Principles of Mobile Computing and Communications AU6158.indb 10/23/07 4:56:11 PM AU6158.indb 10/23/07 4:56:11 PM Principles of Mobile Computing and Communications Mazliza Othman Boca Raton New York Auerbach Publications is an imprint of the Taylor & Francis Group, an informa business AU6158.indb 10/23/07 4:56:11 PM 3GPP™ TSs and 3GPP™ TRs are the property of ARIB, ATIS, ETSI, CCSA, TTA and TTC who jointly own the copyright in them They are subject to further modifications and are therefore provided to you “as is” for information purposes only Further use is strictly prohibited ZigBee is a registered trademark of the ZigBee Alliance Bluetooth is a registered trademark of Bluetooth SIG, Inc CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2008 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S Government works Version Date: 20140114 International Standard Book Number-13: 978-1-4200-6159-8 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint Except as permitted under U.S Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers For permission to photocopy or use material electronically from this work, please access www.copyright com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400 CCC is a not-for-profit organization that provides licenses and registration for a variety of users For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents Preface ix About the Author .xiii Chapter Introduction 1.1 Mobile Computing Applications 1.2 Evolution of Wireless Networks and Services 1.3 Summary Chapter 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 Cellular Network Architecture 11 UMTS Architecture 13 Public Land Mobile Network Interfaces 20 User Authentication 22 Frequency Reuse 23 Channel Assignment 23 Location Registration and Update 24 Handover Procedures 25 CDMA 37 The Move toward 3G Networks 38 Chapter Wireless Local Area Networks 41 3.1 IEEE 802.11 Standard 41 3.2 IEEE 802.11b Standard (Wi-Fi) 45 3.3 IEEE 802.11a Standard 46 3.4 IEEE 802.11g Standard 47 3.5 HIPERLAN/2 47 3.6 IEEE 802.1x Standard 52 3.7 IEEE 802.11i Standard 52 3.8 IEEE 802.11e Standard 53 3.9 Security Issues 55 3.10 IP over 802.11 WLAN 58 3.11 Integrating 802.11 WLAN and UMTS 59 v AU6158.indb 10/23/07 4:56:12 PM vi Contents 3.12 Summary 63 Chapter 4.1 4.2 4.3 4.4 4.5 Wireless Personal Area Networks 65 HomeRF 65 Bluetooth Technology 67 IEEE 802.15.3 Standard 77 Home Area Networks 78 Summary 81 Chapter Wireless Sensor Networks 83 5.1 Applications of WSNs 84 5.2 Requirements for WSNs 85 5.3 WSN Architecture 85 5.4 The 802.15.4 Standard 86 5.5 The ZigBee Protocol 92 5.6 Power Conservation Techniques 95 5.7 Network and Communications 98 5.8 Configuration of Sensor Networks 99 5.9 WSN and Emergency Response Applications 103 5.10 Summary 106 Chapter 6.1 6.2 6.3 6.4 6.5 Mobile Ad Hoc Networks 109 AODV 109 DSR 116 OLSR 119 TBRPF 125 Summary 131 Chapter 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 Mobile IP 133 An Overview 133 Agent Advertisement Message 134 Home Network Configurations 135 Registration Messages 136 Routing and Tunneling 140 Security Issues in Mobile IP 145 Mobile IP and Ad Hoc Networks 149 Summary 150 Chapter 8.1 8.2 8.3 8.4 8.5 AU6158.indb Issues in Mobile Computing 153 Bandwidth 154 Adaptive Behavior 154 Power Management 160 Interface Design 166 Heterogeneity of Devices and Environments 173 10/23/07 4:56:12 PM vii Contents 8.6 Seamless Mobility over Heterogeneous Wireless Networks 175 8.7 Other Issues in Mobile Application Design 177 8.8 Summary 187 Chapter 9.1 9.2 9.3 9.4 9.5 9.6 9.7 Location-Sensing and Location Systems 191 Location-Sensing Techniques 191 A Taxonomy of Location Systems 195 GPS: An Example of a Positioning System 199 Active Badge: An Example of a Tracking System 200 Modeling Location-Tracking Application 202 Location-Aware Application for Medical Workers 205 Summary 207 Chapter 10 Wireless Network Security 211 Co-authored by M azliza Othman and Fazidah Othman 10.1 Overview of Wireless Security Issues 211 10.2 Security of Data Transmission 214 10.3 Next-Generation Hackers 216 10.4 Summary 218 Acronyms 221 Index 231 AU6158.indb 10/23/07 4:56:12 PM AU6158.indb 10/23/07 4:56:12 PM Preface This book is written to address a number of issues that currently are not addressed by other books on the topics of mobile computing and communications I have taught a mobile computing course for a few years and have come across a number of books that discuss wireless network technologies and infrastructures, and books that focus on tools and software to develop mobile applications What I find missing in these books is a discussion on how developing mobile computing applications are different from developing conventional applications, the issues and constraints that need to be addressed, and why mobile applications are different from conventional applications This book is my attempt at addressing those shortcomings Another difficulty that I encountered when teaching this subject is that most books on wireless networks are written for engineering students Adopting the material for computer science students is quite a task That is another reason for this book—it is written specifically for computer science students and people from a computer or information technology background Overview of the Book This book can be used as a textbook