Preface |
|
xv | |
|
|
1 | (38) |
|
|
1 | (2) |
|
1.2 Elements of Information Networks |
|
|
3 | (14) |
|
1.2.1 Evolution of Applications, Devices, and Networks |
|
|
5 | (2) |
|
1.2.2 Information Network Infrastructures and Wireless Access |
|
|
7 | (2) |
|
1.2.3 Connection Between Wireless Access and Localization |
|
|
9 | (1) |
|
1.2.4 Standards Organizations for Information Networking |
|
|
10 | (3) |
|
1.2.5 Four Markets in the Evolution of Wireless Networking Standards |
|
|
13 | (1) |
|
1.2.6 Trends in Wireless Data Applications |
|
|
14 | (3) |
|
1.3 Evolution of Wireless Access to the PSTN |
|
|
17 | (4) |
|
1.3.1 Cordless Telephone Systems |
|
|
18 | (1) |
|
1.3.2 Cellular Telephone Networks |
|
|
18 | (3) |
|
1.4 Evolution of Wireless Access to the Internet |
|
|
21 | (6) |
|
1.4.1 Local Wireless Data Networks |
|
|
21 | (3) |
|
1.4.2 Wide Area Wireless Data Networks |
|
|
24 | (3) |
|
1.5 Evolution of Wireless Localization Technologies |
|
|
27 | (2) |
|
1.5.1 TOA-based Wireless Localization |
|
|
27 | (1) |
|
1.5.2 RSS-based Localization |
|
|
28 | (1) |
|
1.6 Structure of this Book |
|
|
29 | (4) |
|
1.6.1 Part I: Principles of Air-Interference Design |
|
|
30 | (1) |
|
1.6.2 Part II: Principle of Network Infrastructure Design |
|
|
31 | (1) |
|
1.6.3 Part III: Wireless Local Access |
|
|
31 | (1) |
|
1.6.4 Part IV: Wide Area Wireless Access |
|
|
32 | (1) |
|
1.6.5 Part V. Wireless Localization |
|
|
33 | (6) |
Part I Principles Of Air-Interference Design |
|
|
2 Characteristics of the Wireless Medium |
|
|
39 | (60) |
|
|
39 | (6) |
|
2.1.1 Causes of Multipath Propagation |
|
|
40 | (1) |
|
2.1.2 Effects of Multipath Propagation |
|
|
41 | (2) |
|
2.1.3 Applied Channel Models for Wireless Communication Applications |
|
|
43 | (2) |
|
2.2 Modeling of Large-scale RSS, Path Loss, and Shadow Fading |
|
|
45 | (15) |
|
2.2.1 General Features of Large-Scale RSS |
|
|
45 | (2) |
|
2.2.2 Friis Equation and Path-Loss Modeling in Free Space |
|
|
47 | (4) |
|
2.2.3 Empirical Determination of Path Loss Gradient |
|
|
51 | (1) |
|
2.2.4 Shadow Fading and Fading Margin |
|
|
51 | (4) |
|
2.2.5 Popular Models for Path Loss and Shadow Fading |
|
|
55 | (5) |
|
2.3 Modeling of RSS Fluctuations and Doppler Spectrum |
|
|
60 | (12) |
|
2.3.1 Friis' Equation and Geometric Ray Tracing |
|
|
61 | (8) |
|
2.3.2 Modeling of Small-Scale Fading |
|
|
69 | (1) |
|
2.3.3 Modeling of Doppler Spectrum |
|
|
70 | (2) |
|
2.4 Wideband Modeling of Multipath Characteristics |
|
|
72 | (7) |
|
2.4.1 Impulse Response, Multipath Intensity, and Bandwidth |
|
|
72 | (2) |
|
2.4.2 Multipath Spread, ISI, and Bandwidth |
|
|
74 | (3) |
|
