BN.com Gift Guide

Pervasive Computing: Technology and Architecture of Mobile Internet Applications / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (10) from $1.99   
  • New (2) from $56.45   
  • Used (8) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$56.45
Seller since 2014

Feedback rating:

(310)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand New Item.

Ships from: Chatham, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$70.00
Seller since 2014

Feedback rating:

(193)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by

Overview

The term "pervasive computing" describes a revolutionary dimension of personal computing which brings together mobile communications, ubiquitous embedded computer systems, consumer electronics and the power of the internet. Three main factors drive its growth: microelectronic technology, providing smaller devices and displays with lower energy consumption; communication technology, providing higher bandwidth and higher data transfer rates at lower cost; and ongoing international standardization efforts, without which the benefits of the technology can never be realized.

Written by a team of experts, Pervasive Computing: Technology and Architecture of Mobile Internet Applications provides both a theoretical overview and a practical guide to this emerging field. The first part of the book walks through the essential protocols, standards and architectures involved. The second part uses a continuous real-world example to present an end-to-end architecture for implementing pervasive computing applications.

Contents of Pervasive Computing include:

  • Introduction to pervasive devices and their applications
  • Overview of the key technologies and protocols
  • Web application concepts
  • WAP and beyond
  • Voice Technology
  • Server-side programming in Java
  • Pervasive web application architecture
  • Device-independent example application
  • Accessing the example application via PC, PDA, WAP and voice


Pervasive Computing: Technology and Architecture of Mobile Internet Applications is the first book to offer an understanding of the scope and the implications of pervasive computing. As such it should be essential reading for IT managers, professionals, architects, consultants, developers, and students concerned with internet and web technologies.

Read More Show Less

Editorial Reviews

From The Critics
The current computing era is characterized by the migration of classical PC application into smaller more specialized appliances and the progressive integration of these appliances into a common infrastructure that takes care of the synchronization of the distributed and replicated data, guarantees security, and creates interoperability. It is the concepts, technologies, and standards of this process that is summarized here by the term "pervasive computing." This introduction to and overview of the technologies and architectures of pervasive computing includes chapters on application examples, device technology, device connectivity, Web applications, wireless Internet services, voice technology, personal digital assistants, server-side programming in Java, and a variety of access architectures. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9780201722154
  • Publisher: Pearson Education
  • Publication date: 4/28/2002
  • Edition number: 1
  • Pages: 432
  • Product dimensions: 7.41 (w) x 9.22 (h) x 0.89 (d)

Meet the Author

Jochen Burkhardt works in the IBM Pervasive Computing Division and has been involved in several projects in this area since the beginning of the mobile internet and pervasive computing revolution.

Dr. Horst Henn works in the IBM Pervasive Computing Division and has been involved in several projects in this area since the beginning of the mobile internet and pervasive computing revolution.

Stefan Hepper works in the IBM Pervasive Computing Division and has been involved in several projects in this area since the beginning of the mobile internet and pervasive computing revolution.

Klaus Rindtorff works in the IBM Pervasive Computing Division and has been involved in several projects in this area since the beginning of the mobile internet and pervasive computing revolution.

