1、WIRELESS INTERNET AND MOBILE COMPUTING Interoperability and Performance Yu-Kwong Ricky Kwok Colorado State University Vincent K.N.Lau The Hong Kong University of Science and Technology IEEE IEEE PRESS B I C E N T E N N I A L WILEY WILEY-:2 0 0 7 ;:ur B I C E N T E N N I A L INTERSCIENCE A JOHN WILEY
2、&SONS,INC.,PUBLICATION This Page Intentionally Left BlankWIRELESS INTERNET AND MOBILE COMPUTING B I C E N T E N N I A I I I.1 8 0 7 1 E WLEY 3 2 0 0 7 ;u B I C E N T I N I I A L THE WILEY BICENTENNIAL-KNOWLEDGE FOR GENERATIONS G a c h generation has its unique needs and aspirations.When Charles Wile
3、y first opened his small printing shop in lower Manhattan in 1807,it was a generation of boundless potential searching for an identity.And we were there,helping to define a new American literary tradition.Over half a century later,in the midst of the Second Industrial Revolution,it was a generation
4、focused on building the future.Once again,we were there,supplying the critical scientific,technical,and engineering knowledge that helped frame the world.Throughout the 20th Century,and into the new millennium,nations began to reach out beyond their own borders and a new international community was
5、born.Wiley was there,expanding its operations around the world to enable a global exchange of ideas,opinions,and know-how.For 200 years,Wiley has been an integral part of each generations journey,enabling the flow of information and understanding necessary to meet their needs and fulfill their aspir
6、ations.Today,bold new technologies are changing the way we live and learn.Wiley will be there,providing you the must-have knowledge you need to imagine new worlds,new possibilities,and new opportunities.Generations come and go,but you can always count on Wiley to provide you the knowledge you need,w
7、hen and where you need it!c-4 *WILLIAM J.PESCE PETER BOOTH WILEV PRESIDENT AND CHIEF EXECUTIVE OFFICER CHAIRMAN OF THE BOARD WIRELESS INTERNET AND MOBILE COMPUTING Interoperability and Performance Yu-Kwong Ricky Kwok Colorado State University Vincent K.N.Lau The Hong Kong University of Science and T
8、echnology IEEE IEEE PRESS B I C E N T E N N I A L WILEY WILEY-:2 0 0 7 ;:ur B I C E N T E N N I A L INTERSCIENCE A JOHN WILEY&SONS,INC.,PUBLICATION Copyright 0 2007 by John Wiley&Sons,Inc.All rights reserved.Published by John Wiley&Sons,Inc.,Hoboken,New Jersey.Published simultaneously in Canada.No p
9、art of this publication may be reproduced,stored in a retrieval system,or transmitted in any form or by any means,electronic,mechanical,photocopying,recording,scanning,or otherwise,except as permitted under Section 107 or 108 of the 1976 United States Copyright Act,without either the prior written p
10、ermission of the Publisher,or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center,Inc.,222 Rosewood Drive,Danvers,MA 01923,(978)750-8400,fax(978)750-4470,or on the web at .Requests to the Publisher for permission should be addressed to the Permissions Depa
11、rtment,John Wiley&Sons,Inc.,11 1 River Street,Hoboken,NJ 07030,(201)748-601 1,fax(201)748-6008,or online at http:/ of LiabilityiDisclaimer of Warranty:While the publisher and author have used their best efforts in preparing this book,they make no representations or warranties with respect to the acc
12、uracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose.No warranty may be created or extended by sales representatives or written sales materials.The advice and strategies contained herein may not be
13、suitable for your situation.You should consult with a professional where appropriate.Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages,including but not limited to special,incidental,consequential,or other damages.For general information on our o
