Wireless Networking Complete - booksite.elsevier.com · Larry L. Peterson and Bruce S. Davie ......

20
Wireless Networking Complete

Transcript of Wireless Networking Complete - booksite.elsevier.com · Larry L. Peterson and Bruce S. Davie ......

Wireless Networking Complete

01_P375077_Prelims.indd i01_P375077_Prelims.indd i 7/15/2009 10:32:57 AM7/15/2009 10:32:57 AM

The Morgan Kaufmann Series in Networking

Series Editor , David Clark, M.I.T. Wireless Networking Complete Pei Zheng, Feng Zhao, David Tipper, Jinmei Tatuya, Keiichi Shima, Yi Qian, Larry Peterson, Lionel Ni, D. Manjunath, Qing Li, Joy Kuri, Anurag Kumar, Prashant Krishnamurthy, Leonidas Guibas, Vijay Garg, Adrian Farrel, and Bruce Davie

P2P Networking and Applications John Buford, Heather Yu, and Eng Lua

The Illustrated Network Walter Goralski

Broadband Cable Access Networks: The HFC Plant David Large and James Farmer

Technical , Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective XiPeng Xiao

MPLS : Next Steps Bruce S. Davie and Adrian Farrel

Wireless Networking Anurag Kumar, D. Manjunath, and Joy Kuri

Internet Multimedia Communications Using SIP Rogelio Martinez Perea

Information Assurance: Dependability and Security in Networked Systems Yi Qian, James Joshi, David Tipper, and Prashant Krishnamurthy

Network Analysis, Architecture, and Design, 3e James D. McCabe

Wireless Communications & Networking: An Introduction Vijay K. Garg

IPv6 Advanced Protocols Implementation Qing Li, Tatuya Jinmei, and Keiichi Shima

Computer Networks: A Systems Approach, 4e Larry L. Peterson and Bruce S. Davie

01_P375077_Prelims.indd ii01_P375077_Prelims.indd ii 7/15/2009 10:32:57 AM7/15/2009 10:32:57 AM

Network Routing: Algorithms, Protocols, and Architectures Deepankar Medhi and Karthikeyan Ramaswami

Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice John Evans and Clarence Filsfi ls

Traffi c Engineering and QoS Optimization of Integrated Voice & Data Networks Gerald R. Ash

IPv6 Core Protocols Implementation Qing Li, Tatuya Jinmei, and Keiichi Shima

Smart Phone and Next-Generation Mobile Computing Pei Zheng and Lionel Ni

GMPLS : Architecture and Applications Adrian Farrel and Igor Bryskin

Content Networking: Architecture, Protocols, and Practice Markus Hofmann and Leland R. Beaumont

Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices George Varghese

Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS Jean Philippe Vasseur, Mario Pickavet, and Piet Demeester

Routing , Flow, and Capacity Design in Communication and Computer Networks Micha ł Pi ó ro and Deepankar Medhi

Wireless Sensor Networks: An Information Processing Approach Feng Zhao and Leonidas Guibas

Communication Networking: An Analytical Approach Anurag Kumar, D. Manjunath, and Joy Kuri

The Internet and Its Protocols: A Comparative Approach Adrian Farrel

Modern Cable Television Technology: Video, Voice, and Data Communications, 2e Walter Ciciora, James Farmer, David Large, and Michael Adams

Policy -Based Network Management: Solutions for the Next Generation John Strassner

01_P375077_Prelims.indd iii01_P375077_Prelims.indd iii 7/15/2009 10:32:57 AM7/15/2009 10:32:57 AM

MPLS Network Management: MIBs, Tools, and Techniques Thomas D. Nadeau

Developing IP-Based Services: Solutions for Service Providers and Vendors Monique Morrow and Kateel Vijayananda

Telecommunications Law in the Internet Age Sharon K. Black

Optical Networks: A Practical Perspective, 2e Rajiv Ramaswami and Kumar N. Sivarajan

Internet QoS: Architectures and Mechanisms Zheng Wang

TCP /IP Sockets in Java: Practical Guide for Programmers Michael J. Donahoo and Kenneth L. Calvert

TCP /IP Sockets in C: Practical Guide for Programmers Kenneth L. Calvert and Michael J. Donahoo

Multicast Communication: Protocols, Programming, and Applications Ralph Wittmann and Martina Zitterbart

High -Performance Communication Networks, 2e Jean Walrand and Pravin Varaiya

Internetworking Multimedia Jon Crowcroft, Mark Handley, and Ian Wakeman

Understanding Networked Applications: A First Course David G. Messerschmitt

Integrated Management of Networked Systems: Concepts, Architectures, and Their Operational Application Heinz -Gerd Hegering, Sebastian Abeck, and Bernhard Neumair

Virtual Private Networks: Making the Right Connection Dennis Fowler

Understanding Networked Applications David G. Messerschmitt

Wide Area Network Design: Concepts and Tools for Optimization Robert S. Cahn

For further information on these books and for a list of forthcoming titles, please visit our Web site at http://www.mkp.com .