Read More Show Less

Table of Contents

Foreword ix
Preface xii
Acknowledgements xviii
About the authors xix
Trademarks xxii
Part I Technologies 1
1 Past, present, future 3
1.1 The vine and fig tree dream 3
1.2 Pervasive computing 6
1.3 The pervasive computing market 15
1.4 m-Business 18
1.5 Conclusions and challenges 19
1.6 The future 20
References 21
2 Application examples 22
2.1 Retail 22
2.2 Airline check-in and booking 24
2.3 Sales force automation 26
2.4 Healthcare 27
2.5 Tracking 28
2.6 Car information systems 29
2.7 Email access via WAP and voice 31
References 33
3 Device technology 35
3.1 Hardware 35
3.2 Human-machine interfaces 40
3.3 Biometrics 50
3.4 Operating systems 52
3.5 Java for pervasive devices 71
3.6 Outlook 81
References 82
Further reading 83
4 Device connectivity 84
4.1 Protocols 84
4.2 Security 109
4.3 Device management 120
References 125
Further reading 126
5 Web application concepts 127
5.1 History of the World Wide Web 127
5.2 World Wide Web architecture 128
5.3 Protocols 130
5.4 Transcoding 133
5.5 Client authentication via the Internet 135
References 144
Further reading 145
6 WAP and beyond 146
6.1 Introduction 146
6.2 Components of the WAP architecture 147
6.3 WAP infrastructure 150
6.4 WAP security issues 155
6.5 Wireless Markup Language 157
6.6 WAP push 166
6.7 Products 167
6.8 i-Mode 173
6.9 Outlook 174
References 177
Further reading 178
7 Voice technology 179
7.1 Basics of speech recognition 180
7.2 Voice standards 183
7.3 Speech applications 188
7.4 Speech and pervasive computing 189
7.5 Security 192
References 192
8 Personal digital assistants 194
8.1 History 194
8.2 Device categories 195
8.3 Personal digital assistant operating systems 197
8.4 Device characteristics 199
8.5 Software components 200
8.6 Standards 203
8.7 Mobile applications 207
8.8 Personal digital assistant browsers 210
References 214
Conclusion 215
Part II Architectures 217
9 Server-side programming in Java 219
9.1 Java 2 Enterprise Edition: overview 219
9.2 Servlets 223
9.3 Enterprise Java Beans 224
9.4 Java Server pages 229
9.5 Extensible Markup Language 232
9.6 Web services 246
9.7 Model-view-controller pattern 253
9.8 Conclusion 254
References 255
Futher reading 255
10 Pervasive Web application architecture 256
10.1 Background 256
10.2 Scalability and availability 257
10.3 Development of pervasive computing Web applications 259
10.4 Pervasive application architecture 260
10.5 Conclusion 275
References 275
11 Example application 276
11.1 Introduction 276
11.2 User interface overview 277
11.3 Architecture 279
11.4 Implementation 280
11.5 Summary 305
12 Access from PCs 306
12.1 Smart-card-based authentication via the Internet 306
12.2 Ordering goods 319
12.3 Conclusion 333
References 333
13 Access via WAP 334
13.1 WAP functionality 334
13.2 Implementation 337
13.3 Conclusion 347
14 Access from personal digital assistants 348
14.1 Extending the example application to personal digital assistants 348
14.2 Implementation for synchronized devices 348
14.3 Implementation for intermittently connected devices 356
14.4 Implementation for connected devices 370
14.5 Comparison 376
References 378
15 Access via voice 379
15.1 Extending the example application to voice access 379
15.2 Implementation 386
15.3 Conclusion 394
Conclusion 395
Appendix Frequently used abbreviations 397
Index 405
Read More Show Less

Preface

The Internet has grown into a global infrastructure causing a major restructuring of the economy. Pervasive computing will add a new dimension to the Web society. People will be able to interact with the Web everywhere and at any time using mobile devices with speech, pen, and other tailored human-machine interfaces. The World Wide Web will now reach people that have not even considered using a PC before. Existing businesses will be able to offer superior services to their customers, and exciting new businesses for mobile consumers will emerge. Technology will be the major driver for this new mobile society. Understanding the potential of the technology and its impact on society is one of the keys to developing new applications and services.

Part I Technologies

In the first part of this book, we give an introduction to technologies used by pervasive computing. This part is relevant for everybody who wants to get an overview of pervasive computing - consultants, students, IT architects, and developers. We begin with a brief discussion of the past, present, and our view of the future of pervasive computing, and give a motivation for pervasive computing by showing several typical areas where pervasive computing is introduced in a series of example applications. We give an extensive technology overview, including current man-machine interfaces, devices, operating systems, and standards.

