Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000004727974 | TK5103.2 A354 2005 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Wireless and Mobile Data Networks provides a single point of knowledge about wireless data technologies, including:
* Comprehensive easy-to understand resource on wireless data technologies
* Includes wireless media, data transmission via cellular networks, and network security
* Provides a single point of knowledge about wireless data
* Focuses on wireless data networks, wireless channels, wireless local networks, wide area cellular networks and wireless network security
An Instructor Support FTP site is available from the Wiley editorial department.
Author Notes
Aftab Ahmad is Associate Professor of Computer Science at Norfolk State University.
Reviews 1
Choice Review
This work provides an overview of network architectures and standards used in the design of wireless and mobile data networks. Ahmad (Norfolk State Univ.) describes the various types of wireless data networks (personal, local, metropolitan, wide-area), network architectures, and wireless local area network (WLAN) components. Next, he discusses the physical layer standards and medium access control (MAC) layer standards of WLAN, Internet Protocols, Third Generation (3G) cellular systems such as Wideband Code Division Multiple Access (W-CDMA) and CDMA 2000, routing in ad hoc networks, security issues, IEEE 802.11 WLAN standards, Bluetooth and Ultra-Wideband (UWB) personal area networks and broadband wireless access schemes such as WiMAX. The book is well written and illustrated; numerous references are cited. However, no homework problems are included at the end of the chapters. For libraries associated with academic programs in computer science and electrical engineering. ^BSumming Up: Recommended. Upper-division undergraduates through professionals. F. A. Cassara Polytechnic University
Table of Contents
Preface | p. xxv |
Acknowledgments | p. xxix |
1 Wireless Data-Introduction | p. 1 |
1.1 Wireless Voice | p. 2 |
1.1.1 Fixed Minimum Bandwidth | p. 2 |
1.1.2 Vague Definition of Service Quality | p. 3 |
1.1.3 Delay Requirements | p. 4 |
1.2 Wireless Local Area Networks (WLANs) | p. 5 |
1.2.1 Ad Hoc WLAN | p. 5 |
1.2.2 Infrastructure WLAN | p. 6 |
1.3 Wide Area Cellular Networks | p. 7 |
1.4 Fixed Wireless Networks | p. 8 |
1.5 Personal Area Networks | p. 10 |
1.6 Satellite-Based Data Networks | p. 10 |
1.7 Mobile IP | p. 12 |
1.8 The Wireless Spectrum | p. 13 |
1.8.1 Licensed and License-Free Bands | p. 14 |
1.8.2 Low-Power Wireless Data Systems | p. 14 |
1.8.3 Ultra-Wide Band (UWB) | p. 14 |
1.8.4 The ISM Band | p. 15 |
1.8.5 U-NII Spectrum | p. 16 |
1.8.6 Cellular Systems' Spectrum | p. 16 |
1.8.7 Fixed Wireless Systems | p. 17 |
1.8.8 Wireless Metropolitan Area Networks (WMAN) | p. 20 |
1.8.9 Satellite Data Communications | p. 20 |
References | p. 21 |
2 Reference Architectures for Wireless Data Networks | p. 23 |
2.1 Bluetooth | p. 24 |
2.1.1 Bluetooth Radio | p. 25 |
2.1.2 Baseband Layer | p. 26 |
2.1.3 Link Management Protocol (LMP) | p. 26 |
2.1.4 Logical Link Control and Adaptation Protocol Layer (L2CAP) | p. 26 |
2.1.5 Bluetooth Profiles | p. 26 |
2.2 IEEE 802.11 | p. 27 |
2.2.1 Physical Layer (PHY) | p. 29 |