01_P375077_Prelims.indd iv01_P375077_Prelims.indd iv 7/15/2009 10:32:57 AM7/15/2009 10:32:57 AM

Wireless Networking Complete Pei Zheng

Feng Zhao David Tipper Jinmei Tatuya Keiichi Shima

Yi Qian Larry L. Peterson

Lionel M. Ni D . Manjunath

Qing Li Joy Kuri

Anurag Kumar Prashant Krishnamurthy

Leonidas Guibas Vijay K. Garg Adrian Farrel

Bruce S. Davie

AMSTERDAM • BOSTON • HEIDELBERG • LONDONNEW YORK • OXFORD • PARIS • SAN DIEGO

SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYOMorgan Kaufmann Publishers is an imprint of Elsevier

01_P375077_Prelims.indd v01_P375077_Prelims.indd v 7/15/2009 10:32:57 AM7/15/2009 10:32:57 AM

Morgan Kaufmann Publishers is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA

© Copyright 2004, 2006, 2007, 2008, and 2010 by Elsevier Inc. All rights reserved.

Exception : Chapter 10 is © 2004 by Adrian Farrel. All rights reserved.

Material in the work originally appeared in Smart Phone & Next Generation Mobile Computing by Pei Zheng and Lionel Ni (Elsevier Inc. 2006), Computer Networks, Fourth Edition , by Larry Peterson and Bruce Davie (Elsevier Inc. 2007), Wireless Communication & Networking , by Vijay Garg (Elsevier Inc. 2007), Wireless Networks , by Anurag Kumar, D. Manjunath, Joy Kuri (Elsevier Inc. 2008), Wireless Sensor Networks , by Feng Zhao and Leonidas Guibas (Elsevier Inc. 2004), The Internet and Its Protocols , by Adrian Farrel (Farrel 2004), IPv6 Advanced Protocols , by Qing Li, Keiichi Shima, and Jinmei Tatuya (Elsevier Inc. 2007), and Information Assurance , edited by Yi Qian, David Tipper, James Joshi and Prashant Krishnamurthy (Elsevier Inc. 2008).

Designations used by companies to distinguish their products are often claimed as trademarks or registered trademarks. In all instances in which Morgan Kaufmann Publishers is aware of a claim, the product names appear in initial capital or all capital letters. All trademarks that appear or are otherwise referred to in this work belong to their respective owners. Neither Morgan Kaufmann Publishers nor the authors and other contributors of this work have any relationship or affi liation with such trademark owners nor do such trademark owners confi rm, endorse or approve the contents of this work. Readers, however, should contact the appropriate companies for more information regarding trademarks and any related registrations.

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means — electronic, mechanical, photocopying, scanning, or otherwise — without prior written permission of the publisher.

Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: ( 1 44) 1865 843830, fax: ( 1 44) 1865 853333, E-mail: [email protected]. You may also complete your request online via the Elsevier homepage ( http://www.elsevier.com ), by selecting “ Support & Contact ” then “ Copyright and Permission ” and then “ Obtaining Permissions. ”

Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the Library of Congress.

British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library.

ISBN : 978-0-12-375077-8

For information on all Morgan Kaufmann publications, visit our Web site at www.mkp.com or www.elsevierdirect.com

Printed in the United States of America 09 10 11 12 13 5 4 3 2 1

02_P375077_ITR.indd vi02_P375077_ITR.indd vi 7/14/2009 7:15:13 AM7/14/2009 7:15:13 AM

vii

Contents

About This Book .................................................................................................xv

About the Authors ............................................................................................xvii

Chapter 1 Supporting Wireless Technologies ..........................................................1 1.1 The Frequency Spectrum ..................................................................................1

1.1.1 Public Media Broadcasting ....................................................................4 1.1.2 Cellular Communication ........................................................................4 1.1.3 Wireless Data Communication .............................................................. 5 1.1.4 Other Fixed or Mobile Wireless Communications ................................ 6

1.2 Wireless Communication Primer ...................................................................... 6 1.2.1 Signal Propagation ................................................................................. 6 1.2.2 Modulation ............................................................................................. 9 1.2.3 Multiplexing ......................................................................................... 11

1.3 Spread Spectrum .............................................................................................12 1.3.1 Direct-Sequence Spread Spectrum ...................................................... 13 1.3.2 Frequency-Hopping Spread Spectrum ................................................. 13 1.3.3 Orthogonal Frequency-Division Multiplexing ..................................... 14