2.4.3 Wideband Channel Models in Standardization Organizations |
|
|
77 | (2) |
|
2.4.4 Simulation of Channel Behavior |
|
|
79 | (1) |
|
2.5 Emerging Channel Models |
|
|
79 | (5) |
|
2.5.1 Wideband Channel Models for Geolocation |
|
|
79 | (3) |
|
2.5.2 SIMO and MIMO Channel Models |
|
|
82 | (2) |
|
Appendix A2: What Is the Decibel? |
|
|
84 | (15) |
|
3 Physical Layer Alternatives for Wireless Networks |
|
|
99 | (54) |
|
|
99 | (1) |
|
3.2 Physical Layer Basics: Data rate, Bandwidth, and Power |
|
|
100 | (7) |
|
3.2.1 Data Rate and Bandwidth |
|
|
101 | (1) |
|
3.2.2 Power and Error Rate |
|
|
101 | (4) |
|
3.2.3 Shannon-Hartley Bound on Achievable Data Rate |
|
|
105 | (2) |
|
3.3 Performance in Multipath Wireless Channels |
|
|
107 | (5) |
|
3.3.1 Effects of Flat Fading |
|
|
108 | (2) |
|
3.3.2 ISI Effects Due to Multipath |
|
|
110 | (2) |
|
3.4 Wireless Transmission Techniques |
|
|
112 | (8) |
|
3.4.1 Power Efficient Short Distance Baseband Transmission |
|
|
112 | (2) |
|
3.4.2 Bandwidth Efficient Carrier Modulated Transmission |
|
|
114 | (6) |
|
3.5 Multipath Resistant Techniques |
|
|
120 | (16) |
|
3.5.1 Flat Fading, Antenna Diversity, and MIMO |
|
|
121 | (2) |
|
3.5.2 Frequency Hopping Spread Spectrum Transmissions |
|
|
123 | (4) |
|
|
127 | (2) |
|
3.5.4 Direct Sequence Spread Spectrum Transmission |
|
|
129 | (2) |
|
3.5.5 DS-CDMA and M-ary Orthogonal Coding |
|
|
131 | (2) |
|
3.5.6 Comparison of DSSS, FHSS and OFDM |
|
|
133 | (3) |
|
3.6 Coding Techniques for Wireless Communications |
|
|
136 | (9) |
|
|
137 | (2) |
|
3.6.2 Convolutional Codes |
|
|
139 | (1) |
|
3.6.3 Turbocodes and Other Advanced Codes |
|
|
140 | (1) |
|
|
140 | (1) |
|
3.6.5 Automatic Repeat Request Schemes |
|
|
141 | (1) |
|
|
142 | (1) |
|
|
143 | (1) |
|
|
143 | (2) |
|
3.7 Cognitive Radio and Dynamic Spectrum Access |
|
|
145 | (1) |
|
|
145 | (8) |
|
|
153 | (64) |
|
|
153 | (2) |
|
4.2 Centralized Assigned-Access Schemes |
|
|
155 | (18) |
|
4.2.1 Frequency Division Multiple Access |
|
|
156 | (3) |
|
4.2.2 Time Division Multiple Access |
|
|
159 | (4) |
|
4.2.3 Code Division Multiple Access (CDMA) |
|
|
163 | (3) |
|
4.2.4 Comparison of CDMA, TDMA and FDMA |
|
|
166 | (3) |
|
4.2.5 Performance of Assigned-Access Methods |
|
|
169 | (4) |
|
4.3 Distributed Random Access for Data Oriented Networks |
|
|
173 | (22) |
|
4.3.1 Random Access Methods for Data Services |
|
|
174 | (6) |
|
4.3.2 Access methods for LANs |
|
|
180 | (6) |
|
4.3.3 Performance of Random Access Methods |
|
|
186 | (9) |
|
4.4 Integration of Voice and Data Traffic |
|
|
195 | (22) |
|
4.4.1 Access Methods for Integrated Services |
|
|
195 | (1) |
|
4.4.2 Data Integration in Voice-Oriented Networks |