Chapter 1: Past, present, future

Pervasive computing has three major driving forces. First, the microelectronic technology providing smaller devices and displays with lower energy consumption. Second, the communication technology providing higher bandwidth and higher data transfer rates at lower cost. The third key component is the ongoing standardization of all components in the system by international standardization committees and industry associations. Without standardization the technology cannot be exploited on a large scale. We describe the base technologies and standards, such as Global System for Mobile Communications (GSM), Universal Mobile Telecommunications System (UMTS), Wireless Application Protocol (WAP), infrared (IR), Bluetooth, Internet Protocol (IP), Hyper Text Markup Language (HTML), Extensible Markup Lanugage (XML), VoiceXML, and Application Standards. Then we discuss the key infrastructure elements and the associated service infrastructure. Finally, we evaluate the future trends and directions.

Chapter 2: Application examples

There are already a lot of different pervasive devices available on the market, ranging from personal digital assistants (PDAs) to WAP phones. Now the question is how to use these devices effectively in business applications. In this chapter, we explore how pervasive computing devices enable exciting new ways of conducting business. We present a series of real-life application examples showing how businesses can benefit from pervasive computing. The examples will give you an overview of what is possible and what is required, and should inspire you to think of tomorrow's applications today.

Chapter 3: Device technology

This chapter gives an overview of the rapidly evolving technologies that influence the evolution of mobile devices. The key technologies are presented in three parts. The first part describes the advances in hardware technologies. The second part presents the key software technologies used for the human-machine interaction. The third part gives an introduction to some of the operating systems and Java platforms available for PDAs today. A brief discussion of each technology is given, followed by an outlook into the future direction.

Chapter 4: Device connectivity

Pervasive computing devices do not develop their full potential unless connected to applications and services through the Internet. In this chapter, protocols for device-to-device and device-to-server interactions that are relevant in the pervasive computing domain will be covered: wireless protocols, mobile phone technologies, Bluetooth, the Mobile Internet Protocol, synchronization protocols like SyncML, as well as transaction protocols and protocols enabling distributed services like Jini. In addition to those protocols, a deeper look at algorithms and protocols that address security issues is presented. Because system and device management will become a big challenge to support millions of devices, the last section will discuss device management in the pervasive space.

Chapter 5: Web application concepts

In this chapter we explain how PCs can be connected to Web applications through the Internet. Although some concepts and technologies described here can be considered classical and are well known, we want to revisit them briefly. This way, they can serve as references to be compared with the newer concepts and technologies presented in subsequent chapters. We give an overview of the history of the World Wide Web, as well as the relevant concepts, protocols, and standards for communication between Web clients and servers via the Internet. One special topic we cover here is transcoding, the transformation of content to device-specific markup. We discuss Web application security issues and present possible solutions ranging from use of the standard Hypertext Transfer Protocol over SSL (HTTPS) protocol to client-authentication schemes for the Internet. Apart from the typical client-authentication methods supported by today's browsers, we discuss smart cards for secure user authentication in detail.

Chapter 6: WAP and beyond

WAP has become a synonym for new wireless Internet services. This chapter describes the basics of WAP e-business implementation, device characteristics, protocol stack, security issues, products, and tools currently available on the market.

Chapter 7: Voice technology

In this chapter we will cover the basics of speech recognition and describe two important standards in the area of voice-based user interfaces: VoiceXML, a markup language for speech, and Java Speech, a Java application programming interface (Java API) to provide speech capability to Java applications. Typical speech applications, such as speech recognition on the PC, speech recognition over a telephone line, and text-to-speech translation, will be covered next. Finally, we take a closer look at speech recognition in pervasive computing and at security when using speech as a user interface method.

Chapter 8: Personal digital assistants

Today we are on the edge of an explosion of mobile devices with hitherto unprecedented connectivity and processing power. These devices replace traditional tools like pen and paper, the address book, or the calendar, and integrate all of them in a single, convenient, mobile package. What makes mobile devices so attractive is not so much the fact that they deliver new functions, but that they mimic well-known processes, combine their data and make it available everywhere and at any time. This chapter first takes a brief look at the history of PDAs. A categorization of device types and their connectivity characteristics is given. Finally, the available standards and typical software components for PDAs are explained. Part II: Architectures

In the second part of this book, we present an end-to-end architecture for pervasive computing applications that support different kinds of devices and communication protocols. We explain how applications adhering to this architecture can be implemented, especially elaborating on the implementation of the application server and integration of WAP phones, classical telephones via voice gateways, PDAs and PCs. As a continuous example, we use the Uncle Enzo's Web shop application, which allows for ordering and payment of goods via the Internet, and later extend it to allow logon and viewing of the previous transactions through the different devices. This part is especially interesting for IT architects, consultants, and developers who face the challenge of actually implementing pervasive computing solutions.

