Ttvtcrack 1
Ttvtcrack 1
https://www.researchgate.net/publication/228041875
CI READS
TA 71,006
TI
ON
S
12
1 author:
Okechukwu Ugweje
Nile University of Nigeria
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Introduction
Overview of RF Wireless
Communication Radio Wave
Propagation
Wireless Communication
Techniques Cellular
Communication
Elements of Wireless
Communication Security Security
of Wireless LANs
Emerging Technologies and
Security Standards Concluding
Remarks
Glossary
Cross
References
References
Abstract
2
summary of the history of wireless communications in general, from the first
radio-frequency communication system to current cellular mobile radio
systems. It then proceeds with the concept of radio wave propagation, forms
of wireless communication systems and techniques, and the basic concept of
cellular mobile radio communication. It classifies wireless communications
into categories of related technology by grouping related concepts together.
It also introduces security concepts for wireless communication systems in
general and gives an example of security issues using the IEEE (Institute of
Electrical and Electronics Engineers)
802.11 wireless local area network. Finally, it reviews the current
wireless technologies as well as emerging technologies.
(Tóm tắt
Mục đích của chương này là cung cấp một tổng quan và tóm tắt về ý nghĩa và khái
niệm cơ bản của hệ thống truyền thông tần số radio và không dây. Chương bắt đầu
bằng việc tóm tắt lịch sử của truyền thông không dây nói chung, từ hệ thống truyền
thông tần số radio đầu tiên đến các hệ thống di động tần số radio hiện tại. Sau đó,
chương tiếp tục với khái niệm về lan truyền sóng radio, các hình thức của hệ thống và
kỹ thuật truyền thông không dây, và khái niệm cơ bản về truyền thông di động tần số
radio. Nó phân loại truyền thông không dây thành các loại công nghệ liên quan bằng
cách nhóm các khái niệm liên quan với nhau. Nó cũng giới thiệu các khái niệm về bảo
mật cho hệ thống truyền thông không dây nói chung và đưa ra một ví dụ về các vấn
đề bảo mật bằng cách sử dụng mạng khu vực không dây IEEE (Viện Kỹ thuật Điện và
Điện tử) 802.11. Cuối cùng, nó đánh giá các công nghệ không dây hiện tại cũng như
các công nghệ mới nổi.
)
INTRODUCTION
(GIỚI THIỆU
Các hệ thống truyền thông không dây tần số vô tuyến (RF) đã tồn tại trong nhiều năm
với các ứng dụng từ cửa mở cửa ga ra tới truyền thông vệ tinh. Các công nghệ này
bao gồm một loạt các khả năng hướng tới các ứng dụng và nhu cầu khác nhau. Các
công nghệ này đã tiến bộ với tốc độ chưa từng có, và tác động của chúng rõ ràng
trong cuộc sống hàng ngày của chúng ta. Việc giảm dây cáp cũng đồng nghĩa với sự
linh hoạt và hiệu suất tăng lên, đồng thời giảm chi phí dây cáp. Ở nhiều nơi trên thế
giới, truyền thông không dây là lĩnh vực truyền thông đang phát triển nhanh nhất,
cung cấp một phương tiện bổ sung và thay thế có giá trị cho các mạng dây hiện có
("Dịch vụ truyền thông di động", n.d.). Dựa trên số lượng người dùng các sản phẩm
truyền thông không dây và người đăng ký dịch vụ, truyền thông không dây hiện là
phương pháp giao tiếp được ưa chuộng nhất ("Truyền thông không dây, Thị trường &
Cơ hội," 2000). Nhiều hệ thống trước đây được truyền qua cáp giờ đây được truyền
qua phương tiện không dây
)
4
The remarkable success of cellular mobile radio and other wireless
technology has fundamentally changed the way people communicate
and conduct business. The wireless revolution has led to a new multi-
billion-dollar wireless communications industry. Linking service areas,
wireless communication has altered the way business is conducted. For
example, with a laptop computer, a wireless modem, and a cellular
phone, a business consultant can contact his or her office and clients
and conduct business while traveling. Field service and sales personnel
can access corporate databases to check inventory status, prepare up-to-
the-minute price and delivery quotes, modify schedule activities, and
fulfill orders directly to the factory while traveling. Company personnel
can use two-way paging services to stay in close contact, even when
traditional wired communication services are available. Handheld
hybrid phone- computer-fax machines feed information to wireless
communication networks, allowing an executive to make decisions
while on a leisure outing.
