Àâòîðèçàöèÿ
Ïîèñê ïî óêàçàòåëÿì
Van Der Heijden M. (Ed), Taylor M. (Ed) — Understanding WAP: Wireless Applications, Devices, and Services
Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå
Íàøëè îïå÷àòêó? Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter
Íàçâàíèå: Understanding WAP: Wireless Applications, Devices, and Services
Àâòîðû: Van Der Heijden M. (Ed), Taylor M. (Ed)
Àííîòàöèÿ: Learn all the basics of how the Wireless Application Protocol is able to deliver Internet-based services to all types of mobile devices with this comprehensive new resource. It examines every aspect of WAP, helping you with hands-on development of WAP applications, an area critical to the success of WAP in the consumer marketplace. You learn the technical details behind this new protocol and the critical business issues related to its implementation. What's more, it delivers an in-depth review of the technical specifications and security issues associated with WAP. Unlike other books on the subject, this handy reference is more than just an explanation of the standards. You get useful information on how WAP is impacting existing business models and value chains of telcos, and information and service providers.
Software Included! Features a CD-ROM containing the complete WAP standards, selected software and sample WAP applications, and more.
ßçûê:
Ðóáðèêà: Òåõíîëîãèÿ /
Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö
ed2k: ed2k stats
Èçäàíèå: 1st edition
Ãîä èçäàíèÿ: 2000
Êîëè÷åñòâî ñòðàíèö: 256
Äîáàâëåíà â êàòàëîã: 30.12.2007
Îïåðàöèè: Ïîëîæèòü íà ïîëêó |
Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
Ïðåäìåòíûé óêàçàòåëü
Products 12
Public WTAI 32—33 76—77
Public WTAI, access to 70—71
Public WTAI, defined 75—76
Public WTAI, functions 71 76
Public WTAI, make call 26
Public WTAI, send DTMF tones 76—77 See also WTAI
Public-key cryptography 148—151
Public-key cryptography, authentication schemes 151 152
public-key cryptography, defined 148
Public-key cryptography, digital certificates 153
Public-key cryptography, discrete logarithm problem 150
Public-key cryptography, elliptic curve discrete logarithm problem 150—151
Public-key cryptography, encryption schemes 151 152
Public-key cryptography, infrastructures 152—153
Public-key cryptography, integer factorization problem 149—150
Public-key cryptography, keys 148—149
Public-key cryptography, security 149 See also Cryptography
Push access protocol 124—126
Push access protocol over HTTP 125
Push access protocol, defined 123 124 200
Push access protocol, design 124—125
Push access protocol, features 125—126
Push access protocol, illustrated 123
Push access protocol, management 129
Push in wireless domain 120
Push initiators 123—124 125—126
Push on the Web 119
Push proxy gateway 122 126—130
Push proxy gateway, architecture 126 127
Push proxy gateway, defined 200
Push proxy gateway, management functions 129—130
Push proxy gateway, protocol stack 126
Push proxy gateway, push proxy layer 127—129
Push proxy layer 127—129
Push proxy layer, address resolving 128—129
Push proxy layer, addressing of multiple recipients 129
Push proxy layer, client capabilities 128
Push proxy layer, content transformation 127
Push proxy layer, defined 127
Push proxy layer, parsing of control information 127
Push proxy layer, prioritization 128
Push proxy layer, session management 128
Push proxy layer, store-and-forward 128
Push services 37 111 117—140
Push services, examples 140
Push services, implementing 137—140
Push services, indication 132—134
Push services, indication illustration 133
Push services, integration 140
Push services, introduction to 117—118
Push services, loading 134
Push services, need for 118
Push services, reverse billing scheme 139
Push services, security 135—137
Push services, voice mail notifications 140
Push, application behavior 132
Push, application dispatching 131
Push, architecture illustration 122
Push, defined 118
Push, framework 121—134
Push, mobile client behavior 131—132