2.2.2 Medium Access Control (MAC) Sublayer | p. 30 |
2.2.3 Layer and Station Management Planes | p. 31 |
2.3 HIPERLAN/2 | p. 32 |
2.3.1 Physical Layer | p. 32 |
2.3.2 Data Link Control Layer | p. 33 |
2.3.3 Convergence Layer (CL) | p. 34 |
2.4 Broadband Wireless Access Networks | p. 35 |
2.4.1 The User Plane | p. 36 |
2.4.2 MAC Layer | p. 36 |
2.4.3 PHY | p. 37 |
2.4.4 IEEE 802.16a | p. 37 |
2.4.5 Mobile Broadband Wireless Access (MBWA) Network | p. 38 |
2.5 Cellular Data Networks | p. 38 |
2.5.1 North American and European Cellular Networks | p. 38 |
2.5.2 Voice-Grade Modems | p. 39 |
2.5.3 Relative Look at Cellular Network Generations | p. 40 |
2.5.4 Core Network | p. 42 |
2.6 Summary | p. 43 |
References | p. 43 |
3 Components of A Wireless Lan | p. 47 |
3.1 Local Area Networks (LANs) | p. 48 |
3.1.1 LAN Interconnection (Topology) | p. 49 |
3.1.2 Addressing Mechanisms | p. 50 |
3.1.3 Medium Specification | p. 50 |
3.1.4 Physical Layer Mechanisms | p. 51 |
3.1.5 Data Link Control Layer | p. 51 |
3.1.6 Traffic Differentiation | p. 51 |
3.1.7 WAN/LAN Connection | p. 51 |
3.2 Wireless LAN Components | p. 52 |
3.2.1 Physical Layer Components | p. 52 |
3.2.2 Medium Access Control (MAC) Layer Components | p. 58 |
3.2.3 Logical Link Control (LLC) Layer | p. 66 |
References | p. 66 |
4 WLANs: The Physical Layer | p. 67 |
4.1 IEEE 802.11 Standards Suite | p. 68 |
4.1.1 Station Types | p. 68 |
4.1.2 Channel Media | p. 69 |
4.1.3 Physical Links | p. 69 |
4.1.4 Signal Conditioning | p. 70 |
4.1.5 IEEE 802.11g PHY | p. 70 |
4.2 Interference Rejection Using Barker Sequence, OFDM and CCK | p. 72 |
4.2.1 11-Bit Barker Sequence | p. 73 |
4.2.2 Orthogonal Frequency Division Multiplexing (OFDM) | p. 75 |
4.2.3 Complementary Code Keying (CCK) | p. 76 |
4.2.4 PHY Data Transmission | p. 77 |
4.3 HIPERLAN PHY | p. 79 |
4.3.1 Station Types | p. 81 |
4.3.2 Channel Media | p. 81 |
4.3.3 Signal Conditioning | p. 81 |
4.3.4 Modulation and Coding | p. 81 |
4.3.5 Data Transmission, Convergence and Rate Selectivity | p. 82 |
4.3.6 PHY Management | p. 82 |
4.4 Summary | p. 83 |
References | p. 83 |
5 WLANs: Medium Access Control | p. 85 |
5.1 IEEE 802.11 Medium Access Control | p. 86 |
5.1.1 Network Configurations | p. 86 |
5.1.2 Channel Access in IEEE 802.11 | p. 86 |
5.1.3 Channel Sensing | p. 87 |
5.1.4 Collision Avoidance | p. 88 |
5.1.5 Multiple Access in IEEE 802.11 | p. 89 |
5.1.6 DCF Transmission | p. 91 |
5.1.7 PCF Transmission | p. 92 |
5.1.8 User and Data Privacy | p. 92 |
5.1.9 Power Management | p. 94 |
5.1.10 Fragmentation | p. 95 |
5.1.11 Multimedia Support | p. 95 |
5.2 IEEE 802.11e factor | p. 95 |
5.2.1 Enhanced Station | p. 96 |
5.2.2 Hybrid Coordinator | p. 96 |
5.2.3 Enhanced DCF (EDCF) | p. 96 |
5.2.4 Hybrid Coordination Function (HCF) | p. 97 |
5.3 Routing and Mobility Support | p. 98 |
5.3.1 No Transition | p. 98 |
5.3.2 BSS Transition | p. 98 |
5.3.3 ESS Transition | p. 98 |
5.4 MAC Layer Management | p. 99 |
5.5 MAC Frames | p. 99 |
5.6 Multicasting Capability | p. 100 |
5.7 HIPERLAN MAC | p. 100 |
5.7.1 Network Configuration | p. 100 |
5.7.2 Channel Access | p. 101 |
5.7.3 Multiple Access | p. 102 |
5.8 HIPERLAN 2 | p. 103 |
5.8.1 Channel Access | p. 103 |
5.8.2 Multiple Access | p. 103 |
5.8.3 Broadcast Phase | p. 103 |
5.8.4 Downlink Phase | p. 104 |
5.8.5 Uplink Phase | p. 104 |
