IGI Global Selected Readings On Telecommunication And Networking Sep 2008 ISBN 1605660949 pdf

  Selected Readings on Telecommunications and Networking Jairo Gutierrez University of Auckland, New Zealand

  I N FORM AT I ON SCI EN CE REFEREN CE Director of Editorial Content: Kristin Klinger Managing Development Editor: Kristin M. Roth Senior Managing Editor: Jennifer Neidig Managing Editor: Jamie Snavely Assistant Managing Editor: Carole Coulson Typesetter: Lindsay Bergman Cover Design: Lisa Tosheff Printed at: Yurchak Printing Inc.

  Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-global.com Web site: http://www.igi-global.com and in the United Kingdom by Information Science Reference (an imprint of IGI Global)

  3 Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 0609 Web site: http://www.eurospanbookstore.com

  

Copyright © 2009 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by

any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

  Library of Congress Cataloging-in-Publication Data Selected readings on telecommunications and networking / Jairo Gutierrez, editor. p. cm. Includes bibliographical references and index.

Summary: "This book presents quality articles focused on key issues concerning the planning, design, maintenance, and management of

telecommunications and networking technologies"--Provided by publisher.

  ISBN 978-1-60566-094-3 (hard cover) -- ISBN 978-1-60566-095-0 (ebook)

  1. Wireless communication systems. 2. Information networks. I. Gutiérrez, Jairo, 1960- TK5103.2.S45 2009 621.382--dc22 2008019468 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of

the publisher.

  

If a library purchased a print copy of this publication, please go to http://www.igi-global.com/agreement for information on activating

the library's complimentary electronic access to this publication.

  Table of Contents Prologue

  ............................................................................................................................................. xix

  

Section I

Fundamental Concepts and Theories

  Chapter I A Brief Overview of Wireless Systems and Standards ........................................................................... 1 Sundar G. Sankaran, Atheros Communications, USA Chapter II Propagating the Ideal: The Mobile Communication Paradox ................................................................. 8 Imar de Vries, Utrecht University, The Netherlands Chapter III Teaching and Learning Wi-Fi Networking Fundamentals Using Limited Resources ......................... 22 Wilson Siringoringo, Auckland University of Technology, New Zealand Nurul I. Sarkar, Auckland University of Technology, New Zealand Chapter IV Mobile Advertising: A European Perspective ...................................................................................... 41 Ecole Nationale des Ponts et Chaussées, France Tawfik Jelassi, Albrecht Enders, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany

Section II

Development and Design Methodologies

Chapter V Developing a Telecommunication Operation Support System (OSS): The Impact of a Change

  in Network Technology ......................................................................................................................... 54

  James G. Williams, University of Pittsburgh, USA Kai A. Olsen, Molde College and University of Bergen, Norway

  Chapter VI A Component-Based Data Management and Knowledge Discovery Framework for Aviation Studies ................................................................................................................................................... 74 M. Brian Blake, Georgetown University, USA & Center for Advanced Aviation System Development, The MITRE Corporation, USA Lisa Singh, Georgetown University, USA Andrew B. Williams, Spelman College, USA Wendell Norman, Center for Advanced Aviation System Development, The MITRE Corporation, USA Amy L. Silvan, Georgetown University, USA Chapter VII Waleli: Bringing Wireless Opportunities to Life .................................................................................. 87 Paul Kirwan, Nikos, University of Twente, The Netherlands Peter van der Sijde, Nikos, University of Twente, The Netherlands Aard Groen, Nikos, University of Twente, The Netherlands Chapter VIII Designing a Resilient and High Performance Network ...................................................................... 105 Abid Al Ajeeli, University of Bahrain, Bahrain Yousif Al-Bastaki, University of Bahrain, Bahrain Chapter IX Collaboration Challenges in Community Telecommunication Networks .......................................... 120 Sylvie Albert, Laurentian University, Canada Rolland LeBrasseur, Laurentian University, Canada Chapter X A Generic Framework for Bluetooth Promoted Multimedia on Demand (BlueProMoD) ................. 142 Panayotis Fouliras, University of Macedonia, Greece Nikolaos Samaras, University of Macedonia, Greece

