Title: Comparative Analysis of Wireless Internet Service
نویسندگان
چکیده
The Internet is unprecedented in its impact on the world community of industries, institutes, and individuals. Meanwhile, the world also became increasingly mobile. Both of the trends the success of the Internet and the growth of mobile communications created opportunity to add mobility to Internet accessibility. The convergence of wireless and the Internet is already underway. Wireless Internet is a form of data communications that allows mobile users to use their mobile handheld devices to access services and information through wireless and Internet network. Because of this definition, we excluded fixed wireless communications, satellite communications, and wireless LAN in our scope of study. Wireless Internet services are provided in some countries like Japan and the UK. Because wireless Internet service in Japan is regarded the world’s first successful case, the success of Japan relative to Europe has been covered in lots of articles [1][2]. In these articles, while Japanese case is dealt with in order to envision the future of wireless Internet service, they lack the implications for other countries. And, for the European case, many of the criticism are focused on WAP (Wireless Application Protocol) even though there may be other underlying factors that bring different outcomes between Japan and Europe. The study starts from the notion that comprehensive analysis of wireless Internet service will be helpful for the future development of wireless Internet service in many countries. The scope of the study is the wireless WAN Internet access provided in Japan and Europe because both cases are the most developed in the wireless Internet area. Finally, as a result of the study, we propose some critical success factors and implications for other countries.
منابع مشابه
A method to increasing the Quality of Service (QoS) in Wireless body area networks by providing a MAC layer Protocol based of Internet of Things
With the development of technology, the use of wireless telecommunication networks for the various affairs is essential. These networks are one of the safest and most widely used networks, for instance, in medical care and remote patient monitoring. What matters is the quality of service in these networks. The purpose of this paper is to increase packet transduction in a wireless body area netw...
متن کاملService Differentiation of IEEE 802.11e
The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...
متن کاملService Differentiation of IEEE 802.11e
The type of the applications for which Internet is being used has changed over the years. Multimedia applications, Real-time applications and Game playing require Quality of service. IEEE has proposed IEEE 802.11e, a quality of service extension to the wireless LAN standard IEEE 802.11. In this paper service differentiation ability of 802.11e is evaluated. Identical traffic is considered for al...
متن کاملThe Use of Data Envelopment Analysis in the Design of Internet Networks to Ensure the Quality of Service
Choosing a superior Internet network by users or providing a desirable Internet network by ISPs is always one of the important decision issues in this area. Choosing a unique optimal network from among the best networks is still a big challenge. The purpose of this paper is to use the data envelopment analysis (DEA) decision-making technique to evaluate the existing Internet networks in order t...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کامل