1.4 Global System for Mobile and General Packet Radio Service ....................... 15 1.4.1 Global System for Mobile .................................................................... 15 1.4.2 General Packet Radio Service .............................................................. 20

1.5 Code-Division Multiple Access ...................................................................... 24 1.5.1 Code-Division Multiple Access Concept ............................................. 24 1.5.2 IS-95 ..................................................................................................... 25 1.5.3 Software Handoff ................................................................................. 26 1.5.4 Road to 4G ........................................................................................... 27

1.6 GSM Versus CDMA ........................................................................................ 28 1.7 3G Cellular Systems ........................................................................................ 29

1.7.1 UMTS/WCDMA Versus cdma2000 .................................................... 30 1.7.2 UMTS/WCDMA .................................................................................. 30 1.7.3 cdma2000 ............................................................................................. 31 1.7.4 4G Cellular Systems ............................................................................ 33

1.8 2G Mobile Wireless Services .......................................................................... 34 1.8.1 WAP and iMode ................................................................................... 34 1.8.2 Short Message Service ......................................................................... 35

03_P375077_Prelims1.indd vii03_P375077_Prelims1.indd vii 7/14/2009 11:04:58 AM7/14/2009 11:04:58 AM

viii Contents

1.9 Wireless Technologies Landscape ................................................................. 36 1.10 802.11 Wireless LANs ................................................................................... 37

1.10.1 Architecture and Protocols ................................................................. 38 1.10.2 Frame Format ..................................................................................... 41 1.10.3 Beacon Frame .................................................................................... 43 1.10.4 Roaming in a Wireless LAN .............................................................. 43 1.10.5 IEEE 802.11 Family ........................................................................... 45 1.10.6 Security in Wireless LANs ................................................................ 47

1.11 Bluetooth ........................................................................................................ 47 1.11.1 Architecture and Protocols ................................................................. 47 1.11.2 Bluetooth Overview ........................................................................... 47 1.11.3 Bluetooth Architecture ....................................................................... 48 1.11.4 Radio and Baseband ........................................................................... 49 1.11.5 L2CAP and Frame Format ................................................................. 51 1.11.6 RFCOMM .......................................................................................... 52 1.11.7 SDP .................................................................................................... 52 1.11.8 Bluetooth Evolution ............................................................................ 53

1.12 Ultra-Wideband ............................................................................................. 53 1.12.1 UWB Standards ................................................................................. 55 1.12.2 UWB Applications ............................................................................. 55

1.13 Radio-Frequency Identifi cation ..................................................................... 56 1.13.1 RFID System ...................................................................................... 56 1.13.2 RFID Applications ............................................................................. 58

1.14 Wireless Metropolitan Area Networks .......................................................... 60 1.14.1 Wireless Broadband: IEEE 802.16 .................................................... 61 1.14.2 WiMax ............................................................................................... 62

1.15 Satellite .......................................................................................................... 64 1.15.1 Satellite Communication .................................................................... 64 1.15.2 Satellite Systems ................................................................................ 64

1.16 Wireless Sensor Networks ............................................................................. 65 1.16.1 WSN Applications ............................................................................. 66 1.16.2 Wireless Sensor Node ........................................................................ 67 1.16.3 Self-Organized Networks ................................................................... 68 1.16.4 ZigBee ................................................................................................ 69

1.17 Standardization in the Wireless World .......................................................... 70 1.17.1 Cellular Standard Groups ................................................................... 71 1.17.2 IEEE Standards .................................................................................. 71 1.17.3 Standards War .................................................................................... 73

1.18 Summary ........................................................................................................ 73Further Reading .................................................................................................... 74

Chapter 2 Wireless Networks ............................................................................. 77 2.1 Bluetooth (802.15.1) ...................................................................................... 79 2.2 Wi-Fi (802.11) ............................................................................................... 81

2.2.1 Physical Properties ............................................................................. 81 2.2.2 Collision Avoidance ........................................................................... 82

03_P375077_Prelims1.indd viii03_P375077_Prelims1.indd viii 7/14/2009 11:04:58 AM7/14/2009 11:04:58 AM

Contents ix

2.2.3 Distribution System .......................................................................... 83 2.2.4 Frame Format .................................................................................... 85

2.3 WiMAX (802.16) .......................................................................................... 86 2.4 Cell Phone Technologies ............................................................................... 87 Further Reading ..................................................................................................... 90

