ebook img

Principles of Mobile Computing and Communications PDF

282 Pages·2007·2.756 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Principles of Mobile Computing and Communications

Principles of Mobile Computing and Communications AU6158.indb 1 10/23/07 4:56:11 PM AU6158.indb 2 10/23/07 4:56:11 PM Principles of Mobile Computing and Communications Mazliza Othman Boca Raton New York Auerbach Publications is an imprint of the Taylor & Francis Group, an informa business AU6158.indb 3 10/23/07 4:56:11 PM 3GPP™ TSs and 3GPP™ TRs are the property of ARIB, ATIS, ETSI, CCSA, TTA and TTC who jointly own the copyright in them. They are subject to further modifications and are therefore provided to you “as is” for information purposes only. Further use is strictly prohibited. ZigBee is a registered trademark of the ZigBee Alliance. Bluetooth is a registered trademark of Bluetooth SIG, Inc. CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2008 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20140114 International Standard Book Number-13: 978-1-4200-6159-8 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit- ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents Preface ...........................................................................................................ix About the Author ........................................................................................xiii Chapter 1 Introduction ...........................................................................1 1.1 Mobile Computing Applications .........................................................2 1.2 Evolution of Wireless Networks and Services......................................6 1.3 Summary ...........................................................................................9 Chapter 2 Cellular Network Architecture .............................................11 2.1 UMTS Architecture .........................................................................13 2.2 Public Land Mobile Network Interfaces ...........................................20 2.3 User Authentication .........................................................................22 2.4 Frequency Reuse ..............................................................................23 2.5 Channel Assignment ........................................................................23 2.6 Location Registration and Update ....................................................24 2.7 Handover Procedures .......................................................................25 2.8 CDMA ............................................................................................37 2.9 The Move toward 3G Networks .......................................................38 Chapter 3 Wireless Local Area Networks ..............................................41 3.1 IEEE 802.11 Standard .....................................................................41 3.2 IEEE 802.11b Standard (Wi-Fi).......................................................45 3.3 IEEE 802.11a Standard ....................................................................46 3.4 IEEE 802.11g Standard ...................................................................47 3.5 HIPERLAN/2 ..................................................................................47 3.6 IEEE 802.1x Standard......................................................................52 3.7 IEEE 802.11i Standard ....................................................................52 3.8 IEEE 802.11e Standard ....................................................................53 3.9 Security Issues ..................................................................................55 3.10 IP over 802.11 WLAN .....................................................................58 3.11 Integrating 802.11 WLAN and UMTS ............................................59 v AU6158.indb 5 10/23/07 4:56:12 PM vi Contents 3.12 Summary .........................................................................................63 Chapter 4 Wireless Personal Area Networks .........................................65 4.1 HomeRF ..........................................................................................65 4.2 Bluetooth Technology ......................................................................67 4.3 IEEE 802.15.3 Standard ..................................................................77 4.4 Home Area Networks .......................................................................78 4.5 Summary .........................................................................................81 Chapter 5 Wireless Sensor Networks ....................................................83 5.1 Applications of WSNs ......................................................................84 5.2 Requirements for WSNs ..................................................................85 5.3 WSN Architecture ...........................................................................85 5.4 The 802.15.4 Standard .....................................................................86 5.5 The ZigBee Protocol .........................................................................92 5.6 Power Conservation Techniques .......................................................95 5.7 Network and Communications ........................................................98 5.8 Configuration of Sensor Networks ...................................................99 5.9 WSN and Emergency Response Applications .................................103 5.10 Summary .......................................................................................106 Chapter 6 Mobile Ad Hoc Networks ...................................................109 6.1 AODV ...........................................................................................109 6.2 DSR ...............................................................................................116 6.3 OLSR ............................................................................................119 6.4 TBRPF ..........................................................................................125 6.5 Summary .......................................................................................131 Chapter 7 Mobile IP ...........................................................................133 7.1 An Overview ..................................................................................133 7.2 Agent Advertisement Message ........................................................134 7.3 Home Network Configurations ......................................................135 7.4 Registration Messages .....................................................................136 7.5 Routing and Tunneling ..................................................................140 7.6 Security Issues in Mobile IP ...........................................................145 7.7 Mobile IP and Ad Hoc Networks ...................................................149 7.8 Summary .......................................................................................150 Chapter 8 Issues in Mobile Computing ..............................................153 8.1 Bandwidth .....................................................................................154 8.2 Adaptive Behavior ..........................................................................154 8.3 Power Management ........................................................................160 8.4 Interface Design .............................................................................166 8.5 Heterogeneity of Devices and Environments ..................................173 AU6158.indb 6 10/23/07 4:56:12 PM Contents vii 8.6 Seamless Mobility over Heterogeneous Wireless Networks .............175 8.7 Other Issues in Mobile Application Design ....................................177 8.8 Summary .......................................................................................187 Chapter 9 Location-Sensing and Location Systems ............................191 9.1 Location-Sensing Techniques .........................................................191 9.2 A Taxonomy of Location Systems ...................................................195 9.3 GPS: An Example of a Positioning System .....................................199 9.4 Active Badge: An Example of a Tracking System.............................200 9.5 Modeling Location-Tracking Application .......................................202 9.6 Location-Aware Application for Medical Workers ..........................205 9.7 Summary .......................................................................................207 Chapter 10 Wireless Network Security ................................................211 Co-authored by Mazliza othMan and Fazidah othMan 10.1 Overview of Wireless Security Issues ..............................................211 10.2 Security of Data Transmission ........................................................214 10.3 Next-Generation Hackers...............................................................216 10.4 Summary .......................................................................................218 Acronyms....................................................................................................221 Index ..........................................................................................................231 AU6158.indb 7 10/23/07 4:56:12 PM AU6158.indb 8 10/23/07 4:56:12 PM Preface This book is written to address a number of issues that currently are not addressed by other books on the topics of mobile computing and communications. I have taught a mobile computing course for a few years and have come across a number of books that discuss wireless network technologies and infrastructures, and books that focus on tools and software to develop mobile applications. What I find missing in these books is a discussion on how developing mobile computing applications are different from developing conventional applications, the issues and constraints that need to be addressed, and why mobile applications are different from conventional applications. This book is my attempt at addressing those shortcomings. Another difficulty that I encountered when teaching this subject is that most books on wireless networks are written for engineering students. Adopting the material for computer science students is quite a task. That is another reason for this book—it is written specifically for computer science students and people from a computer or information technology background. Overview of the Book This book can be used as a textbook for a mobile computing course (introductory or intermediate). It is targeted at second- or third-year undergraduate computer sci- ence students, but can also be used as a reference book for a postgraduate course. It assumes that readers have a basic knowledge of computer communication networks. If enough time and motivation exist, the reader is advised to go through the entire book cover to cover. Otherwise, the reader may choose topics of interest. The book is written so that the chapters are independent of each other. It is organized as follows. Chapter 1 gives an overview of what mobile computing has to offer and how mobile applications will eventually change the way we work and live. It describes Mark Weiser’s vision of a ubiquitous computing environment and proceeds to give examples of mobile applications in different fields followed by a section that gives an overview of the evolution of wireless networks and services. ix AU6158.indb 9 10/23/07 4:56:12 PM

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.