for a mobile computing course (introductory or intermediate) It is targeted at second- or third-year undergraduate computer science students, but can also be used as a reference book for a postgraduate course It assumes that readers have a basic knowledge of computer communication networks If enough time and motivation exist, the reader is advised to go through the entire book cover to cover Otherwise, the reader may choose topics of interest The book is written so that the chapters are independent of each other It is organized as follows Chapter gives an overview of what mobile computing has to offer and how mobile applications will eventually change the way we work and live It describes Mark Weiser’s vision of a ubiquitous computing environment and proceeds to give examples of mobile applications in different fields followed by a section that gives an overview of the evolution of wireless networks and services ix AU6158.indb 10/23/07 4:56:12 PM Index 253 Othman, M., 162, 188 Overemitting, 96 Overhearing, 96, 97, 117 P Packet, 59, 177 Packet binary convolution code (PBCC), 47 Packet Data Protocol (PDP), 60 Packet format HELLO messages, 122–124 message type, 120–121 mobile ad hoc networks, 120–121 OLSR packet format, 120 optimized link state routing (OLSR), 120–121 Packet forwarding, 118–119 Packet header, 126 Packet layer, 99 Packet length, 72, 120, 121 Packet processing and message flooding, 121–122 Packet routing, 60, 100 Padding options, 126 Padding options, TBRPF, 127 Paging paging channel (PCH), 18 paging indicator channel, 20 request, 68 requests, master-slave, 68 send control data, 11 user location, 13, 207 Paging channel (PCH), 18 Paging indicator channel, 20 Paging message, 13 Pairing, 74, 93 PAN (See personal area network) PAN coordinator, 87, 89 Paradiso, J.A., 165 Parameters and ACL, 72–73 Parity bit, 47 Park mode, 68, 75 Passive neighbor, 100, 101 Passive state, 100, 102 PATH_DISCOVERY_TIME, 113, 114 PBCC (See packet binary convolution code) P-CCPH (See primary common control physical channel) PCF (See point coordination function) drawbacks of 802.11 PCF, 53 integrating 802.11 WLAN and UMTS, 59 AU6158.indb 253 operational mechanism, 44 PCF operation, 45 to support time-bounded service, 44–45 PCF interframe space (PIFS), 44 PCH (See paging channel) PCPCH (See physical common packet channel) PCs (See personal computers) PDAs (See personal digital assistants) PDP (Packet Data Protocol), 60 PDSCH (See physical common downlink shared channel) PDUs (See protocol data units) Peer-to-peer mode, 42, 63 Peer-to-peer model, 71 Peer-to-peer network, 109 Pending data piggybacked with other data frames, 44–45 Perceived latency, 174 Performance, 159 Perform an IP handover, 58 Periodic location updating timer, 25 Periodic Terminal Initiated Polling (PTIP), 97 Periodic update, 130, 131 Perkins, C., 109 Perkins, C.E AAA servers with Mobile IP agents, 148 Mobile IP, 149 Mobile IP and AAA, 146 Mobile IP specification, 133 Per-packet key mixing, 52 Persistence factor, 54 Personal area network (PAN), 67, 89 Personal computers (PCs), 1, 13, 216 Personal digital assistants (PDAs) abilities of, 211 Bluetooth technology, 65, 67, 95 Bluetooth usage models, 76–77 clinical applications use, 173 display vital signs information, 104 first responders, 104 location-aware application, 205–207 mobile devices, 103, 177, 178 mobile information system prototype, 178 TouchEngine, 171 type of mobile device, and UMTS services, 13 wireless technology, Personal ID number (PIN), 74 Personal operating space (POS), 65 Pervasive computing, 3, 158, 159 Petrelli, D., 3, 185–186 PHD (Portable Help Desk), 3, 185 Phone jacking, 217 10/23/07 4:57:44 PM 254 Principles of Mobile Computing and Communications PHY header, 91 PHY (See physical layer) beacon, 91 frame, 91 ISM band, 91 Physical (PHY) layer, 51–52, 91–92 802.15.4 Standard, 87 and SWAP, 66 Physical and MAC layer, defines, 42 Physical channel transport channels mapped to, 19 types of common downlink, 20 types of common uplink, 20 Physical channels, 19 Physical channels grouped, 19 Physical common downlink shared channel (PDSCH), 20, 226 Physical common packet channel, 20 Physical common packet channel (PCPCH), 19, 20 Physical downlink shared channel, 20 Physical (PHY) layer, 17–20 3GPP TS 25.211 V6.1.0 2004, 17 classification of transport channel, 18 DLC layer, 48 the HIPERLAN/2, 51–52 HomeRF protocol stack, 66 IEEE 802.11 standard, 42–43 IEEE 802.15.3 standard, 77 IR physical layers, 43 network application, 17–20 RF physical layers, 42 summary of physical layer characteristics, 91 transport channel, 17 Wi-Fi and DSSS, 45 WLAN standards, 63 and WSN, 91–92 Physical layer imposed constraint on system, 43 Physical layer modes, 51 Physical layers that operate at 2.4-GHz, 42–43 Physical position, 195 Physical protocol data unit (PPDU), 46, 46–47, 47, 88, 91 Physical random access channel (PRACH), 20 Physical service data unit (PSDU), 46, 47, 88, 91 Piconet, 68 PIFS (See PCF interframe space) PIN (See Personal ID number) Platform model, 168 Platform use and task performance, 167–168 PLMN (See public land mobile network) AU6158.indb 254 PLMN interface (See public land mobile network interface) PLMN configuration and interfaces, 22 PLMN interfaces, 20-22 PLMN interfaces, list of, 21 Point coordination function (PCF) drawbacks