz.com
Thinkmobile.com
www.thinkmobile.com
WIRELESS ADVERTISING
Wireless Advertising Association
www.iab.net/waa
APPENDIX B
Strategy Analytics
www.strategyanalytics.com
Cahners In-Stat
www.instat.com
Yankee Group
www.yankeegroup.com
Forrester Research
www.forrester.com
Jupiter Wireless
www.jxwireless.com
INDUSTRY LINKS
Refreq.com
www.refreq.com/industrylinks.htm
Group 3G
www.3Gportal.com
3G.IP
www.3GIP.org
3GSM World Congress 2002
www.3gsmworldcongress.com
Mobile Applications Initiative
www.mobileapplicationsinitiative.com
The Road to 3G
www.zdnet.co.uk/news/specials/2000/08/road_2_3g/
EricssonIntroduction to 3G
www.ericsson.com/3G/
Third Generation Partnership Project (3GPP)
www.3gpp.org/
EdgeMatrix
www.edgematrix.com/
CEO Mobile
www.ceomobile.com/
207
208
APPENDIX B
eMobileNet
www.emobinet.com/
Wireless in a Nutshell
www.wirelessinanutshell.com/
Oracle Mobile
www.oraclemobile.com/
Industry Statistics
www.cellular.co.za/stats/stats-main.htm
The Telecom Corridor
www.telecomcorridor.com/tc/index.htm
Total Telecom
www.totaltele.com/
Java Mobiles
www.javamobiles.com/
wireless.internet.com
www.wireless.internet.com/
MobileGPRS
www.mobilegprs.com/
internet.com
www.internet.com/sections/wireless.html
Carriers World
www.carriersworld.com/
Corporate Wireless Group
www.goam.corporatewireless.com/wireindex.htm
TIA B2B Glossary
www.tiab2b.com/glossary/
WAP SITES
2 Thumbs WAP.com
www.2thumbswap.com
[WAP] Resource Kit
www.macromediatraining.net/wap/
APPENDIX B
Eazywap
www.eazywap.com/
Nokia WAP Developer Forum
www.forum.nokia.com/main/
Gelon
www.gelon.net/
Jumbuck
www.jumbuck.com/
The WAP Forum
www.wapforum.org/
The WAP Trap
www.freeprotocols.org/wapTrap/
WAP ForumW3C Cooperation White Paper
www.w3.org/TR/NOTE-WAP
WAP.com
www.wap.com
WAPCardz.com
www.wapcardz.com/
WAPinside News
www.wapinside.com/
WAPsight
www.wapsight.com/
Wapsody
www.alphaworks.ibm.com/aw.nsf/techmain/
WAPuSeek
www.wapuseek.com/
IEC WAP Tutorial
www.iec.org/online/tutorials/wap/index.html
GSM World WAP Tutorial
www.gsmworld.com/technology/wap.html
Speedy Tomato
www.speedytomato.co.uk/
WebCab.de
www.webcab.de/
209
210
APPENDIX B
WMLScript.com
www.wmlscript.com/
WOAOP.com
www.woaop.com/
SOFT SWITCHES
The SIP Center.com
www.sipcenter.com/
Softswitch Consortium
www.softswitch.org
SIP Forum
www.sipforum.org/
INDUSTRY ASSOCIATIONS
Softswitch Consortium
www.softswitch.org
Bluetooth
www.bluetooth.com
Canadian Wireless Telecommunications Association
www.cwta.ca
GSM Association
www.gsmworld.com
International Mobile Telecommunications Association
www.imta.org
Mobile and Portable Radio Research Group
www.mprg.ee.vt.edu
Mobile Data Association
www.mda-mobiledata.org
Personal Communications Industry Association
www.pcia.com
APPENDIX B
211
WIRELESS LANS
IEEE 802.1Q VLAN support for FreeBSD
www.euitt.upm.es/~pjlobo/fbsdvlan.html
Short Tutorial on Wireless LANs and IEEE 802.11
www.computer.org/students/looking/summer97/ieee802.htm
Wireless Ethernet Compatibility Alliance
www.wi-fi.org
802.16 Tutorial
www.ieee802.org/16/tutorial/index.html
GLOSSARY
2G
214
GLOSSARY
ASP Application Service Provider. A company that hosts software applications on its own servers within its own facilities.
ATM Asynchronous Transfer Mode. A digital transmission system
using 53-byte packets. ATM may be used for LANs and WANs.
Bandwidth Information-carrying capacity of a communication channel. Analog bandwidth is the range of signal frequencies that can be transmitted by a communication
channel or network.
BER Bit Error Rate. The number of coding violations detected in a unit of time, usually one second. BER is calculated
with this formula: BERerror bits received/total bits sent.