Section III

Tools and Technologies

Chapter XI Using Mobile Phones and PDAs in Ad Hoc Audience Response Systems ........................................ 157 Matt Jones, University of Waikato, New Zealand Gary Marsden, University of Cape Town, South Africa Dominic Gruijters, University of Cape Town, South Africa

  Chapter XII An Evaluation of U.S. City Government Wireless Networks for Mobile Internet Access ................. 169 Ben Coaker, Whiting-Turner Contracting Company, USA Candace Deans, University of Richmond, USA Chapter XIII Information-Theoretic Methods for Prediction in the Wireless and Wired Web ................................ 182 Dimitrios Katsaros, Aristotle University of Thessaloniki, Greece Chapter XIV Empirical Prediction of Computer-Network Evolution ...................................................................... 198 Sami J. Habib, Kuwait University, Kuwait

Section IV

Utilization and Application

Chapter XV New Computer Network Paradigms and Virtual Organizations ......................................................... 214 Guillermo Agustín Ibáñez Fernández, Universidad Carlos III, Spain Chapter XVI Software Agent Technology for Supporting Ad Hoc Virtual Enterprises ........................................... 224 Jarogniew Rykowski, The Poznan University of Economics, Poland Chapter XVII Wireless Networks Based on WiFi and Related Technologies ........................................................... 250 Rajendra V. Boppana, University of Texas at San Antonio, USA Suresh Chalasani, University of Wisconsin-Parkside, USA Chapter XVIII An Immune Systems Approach for Classifying Mobile Phone Usage ............................................... 266 Hanny Yulius Limanto, Nanyang Technological University, Singapore Tay Joc Cing, Nanyang Technological University, Singapore Andrew Watkins, Mississippi State University, USA Chapter XIX Collecting Consumer Behavior Data with WLAN ............................................................................. 277 Patrik Skogster, Rovaniemi University of Applied Sciences, Finland Varpu Uotila, Turku School of Economics, Finland

  

Section V

Critical Issues

  Chapter XX Distributed Resources Management in Wireless LANs ...................................................................... 293 Ghassan Kbar, American University in Dubai, UAE Wathiq Mansoor, Zayed University, UAE Chapter XXI An Empirical Examination of the Impact of Wireless Local Area Networks on Organization

  of Users ............................................................................................................................................... 305

  Lei-da Chen, Creighton University, USA Ravi Nath, Creighton University, USA

  Chapter XXII Supporting Real-Time Service in Packet-Switched Wireless Networks ............................................ 324 Maode Ma, Nanyang Technological University, Singapore Zheng Xiang, Nanyang Technological University, Singapore Chapter XXIII Effect of Wireless Channels on the Performance of Ad Hoc Networks ............................................. 333 Q. Nasir, University of Sharjah, UAE M. Al-Dubai, University of Sharjah, UAE S. Harous, University of Sharjah, UAE Chapter XXIV Key Issues in Mobile Marketing: Permission and Acceptance ........................................................... 346 Stuart J. Barnes, University of East Anglia, UK Eusebio Scornavacca, Victoria University of Wellington, New Zealand Chapter XXV Consumer Perceptions and Attitudes Towards Mobile Marketing ..................................................... 357 Amy Carroll, Victoria University of Wellington, New Zealand Stuart J. Barnes, University of East Anglia, UK Eusebio Scornavacca, Victoria University of Wellington, New Zealand Chapter XXVI Trust Models for Ubiquitous Mobile Systems .................................................................................... 369 Mike Burmester, Florida State University, USA

  

Section VI

Emerging Trends

  Chapter XXVII Optical Network Survivability ............................................................................................................ 376 N. S. C. Correia, University of Algarve, Portugal M. C. R. Medeiros, University of Algarve, Portugal Chapter XXVIII Fractal Geometry and Computer Science ........................................................................................... 385

Nicoletta Sala, Università della Svizzera Italiana, Switzerland & Università dell’Insubria,

Italy Chapter XXIX Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive / Social Interaction in an Online Information Security Risk Assessment Class ................................... 405 Cindy S. York, Purdue University, USA Dazhi Yang, Purdue University, USA Melissa Dark, Purdue University, USA Chapter XXX A Mobile Intelligent Agent-Based Architecture for E-Business ......................................................... 416 Zhiyong Weng, University of Ottawa, Canada Thomas Tran, University of Ottawa, Canada Index

  ................................................................................................................................................... 433