of 802.11 PCF, 53 integrating 802.11 WLAN and UMTS, 59 operational mechanism, 44 PCF operation, 45 Point coordinator, 44, 45, 53 Point of attachment, 133, 143, 144, 149, 150 Point-to-Point Protocol, 134 Policy, 216 Poll AP may, 50 environment, applications, 176 frame, 45, 55 interval, 73 master station, 200 network master to, 201 point coordinator, 44 Polled-TXOP, 55 Polling, 44, 97 Polling strategy, 201 POLL message, 97, 98 Portable devices, 74–75 Portable Help Desk (PHD), 3, 185 Port-based network access control standard, 52 POS (personal operating space), 65 Positioning systems GPS (global positioning system), 191 GPS example of, 199–200 location determination, 207 remote positioning, 191 self-positioning, 191 Post-It note, Poupyrev, I., 171 Power, 96 Power conservation, 188 Power conservation strategies, 161–165 active badge: tracking system example, 200 approaches of, 160 conflicting approaches, 98 powering down components, 188 Power conservation techniques, 95–98, 165 Power consumption battery, 96, 200 CPU (central processing unit), 156, 161, 162, 188, 212 Power down strategies, 161–162 Powering down strategies, 188 Power management 10/23/07 4:57:44 PM Index 255 battery lifetime extended, 160 battery power, 160 Bluetooth technology, 74–75 chip, 161 CPU (central processing unit), 160 energy, 165, 212 energy scavenging, 165–166 mobile computing, 160–166 mobile devices, 160–166 modes, 45–46 power conservation strategies, 161–165 Power save (PS), 45 Power-saving mechanisms, 92 Power-saving modes (PSMs), 68, 70 Power up procedure, 62 Powerwave, 131 PPDU (See physical protocol data unit) PPDU maps, 47 PRACH (See physical random access channel) Precision, Accuracy and, 196, 197 Precursor list, 116 Predictive approach, 163–164 Predict probable speed, 204 Presentation model, 168 Presentation unit (PU), 169, 170 Pressure sensor, 173, 188, 198 Prevention, 211 (See also hackers) Primary common control physical channel (P-CCPH), 20, 226 Primitive, 87, 91 Prioritized channel access governed, 55 Priority mechanism, 155 Priority-polling mechanism, 44 Prism, 183, 184–185 Prism architecture, 184 Privacy, 79 and anonymity, 213 of data, 148 and integrity of data, 214 medical records, 104 protection of, 80, 150, 195 security and, 81, 201 user’s, 207, 208, 220 Privacy and anonymity, 213 Privacy concerns, 207–208 Privacy manager, 79, 80 PRNG (See pseudorandom number generator) Proactive protocols, 109 Proactive system, 156 Proactivity, 159, 182 processing capability, 214 Processing gap, security, 215, 216 Profiled information, 80 AU6158.indb 255 Project Aura, architecture, 184 context-aware applications, 182–186 cyber foraging, 183 platform for Context-Aware Applications, 182–186 Portable Help Desk (PHD), 185 task mobility, 185 user needs, 182–186 Promotional, 180 Protection of privacy, 80, 150, 195 Protocol data units (PDUs), 49, 50 Protocol overhead, 96 Protocols Address Resolution Protocol (ARP), 141 Bluetooth, 72–73 encryption, security issues, 52–53 Internet Control Message Protocol (ICMP), 140 medium access channel (MAC) layer, 96 OLSR, 119–120 Periodic Terminal Initiated Polling (PTIP), 97 Point-to-Point Protocol, 134 Resource Discovery Protocol (RDP), 150 route discovery, 117 studies of, 131 TBRPF, 125–126 Protocol stack, 69–71, 70 Proximity, 194, 195, 207 Proximity networking, 77 Proxy, 141, 174, 175, 206 Proxy and gratuitous address resolution protocol, 141 PS (See power save) PSDU (See physical service data unit) Pseudorandom code, 199 Pseudorandom number generator (PRNG), 55, 227 PSMs (See power-saving modes) PSTN (See public switched telephone network) PTIP (See Periodic Terminal Initiated Polling) PU (See presentation unit) Public land mobile network (PLMN), 20 home location register (HLR), 24 a list of PLMN interfaces, 21 PLMN configuration and interfaces, 22 service area consists of, 25 Public land mobile network (PLMN) interface, 20 Public land mobile network interfaces, 20–22 Public switched telephone network (PSTN), 12 10/23/07 4:57:44 PM 256 Principles of Mobile Computing and Communications Q QAM (See quadrature amplitude modulation) QoS (See quality of service) QoS (re)negotiation, 176 QoS class, 176 QoS level, 175, 177 QoS levels, 44 QoS variations, 175, 176 QPSK (See quadrature phase shift keying) Quadrature amplitude modulation (QAM), 51, 77 Quadrature phase shift keying (QPSK), 51, 77 Quality of service (QoS), 39 and AAA, 147 AP handles scheduling centrally, 50 convergence layer, 47 DLC connections determined by AP, 48 drawbacks of 802.11 PCF, 53 MAC layer designed to support, 49 parameters adapted, 55 parameters and ACL, 72–73 prioritized channel access governed by, 55 priority-polling mechanism, 44 request, 73 and seamless mobility, 175 transmission queues and priorities, 54 R RAB (See radio access bearer) RACH (See random access channel) Radio, 60 Radio access bearer (RAB), 60 Radio frequency (RF) based tracking system, 103 frequency hopping, 71–72 handover based on radio subsystem criteria, 26 location-sensing techniques, 206 physical layer, 51, 63 physical layers that operate at 2.4-GHz, 42–43 and signaling protocol, 98 signals from WLAN to 2D coordinate, 206 Radio interface, 15 Radio link quality, 48 Radio network controller (RNC), 60 Radio network subsystem (RNS), 60 Radio resource control (RRC), 48 AU6158.indb 256 Radio