(Sự thành công đáng kinh ngạc của radio di động và các công nghệ
không dây khác đã thay đổi cách con người giao tiếp và kinh doanh.
Cuộc cách mạng không dây đã dẫn đến một ngành truyền thông không
dây mới trị giá hàng tỷ đô la. Bằng cách kết nối các khu vực dịch vụ,
truyền thông không dây đã thay đổi cách kinh doanh được tiến hành. Ví
dụ, với một máy tính xách tay, một modem không dây và một điện
thoại di động, một nhà tư vấn kinh doanh có thể liên lạc với văn phòng
và khách hàng của mình và tiến hành kinh doanh trong khi di chuyển.
Nhân viên dịch vụ tại hiện trường và nhân viên kinh doanh có thể truy
cập vào cơ sở dữ liệu của công ty để kiểm tra tình trạng hàng tồn kho,
chuẩn bị báo giá giá và giao hàng theo phút, thay đổi hoạt động lịch
trình và đáp ứng đơn hàng trực tiếp đến nhà máy trong khi di chuyển.
Nhân viên công ty có thể sử dụng dịch vụ phân trang hai chiều để duy
trì liên lạc chặt chẽ, ngay cả khi có sẵn dịch vụ truyền thông dây truyền
thống. Máy điện thoại-fax-máy tính di động cầm tay truyền thông thông
5
tin đến các mạng truyền thông không dây, cho phép một nhà quản lý
đưa ra quyết định trong khi đi nghỉ.)
For instance, wireless local area network (WLAN) devices allow users
to move their laptops from place to place within their office environment
without the need for wires and without losing network connectivity. Ad
hoc networks, such as those enabled by Bluetooth, allow data
synchronization with network systems and applications sharing between
devices. Bluetooth can also eliminate cables for printer and other
peripheral device connections. Handheld devices, such as personal
digital assistants (PDA) and cell phones, allow remote users to
synchronize personal databases, and they provide access to network
services such as wireless e-mail, Web browsing, and Internet access.
Moreover, these technologies offer dramatic cost savings and added
capabilities to diverse applications ranging from the retail setting to the
manufacturing shop floor to first responders.
(Ví dụ, các thiết bị mạng cục bộ không dây (WLAN) cho phép người dùng di chuyển
máy tính xách tay của họ từ nơi này đến nơi khác trong môi trường văi công ty mà
không cần sử dụng dây cáp và không mất kết nối mạng. Các mạng tạm thời, chẳng
hạn như những mạng được kích hoạt bởi Bluetooth, cho phép đồng bộ dữ liệu với hệ
thống mạng và chia sẻ ứng dụng giữa các thiết bị. Bluetooth cũng có thể loại bỏ các
cáp kết nối máy in và các thiết bị ngoại vi khác. Các thiết bị cầm tay như trợ lý số cá
nhân (PDA) và điện thoại di động cho phép người dùng từ xa đồng bộ cơ sở dữ liệu
cá nhân và truy cập vào các dịch vụ mạng như email không dây, duyệt web và truy
cập internet. Hơn nữa, các công nghệ này cung cấp tiết kiệm chi phí đáng kể và khả
năng bổ sung cho nhiều ứng dụng đa dạng từ môi trường bán lẻ cho đến mặt tiền nhà
máy sản xuất và người đầu tiên đáp ứng khẩn cấp.)
6
Risk is typically associated with wireless communications
technology, because the airwaves can be accessed by intruders.
Potential risks include loss of confidentiality, loss of integrity, loss of
resource availability, and loss of proprietary information, to mention
only a few. Malicious users may gain access to the network and
intentionally corrupt the data by spreading viruses, or they may simply
launch attacks that prevent authorized users from accessing the network.
Even if data confidentiality or integrity is not compromised,
unauthorized users may steal bandwidth and cause a decrease in
network performance or use a vulnerable wireless network as a platform
for launching a network attack on a third party. These risks are not
peculiar to wireless systems, but the risks are exacerbated by the nature
of wireless connectivity.
