Wireless Sensor Networks: An Information Processing Approach .... complete
your request online via the Elsevier homepage ( http://www.elsevier.com ), by ...
Wireless Networking Complete
01_P375077_Prelims.indd i
7/15/2009 10:32:57 AM
The Morgan Kaufmann Series in Networking Series Editor, David Clark, M.I.T. Wireless Networking Complete Pei Zheng, Feng Zhao, David Tipper, Jinmei Tatuya, Keiichi Shima, Yi Qian, Larry Peterson, Lionel Ni, D. Manjunath, Qing Li, Joy Kuri, Anurag Kumar, Prashant Krishnamurthy, Leonidas Guibas, Vijay Garg, Adrian Farrel, and Bruce Davie
P2P Networking and Applications John Buford, Heather Yu, and Eng Lua
The Illustrated Network Walter Goralski
Broadband Cable Access Networks: The HFC Plant David Large and James Farmer
Technical, Commercial and Regulatory Challenges of QoS: An Internet Service Model Perspective XiPeng Xiao
MPLS: Next Steps Bruce S. Davie and Adrian Farrel
Wireless Networking Anurag Kumar, D. Manjunath, and Joy Kuri
Internet Multimedia Communications Using SIP Rogelio Martinez Perea
Information Assurance: Dependability and Security in Networked Systems Yi Qian, James Joshi, David Tipper, and Prashant Krishnamurthy
Network Analysis, Architecture, and Design, 3e James D. McCabe
Wireless Communications & Networking: An Introduction Vijay K. Garg
IPv6 Advanced Protocols Implementation Qing Li, Tatuya Jinmei, and Keiichi Shima
Computer Networks: A Systems Approach, 4e Larry L. Peterson and Bruce S. Davie
01_P375077_Prelims.indd ii
7/15/2009 10:32:57 AM
Network Routing: Algorithms, Protocols, and Architectures Deepankar Medhi and Karthikeyan Ramaswami
Deploying IP and MPLS QoS for Multiservice Networks: Theory and Practice John Evans and Clarence Filsfils
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks Gerald R. Ash
IPv6 Core Protocols Implementation Qing Li, Tatuya Jinmei, and Keiichi Shima
Smart Phone and Next-Generation Mobile Computing Pei Zheng and Lionel Ni
GMPLS: Architecture and Applications Adrian Farrel and Igor Bryskin
Content Networking: Architecture, Protocols, and Practice Markus Hofmann and Leland R. Beaumont
Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices George Varghese
Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS Jean Philippe Vasseur, Mario Pickavet, and Piet Demeester
Routing, Flow, and Capacity Design in Communication and Computer Networks Michał Pióro and Deepankar Medhi
Wireless Sensor Networks: An Information Processing Approach Feng Zhao and Leonidas Guibas
Communication Networking: An Analytical Approach Anurag Kumar, D. Manjunath, and Joy Kuri
The Internet and Its Protocols: A Comparative Approach Adrian Farrel
Modern Cable Television Technology: Video, Voice, and Data Communications, 2e Walter Ciciora, James Farmer, David Large, and Michael Adams
Policy-Based Network Management: Solutions for the Next Generation John Strassner
01_P375077_Prelims.indd iii
7/15/2009 10:32:57 AM
MPLS Network Management: MIBs, Tools, and Techniques Thomas D. Nadeau
Developing IP-Based Services: Solutions for Service Providers and Vendors Monique Morrow and Kateel Vijayananda
Telecommunications Law in the Internet Age Sharon K. Black
Optical Networks: A Practical Perspective, 2e Rajiv Ramaswami and Kumar N. Sivarajan
Internet QoS: Architectures and Mechanisms Zheng Wang
TCP/IP Sockets in Java: Practical Guide for Programmers Michael J. Donahoo and Kenneth L. Calvert
TCP/IP Sockets in C: Practical Guide for Programmers Kenneth L. Calvert and Michael J. Donahoo
Multicast Communication: Protocols, Programming, and Applications Ralph Wittmann and Martina Zitterbart
High-Performance Communication Networks, 2e Jean Walrand and Pravin Varaiya
Internetworking Multimedia Jon Crowcroft, Mark Handley, and Ian Wakeman
Understanding Networked Applications: A First Course David G. Messerschmitt
Integrated Management of Networked Systems: Concepts, Architectures, and Their Operational Application Heinz-Gerd Hegering, Sebastian Abeck, and Bernhard Neumair
Virtual Private Networks: Making the Right Connection Dennis Fowler
Understanding Networked Applications David G. Messerschmitt
Wide Area Network Design: Concepts and Tools for Optimization Robert S. Cahn For further information on these books and for a list of forthcoming titles, please visit our Web site at http://www.mkp.com.
