IWS - The Information Warfare Site
News Watch Make a  donation to IWS - The Information Warfare Site Use it for navigation in case java scripts are disabled


"Mobile VPN", Alex Shneyderman/Alessio Casati, 2003, 0-471-21901-0,
%A Alex Shneyderman
%A Alessio Casati
%C 5353 Dundas Street West, 4th Floor, Etobicoke, ON M9B 6H8
%D 2003
%G 0-471-21901-0
%I John Wiley & Sons, Inc.
%O U$45.00/C$69.95/UK#33.50 416-236-4433 fax: 416-236-4448
%O http://www.amazon.com/exec/obidos/ASIN/0471219010/robsladesinterne
%O http://www.amazon.ca/exec/obidos/ASIN/0471219010/robsladesin03-20
%P 330 p.
%T "Mobile VPN"


Part one presents wireless data fundamentals. Chapter one gives an introduction to mobile virtual private networks (MVPN), and the emphasis on cellular technology points out that the authors are familiar with the telecommunications, rather than security, field of work. The material contains a weak suggestion that MVPNs may be useful, lots of alphabet soup, and very little in the way of conceptual background. The data networking technologies in chapter two are not explained very clearly: basic ideas get bogged down with details. Cellular radio interfaces are listed in chapter three, with data services that can be provided over cellular networks in chapter four.

Part two looks at MVPN and advanced wireless data services. MVPN fundamentals, in chapter five, basically reiterates the text from chapter two, with a little extra emphasis on virtual private networks. Chapter six describes various GSM (Global System for Mobile communications)/GPRS (General Packet Radio Service) and UMTS (Universal Mobile Telecommunication System) offerings. Options for CDMA2000 (Code Division Multiple Access) are listed in chapter seven. Chapter eight explains MVPN equipment components and requirements. Possible developments in mobile VPN are advanced in chapter nine.

This book once again emphasizes the divide not only between the cellular and wireless LAN camps, but also between communications and security. It fails to bring all the related technologies together between two covers. At the same time, for those in the LAN or security fields who need to know about cellular service offerings, this work does not provide a consistent level of explanation and depth of background for those issues. Possible utilities are tabulated, but these could be obtained from almost any cell company sales office.

copyright Robert M. Slade, 2003 BKMBLVPN.RVW 20030401