BG Border Gateway. A gate way between the PLMN supporting GPRS and an external inter-PLMN backbone network used to interconnect with other PLMNs also
supporting GPRS.
BGP Border Gateway Protocol. A routing protocol that is
used to span autonomous systems on the Internet.
Bps Bits per second. Also Kbps or kilo bits per second and
Mbps or mega bits per second.
BSC Base Station Controller. The computer controlling a
base station the radio equipment.
BSSAP Base Station System Application Part. An interface for
procedures between the MSC and the BSS that require
interpretation and processing of information related to single calls and resource management, and messages between
the MSC and MS which are transparent to the BSC. These
messages are handled with SS7 messaging.
BTS Base Transceiver Station. Radio portion of a base station.
CAPEX Capital expense. Expenses that are amortized over
time such as major equipment purchases.
Cascading Style Sheets or CSS Cascading style sheets
establish style rules that tell a browser how to present a document. One CSS can define the style for an entire Web site.
CCK Complementary Code Keying. A modulation method
used in IEEE802.11b to achieve higher data rates and less
susceptible to multi-path interference.
GLOSSARY
215
CDMA Code Division Multiple Access. A method of spreadspectrum communications where all users share the same
spectrum at the same time by assigning codes to each user.
This offers inherent encryption to the signals.
CDR Call Detail Record. An information system that records
and reports on telephone calls.
CDPD Cellular Digital Packet Data. A digital method of
sending data over an analog cellular network.
C-HTML Compact HTML. A language used to code content
in wireless devices. It is used by the popular i-Mode system. i-Mode is NTT DoCoMos Internet connection service for mobile phones and is widely used in Japan.
Compact HTML is similar to HTML 1.0 and competes
with WML.
Circuit Switching Basic switching process whereby a circuit
between two users is opened on demand and maintained
for their exclusive use for the duration of the transmission.
DARPA Defense Advanced Research Projects Agency.
DHCP Dynamic Host Configuration Protocol. Software that
automatically assigns IP addresses to client stations logging
onto a TCP/IP network.
DNS Domain Name System. Name resolution software that
lets users locate computers on a UNIX network or the
Internet (TCP/IP network) by domain name.
DSL Digital Subscriber Line. A high-speed digital line for
high-speed data access. There are several different versions
of DSL including ADSL and HDSL. A DSL is also one
channel of an ISDN service.
DSLAM Digital Subscriber Line Access Multiplexer. A central office device for ADSL service that intermixes voice
traffic and DSL traffic onto a customers DSL line.
DSSS Direct Sequence Spread Spectrum. The data signal is
broken up into sequences and transmitted to the receiver,
which reassembles the sequences into the data signal.
DTD Document Type Definition. A language that describes
the contents of an SGML document.
216
GLOSSARY
GLOSSARY
217
218
GLOSSARY
HTTP HyperText Transfer Protocol. The set of rules for applications exchanging files (text, graphic images, sound, video,
and other multimedia files) on the Internet.
HTTP or s-HTTPS Secure Hypertext Transfer Protocol. An
extension of HTTP for authentication and encryption
between a Web server and browser.
i-Mode A version of compact HTML utilized by NTT DoCoMo.
IM Instant Messaging. Conferencing using the keypad or keyboard over the Internet or a wireless device between two or
more people that requires all parties be online at the same
time.
IP Internet Protocol. An implementation of the network layer
of the protocol, which contains a network address and is used
to route a message to a different network or subnetwork.
IR Infrared. An invisible band of radiation at the lower end of
the electromagnetic spectrum commonly used as a wireless
communications medium between two devices.
ISDN Integrated Services Digital Network. A digital subscriber service offering either 144 Kbps, suitable for home
or SOHO, or 1.544 Mbps, suitable for enterprise markets.
ISM Industrial, Scientific and Medical Application Band. In
the 900 MHz and 2.4 GHz bands. Frequencies vary slightly between the U.S. and Europe.
ISO International Standards Institute.
ISP Internet Service Provider. A company that primarily
offers Internet access and services to consumers.
Iu Interface between Radio Network Controller and the
SGSN.
IUR Internet Usage Record.
J2ME Java Version 2 Mobile Edition. A compact version of
Suns Java technology targeted for embedded consumer
electronics.
JavaScript or JScript A scripting language technology used
in common Web browsers as a client-side technology and
also as a server-side integration tool.
GLOSSARY
219
220
GLOSSARY
NMT Nordic Mobile Telephone System. An early cellular system in Scandinavia and Europe.
NSF National Science Foundation.
OA&M Operations, administration, and management.
OFDM Orthogonal Frequency Division Multiplex. A method
of digital modulation in which a signal is split into several
narrowband channels at different frequencies.
OPEX Operation expense. The expenses of daily operations.
