Siêu thị PDFTải ngay đi em, trời tối mất

Thư viện tri thức trực tuyến

Kho tài liệu với 50,000+ tài liệu học thuật

© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Networking Fundamentals
PREMIUM
Số trang
641
Kích thước
12.4 MB
Định dạng
PDF
Lượt xem
779

Networking Fundamentals

Nội dung xem thử

Mô tả chi tiết

NETWORKING

FUNDAMENTALS

Networking Fundamentals: Wide, Local and Personal Area Communications Kaveh Pahlavan and

Prashant Krishnamurthy © 2009 John Wiley & Sons, Ltd. ISBN: 978-0-470-99289-0

NETWORKING

FUNDAMENTALS

Wide, Local and Personal Area

Communications

KAVEH PAHLAVAN

Worcester Polytechnic Institute, USA

PRASHANT KRISHNAMURTHY

University of Pittsburgh, USA

This edition first published 2009

# 2009 John Wiley & Sons Ltd.,

Registered office

John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom

For details of our global editorial offices, for customer services and for information about how to apply for

permission to reuse the copyright material in this book please see our website at www.wiley.com.

The right of the author to be identified as the author of this work has been asserted in accordance with the

Copyright, Designs and Patents Act 1988.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,

in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted

by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may

not be available in electronic books.

Designations used by companies to distinguish their products are often claimed as trademarks. All brand names

and product names used in this book are trade names, service marks, trademarks or registered trademarks of their

respective owners. The publisher is not associated with any product or vendor mentioned in this book. This

publication is designed to provide accurate and authoritative information in regard to the subject matter covered.

It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional

advice or other expert assistance is required, the services of a competent professional should be sought.

Library of Congress Cataloging-in-Publication Data

Pahlavan, Kaveh, 1951-

Networking fundamentals : wide, local, and personal area communications /

Kaveh Pahlavan.

p. cm.

Includes bibliographical references and index.

ISBN 978-0-470-99289-0 (cloth) – ISBN 978-0-470-99290-6 (pbk.) 1.

Computer networks. I. Title.

TK5105.5.P343 2009

004.6–dc22

2009004131

A catalogue record for this book is available from the British Library.

ISBN 9780470992890 (H/B) 9780470992906 (PBK)

Typeset in 10/12pt Times by Thomson Digital, Noida, India.

