Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Mobile Multimedia Communications: Concepts, Applications, and Challenges

Mobile Multimedia Communications: Concepts, Applications, and Challenges
Author(s)/Editor(s): Gour Karmakar (Monash University, Australia)and Laurence S. Dooley (Monash University, Australia)
Copyright: ©2008
DOI: 10.4018/978-1-59140-766-9
ISBN13: 9781591407669
ISBN10: 1591407664
EISBN13: 9781591407683


View Mobile Multimedia Communications: Concepts, Applications, and Challenges on the publisher's website for pricing and purchasing information.


With rapid growth of the Internet, the applications of multimedia are burgeoning in every aspect of human life including communication networks and wireless and mobile communications.

Mobile Multimedia Communications: Concepts, Applications and Challenges captures defining research on all aspects and implications of the accelerated progress of mobile multimedia technologies. Covered topics include fundamental network infrastructures, modern communication features such as wireless and mobile multimedia protocols, personal communication systems, mobility and resource management, and security and privacy issues. A complete reference to topics driving current and potential future development of mobile technologies, this essential addition to library collections will meet the needs of researchers in a variety of related fields.


Mobile multimedia communication is increasingly in demand because of the basic need to communicate at any time, anywhere, using any technology. In addition, to voice communication, people have a desire to access a range of other services that comprise multimedia elements – text, image, animation, high fidelity audio and video using mobile communication networks. To meet these demands, mobile communication technologies has evolved from analog to digital, and the networks have passed through a number of generations from first generation (1G) to fourth generation (4G).

    Chapter 1 provides a brief description of the different generations of mobile communication networks including their standards, major services and transmission rates. The characteristics of 4G from a users’ point of view, as well as its major research challenges in terms of mobile terminals, network system and mobile services will also be presented in this chapter.

    With the rapid development of mobile communication systems, demands for the transmission of multimedia information using portable devices are increasing day by day. Chapter 2 demonstrates the effectiveness of transport layer handoff schemes for multimedia transmission, and is compared with that achieved by Mobile Internet Protocol (IP).

    Understating the parameters that determine the suitability of a communication standard for the transmission of multimedia information for a particular application is of paramount importance for mobile system designers, users and researchers. Chapter 3 describes multimedia applications needing the services of mobile network systems, and presents the fundamentals of issues involved in the delivery of multimedia content with the desired Quality of Service (QoS). Current and future challenges in achieving successful mobile multimedia information transmission are also discussed.

    The personalized communication system is gaining more importance with an increase of communication ways due to the social reform by the technological advancement. Chapter 4 introduces a Personalized System for Device Independent and Position Aware Communication, which is secure, scalable and an open architecture. This chapter also presents the further research in this field.

    The application of multimedia information in treatment or medical diagnosis using portable devices is proliferating with the development of mobile multimedia communication. Chapter 5 provides an overview of the existing therapy methods based on paper materials and mobile electronic devices in the current literature, and proposes the software solutions for the patients, the careers and the professional Speech and Language Therapists (SLTs), which could be accessible by mobile devices such as Personal Digital Assistants (PDA). Finally, the recommendations for the direction of future research and development are made in this chapter.

    As the mobile services play a role in the reforming of the social culture as well as creating a tremendous business opportunity, it is important to assess the acceptance of these services. The analysis and critical assessment of the existing theoretical acceptance models about the evolving mobile services and their underlying technologies is given in Chapter 6. Chapter 6 also introduces an acceptance model for mobile services in the bedrock of Technology Acceptance Model and recommends the further research directions.

    With the significant influence and increasing requirements of visual mobile communications in our day to day life, low bit-rate video coding to combat against the stringent bandwidth scarcity of the mobile-networks has become a prime research area in the recent time. Chapter 7 presents a review of the image and video coding techniques suitable for mobile communications to provide the readers with a means of appreciating the wealth and radical advancement of the field, and also attempts to enlist and sketch the physical significance of the various important and popular quality metrics of the image and video coding techniques.

    In the Orthogonal Frequency Division Multiplexing (OFDM) scheme, the total bandwidth can be split into many narrowband sub-channels. Therefore, it can avoid any multiple access interferences in the base station receiver, and use a subcarrier-specific adaptive modulation schemes. In Chapter 8, a flexible frequency division multiple access scheme based on OFDM-FDMA and a radio resource management (RRM) employing dynamic channel allocation techniques are developed.

