Wireless Networking Complete

Wireless Networking Complete

von: Pei Zheng, Larry L. Peterson, Bruce S. Davie

Elsevier Trade Monographs, 2009

ISBN: 9780123785701 , 444 Seiten

Format: PDF, ePUB, OL

Kopierschutz: DRM

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Apple iPod touch, iPhone und Android Smartphones Online-Lesen für: Windows PC,Mac OSX,Linux

Preis: 65,95 EUR

Mehr zum Inhalt

Wireless Networking Complete


 

Front Cover

1

Wireless Networking Complete

6

Copyright Page

7

Contents

8

About This Book

16

About the Authors

18

Chapter 1 Supporting Wireless Technologies

22

1.1. The Frequency Spectrum

22

1.1.1 Public Media Broadcasting

25

1.1.2 Cellular Communication

25

1.1.3 Wireless Data Communication

26

1.1.4 Other Fixed or Mobile Wireless Communications

27

1.2. Wireless Communication Primer

27

1.2.1 Signal Propagation

27

1.2.2 Modulation

30

1.2.3 Multiplexing

32

1.3. Spread Spectrum

33

1.3.1 Direct-Sequence Spread Spectrum

34

1.3.2 Frequency-Hopping Spread Spectrum

34

1.3.3 Orthogonal Frequency-Division Multiplexing

35

1.4. Global System for Mobile and General Packet Radio Service

36

1.4.1 Global System for Mobile

36

1.4.2 General Packet Radio Service

41

1.5. Code-Division Multiple Access

45

1.5.1 Code-Division Multiple Access Concept

45

1.5.2 IS-95

46

1.5.3 Software Handoff

47

1.5.4 Road to 4G

48

1.6. GSM Versus CDMA

49

1.7. 3G Cellular Systems

50

1.7.1. UMTS/WCDMA Versus cdma2000

51

1.7.2. UMTS/WCDMA

51

1.7.3. cdma2000

52

1.7.4. 4G Cellular Systems

54

1.8. 2G Mobile Wireless Services

55

1.8.1 WAP and iMode

55

1.8.2 Short Message Service

56

1.9. Wireless Technologies Landscape

57

1.10. 802.11 Wireless LANs

58

1.10.1 Architecture and Protocols

59

1.10.2 Frame Format

62

1.10.3 Beacon Frame

64

1.10.4 Roaming in a Wireless LAN

64

1.10.5 IEEE 802.11 Family

66

1.10.6 Security in Wireless LANs

68

1.11. Bluetooth

68

1.11.1 Architecture and Protocols

68

1.11.2 Bluetooth Overview

68

1.11.3 Bluetooth Architecture

69

1.11.4 Radio and Baseband

70

1.11.5 L2CAP and Frame Format

72

1.11.6 RFCOMM

73

1.11.7 SDP

73

1.11.8 Bluetooth Evolution

74

1.12. Ultra-Wideband

74

1.12.1 UWB Standards

76

1.12.2 UWB Applications

76

1.13. Radio-Frequency Identification

77

1.13.1 RFID System

77

1.13.2 RFID Applications

79

1.14. Wireless Metropolitan Area Networks

81

1.14.1 Wireless Broadband: IEEE 802.16

82

1.14.2 WiMax

83

1.15. Satellite

85

1.15.1 Satellite Communication

85

1.15.2 Satellite Systems

85

1.16. Wireless Sensor Networks

86

1.16.1 WSN Applications

87

1.16.2 Wireless Sensor Node

88

1.16.3 Self-Organized Networks

89

1.16.4 ZigBee

90

1.17. Standardization in the Wireless World

91

1.17.1 Cellular Standard Groups

92

1.17.2 IEEE Standards

92

1.17.3 Standards War

94

1.18. Summary

94

Further Reading

95

Chapter 2 Wireless Networks

98

2.1 Bluetooth (802.15.1)

100

2.2 Wi-Fi (802.11)

102

2.2.1 Physical Properties

102

2.2.2 Collision Avoidance

103

2.2.3 Distribution System

104

2.2.4 Frame Format

106

2.3 WiMAX (802.16)

107

2.4 Cell Phone Technologies

108

Further Reading

111

Chapter 3 An Overview of Wireless Systems

114

3.1 Introduction

114

3.2 First- and Second-Generation Cellular Systems

115

3.3 Cellular Communications from 1G to 3G

118

3.4 Road Map for Higher Data Rate Capability in 3G

121

3.5 Wireless 4G Systems

124

3.6 Future Wireless Networks

127

3.7 Standardization Activities for Cellular Systems

128

3.8 Summary

130

Problems

130

References

130

Chapter 4 Wireless Application Protocol

132

4.1 Introduction

132

4.2 WAP and the World Wide Web (WWW)

132

4.3 Introduction to Wireless Application Protocol

133

4.4 The WAP Programming Model

134

4.4.1 The WWW Model

135

4.4.2 The WAP Model

135

4.5 WAP Architecture

137

4.5.1 Wireless Application Environment

138

4.5.2 Wireless Telephony Application

139

4.5.3 Wireless Session Protocol

140

4.5.4 Wireless Transaction Protocol

141

4.5.5 Wireless Transport Layer Security

142

4.5.6 Wireless Datagram Protocol

142

4.5.7 Optimal WAP Bearers

143

4.6 Traditional WAP Networking Environment

144

4.7 WAP Advantages and Disadvantages

145

4.8 Applications of WAP

147

4.9 imode

148

4.10 imode Versus WAP

149

4.11 Summary

150

Problems

150

References

151

Chapter 5 Wireless Local Area Networks

152

5.1 Introduction

152

5.2 WLAN Equipment

155

5.3 WLAN Topologies

156

5.4 WLAN Technologies

157

5.4.1 IR Technology

157

5.4.2 UHF Narrowband Technology

158

5.4.3 Spread Spectrum Technology

159

5.5 IEEE 802.11 WLAN

160

5.5.1. IEEE 802.11 Architecture

160

5.5.2. 802.11 Physical Layer (PHY)