Printed and bound in Great Britain by Antony Rowe, Chippenham, UK

CONTENTS

About the Authors xiii

Preface xv

1 Introduction to Information Networks 1

1.1 Introduction 1

1.1.1 Elements of Information Networks 3

1.1.2 Chronology of Information Networks 5

1.1.3 Standards Organizations for Information Networking 7

1.1.4 Evolution of Long-Haul Multiplexing Standards 10

1.2 Evolution of Wide-Area Networks 13

1.2.1 Evolution of the Public Switched Telephone Network 14

1.2.2 Emergence of the Internet 15

1.2.3 HFC Infrastructure for Cable TV 17

1.2.4 Evolution of Cellular Telephone Networks 17

1.3 Evolution of Local Networks 18

1.3.1 Evolution of Local Access to Public Switched

Telephone Network 19

1.3.2 Evolution of the IEEE 802.3 Ethernet 21

1.3.3 Evolution of the IEEE 802.11 Wireless Local-Area Network 22

1.3.4 Internet Access to Home and IEEE 802.16 24

1.3.5 Evolution of IEEE 802.15 Wireless Personal-Area

Networks 28

1.4 Structure of the Book 30

Questions 31

Project 1 32

PART ONE: FUNDAMENTALS OF TRANSMISSION AND ACCESS 33

2 Characteristics of the Medium 35

2.1 Introduction 35

2.2 Guided Media 36

2.2.1 Twisted Pair 38

v

2.2.2 Coaxial Cables 42

2.2.3 Optical Fiber 45

2.3 Wireless Media 48

2.3.1 Radio Propagation Mechanisms 49

2.3.2 Path-Loss Modeling and Signal Coverage 50

2.3.3 Path-Loss Models for Indoor Areas 56

2.3.4 Path-Loss Models for Outdoor Areas 60

2.3.5 Effects of Multipath and Doppler 62

2.3.6 Emerging Channel Models 68

Questions 72

Problems 73

Project 1: Simulation of Multipath Fading 77

Project 2: The RSS in IEEE 802.11 78

Project 3: Coverage and Data Rate Performance of the

IEEE 802.11B/G WLANs 79

3 Fundamentals of Physical Layer Transmission 83

3.1 Information Transmission 83

3.1.1 Wired and Wireless Transmission 84

3.1.2 Baseband Transmission 87

3.2 Transmission Techniques and Signal Constellation 89

3.2.1 Multisymbol Digital Communications 90

3.2.2 Signal Constellation in Digital Communications 91

3.2.3 Two-Dimensional Signal Constellations 94

3.2.4 Channel Capacity 100

3.3 Performance of the Physical Layer 102

3.3.1 Effects of Fading on Performance over Wireless Channels 105

3.3.2 Diversity Techniques 107

3.4 Wideband Modems 109

3.4.1 Spread-Spectrum Transmissions 110

3.4.2 Orthogonal Frequency-Division Multiplexing 115

3.4.3 Space–Time Coding 117

3.4.4 Capacity Multiple-Input–Multiple-Output Antenna Systems 118

Questions 119

Problems 120

Projects 123

4 Coding and Reliable Packet Transmission 125

4.1 Introduction 125

4.2 Source Coding and Framing Techniques 127

4.2.1 Information Source and Coding 127

4.2.2 Framing Techniques 130

4.3 FEC Coding 132

4.3.1 Fundamentals of Coding 132

4.3.2 Block Codes 136

4.3.3 Convolutional Codes 141

4.3.4 Codes for Manipulating Data 145

vi CONTENTS

4.4 Coding for Spread-Spectrum and Code-Division Multiple

Access Systems 147

4.4.1 Pseudo Noise Codes 148

4.4.2 M-ary Orthogonal Codes 149

4.5 ARQ Schemes 151

4.5.1 Stop and Wait 151

4.5.2 Go-Back-N 153

4.5.3 Selective-Repeat Automatic Repeat Request 153

4.5.4 Hybrid Automatic Repeat Request 154

4.6 Flow Control Protocols 155

4.6.1 Stop and Wait 156

4.6.2 Sliding Window 158

Questions 159

Problems 159

5 Medium Access Methods 165

5.1 Introduction 165

5.2 Centralized Assigned Access Schemes 167

5.2.1 Frequency-Division Multiple Access 168

5.2.2 Time-Division Multiple Access 171

5.2.3 Code-Division Multiple Access 174

5.2.4 Comparison of Code-, Time-, and Frequency-Division

Multiple Access 177

5.2.5 Performance of Assigned Access Methods 180

5.3 Distributed Random Access Schemes 184

5.3.1 Random Access Methods for Data Services 184

5.3.2 Access Methods for Local-Area Networks 191

5.3.3 Performance of Random Access Methods 196

5.4 Integration of Voice and Data Traffic 205

5.4.1 Access Methods for Integrated Services 205

5.4.2 Data Integration in Voice-Oriented Networks 205

5.4.3 Voice Integration into Data-Oriented Networks 211

Questions 217

Problems 218

Projects 222

PART TWO: WIDE-AREA NETWORKS 225

6 The Internet 227

6.1 Introduction: Internet Infrastructure 227

6.1.1 Fundamentals of Packet Forwarding 229

6.2 Addressing 230

6.2.1 ISDN Addressing in Connection-Based PSTN 231

6.2.2 MAC Addressing in Connectionless

