, ,

Techniques for Surviving the Mobile Data Explosion

Specificaties
Paperback, 224 blz. | Engels
John Wiley & Sons | e druk, 2014
ISBN13: 9781118290576
Rubricering
John Wiley & Sons e druk, 2014 9781118290576
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book provides an overview of technologies to maximize the quality of user experience for mobile, data–centric applications. Chapters cover techniques mobile network operators can use to maximize the effectiveness of congested networks, techniques that mobile application developers can use to minimize the impact of congested networks on user experience, and techniques that websites and data center operators can use to support a growing number of mobile users. With no technical jargon and a practical approach, this book offers a useful resource for a wide range of mobile network developers and managers.

Specificaties

ISBN13:9781118290576
Taal:Engels
Bindwijze:paperback
Aantal pagina's:224

Inhoudsopgave

PREFACE xiii
<p>ABOUT THE AUTHORS xix</p>
<p>I INTRODUCTION AND GENERAL OBSERVATIONS 1</p>
<p>1 TECHNOLOGIES SUPPORTING MOBILE DATA 3</p>
<p>1.1 Introduction / 3</p>
<p>1.2 Computer Communication Networks / 5</p>
<p>1.3 IP Networks / 9</p>
<p>1.4 Cellular Data Networks / 12</p>
<p>1.5 Mobile Applications / 14</p>
<p>2 MOBILE DATA ECOSYSTEM 17</p>
<p>2.1 Introduction / 17</p>
<p>2.2 Mobile Data Ecosystem / 17</p>
<p>2.3 Mobile Data Growth / 22</p>
<p>2.4 Where is the Bottleneck? / 23</p>
<p>2.5 Impact of Mobile Data Growth on the Ecosystem / 25</p>
<p>3 AN OVERVIEW OF TECHNIQUES FOR BANDWIDTH OPTIMIZATION 29</p>
<p>3.1 Introduction / 29</p>
<p>3.2 Network Model / 30</p>
<p>3.3 Object Caching / 32</p>
<p>3.4 Object Compression / 34</p>
<p>3.5 Packet Compression / 35</p>
<p>3.6 Flow Sharing / 37</p>
<p>3.7 Content Transformation / 40</p>
<p>3.8 Just–in–Time Transmission / 41</p>
<p>3.9 Rate Control / 42</p>
<p>3.10 Service Differentiation / 43</p>
<p>4 AN OVERVIEW OF TECHNIQUES FOR COST REDUCTION 45</p>
<p>4.1 Introduction / 45</p>
<p>4.2 Infrastructure Sharing / 47</p>
<p>4.3 Virtualization / 48</p>
<p>4.4 Consolidation / 49</p>
<p>4.5 IT Usage in Networks / 52</p>
<p>II TECHNIQUES FOR MOBILE NETWORK OPERATORS 55</p>
<p>5 BANDWIDTH OPTIMIZATION AND COST REDUCTION IN THE RADIO ACCESS NETWORK 57</p>
<p>5.1 Introduction / 57</p>
<p>5.2 Upgrading the RAN / 58</p>
<p>5.3 Leveraging Additional Bandwidth / 65</p>
<p>5.4 Bandwidth Management / 68</p>
<p>5.5 Nontechnical Approaches / 72</p>
<p>6 BANDWIDTH OPTIMIZATION AND COST REDUCTION IN BACKHAUL AND CORE NETWORKS 75</p>
<p>6.1 Overview of Backhaul and Core Networks / 75</p>
<p>6.2 Technology Upgrade / 79</p>
<p>6.3 Traffic Offload / 80</p>
<p>6.4 Compression / 80</p>
<p>6.5 Transformation / 81</p>
<p>6.6 Caching / 83</p>
<p>6.7 Consolidation in Core Networks / 87</p>
<p>6.8 Network Function Virtualization / 88</p>
<p>6.9 Cost Reduction of the Supporting Infrastructure / 90</p>
<p>7 CONSUMER–ORIENTED DATA MONETIZATION SERVICES 91</p>