transmission technology standard (1xRTT), 38 RADIUS (See remote authentication dial-in user service) Rahman, M.G., 212 Rakotonirainy, A., 78, 79 RAM (See random-access memory) Random access channel (RACH), 18, 20, 50 Random-access memory (RAM), 93 Random access protocol, 55 Rate reduction, 158, 168, 174 Ravi, S., 214, 215 RC4 (See Rivest Cipher 4) RC4 secret key, 55 RCC (See reverse control channel) RDP (See Resource Discovery Protocol) Reaction attack, 57 Reactive protocols, 109 Reactive routing protocols, 116–117 Real-time clock (RTC), 84 Received signal strength indication (RSSI), 104–105 Receiver energy detection, 91, 92 Reduced function devices (RFDs), 87 Reduce video fidelity, 164 Reference copy, 156 Reference point, 13, 14, 194 Iu, 14 Uu, 14 Yu, 14 Zu, 14 Registration messages, 136–137, x request, 11, 22, 136, 139 Registration key, 145, 146 Registration lifetime, 137 Registration message format, 137 Registration messages, 136–140 Registration procedure, 145–146 Registration reply, 136, 138, 146 Registration reply format, 138 Registration request, 11, 22, 136, 137–138, 139 Registration request format, 137 Registration with AAA, 148–149 Rejection notice, 138 Rekeying mechanism, 52 Relative location, 106, 195 Remote authentication dial-in user service (RADIUS), 52 Remote execution, 155, 162–163, 184 Remote positioning, 191 Repetition mode, 49 Replay attacks, 138, 142, 143, 147 10/23/07 4:57:45 PM Index 257 Reply, 44, 106, 118, 141 Reply, registration, 136, 146 Reported tree (RT), 130 Request ARP, 141 call, 23, 24, 25 for connection, 13 data from network coordinator, 93 mobile phone sends call, 12 originator of, 114 paging, 68 QoS, 73 registration, 11, 22, 136, 139 temporary topologically correct address, 62 Requests, master-slave, 68 Request to send (RTS), 43 Research energy scavenging, 166 mobile computing technology, technology advances, 159–160 Reservation-based mechanism, 155 Reserved, 110, 111, 122, 123, 124, 125, 126 Resolution, 55 Resource allocation for MAC frame, 49 Resource Discovery Protocol (RDP), 150 Resource monitoring, 183, 184 Resource monitors, 184 battery, 162 battery power, 157 types of, 163 Resource request (RR), 48 Resources monitored, 157 Resource snapshot, 162 Responsibility of adaptation, 157 Returning RREP, 113–116 Reverse channel, 11 Reverse control channel (RCC), 11 RF (See radio frequency) RF communications (RFCOMM), 69 RFDs (See reduced function devices) RF ID tag (RFID), 178, 197 RF physical layers, 42, 63 RID (See router ID) Rivest Cipher (RC4), 55 RNC (See radio network controller) RNS (See radio network subsystem) Road warriors, Roaming CDMA allows nationwide, 38 Foreign network, 150 foreign network, 212 GSM supports international, Internet connectivity via UMTS, 13 AU6158.indb 257 Mobile IP, 146 mobile node, 150 mobile user, Foreign network, 145 move toward 3G networks, 39 provision of seamless service, 218 and subscriber expectations, Foreign network, 39 triangulation, 192 visitor location register (VLR), 25 Roaming number, 21, 25 Robot and sensor systems, 106 Robots and sensor nodes, 105 Robots in disaster response applications, 105–106 Rodriguez, M.D., 205, 206 Rogue AP and security, 57 Rouge, 52, 57 Round trip, 175 Route, 8, 9, 115, 117, 118, 203 Route cache, 117, 118, 119 Route computation, 8, 130 Route discovery, 113–116, 114 destination SN, 112 DSR uses source routing, 117–118 reactive protocols, 109 route discovery process, 117 Route entry and routing table association, 110 Route error (RRER), 110 Route maintenance, 116, 118–119 Route optimization, 142–143, 143–144 Route reply, 110 Route reply (RREP), 110 Route request (RREQ), 110, 111, 113–116, 117–118 Router ID (RID), 130 Router in foreign network, 134 Routing and tunneling, 140–144 Routing discovery, 116 Routing frames, 93 Routing loop, 144 Routing module, 126, 128, 130–131 Routing protocols, 109 Routing table, 112–113 Routing table calculation, 125 Roving user (RU), 203 Roving users (RUs), 202 RR (See resource request) RRC (See radio resource control) RREP (See route reply) RREP message format, 111 RREQ (See route request) RREQ message format, 110 RRER (See route error) 10/23/07 4:57:45 PM 258 Principles of Mobile Computing and Communications RRER message format, 112 RSSI (See received signal strength indication) RT (See reported tree) RTC (See real-time clock) RTS (See request to send) RTS-CTS mechanism option, 44 RTS-CTS method, 46 RTS/CTS operation, 45 RU (See roving user) Rudenko, A., 162 Rule-based modules, 185 RU (See roving user) RUs (See roving users) S SALSA, 206 SAR (See segmentation and reassembly) Satyanarayanan, M., 156, 159, 160, 163 Scalability, 99, 160 Scalability, localized, 158 Scale, 196 Scan function, 91 Scatternet, 68 Scavenging or harvesting, 188 S-CCPCH (See secondary common control physical channel) Scene analysis, 194–195 SCH (See short transport channel) SCH (See synchronization channel) Scheduler, 49 Scheduling conserve power, 96 SCO (See synchronous connection-oriented link) SCO link, 72 Screen resolution, 167, 168–170, 169 Screen size, 167, 169, 173, 174 SDP (See Service Discovery Protocol) SDU (See service data unit) Seamless mobility, 133, 150, 175–177 Secondary common control physical channel (S-CCPCH), 20, 228 Second generation (2G), 7, 37–38, 39, 178 Secure registration, 138–140 Securing wireless devices