5.8.6 Direct Link | p. 104 |
5.8.7 Random Access Phases | p. 104 |
5.9 User and Data Privacy | p. 104 |
5.10 Power Management | p. 105 |
5.11 Multimedia Services | p. 105 |
5.12 Routing | p. 106 |
5.13 Mobility Support | p. 107 |
5.14 MAC Frame | p. 107 |
5.15 Teleconferencing Capability | p. 108 |
5.16 Data Link Control (DLC) Layer | p. 109 |
References | p. 109 |
6 Mobility and Internet Protocols | p. 113 |
6.1 Mobility in Internet Applications | p. 114 |
6.1.1 Reconnectivity | p. 114 |
6.1.2 Portability | p. 114 |
6.1.3 Micromobility | p. 115 |
6.2 Internet Protocols for Mobility | p. 117 |
6.3 Session Initiation Protocol (SIP) | p. 117 |
6.3.1 SIP versus H.323 and HTTP | p. 117 |
6.3.2 SIP Provisions | p. 118 |
6.3.3 SIP Request Types | p. 118 |
6.3.4 SIP Response Types | p. 120 |
6.3.5 SIP Operation | p. 120 |
6.3.6 SIP and Cellular Networks | p. 121 |
6.3.7 SIP and 3GPP, 3GPP2 | p. 123 |
6.4 Mobile IP | p. 123 |
6.4.1 Mobile IP Components | p. 124 |
6.4.2 Agent Discovery | p. 125 |
6.4.3 Registration | p. 125 |
6.4.4 De-registration | p. 125 |
6.4.5 Care-of Address (CoA) | p. 126 |
6.4.6 Tunneling | p. 126 |
6.4.7 Mobile IP Usage Scenario | p. 127 |
6.4.8 Security Measures in Mobile IP | p. 129 |
6.4.9 Limitations of Mobile IP | p. 129 |
6.4.10 Mobile IP Messages | p. 132 |
6.4.11 Internet Standards for Cellular Networks | p. 132 |
6.5 Mobility Management in an Access Network | p. 133 |
6.5.1 Address Allocation | p. 133 |
6.5.2 Data Communications | p. 133 |
6.5.3 Mobility | p. 134 |
6.6 Cellular IP | p. 134 |
6.6.1 Components of a Cellular IP System | p. 135 |
6.6.2 cIP Usage Scenario | p. 136 |
6.6.3 cIP and Mobile IP | p. 138 |
6.7 IPv6 and Mobility Management | p. 139 |
6.7.1 Expanded Address Space | p. 139 |
6.7.2 Efficient HA Registration | p. 139 |
6.7.3 Autoconfiguration of IP Addresses | p. 139 |
6.7.4 Mobility Detection | p. 140 |
6.7.5 Optimized Routing | p. 140 |
6.7.6 Security | p. 140 |
6.7.7 Micromobility | p. 141 |
6.7.8 Network Support for Application-Level Mobile IPv6 | p. 141 |
6.7.9 Internet and Cellular Networking | p. 141 |
References | p. 142 |
7 Data Communications in Cellular Networks: CDMA2000 | p. 145 |
7.1 Business Wireless Data Networks | p. 146 |
7.1.1 Cellular Digital Packet Data (CDPD) Network | p. 147 |
7.1.2 ARDIS | p. 147 |
7.1.3 RAM Data Networks | p. 147 |
7.2 Cellular Data Networks | p. 148 |
7.2.1 Cooperation Explosion | p. 148 |
7.2.2 3G Air Interfaces | p. 149 |
7.2.3 UMTS Terrestrial Radio Access (UTRA) | p. 151 |
7.3 Release D for cdma2000 Based Access | p. 151 |
7.3.1 Fast Call Setup (FCS) | p. 152 |
7.3.2 Mobile Equipment Identifier (MEID) | p. 152 |
7.3.3 Broadcast and Multicast Services (BCMCS) | p. 153 |
7.4 cdma2000 Standard | p. 153 |
7.4.1 CDMA Timescale | p. 155 |
7.4.2 Physical Layer (PHY) | p. 155 |
7.5 cdma2000 Medium Access Control | p. 160 |
7.5.1 Mux and QoS (MaQ) Sublayer | p. 162 |
7.5.2 Access Channel Procedures | p. 162 |
7.5.3 Packet Data Channel Control Functions (PDCHCF) | p. 163 |
7.6 All-IP Architecture | p. 164 |
7.6.1 Networking Elements | p. 164 |
7.6.2 Planar Architecture | p. 166 |
7.7 Summary | p. 169 |
References | p. 170 |
8 Data Communications in Cellular Networks: W-CDMA | p. 173 |
8.1 Components of the UMTS Network | p. 174 |
8.2 UMTS Network Domains | p. 175 |