01_P375077_Prelims.indd iv
7/15/2009 10:32:57 AM
Wireless Networking Complete Pei Zheng Feng Zhao David Tipper Jinmei Tatuya Keiichi Shima Yi Qian Larry L. Peterson Lionel M. Ni D. Manjunath Qing Li Joy Kuri Anurag Kumar Prashant Krishnamurthy Leonidas Guibas Vijay K. Garg Adrian Farrel Bruce S. Davie
AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Morgan Kaufmann Publishers is an imprint of Elsevier
01_P375077_Prelims.indd v
7/15/2009 10:32:57 AM
Morgan Kaufmann Publishers is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA © Copyright 2004, 2006, 2007, 2008, and 2010 by Elsevier Inc. All rights reserved. Exception: Chapter 10 is © 2004 by Adrian Farrel. All rights reserved. Material in the work originally appeared in Smart Phone & Next Generation Mobile Computing by Pei Zheng and Lionel Ni (Elsevier Inc. 2006), Computer Networks, Fourth Edition, by Larry Peterson and Bruce Davie (Elsevier Inc. 2007), Wireless Communication & Networking, by Vijay Garg (Elsevier Inc. 2007), Wireless Networks, by Anurag Kumar, D. Manjunath, Joy Kuri (Elsevier Inc. 2008), Wireless Sensor Networks, by Feng Zhao and Leonidas Guibas (Elsevier Inc. 2004), The Internet and Its Protocols, by Adrian Farrel (Farrel 2004), IPv6 Advanced Protocols, by Qing Li, Keiichi Shima, and Jinmei Tatuya (Elsevier Inc. 2007), and Information Assurance, edited by Yi Qian, David Tipper, James Joshi and Prashant Krishnamurthy (Elsevier Inc. 2008). Designations used by companies to distinguish their products are often claimed as trademarks or registered trademarks. In all instances in which Morgan Kaufmann Publishers is aware of a claim, the product names appear in initial capital or all capital letters. All trademarks that appear or are otherwise referred to in this work belong to their respective owners. Neither Morgan Kaufmann Publishers nor the authors and other contributors of this work have any relationship or affiliation with such trademark owners nor do such trademark owners confirm, endorse or approve the contents of this work. Readers, however, should contact the appropriate companies for more information regarding trademarks and any related registrations. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means—electronic, mechanical, photocopying, scanning, or otherwise—without prior written permission of the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (144) 1865 843830, fax: (144) 1865 853333, E-mail:
[email protected]. You may also complete your request online via the Elsevier homepage (http://www.elsevier.com), by selecting “Support & Contact” then “Copyright and Permission” and then “Obtaining Permissions.” Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the Library of Congress. British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. ISBN: 978-0-12-375077-8 For information on all Morgan Kaufmann publications, visit our Web site at www.mkp.com or www.elsevierdirect.com Printed in the United States of America 09 10 11 12 13 5 4 3 2 1
02_P375077_ITR.indd vi
7/14/2009 7:15:13 AM
Contents About This Book .................................................................................................xv About the Authors ............................................................................................xvii Chapter 1 Supporting Wireless Technologies ..........................................................1 1.1 The Frequency Spectrum ..................................................................................1 1.1.1 Public Media Broadcasting ....................................................................4 1.1.2 Cellular Communication ........................................................................4 1.1.3 Wireless Data Communication ..............................................................5 1.1.4 Other Fixed or Mobile Wireless Communications ................................6 1.2 Wireless Communication Primer ......................................................................6 1.2.1 Signal Propagation .................................................................................6 1.2.2 Modulation .............................................................................................9 1.2.3 Multiplexing .........................................................................................11 1.3 Spread Spectrum .............................................................................................12 1.3.1 Direct-Sequence Spread Spectrum ......................................................13 1.3.2 Frequency-Hopping Spread Spectrum .................................................13 1.3.3 Orthogonal Frequency-Division Multiplexing.....................................14 1.4 Global System for Mobile and General Packet Radio Service .......................15 1.4.1 Global System for Mobile....................................................................15 1.4.2 General Packet Radio Service ..............................................................20 1.5 Code-Division Multiple Access ......................................................................24 1.5.1 Code-Division Multiple Access Concept.............................................24 1.5.2 IS-95.....................................................................................................25 1.5.3 Software Handoff .................................................................................26 1.5.4 Road to 4G ...........................................................................................27 1.6 GSM Versus CDMA........................................................................................28 1.7 3G Cellular Systems ........................................................................................29 1.7.1 UMTS/WCDMA Versus cdma2000 ....................................................30 1.7.2 UMTS/WCDMA..................................................................................30 1.7.3 cdma2000 .............................................................................................31 1.7.4 4G Cellular Systems ............................................................................33 1.8 2G Mobile Wireless Services ..........................................................................34 1.8.1 WAP and iMode ...................................................................................34 1.8.2 Short Message Service .........................................................................35 vii
03_P375077_Prelims1.indd vii
7/14/2009 11:04:58 AM
viii
Contents