Chapter 3 An Overview of Wireless Systems ........................................................ 93 3.1 Introduction ................................................................................................... 93 3.2 First- and Second-Generation Cellular Systems ............................................ 94 3.3 Cellular Communications from 1G to 3G ..................................................... 97 3.4 Road Map for Higher Data Rate Capability in 3G ...................................... 100 3.5 Wireless 4G Systems ................................................................................... 103 3.6 Future Wireless Networks ........................................................................... 106 3.7 Standardization Activities for Cellular Systems .......................................... 107 3.8 Summary ...................................................................................................... 109 Problems ..............................................................................................................109References ........................................................................................................... 109

Chapter 4 Wireless Application Protocol ............................................................ 111 4.1 Introduction ................................................................................................. 111 4.2 WAP and the World Wide Web (WWW)..................................................... 111 4.3 Introduction to Wireless Application Protocol ............................................ 112 4.4 The WAP Programming Model ................................................................... 113

4.4.1 The WWW Model .............................................................................. 114 4.4.2 The WAP Model ................................................................................ 114

4.5 WAP Architecture ........................................................................................ 116 4.5.1 Wireless Application Environment .................................................... 117 4.5.2 Wireless Telephony Application ........................................................ 118 4.5.3 Wireless Session Protocol .................................................................. 119 4.5.4 Wireless Transaction Protocol ........................................................... 120 4.5.5 Wireless Transport Layer Security ..................................................... 121 4.5.6 Wireless Datagram Protocol .............................................................. 121 4.5.7 Optimal WAP Bearers ........................................................................ 122

4.6 Traditional WAP Networking Environment ................................................ 123 4.7 WAP Advantages and Disadvantages .......................................................... 124 4.8 Applications of WAP ................................................................................... 126 4.9 imode ........................................................................................................... 127 4.10 imode Versus WAP ...................................................................................... 128 4.11 Summary ...................................................................................................... 129 Problems ..............................................................................................................129References ........................................................................................................... 130

Chapter 5 Wireless Local Area Networks ...........................................................131 5.1 Introduction ................................................................................................. 131 5.2 WLAN Equipment ....................................................................................... 134 5.3 WLAN Topologies....................................................................................... 135 5.4 WLAN Technologies ................................................................................... 136

03_P375077_Prelims1.indd ix03_P375077_Prelims1.indd ix 7/14/2009 11:04:58 AM7/14/2009 11:04:58 AM

x Contents

5.4.1 IR Technology .................................................................................... 136 5.4.2 UHF Narrowband Technology ........................................................... 137 5.4.3 Spread Spectrum Technology ............................................................ 138

5.5 IEEE 802.11 WLAN .................................................................................... 139 5.5.1 IEEE 802.11 Architecture ................................................................ 139 5.5.2 802.11 Physical Layer (PHY) .......................................................... 141 5.5.3 IEEE 802.11 Data Link Layer ......................................................... 153 5.5.4 IEEE 802.11 Medium Access Control ............................................. 153 5.5.5 IEEE 802.11 MAC Sublayer ............................................................ 159

5.6 Joining an Existing Basic Service Set ......................................................... 161 5.7 Security of IEEE 802.11 Systems ................................................................ 163 5.8 Power Management ..................................................................................... 164 5.9 IEEE 802.11b — High-Rate DSSS ...............................................................164 5.10 IEEE 802.11n ............................................................................................... 165 5.11 Other WLAN Standards .............................................................................. 168

5.11.1 HIPERLAN Family of Standards .................................................... 168 5.11.2 Multimedia Access Communication — High-Speed

Wireless Access Network ................................................................ 173 5.12 Performance of a Bluetooth Piconet in the Presence of IEEE

802.11 WLANs ............................................................................................ 175 5.12.1 Packet Error Rate (PER) from N Neighboring Bluetooth

Piconets ............................................................................................176 5.12.2 PER from M Neighboring IEEE 802.11 WLANs ............................177 5.12.3 Aggregated Throughput ...................................................................177

5.13 Interference Between Bluetooth and IEEE 802.11 ...................................... 178 5.14 IEEE 802.16 ................................................................................................. 181 5.15 World Interoperability for MicroAccess, Inc. (WiMAX) ............................ 183

5.15.1 WiMAX PHY .................................................................................. 186 5.15.2 WiMAX Media Access Control (MAC) .......................................... 187 5.15.3 Spectrum Allocation for WiMAX .................................................... 188

5.16 Summary ...................................................................................................... 189 Problems .............................................................................................................. 189References ............................................................................................................191

Chapter 6 Fourth-Generation Systems and New Wireless Technologies ..................193 6.1 Introduction ................................................................................................. 193 6.2 4G Vision ..................................................................................................... 195 6.3 4G Features and Challenges ........................................................................ 195 6.4 Applications of 4G ....................................................................................... 197 6.5 4G Technologies .......................................................................................... 200