  Detailed Table of Contents Prologue

  ............................................................................................................................................. xix

  

Section I

Fundamental Concepts and Theories

  Chapter I A Brief Overview of Wireless Systems and Standards ........................................................................... 1 Sundar G. Sankaran, Atheros Communications, USA This chapter provides a brief overview of wireless systems and standards. The evolution of wireless systems from voice-centric circuit-switched systems to data-centric packet-switched systems is discussed. The first- and second-generation wireless systems were designed primarily for voice service. The data

  rate supported by these systems is very limited. The 2.5G systems were developed to retrofit second- generation systems to support higher data rate applications. The third-generation systems are designed to meet the demands of the Internet era. A wide range of IP-based services is provided using these sys- tems. IEEE 802.16 standard-based systems, commonly referred to as WiMAX, are being proposed as an alternative to third-generation systems for carrying data traffic. Popular wireless LAN and wireless PAN standards are also discussed.

  Chapter II Propagating the Ideal: The Mobile Communication Paradox ................................................................. 8 Imar de Vries, Utrecht University, The Netherlands In this chapter, visions of mobile communication are explored by focusing on idealised concepts sur-

  rounding wireless technology. By examining sources on the development, marketing, and use of wire- less technology, the author contextualises these visions within earlier accounts of ideal communication found in media history and isolates the regularities that are part of these accounts. On close examination, a paradox reveals itself in these regularities, one that can be described as resulting from an uneasiness in the human communication psyche: an unfulfilled desire for divine togetherness that clashes with individual communication needs.

  Chapter III Teaching and Learning Wi-Fi Networking Fundamentals Using Limited Resources ......................... 22 Wilson Siringoringo, Auckland University of Technology, New Zealand Nurul I. Sarkar, Auckland University of Technology, New Zealand Wi-Fi networking has been becoming increasingly popular in recent years, both in terms of applications

  and as the subject of academic research papers and articles in the IT press. It is important that students grasp the basic concepts of both Wi-Fi networking and wireless propagation measurements. Unfortu- nately, the underlying concepts of wireless networking often intimidate students with their apparently overwhelming complexity, thereby discouraging the students from learning in-depth this otherwise excit- ing and rewarding subject. This chapter provides a tutorial on Wi-Fi networking and radio propagation measurements using wireless laptops and access points.

  Chapter IV Mobile Advertising: A European Perspective ...................................................................................... 41 Ecole Nationale des Ponts et Chaussées, France Tawfik Jelassi, Albrecht Enders, Friedrich-Alexander-Universität Erlangen-Nürnberg, Germany This chapter is based on research conducted in cooperation with 12Snap, the leading European mobile

  marketing company, which has implemented large-scale mobile advertising campaigns with compa- nies such as McDonald’s, Nestlé, Microsoft, Coca-Cola, Adidas, and Sony. To set the overall stage, the authors first discuss the advantages and disadvantages of the mobile phone in comparison to other marketing media. Then we propose a framework of different types of advertising campaigns that can be supported through the usage of mobile devices. Drawing from these experiences, the authors then discuss a number of key management issues that need to be considered when implementing mobile marketing campaigns.

  

Section II

Development and Design Methodologies

  in Network Technology ......................................................................................................................... 54

  James G. Williams, University of Pittsburgh, USA Kai A. Olsen, Molde College and University of Bergen, Norway

  The Telecommunications Act of 1996 opened competition in the telecommunications market in the United States and forced the incumbent telecommunications companies to open both their physical and logical infrastructure for Competitive Local Exchange Carriers (CLECs). In this case study, the authors focus on the problems that face a CLEC with regard to designing an information system and getting a back office system, called an Operations Support Systems (OSS), operational in a highly competitive, complex, fast-paced market in a compressed time frame.

  Chapter VI A Component-Based Data Management and Knowledge Discovery Framework for Aviation Studies ................................................................................................................................................... 74 M. Brian Blake, Georgetown University, USA & Center for Advanced Aviation System Development, The MITRE Corporation, USA Lisa Singh, Georgetown University, USA Andrew B. Williams, Spelman College, USA Wendell Norman, Center for Advanced Aviation System Development, The MITRE Corporation, USA Amy L. Silvan, Georgetown University, USA Organizations are beginning to apply data mining and knowledge discovery techniques to their corporate

  data sets, thereby enabling the identification of trends and the discovery of inductive knowledge. Since traditional transaction databases are not optimized for analytical processing, they must be transformed. This chapter proposes the use of modular components to decrease the overall amount of human process- ing and intervention necessary for the transformation process. Our approach configures components to extract data-sets using a set of “extraction hints.” Our framework incorporates decentralized, generic components that are reusable across domains and databases. Finally, we detail an implementation of our component-based framework for an aviation data set.