(Rủi ro thường được liên kết với công nghệ truyền thông không dây,
vì sóng không gian có thể bị xâm nhập. Các rủi ro tiềm năng bao gồm
mất bảo mật, mất tính toàn vẹn, mất khả năng sử dụng tài nguyên và
mất thông tin độc quyền, chỉ đề cập đến một số rủi ro. Người dùng độc
hại có thể truy cập vào mạng và có ý định gian lận dữ liệu bằng cách lây
lan virus, hoặc đơn giản là tiến hành các cuộc tấn công ngăn người dùng
được ủy quyền truy cập vào mạng. Ngay cả khi bảo mật hoặc tính toàn
vẹn dữ liệu không bị xâm phạm, người dùng không được ủy quyền có
thể ăn cắp băng thông và gây giảm hiệu suất mạng hoặc sử dụng mạng
không dây có lỗ hổng làm nền tảng để tấn công mạng của bên thứ ba.
Những rủi ro này không đặc thù cho các hệ thống không dây, nhưng các
rủi ro này trở nên nghiêm trọng hơn do tính chất của kết nối không dây.)
This chapter presents a concise summary of the subject of radio
frequency (RF) and wireless communications and introduces the concept
of security for wireless communications. This includes a discussion of
the general concepts and definitions of RF-based wireless
communication, various forms and applications of RF wireless
communication, synopsis of radio wave propagation, the cellular
7
communication systems, and a general introduction of the security issues
in wireless communications in general and WLAN in particular. Also
presented is a summary of current and emerging wireless
communication technologies. Of particular interest is the cellular mobile
radio system, which has become the most widespread RF wireless
communication system.
(Chương này trình bày một bản tóm tắt ngắn gọn về chủ đề về tần số
vô tuyến (RF) và truyền thông không dây và giới thiệu khái niệm về bảo
mật cho truyền thông không dây. Điều này bao gồm một cuộc thảo luận
về các khái niệm và định nghĩa chung về truyền thông không dây dựa
trên RF, các hình thức và ứng dụng khác nhau của truyền thông không
dây RF, tóm lược về truyền sóng radio, các hệ thống truyền thông di
động và một sự giới thiệu tổng quát về các vấn đề bảo mật trong truyền
thông không dây nói chung và WLAN cụ thể. Ngoài ra, cũng trình bày
một bản tóm tắt về các công nghệ truyền thông không dây hiện tại và
mới nổi. Đặc biệt đáng chú ý là hệ thống radio di động, đã trở thành hệ
thống truyền thông không dây RF phổ biến nhất.)
RF WIRELESS COMMUNICATION
8
2002). He conducted additional experiments leading to 1901 when his
radiotelegraph system transmitted radio signals across the Atlantic
Ocean, from England to Newfoundland, about 1,700 miles away
(“Mobile Telephone History,” n.d.). Only telegraphic codes were
transmitted, however. On December 24, 1906, Reginald Fessenden
accomplished the first radio communication of human speech over a
distance of 11 miles from Brant Rock, Massachusetts, to ships in the
Atlantic Ocean (“Mobile Telephone History,” n.d.). Radio was no
longer limited to telegraph codes; it was no longer just a wireless
telegraph. This was a remarkable milestone highlighting the beginning
of the voice-transmitted age.
In the early years of RF wireless communication, radio broadcasting
was the most deployed wireless communication technology. The
invention of the vacuum tube and vacuum triode hastened the
advancement in radio transmission of voice signals. Radio broadcast
by way of amplitude modulation (AM) and, later by frequency
modulation (FM), was made possible.
Amplitude modulation of the radio frequency was used to carry
information until FM was introduced in the late 1930s (Mark &
Zhuang, 2003). After FM was introduced by Armstrong (Lathi, 1998),
many other RF wireless systems such as television, one- and two-way
radio, and radar, were introduced between the late 1920s and the mid-
1950s. Another milestone was witnessed in the late 1970s, which
marked the beginning of the growth in cellular mobile radios and
personal communication services. The first successful commercial
analog cellular mobile telephone was demonstrated in 1979 (Durgin,
2003). Currently, wireless communication of all kinds abounds in our
society.
(Công nghệ truyền tin không dây RF bắt đầu từ đầu thế kỷ 20, hơn 100 năm trước, khi
Marconi thiết lập thành công hệ thống phát thanh đầu tiên trên thế giới. Thí nghiệm
của ông vào năm 1895 đã chứng minh việc truyền tín hiệu phát thanh qua khoảng
9
cách 2 km (Proakis & Salehi, 2002). Ông tiếp tục thực hiện các thí nghiệm và năm
1901, hệ thống điện tử của ông đã truyền tín hiệu phát thanh qua Đại Tây Dương từ
Anh sang Newfoundland, khoảng 1.700 dặm. Tuy nhiên chỉ mã Morse được truyền
tải. Ngày 24/12/1906, Reginald Fessenden đã thực hiện thành công truyền tín hiệu
thoại người qua khoảng cách 11 dặm từ Brant Rock, Massachusetts đến tàu thuyền
trên Đại Tây Dương (“Mobile Telephone History”, n.d.). Phát thanh không còn giới
hạn ở mã Morse; nó không còn chỉ là điện tử vô tuyến. Đây là một cột mốc đánh dấu
sự bắt đầu của thời đại truyền tin bằng giọng nói.