|
|
196 | (6) |
|
4.4.3 Voice Integration into Data-Oriented Networks |
|
|
202 | (15) |
Part II Principles Of Network Infrastructure Design |
|
|
5 Deployment of Wireless Networks |
|
|
217 | (58) |
|
|
217 | (1) |
|
5.2 Wireless Network Architectures |
|
|
218 | (6) |
|
5.2.1 Classification of Wireless Networks Based on Topologies |
|
|
219 | (4) |
|
5.2.2 Classification of Wireless Networks Based on Coverage |
|
|
223 | (1) |
|
5.3 Interference in Wireless Networks |
|
|
224 | (9) |
|
|
225 | (3) |
|
5.3.2 Probability of Interference |
|
|
228 | (3) |
|
|
231 | (2) |
|
5.4 Deployment of Wireless LANs |
|
|
233 | (5) |
|
5.5 Cellular Topology, Cell Fundamentals, and Frequency Reuse |
|
|
238 | (10) |
|
5.5.1 The Cellular Concept |
|
|
239 | (2) |
|
|
241 | (2) |
|
5.5.3 Cell Fundamentals and Frequency Reuse |
|
|
243 | (1) |
|
5.5.4 Signal to Interference Ratio Calculation |
|
|
244 | (4) |
|
5.6 Capacity Expansion Techniques |
|
|
248 | (20) |
|
5.6.1 Architectural Methods for Capacity Expansion |
|
|
250 | (10) |
|
5.6.2 Channel Allocation Techniques and Capacity Expansion |
|
|
260 | (7) |
|
5.6.3 Migration to Digital Systems |
|
|
267 | (1) |
|
5.7 Network Planning for CDMA Systems |
|
|
268 | (2) |
|
5.7.1 Issues in CDMA Network Planning |
|
|
269 | (1) |
|
5.7.2 Migration from Legacy Systems |
|
|
270 | (1) |
|
|
270 | (5) |
|
6 Wireless Network Operations |
|
|
275 | (46) |
|
|
275 | (6) |
|
6.1.1 Operations in Cellular Telephone Networks |
|
|
276 | (2) |
|
6.1.2 Operations in Wireless Local Area Networks |
|
|
278 | (2) |
|
6.1.3 Operations in Wireless Personal Area Networks |
|
|
280 | (1) |
|
6.2 Cell Search and Registration |
|
|
281 | (2) |
|
|
283 | (18) |
|
6.3.1 Location Management |
|
|
283 | (5) |
|
|
288 | (9) |
|
|
297 | (4) |
|
6.4 Radio Resources and Power Management |
|
|
301 | (20) |
|
6.4.1 Adjusting Link Quality |
|
|
303 | (1) |
|
|
303 | (4) |
|
6.4.3 Power Saving Mechanisms in Wireless Networks |
|
|
307 | (2) |
|
6.4.4 Energy Efficient Designs |
|
|
309 | (3) |
|
6.4.5 Energy Efficient Software Approaches |
|
|
312 | (9) |
|
7 Wireless Network Security |
|
|
321 | (36) |
|
|
321 | (3) |
|
7.1.1 General Security Threats |
|
|
322 | (1) |
|
7.1.2 Cryptographic Protocols for Security |
|
|
323 | (1) |
|
7.2 Security in Wireless Local Networks |
|
|
324 | (6) |
|
|
324 | (1) |
|
|
325 | (5) |
|
7.3 Security in Wireless Personal Networks |
|
|
330 | (4) |
|
|
330 | (2) |
|
|
332 | (2) |
|
7.4 Security in Wide Area Wireless Networks |
|
|
334 | (6) |
|
|
334 | (2) |
|
|
336 | (4) |
|
|
340 | (1) |
|
Appendix A7: An Overview of Cryptography and Cryptographic Protocols |
|
|
341 | (16) |
