Title page for ETD etd-12072004-082613

Document Type Master's Dissertation
Author Croft, Neil John
URN etd-12072004-082613
Document Title The Interoperation of Wireless Technologies
Degree MSc (Computer Science)
Department Computer Science
Advisor Name Title
Prof M S Olivier
  • wireless
  • integration
  • security
  • XML
  • interoperation
  • UMTS
  • Location-Based Services
  • WLAN
  • GPRS
  • mobile
  • GSM
Date 2003-10-09
Availability unrestricted
Tremendous emphasis has been placed on wireless technologies recently and it is expected that mobile communications will become an even bigger key driver for growth and innovation in the near future.

The purpose of this paper is to study the securing, development, integration and implementation of an always on, always available, and accessible from anywhere secure wireless communication environment.

Our analysis of the different wireless technologies reveals that a number of obstacles have to be managed before truly transparent wireless public data consumer offering is available.

Our concern revolves around the technical development and implementation efforts of integrated wireless technologies enveloped with management processes of change and evolution. Wireless technologies have influenced our daily lives and will undoubtedly continue to play a significant role in the future.

This dissertation focuses on the interoperation of wireless technologies, exploring, evaluating and presenting representations of secure, fully integrated wireless environments. The purpose is to find a cost effective, open, viable, sustainable consumer orientated high data speed offering which not only adheres to basic security requirements but surpasses it. By bringing the network to the subscriber we generate an “always-on” and “always-available” solution for data requirements fulfilling an ever increasing human demand for access to resources anywhere, anytime.

A background literature of various wireless technologies, techniques and value added services is provided. An approach for the securing of critical content over wireless links in chapter seven provides a basis for access by position concepts presented in chapter eight. This secure approach to location-aware mobile access control is an essential security enhancement in the integration and interoperation models illustrated in chapter nine. These models, appropriately named SWARM 1 and SWARM 2 (System for Wireless and Roaming Mobility), illustrate different approaches to achieving a secure, fully coherent, consumer orientated, wireless data communications environment.

  Filename       Size       Approximate Download Time (Hours:Minutes:Seconds) 
 28.8 Modem   56K Modem   ISDN (64 Kb)   ISDN (128 Kb)   Higher-speed Access 
  00dissertation.pdf 1.28 Mb 00:05:54 00:03:02 00:02:39 00:01:19 00:00:06

Browse All Available ETDs by ( Author | Department )

If you have more questions or technical problems, please Contact UPeTD.