Trong những năm đầu của truyền tin vô tuyến RF, phát thanh là công nghệ truyền tin
không dây được triển khai rộng rãi nhất. Việc phát minh ra ống chân không và bộ
phận ba cực đã thúc đẩy sự phát triển của việc truyền tín hiệu giọng nói qua sóng vô
tuyến. Phát thanh bằng cách điều chế biên độ (AM) và sau này là điều chế tần số
(FM) đã trở thành có thể.
Điều chế biên độ của tần số vô tuyến được sử dụng để truyền thông tin cho đến khi
FM được giới thiệu vào cuối những năm 1930 (Mark & Zhuang, 2003). Sau khi
Armstrong giới thiệu FM (Lathi, 1998), nhiều hệ thống RF vô tuyến khác như truyền
hình, vô tuyến hai chiều, rađa đã được giới thiệu từ cuối những năm 1920 đến giữa
những năm 1950. Một cột mốc quan trọng khác được chứng kiến vào cuối những năm
1970, đánh dấu sự bắt đầu phát triển mạnh của điện thoại di động cũng như dịch vụ
viễn thông cá nhân. Điện thoại di động tương tự thương mại thành công đầu tiên được
giới thiệu vào năm 1979 (Durgin, 2003). Hiện nay, truyền thông tin không dây mọi
loại đã phổ biến rộng rãi trong xã hội.
)_
System Architecture
10
space-based systems. Terrestrial-based systems include microwave
point-to-point, WLANs, and cellular mobile radio, to mention only a
few. Terrestrial microwave systems are limited in distance and line-of-
sight (LOS) propagation is the limiting factor. Relay towers with
carefully aligned directional antennas are often used to provide an
unobstructed path over an extended distance. The data signal is
processed, up- or down-converted, modulated or demodulated, filtered,
and amplified at the transceivers. The transmitted signal propagates
through the air and is attenuated by several propagation mechanisms
(discussed later in the chapter).
Space-based systems (e.g., satellites) are similar to terrestrial
microwave systems except that signals travel from earth-based ground
stations to a satellite (uplink), and a signal is sent back from the
satellite to another earth-based ground station (downlink). This
achieves a far wider coverage area than the earth-based systems. The
satellite system could be in geostationary earth orbit, medium earth
orbit, or low earth orbit.
A typical wireless communication system is shown in Figure 1. It
consists of a source of information, a hardware subsystem called the
transmitter, the channel or means by which the signal travels, another
hardware subsystem called the receiver, and a destination of the
information (the sink).
(Trong hệ thống truyền thông tin RF không dây, sóng vô tuyến được sử dụng để
truyền thông tin giữa bộ phát (Tx) và bộ thu (Rx). Hệ thống RF có thể được phân loại
là dựa trên mạng viễn thông trên mặt đất hoặc dựa trên vệ tinh. Các hệ thống dựa trên
mặt đất bao gồm điểm điểm sóng vi ba, WLAN và điện thoại di động, chỉ đề cập một
vài ví dụ. Hệ thống sóng vi ba trên mặt đất bị hạn chế về khoảng cách và yếu tố giới
hạn là tín hiệu truyền trực tiếp. Tháp truyền dẫn với anten hướng hướng được sử dụng
để cung cấp một đường truyền không bị che khuất trong khoảng cách xa hơn. Tín hiệu
dữ liệu được xử lý, lên xuống tần, điều chế hay giải điều chế, lọc và khuếch đại tại bộ
phát thu. Tín hiệu được phát đi truyền qua không trung và bị suy giảm do nhiều cơ
11
chế truyền sóng được đề cập chi tiết hơn trong chương sau.
Hệ thống dựa trên vệ tinh tương tự như hệ thống sóng vi ba trên mặt đất ngoại trừ tín
hiệu được truyền từ trạm mặt đất lên vệ tinh (uplink), và tín hiệu được gửi xuống từ
vệ tinh đến trạm mặt đất (downlink). Điều này đạt được phạm vi phủ sóng rộng hơn
so với hệ thống trên mặt đất. Hệ thống vệ tinh có thể nằm trên quỹ đạo địa tĩnh, quỹ
đạo trung gian hoặc quỹ đạo thấp.