Part III Wireless Local Access |
|
|
|
357 | (48) |
|
|
357 | (6) |
|
|
358 | (1) |
|
8.1.2 Emergence of Unlicensed Bands |
|
|
359 | (1) |
|
8.1.3 Products, Bands, and Standards |
|
|
360 | (1) |
|
8.1.4 Shift in Marketing Strategy |
|
|
361 | (2) |
|
8.2 Wireless Local Area Networks and Standards |
|
|
363 | (6) |
|
8.2.1 WLAN Standards and 802.11 Standards Activities |
|
|
364 | (2) |
|
8.2.2 Ethernet and IEEE 802.11 |
|
|
366 | (1) |
|
8.2.3 Overview of IEEE 802.11 |
|
|
367 | (2) |
|
8.3 IEEE 802.11 WLAN Operations |
|
|
369 | (36) |
|
8.3.1 Topology and Architecture |
|
|
369 | (4) |
|
8.3.2 The IEEE 802.11 MAC Layer |
|
|
373 | (8) |
|
|
381 | (10) |
|
8.3.4 Capacity of Infrastructure WLANs |
|
|
391 | (3) |
|
8.3.5 Security Issues and Implementation in IEEE 802.11 |
|
|
394 | (11) |
|
9 Low Power Sensor Networks |
|
|
405 | (42) |
|
|
405 | (1) |
|
|
406 | (18) |
|
9.2.1 Overall Architecture |
|
|
409 | (1) |
|
|
410 | (2) |
|
|
412 | (2) |
|
|
414 | (1) |
|
|
415 | (6) |
|
9.2.6 Connection Management |
|
|
421 | (3) |
|
|
424 | (1) |
|
9.3 IEEE 802.15.4 and ZigBee |
|
|
424 | (10) |
|
9.3.1 Overall Architecture |
|
|
425 | (1) |
|
9.3.2 Protocol Stack and Operation |
|
|
426 | (2) |
|
|
428 | (2) |
|
|
430 | (2) |
|
|
432 | (1) |
|
9.3.6 Comparison of ZigBee with Bluetooth and WiFi |
|
|
432 | (2) |
|
9.4 IEEE 802.15.6 Body Area Networks |
|
|
434 | (13) |
|
|
434 | (1) |
|
9.4.2 Overall Architecture and Applications |
|
|
435 | (1) |
|
9.4.3 Channel Measurement and Modeling |
|
|
436 | (8) |
|
9.4.4 Physical and MAC Layer |
|
|
444 | (3) |
|
|
447 | (32) |
|
|
447 | (4) |
|
10.1.1 UWB Networking at 3.1-10.6 GHz |
|
|
448 | (2) |
|
10.1.2 Gigabit Wireless at 60 GHz |
|
|
450 | (1) |
|
10.2 UWB Communications at 3.1-10.6 GHz |
|
|
451 | (16) |
|
10.2.1 Impulse Radio and Time Hopping Access |
|
|
451 | (4) |
|
10.2.2 Direct Sequence UWB |
|
|
455 | (4) |
|
|
459 | (2) |
|
10.2.4 Channel Models for UWB Communications |
|
|
461 | (6) |
|
10.3 Gigabit Wireless at 60 GHz |
|
|
467 | (12) |
|
10.3.1 Architecture and Application Scenarios |
|
|
468 | (2) |
|
10.3.2 Transmission and Medium Access |
|
|
470 | (2) |
|
10.3.3 Channel Models for 60 GHz mm Wave Networks |
|
|
472 | (7) |
Part IV Wide Area Wireless Access |
|
|
|
479 | (40) |
|
|
479 | (1) |
|
11.2 What is TDMA Cellular? |
|
|
480 | (6) |
|
11.2.1 Original Services and Shortcomings |
|
|
481 | (1) |
|
11.2.2 Reference Architecture for a Cellular Network |
|
|
482 | (4) |
|
11.3 Mechanisms to Support a Mobile Environment |
|
|
486 | (5) |
|
|
486 | (1) |
|
11.3.2 Call Establishment |
|
|
487 | (1) |
|
|
488 | (2) |
|
|
490 | (1) |
|
11.4 Communication Protocols |
|
|
491 | (10) |
|