162

5.5.3. IEEE 802.11 Data Link Layer

174

5.5.4. IEEE 802.11 Medium Access Control

174

5.5.5. IEEE 802.11 MAC Sublayer

180

5.6 Joining an Existing Basic Service Set

182

5.7 Security of IEEE 802.11 Systems

184

5.8 Power Management

185

5.9 IEEE 802.11b—High-Rate DSSS

185

5.10 IEEE 802.11n

186

5.11 Other WLAN Standards

189

5.11.1 HIPERLAN Family of Standards

189

5.11.2 Multimedia Access Communication—High-Speed Wireless Access Network

194

5.12 Performance of a Bluetooth Piconet in the Presence of IEEE 802.11 WLANs

196

5.12.1 Packet Error Rate (PER) from N Neighboring Bluetooth Piconets

197

5.12.2 PER from M Neighboring IEEE 802.11 WLANs

198

5.12.3 Aggregated Throughput

198

5.13 Interference Between Bluetooth and IEEE 802.11

199

5.14 IEEE 802.16

202

5.15 World Interoperability for MicroAccess, Inc. (WiMAX)

204

5.15.1 WiMAX PHY

207

5.15.2 WiMAX Media Access Control (MAC)

208

5.15.3 Spectrum Allocation for WiMAX

209

5.16 Summary

210

Problems

210

References

212

Chapter 6 Fourth-Generation Systems and New Wireless Technologies

214

6.1. Introduction

214

6.2. 4G Vision

216

6.3. 4G Features and Challenges

216

6.4. Applications of 4G

218

6.5. 4G Technologies

221

6.5.1 Multicarrier Modulation

221

6.5.2 Smart Antenna Techniques

222

6.5.3 OFDM–MIMO Systems

226

6.5.4 Adaptive Modulation and Coding with Time-Slot Scheduler

226

6.5.5 Bell Labs Layered Space Time (BLAST) System

227

6.5.6 Software-Defined Radio

230

6.5.7 Cognitive Radio

232

6.6. Summary

233

Problems

233

References

234

Chapter 7 Mesh Networks: Optimal Routing and Scheduling

236

7.1 Overview

236

7.2 Network Topology and Link Activation Constraints

237

7.2.1 Link Activation Constraints

237

7.3 Link Scheduling and Schedulable Region

240

7.3.1 Stability of Queues

243

7.3.2 Link Flows and Link Stability Region

247

7.4 Routing and Scheduling a Given Flow Vector

250

7.5 Discussion

256

7.6 Maximum Weight Scheduling

257

7.6.1 Multicommodity Flow Criteria

259

7.6.2 Lyapunov Stability of a Network of Queues

259

7.6.3 The Algorithm and Its Analysis

260

7.6.4 Discussion

266

7.7 Routing and Scheduling for Elastic Traffic

266

7.7.1 Fair Allocation for Single Hop Flows

270

7.7.2 Fair Allocation for Multihop Flows

273

7.8 Discussion

278

7.9 Notes on the Literature

280

Problems

281

References

282

Chapter 8 Ad Hoc Wireless Sensor Networks

284

8.1 Overview

286

8.2 Communication Coverage

286

8.3 Discussion

287

8.4 Sensing Coverage

288

8.5 Discussion

294

8.6 Localization

295

8.6.1 Convex Position Estimation

297

8.7 Discussion

300

8.7.1 Routing

300

8.7.2 Attribute-Based Routing

305

8.8 Function Computation

307

8.9 Discussion

314

8.10 Scheduling

315

8.10.1 S-MAC

316

8.10.2 IEEE 802.15.4 (Zigbee)

318

8.11 Notes on the Literature

319

Problems

320

References

321