Một hệ thống truyền thông vô tuyến thông thường được mô tả trong Hình 1. Nó gồm
nguồn thông tin, phần cứng bộ phát, kênh truyền sóng, phần cứng bộ thu và đích
thông tin.)
12
Tx Pt, Gt
Antenna
Transmitter
Source Da Processes
IF RF
Oscillator
in
Transmitter
Propagation Effects
(reflection, refraction, distortion,
Channel loss, scattering, absorption, etc)
Receiver
Rx
Pr, Gr Antenna
Receiver
Data
Filter
RF IF
Filter
Processes
out Sin
Low Power
Amplifier Amplifier k
LO
Oscillator
13
unshielded twisted pair, coaxial cable, or fiber-optic cable. In wireless
communication the channel is the free space. Noise and interference is
added to the signal in the channel, which increases attenuation,
distortion, and eventually error in the received signal.
The transmitter and receiver are complex systems consisting of many
internal components. A block diagram representation of some of the
components is shown in Figure 1. Components are denoted as
transmitter processes, receiver processes, amplifiers, mixers, local
oscillators (LO), filters, and antennas. The transmitter processes
represents functions of the transmitter such as
14
modulation, encoding, analog-to-digital conversion, multiplexing,
addressing, and routing information. The receiver processes, on the
other hand, denote the inverse functions such as demodulation,
decoding, digital-to-analog conversion, and demultiplexing, as well as
addressing and routing information. Effective transmission and
reception of radio waves involves processes such as amplification and
filtering of the signal at various internal stages, mixing of the desired
signal with a local oscillator signal, translating the signal from one
frequency to another, and transmission or reception of the RF energy
through the antenna. The amplifier is characterized by its gain, noise
figure (or output power), and linearity (Weisman, 2003). The gain (in
dB) of the amplifier is a measure of how much bigger the output signal
is than the input signal. The noise figure (or noise ratio) is a measure of
the quality of the receiver system. Mixers are commonly found in the
Tx and Rx subsystems and are used to create new frequencies or
translate existing frequencies to new ones. They are sometimes called
up or down converters.
The most common translation of frequency is from intermediate
frequency (IF) to RF and vice versa. The mixer performs this function
by effectively multiplying two signals at two frequencies. A signal
source that provides one of the inputs to the mixer is the LO. A
common type of LO is a voltage-controlled oscillator. A function of
the filter is frequency selectivity.
Filters select signals based on their frequency components. Regardless
of the construction, all filters can be classified as low pass, high pass,
band pass, or band stop). These names are descriptive of the function of
the filter. For example, a low pass filter will select signals with low
frequency and reject signals with high frequency. A special type of filter
commonly used in RF systems is the duplexer, a frequency-dependent
device that may be used as a separator or a combiner of signals. The
duplexer facilitates the use of one antenna for both transmission and
15
reception. The sink or destination (receiver) can vary as much as the
source (transmitter) insofar as the type of information processed.
In the RF propagation channel, external noise in the form of
manmade noise (generated by electrical manmade objects),
atmospheric noise, and extraterrestrial noise is introduced.
Atmospheric noise is produced by electrical activities of the
atmosphere. This type of noise is predominant in the range 0–30 MHz
and is inversely proportional to its frequency.
Extraterrestrial noise is produced by activities of the cosmos, including
the sun. The RF propagation channel is time variant, hence the
effectiveness of any system may vary because of the effects of
atmospheric electrical activities (mostly solar ionization), weather, and
random human-made noise sources. This time-variant channel requires
careful consideration in the design of any wireless communications
system.
In wireless communication, radio waves are used to transfer
information, and because radio waves propagate in space, they are
susceptible to some security risks. An intruder can intercept the signal
or gain access to network services, without being an authorized user.
The specific risk associated to wireless communication is presented
later.
(Hình 1 mô tả mô hình đơn giản hóa của hệ thống truyền thông RF không dây trên
mặt đất.