8.2.1 UE Domain | p. 176 |
8.2.2 Infrastructure Domain | p. 176 |
8.3 Strata | p. 177 |
8.4 Radio Access Network (RAN) | p. 177 |
8.4.1 Transport and Logical Channels | p. 178 |
8.4.2 Physical Layer (PHY) | p. 178 |
8.5 UMTS Services | p. 179 |
8.6 Improvements Over Release 99 | p. 179 |
8.7 IMS System Concepts | p. 185 |
8.7.1 Internet Multimedia Core Network (IM-CN) | p. 186 |
8.7.2 IP Connectivity Access Network (IP-CAN) | p. 186 |
8.7.3 Terminals | p. 186 |
8.8 Session Layer Architecture | p. 186 |
8.8.1 Interrogation CSCF (I-CSCF) | p. 186 |
8.8.2 Proxy CSCF (P-CSCF) | p. 187 |
8.8.3 Server CSCF (S-CSCF) | p. 187 |
8.8.4 Home Subscriber Server (HSS) | p. 187 |
8.8.5 Media Gateways and Associated Control Functions (MGW, MGCF, SGW, BGCF) | p. 187 |
8.8.6 Media Resource Functions (MRF) | p. 188 |
8.9 Open Service Access (OSA) | p. 188 |
8.9.1 OSA Interfaces | p. 188 |
8.9.2 OSA Functions | p. 190 |
8.10 Parlay | p. 191 |
8.10.1 Parlay Background | p. 191 |
8.11 IPv4/IPv6 Scenarios Towards All-IP Infrastructure | p. 192 |
8.11.1 GPRS Scenarios | p. 192 |
8.11.2 IMS Scenarios | p. 194 |
8.12 3GPP Release 6 Objectives | p. 194 |
8.13 Summary | p. 194 |
References | p. 195 |
9 Security in Wireless Data Networks | p. 197 |
9.1 Ascribing Security to a Network | p. 198 |
9.1.1 Why Are Wireless Network Devices a Bigger Challenge? | p. 199 |
9.2 Security Network Architecture | p. 199 |
9.2.1 Securing a Standalone Device | p. 201 |
9.2.2 Securing a Networked Device | p. 201 |
9.2.3 Securing a Wireless Networked Device | p. 202 |
9.3 Secure Operating System (SOS) | p. 203 |
9.4 Components of Security System | p. 205 |
9.4.1 Protocols | p. 206 |
9.4.2 Algorithms | p. 207 |
9.4.3 Examples of Encryption Algorithms | p. 211 |
9.4.4 Hash Algorithms | p. 213 |
9.4.5 Examples of Hash Algorithms | p. 214 |
9.4.5 Key | p. 215 |
9.5 Wireline Equivalent Privacy (WEP) | p. 221 |
9.5.1 WEP Architecture | p. 221 |
9.5.2 WEP Vulnerabilities | p. 222 |
9.6 Wi-Fi Protected Access (WPA) | p. 223 |
9.6.1 Temporal Key Integrity Protocol (TKIP) | p. 223 |
9.6.2 TKIP Encapsulation Process | p. 225 |
9.6.3 WPA Authentication | p. 226 |
9.7 IEEE 802.11i | p. 227 |
9.7.1 Master Key (MK) | p. 227 |
9.7.2 Pairwise Master Key (PMK) | p. 228 |
9.7.3 Pairwise Transient Key (PTK) | p. 228 |
9.7.4 IEEE 802.11i and WPA | p. 229 |
9.8 Security in Cellular Networks | p. 229 |
9.8.1 WCDMA Security Architecture | p. 230 |
9.8.2 Security in cdma2000 | p. 232 |
9.9 Final Word | p. 233 |
9.9.1 Alternative View | p. 234 |
References | p. 235 |
10 Routing in Wireless LANs | p. 239 |
10.1 Routing in Infrastructure Networks | p. 240 |
10.2 Ad Hoc Wireless Networks | p. 241 |
10.2.1 Characteristics of MANETs | p. 242 |
10.2.2 Goals of the IETF MANET Working Group | p. 242 |
10.2.3 Sources of Failure in MANETs | p. 242 |
10.3 Characteristics of a Good Routing Protocol | p. 243 |
10.3.1 Performance Metrics | p. 243 |
10.3.2 Networking Context | p. 243 |
10.4 Classifications of Routing Protocols | p. 244 |
10.4.1 Pro-Active and Reactive Routin | p. 244 |
10.4.2 Link State Versus Distance Vector | p. 244 |
10.5 Routing Phases | p. 245 |
10.6 Routing Mechanisms | p. 245 |
10.6.1 Zone Routing Protocol (ZRP) | p. 245 |
10.6.2 Dynamic Source Routing (DSR) | p. 246 |