Push, OTA protocol 130—131
Question-and-answer navigation 57—58
Repository 71—72 80—84
Repository, channel loading and unloading 83—84
Repository, channels and resources 80—83
Repository, function 80 See also WTA
Security cases 144—145
Security cryptography 146—154
Security efficiency 155
Security in wireless environment 154—155
Security, end-to-end 136
Security, financial WAP applications 231—32
security, Internet 135
Security, introduction to 143—45
Security, n-tier applications 223
Security, push services 135—137
Security, transaction-based services and 185
Security, transitive trust 136—137
Security, WAP 135 156—164
Security, WAP gateway 114
Security, WTA model 73—74
Security, WTLS 159—162
Self-provisioning 202
Service provisioning 201—202
Serviceperson application 8
Services 178—182
Services content 179
Services entertainment 173 174
Services overview 11
Services packages 11—12
Services, attributes 174
Services, categories 173—74
Services, first-class 61
Services, infotainment 173 174
Services, infranet 180
Services, launching 172
Services, modularity 52
Services, operator-specific 180
Services, positioning 176
Services, present reactions 46—47
Services, pricing decision 175—176
Services, push 37 117—140
Services, SMS 120
Services, success factors 175—178
Services, synthesis 53
Services, transaction-based 185
Services, transactional 174 175
Services, usability and sellability requirements 176—177
Services, user interface design 45—63
Services, user selection of 99
Services, wireless application environment for creating 15—42
Services, WTA 71—72 88—95
Shadowing 19
Short message service center (SMSC) 204
Signaling System 7 (SS7) 100
SIM application toolkit (SAT) 167
SMS messages 212—213
SMS services 120
Software tools 39
String library 29
Subscriber data 112—113
Subscriber management 129—130
Symmetric-key cryptography 148
T-Online 183
Tagged text markup language (TTML) 2
Tags See Elements
tasks, defined 21
Tasks, invocation 21—22
Tasks, refresh 24 See also WML
Telematics 140
Telephonic user interface (TUI) 189
Telephony applications 8—9
Temporary event binding 84 87
Testing, user interfaces 59—61
Transactional services 174 175
Transitive trust 136—37
Unified Messaging 187—206
Unified messaging, architecture of WAP access to 190—191
Unified messaging, calendar 205
Unified messaging, concept 188—189
Unified messaging, corporate systems 202—206
Unified messaging, directory services 196—199
Unified messaging, e-mail message access 194—196
Unified messaging, ERP systems 206
Unified messaging, illustrated concept 189
Unified messaging, meeting agent 206
Unified messaging, network architectural point of view 193
Unified messaging, notification services 199—201
Unified messaging, phonebooks, address books, contact lists 206
Unified messaging, public folders 205
Unified messaging, self-provisioning with WAP 202
Unified messaging, service expansion 191—192
Unified messaging, service provisioning and billing 201—202
Unified messaging, task lists 206
Unified messaging, voice and fax message access 192—194
Unified messaging, WAP access 192—202
Unified messaging, WAP access illustration 190
Unified messaging, WAP and 189—190
Uniform resource identifiers (URIs), defined 68
Uniform resource identifiers (URIs), range of 113
Unstructured supplementary services data (USSD) messages 213
URL library 29
User agent, capabilities 36—37
User agent, profile 37
User agent, WTA 68—70
User interface design for tasks 50—51
User interface design, components 48
User interface design, customer satisfaction and 49–50
User interface design, economy and 52
User interface design, holistic process 48—49
User interface design, modularity and 52
User interface design, navigation models 56—59
User interface design, personality and 52—53
User interface design, principles 52—53
User interface design, process 48—51
User interface design, question checklist 63
User interface design, scenarios 51
User interface design, synthesis and 53