Local-Area Networks 233

6.2.3 IP Addressing in the Connectionless

Internet 235

CONTENTS vii

6.3 Quality of Service 239

6.3.1 Quality of Service in Connection-Based Networks 240

6.3.2 Quality of Service in Connectionless Networks 241

6.4 Bridges 242

6.4.1 Standardization and Bridges 244

6.4.2 IEEE 802.1D Transparent Bridges 244

6.4.3 The Spanning-Tree Algorithm 246

6.4.4 IEEE 802.5 Source Routing Bridging 250

6.4.5 IEEE 802.1Q Virtual Local-Area Network 250

6.5 Switches 251

6.5.1 Circuit Switching in Public Switched Telephone

Network 252

6.5.2 Integrated Service Data Network Switching 252

6.5.3 Packet Switching over Public Switched Telephone

Network 253

6.5.4 Asynchronous Transfer Mode 254

6.6 Routers 260

6.6.1 Types of Router 262

6.6.2 Network Protocols for Routers 264

6.6.3 Routing Algorithms 269

6.6.4 Multiprotocol Label Switching 275

Questions 277

Problems 278

Project 1: Client-Server Programming 280

7 Cellular Networks 281

7.1 Introduction 282

7.1.1 The Cellular Concept 282

7.1.2 Cellular Hierarchy 285

7.2 General Architecture of a Cellular Network 286

7.2.1 Mobile Stations 288

7.2.2 The Base Station Subsystem 288

7.2.3 The Network and Switching Subsystem 289

7.3 Mechanisms to Support a Mobile Environment 290

7.3.1 Registration 290

7.3.2 Call Establishment 291

7.3.3 Handoff 293

7.3.4 Security 295

7.4 Protocol Stack in Cellular Networks 297

7.4.1 Layer 1: Physical Layer 298

7.4.2 Layer 2: Data Link Layer 299

7.4.3 Layer 3: Networking Layer 300

7.5 Physical Layer in TDMA Air Interface 302

7.5.1 Modulation Technique 302

7.5.2 Power and Power Control 304

7.5.3 Physical Packet Bursts 304

viii CONTENTS

7.6 Physical Layer in CDMA Air Interface 310

7.6.1 CDMA Forward Channels 310

7.6.2 CDMA Reverse Channels 315

7.6.3 Packet and Frame Formats in a Typical CDMA Network 317

7.6.4 Other Variations in CDMA Air Interface 319

7.7 Achieving Higher Data Rates in Cellular Networks 320

7.7.1 Changes in Reference Architecture to Connect

to Internet 321

7.7.2 How to Achieve High Data Rates 322

7.8 Deployment of Cellular Networks 325

7.8.1 Cell Fundamentals and Frequency Reuse 325

7.8.2 Capacity Expansion Techniques for Frequency-/Time-Division

Multiple Access Systems 330

7.8.3 Network Planning for Code-Division Multiple Access

Systems 335

Questions 337

Problems 338

PART THREE: LOCAL AND PERSONAL-AREA NETWORKS 343

8 IEEE 802.3 Ethernet 345

8.1 Introduction 345

8.2 Legacy Ethernet 349

8.2.1 The Packet Format and the Physical Layer 351

8.2.2 Carrier Sense Multiple Access with Collision Detection

for the Medium Access Control Layer 352

8.2.3 Medium Access Control Performance 355

8.2.4 Alternatives to Legacy Ethernet 358

8.2.5 Early Enhancements to Legacy Ethernet 359

8.3 Evolution of the Physical Layer 361

8.3.1 Fast Ethernet at 100 Mb/s 361

8.3.2 Alternative for Fast Ethernet 368

8.3.3 Gigabit Ethernet 370

8.3.4 10 Gb/s Ethernet and Beyond 374

8.4 Emergence of Additional Features for Ethernet 379

8.4.1 Frame Format for the Virtual Local-Area

Network 379

8.4.2 Full-Duplex Operation 381

8.4.3 PAUSE Frames 382

8.4.4 Link Aggregation 384

Questions 385

Problems 386

9 IEEE Wireless Local-Area Network Standards 389

9.1 Introduction 389

9.1.1 Early Experiences 390

9.1.2 Emergence of Unlicensed Bands 391

CONTENTS ix

9.1.3 Products, Bands, and Standards 392

9.1.4 Shift in Marketing Strategy 393

9.2 IEEE 802.11 and WLANs 395

9.2.1 Overview of IEEE 802.11 396

9.2.2 IEEE 802.11 Wireless Local-Area Network

Operations 398

9.2.3 The IEEE 802.11 Medium Access Control Layer 402

9.2.4 The Physical Layer 410

9.2.5 Deployment of Wireless Local-Area Networks 419

9.2.6 Security Issues and Implementation in IEEE 802.11 425

9.2.7 Wireless Local-Area Network Standards and 802.11

Standards Activities 428

9.3 IEEE 802.16 (WiMAX) 430

9.3.1 General Architecture 432

9.3.2 Physical Layer 433

9.3.3 Medium Access Control Layer of WiMAX 434

Questions 435

Problems 436

Projects 441

10 IEEE 802.15 Wireless Personal-Area Network 443

10.1 Introduction 443

10.1.1 IEEE 802.15 Wireless Personal-Area Network

Standardization Series 444

10.2 IEEE 802.15.1 Bluetooth 445

10.2.1 Overall Architecture 447

10.2.2 Protocol Stack 448

10.2.3 Physical Connection 450

10.2.4 Medium Access Control Mechanism 452