Chapter 9: Server-side programming in Java

This chapter gives an overview of the concepts and technologies that we consider the most important in development of Web applications in general and pervasive computing Web applications in particular. We start with an overview of the Java 2 Enterprise Edition architecture, followed by a more detailed description of some key technologies, including Java Servlets, Enterprise Java Beans, and Java Server Pages. Given the importance of XML, we dedicate a major part of this chapter to this technology. We present technologies for building Web services that are based on XML, including the Simple Object Access Protocol (SOAP), and Universal Description, Discovery and Integration (UDDI). We conclude with an overview of the model-view-controller pattern and its use in the development of Web applications.

Chapter 10: Pervasive Web application architecture

In this chapter, we propose an architecture for pervasive computing applications that support multiple different devices like PCs, WAP phones, PDAs, and voice-only phones enabled to access Web servers through voice gateways. The architecture addresses the special problems associated with pervasive computing, such as diversity of devices, markup languages, and authentication methods. We especially show how pervasive computing applications based on this architecture can be secured.

Chapter 11: Example application

Here we present an example application that will be used to show how Java applications that adhere to the architecture presented in Chapter 10 can be extended to support different kinds of devices. As an example that is both simple and instructive, we chose a shopping application, including registration, login, a main menu, self-care, purchasing goods, and purchase history. The application is designed for an imaginary Italian restaurant named Uncle Enzo's that sells via the Internet. In the subsequent chapters, we will show how this application can be enabled for access from a PC using smart-card authentication, from WAP phones, from PDAs, and from a voice-only phone via a voice gateway.

Chapter 12: Access from PCs

In this chapter, we show how the shop application can be extended to allow for access from PCs, using a smart card for authentication via the Internet, as presented in Chapter 5. We explain how to implement the required components, including an authentication applet and the corresponding authentication servlet, and how to integrate them into the shop application. Finally, we present the controller for PC access and the Java Server Pages (JSPs) that it uses to interact with consumers.

Chapter 13: Access via WAP

This chapter demonstrates how the example application is extended to allow for access using mobile devices with a WAP browser, especially mobile phones. We describe how the functionality supported for WAP fits into the overall architecture and discuss the infrastructure needed to connect mobile devices to Uncle Enzo's application server. We provide some source code fragments for parts of the WAP-specific functionality of the example application. At the end of the chapter, we outline some extensions that improve speed or usability of Uncle Enzo's shop.

Chapter 14: Access from personal digital assistants

In this chapter, we show how users connecting to the Internet with a PDA can use the example application. We will do that in three steps. The first version of our application will simply synchronize the menu of Uncle Enzo's to the PDA. The user can use it as a reference and then order via the phone. In the second version, we will use a local database and native application to handle the menu and compose an order. The user will be connected only when synchronizing the data and submitting the order. In the third version, we will use the WAP to show the actual menu. The user will be connected while browsing the menu and submitting an order. The chapter is concluded with a comparison of all three approaches.

Chapter 15: Access via voice

With the steadily increasing computing power of PCs and advances in voice-recognition research, speech-recognition, and speech-synthesis software has now reached a level acceptable for commercial use. The fundamentals of speech recognition and speech synthesis are described in Chapter 7.

This chapter explains how an e-business application can communicate with users over a normal telephone line, and how a voice gateway is integrated into the sample application. The voice gateway processes and recognizes voice input to generate appropriate requests for application servers, and converts responses containing VoiceXML into voice output for the user. Finally, we show you how to enable the sample application from ordinary telephones via a voice gateway.
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)