1.9 Wireless Technologies Landscape .................................................................36 1.10 802.11 Wireless LANs...................................................................................37 1.10.1 Architecture and Protocols .................................................................38 1.10.2 Frame Format .....................................................................................41 1.10.3 Beacon Frame ....................................................................................43 1.10.4 Roaming in a Wireless LAN ..............................................................43 1.10.5 IEEE 802.11 Family...........................................................................45 1.10.6 Security in Wireless LANs ................................................................47 1.11 Bluetooth ........................................................................................................47 1.11.1 Architecture and Protocols .................................................................47 1.11.2 Bluetooth Overview ...........................................................................47 1.11.3 Bluetooth Architecture .......................................................................48 1.11.4 Radio and Baseband...........................................................................49 1.11.5 L2CAP and Frame Format .................................................................51 1.11.6 RFCOMM ..........................................................................................52 1.11.7 SDP ....................................................................................................52 1.11.8 Bluetooth Evolution ............................................................................53 1.12 Ultra-Wideband .............................................................................................53 1.12.1 UWB Standards .................................................................................55 1.12.2 UWB Applications .............................................................................55 1.13 Radio-Frequency Identification .....................................................................56 1.13.1 RFID System......................................................................................56 1.13.2 RFID Applications .............................................................................58 1.14 Wireless Metropolitan Area Networks ..........................................................60 1.14.1 Wireless Broadband: IEEE 802.16 ....................................................61 1.14.2 WiMax ...............................................................................................62 1.15 Satellite ..........................................................................................................64 1.15.1 Satellite Communication....................................................................64 1.15.2 Satellite Systems ................................................................................64 1.16 Wireless Sensor Networks .............................................................................65 1.16.1 WSN Applications .............................................................................66 1.16.2 Wireless Sensor Node ........................................................................67 1.16.3 Self-Organized Networks ...................................................................68 1.16.4 ZigBee ................................................................................................69 1.17 Standardization in the Wireless World ..........................................................70 1.17.1 Cellular Standard Groups...................................................................71 1.17.2 IEEE Standards ..................................................................................71 1.17.3 Standards War ....................................................................................73 1.18 Summary........................................................................................................73 Further Reading .................................................................................................... 74 Chapter 2 Wireless Networks .............................................................................77 2.1 Bluetooth (802.15.1) ......................................................................................79 2.2 Wi-Fi (802.11) ...............................................................................................81 2.2.1 Physical Properties .............................................................................81 2.2.2 Collision Avoidance ...........................................................................82
03_P375077_Prelims1.indd viii
7/14/2009 11:04:58 AM
Contents ix
2.2.3 Distribution System .......................................................................... 83 2.2.4 Frame Format .................................................................................... 85 2.3 WiMAX (802.16) ..........................................................................................86 2.4 Cell Phone Technologies ...............................................................................87 Further Reading .....................................................................................................90 Chapter 3 An Overview of Wireless Systems ........................................................93 3.1 Introduction ...................................................................................................93 3.2 First- and Second-Generation Cellular Systems ............................................94 3.3 Cellular Communications from 1G to 3G .....................................................97 3.4 Road Map for Higher Data Rate Capability in 3G ......................................100 3.5 Wireless 4G Systems ...................................................................................103 3.6 Future Wireless Networks ...........................................................................106 3.7 Standardization Activities for Cellular Systems ..........................................107 3.8 Summary......................................................................................................109 Problems ..............................................................................................................109 References ........................................................................................................... 