  Chapter VII Waleli: Bringing Wireless Opportunities to Life .................................................................................. 87 Paul Kirwan, Nikos, University of Twente, The Netherlands Peter van der Sijde, Nikos, University of Twente, The Netherlands Aard Groen, Nikos, University of Twente, The Netherlands This chapter tells the development story of Waleli, a high-tech company utilizing the latest proven de-

  velopments in wireless communications to bring innovations to the market. It presents the journey of the firm through the entrepreneurial process, from initial idea right through to value creation. Furthermore, it looks at the roles and origins of network contacts and how these both impact the entrepreneur’s effort to accumulate the necessary resources to establish and subsequently develop the firm.

  Chapter VIII Designing a Resilient and High Performance Network ...................................................................... 105 Abid Al Ajeeli, University of Bahrain, Bahrain Yousif Al-Bastaki, University of Bahrain, Bahrain This chapter describes the detailed configuration and LAN infrastructure design at the University of Bahrain (UOB). The authors describe the configuration based on the new setup and migration require-

  ments and indicate how the design satisfies those requirements. The chapter explains the detailed con- figuration of the design process of the distribution layer switches and shows how these switches can be configured in the final implementation. The chapter also discusses the modifications that occurred during the implementation/migration phase. The design of the network at UOB campuses incorporates resiliency into the network core in order to manage problems effectively.

  Chapter IX Collaboration Challenges in Community Telecommunication Networks .......................................... 120 Sylvie Albert, Laurentian University, Canada Rolland LeBrasseur, Laurentian University, Canada This chapter reviews the literature on networks and, more specifically, on the development of community

  telecommunication networks. It strives to understand the collaboration needed for innovative projects such as intelligent networks. Guided by a change management framework, collaboration within a com- munity network is explored in terms of the formation and performance phases of its development. The context, content, and process of each phase is analyzed, as well as the interaction of the two phases. User involvement and technology appropriation are discussed and collaboration challenges are identified and linked to the sustainability of the community network.

  Chapter X A Generic Framework for Bluetooth Promoted Multimedia on Demand (BlueProMoD) ................. 142 Panayotis Fouliras, University of Macedonia, Greece Nikolaos Samaras, University of Macedonia, Greece In recent years, many technologies have converged to integrated solutions and one of the most fre-

  quently discussed topics has been the deployment of wireless personal area networks (WPANs). In this chapter, the authors present a generic architecture scheme that allows voice and other real-time traffic to be carried over longer distances. The proposed scheme, Bluetooth Promoted Multimedia on Demand (BlueProMoD) is a novel framework that combines a wired backbone network including Bluetooth ac- cess points (APs) with the mobile Bluetooth-enabled devices of the end users.

  

Section III

Tools and Technologies

Chapter XI Using Mobile Phones and PDAs in Ad Hoc Audience Response Systems ........................................ 157 Matt Jones, University of Waikato, New Zealand Gary Marsden, University of Cape Town, South Africa Dominic Gruijters, University of Cape Town, South Africa This chapter investigates how to create ad hoc audience response systems using nonspecialist devices. The chapter revolves around two case studies: one involving the use of mobile phones, and the other

  based on PDAs. Both case studies are carried out in tertiary education institutions, showing how these devices can be used to facilitate audience participation using devices that students might, themselves, bring to lectures. Both are evaluated from the perspective of the student and the educator, using a mixture of observational and interview-based techniques.

  Chapter XII An Evaluation of U.S. City Government Wireless Networks for Mobile Internet Access ................. 169 Ben Coaker, Whiting-Turner Contracting Company, USA Candace Deans, University of Richmond, USA The purpose of this chapter is to provide guidelines for city governments considering implementing

  large-scale wireless networks to provide Internet access for their citizens and businesses. Case studies of cities in the United States that have implemented wireless networks will be evaluated in the context of opportunities and potential challenges. Some key considerations discussed in this chapter involve free versus fee-based models, security considerations, conflicts with local telecommunications companies, and network support.

