CHAPTER 1 Introduction 1
1.1 History of Cellular Systems 1
1.2 Characteristics of Cellular Systems 12
1.3 Fundamentals of Cellular Systems 15
1.4 Cellular System Infrastructure 21
1.5 Network Protocols 24
1.6 IEEE 802.11 Technologies 24
1.7 Ad Hoc Networks 25
1.8 Sensor Networks 26
1.9 Wireless MANs,LANs,BANs,and PANs 27
1.10 Security and Privacy in Wireless Networks 28
1.11 Satellite Systems 28
1.12 Recent Advances 29
1.13 Outline of the Book 29
1.14 References 30
1.15 Problems 31
CHAPTER 2 Mobile Radio Propagation 33
2.1 Introduction 33
2.2 Types of Radio Waves 33
2.3 Propagation Mechanisms 34
2.4 Free Space Propagation 35
2.5 Land Propagation 37
2.6 Path Loss 39
2.7 Slow Fading 41
2.8 Fast Fading 43
2.8.1 Statistical Characteristics of the Envelope 43
2.8.2 Characteristics of Instantaneous Amplitude 46
2.9 Doppler Effect 48
2.10 Delay Spread 50
2.11 IntersymbolInterference 51
2.12 Coherence Bandwidth 52
2.13 Cochannel Interference 52
2.14 Summary 53
2.15 References 53
2.16 Experiments 54
2.17 Open-Ended Projects 55
2.18 Problems 55
CHAPTER 3 Cellular Concept 58
3.1 Introduction 58
3.2 Cell Area 58
3.3 Signal Strength and Cell Parameters 60
3.4 Capacity of a Cell 64
3.5 Frequency Reuse 66
3.6 How to Form a Cluster 67
3.7 Cochannel Interference 70
3.8 Cell Splitting 72
3.9 Cell Sectoring 72
3.10 Summary 75
3.11 References 75
3.12 Experiments 75
3.13 Open-Ended Projects 77
3.14 Problems 77
CHAPTER 4 Multiple Radio Access 81
4.1 Introduction 81
4.2 Multiple Radio Access Protocols 82
4.3 Contention-Based Protocols 83
4.3.1 Pure ALOHA 84
4.3.2 Slotted ALOHA 85
4.3.3 CSMA 86
4.3.4 CSMA/CD 90
4.3.5 CSMA/CA 91
4.4 Comparison of CSMA/CD and CSMA/CA 95
4.5 Summary 95
4.6 References 95
4.7 Experiments 97
4.8 Open-Ended Projects 98
4.9 Problems 98
CHAPTER 5 Multiple Division Techniques 100
5.1 Introduction 100
5.2 Concepts and Models for Multiple Divisions 100
5.2.1 FDMA 101
5.2.2 TDMA 103
5.2.3 CDMA 105
5.2.4 OFDM 110
5.2.5 SDMA 112
5.2.6 Comparison of Multiple Division Techniques 113
5.3 Modulation Techniques 114
5.3.1 Amplitude Modulation (AM) 114
5.3.2 Frequency Modulation (FM) 114
5.3.3 FSK 116
5.3.4 Phase Shift Keying (PSK) 116
5.3.5 Quadrature Phase Shift Keying (QPSK) 117
5.3.6 rr/4QPSK 117
5.3.7 Quadrature Amplitude Modulation (QAM) 119
5.3.8 16QAM 119
5.4 Summary 120
5.5 References 121
5.6 Experiments 121
5.7 Open-Ended Projects 122
5.8 Problems 122
CHAPTER 6 Channel Allocation 125
6.1 Introduction 125
6.2 Static Allocation versus Dynamic Allocation 126
6.3 Fixed Channel Allocation (FCA) 126
6.3.1 Simple Borrowing Schemes 127
6.3.2 Complex Borrowing Schemes 127
6.4 Dynamic Channel Allocation (DCA) 130
6.4.1 Centralized Dynamic Channel Allocation Schemes 130
6.4.2 Distributed Dynamic Channel Allocation Schemes 131
6.5 Hybrid Channel Allocation (HCA) 132