    Ad-hoc network is another dimension of wireless networks, which has been a demanding field of research because of not having a predefined infrastructure. Wireless nodes are dynamically connected in an arbitrary manner to perform a particular emergency operation. This therefore, makes the routing of a message promising and challenging. The state-of-the-art, the contrast and comparisons, and the related research challenges of ad-hoc routing protocols have been articulated in Chapter 9.

    With the proliferation of network technologies, especially the wireless multimedia communication, Internet and sensor networks, the demand for ubiquitous computing is progressively rising in every aspect of human life, ranging from remotely controlling the home appliances, to security and health monitoring. The overview of ubiquitous networking including its infrastructure, its influence on human lives, its applications and services, and its global evolution are presented in Chapter 10.

    As with social security and privacy, the security and privacy of all wireless communication services is of paramount importance. Chapter 11 aims to present an overview of the security and privacy issues by highlighting the need to secure access to wireless networks and the loss that might accrue from the breach of a network. The vulnerabilities of the IEEE 802.11 and Bluetooth networks, as well as a paradigm for secure wireless networks are presented in this chapter.

    Portable devices such PDA and mobile sets are vulnerable to security threats because of their limited size and processing capabilities, openness and access to air interface. The security architecture of the mobile devices including the security policy, access control, and physical and storage protection are described in Chapter 12. Chapter 12 also articulates the security related to cellular communication networks, Wireless LAN and Bluetooth.

    The security of ad-hoc networks has been a difficult task to the recent research community due to a dynamic network topology, vulnerability of air interface to attacks, mobility of a node in any context and resource constraints. Chapter 13 provides the descriptions of various network layer security attacks of ad-hoc networks, as well as the security protocols that protect network layer from a number of attacks.

    Pervasive computing provides the computing and communication technology to integrate the everyday works based on the philosophy of existence everywhere, but access at the same time. Therefore, this poses some inherent limitations that make it even more vulnerable to security attacks than mobile computing. In Chapter 14, the state-of-the-art of pervasive security, privacy and trust, their challenges and requirements for pervasive applications, and some open issues related in this field have been described.

Finally, this book presents the state-of-the-art and research challenges of mobile computing and its next evolutionary step – ubiquitous and pervasive computing. In addition, the security issues related to these topics have also been elaborately depicted. Therefore, understanding these technologies help readers to have an in depth idea of mobile multimedia communication infrastructure and its current and future research.

Gour C. Karmakar and Laurence S. Dooley


Reviews and Testimonials

This book presents the state-of-the-art and research challenges of mobile computing and its next evolutionary step – ubiquitous and pervasive computing.

– Gour Karmakar, Monash University, Australia

The book is intended as a reference to topics driving current and potential future development of mobile technologies, and will be of use to students and professionals in a variety of related fields.

– Book News Inc. (2008)

Author's/Editor's Biography

Gour Karmakar (Ed.)
Gour C. Karmakar received the B.Sc. Engg. Degree in computer science and engineering from Bangladesh University of Engineering and Technology in 1993 and Masters and PhD degrees in information technology from the Faculty of Information Technology, Monash University in 1999 and 2003 respectively. He was with the Computer Division, Bangladesh Open University from 1994 to 1998. He is currently a Lecturer at the Gippsland School of Information Technology, Monash University, since December, 2002. He has published over 50 peer-reviewed research publications and was jointly awarded the IEEE Communications Society sponsored Outstanding Paper Prize at the 1st International Conference on Next Generation Wireless Systems (ICNEWS‘06). His research interest includes image and video processing, mobile and wireless sensor networks.

Laurence S. Dooley (Ed.)
Laurence S. Dooley received his B.Sc. (Hons), M.Sc. and Ph.D. degrees in Electrical Engineering from the University of Wales, Swansea in 1981, 1983 and 1987 respectively. From 1999 to 2006, he was a Professor of Multimedia Technology in the Faculty of Information Technology, Monash University, Australia. His major research interests are in multimedia signal processing, mobile communications, image/video object segmentation, bioinformatics, wireless sensor networks and R&D commercialisation strategies for regional small business. He has edited one book and published well over 170 international scientific peer-reviewed journals, book chapters and conference papers and was jointly awarded the IEEE Communications Society sponsored Outstanding Paper Prize at the 1st International Conference on Next Generation Wireless Systems (ICNEWS‘06) this year. He has successfully supervised 13 PhD/Masters research students as well as being in receipt of many external grants from both government and industry to support his multi-faceted research projects. He is a Senior Member of the IEEE, a Chartered Engineer (C.Eng), and a corporate member of the BCS.


Body Bottom