  Chapter XIII Information-Theoretic Methods for Prediction in the Wireless and Wired Web ................................ 182 Dimitrios Katsaros, Aristotle University of Thessaloniki, Greece Discrete sequence modeling and prediction is an important goal and challenge for Web environments,

  both wired and wireless. Web clients’ data-request forecasting and mobile location tracking in wire- less cellular networks are characteristic application areas of sequence prediction in such environments. Accurate data-request prediction results in effective data prefetching, which combined with a caching mechanism can reduce user-perceived latencies as well as server and network loads. This chapter presents information-theoretic techniques for discrete sequence prediction. It surveys, classifies, and compares the state-of-the-art solutions, suggesting routes for further research by discussing the critical issues and challenges of prediction in wired and wireless networks.

  Chapter XIV Empirical Prediction of Computer-Network Evolution ...................................................................... 198 Sami J. Habib, Kuwait University, Kuwait This chapter presents a computer-aided integration tool, iCAD, that can predict a network evolution.

  iCAD is connected to four device libraries, each of which contains a distinct set of network-technol- ogy devices, such as Ethernet hubs, ATM switches, IP routers, and gateways. As a network technology changes, each device library is updated. This chapter presents empirical results from 1999 until 2005 recording the network evolution progress, where the lower and upper bounds of network evolution came out to be 10% to 25% and 57% to 74% respectively in terms of network-design cost reduction.

  

Section IV

Utilization and Application

  Chapter XV New Computer Network Paradigms and Virtual Organizations ......................................................... 214 Guillermo Agustín Ibáñez Fernández, Universidad Carlos III, Spain

  A computer network consists of computers that communicate via any physical media through a network formed by links and nodes, the nodes being the computers. Computer networks have evolved along their short history. Computer networks have changed drastically in mission and implementation from the early projects supported by the Advanced Research Projects Agency (ARPA) and from other organizations, tracing back the origins to 1962. This chapter demonstrates how Recent advances in P2P applications like Skype, high speed (10 Gb Ethernet) fixed and wireless mesh networks and the development of pervasive computing are changing the scenario for virtual organizations. When combined with wireless mobile mesh and ad hoc networks, they will make possible ubiquitous virtual networks.

  Chapter XVI Software Agent Technology for Supporting Ad Hoc Virtual Enterprises ........................................... 224 Jarogniew Rykowski, The Poznan University of Economics, Poland This chapter introduces a new idea of using software agents for supporting ad hoc virtual enterprises

  and similar forms of temporal business-to-business collaboration. It seems that current information and telecommunication technologies, based on information interchange and local data processing, are not flexible enough to deal with modern business requirements, especially dynamic and temporal business relations, heterogeneity of hardware, software and communication means, and data complexity. The proposed approach differs in the distribution of both data and programs for data treatment at-the-place and just-in-time. The distributed and remotely executed programs, software agents, are autonomous entities, targeted on obtaining preprogrammed goals, and working in the name and under the authority of their owners.

  Chapter XVII Wireless Networks Based on WiFi and Related Technologies ........................................................... 250 Rajendra V. Boppana, University of Texas at San Antonio, USA Suresh Chalasani, University of Wisconsin-Parkside, USA Multihop wireless networks based on WiFi technology offer flexible and inexpensive networking pos-

  sibilities. Applications of multihop wireless networks range from personal networks within consumer homes to citywide departmental networks to wide-area vehicular ad hoc networks. This chapter focuses on multihop ad hoc networks with communication among user devices and access points, where avail- able, without the restriction that the user devices need to be within the radio range of access points.

  Chapter XVIII An Immune Systems Approach for Classifying Mobile Phone Usage ............................................... 266 Hanny Yulius Limanto, Nanyang Technological University, Singapore Tay Joc Cing, Nanyang Technological University, Singapore Andrew Watkins, Mississippi State University, USA With the recent introduction of third generation (3G) technology in the field of mobile communications, mobile phone service providers will have to find an effective strategy to market this new technology. One approach is to analyze the current profile of existing 3G subscribers to discover common patterns certain classes of customers who are more likely to purchase their subscription plans. To discover these patterns, the authors use a novel algorithm called Artificial Immune Recognition System (AIRS) that is based on the specificity of the human immune system. In the current experiment, the algorithm per- forms well, achieving an accuracy rate in the range of 80% to 90%, depending on the set of parameter values used.