Nguồn cung cấp thông tin dưới dạng âm thanh, hình ảnh, dữ liệu hoặc kết hợp các
loại thông tin này cho bộ phát. Tổ hợp bộ phát và bộ thu được sử dụng để chuyển đổi
tín hiệu thành dạng phù hợp cho việc truyền và sau đó chuyển đổi lại về dạng ban
đầu. Quá trình này được thực hiện thông qua việc điều chế (mã hóa) ở phía bộ phát và
giải điều chế (giả mã) ở phía bộ thu. Kênh truyền là môi trường truyền sóng như
không gian tự do, cặp dây ghém chưa bao phủ, cáp đồng trục hoặc cáp quang. Trong
truyền thông vô tuyến, kênh truyền là không gian tự do. Nhiễu và gây nhiễu được
16
thêm vào tín hiệu trên kênh, làm tăng suy hao, méo mó và cuối cùng dẫn đến lỗi trong
tín hiệu thu được.
Bộ phát và thu là các hệ thống phức tạp bao gồm nhiều thành phần bên trong. Một
biểu diễn dạng khối của một số thành phần được mô tả trong Hình 1. Các thành phần
bao gồm quy trình bộ phát, quy trình bộ thu, khuếch đại, trộn tần, bộ phát điều khiển
địa phương (LO), bộ lọc và ăng ten. Quy trình bộ phát bao gồm các chức năng như
điều chế, mã hóa, chuyển đổi số analog thành số, ghép kênh, địa chỉ và định tuyến
thông tin. Quy trình bộ thu biểu thị các chức năng ngược lại như giải điều chế, giải
mã, chuyển đổi số kỹ thuật số thành tín hiệu analog, phân ghép kênh cũng như xử lý
địa chỉ và định tuyến thông tin. Truyền và thu sóng vô tuyến hiệu quả đòi hỏi quá
trình như khuếch đại, lọc tín hiệu ở các giai đoạn bên trong, trộn tín hiệu cần thiết với
tín hiệu bộ phát điều khiển địa phương, dịch chuyển tín hiệu từ tần số này sang tần số
khác và truyền/thu năng lượng RF qua ăng ten.
Kênh truyền RF bị ảnh hưởng bởi nhiễu nhân tạo do hoạt động của con người như
nhiễu do thiết bị điện tử, nhiễu khí quyển và nhiễu ngoài trái đất. Nhiễu khí quyển
được tạo ra bởi hoạt động điện của khí quyển. Loại nhiễu này chiếm ưu thế ở dải tần
0-30MHz và nghịch đảo tỷ lệ với tần số. Nhiễu ngoài trái đất do hoạt động của vũ trụ
bao gồm mặt trời. Kênh truyền RF thay đổi theo thời gian, do đó hiệu quả hệ thống có
thể thay đổi do ảnh hưởng của hoạt động điện khí quyển, thời tiết và nguồn nhiễu
nhân tạo ngẫu nhiên. Điều này đòi hỏi thiết kế hệ thống truyền thông vô tuyến phải
cân nhắc kỹ lưỡng về kênh truyền thay đổi theo thời gian.
Trong truyền thông vô tuyến, sóng vô tuyến được sử dụng để truyền thông tin và do
sóng vô tuyến lan truyền trong không gian nên chúng dễ bị tổn hại an ninh mạng. Kẻ
xâm nhập có thể chặn đọc tín hiệu hoặc truy cập dịch vụ mạng mà không cần là người
dùng hợp pháp. Rủi ro cụ thể liên quan đến truyền thông vô tuyến sẽ được trình bày
chi tiết sau.
)
18
frequency, the lower the wavelength, because = c/fc, where c = 3.0
108 m/s is the speed of light, and fc is the carrier frequency. The
wavelength is related to the realizable antenna length, L, system
bandwidth, B, and other practical system parameters. In general, higher
frequency radio waves produce smaller , require shorter L, have lower
bandwidth efficiency, (assuming high bandwidth; Haykin, 2000, p.
347), are more susceptible to fading, are less susceptible to atmospheric
electrical activity, and suffer from atmospheric thermal and weather
distortion.
Bandwidth efficiency is the number of information bits transmitted per
second per unit of bandwidth (Hz) or the ratio of the bit rate to channel
bandwidth expressed in bit per second per
hertz (b/s/Hz). Considering that
(Phân loại băng tần sóng vô tuyến
Sóng vô tuyến hoặc sóng điện từ thuộc phần phổ điện từ kéo dài từ 3 kHz đến 300
GHz. Toàn bộ phổ sóng vô tuyến được phân chia thành các dải băng tần khác nhau
dựa trên tính chất lan truyền. Tín hiệu nguyên băng hoặc tín hiệu nguồn (ví dụ như tín
hiệu âm thanh) nằm trong khoảng tần số thấp dưới 30 kHz. Phạm vi tần số này được
phân loại là rất thấp tần (VLF), phải được chuyển đổi thành sóng vô tuyến trước khi
truyền tải.