11.4.1 Layer I: Physical Layer |
|
|
493 | (6) |
|
11.4.2 Layer II: Data Link Layer |
|
|
499 | (1) |
|
11.4.3 Layer III: Networking Layer |
|
|
500 | (1) |
|
11.5 Channel Models for Cellular Networks |
|
|
501 | (7) |
|
11.5.1 Path Loss Models for Cellular Networks |
|
|
503 | (3) |
|
11.5.2 Models for Scattering Function of Cellular Networks |
|
|
506 | (2) |
|
11.6 Transmission Techniques in TDMA Cellular |
|
|
508 | (4) |
|
11.7 Evolution of TDMA for Internet Access |
|
|
512 | (7) |
|
11.7.1 Architectural and MAC Layer Changes |
|
|
512 | (3) |
|
11.7.2 Data Rate in TDMA Packet Switched Networks |
|
|
515 | (4) |
|
|
519 | (42) |
|
|
519 | (1) |
|
|
520 | (1) |
|
12.3 CDMA Based Cellular Systems |
|
|
521 | (1) |
|
12.4 Direct Sequence Spread Spectrum |
|
|
522 | (12) |
|
12.4.1 Receiver Processing with Direct Sequence Spread Spectrum |
|
|
523 | (2) |
|
12.4.2 Channelization using Orthogonal Sequences |
|
|
525 | (3) |
|
12.4.3 Multipath Diversity with PN Sequences |
|
|
528 | (6) |
|
12.5 Communication Channels and Protocols in Example CDMA Systems |
|
|
534 | (12) |
|
12.5.1 The 2G CDMA System |
|
|
534 | (9) |
|
12.5.2 The 3G UMTS System |
|
|
543 | (3) |
|
12.6 Cell Search, Mobility, and Radio Resource Management in CDMA |
|
|
546 | (8) |
|
|
546 | (2) |
|
|
548 | (4) |
|
|
552 | (2) |
|
12.7 High Speed Packet Access |
|
|
554 | (7) |
|
13 OFDM and MIMO Cellular Systems |
|
|
561 | (36) |
|
|
561 | (1) |
|
|
562 | (10) |
|
13.2.1 Robustness in Multipath Dispersion |
|
|
563 | (4) |
|
13.2.2 Flexible Allocation of Resources |
|
|
567 | (2) |
|
13.2.3 Challenges with OFDM |
|
|
569 | (3) |
|
13.3 Multiple Input Multiple Output |
|
|
572 | (4) |
|
|
573 | (2) |
|
13.3.2 Spatial Multiplexing |
|
|
575 | (1) |
|
|
576 | (1) |
|
|
576 | (6) |
|
13.4.1 General Architecture of WiMax |
|
|
579 | (2) |
|
13.4.2 MAC Layer of WiMAX |
|
|
581 | (1) |
|
13.4.3 PHY Layer of WiMax |
|
|
582 | (1) |
|
|
582 | (9) |
|
13.5.1 Architecture and Protocol Stack |
|
|
583 | (3) |
|
|
586 | (2) |
|
|
588 | (1) |
|
13.5.4 LTE Operational Aspects |
|
|
589 | (2) |
|
|
591 | (1) |
|
|
591 | (6) |
Part V Wireless Localization |
|
|
|
597 | (28) |
|
|
597 | (1) |
|
14.2 What is Wireless Geolocation? |
|
|
598 | (4) |
|
14.2.1 Wireless Emergency Services |
|
|
600 | (1) |
|
14.2.2 Performance Measures for Geolocation Systems |
|
|
601 | (1) |
|
14.3 RF Location Sensing and Positioning Methodologies |
|
|
602 | (11) |
|
14.3.1 Generic Architecture |
|
|
602 | (2) |
|
14.3.2 Positioning Algorithms |
|
|
604 | (7) |
|
14.3.3 Positioning Standards for Cellular Telephone Systems |
|
|
611 | (2) |
|
14.4 Location Services Architecture for Cellular Systems |
|
|
613 | (7) |
|