OSI Seven-Layer Model A standard architecture for data
communications. Layers define hardware and software
required for multivendor information processing equipment to be mutually compatible. The seven layers from lowest to highest are: Physical, Link, Network, Transport,
Session, Presentation, and Application.
OSS Operations Support System. A support system for
deploying new IP-based services (VPN, QoS, VoIP) which
enables rapid service provisioning and service level agreement management.
PCU Packet control unit.
Packet Switching or PS An efficient method for breaking
down and handling high-volume traffic in a network. A transmission technique that segments and routes information into
discrete units. Packet switching allows for efficient sharing of
network resources because packets from different sources
can all be sent over the same channel in the same bitstream.
PDA Personal Digital Assistant. A hand-held device such as
the Palm Pilot.
PDC Personal Digital Cellular. A Japanese standard very similar to TDMA in the U.S.
PDN Packet Data Network. An IP network for packet data.
PLMN Public Land Mobile Network. Generic name for all
mobile wireless networks that use earth base stations rather
than satellites; the mobile equivalent of the PSTN
PSPDN Packet Switched Public Data Network. A public
packet data network such as the Internet.
GLOSSARY
221
PSTN Public Switched Telephone Network. The public telephone circuit switched network.
PVC Permanent virtual circuit. A point-to-point connection
that is established ahead of time.
QoS Quality of service. The ability to define a level of performance and priorities in a data communications system.
RADIUS Remote Authentication Dial-In User Service.
RAN Radio Access Network. The radio access network provides
the basic transmission, radio control, and management functions needed for the mobile subscriber to access the resources
of the core network and the end-user services network.
RFC Request for Comment. A mechanism for development of
Internet procedures and specifications; RFCs create a
standard without the formal ratification process (such as
an ANSI standard).
RLP Radio Link Protocol. A handshaking protocol for handling lost data in wireless transmissions.
RNC Radio Network Controller. The intelligence of an RAN.
SCP Service Control Point. A node in an SS7 telephone network that provides an interface to databases, which may
reside within the SCP computer or in other computers.
SGML Standardized General Mark-up Language. An ISO
standard for defining the format in a text document.
SGSN Serving GPRS Support Node. The node is responsible
for handling packet data to and from a mobile device.
SIP Session Initiation Protocol. An Application layer control
protocol that can establish, modify, and terminate multimedia sessions or calls.
SLA Service-level agreement. A contract between the
provider and the user that specifies the level of service that
is expected during its term.
SMS Short Message Service. A messaging service supported
by many mobile phones that allows short text messages,
typically in the range of 120 characters, to be sent between
mobile devices.
222
GLOSSARY
GLOSSARY
223
224
GLOSSARY
INDEX
Note: Boldface numbers indicate illustrations; italic t indicates a table.
access, 121
access cards, 126
access points, 189
access technologies, 35
access versus applications, 108110
access-enabled solutions, 107152
Active Server Pages (ASP), 48
Adobe GoLive, 58
Advanced Mobile Phone Service
(AMPS), 5, 7, 18
modems, 4041
advertising, targeted, 139
airtime billing, 12
Alcatel, 28
American National Standards
Institute (ANSI), 47
amplitude modulation (AM), 2
analog signals, 3, 7, 17, 24, 37
anonymity vs. privacy, 163164
AOL, 89
Application Programming Interfaces
(APIs), 60
application protocols, 35
application service provider (ASP),
120
applications, services, accessenabled solutions, 107152
Arbitron, broadband survey, 81
Ardis, 24, 63, 64
ARPANET, 8, 9, 10
Asynchronous Transfer Mode
(ATM), 73, 77
AT command set, 17
AT&T, 89
AT&T Bell Laboratories, 5
AT&T Wireless Services, 53, 56
athletic monitors, 184
audio, 83
authentication, 72
bandwidth, 4, 14, 83, 201
banning sites, 155156
Base Station Controller (BSC), 46
batteries, 19
baud rates, 7
Bell Telephone Company, 2
Bell, Alexander G., 2
billing schemes, 12, 27, 153171,
176, 177
Short Message Service (SMS), 44
biometric identification, 163
Blackberry, 6263, 115, 119, 119
blocking sites, 155156