<p>7.1 Mobile Network Operator Differentiators for Consumer Services / 92</p>
<p>7.2 Single Sign–on Service / 93</p>
<p>7.3 Privacy Service / 98</p>
<p>7.4 Content Customization Services / 101</p>
<p>7.5 Location–Based Services / 103</p>
<p>7.6 Phone–Based Commerce / 106</p>
<p>7.7 Other Services / 107</p>
<p>8 ENTERPRISE–ORIENTED DATA MONETIZATION SERVICES 109</p>
<p>8.1 Model for Mobile Network Operator Services to the Enterprise / 110</p>
<p>8.2 Mobile Network Operator Differentiators for Enterprise Services / 111</p>
<p>8.3 Caching and Content Distribution / 114</p>
<p>8.4 Mobile Transformation / 115</p>
<p>8.5 Fog Computing / 116</p>
<p>8.6 Location–Based Services / 118</p>
<p>8.7 Secure Hypervisor Services / 120</p>
<p>9 APPLICATION SERVICE PROVIDER–ORIENTED DATA MONETIZATION SERVICES 123</p>
<p>9.1 Mobile Network Operator Differentiators for Application Service Providers / 124</p>
<p>9.2 Caching and Content Distribution / 126</p>
<p>9.3 Fog Computing / 127</p>
<p>9.4 Information Aggregation / 129</p>
<p>9.5 Information Augmentation / 130</p>
<p>9.6 Historical Information–Based Planning / 131</p>
<p>III TECHNIQUES FOR ENTERPRISES AND APPLICATION DEVELOPERS 135</p>
<p>10 AN INTRODUCTION TO MOBILE APPLICATIONS 137</p>
<p>10.1 Anatomy of Mobile Applications / 138</p>
<p>10.2 Types of Mobile Applications / 139</p>
<p>10.3 Developing for Multiple Platforms / 141</p>
<p>10.4 Operating System Version Management / 143</p>
<p>10.5 Limited Resources / 144</p>
<p>10.6 General Application Development Considerations / 145</p>
<p>11 POWER EFFICIENCY FOR MOBILE APPLICATIONS 147</p>
<p>11.1 Model for Power Consumption / 148</p>
<p>11.2 Duty Cycling / 150</p>
<p>11.3 Power Mode Management / 151</p>
<p>11.4 Communication and Computation Clustering / 151</p>
<p>11.5 Efficient Resource Usage / 153</p>
<p>11.6 Best Practices for Application Power Efficiency / 154</p>
<p>12 BANDWIDTH EFFICIENCY FOR MOBILE APPLICATIONS 159</p>
<p>12.1 Preloading / 160</p>
<p>12.2 Communication Clustering / 160</p>
<p>12.3 Context–Aware Communication / 161</p>
<p>12.4 Disconnected Operation / 162</p>
<p>12.5 Caching / 163</p>
<p>12.6 Compression / 163</p>
<p>12.7 Control Traffic Implications / 164</p>
<p>12.8 Best Practices for Bandwidth Efficiency / 165</p>
<p>13 MOBILE DATA ISSUES FOR THE ENTERPRISE 171</p>
<p>13.1 Mobile–Related Issues for the Enterprise / 172</p>
<p>13.2 Security Issues / 173</p>
<p>13.3 Backward Compatibility / 180</p>
<p>13.4 Infrastructure Issues / 182</p>
<p>14 RELATED TOPICS 185</p>
<p>14.1 Machine–to–Machine Communications / 185</p>
<p>14.2 Internet of Things / 186</p>
<p>14.3 Participatory Sensing / 187</p>
<p>14.4 Mobile Transformation of Business / 188</p>
<p>14.5 Software–Defined Networks / 189</p>
<p>14.6 Mobile First Philosophy / 190</p>
<p>14.7 Network Analytics / 191</p>
<p>14.8 Conclusions / 192</p>
<p>REFERENCES 193</p>
<p>INDEX 199</p>

Rubrieken

    Personen

      Trefwoorden

        Techniques for Surviving the Mobile Data Explosion