Sóng vô tuyến cũng được mô tả bởi bước sóng, thuộc phạm vi bước sóng như sóng
ngắn, sóng trung, hay sóng milimet, bởi vì λ = c/fc, trong đó c = 3,0 × 108 m/s là tốc
độ ánh sáng, fc là tần số mang. Bước sóng liên quan đến chiều dài ăngten thực hiện
được, L, băng thông hệ thống, B và các tham số hệ thống thực tế khác. Nói chung,
sóng vô tuyến tần số cao tạo ra λ nhỏ hơn, yêu cầu L ngắn hơn, hiệu quả sử dụng
băng thông thấp hơn, dễ bị ảnh hưởng va gợn sóng và suy giảm do yếu tố thời tiết và
nhiệt khí quyển hơn.
)
19
it can be seen that as ρ increases, the required bandwidth decreases, if
the bit rate Rb is constant. M is the symbol level and T is the period.
Any digital system will become less bandwidth efficient if its BTb value
is increased. The capacity (C) of a digital communication system is
directly related bandwidth ma C/B log 1S / N bits/s/Hz ,
efficiency because
x 10
20
using the actual frequency numbers. A complete list of the radio-
frequency allocation can be found at
http://www.rfm.com/corp/new868dat/fccchart.pdf.
Because of the congestion or unavailability of usable spectrum at the
lower frequency bands (below 20 GHz) and the recent demand for
multimedia communication at high data-rate capabilities, system
designers have directed their attention toward the use of SHF and EHF
for communication (Acosta, 1999). Currently, there is a great deal of
research on developing RF systems operating at frequencies above 20
GHz (KA band and above; National Aeronautics and Space
Administration, 1998).
This interest in the EHF band is justified because of its potential
benefits, such as the availability of usable spectrum, high data-rate
capability, reduced interference, and high achievable gain with narrow
beam widths of small antennas (Ippolito, 1989). The drawback,
however, is that at these frequencies atmospheric distortion, especially
rain attenuation (absorption of the RF signal), is severe (Acosta &
Horton, 1998; Xu, Rappaport, Boyle, & Schaffner, 2000). The severity
of the meteorological effects increases with increasing frequency. At
some frequency bands, the meteorological effects can cause a reduction
in received signal amplitude, depolarization of the radio wave, and
increase in thermal noise (Ippolito, 1989).
(Có thể thấy khi ρ tăng lên, băng thông yêu cầu giảm xuống nếu tốc độ bit Rb là hằng
số. M là cấp biểu tượng và T là chu kỳ. Bất kỳ hệ thống số nào cũng sẽ ít hiệu quả sử
dụng băng thông hơn nếu giá trị BTb của nó tăng lên. Dung lượng (C) của hệ thống
truyền thông số có tương quan trực tiếp với hiệu quả sử dụng băng thông bởi vì
max = C/B = log10(1+S/N) bit/s/Hz,
trong đó S là công suất tín hiệu và N là công suất nhiễu. Các hệ thống có hiệu quả sử
dụng băng thông cao hơn truyền nhiều bit thông tin hơn trên mỗi băng thông.
Các đặc tính và ứng dụng của băng tần radio được tóm tắt trong Bảng 1.
21
Trong mỗi phạm vi tần số, nhiều dải tần có thể được chỉ định cho truyền thông. Các
dải này thường được xác định bằng fc hoặc ký hiệu chữ cái, như minh họa trong Hình
2 (Acosta, 1999; Ủy ban Truyền thông Liên bang [FCC], 1997). Ví dụ, trong ứng
dụng thực tế, người ta có thể mô tả hệ thống RF hoạt động ở băng C, X, K hoặc KA
thay vì sử dụng các con số tần số thực tế. Danh sách phân bổ băng tần vô tuyến có thể
tìm thấy tại http://www.rfm.com/corp/new868dat/fccchart.pdf.
Do sự quá tải hoặc không sử dụng được phổ ở các dải tần thấp hơn (dưới 20 GHz) và
nhu cầu gần đây về truyền thông đa phương tiện với hiệu suất tốc độ dữ liệu cao, các
kỹ sư thiết kế đã quan tâm đến việc sử dụng SHF và EHF cho truyền thông (Acosta,
1999). Hiện nay, nhiều nghiên cứu đang được thực hiện về phát triển hệ thống RF
hoạt động ở tần số trên 20 GHz (băng KA trở lên; NASA, 1998).