109 Chapter 4 Wireless Application Protocol ............................................................111 4.1 Introduction .................................................................................................111 4.2 WAP and the World Wide Web (WWW).....................................................111 4.3 Introduction to Wireless Application Protocol ............................................112 4.4 The WAP Programming Model ...................................................................113 4.4.1 The WWW Model..............................................................................114 4.4.2 The WAP Model ................................................................................114 4.5 WAP Architecture ........................................................................................116 4.5.1 Wireless Application Environment ....................................................117 4.5.2 Wireless Telephony Application ........................................................118 4.5.3 Wireless Session Protocol ..................................................................119 4.5.4 Wireless Transaction Protocol ...........................................................120 4.5.5 Wireless Transport Layer Security.....................................................121 4.5.6 Wireless Datagram Protocol ..............................................................121 4.5.7 Optimal WAP Bearers ........................................................................122 4.6 Traditional WAP Networking Environment ................................................123 4.7 WAP Advantages and Disadvantages ..........................................................124 4.8 Applications of WAP ...................................................................................126 4.9 imode ...........................................................................................................127 4.10 imode Versus WAP ......................................................................................128 4.11 Summary......................................................................................................129 Problems ..............................................................................................................129 References ........................................................................................................... 130 Chapter 5 Wireless Local Area Networks...........................................................131 5.1 Introduction .................................................................................................131 5.2 WLAN Equipment.......................................................................................134 5.3 WLAN Topologies.......................................................................................135 5.4 WLAN Technologies ...................................................................................136
03_P375077_Prelims1.indd ix
7/14/2009 11:04:58 AM
x
Contents
5.4.1 IR Technology ....................................................................................136 5.4.2 UHF Narrowband Technology ...........................................................137 5.4.3 Spread Spectrum Technology ............................................................138 5.5 IEEE 802.11 WLAN....................................................................................139 5.5.1 IEEE 802.11 Architecture ................................................................139 5.5.2 802.11 Physical Layer (PHY) ..........................................................141 5.5.3 IEEE 802.11 Data Link Layer .........................................................153 5.5.4 IEEE 802.11 Medium Access Control .............................................153 5.5.5 IEEE 802.11 MAC Sublayer ............................................................159 5.6 Joining an Existing Basic Service Set .........................................................161 5.7 Security of IEEE 802.11 Systems................................................................163 5.8 Power Management .....................................................................................164 5.9 IEEE 802.11b—High-Rate DSSS ...............................................................164 5.10 IEEE 802.11n...............................................................................................165 5.11 Other WLAN Standards ..............................................................................168 5.11.1 HIPERLAN Family of Standards ....................................................168 5.11.2 Multimedia Access Communication—High-Speed Wireless Access Network ................................................................173 5.12 Performance of a Bluetooth Piconet in the Presence of IEEE 802.11 WLANs............................................................................................175 5.12.1 Packet Error Rate (PER) from N Neighboring Bluetooth Piconets ............................................................................................176 5.12.2 PER from M Neighboring IEEE 802.11 WLANs ............................177 5.12.3 Aggregated Throughput ...................................................................177 5.13 Interference Between Bluetooth and IEEE 802.11 ......................................178 5.14 IEEE 802.16.................................................................................................181 5.15 World Interoperability for MicroAccess, Inc. (WiMAX) ............................183 5.15.1 WiMAX PHY ..................................................................................186 5.15.2 WiMAX Media Access Control (MAC) ..........................................187 5.15.3 Spectrum Allocation for WiMAX....................................................188 5.16 Summary......................................................................................................189 Problems ..............................................................................................................189 References ............................................................................................................191 Chapter 6 Fourth-Generation Systems and New Wireless Technologies ..................193 6.1 Introduction .................................................................................................193 6.2 4G Vision .....................................................................................................195 6.3 4G Features and Challenges ........................................................................195 6.4 Applications of 4G.......................................................................................197 6.5 4G Technologies ..........................................................................................200 6.5.1 Multicarrier Modulation...................................................................200 6.5.2 Smart Antenna Techniques ..............................................................201 6.5.3 OFDM–MIMO Systems ..................................................................205 6.5.4 Adaptive Modulation and Coding with Time-Slot Scheduler..........205 6.5.5 Bell Labs Layered Space Time (BLAST) System ...........................206