6.5.1 Multicarrier Modulation ................................................................... 200 6.5.2 Smart Antenna Techniques .............................................................. 201 6.5.3 OFDM – MIMO Systems .................................................................. 205 6.5.4 Adaptive Modulation and Coding with Time-Slot Scheduler .......... 205 6.5.5 Bell Labs Layered Space Time (BLAST) System ........................... 206

03_P375077_Prelims1.indd x03_P375077_Prelims1.indd x 7/14/2009 11:04:58 AM7/14/2009 11:04:58 AM

Contents xi

6.5.6 Software-Defi ned Radio ................................................................... 209 6.5.7 Cognitive Radio ............................................................................... 211

6.6 Summary ...................................................................................................... 212 Problems .............................................................................................................. 212References ............................................................................................................213

Chapter 7 Mesh Networks: Optimal Routing and Scheduling ................................ 215 7.1 Overview ...................................................................................................... 215 7.2 Network Topology and Link Activation Constraints ................................... 216

7.2.1 Link Activation Constraints ............................................................. 216 7.3 Link Scheduling and Schedulable Region ................................................... 219

7.3.1 Stability of Queues ........................................................................... 222 7.3.2 Link Flows and Link Stability Region ............................................. 226

7.4 Routing and Scheduling a Given Flow Vector ............................................. 229 7.5 Discussion .................................................................................................... 235 7.6 Maximum Weight Scheduling ..................................................................... 236

7.6.1 Multicommodity Flow Criteria ........................................................ 238 7.6.2 Lyapunov Stability of a Network of Queues .................................... 238 7.6.3 The Algorithm and Its Analysis ....................................................... 239 7.6.4 Discussion ........................................................................................ 245

7.7 Routing and Scheduling for Elastic Traffi c ................................................. 245 7.7.1 Fair Allocation for Single Hop Flows .............................................. 249 7.7.2 Fair Allocation for Multihop Flows ................................................. 252

7.8 Discussion .................................................................................................... 257 7.9 Notes on the Literature ................................................................................ 259 Problems .......................................................................................................................... 260References .......................................................................................................................261

Chapter 8 Ad Hoc Wireless Sensor Networks ..................................................... 263 8.1 Overview ...................................................................................................... 265 8.2 Communication Coverage ........................................................................... 265 8.3 Discussion .................................................................................................... 266 8.4 Sensing Coverage ........................................................................................ 267 8.5 Discussion .................................................................................................... 273 8.6 Localization ................................................................................................. 274

8.6.1 Convex Position Estimation ............................................................. 276 8.7 Discussion .................................................................................................... 279

8.7.1 Routing ............................................................................................. 279 8.7.2 Attribute-Based Routing .................................................................. 284

8.8 Function Computation ................................................................................. 286 8.9 Discussion .................................................................................................... 293 8.10 Scheduling ................................................................................................... 294

8.10.1 S-MAC ............................................................................................ 295 8.10.2 IEEE 802.15.4 (Zigbee) .................................................................. 297

8.11 Notes on the Literature ............................................................................... 298

03_P375077_Prelims1.indd xi03_P375077_Prelims1.indd xi 7/14/2009 11:04:58 AM7/14/2009 11:04:58 AM

xii Contents

Problems ............................................................................................................. 299References ............................................................................................................300

Chapter 9 Sensor Network Platforms and Tools ..................................................303 9.1 Sensor Node Hardware ............................................................................... 304

9.1.1 Berkeley Motes ............................................................................... 305 9.2 Sensor Network Programming Challenges ................................................. 307 9.3 Node-Level Software Platforms ................................................................. 309

9.3.1 Operating System: TinyOS ............................................................. 310 9.3.2 Imperative Language: nesC ............................................................ 313 9.3.3 Datafl ow-Style Language: TinyGALS ............................................ 319

9.4 Node-Level Simulators ............................................................................... 324 9.4.1 The ns-2 Simulator and Its Sensor Network Extensions ................ 326 9.4.2 The Simulator TOSSIM .................................................................. 327

9.5 Programming Beyond Individual Nodes: State-Centric Programming ...... 328 9.5.1 Collaboration Groups ...................................................................... 329 9.5.2 PIECES: A State-Centric Design Framework ................................ 332 9.5.3 Multitarget Tracking Problem Revisited ......................................... 335

9.6 Summary ..................................................................................................... 340References ............................................................................................................340

Chapter 10 Mobile IP .....................................................................................345 10.1 The Requirements of Mobile IP ................................................................. 345 10.2 Extending the Protocols .............................................................................. 347 10.3 Reverse Tunneling ...................................................................................... 349 10.4 Security Concerns ....................................................................................... 351 Further Reading .................................................................................................. 351

Chapter 11 Mobile IPv6 ...................................................................................353 11.1 Introduction ................................................................................................ 353 11.2 Mobile IPv6 Overview ............................................................................... 354