14、ther products and services or for technical support,please contact our Customer Care Department within the United States at(800)762-2974,outside the United States at(317)572-3993 or fax(317)572-4002.Wiley also publishes its books in a variety of electronic formats.Some content that appears in print
15、may not be available in electronic format.For information about Wiley products,visit our web site at .Wiley Bicentennial Logo:Richard J.Pacific0 Library of Congress Cataloging-in-Publication Data:Kwok,Yu-Kwong Ricky.Yu Kwong Ricky Kwok and Vincent Lau.Wireless Internet and mobile computing:interoper
16、ability and performance/p.cm.ISBN 978-0-471-67968-4(cloth)1.Wireless communication systems.2.Mobile computing.3.Intemetworking(Telecommunication)I.Lau,Vincent K.N.11.Title.TK5103.2.K95 2007 621.382-dc22 2007001709 Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 To our wives and kids:Fio
17、n,Harold,AmbeK Elvina,and Sze-Chun This Page Intentionally Left BlankCONTENTS Preface Acknowledgments Acronyms PART I ESSENTIALS OF WIRELESS COMMUNICATIONS The Mobile Radio Propagation Channel 1.1 Introduction 1.2 Large Scale Path-loss 1.3 Shadowing Effects 1.4 1.5 Practical Considerations 1.6 Summa
18、ry Problems Small Scale Multipath Fading Effects Modulation Techniques xvii xxix xxxi 1 1 3 6 7 13 16 16 19 vii Viii CONTENTS 2.1 Introduction 2.2 2.3 2.4 2.5 Performance and Tradeoffs 2.6 Practical Illustrations:Digital Modulation 2.7 Summary Problems Signal Space and Geometric Representation of Si
19、gnals Modulation Design and Signal Constellations Demodulation Design and Optimal Detection in AWGN Channels 3 Multiuser Communications 3.1 Introduction 3.2 Information Theoretic Overview 3.3 Orthogonal Resource Partitioning 3.4 Non-Orthogonal Resource Partitioning 3.5 Spectral Efficiency and Perfor
20、mance Issues 3.6 Practical Illustrations:GSM,CDMA and Wireless LAN 3.7 Summary Problems 4 Diversity Techniques 4.1 Introduction 4.2 4.3 4.4 4.5 Equalization*4.6 Practical Illustration:RAKE Receiver 4.7 Summary Problems Effects of Flat Fading on BER Performance Effects of Frequency Selective Fading o
21、n BER Performance Diversity:A Key Technique to Combat Flat Fading Channels PART II CELLULAR WIRELESS TECHNOLOGIES 5 Overview and Evolution of Cellular Technologies 5.1 Introduction 5.2 Evolution of Cellular Systems 5.3 5.4 Summary Technical Challenges to Realize 3G Services 19 21 25 28 34 38 44 45 4
22、7 47 49 54 65 73 81 85 86 87 87 88 89 90 98 101 105 106 111 111 113 121 131 CONTENTS ix Problems 132 6 CDMA(IS-95)133 133 134 136 140 154 164 173 174 6.1 Introduction 6.2 System Architecture of IS95 6.3 6.4 Call Processing 6.5 Power Control 6.6 Soft Handover 6.7 Summary Problems Physical Layer and P
23、hysical Channels 7 GSM 7.1 Introduction 7.2 GSM System Architecture 7.3 GPRS System Architecture 7.4 Radio Interface 7.5 7.6 Summary Problems Core Network Interface and Services 8 Wideband CDMA and Beyond 8.1 Introduction 8.2 UMTS Architecture 8.3 Packet Switched Connections in UMTS(Re1 99)8.3 Packe
24、t Scheduling in HSDPA(Re1 5)8.5 Summary Problems PART 111 SHORT-RANGE WIRELESS TECHNOLOGIES 9 IEEE 802.11 WLAN Standards 9.1 Introduction 9.2 Design Goals 9.3 IEEE 802 Architecture 9.4 IEEE 802.1 1 MAC Layer 175 175 176 179 184 194 216 217 21 9 219 22 1 243 247 254 255 259 259 260 260 264 X CONTENTS
25、 9.5 IEEE 802.11 Physical Layers 9.6 9.7 Advanced Developments 9.8 Practical Illustration:Home Network 9.9 Summary Problems IEEE 802.1 le for QoS Provisioning 10 Bluetooth WPAN 10.1 10.2 10.3 10.4 10.5 10.6 10.7 10.8 Introduction Design Goals Bluetooth Protocol Stack Bluetooth Physical and MAC Layer