03_P375077_Prelims1.indd x
7/14/2009 11:04:58 AM
Contents xi
6.5.6 Software-Defined Radio...................................................................209 6.5.7 Cognitive Radio ...............................................................................211 6.6 Summary......................................................................................................212 Problems ..............................................................................................................212 References ............................................................................................................213 Chapter 7 Mesh Networks: Optimal Routing and Scheduling ................................215 7.1 Overview......................................................................................................215 7.2 Network Topology and Link Activation Constraints ...................................216 7.2.1 Link Activation Constraints .............................................................216 7.3 Link Scheduling and Schedulable Region ...................................................219 7.3.1 Stability of Queues...........................................................................222 7.3.2 Link Flows and Link Stability Region .............................................226 7.4 Routing and Scheduling a Given Flow Vector.............................................229 7.5 Discussion....................................................................................................235 7.6 Maximum Weight Scheduling .....................................................................236 7.6.1 Multicommodity Flow Criteria ........................................................238 7.6.2 Lyapunov Stability of a Network of Queues....................................238 7.6.3 The Algorithm and Its Analysis .......................................................239 7.6.4 Discussion ........................................................................................245 7.7 Routing and Scheduling for Elastic Traffic .................................................245 7.7.1 Fair Allocation for Single Hop Flows ..............................................249 7.7.2 Fair Allocation for Multihop Flows .................................................252 7.8 Discussion....................................................................................................257 7.9 Notes on the Literature ................................................................................259 Problems .......................................................................................................................... 260 References .......................................................................................................................261
Chapter 8 Ad Hoc Wireless Sensor Networks .....................................................263 8.1 Overview......................................................................................................265 8.2 Communication Coverage ...........................................................................265 8.3 Discussion....................................................................................................266 8.4 Sensing Coverage ........................................................................................267 8.5 Discussion....................................................................................................273 8.6 Localization .................................................................................................274 8.6.1 Convex Position Estimation .............................................................276 8.7 Discussion....................................................................................................279 8.7.1 Routing.............................................................................................279 8.7.2 Attribute-Based Routing ..................................................................284 8.8 Function Computation .................................................................................286 8.9 Discussion....................................................................................................293 8.10 Scheduling ...................................................................................................294 8.10.1 S-MAC ............................................................................................ 295 8.10.2 IEEE 802.15.4 (Zigbee) .................................................................. 297 8.11 Notes on the Literature ............................................................................... 298
03_P375077_Prelims1.indd xi
7/14/2009 11:04:58 AM
xii
Contents
Problems ............................................................................................................. 299 References ............................................................................................................300 Chapter 9 Sensor Network Platforms and Tools ..................................................303 9.1 Sensor Node Hardware ............................................................................... 304 9.1.1 Berkeley Motes ............................................................................... 305 9.2 Sensor Network Programming Challenges................................................. 307 9.3 Node-Level Software Platforms ................................................................. 309 9.3.1 Operating System: TinyOS ............................................................. 310 9.3.2 Imperative Language: nesC ............................................................ 313 9.3.3 Dataflow-Style Language: TinyGALS ............................................ 319 9.4 Node-Level Simulators ............................................................................... 324 9.4.1 The ns-2 Simulator and Its Sensor Network Extensions ................ 326 9.4.2 The Simulator TOSSIM .................................................................. 327 9.5 Programming Beyond Individual Nodes: State-Centric Programming ...... 328 9.5.1 Collaboration Groups ...................................................................... 329 9.5.2 PIECES: A State-Centric Design Framework ................................ 332 9.5.3 Multitarget Tracking Problem Revisited ......................................... 335 9.6 Summary..................................................................................................... 