11.2.1 Types of Nodes................................................................................ 355 11.2.2 Basic Operation of Mobile IPv6 ..................................................... 356

11.3 Header Extension ........................................................................................ 360 11.3.1 Alignment Requirements ................................................................ 361 11.3.2 Home Address Option ..................................................................... 361 11.3.3 Type 2 Routing Header ................................................................... 362 11.3.4 Mobility Header .............................................................................. 364 11.3.5 Mobility Options ............................................................................. 372 11.3.6 Neighbor Discovery Messages ........................................................ 375 11.3.7 ICMPv6 Messages .......................................................................... 377

11.4 Procedure of Mobile IPv6 ........................................................................... 381 11.4.1 Protocol Constants and Variables .................................................... 381 11.4.2 Home Registration .......................................................................... 381

03_P375077_Prelims1.indd xii03_P375077_Prelims1.indd xii 7/14/2009 11:04:58 AM7/14/2009 11:04:58 AM

Contents xiii

11.4.3 Bi-Directional Tunneling ................................................................ 385 11.4.4 Intercepting Packets for a Mobile Node ......................................... 387 11.4.5 Returning Home .............................................................................. 387

11.5 Route Optimization..................................................................................... 390 11.5.1 Return Routability ........................................................................... 391 11.5.2 Sending Initial Messages ................................................................ 391 11.5.3 Responding to Initial Messages ...................................................... 392 11.5.4 Computing a Shared Secret ............................................................. 394 11.5.5 Verifying Message .......................................................................... 395 11.5.6 Security Considerations .................................................................. 396 11.5.7 De-Register Binding for Correspondent Nodes .............................. 397 11.5.8 Backward Compatibility ................................................................. 397

11.6 Movement Detection .................................................................................. 399 11.7 Dynamic Home Agent Address Discovery ................................................. 399 11.8 Mobile Prefi x Solicitation/Advertisement .................................................. 400 11.9 Relationship with IPsec .............................................................................. 404References ............................................................................................................406

Chapter 12 Security and Survivability of Wireless Systems ..................................407 12.1 Introduction ................................................................................................ 407 12.2 Background ................................................................................................. 408 12.3 Current Security Approaches in Wireless Networks .................................. 411 12.4 Current Survivability Approaches in Wireless Networks ........................... 412 12.5 Framework for Wireless Network Survivability and Security .................... 413 12.6 Interaction Between Survivability and Security in Wireless Networks ...... 417

12.6.1 Extending the Framework to Include Interactions Between Security and Survivability ................................................................418

12.6.2 Case Study I: Idle Handoffs ............................................................ 421 12.6.3 Case Study II: Key Management in Heterogeneous

Sensor Networks ..................................................................... ........422 12.7 Conclusion .................................................................................................. 429References .......................................................................................................... 430

Index ..............................................................................................................433

03_P375077_Prelims1.indd xiii03_P375077_Prelims1.indd xiii 7/14/2009 11:04:58 AM7/14/2009 11:04:58 AM

03_P375077_Prelims1.indd xiv03_P375077_Prelims1.indd xiv 7/14/2009 11:04:58 AM7/14/2009 11:04:58 AM

xv

About This Book

All of the elements about wireless networking are here together in a single resource written by the best and brightest experts in the fi eld. This book consolidates both introductory and advanced topics, thereby covering the gamut of wireless networking — from wireless systems overview to fundamental wireless application protocols to wireless sensor networks and security in wireless systems.

Wireless Networking Complete expertly combines the fi nest wireless networking material from the Morgan Kaufmann portfolio, with individual chapters contributed by a select group of authors. The chapters have been combined into one comprehensive book in a way that allows it to be used as a reference work for those interested in new and developing aspects of wireless networking. This book represents a quick and effi cient way to unite valuable content from leaders in the wireless networking fi eld, thereby creating a defi nitive, one-stop-shopping opportunity to access information you would otherwise need to round up from disparate sources.

04_P375077_Bio.indd xv04_P375077_Bio.indd xv 7/14/2009 7:19:29 AM7/14/2009 7:19:29 AM

04_P375077_Bio.indd xvi04_P375077_Bio.indd xvi 7/14/2009 7:19:29 AM7/14/2009 7:19:29 AM

xvii

About the Authors

Pei Zheng (Chapter 1) was an Assistant Professor in the Computer Science Department at Arcadia University and a consultant working in the areas of mobile computing and distributed systems during the writing of this book. Dr. Zheng received his Ph.D. degree in Computer Science from Michigan State University in 2003. He was a Member of Technical Staff in Bell Laboratories, Lucent Technologies. He joined Microsoft in 2005. His research interests include distributed systems, network simulation and emulation, and mobile computing. He is also a co-author of Smart Phone and Next Generation Mobile Computing , published by Elsevier, 2005.

