Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
SMS (short message service) and MMS (multimedia message service) are two of the hottest services in wireless communications today, offering customers exciting ways to communicate by sending text and multimedia messages. This comprehensive book offers wireless engineers and managers practical guidance in the planning and implementation of SMS and MMS services with interworking (the ability to successfully send a message when the origin and destination cellular phones do not use the same wireless operator). The book offers professionals various solutions to the common problem of number portability (a situation when a cellular phone has been "portedout" to another operator while keeping the same number) and provides methods for blocking spam from inbound SMS. Including numerous solved examples, this authoritative reference helps practitioners master of the key concepts they need to understand for their work in the field.
Security forces PMR networks are moving from proprietary technologies for their "Mission Critical Push-To-Talk" basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included. The author, who has also a long teaching career in Operations Research, provides mathematical models for the optimization of tactical network federations, multicast coverage and allocation of preemptive priorities to PMR group members. He is a pioneer in the area of Virtual Roaming, an application of graph theory and telecommunications to provide roaming without direct relations, having previously published books on SMS Hubs, SS7 Hubs, Diameter Hubs, GTP Hubs. The use of M2M (monitoring devices) for security forces with mobility is covered in detail in the book, including the new LoRa virtual roaming which goes beyond the scope of PMR.
The subject is "Virtual Roaming for data services" and "Seamless Technology change" also called "Number Continuity". "Virtual Roaming for voice and SMS" was covered in one of the author's previous book. "Virtual Roaming" means that it allows a subscriber to visit a network which his home network does not have an agreement with. The "Seamless Technology change" allows a user to keep all his services including reception of calls and SMS sent to his usual number when he switches his GSM to a Satellite phone or to WiFi. The implementation of Seamless Technology change uses the SS7 Roaming Hub and GTP Hubs technology explained in the first part of the book. The book also contains chapters explaining in detail the steering and anti-steering of roaming, LTE Serving Mobile Location Centers, and Advanced Policy and Charging implementations in LTE and 3G. This is to be used as an easy reference book. All the relevant references to the standards are included chapter by chapter. This is the first book on the two main subjects of Virtual Data Roaming and Seamless Technology change. Keywords: Virtual Roaming, Number Continuity, Seamless technology change, Policy Charging and Control, LTE LBS, Steering of Roaming, GTP Hub, MMS Hub,RADIUS Hub, DIAMETER Hub
|
You may like...
|