and communications, 215 Security, 81, 201 Security association, 139, 146, 147, 148, 149 Security domain, 214 Security issues, 55–58 802.15.4 levels of security, 90 AU6158.indb 258 access point (AP), 56–57 accounting, authentication, and authorization, 146–149 and Bluetooth, 73–74 of data transmission, 214–216 in Mobile IP, 145 next-generation hackers, 216–220 overview of wireless, 211–214 Protocol encryption, 52–53 registration procedure, 145–146 secure registration of Mobile IP, 138–140 wireless network, 211 Security model, 104 Security modes, 73 Security parameter index (SPI), 139 Security policy for outgoing, 93 Security processing gap, 215, 216 Security risks in wireless networks, 218 Segmentation and reassembly (SAR), 47 Self-positioning, 191 Self-tuning, 162, 182, 183 Semantic value, 174 Send buffer, 118 Send control data, 11 Sending and receiving, 212, 213 Sends help, 100, 102 Sensing, 83 Sensor, pressure, 173, 188, 194, 198 Sensor fusion, 196 Sensor network, 200–201 Sensor networks, 4, 99–102 Sensor nodes applications of WSNs, 84 CodeBlue project, 103 configuration of sensor networks, 99–100 and efficiency, 85, 95, 97 network and communications, 98–99 power conservation techniques, 95–98 requirements for WSNs, 85 used for monitoring, WSN and robots in disaster response applications, 105 WSN architecture, 86 WSN is a collection of, 83 ZigBee chips, 92 Sensor nodes broadcast periodic, 103 Sensors, 80–81 Sensor technology, 4–5 Sent using predefined protocol, 206 Sent using UDP, 143 Sequence numbers (SNs), 49 Service area, 11, 25 Service data unit (SDU), 47 10/23/07 4:57:45 PM Index 259 Service Discovery Protocol (SDP), 69 Service set identifier (SSID), 56 Service supplier, 183, 184 Serving gateway support node (SGSN), 60 Serving network domain, 14 Serving network-home network (SN-HN), 16 Serving stratum, 15 SGSN (See serving gateway support node) Shared control channel (HS-SCCH), 20 Shared secret, 74, 139, 146 Shared Wireless Access Protocol (SWAP), 66–67 Short interframe space (SIFS), 43, 55 Short Message Service (SMS), 7, 218 Short transport channel (SCH), 50 Side-channel attack, 56 SIFS (See short interframe space) Signal emission, 194 Signaling protocol, 98 Signaling System No (SS7), 27, 32 Signature, 20, 104 Signature, digital, 139, 215 Signature, reference, 105 Signature sent, 105 Simple network management protocol (SNMP), 56 Sink, 100, 101 Slave(s) devices act as, 68 to exchange packets, 73 master and, 71 master or, 71, 77, 81 park mode, 75 sniff mode, 74 timing characteristics, 96 transmits in odd slots, 72 Sleep state, 100, 102 Slotted ALOHA, 50 Small office/home office (SOHO), 71, 228 Smart antennas, 57 Smart battery, 163 Smart environment, 187 Smart phones, 218 Smart space, 155, 158, 183, 188 Smooth handoff, 144, 145, 146 Smooth handoff during registration, 145 SMS (See Short Message Service) SN-HN (See serving network-home network) SN-HN protocol, 16 Sniff interval, 74 Sniff mode, 74, 75 SN in the RREQ, 115 AU6158.indb 259 SNMP (See simple network management protocol) SNs (See sequence numbers) Soft tunnel state, 140–141 Software application, 92 characteristics of mobile, 163 clocks and asynchronous, 161 content manager, 80 developing control hardware and, 172 DSR-specific, 119 machine vision program, MOSES and optimized libraries, 216 power management, 160 seamless mobility, 176 usability of, 81 variations, 174, 188 SOHO (See small office/home office) Solar, 96, 165 SourceID, 103–104 Source route, 118–119 Source(s), 203 address, 140 of attack, 213 attenuation, 193 of danger, 105 of data, 203 and destination, 110, 155 and destination information, 88 energy scavenged from, 165 of error, 199 IP address, 144 location of, 86 Mobile IP, 133 power, 96 route, 117, 118 routing discovery, 116 serving network domain, 14 serving stratum, 15 of signal emission, 194 synchronizer merges data from two, 76 to destination, 14, 15, 131, 133 traffic information retrieval, transmit data from single, 46 transmitting data packets, 100 tree, 125 tree (T), 130, 131 vibration excitation, 166 Source tree (T), 125, 130, 131 Spatial variables, 203 Spectra, 162–163, 184 Speech recognizer, 164 Speech recognizer application, 164–165 10/23/07 4:57:46 PM 260 Principles of Mobile Computing and Communications Speed, 204 SPI (security parameter index), 139 Spreading factor, 37 Spreading sequence, 37, 38 Spread spectrum, 16, 42 Spread spectrum technique, 37 SS7 (See Signaling System No 7) SSID (See service set identifier) Starner, T., 165, 217 Star networks, 92 Static information, 216 Static sense analysis, 195 Station enhanced station, 53 master, 200, 201 pending data piggybacked with other data frames, 44–45 RC4 secret key deployed at, 55 steps used to send data, 43 transmission queues, 54 Station informed ACH, 50 Station moves coverage area, 42 Stations sense idle channel, 43 Strategy, 167 Subdomains, 14 Sublayer of DLL, 87–88 Subsequent handover between MSC-A and MSC-B, 35–36 Subsequent handover from MSC-B to MSC-A with circuit connection, 34 Subsequent handover from MSC-B to MSC-B’, 33–35, 35 Subsequent handover from MSC-B to MSC-B’ with circuit connection, 35 Subsequent handover not requiring a circuit connection, 35–36 Subsequent handover not requiring a circuit connection between MSC-A and MSC-B’, 36–37 Subsequent handover not requiring circuit