user interfaces 45—63
User interfaces, adaptive 61—62
User interfaces, defaults 55
User interfaces, experience checklist 50
User interfaces, lists 55—56
User interfaces, menu-driven 47
User interfaces, navigation 56—59
User interfaces, testing 59—61
User interfaces, text entry, avoiding 54—55
User interfaces, Web, importing into WAP 47
Users benefits 10
Users, group identification 172
Users, input techniques 53—56
Users, navigation control 58—59
Users, personal profile 52—53
Users, terminal channel 52
Value chain 138—139
Variables context 23
Variables values 23
Variables, uses 24
Variables, WML 23—24
Variables, WMLScript 26—27 See also WML
vendor partnerships 102—103
Vertical market relationships 102
Voice and fax message access 192—194
Voice and fax message access, illustrated 193
Voice and fax message access, system perspective steps 194
Voice and fax message access, user perspective steps 192—193 See also Unified messaging
WAE 15—42
WAE components 16
WAE, defined 16
WAP -enabled mobile devices 99
WAP for operators 165—186
WAP Forum Ltd. 3 12 106 113
WAP gateway 6—7 122—123
WAP gateway, billing data interface 111—112
WAP gateway, caching of wireless content 113
WAP gateway, compiler and encoder functionality 106
WAP gateway, configuration data 108
WAP gateway, controlling function 110
WAP gateway, conversion function 6—7 34
WAP gateway, defined 6 97
WAP gateway, distribution 109
WAP gateway, event managing function 109—110
WAP gateway, flexibility 109
WAP gateway, functional requirements 103—113
WAP gateway, future enhancements 113—115
WAP gateway, high-level architecture of 104
WAP gateway, integrating 97—115
WAP gateway, intelligence interfacing function 108
WAP gateway, interim proprietary solutions 115
WAP gateway, management functions 107—108 110—111
WAP gateway, manufacturer support offerings 100—103
WAP gateway, method proxy gateway 122
WAP gateway, monitoring of critical alarms 111
WAP gateway, new generation mobile networks 114
WAP gateway, overview 97—98
WAP gateway, primary function 98
WAP gateway, product differentiation factors 115
WAP gateway, protocol stack 101 104
WAP gateway, provisioning server 114
WAP gateway, push applications and 111 114
WAP gateway, push proxy gateway 122
WAP gateway, scalability 109
WAP gateway, security 114
WAP gateway, subscriber data 112—113
WAP gateway, use of 35
WAP gateway, value-added services 109
WAP gateway, WDP layer 105
WAP gateway, WSP layer 106
WAP gateway, WTLS layer 105
WAP gateway, WTP layer 105—106
WAP gateway, “intelligence” 107
WAP stack 4—7
WAP stack, content formats 6
WAP stack, microbrowser 5
WAP stack, schematic 5
WAP stack, WAP gateway 6—7
WAP stack, WMLScript 5—6
WAP stack, WTA/WTAI 6
WAP, applications 7—9 223—226
WAP, architecture 16
WAP, benefits and market opportunities 9—10
WAP, business models 182—185
WAP, client architecture 224
WAP, content format support 17
WAP, deck of cards metaphor 4
WAP, defined 1
WAP, designed use 4
WAP, developer's programs 100—102
WAP, evaluation kit 103
WAP, first commercial version 3—4
WAP, functionality, positioning of 98–103
WAP, history behind 2—4
WAP, initial deployments architecture 156
WAP, introduction to 1—13
WAP, migrating to 33—35
WAP, origin server 99
WAP, portal 191—192
WAP, protocol stack 156
WAP, push services 37 117—140
WAP, relevance evaluation 178
WAP, security 135 156—164
WAP, software tools 39
WAP, success commitment 12
WAP, telephony in 65—95
WAP, unified messaging and 189—190
WAP, WIM specification 164 See also Services
Wireless application environment See WAE
Wireless Application Protocol See WAP
Wireless communication 15—16
Wireless datagram protocol (WDP) layer 105
Wireless Markup Language See WML
Wireless markup language script See WMLScript
Wireless session protocol See WSP
Wireless telephony application See WTA framework
Wireless telephony application interface See WTAI
Wireless transaction layer security See WTLS
Wireless transaction protocol (WTP) layer 105—106
WML 16 17—25
Ðåêëàìà