10.2.5 Frame Formats 452

10.2.6 Connection Management 458

10.2.7 Security 460

10.3 Interference between Bluetooth and 802.11 460

10.3.1 Interference Range 461

10.3.2 Probability of Interference 465

10.3.3 Empirical Results 468

10.4 IEEE 802.15.3A Ultra Wideband Wireless

Personal-Area Networks 470

10.4.1 Direct Sequence Ultra Wideband 470

10.4.2 Multiband Orthogonal Frequency-Division

Multiplexing 474

10.5 IEEE 802.15.4 ZigBee 477

10.5.1 Overall Architecture 478

10.5.2 Protocol Stack 479

10.5.3 Medium Access Control Layer 480

10.5.4 Physical Layer 481

x CONTENTS

10.5.5 Frame Format 483

10.5.6 Comparison of ZigBee with Bluetooth and WiFi 484

Questions 485

Problems 486

PART FOUR: SYSTEM ASPECTS 489

11 Network Security 491

11.1 Introduction 491

11.2 Network Attacks and Security Issues 492

11.2.1 Network Communications 492

11.2.2 Why Security Attacks are Possible 494

11.2.3 Some Example Security Attacks 498

11.2.4 Defining Security Attacks, Services, and Architecture 504

11.3 Protection and Prevention 505

11.3.1 Firewalls and Perimeter Security 505

11.3.2 Cryptography and Cryptographic Protocols 508

11.3.3 Preventing Successful Phishing Attacks 523

11.4 Detection 523

11.5 Assessment and Response 524

Questions 526

Problems 526

Projects 528

12 Wireless Localization 529

12.1 Introduction 529

12.2 What is Wireless Geolocation? 530

12.2.1 Wireless Emergency Services 532

12.2.2 Performance Measures for Geolocation Systems 533

12.3 Radio-Frequency Location Sensing and Positioning

Methodologies 534

12.3.1 Generic Architecture 534

12.3.2 Positioning Algorithms 536

12.3.3 Positioning Standards for Cellular Telephone Systems 544

12.4 LCS Architecture for Cellular Systems 546

12.4.1 Cellular Network Architecture 548

12.4.2 Location Services Architecture 549

12.4.3 Over the Air (Access Network) Communications

for Location Services 551

12.4.4 Signaling in the Fixed Infrastructure (Core Network)

for Location Services 552

12.4.5 The Mobile Location Protocol 553

12.5 Positioning in Ad Hoc and Sensor Networks 554

Questions 555

Problems 556

Projects 556

CONTENTS xi

13 Wireless Sensor Networks 559

13.1 Introduction 559

13.2 Sensor Network Applications 560

13.2.1 Habitat Monitoring 560

13.2.2 Structural Health Monitoring 561

13.2.3 Miscellaneous Applications 561

13.3 Sensor Network Architecture and Sensor Devices 561

13.3.1 Sensor Network Architecture 562

13.3.2 Overview of Sensor Devices 564

13.3.3 Commercial Sensors 566

13.3.4 Future Directions 568

13.4 The Physical Layer in Sensor Networks 570

13.4.1 Spectrum 570

13.4.2 Path Loss 571

13.4.3 Gray Zone 572

13.4.4 Modulation Schemes 573

13.5 The MAC Layer in Sensor Networks 574

13.5.1 Issues in Medium Access for Sensor Networks 575

13.5.2 IEEE 802.15.4 Medium Access Control 577

13.5.3 Low-Duty-Cycle Medium Access Controls 578

13.5.4 Low-Latency Medium Access Controls 579

13.6 Higher Layer Issues in Sensor Networks 580

13.6.1 Establishing the Sensor Network 581

13.6.2 Routing 583

13.6.3 Coverage, Connectivity, and Topology Control 585

13.6.4 Synchronization 587

13.6.5 Security 588

Questions 591

References 593

Appendix A: What is Decibel? 605

Appendix B: STC for Two Transmitters

and One Receiver 607

Appendix C: Source Coding 611

C.1 Source Coding for Voice 611

C.2 Source Coding for Images and Video 613

Appendix D: Acronyms 615

Appendix E: List of Variables 627

Index 633

xii CONTENTS

ABOUT THE AUTHORS

Kaveh Pahlavan, is a Professor of Electrical and Computer Engineering (ECE), a Professor

of Computer Science (CS), and Director of the Center for Wireless Information Network

Studies, Worcester Polytechnic Institute (WPI), Worcester, MA. He is also a visiting

Professor of Telecommunication Laboratory and CWC, University of Oulu, Finland. His

area of research is location-aware broadband wireless indoor networks. He has contributed

to numerous seminal technical publications and patents in this field. He is the principal

author of the Wireless Information Networks (with Allen Levesque), John Wiley and Sons,

1995 and Principles of Wireless Networks -- A Unified Approach (with P. Krishnamurthy),

Prentice Hall, 2002. He has been a consultant to a number of companies, including CNR