6.5.1 Hybrid Channel Allocation (HCA) Schemes 132
6.5.2 Flexible Channel Allocation Schemes 133
6.6 Allocation in Specialized System Structure 133
6.6.1 Channel Allocation in One-Dimensional Systems 133
6.6.2 Reuse Partitioning-Based Channel Allocation 134
6.6.3 Overlapped Cells-Based Channel Allocation 135
6.7 System Modeling 137
6.7.1 Basic Modeling 137
6.7.2 Modeling for Channel Reservation 139
6.8 Summary 140
6.9 References 141
6.10 Experiments 141
6.11 Open-Ended Projects 143
6.12 Problems 143
CHAPTER 7 Mobile Communication Systems 147
7.1 Introduction 147
7.2 Cellular System Infrastructure 147
7.3 Registration 151
7.4 Handoff Parameters and Underlying Support 153
7.4.1 Parameters Influencing Handoff 153
7.4.2 Handoff Underlying Support 154
7.5 Roaming Support 156
7.5.1 Home Agents,Foreign Agents,and Mobile IP 157
7.5.2 Rerouting in Backbone Routers 159
7.6 Multicasting 161
7.7 Ultra-Wideband Technology 164
7.7.1 UWB System Characteristics 164
7.7.2 UWB Signal Propagation 165
7.7.3 Current Status and Applications of UWB Technology 165
7.7.4 Difference between UWB and Spread Spectrum Techniques 166
7.7.5 UWB Technology Advantages 166
7.7.6 UWB Technology Drawbacks 167
7.7.7 Challenges for UWB Technology 167
7.7.8 Future Directions 168
7.8 Femto Cell Network 168
7.8.1 Technical Features 168
7.8.2 Challenges 171
7.9 Summary 173
7.10 References 173
7.11 Experiments 175
7.12 Open-Ended Problem 176
7.13 Problems 176
CHAPTER 8 Network Protocols 179
8.1 Introduction 179
8.1.1 Layer 1:Physical Layer 180
8.1.2 Layer 2:Data Link Layer 181
8.1.3 Layer 3:Network Layer 181
8.1.4 Layer 4:Transport Layer 181
8.1.5 Layer 5:Session Layer 181
8.1.6 Layer 6:Presentation Layer 182
8.1.7 Layer 7:Application Layer 182
8.2 TCP/IP Protocol 182
8.2.1 Physical and Data Link Layers 182
8.2.2 Network Layer 183
8.2.3 TCP 185
8.2.4 Application Layer 185
8.2.5 Routing Using Bellman-Ford Algorithm 185
8.3 TCP over Wireless 186
8.3.1 Need for TCP over Wireless 186
8.3.2 Limitations of Wired Version ofTCP 187
8.3.3 Solutions for Wireless Environment 187
8.3.4 Link Layer Protocols 189
8.4 Internet Protocol Version 6 (IPv6) 190
8.4.1 Transition from IPv4 to IPv6 190
8.4.2 IPv6 Header Format 192
8.4.3 Features of IPv6 192
8.4.4 Differences between IPv6 and IPv4 193
8.5 Summary 193
8.6 References 193
8.7 Experiment 195
8.8 Open-Ended Project 195
8.9 Problems 196
CHAPTER 9 Existing Wireless Systems 198
9.1 Introduction 198
9.2 AMPS 198
9.2.1 Characteristics of AMPS 199
9.2.2 Operation of AMPS 199
9.2.3 General Working of AMPS Phone System 202
9.3 IS-41 203
9.3.1 Introduction 203
9.3.2 Support Operations 205
9.4 GSM 205
9.4.1 Frequency Bands and Channels 206
9.4.2 Frames in GSM 208
9.4.3 Identity Numbers Used by a GSM System 209
9.4.4 Interfaces,Planes,and Layers of GSM 211
9.4.5 Handoff 213
9.4.6 Short Message Service (SMS) 214