26、s Piconets and Scatternets Performance Issues Practical Illustration:Sensor Network Summary Problems 11 Coexistence issues 11.1 11.2 11.3 11.4 11.5 11.6 11.7 11.8 11.9 11.10 Introduction The ISM Band Spectrum Packet Collision Possible Solutions IEEE 802.15 TG2 Interference Source Oriented Adaptive F
27、requency Hopping Interference Source Oriented Master Delay MAC Scheduling Performance Issues Practical Illustration:Bluetooth and Wi-Fi Colocate Transmissions Summary Problems 12 Competing Technologies 12.1 Introduction 12.2 IrDA 12.3 HomeRF 272 277 279 282 283 284 285 285 286 287 292 296 303 304 30
28、5 307 309 309 310 311 313 318 320 322 322 3 24 327 328 329 329 33 1 338 CONTENTS xi 12.4 HIPERLAN 343 12.5 Practical Illustrations-Implementation of HIPERLAN 352 12.6 Summary 354 Problems 355 PROTOCOL ADAPTATIONS FOR WIRELESS NETWORKING PART IV 13 Mobile IP 359 13.1 13.2 13.3 13.4 13.5 13.6 13.7 14
29、IPv6 14.1 14.2 14.3 14.4 14.5 14.6 Introduction Advertisement Mechanisms Registration Tunneling Approaches Route Optimizations Practic a1 Illustr ations-Hierarchic a1 Mobility Management Summary Problems Introduction Design Goals Mobility Support Home Agents Discovery Practical Illustrations-IPv6 Ba
30、sed VTHD Network Summary Problems 15 Wireless Application Protocol(WAP)15.1 Introduction 15.2 WAP Service Model 15.3 WAP System Architecture 15.4 WAP Protocol Stack 15.5 WAP Profiles and Caching 15.6 Practical Illustrations-Location-Aware Advertising System 15.7 Summary Problems 359 360 363 368 369
31、372 313 373 377 377 378 387 3 89 390 3 94 3 94 395 395 396 400 403 407 410 412 412 16 TCP over Wireless 41 3 xii CONTENTS 16.1 16.2 16.3 16.4 16.5 16.6 16.7 16.8 Introduction TCP Congestion and Error Control Deficiencies and Overview of Solutions Link Layer Approaches Split Connection Approaches End
32、-to-End Approaches Practical Illustrations-Wireless WAN Summary Problems PART V WIRELESS RESOURCES MANAGEMENT 17 Wireless Packet Scheduling 17.1 Introduction 17.2 The Scheduling Problem 17.3 System Model 17.4 Fairness Notions 17.5 Fair Queueing Approaches 17.6 Practical Illustrations-HSDPA 17.7 Summ
33、ary Problems 18 Power Management 18.1 Introduction 18.2 Characterization of Power Consumption 18.3 Power Conservation Schemes 18.4 Performance Issues 18.5 Practical Illustrations-The pcMAC Scheme 18.6 Summary Problems 19 Ad Hoc Routing 19.1 Introduction 19.2 Application Scenarios 19.3 System Model 1
34、9.4 Performance Metrics 19.5 Routing Protocols 413 414 418 419 422 425 427 429 430 433 433 434 437 444 449 453 45 3 454 455 455 456 458 468 470 472 47 3 475 475 477 478 480 482 CONTENTS xiii 19.6 Practical Illustrations-WLAN Based Ad Hoc Routing 19.7 Summary Problems 20 Wireless Data Caching 20.1 In
35、troduction 20.2 Application Scenarios 20.3 System Architecture 20.4 Performance Metrics 20.5 Data Caching Approaches 20.6 Practical Illustrations-Proactive Key Caching 20.7 Summary Problems 21 Security Issues 2 1.1 Introduction 2 1.2 Security Considerations 2 1.3 Cellular Wireless Security 2 1.4 Sho
36、rt-Range Wireless Security 2 1.5 Practical Illustrations-Wireless LAN Security Auditing 21.6 Summary Problems PART VI MOBILE COMPUTING APPLICATIONS 22 VolP on Wireless 22.1 Introduction 22.2 iGSM VoIP Approach 22.3 iGSM System Architecture 22.4 iGSM Call Processing 22.5 Practical Illustrations-Probl
37、ems and Solutions for VoIP over IEEE 802.1 1 72.6 Summary Problems 497 499 500 501 50 1 502 504 506 507 517 518 518 51 9 519 52 1 522 529 538 540 54 1 545 545 546 547 548 556 560 560 23 Wireless Video 561 xiv CONTENTS 23.1 Introduction 23.2 Real-Time Service Goals 23.3 System Constraints 23.4 Error
38、Concealment Techniques 23.5 Joint Source Channel Coding Techniques 23.6 Practical Illustrations-Rate Adaptation for MPEG-4 Video 23.7 Summary Problems 24 Wireless File Systems 24.1 24.2 24.3 24.4 24.5 24.6 24.7 24.8 Introduction File System Service Model General Principles for the Design of a Distri