Inc., GTE Laboratories, Steinbrecher Corp., Simplex, Mercury Computers, WINDATA,

SieraComm, 3COM, and Codex/Motorola in Massachusetts; JPL, Savi Technologies,

RadioLAN in California; Aironet in Ohio; United Technology Research Center in Connecti￾cut; Honeywell in Arizona; Nokia, LK-Products, Elektrobit, TEKES, the Finnish Academy

in Finland; and NTT in Japan. Before joining WPI, he was the director of advanced

development at Infinite Inc., Andover, MA, working on data communications. He started his

career as an assistant professor at Northeastern University, Boston, MA. He is the Editor-in￾Chief of the International Journal on Wireless Information Networks. He was the founder,

the program chairman, and organizer of the IEEE Wireless LAN Workshop, Worcester, in

1991 and 1996 and the organizer and technical program chairman of the IEEE International

Symposium on Personal, Indoor, and Mobile Radio Communications, Boston, MA, 1992

and 1998. He has also been selected as a member of the Committee on Evolution of

Untethered Communication, US National Research Council, 1997 and has led the US

review team for the Finnish R&D Programs in Electronic and Telecommunication in 1999

and NETs project in 2003. For his contributions to the wireless networks he was the Westin

Hadden Professor of Electrical and Computer Engineering at WPI during 1993--1996, was

elected as a fellow of the IEEE in 1996 and became a fellow of Nokia in 1999. From May to

December of 2000 he was the first Fulbright--Nokia scholar at the University of Oulu,

Finland. Because of his inspiring visionary publications and his international conference

activities for the growth of the wireless LAN industry, he is referred to as one of the founding

fathers of the wireless LAN industry. In the past few years his research work has been the

core for more than 25 patents by Skyhook Wireless, where he acts as the chief technical

advisor. In January 2008 Steve Jobs announced that Skyhook Wireless’s WiFi localization

xiii

technology is used in iPhone. Details of his contributions to this field are available at www.

cwins.wpi.edu.

Prashant Krishnamurthy is an associate professor with the graduate program in

Telecommunications and Networking at the University of Pittsburgh. At Pitt, he regularly

teaches courses on cryptography, network security, and wireless communications and

networks. His research interests are wireless network security, wireless data networks, and

position location in indoor wireless networks. He is the coauthor of the books Principles of

Wireless Networks -- A Unified Approach and Physical Layer of Communication Systems

and is a co-editor of Information Assurance: Dependability and Security in Networked

Systems. He served as the chair of the IEEE Communications Society Pittsburgh Chapter

from 2000 to 2005. He obtained his PhD from Worcester Polytechnic Institute, Worcester,

MA, in 1999.

xiv ABOUT THE AUTHORS

PREFACE

Information networking has emerged as a multidisciplinary diversified area of research over

the past few decades. From traditional wired telephony to cellular voice telephony and from

wired access to wireless access to the Internet, information networks have profoundly

impacted our lifestyle. At the time of writing, over 3 billion people are subscribed to cellular

services and close to a billion residences have Internet connections. More recently, the

popularity of smartphones enabling the fusion of computers, networking, and navigation for

location-aware multimedia mobile networking has opened a new way of attachment

between the human being and information networking gadgets. In response to this growth,

universities and other educational institutions have to prepare their students in understand￾ing these technologies.

Information networking is a multidisciplinary technology. To understand this industry

and its technology, we need to learn a number of disciplines and develop an intuitive feeling

for how these disciplines interact with one another. To achieve this goal, we describe

important networking standards, classify their underlying technologies in a logical manner,

and give detailed examples of successful technologies. The selection of detailed technical

material for teaching in such a large and multidisciplinary field is very challenging, because

the emphasis of the technology shifts in time. In the 1970s and 1980s the emphasis of

industry and, subsequently, the interest in teaching networks were primarily based on

queuing techniques [Kle75, Sch87, Ber87] because, at that time, medium access control was

playing an important role in differentiating local-area network (LAN) technologies such as

Ethernet, token ring and token bus. At that time, researchers and educators were interested in

understanding the random behavior of traffic in contention access on computer resources

and performance issues such as throughput and delay. The next generation of textbooks in

the 1990s was around details of protocols used in the seven-layer ISO model, and they were

written mostly by professors of computer science [Tan03, Pet07, Kur01]. During this period,

authors with an electrical engineering education would introduce similar material with more

emphasis on physical channels [e.g. Sta00]. These books described the Internet and

asynchronous transfer mode as examples for wide-area networks (WANs) and provided

details of a variety of LAN technologies at different levels of depth. They lacked adequate

details in describing the cellular and other wireless networks that have been the center of

attention in recent years for innovative networking.

The success of wireless information networks in the 1990s was a motivation behind

another series of textbooks describing wide- and local-area wireless networks [Pah95,

xv

Tải ngay đi em, còn do dự, trời tối mất!