  Chapter XIX Collecting Consumer Behavior Data with WLAN ............................................................................. 277 Patrik Skogster, Rovaniemi University of Applied Sciences, Finland Varpu Uotila, Turku School of Economics, Finland Knowing consumers’ shopping paths is an essential part of successful retailing. Good space management

  requires accurate data about consumer behavior. Traditionally, these data have been collected through, for example, panel interviews, camera tracking, and in-store observation. Their nature is more or less subjective. Modern technology makes it possible to use more objective methods, such as wireless local area network (WLAN) and radio frequency identification (RFID). This chapter examines the possibili- ties WLAN provides information systems studies. The results show that WLAN has great potential for accurate and objective data collection processes and modeling data in retailing.

  

Section V

Critical Issues

  Chapter XX Distributed Resources Management in Wireless LANs ...................................................................... 293 Ghassan Kbar, American University in Dubai, UAE Wathiq Mansoor, Zayed University, UAE This chapter introduces a new radio resource management technique based on distributed dynamic

  channel assignment, and sharing load among Access Points (AP). Deploying wireless LANs (WLAN) on a large scale is mainly affected by reliability, availability, and performance. These parameters will be a concern for most managers who want to deploy WLANs. In order to address these concerns, a new radio resource management technique can be used in a new generation of wireless LAN equipment. This technique would include distributed dynamic channel assignment, and load sharing among Access Points (AP), which improves the network availability and reliability compared to centralized manage- ment techniques. In addition, it will help to increase network capacities and improve performance, especially in large-scale WLANs

  of Users ............................................................................................................................................... 305

  Lei-da Chen, Creighton University, USA Ravi Nath, Creighton University, USA In recent years, the concept of nomadic computing has received considerable attention from the business community. As an early form of nomadic information environment (NIE), wireless local area network (WLAN) has gained tremendous popularity with organizations. Using mostly anecdotal evidences, WLAN equipment manufacturers and practitioners claimed that WLAN brought dramatic improvements in the forms of productivity gains and attainment of convenience, flexibility, mobility, and time saving to organizations and their employees. By surveying end-users and managers, this study investigates the impact of WLAN on users and their work. Finally, recommendations to researchers, managers, WLAN technology providers, and equipment manufacturers also are provided.

  Chapter XXII Supporting Real-Time Service in Packet-Switched Wireless Networks ............................................ 324 Maode Ma, Nanyang Technological University, Singapore Zheng Xiang, Nanyang Technological University, Singapore The requirement of providing real-time data service by wireless networks is a critical issue in the design

  of current wireless networks. Distributed Queueing Request Update Multiple Access (DQRUMA) has been proposed as a demand assignment medium access control (MAC) protocol to efficiently control the medium sharing by multiple mobile users. With the help of a packet transmission policy, DQRUMA has a potential to provide QoS service for the time-constrained burst data traffic. This chapter studies the problem of providing real-time service to fixed-size packets with or without time constraints in wireless networks. In particular, a novel scheduling scheme for the DQRUMA protocol to control the packet transmission in packet-switched wireless networks is proposed.

  Chapter XXIII Effect of Wireless Channels on the Performance of Ad Hoc Networks ............................................. 333 Q. Nasir, University of Sharjah, UAE M. Al-Dubai, University of Sharjah, UAE S. Harous, University of Sharjah, UAE Mobile ad hoc (MANET) network is a collection of wireless mobile nodes dynamically forming a

  temporary network without the use of any existing network infrastructure or centralized administra- tion. To accomplish forwarding a packet to its destination, a routing protocol is used to discover routes between these nodes. This chapter presents a variety of results for packet-level simulations for the popular protocol—dynamic source routing (DSR)—when different channel models are used. Different radio propagation models representing the wireless channel have been proposed over the years, each one being suitable for a certain situation. The simplest model that represents wireless propagation is the freespace model. Other propagation models are the tworay ground reflection model and the shadowing model. Simulation results show that the performance metrics are highly affected by the channel model used, even the energy left or the number of nodes left alive are also different.