340 References ............................................................................................................340 Chapter 10 Mobile IP .....................................................................................345 10.1 The Requirements of Mobile IP ................................................................. 345 10.2 Extending the Protocols .............................................................................. 347 10.3 Reverse Tunneling ...................................................................................... 349 10.4 Security Concerns ....................................................................................... 351 Further Reading .................................................................................................. 351 Chapter 11 Mobile IPv6 ...................................................................................353 11.1 Introduction ................................................................................................ 353 11.2 Mobile IPv6 Overview ............................................................................... 354 11.2.1 Types of Nodes................................................................................ 355 11.2.2 Basic Operation of Mobile IPv6 ..................................................... 356 11.3 Header Extension ........................................................................................ 360 11.3.1 Alignment Requirements ................................................................ 361 11.3.2 Home Address Option..................................................................... 361 11.3.3 Type 2 Routing Header ................................................................... 362 11.3.4 Mobility Header .............................................................................. 364 11.3.5 Mobility Options ............................................................................. 372 11.3.6 Neighbor Discovery Messages........................................................ 375 11.3.7 ICMPv6 Messages .......................................................................... 377 11.4 Procedure of Mobile IPv6........................................................................... 381 11.4.1 Protocol Constants and Variables.................................................... 381 11.4.2 Home Registration .......................................................................... 381
03_P375077_Prelims1.indd xii
7/14/2009 11:04:58 AM
Contents xiii
11.4.3 Bi-Directional Tunneling ................................................................ 385 11.4.4 Intercepting Packets for a Mobile Node ......................................... 387 11.4.5 Returning Home .............................................................................. 387 11.5 Route Optimization..................................................................................... 390 11.5.1 Return Routability........................................................................... 391 11.5.2 Sending Initial Messages ................................................................ 391 11.5.3 Responding to Initial Messages ...................................................... 392 11.5.4 Computing a Shared Secret............................................................. 394 11.5.5 Verifying Message .......................................................................... 395 11.5.6 Security Considerations .................................................................. 396 11.5.7 De-Register Binding for Correspondent Nodes .............................. 397 11.5.8 Backward Compatibility ................................................................. 397 11.6 Movement Detection .................................................................................. 399 11.7 Dynamic Home Agent Address Discovery................................................. 399 11.8 Mobile Prefix Solicitation/Advertisement .................................................. 400 11.9 Relationship with IPsec .............................................................................. 404 References ............................................................................................................406 Chapter 12 Security and Survivability of Wireless Systems ..................................407 12.1 Introduction ................................................................................................ 407 12.2 Background................................................................................................. 408 12.3 Current Security Approaches in Wireless Networks .................................. 411 12.4 Current Survivability Approaches in Wireless Networks ........................... 412 12.5 Framework for Wireless Network Survivability and Security.................... 413 12.6 Interaction Between Survivability and Security in Wireless Networks...... 417 12.6.1 Extending the Framework to Include Interactions Between Security and Survivability ................................................................418 12.6.2 Case Study I: Idle Handoffs ............................................................ 421 12.6.3 Case Study II: Key Management in Heterogeneous Sensor Networks ..................................................................... ........422 12.7 Conclusion .................................................................................................. 429 References .......................................................................................................... 430 Index ..............................................................................................................433
03_P375077_Prelims1.indd xiii
7/14/2009 11:04:58 AM
03_P375077_Prelims1.indd xiv
7/14/2009 11:04:58 AM
About This Book All of the elements about wireless networking are here together in a single resource written by the best and brightest experts in the field. This book consolidates both introductory and advanced topics, thereby covering the gamut of wireless networking—from wireless systems overview to fundamental wireless application protocols to wireless sensor networks and security in wireless systems. Wireless Networking Complete expertly combines the finest wireless networking material from the Morgan Kaufmann portfolio, with individual chapters contributed by a select group of authors. The chapters have been combined into one comprehensive book in a way that allows it to be used as a reference work for those interested in new and developing aspects of wireless networking. This book represents a quick and efficient way to unite valuable content from leaders in the wireless networking field, thereby creating a definitive, one-stop-shopping opportunity to access information you would otherwise need to round up from disparate sources.