connection, 35–36 Subsequent handover procedure from MSC-B to MSC-B’ without circuit connection, 36 Subsequent handover requiring circuit connection, 32–35 Subsequent handover to MSC-A, 33 Subsequent handover to MSC-B’, 33–35 Subsequent inter-MSC handback, 30 Summary of observation and design incentives of the case study, 179 Summary of physical layer characteristics, 91 AU6158.indb 260 Superframe CFP and CP form, 44 CP and CFP alternating phases in, 53 IEEE 802.15.3 standard, 77–78 low latency communication support, 89 superframe structure, 90 Superframe beacons, 89 Superframe mode, 89 Supplicant, 52 Surrogate, 159, 160, 183 SWAP (See Shared Wireless Access Protocol) Symbolic position, 195 Synchronization channel (SCH), 20 Synchronization header, 91 Synchronizer merges data from two, 76 Synchronous connection-oriented link (SCO), 72 System architecture, System calls, 157, 176 Systems, 155, 196 Szewczyk, R., T T (source tree), 125, 130, 131 T (See tree) Tactile actuator, 171 Tactile display, 171, 172 Tactile feedback, 171 Tactile interface, 171–173, 172, 188 Tactile interface, ambient, 172 Tactile progress bar, 172 Tactile sense, 172 Tailored for different platforms, 168 Tamper-proof implementation, 215 Tapping, 173, 213 Target, 173 Target beacon transition time (TBTT), 44, 53 Task, platform, and presentation models, 170 Task layer in Aura, 183 Task manager, 183, 184 Task model, 169, 170 Taxonomy of location systems, 195–198 TBRPF (See topology broadcast based on reverse path forwarding) TBRPF neighbor discovery (TND), 125 TBRPF packet body, 127 TBRPF packet header, 126 TBRPF Packets, 126–128 TBRPF packets, 128 TBRPF padding options, 127 10/23/07 4:57:46 PM Index 261 TBRPF parameters, 128 TBTT (See target beacon transition time) TC (See topology control) TC message format, 124 TCP (See Transmission Control Protocol) TCS (See telephone control specification) TCs (See traffic categories) TDMA (See time division multiple access) TDMA time division duplex (TDMA/TDD), 49 Technique to correct errors, 199–200 Technology advances, 159–160 Technology areas, 83 Telecommunications services, 15 Telemedicine (medical telemetry), Telephone control specification (TCS), 69 Temporal Key Integrity Protocol (TKIP), 52 Temporal variables, 203 Temporary topologically correct address, 62 TE-MT protocol, 15 Terminal equipment-mobile termination (TE-MT), 15 Test state, 100, 102 Text messages, TG (See topology graph) Theft of service, 211, 218 Third generation (3G) bandwidth, 154 CDMA, 37–38 ITU ratified two standards, 38 mobile device display, 167 mobile devices and wireless networks, 177 move toward, 38–39 seamless transition technology with 2G and, UMTS architecture, 13–15 Three-dimensional (3D), 37 Three-in-one phone, 75 Tilting interface, 173, 188 TIM (See traffic indication map) Time-bounded packet, 53 Time-bounded service, 44 Time-critical, 93 Time division CDMA, 38 Time division multiple access (TDMA), 7, 66, 67 Time-of-flight, 192–193, 197, 198 Time slots, 49 Time-to-live (TTL), 115 Timing, 91 Timing characteristics, 96 Slave(s), 96 TKIP (See Temporal Key Integrity Protocol) AU6158.indb 261 TND, 128–130 TND (See TBRPF neighbor discovery) Topology broadcast based on reverse path forwarding (TBRPF), 109, 125–126, 126–127, 128 Topology control (TC), 124 Topology discovery information exchange, 122 mobile ad hoc networks, 124–125 routing module, 130 TC message format, 124 Topology graph (TG), 131 Topology information, 122, 124 Topology set, 125 Topology table (TT), 130 Topology update, 131 TouchEngine, 171, 172 Tracking systems, 192 Tractable sensors, 104 Traffic categories (TCs), 53–54 Traffic indication map (TIM), 98 Traffic information retrieval, Traffic management, 49, 50, 53–54 Transient information, 216 Transit network domain, 15 Transmission, 49, 74, 77, 89 Transmission at TBTT, 53 Transmission channel, 37–38 Transmission Control Protocol (TCP), 57 Transmission frequency, 72 Transmission opportunity (TXOP), 54 Transmission queues and priorities, 54 Transmission security, 211 Transmission speed, 38 Transmit data from single, 46 Transmits in even slots, 72 Transmits in odd slots, 72 Transmits network, 93 Transmitted at regular intervals, 44 Transmitting data packets, 100 Transparency, 156, 212 Transport channel mapped to physical channels, 19–20 and physical layer, 17 types of, 18–19 Transport protocol group, 69 Transport stratum, 15 Tree (T), 125, 130, 131 Triangle routing, 142 Triangulation, 192–194 Triggered, 25 TT (See topology table) TTL (See time-to-live) 10/23/07 4:57:46 PM 262 Principles of Mobile Computing and Communications Tunnel bandwidth, 154 COA termination point of, 134 datagrams, 141, 143 endpoint, 62 GPRS packets routed through, 60 home agent and, 142 mobile node and, 140 route optimization and, 144 WLANs by creating, 58 Tunnel, soft state, 141 Tunnel, special, 144 Tunnel header, 140 Tunneling and routing, 140 2D angulation to locate an object, 194 2D lateration, 193, 206 2D position, 192–194, 207 Two piconets and a scatternet, 68 TXOP (See transmission opportunity) Types of common downlink, 20 Types of common uplink, 20 Types of resource monitors, 163 U U (unknown), 110 Ubiquitous computers, Ubiquitous computing, 2, 3, 158, 188 Ubiquitous computing environment, 158, 188 UDP (See User Datagram Protocol) UE (See user equipment) UHF (See ultrahigh frequency) UI (See user interface) adaptation of, 169 adaptive, 169 design, 167 instrumentation, 78 m-commerce applications, 181 tailored for different platforms, 168 usability of software and, 81 UI’s of Adaptation, 169 UL (See uplink) Ultimate destination, 134 Ultrahigh frequency (UHF), 37 UMTS (See Universal Mobile Telecommunications Service) from Beacon, 61 to Handover, 60 UMTS architecture, 13–15 3GPP TS 23.101 V5.0.1 2004, 13 integrating WLAN and, 59–62 AU6158.indb 262 third generation (3G), 13–15 user equipment domain, 13 UMTS domains and reference points, 14 UMTS services, 13 UMTS strata, 15–17 UMTS strata and functional flows among TE, 17 UMTS strata and functional flows among USIM, 16 UMTS strata and the functional flows among TE, 17 UMTS strata and the functional flows among USIM, 16 UMTS-WLAN, 62 Unacknowledged mode, 49 Unattended operation under dynamics, 100 Unique ID and security, 56 Universal Mobile Telecommunications Service (UMTS), 13, 59–62 Unknown (U), 110 Unreachable destination, 116 Upcall, 157, 164 Uplink (See UL) Uplink dedicated physical control channel (uplink DPCCH), 19 Uplink dedicated physical data channel (uplink DPDCH), 19 Uplink DPCH, 20 Uplink physical channel, 19 Uplink physical channels, 20 Usability of an application, 154 constraint related to AIO type, 169 home area network, 78 mobile commerce, 180 and performance, 159 of software, 81 Usability of software, 81 User agent, 150, 206 User authentication, 22–23, 52 User communications, 16 User concerns, 188 User Datagram Protocol (UDP), 110, 136, 143 User equipment (UE), 13 User equipment domain, 13, 14 User intent, 159, 183, 184 User interface See UI (user interface) User location, 13, 206, 207 User metrics, 163 User model, 202, 203, 204 User needs adaptive behavior, 154–160 age of, 10/23/07 4:57:46 PM Index 263 and computer integration, 2–3 end users and application stratum, 16–17 home area networks, 78–81 HomeRF, 65–67 hot spots, 57–58 integrating WLAN and UMTS, 59 location tracking, 218–220 location-tracking applications, 202–204 Mobile applications, 188 mobile commerce, 180–181 and Mobile IP, 150 and mobile software, 163 mobile work, 186–187 platform use and task performance, 167–168 power management, 160 Project Aura, 182–186 rogue AP and security, 57 and seamless mobility, 175–177 wireless sensor network (WSN), 106 WLAN and UMTS architecture, 60 User part, DLC, 48 User-perceived quality, 155 User service identity module (USIM), 14 User’s location cellular network, 13 Cellular phones, 12 core network domain, 14 emergency service and, location-aware application, 205, 206 location-sensing and location systems, 191, 202 location-tracking applications, 203 Mobile IP, 150 wireless security issues, 213 User-specific data, 14, 15, 16, 203 User’s privacy, 207, 208, 220 Users request information, 206 USIM (See user service identity module) USIM-HN protocol, 16 USIM-home network (USIM-HN), 16 USIM-mobile termination (USIM-MT), 15 USIM-MT protocol, 16 Using strong encryption, 188 Utility service, 8, Uu, 14 V Validation, 88 Valid route entry, 114 Values, 37 AU6158.indb 263 Values of the code field, 139 Van Jacobson header, 135 Van Jacobson header compression, 135 Variable length packet, defines, 46 Variable maintained in a neighbor table, 129 Varshney, U., Vendors and SSID, 56 Vetter, R., Vibration excitation, 166 Viceroy, 157 Video camera and context-aware home, 80 conferencing application, 154, 158, 159 context-aware UI modeling, 168 distillation is data-type specific, 174 encryption algorithm, 216 high-definition audio and, 77, 81 libraries or SQL servers, 156 Odyssey architecture, 157, 158 player application, 164 reduced, 159 UMTS architecture, 13 WCDMA supports, 38 wireless conferencing and adaptive behavior, 154–155 Video fidelity, 164 Virtual collision, 54 Virtual fences, Virtual network, 136 Virtual notice board, 178, 179 Virtual private network, 58 Virus, 216, 217, 218, 219 Viruses, 214, 218 Visited network, 39, 134, 142, 146, 213 Visitor location register (VLR), 25 Vital sign monitor, 4, CodeBlue Project, 103 first responders, 4–5 tractable sensors, 104 VLR (See visitor location register) VLR area, 21, 25 Voice communication, 1, Voice connection, 60 Voice-over IP (VoIP), 146 Voice services, 60, 66 VoIP (See Voice-over IP) Volvo, 178 Vtime, 120, 121, 124 Vulnerability, 213–214 10/23/07 4:57:47 PM 264 Principles of Mobile Computing and Communications W Want, R., 165, 200 Warden, 157, 158 War driving , 57 WCC (See wireless congestion control) WCDMA (See wideband CDMA) Wearable computing, 3–4 Weather, 84, 167, 181, 203 Weather conditions, 203, 204 Web sites, 180–181 Weiser, M., 158 Weiser, Mark, WEP (See Wired Equivalent Privacy) WEP2 (See enhanced version of WEP) WEP and key, 56 WEP protocol, 52 Wideband CDMA (WCDMA), 7–8, 38 Wi-Fi (See wireless fidelity) Willingness, 122, 123 Window of tolerance, 157 Wired Equivalent Privacy (WEP), 52, 55–56 Wired network connected to AP, 41–42 Wireless communications Bluetooth radio layer, 70 RFCOMM, 71 seamless mobility, 175 Wireless congestion control (WCC), 49 Wireless connection admission control, 49 Wireless fidelity (Wi-Fi) high bit rate telecommunications, 46 IEEE 802.11b Standard, 45–46, 63 ISM band, 46 networking card, power management, 74 Wireless local area network (WLAN) 802.11e multiple