Feng Zhao (Chapter 9) is a senior researcher at Microsoft, where he manages the Networked Embedded Computing Group. He received his Ph.D. in Electrical Engineering and Computer Science from Massachusetts Institute of Technology (MIT) and has taught at Stanford University and Ohio State University. Dr. Zhao was a principal scientist at Xerox PARC and directed PARC’s sensor network research effort. He is serving as the editor-in-chief of ACM Transactions on Sensor Networks. He is also a co-author of Wireless Sensor Networks , published by Elsevier, 2004.

David Tipper (Chapter 12) is an Associate Professor of Telecommunications, with a secondary appointment in Electrical Engineering, at the University of Pittsburgh. He is a senior member of IEEE, and has served as both the Technical Program Chair of the Fourth International IEEE Design of Reliable Communication Networks Workshop and as a co-guest editor of the Journal of Network and Systems Management. He is also a co-author of Information Assurance: Dependability and Security in Networked Systems , published by Elsevier, 2007.

Jinmei Tatuya (Chapter 11) is a research scientist at Corporate Research & Development Center, Toshiba Corporation. He had been a core developer of the KAME project since the launch of the project through its conclusion. In 2003, he received a Ph.D. degree from Keio University, Japan, based on his work at KAME. He is also a co-author of IPv6 Advanced Protocols , published by Elsevier, 2007.

Keiichi Shima (Chapter 11) is a senior researcher at Internet Initiative Japan Inc. He was a core developer of the KAME project from 2001 until the end of the project and developed Mobile IPv6/NEMO Basic Support protocol stack. He is now working on the new mobility stack

05_P375077_CTR.indd xvii05_P375077_CTR.indd xvii 7/14/2009 7:37:44 AM7/14/2009 7:37:44 AM

xviii About the Authors

(the SHISA stack) for BSD operating systems. He is also a co-author of IPv6 Advanced Protocols , published by Elsevier, 2007.

Yi Qian (Chapter 12) is an Assistant Professor in the Department of Electrical and Computer Engineering at the University of Puerto Rico at Mayaguez. Prior to joining UPRM, he worked for several companies as a Technical Advisor and a Senior Consultant in the areas of network optimization and network planning. He has been on numerous conference committees, and has most recently served as the General Chair of the 2007 International Symposium on Wireless Pervasive Computing. He is also a co-author of Information Assurance: Dependability and Security in Networked Systems , published by Elsevier, 2007.

Larry L. Peterson (Chapter 2) is Professor and Chair of Computer Science at Princeton University. He is Director of the Princeton-hosted PlanetLab Consortium and Chair of the planning group for NSF’s GENI Initiative. His research focuses on the design and implementation of networked systems. Peterson is a Fellow of the ACM. He received his Ph.D. degree from Purdue University in 1985. He is also a co-author of Computer Networks: A Systems Approach , published by Elsevier, 2007.

Lionel M. Ni (Chapter 1) is Professor and Head of the Computer Science Department at the Hong Kong University of Science and Technology. Dr. Ni earned his Ph.D. degree in Electrical and Computer Engineering from Purdue University, West Lafayette, IN, in 1981. He was professor in Computer Science and Engineering Department at Michigan State University, where he started his academic career in 1981. He has been involved in many projects related to wireless technologies, 2.5G/3G cellular phones, and embedded systems. He is also a co-author of Smart Phone and Next Generation Mobile Computing , published by Elsevier, 2005.

D . Manjunath , Ph.D. (Chapters 7 and 8) is a Professor in the Department of Electrical Engineering of the Indian Institute of Technology (IIT) Bombay. He previously served on the faculty at IIT Kanpur. He is also a co-author of Wireless Networks , published by Elsevier, 2008.

Qing Li (Chapter 11) is a senior architect at Blue Coat Systems, Inc. leading the design and development efforts of the next-generation IPv6-enabled secure proxy appliances. Qing holds multiple US patents and is the author of multiple books on networked and embedded systems. He is also a co-author of IPv6 Advanced Protocols , published by Elsevier, 2007.

Joy Kuri , (Chapters 7 and 8) is an Associate Professor at the Center for Electronics Design and Technology at the Indian Institute of Science, Bangalore. He is also a co-author of Wireless Networks , published by Elsevier, 2008.