  Chapter XXIV Key Issues in Mobile Marketing: Permission and Acceptance ........................................................... 346 Stuart J. Barnes, University of East Anglia, UK Eusebio Scornavacca, Victoria University of Wellington, New Zealand The growth and convergence of wireless telecommunications and ubiquitous networks has created a tremendous potential platform for providing business services. In consumer markets, mobile market- ing is likely to be a key growth area. Mobile marketing permission and acceptance are core issues that marketers have yet to fully explain or resolve. This chapter provides direction in this area. After briefly discussing some background on mobile marketing, the chapter conceptualises key characteristics for mobile marketing permission and acceptance. The chapter concludes with predictions on the future of mobile marketing and some core areas of further research.

  Chapter XXV Consumer Perceptions and Attitudes Towards Mobile Marketing ..................................................... 357 Amy Carroll, Victoria University of Wellington, New Zealand Stuart J. Barnes, University of East Anglia, UK Eusebio Scornavacca, Victoria University of Wellington, New Zealand Mobile marketing is an area of m-commerce expected to experience tremendous growth in the next 5

  years. This chapter explores consumers’ perceptions and attitudes towards mobile marketing via SMS through a sequential, mixed-methods investigation. Four factors were identified and proven as all having a significant impact on mobile marketing acceptance—permission, content, wireless service provider (WSP) control, and the delivery of the message, which guided the development of a revised and empirically tested model of m-marketing consumer acceptance. The findings also suggest that marketers should be optimistic about choosing to deploy mobile marketing, but exercise caution around the factors that will determine consumer acceptance.

  Chapter XXVI Trust Models for Ubiquitous Mobile Systems .................................................................................... 369 Mike Burmester, Florida State University, USA This chapter introduces the notion of trust as a means to establish security in ubiquitous mobile network

  systems. It argues that trust is an essential requirement to enable security in any open network environ- ments, and in particular, in wireless ad hoc environments where there is no network topology. In general it may be hard, or even impossible, to establish, recall, and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly.

  

Section VI

Emerging Trends

  Chapter XXVII Optical Network Survivability ............................................................................................................ 376 N. S. C. Correia, University of Algarve, Portugal M. C. R. Medeiros, University of Algarve, Portugal

  In optical networks, survivability becomes very important because of the huge amount of traffic carried by fibers. Therefore, the prevention of service interruption, or the reduction of the service loss, must now be an integral part of the network design and operations strategy. In this chapter, optical network survivability is discussed and special emphasis has been given to WDM lightpath protection.

  Chapter XXVIII Fractal Geometry and Computer Science ........................................................................................... 385

Nicoletta Sala, Università della Svizzera Italiana, Switzerland & Università dell’Insubria,

Italy Fractal geometry can help us to describe the shapes in nature (e.g., ferns, trees, seashells, rivers, moun-

  tains) exceeding the limits imposed by Euclidean geometry. Fractal geometry is quite young: The first studies are the works by the French mathematicians Pierre Fatou (1878-1929) and Gaston Julia (1893- 1978) at the beginning of the 20th century. However, only with the mathematical power of computers has it become possible to realize connections between fractal geometry and other disciplines. Recent studies apply this geometry to controlling traffic in computer networks (LANs, MANs, WANs, and the Internet). The aim of this chapter is to present fractal geometry, its properties (e.g., self-similarity), and their applications in computer science.

  Chapter XXIX Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive / Social Interaction in an Online Information Security Risk Assessment Class ................................... 405 Cindy S. York, Purdue University, USA Dazhi Yang, Purdue University, USA Melissa Dark, Purdue University, USA This chapter briefly reviews two important goals in online education: interaction and presence. These

  are important goals in online education because they are linked to learning and motivation to learn. The chapter provides guidelines and an extended example of how to design an online course in informa- tion security in a manner that will enhance interaction and presence. This chapter’s contribution is to provide guidelines with a corresponding extended and concrete example for those who are tasked with designing and delivering online courses. Although the guidelines and example were targeted to the field of information security, they can be readily adopted by other disciplines.