backoff for traffic with different priorities, 54 attack prevention, 211 carrier sense multiple access with collision avoidance (CSMA/CA), 43 carrier sense multiple access with collision detection (CSMA/CD), 43 corporate office boundary vs WLAN coverage area, 58 CSMA/CD hidden station problem, 43 DCF operation, 44 distributed coordination function (DCF), 43 frequency band for Bluetooth/microwave ovens, 67 The hidden station problem, 43 HIPERLAN/2, 47–52 AU6158.indb 264 IEEE 802.11a Standard, 46–47 IEEE 802.11b Standard (Wi-Fi), 45–46 IEEE 802.11e Standard, 53–55 IEEE 802.11g Standard, 47 IEEE 802.11i Standard, 52–53 IEEE 802.11 Standard, 41–45 IEEE 802.1x Standard, 52 Integrating 802.11 WLAN and UMTS, 59–62 IP over 802.11 WLAN, 58–59 location-sensing techniques, 206 Mobile IP, 146 online resources, 64 power up procedure, 62 seamless mobility, 175–177 security Issues, 55–58 standards specified in IEEE 802.11, 63 uses of, 41 WLAN IP network, 59 WLAN standards, a comparison of, 52 WLAN-UMTS integration architecture, 61 Wireless network infrastructure, Wireless networks, 176 Wireless networks and services advance mobile phone system (AMPS), authentication, 212–213 bandwidth, 154 Bluetooth technology, 67 categories of, compound wireless service, 8–9 digital systems, domain crossing, 214 DoS, 213 high bit rate telecommunications, issues in mobile computing, 153 privacy and anonymity, 213 securing wireless devices and communications, 215 vulnerability, 213–214 wireless NIC, 56 ZigBee Protocol, 92–94 ZigBee versus Bluetooth, 94–95 Wireless network security CodeBlue Project and security, 103–104 context-aware home and security, 80 data transmission security, 214–216 home area networks and security, 78 location-sensing/location systems security, 201, 207 Malicious code, 219 mobile computing and security, 176, 181, 186, 188 Mobile IP and secure registration, 138–140 10/23/07 4:57:47 PM Index 265 Mobile IP and security, 133 mobile malware taxonomy, 217 next-generation hackers, 216–218 online resources, 230 overview of security issues, 211–214 registration request, 137 security issues in Mobile IP, 145–146 summary, 218–220 WLAN security issues, 55–58, 63 WPAN and Bluetooth security, 73–74 WPAN and frequency hopping, 71–72 WPAN and privacy, 79, 81 WSN and security, 90–91 ZigBee protocol and security, 92 Wireless NIC, 56 Wireless personal area network (WPAN) Bluetooth Technology, 67–69 classes of, 65 home area networks, 78–81 HomeRF, 65–67 HomeRF protocol stack, 66 IEEE 802.15.3 standard, 77–78 online resources, 82 Wireless security processing gap, 215–216 Wireless Sensor MAC (WiseMAC), 97 Wireless sensor network (WSN) 802.15.4 MAC and PHY frames format, 88 802.15.4 standard, 86–87 ad hoc architecture, 86 air interface comparison, 95 applications of, 84 architecture, 85–86 areas of technologies, 83 ASCENT parameters, 102 beacon-enabled and non-beacon-enabled communications, 89 categories of, 83 CodeBlue project (Harvard University), 103–105 comparison of application areas, 95 configuration of sensor networks, 99–102 the DLL, 87–91 and emergency response applications, 103 IEEE 802.15.4 layers, 88 infrastructure-assisted architecture, 87 infrastructure-based architecture, 86 network and communications, 98–99 network self-configuration, 101 online resources, 107 the PHY layer, 91–92 power conservation techniques, 95–98 power-saving mechanisms, 92 requirements for, 85 AU6158.indb 265 and robots in disaster response applications, 105–106 summary of physical layer characteristics, 91 superframe structure, 90 timing characteristics, 96 user needs, 106 wireless technology, ZigBee network model, 93 ZigBee protocol, 92–94 ZigBee stack system, 94 ZigBee versus Bluetooth, 94–95 Wireless technology Arrhythmia Monitoring System (AMS), Bluetooth usage models, 75–77 evolution of wireless standards, HyperAudio and HIPS, security issues, 211 virtual fences, wearable computing, 3–4 wireless sensor network (WSN), WiseMAC (Wireless Sensor MAC), 97 Wiser, Mark, 188 WLAN (See wireless local area network) WLAN and UMTS architecture, 60 WLAN IP network, 58–59 WLAN is used to augment data service, 60 WLAN standards, a comparison, 52 WLAN support different connection paradigms, 60 WLAN-UMTS integration architecture, 61 WPAN (See wireless personal area network) WSN (See wireless sensor network) WSN and emergency response applications, 103 X Xerox Lab, XML (See eXtensible Markup Language) Y Yu, 14 Z Zenel, B., 161 ZigBee®, 87, 92, 98 10/23/07 4:57:47 PM 266 Principles of Mobile Computing and Communications ZigBee Alliance, 92 ZigBee device object, 94 ZigBee network model, 93 ZigBee Protocol, 92–94 ZigBee stack system, 94 ZigBee versus Bluetooth, 94–95 Zone backlighting, 165 Zu, 14 AU6158.indb 266 10/23/07 4:57:47 PM .. .Principles of Mobile Computing and Communications AU6158.indb 10/23/07 4:56:11 PM AU6158.indb 10/23/07 4:56:11 PM Principles of Mobile Computing and Communications Mazliza... A-Handover-Required A-Handover-Request A-HandoverCommand A-HandoverRequest-Ack RI-HandoverCommand RI-Handover-Access A-Handover-Detect RI-Handover-Complete A-Handover-Complete A-Clear-Command... wireless networks and technologies that make mobile computing applications possible AU6158.indb 10/23/07 4:56:13 PM 2 Principles of Mobile Computing and Communications 1.1 Mobile Computing Applications