Anurag Kumar , Ph.D. (Chapters 7 and 8) is a Professor in the Department of Electrical Communication Engineering, and chair of the Electrical Sciences Division in the Indian Institute of Science (IISc), Bangalore. Previously, he was with AT & T Bell Laboratories, Holmdel, New Jersey. Professor Kumar was also the coordinator at IISc of the Education and

05_P375077_CTR.indd xviii05_P375077_CTR.indd xviii 7/14/2009 7:37:44 AM7/14/2009 7:37:44 AM

About the Authors xix

Research Network Project (ERNET), India’s fi rst wide-area packet network. He is an IEEE Fellow. He is also a co-author of Wireless Networks , published by Elsevier, 2008.

Prashant Krishnamurthy (Chapter 12) is an Associate Professor with the Graduate Program in Telecommunications and Networking at the University of Pittsburgh, PA. At Pitt, he regularly teaches courses on wireless communication systems and networks, cryptography, and network security. His research interests are wireless network security, wireless data networks, position location in indoor wireless networks, and radio channel modeling for indoor wireless networks. He has had funding for his research from the National Science Foundation and the National Institute of Standards and Technology. He is the co-author of the book Principles of Wireless Networks: A Unifi ed Approach and Physical Layer of Communication Systems (Prentice Hall; 1st edition, December 11, 2001). He served as the chair of the IEEE Communications Society, Pittsburgh Chapter, from 2000 – 2005. He obtained his Ph.D. in 1999 from Worcester Polytechnic Institute, Worcester, MA. He is also a co-author of Information Assurance: Dependability and Security in Networked Systems , published by Elsevier, 2007.

Leonidas Guibas (Chapter 9) heads the Geometric Computation group in the Computer Science Department of Stanford University, where he works on algorithms for sensing, modeling, reasoning about, rendering, and acting on the physical world. He is well-known for his work in computational geometry, computer graphics, and discrete algorithms. Professor Guibas obtained his Ph.D. from Stanford; has worked at PARC, MIT, and DEC/SRC; and was recently elected an ACM Fellow. He is also a co-author of Wireless Sensor Networks , published by Elsevier, 2004.

Vijay K. Garg (Chapters 3, 4, 5, and 6) has been a Professor in the Electrical and Computer Engineering Department at the University of Illinois at Chicago since 1999, where he teaches graduate courses in Wireless Communications and Networking. Dr. Garg was a Distinguished Member of Technical Staff at the Lucent Technologies Bell Labs in Naperville, Illinois from 1985 to 2001. He received his Ph.D. degree from the Illinois Institute of Technologies, Chicago, IL in 1973 and his MS degree from the University of California at Berkeley, CA in 1966. Dr. Garg has co-authored several technical books including fi ve in wireless communications. He is a Fellow of ASCE and ASME, and a Senior Member of IEEE. Dr. Garg is a registered Professional Engineer in the state of Maine and Illinois. He is an Academic Member of the Russian Academy of Transport. Dr. Garg was a Feature Editor of Wireless/PCS Series in IEEE Communication Magazine from 1996 – 2001. He is also the author of Wireless Communications and Networking , published by Elsevier, 2007.

Adrian Farrel (Chapter 10) has over two decades of experience designing and developing communications protocol software. At Old Dog Consulting he is an industry-leading freelance consultant on MPLS, GMPLS, and Internet routing, formerly working as MPLS Architect for Data Connection Ltd., and as Director of Protocol Development for Movaz

05_P375077_CTR.indd xix05_P375077_CTR.indd xix 7/14/2009 7:37:44 AM7/14/2009 7:37:44 AM

xx About the Authors

Networks, Inc. He is active within the Internet Engineering Task Force, where he is co-chair of the CCAMP working group responsible for GMPLS, the Path Computation Element (PCE) working group, and the Layer One VPN (L1VPN) working group. Adrian has co-authored and contributed to numerous Internet Drafts and RFCs on MPLS, GMPLS, and related technologies. He is also the author of The Internet and Its Protocols: A Comparative Approach , published by Elsevier, 2004.

Bruce S. Davie (Chapter 2) joined Cisco Systems in 1995, where he is a Cisco Fellow. For many years he led the team of architects responsible for Multiprotocol Label Switching and IP Quality of Service. He recently joined the Video and Content Networking Business Unit in the Service Provider group. He has 20 years of networking and communications industry experience and has written numerous books, RFCs , journal articles, and conference papers on IP networking. He is also an active participant in both the Internet Engineering Task Force and the Internet Research Task Force. Prior to joining Cisco, he was director of internetworking research and chief scientist at Bell Communications Research. Bruce holds a Ph.D. in Computer Science from Edinburgh University and is a visiting lecturer at MIT. His research interests include routing, measurement, quality of service, transport protocols, and overlay networks. He is also a co-author of Computer Networks: A Systems Approach , published by Elsevier, 2007.

05_P375077_CTR.indd xx05_P375077_CTR.indd xx 7/14/2009 7:37:44 AM7/14/2009 7:37:44 AM