14.4.1 Cellular Network Architecture |
|
|
615 | (1) |
|
14.4.2 Location Services Architecture |
|
|
616 | (2) |
|
14.4.3 Over the Air (Access Network) Communications for Location Services |
|
|
618 | (1) |
|
14.4.4 Signaling in the Fixed Infrastructure (Core Network) for Location Services |
|
|
618 | (1) |
|
14.4.5 Mobile Location Protocol |
|
|
619 | (1) |
|
14.5 Positioning in Ad Hoc and Sensor Networks |
|
|
620 | (5) |
|
15 Fundamentals of RF Localization |
|
|
625 | (28) |
|
|
625 | (1) |
|
15.2 Modeling of the Behavior of RF Sensors |
|
|
626 | (5) |
|
15.2.1 Behavior of RSS Sensors |
|
|
627 | (1) |
|
15.2.2 Behavior of TOA Sensors |
|
|
627 | (2) |
|
15.2.3 Models of the Behavior of DOA |
|
|
629 | (2) |
|
15.3 Performance Bounds for Ranging |
|
|
631 | (8) |
|
15.3.1 Fundamentals of Estimation Theory and CRLB |
|
|
631 | (2) |
|
15.3.2 RSS-based Localization |
|
|
633 | (1) |
|
15.3.3 TOA-based Localization |
|
|
634 | (2) |
|
15.3.4 DOA-based Localization |
|
|
636 | (3) |
|
15.4 Wireless Positioning Algorithms |
|
|
639 | (14) |
|
15.4.1 Relation between Ranging and Positioning |
|
|
639 | (2) |
|
15.4.2 RSS-based Pattern Recognition Algorithms |
|
|
641 | (7) |
|
15.4.3 TOA-based Least Square Algorithms |
|
|
648 | (5) |
|
16 Wireless Localization in Practice |
|
|
653 | (34) |
|
|
653 | (1) |
|
16.2 Emergence of Wi-Fi Localization |
|
|
653 | (2) |
|
16.2.1 Evolution of Wi-Fi Localization |
|
|
655 | (2) |
|
16.2.2 Wi-Fi Localization: TOA versus RSS |
|
|
656 | (1) |
|
16.2.3 How does RSS-based Wi-Fi Localization Work? |
|
|
657 | (1) |
|
16.3 Comparison of Wi-Fi Localization Systems |
|
|
657 | (8) |
|
16.3.1 RTLS: Wi-Fi Localization for RFID Applications |
|
|
658 | (2) |
|
|
660 | (5) |
|
16.4 Practical TOA Measurement |
|
|
665 | (4) |
|
16.4.1 Measurement of TOA using a Narrowband Carrier Phase |
|
|
665 | (1) |
|
16.4.2 Wideband TOA Measurement and Super-resolution Algorithm |
|
|
666 | (1) |
|
16.4.3 UWB TOA Measurement |
|
|
667 | (2) |
|
16.5 Localization in the Absence of DP |
|
|
669 | (6) |
|
16.5.1 Ranging Error in the Absence of DP |
|
|
670 | (1) |
|
16.5.2 Effects of Bandwidth |
|
|
671 | (1) |
|
16.5.3 Localization using Multipath Diversity |
|
|
672 | (1) |
|
16.5.4 Cooperative Localization Using Spatial Diversity |
|
|
673 | (2) |
|
16.6 Challenges in Localization inside the Human Body |
|
|
675 | (12) |
|
16.6.1 Bounds on RSS-based Localization inside the Human Body |
|
|
676 | (3) |
|
16.6.2 Challenges in TOA-based RF Localization inside the Human Body |
|
|
679 | (2) |
|
16.6.3 Modeling of Wideband RF Propagation from inside the Human Body |
|
|
681 | (6) |
References |
|
687 | (14) |
Index |
|
701 | |