9.5 IS-95 214
9.5.1 Power Control 217
9.6 IMT-2000 219
9.6.1 International Spectrum Allocation 220
9.6.2 Services Provided byThird-Generation Cellular Systems (3G) 220
9.6.3 Harmonized Third-Generation Systems 221
9.6.4 Multimedia Messaging Service (MMS) 222
9.6.5 Universal Mobile Telecommunications System (UMTS) 223
9.7 Summary 227
9.8 References 228
9.9 Problems 228
CHAPTER 10 IEEE 802.11 Technologies and Access Points 230
10.1 Introduction 230
10.2 Downlink Transfer of Information 231
10.3 Uplink Transfer of Information 235
10.3.1 UplinkTransfer of Information with RTS/CTS 235
10.4 Variants of 802.11 Series Protocols 238
10.4.1 IEEE 802.11 b 239
10.4.2 IEEE802.11g 240
10.4.3 IEEE 802.1 1 n 240
10.4.4 IEEE 802.1 1 ac 241
10.5 WiFi Access in Airplanes 243
10.6 Summary 244
10.7 References 244
10.8 Experiment 245
10.9 Open-Ended Project 245
10.10 Problems 245
CHAPTER 11 Ad Hoc Networks 247
11.1 Introduction 247
11.2 Characteristics of MANETs 249
11.3 Applications 250
11.4 Routing 251
11.4.1 Need for Routing 251
11.4.2 Routing Classification 252
11.5 Table-Driven Routing Protocols 253
11.5.1 Destination-Sequenced Distance-Vector Routing 253
11.5.2 Cluster Formation in a MANET 254
11.5.3 Cluster Head Selection 254
11.5.4 Cluster Head Gateway Switch Routing 254
11.5.5 Wireless Routing Protocol 256
11.6 Source-Initiated On-Demand Routing 257
11.6.1 Ad Hoc On-Demand Distance Vector Routing 257
11.6.2 Dynamic Source Routing 258
11.6.3 Temporarily Ordered Routing Algorithm (TORA) 260
11.6.4 Associativity-Based Routing 262
11.6.5 Signal Stability-Based Routing 263
11.7 Hybrid Protocols 264
11.7.1 Zone Routing 264
11.7.2 Fisheye State Routing 265
11.7.3 Landmark Routing (LANMAR) for MANET with Group Mobility 265
11.7.4 Location-Aided Routing 266
11.7.5 Distance Routing Effect Algorithm for Mobility 267
11.7.6 Relative Distance Microdiscovery Ad Hoc Routing (RDMAR) 268
11.7.7 Power Aware Routing 268
11.8 Multipath Routing Protocols 269
11.8.1 On-Demand Multipath Routing for Mobile Ad Hoc Networks 270
11.8.2 Ad Hoc On-Demand Distance Vector-Backup Routing (AODV-BR) 271
11.8.3 Split Multipath Routing 273
11.8.4 Caching and Multipath Routing Protocol 273
11.8.5 Neighbor-Table-Based Multipath Routing in Ad Hoc Networks (NTBMR) 276
11.9 Vehicular Area Network (VANET) 277
11.10 Network Simulators 280
11.10.1 ns-2 and ns-3 280
11.10.2 Other Network Simulators 282
11.11 Summary 283
11.12 References 283
11.13 Experiments 287
11.14 Open-Ended Project 289
11.15 Problems 289
CHAPTER 12 Sensor Networks 293
12.1 Introduction 293
12.2 Network Characteristics 297
12.2.1 Classification of Sensor Networks 297
12.2.2 Fundamentals of MAC Protocol for WSNs 298
12.2.3 Flat Routing in Sensor Networks 299
12.2.4 Directed Diffusion 299
12.2.5 Sensor Protocols for Information via Negotiation (SPIN) 300