39、buted File System Replication Services and Mechanisms Disconnected Operations and Caching Weakly Connected Operations Practical Illustrations-Mobile Distributed Database Summary Problems 25 Location Dependent Services 25.1 Introduction 25.2 Mobile Location Service Model 25.3 Spatial Analysis Techniq
40、ues 25.4 Mobile Positioning Techniques 25.5 Practical Illustrations-The Cricket Location Support System 25.6 Summary Problems 26 Trust Bootstrapping in Wireless Sensor Networks 26.1 Introduction 26.2 Key Predistribution 26.3 26.4 Key Establishment 26.5 Discussions and Future Work 26.6 Summary Key Pr
41、edistribution with Deployment Knowledge 56 1 562 563 563 573 574 575 577 579 579 580 582 582 5 84 588 590 595 595 597 597 598 600 604 608 613 613 61 5 615 619 625 630 642 643 CONTENTS XV Problems 643 27 Peer-to-Peer Computing over Wireless 27.1 Introduction 27.2 27.3 Wired P2P Systems 27.4 27.5 Medi
42、a Objects Replication Techniques 27.6 Practical Illustrations-Localized Topology Control 27.7 Summary Problems A Taxonomy of P2P Systems Topology Control in Wireless Ad Hoc Networks 28 Incentives in Peer-to-Peer Computing 28.1 Introduction 28.2 28.3 28.4 Discussion and Future Work 28.5 Summary Probl
43、ems Incentive Issues in P2P Systems over the Internet Incentive Issues in Wireless P2P Systems Appendix A:Optimality of Minimum Distance Decoder 645 645 646 647 65 1 654 655 66 1 66 1 663 663 667 688 693 69 5 695 697 References 70 1 Topic Index 725 This Page Intentionally Left BlankPREFACE The Theme
44、:The all-mighty Internet has extended its reach to the wireless realm.With this exciting development,we have an ambitious goal in this book-to help the reader to build up sound technical understanding of what is going on in a large-scale net-working system as depicted graphically in Figure 0.1.Using
45、 a bottom-up approach,we would like the reader to understand how it is feasible,for instance,for a cellular device user(top left comer in the figure)to communicate,via the all-purpose TCP/IP protocols,with a wireless notebook computer user(bottom left comer in the figure),traversing all the way thro
46、ugh a base station in a cellular wireless network(e.g.,GSM,CDMA),a public switched telephone network(PSTN),the Internet,an intranet,a lo-cal area network(LAN),and a wireless LAN access point.In traveling through this long path.the information bits are processed by numerous disparate communication te
47、chnologies(in slightly more technical terms,processed by many different protocol stacks and wireless air interfaces).We also describe the technologies involved in infrastructureless(i.e.,ad hoc)wireless networks(the bottom right comer in the fig-ure).which are widely envisioned to be the most popula
48、r form of mobile computing infrastructure.pertaining to many interesting applications:most notably,wireless network games.Our focus is on how these distinctive technologies can work together xvii xviii PREFACE 8 TCPiIP,connection a F-t.i I Gateway Telephone Network Gateway Internet CelluluGwork Web
49、Serves Figure 0.1 The Internet extends into the wireless realm.through various adaptation methods.Specifically,throughout this book we use two major technical challenges to delineate and motivate our discussion-interoperability and performance.We believe that interoperability is the very first conce
50、rn in integrating so many different components to realize a seamless communication path for users with dis-parate wireless devices.Indeed,many interesting features of intelligent communi-cation technologies emerge out of the need to address the interoperability issues.Performance is another major ch