Bluetooth, 24, 60, 6768, 75, 188191
bookmarks, 180
branding online, 160, 176, 201
Branson, Richard, 178
broadband, 8185, 143
broadcast communications, 2, 86
browsers, 48
bucket plans, 161
bursty transmissions, 73
business market for wireless, 104105,
140141
C++, 60
calendaring applications, 125, 125
call detail records (CDRs), 27
call waiting, interactive, 179
Caller ID, 28
cameras, 127, 127, 127
capital expense (CAPEX), 29
Cascading Style Sheets (CSS), 48
Casio, 115
CB radio, 153
CD ROM, 129
cells, in cellular system, 6, 6, 95
cellular carriers, 85t
cellular communications, 56, 6, 12,
17, 3637, 950103, 190191
cellular data modems (See also
modems), 3747
cellular data transmission, 1723
Cellular Digital Packet Data (CDPD),
1819, 20, 24, 35, 37, 55, 64, 66
General Packet Radio Service
(GPRS) and, 4547
modems using, 3841
225
226
INDEX
INDEX
Ethernet, 65, 67, 154
European Telecommunications
Standard Institute (ETSI), 51, 71
European wireless markets, 95103
event notification services, 130
Excite, 93
Extensible HTML (XHTML), 5051,
54, 58
Extensible Markup Language (XML),
4950, 51, 54
fair-use laws, 170
fiber optics, 4
field service applications, 143144
file sharing, 10
filtered access, 14, 128
Finland and wireless access success,
9798
Flash, 196
flat rate access plans, 161
4G, 180
free content, 159161
freedom of expression, 167168
Frequency Hopping Spread Spectrum
(FSSS), 65, 68, 71
frequency modulation (FM), 3, 7
future of wireless, 200201
gambling applications, 132133
games, wireless, 133134
Gateway GPRS Support Node
(GGSN), 46
gateways, 109, 120
H.323, 76
media, 2931
General Magic, 93
General Motors, 92
General Packet Radio Service (GPRS),
21, 24, 35, 36, 4547, 46, 60
Base Station Controller (BSC), 46
Gateway GPRS Support Node
(GGSN), 46
Serving GPRS Support Node
(SGSN), 46
Generalized Markup Language, 47
generations of technology, 2023
geriatric monitors, 183184
GGSN, 28
Glenayre, 63
Global Positioning Services (GPS), 7,
11, 92, 181
Global System for Mobile
Communications (GSM), 1920,
21, 23, 26, 36, 60, 98
227
228
INDEX
INDEX
Motorola, 23, 52, 53, 64, 75, 112, 115
movie rentals, wireless, 134135
MP player/phone (Samsung), 133
MP3, 132, 187, 195
MTV, 196
multicasting, 79
multimedia, 112, 194
Multimedia Messaging (MMS), 44,
110, 196197
multipoint control units (MCU),
H.323, 76
Multiprotocol Label Switching
(MPLS), 77
music and wireless, 131132
National Science Foundation (NSF), 9
Nav Talk, cellular phone with GPS, 139
NetMeeting, 141
Netscape Navigator, 48
Network Communications Protocol
(NCP), 8
network design, 35
New Economy, 192195
news and information services, 128130
newspapers, virtual, 128129
Nextel, 23, 89, 92, 157
nodes, 9
noise, 7
Nokia, 28, 52, 53, 58, 60, 9798, 112,
141
Nordic Mobile Telephone (NMT), 5
Nortel, 28
notification services, 130
NTT DoCoMo, 21, 5558, 98103
OmniSky, 24, 63, 66, 89
1xEV, 21, 42
xRTT, 21, 23, 42
OnStar, 92
open systems, 157
OpenWave, 58
operating systems, 113
operational expense (OPEX), 29
Orthogonal Frequency Digital
Multiplexing (OFDM), 71, 7273
229
radio, 2, 3
radio frequency (RF), 75
radio, virtual, 135, 136
RAM Mobile Data, 6566,
Rand Corporation, 8
random access memory (RAM), 6
RDLAP, 64
230
INDEX
INDEX
General Packet Radio Service
(GPRS) and, 4547
modems, 40, 41, 42
Short Message Service and, 4345
Short messaging service (SMS) and,
118
WAP and, 55
time-sensitive data, 121, 128
Total Access Communications System
(TACS), 5
toys, interactive, 137138
traffic channel modems, 37, 4142
training courses, 150151
transatlantic cable, 3
transistors, 3
Transmission Control Protocol (TCP),
89
transoceanic cables, 4
travel related wireless applications, 131
TV phone (Samsung), 137
2G (Second Generation) wireless
technology, 1923, 29, 31, 40, 95,
108, 196
2.5G (Second and a Half Generation)
wireless technology, 2023, 29,
31, 41, 108, 196
universal messaging, 157159
Universal Mobile Telephone Service
(UMTS), 23
Unlicensed National Information
Infrastructure (UNII), 68
Unwired Planet, 53
usage-based billing, 12, 161162
User Agents, 52
user-aware access, 180187
user interfaces, 14
vacuum tubes, 2
value-added services, 27
value of network, Metcalfes law and,
154156
vending machines, 91, 98, 126
Verio Communications, 56
Verizon, 89
vertical applications, 109
video, 83, 134137
video-based training (VBT), 147
video conferencing, 141
video phone (Nokia), 141
Virgin Mobile, 178
virtual newspapers and magazines,
128129
virtual private networks (VPNs), 72
231