xv
04_P375077_Bio.indd xv
7/14/2009 7:19:29 AM
04_P375077_Bio.indd xvi
7/14/2009 7:19:29 AM
About the Authors Pei Zheng (Chapter 1) was an Assistant Professor in the Computer Science Department at Arcadia University and a consultant working in the areas of mobile computing and distributed systems during the writing of this book. Dr. Zheng received his Ph.D. degree in Computer Science from Michigan State University in 2003. He was a Member of Technical Staff in Bell Laboratories, Lucent Technologies. He joined Microsoft in 2005. His research interests include distributed systems, network simulation and emulation, and mobile computing. He is also a co-author of Smart Phone and Next Generation Mobile Computing, published by Elsevier, 2005. Feng Zhao (Chapter 9) is a senior researcher at Microsoft, where he manages the Networked Embedded Computing Group. He received his Ph.D. in Electrical Engineering and Computer Science from Massachusetts Institute of Technology (MIT) and has taught at Stanford University and Ohio State University. Dr. Zhao was a principal scientist at Xerox PARC and directed PARC’s sensor network research effort. He is serving as the editor-in-chief of ACM Transactions on Sensor Networks. He is also a co-author of Wireless Sensor Networks, published by Elsevier, 2004. David Tipper (Chapter 12) is an Associate Professor of Telecommunications, with a secondary appointment in Electrical Engineering, at the University of Pittsburgh. He is a senior member of IEEE, and has served as both the Technical Program Chair of the Fourth International IEEE Design of Reliable Communication Networks Workshop and as a co-guest editor of the Journal of Network and Systems Management. He is also a co-author of Information Assurance: Dependability and Security in Networked Systems, published by Elsevier, 2007. Jinmei Tatuya (Chapter 11) is a research scientist at Corporate Research & Development Center, Toshiba Corporation. He had been a core developer of the KAME project since the launch of the project through its conclusion. In 2003, he received a Ph.D. degree from Keio University, Japan, based on his work at KAME. He is also a co-author of IPv6 Advanced Protocols, published by Elsevier, 2007. Keiichi Shima (Chapter 11) is a senior researcher at Internet Initiative Japan Inc. He was a core developer of the KAME project from 2001 until the end of the project and developed Mobile IPv6/NEMO Basic Support protocol stack. He is now working on the new mobility stack xvii
05_P375077_CTR.indd xvii
7/14/2009 7:37:44 AM
xviii About the Authors (the SHISA stack) for BSD operating systems. He is also a co-author of IPv6 Advanced Protocols, published by Elsevier, 2007. Yi Qian (Chapter 12) is an Assistant Professor in the Department of Electrical and Computer Engineering at the University of Puerto Rico at Mayaguez. Prior to joining UPRM, he worked for several companies as a Technical Advisor and a Senior Consultant in the areas of network optimization and network planning. He has been on numerous conference committees, and has most recently served as the General Chair of the 2007 International Symposium on Wireless Pervasive Computing. He is also a co-author of Information Assurance: Dependability and Security in Networked Systems, published by Elsevier, 2007. Larry L. Peterson (Chapter 2) is Professor and Chair of Computer Science at Princeton University. He is Director of the Princeton-hosted PlanetLab Consortium and Chair of the planning group for NSF’s GENI Initiative. His research focuses on the design and implementation of networked systems. Peterson is a Fellow of the ACM. He received his Ph.D. degree from Purdue University in 1985. He is also a co-author of Computer Networks: A Systems Approach, published by Elsevier, 2007. Lionel M. Ni (Chapter 1) is Professor and Head of the Computer Science Department at the Hong Kong University of Science and Technology. Dr. Ni earned his Ph.D. degree in Electrical and Computer Engineering from Purdue University, West Lafayette, IN, in 1981. He was professor in Computer Science and Engineering Department at Michigan State University, where he started his academic career in 1981. He has been involved in many projects related to wireless technologies, 2.5G/3G cellular phones, and embedded systems. He is also a co-author of Smart Phone and Next Generation Mobile Computing, published by Elsevier, 2005. D. Manjunath, Ph.D. (Chapters 7 and 8) is a Professor in the Department of Electrical Engineering of the Indian Institute of Technology (IIT) Bombay. He previously served on the faculty at IIT Kanpur. He is also a co-author of Wireless Networks, published by Elsevier, 2008. Qing Li (Chapter 11) is a senior architect at Blue Coat Systems, Inc. leading the design and development efforts of the next-generation IPv6-enabled secure proxy appliances. Qing holds multiple US patents and is the author of multiple books on networked and embedded systems. He is also a co-author of IPv6 Advanced Protocols, published by Elsevier, 2007. Joy Kuri, (Chapters 7 and 8) is an Associate Professor at the Center for Electronics Design and Technology at the Indian Institute of Science, Bangalore. He is also a co-author of Wireless Networks, published by Elsevier, 2008. Anurag Kumar, Ph.D. (Chapters 7 and 8) is a Professor in the Department of Electrical Communication Engineering, and chair of the Electrical Sciences Division in the Indian Institute of Science (IISc), Bangalore. Previously, he was with AT&T Bell Laboratories, Holmdel, New Jersey. Professor Kumar was also the coordinator at IISc of the Education and