Chapter 9 Sensor Network Platforms and Tools

324

9.1 Sensor Node Hardware

325

9.1.1 Berkeley Motes

326

9.2 Sensor Network Programming Challenges

328

9.3 Node-Level Software Platforms

330

9.3.1 Operating System: TinyOS

331

9.3.2 Imperative Language: nesC

334

9.3.3 Dataflow-Style Language: TinyGALS

340

9.4 Node-Level Simulators

345

9.4.1 The ns-2 Simulator and Its Sensor Network Extensions

347

9.4.2 The Simulator TOSSIM

348

9.5 Programming Beyond Individual Nodes: State-Centric Programming

349

9.5.1 Collaboration Groups

350

9.5.2 PIECES: A State-Centric Design Framework

353

9.5.3 Multitarget Tracking Problem Revisited

356

9.6 Summary

361

References

361

Chapter 10 Mobile IP

366

10.1 The Requirements of Mobile IP

366

10.2 Extending the Protocols

368

10.3 Reverse Tunneling

370

10.4 Security Concerns

372

Further Reading

372

Chapter 11 Mobile IPv6

374

11.1 Introduction

374

11.2 Mobile IPv6 Overview

375

11.2.1 Types of Nodes

376

11.2.2 Basic Operation of Mobile IPv6

377

11.3 Header Extension

381

11.3.1 Alignment Requirements

382

11.3.2 Home Address Option

382

11.3.3 Type 2 Routing Header

383

11.3.4 Mobility Header

385

11.3.5 Mobility Options

393

11.3.6 Neighbor Discovery Messages

396

11.3.7 ICMPv6 Messages

398

11.4 Procedure of Mobile IPv6

402

11.4.1 Protocol Constants and Variables

402

11.4.2 Home Registration

402

11.4.3 Bi-Directional Tunneling

406

11.4.4 Intercepting Packets for a Mobile Node

408

11.4.5 Returning Home

408

11.5 Route Optimization

411

11.5.1 Return Routability

412

11.5.2 Sending Initial Messages

412

11.5.3 Responding to Initial Messages

413

11.5.4 Computing a Shared Secret

415

11.5.5 Verifying Message

416

11.5.6 Security Considerations

417

11.5.7 De-Register Binding for Correspondent Nodes

418

11.5.8 Backward Compatibility

418

11.6 Movement Detection

420

11.7 Dynamic Home Agent Address Discovery

420

11.8 Mobile Prefix Solicitation/Advertisement

421

11.9 Relationship with IPsec

425

References

427

Chapter 12 Security and Survivability of Wireless Systems

428

12.1 Introduction

428

12.2 Background

429

12.3 Current Security Approaches in Wireless Networks

432

12.4 Current Survivability Approaches in Wireless Networks

433

12.5 Framework for Wireless Network Survivability and Security

434

12.6 Interaction Between Survivability and Security in Wireless Networks

438

12.6.1 Extending the Framework to Include Interactions Between Security and Survivability

439

12.6.2 Case Study I: Idle Handoffs

442

12.6.3 Case Study II: Key Management in Heterogeneous Sensor Networks

443

12.7 Conclusion

450

References

451

Index

454

A

454

B

455

C

455

D

456

E

456

F

457

G

457

H

457

I

458

J

459

K

459

L

459

M

459

N

461

O

461

P

461

Q

462

R

462

S

462

T

464

U

464

V

464

W

464

X

466

Z

466