10.6.3 Destination Sequenced Distance Vector (DSDV) | p. 247 |
10.6.4 Ad Hoc On-Demand Distace Vector Routing (AODV) | p. 247 |
10.6.5 Temporally Ordered Routing Algorithm (TORA) | p. 247 |
10.6.6 Wireless Routing Protocol (WRP) | p. 247 |
10.6.7 Mobile Multimedia Wireless Network (MMWN) | p. 248 |
10.6.8 Transmission Power Optimization | p. 248 |
10.6.9 Load Distribution Protocols | p. 249 |
10.6.10 SPAN Protocol | p. 249 |
10.6.11 Geographic Adaptive Fidelity (GAF) | p. 249 |
10.6.12 Prototype Embedded Network (PEN) | p. 249 |
10.7 Performance Comparison | p. 249 |
10.8 Multicasting | p. 250 |
10.8.1 Mobility Support Using Multicast IP (MSM-IP) | p. 250 |
10.8.2 Multicast Routing in MANETs | p. 251 |
10.9 Dynamic Source Routing (DSR) Protocol | p. 251 |
10.9.1 Protocol Operation | p. 251 |
10.9.2 Flow State Option | p. 256 |
10.9.3 DSR Packet | p. 256 |
10.10 Selecting the Best Route | p. 256 |
10.10.1 Topology of Fixed Ad-Hoc Networks | p. 257 |
10.10.2 Effect of Mobility | p. 258 |
10.10.3 Residual Battery | p. 262 |
10.10.4 Example of Application of Above Results | p. 263 |
10.10.5 Discussion | p. 265 |
10.11 WLAN Routing Through Cellular Network Infrastructure | p. 266 |
10.11.1 Introduction to OWLAN | p. 266 |
10.11.2 Design Objectives | p. 266 |
10.11.3 OWLAN System Architecture | p. 267 |
10.11.4 System Elements | p. 267 |
10.11.5 System Operation | p. 269 |
10.12 Routing in Personal Area Networks | p. 270 |
10.13 Summary | p. 270 |
References | p. 271 |
11 Wireless Personal Area Networks and Ultrawide Band Communications | p. 275 |
11.1 Wireless Personal Area Networks (WPANs) | p. 276 |
11.2 Terminology for WPANs | p. 278 |
11.3 IEEE 802.15.1 Standard | p. 278 |
11.3.1 Bluetooth Components | p. 279 |
11.3.2 Bluetooth Network Operation | p. 282 |
11.3.3 Bluetooth Summary | p. 285 |
11.4 Higher Data Rate PANs (IEEE 802.15.3) | p. 285 |
11.4.1 High-Data-Rate Piconet (HDR-PN) | p. 285 |
11.4.2 Medium Access Control (MAC) Layer | p. 287 |
11.4.3 IEEE 802.15.3 Physical Layer (PHY) | p. 288 |
11.5 Ultra Wideband (UWB) Spectrum | p. 290 |
11.5.1 UWB PHY for IEEE 802.15.3a | p. 291 |
11.5.2 DS-UWB (Direct Sequence-Ultra Wideband) | p. 292 |
11.5.3 Multi-Band OFDM PHY Proposal | p. 293 |
11.6 Low Data Rate WPANs (LR-WPANs) and IEEE 802.15.4 | p. 295 |
11.6.1 Network Configuration | p. 297 |
11.6.2 LR-PAN Physical Layer (PHY) | p. 298 |
11.6.3 LR-PAN Medium Access Control (MAC) | p. 299 |
11.6.4 Data Transfer Modes | p. 301 |
11.6.5 MAC Frames | p. 302 |
11.6.6 MAC Security | p. 303 |
11.7 Summary | p. 303 |
References | p. 303 |
12 Broadband Wireless Access (BWA) | p. 305 |
12.1 Line-of-Site (LoS) and Non-Line-of-Site (NLoS) Systems | p. 307 |
12.2 Effect of Antenna Type | p. 308 |
12.3 BWA Spectrum | p. 308 |
12.4 BRAN versus WirelessMAN | p. 309 |
12.5 IEEE WirelessMAN | p. 311 |
12.5.1 WirelessMAN Station Types | p. 312 |
12.5.2 Network Topologies | p. 312 |
12.5.3 WirelessMAN Protocol Architecture | p. 314 |
12.5.4 MAC Sublayer | p. 314 |
12.5.5 WirelessMAN PHYs | p. 323 |
12.5.6 WMAN PHY (10-66GHz) | p. 323 |
12.6 IEEE 802.20 Mobile Broadband Wireless Access (MBWA) | p. 328 |
12.6.1 Objevtives | p. 330 |
12.7 Cellular and Satellite Networks as Wireless Local Loops (WLL)s | p. 330 |
References | p. 331 |
Appendix Overview and Guide to the IEEE 802 LMSC | p. 333 |