05_P375077_CTR.indd xviii
7/14/2009 7:37:44 AM
About the Authors xix Research Network Project (ERNET), India’s first wide-area packet network. He is an IEEE Fellow. He is also a co-author of Wireless Networks, published by Elsevier, 2008. Prashant Krishnamurthy (Chapter 12) is an Associate Professor with the Graduate Program in Telecommunications and Networking at the University of Pittsburgh, PA. At Pitt, he regularly teaches courses on wireless communication systems and networks, cryptography, and network security. His research interests are wireless network security, wireless data networks, position location in indoor wireless networks, and radio channel modeling for indoor wireless networks. He has had funding for his research from the National Science Foundation and the National Institute of Standards and Technology. He is the co-author of the book Principles of Wireless Networks: A Unified Approach and Physical Layer of Communication Systems (Prentice Hall; 1st edition, December 11, 2001). He served as the chair of the IEEE Communications Society, Pittsburgh Chapter, from 2000–2005. He obtained his Ph.D. in 1999 from Worcester Polytechnic Institute, Worcester, MA. He is also a co-author of Information Assurance: Dependability and Security in Networked Systems, published by Elsevier, 2007. Leonidas Guibas (Chapter 9) heads the Geometric Computation group in the Computer Science Department of Stanford University, where he works on algorithms for sensing, modeling, reasoning about, rendering, and acting on the physical world. He is well-known for his work in computational geometry, computer graphics, and discrete algorithms. Professor Guibas obtained his Ph.D. from Stanford; has worked at PARC, MIT, and DEC/SRC; and was recently elected an ACM Fellow. He is also a co-author of Wireless Sensor Networks, published by Elsevier, 2004. Vijay K. Garg (Chapters 3, 4, 5, and 6) has been a Professor in the Electrical and Computer Engineering Department at the University of Illinois at Chicago since 1999, where he teaches graduate courses in Wireless Communications and Networking. Dr. Garg was a Distinguished Member of Technical Staff at the Lucent Technologies Bell Labs in Naperville, Illinois from 1985 to 2001. He received his Ph.D. degree from the Illinois Institute of Technologies, Chicago, IL in 1973 and his MS degree from the University of California at Berkeley, CA in 1966. Dr. Garg has co-authored several technical books including five in wireless communications. He is a Fellow of ASCE and ASME, and a Senior Member of IEEE. Dr. Garg is a registered Professional Engineer in the state of Maine and Illinois. He is an Academic Member of the Russian Academy of Transport. Dr. Garg was a Feature Editor of Wireless/PCS Series in IEEE Communication Magazine from 1996–2001. He is also the author of Wireless Communications and Networking, published by Elsevier, 2007. Adrian Farrel (Chapter 10) has over two decades of experience designing and developing communications protocol software. At Old Dog Consulting he is an industry-leading freelance consultant on MPLS, GMPLS, and Internet routing, formerly working as MPLS Architect for Data Connection Ltd., and as Director of Protocol Development for Movaz
05_P375077_CTR.indd xix
7/14/2009 7:37:44 AM
xx About the Authors Networks, Inc. He is active within the Internet Engineering Task Force, where he is co-chair of the CCAMP working group responsible for GMPLS, the Path Computation Element (PCE) working group, and the Layer One VPN (L1VPN) working group. Adrian has co-authored and contributed to numerous Internet Drafts and RFCs on MPLS, GMPLS, and related technologies. He is also the author of The Internet and Its Protocols: A Comparative Approach, published by Elsevier, 2004. Bruce S. Davie (Chapter 2) joined Cisco Systems in 1995, where he is a Cisco Fellow. For many years he led the team of architects responsible for Multiprotocol Label Switching and IP Quality of Service. He recently joined the Video and Content Networking Business Unit in the Service Provider group. He has 20 years of networking and communications industry experience and has written numerous books, RFCs, journal articles, and conference papers on IP networking. He is also an active participant in both the Internet Engineering Task Force and the Internet Research Task Force. Prior to joining Cisco, he was director of internetworking research and chief scientist at Bell Communications Research. Bruce holds a Ph.D. in Computer Science from Edinburgh University and is a visiting lecturer at MIT. His research interests include routing, measurement, quality of service, transport protocols, and overlay networks. He is also a co-author of Computer Networks: A Systems Approach, published by Elsevier, 2007.
05_P375077_CTR.indd xx
7/14/2009 7:37:44 AM