12.2.6 COUGAR 300
12.3 Hierarchical Routing in Sensor Networks 301
12.3.1 Cluster-Based Routing Protocol (CBRP) 303
12.3.2 Low-Energy Adaptive Clustering Hierarchy (LEACH) 303
12.3.3 Threshold-Sensitive Energy-Efficient Network (TEEN) 304
12.3.4 Adaptive Periodic Threshold-Sensitive Energy-Efficient Sensor Network(APTEEN)Protocol 305
CHAPTER 13 Wireless LANs,PANs,BANs,and MANs 308
13.1 Introduction 308
13.2 ETSI High-Performance LAN (HiperLAN) 308
13.3 HomeRF 310
13.4 Ricochet 312
13.5 Wireless Personal Area Networks (WPANs) 313
13.6 IEEE 802.15.1 (Bluetooth) 314
13.6.1 Architecture of the Bluetooth System 317
13.6.2 IEEE 802.15.3 320
13.6.3 IEEE 802.15.4 322
13.7 ZigBee 328
13.8 Wireless Body Area Networks (WBANs) 329
13.9 WMANs Using Worldwide Interoperability for Microwave Access (WiMAX) 330
13.9.1 MAC Layer 330
13.9.2 MAC Layer Details 331
13.9.3 Service-Specific Convergence Sublayers 331
13.9.4 Common Part Sublayer 331
13.9.5 Physical Layer 335
13.9.6 Physical Layer Details 336
13.10 WMAN Using a Mesh Network 337
13.11 WMANs Using 3GPP and Long Term Evolution (LTE) 340
13.12 WMAN Using Long Term Evolution (LTE) and LTE-A 343
13.13 Summary 346
13.14 References 347
13.15 Experiments 349
13.16 Open-Ended Project 350
13.17 Problems 351
CHAPTER 14 Security and Privacy in Wireless Networks 354
14.1 Introduction 354
14.2 Encryption and Decryption Techniques 354
14.2.1 Encryption Techniques 355
14.3 Wireless System Security 358
14.3.1 Security in Cell Phones 360
14.3.2 Security in LTE Networks 360
14.3.3 Authentication in WiFi-Based AP Networks 361
14.3.4 Diffie-Hellman Protocol 364
14.3.5 Elliptic Curve Cryptography (ECC) 365
14.4 Firewalls and System Security 366
14.5 Security Issues in Mobile Ad Hoc Networks (MANETs) 367
14.5.1 Security Approaches 369
14.5.2 Intrusion Detection 369
14.5.3 Requirements for an IDS for MANETs 370
14.5.4 Mobile Agents for Intrusion Detection and Response in a MANET 372
14.5.5 Intrusion Detection Architecture (IDA) Based on a Static Stationary Database (SSD) 373
14.5.6 Cluster-Based Intrusion Detection System in MANETs 374
14.5.7 Logging Module 376
14.5.8 Selfishness in a MANET 377
14.6 Secured Communication in Wireless Sensor Networks (WSNs) 377
14.6.1 Shared Symmetric Key between Two Sensors in a Randomly Deployed WSN 379
14.6.2 Use of Bivariate Polynomial in Establishing a Shared Secret Key between Two Sensors 382
14.6.3 Intrusion Detection Schemes 382
14.7 Distributed DoS (DDoS) Attack Detection 386
14.7.1 Covariance Analysis Method 388
14.8 Summary 391
14.9 References 392
14.10 Experiments 396
14.11 Open-Ended Project 397
14.12 Problems 397
CHAPTER 15 Satellite Systems 401
15.1 Introduction 401
15.2 Types of Satellite Systems 401
15.3 Characteristics of Satellite Systems 406
15.4 Satellite System Infrastructure 408
Acronyms 411