  Chapter XXX A Mobile Intelligent Agent-Based Architecture for E-Business ......................................................... 416 Zhiyong Weng, University of Ottawa, Canada Thomas Tran, University of Ottawa, Canada This chapter proposes a mobile intelligent agent-based e-business architecture that allows buyers and sellers to perform business at remote locations. This proposed architecture promises a number of benefits. First, it provides great convenience for traders as business can be conducted anytime and anywhere. Sec-

  ond, since the task of finding and negotiating with appropriate traders is handled by a mobile, intelligent agent, the user is freed from this time-consuming task. Third, this architecture addresses the problem of limited and expensive connection time for mobile devices: A trader can disconnect a mobile device from its server after generating and launching a mobile intelligent agent. Later on, the trader can reconnect and call back the agent for results, therefore minimizing the connection time. Finally, by complying with the standardization body FIPA, this flexible architecture increases the interoperability between agent systems and provides high scalability design for swiftly moving across the network.

  Index

  ................................................................................................................................................... 433 xix Prologue

  INTRODUCTION

  The field of telecommunications and networking continues to produce a rich set of contributions to in- dustry and the research community as this selection of readings demonstrates. The book has compiled a series of recent submissions that cover a range of aspects in this dynamic field. The chapters are divided in six themes: (1) Fundamental Concepts and Theories, (2) Development and Design Methodologies, (3) Tools and Technologies, (4) Application and Utilization, (5) Critical Issues, and 6) Emerging Trends. The resulting volume is a valuable and multi-faceted resource that gives the reader a good insight about where the technology is going and a sample of some of the most interesting applications and develop- ments exploiting that emerging technology base. In the next few paragraphs, I’d like to highlight some of the most interesting issues being raised in telecommunications and networking research and perhaps speculate somewhat about directions for further enquiry that may have a long-term effect of how we use and deploy telecommunications and networking solutions that contribute to an increasingly con- nected world.

  UBIQUITOUS NETWORKING

The exponential growth of the Internet has diminished the difficulties associated with communication between distant places, allowing people to participate in the digital economy regardless of their geo-

  graphical limitations. Additionally, developments in wireless technologies are freeing people from using wires for communicating. For example, the conveniences of wireless connections have converted mobile phones in a commodity, rather than a luxury item (Weatherall and Jones, 2002). Juniper Research’s global m-commerce revenue projections for 2009 include global revenues of US$88 billion, ticket pur- chases of US$39 billion, and phone-based retail POS sales US$299 million (Juniper Research, 2008). The idea of “anywhere, anytime, by anything and anyone” (or 4As) networking is at the core of a new emerging networking technology, referred to as a “Ubiquitous Networking”. The concept of Ubiquitous Networking originated from the concept of Ubiquitous Computing, which was aimed to “make many computers available throughout the physical environment, while making them effectively invisible to the user” (Weiser, 1993; Wikipedia, 2008). Additionally, Weiser highlighted 4 important “networking” issues when focusing on ubiquitous computing, namely: wireless media access, wide-bandwidth range, xx

  real-time capabilities for multimedia over standard networks, and packet routing. All of these research areas are well-covered in this selected readings collection.

  The world of Ubiquitous Networking creates new business opportunities for the development of services and applications that maximise the freedom offered by the technology. Evolving networking technologies will change our daily lives, both in social and economical terms. The potential demand includes, but is not limited to services such as ubiquitous health / concierge systems, ubiquitous auto- mobile systems and ubiquitous education / learning systems.

  NETWORK INFRASTRUCTURE ISSUES

  The core of a ubiquitous networking environment is the underlying networking infrastructure that is capable of meeting the requirements of users. In general, networking technologies can be divided into two broad categories, (1) wired networks and (2) wireless networks. The key functional distinction between the two types of networks is the speed, where wired networking technologies are capable of providing much higher speed communications compared to wireless networking technologies. The technologies supporting wireless networks will always be “resource-poor” when compared with those supporting wired networks (Satyanarayanan, 1996 ) . Below is the list of key wired and wireless network- ing technologies.

  Fibre Technologies (e.g., FTTH, FTTC) • Wireless LANs (802.11g/n, 802.16) •

  • Wireless MANs (Fixed wireless, LMDS, 802.20)

  Wireless WANs (3G/4G, GPRS, UMTS, GPS, mesh networks) • Short-distance wireless communication technologies (Wireless PAN) (e.g., Bluetooth, 802.15.3) • Satellite Systems (e.g., Motorola’s Iridium) • Sensor networks •