Sự quan tâm đến băng EHF là có cơ sở do những lợi ích tiềm năng như sẵn có dải phổ
sử dụng, khả năng tốc độ dữ liệu cao, gây nhiễu thấp và hiệu suất khuếch đại cao với
góc chùm hẹp của ăngten nhỏ (Ippolito, 1989). Tuy nhiên, nhược điểm là ở các tần số
này sự méo mó do khí quyển, đặc biệt là suy giảm do mưa (hấp thụ tín hiệu vô tuyến),
rất nghiêm trọng (Acosta & Horton, 1998; Xu và cộng sự, 2000). Mức độ ảnh hưởng
của thời tiết gia tăng theo tần số. Ở một số băng tần, ảnh hưởng của thời tiết có thể
gây giảm biên độ tín hiệu nhận được, phân cực sóng điện từ và tăng nhiễu nhiệt.
)
22
Very < 30 Low Lon Hig Lon Baseband
low attenuation day g h g signals;
freque kHz and night; high powerlines;
ncy atmospheric home control
(VLF) noise level systems;
navigation
and
submarine
communication
Low 30–300 Slightly less Long-range
frequen reliable than navigation;
cy (LF) kHz VLF; marine
absorption in communication;
daytime radio
beacons
Mediu 0.3–3 Attenuation Maritime radio;
m low at night, direction
frequen MHz high in day; finding; AM
cy atmospheric broadcasting
(MF) noise
High 3.0–30 Omni- International
frequen directional broadcasting,
cy MHz energy military
(HF) radiation; communication;
quality varies long- distance
with time of aircraft and ship
day, season, communication
frequency, and
solar activity
23
24
Very 30–300 Direct and VHF TV; FM
high ground waves;
freque MHz cosmic noise; broadcast;
ncy antenna design Shor Lo Shor two-way
(VHF) is critical t w t radio, AM
aircraft
communicatio
n and
navigational aids
Ultra 0.3–3 Line-of-sight UHF TV;
high (LOS); cellular
frequen GHz repeaters are phone; radar;
cy used to cover microwave
(UHF) greater links;
distances; personal
cosmic noise communicati
ons
services
Super 3.0–30 LOS; Satellite and
high atmospheric radar
frequen GHz attenuation communication;
cy due to rain terrestrial
(SHF) (>10 GHz), microwave;
oxygen and wireless local
water loop
vapor
Extrem 30–300 LOS; Experimental;
ely millimeter wireless local
high GHz wave; loop
frequen atmospheric
25
cy attenuation
(EHF) due to rain,
oxygen and
water vapor
26
LS C X K K K U E F U
1 2 4 8 12.4
U 18 26.5
A 40 60 90 140 220 GHz
Q V WP
28
isotropic or directional antennas, respectively. It is a measure of the
effectiveness of an antenna in directing the transmitter power in a
particular direction (Rappaport, 2002).
Reflected
Wave
Surface
Wave
30
terrain. It is guided along the surface of the earth, reflecting and
scattering off buildings, vegetation, hills, mountains, and other
irregularities on the earth’s surface. These waves propagate outward
from the antenna but undergo refraction due to variation in the density
of the atmosphere (Garg & Wilkes, 1996). The signal strength decreases
as the distance between the Tx and the Rx increases. This wave affects
all frequencies in the MF, HF, and VHF ranges, and it is the dominant
wave in cellular mobile radio systems. Vertical polarization, the
direction of the electric-field component, is best for this type of wave.
The polarization is determined by the construction and orientation of the
antenna.
Tropospheric and ionospheric waves are commonly referred to as sky
waves. They propagate in outer space but can return to earth by
reflection or scattering either in the troposphere or in the ionosphere.
The tropospheric wave is that portion of the radio wave close to the
earth’s surface as a result of gradual bending in the lower atmosphere
(Garg & Wilkes, 1996). The bending action is due to the changing
effective dielectric constant of the atmosphere through which the wave
is passing. Its reflective index gradually decreases with height, resulting
in a bending path taken by the wave. The troposphere extends about 10
miles above the surface of the earth and applies to waves with
wavelength shorter than 10 m (i.e., < 10 m). The ionospheric wave is
similar to the tropospheric wave except that it travels farther and the
reflection occurs in the ionosphere, 40–400 miles above the earth.
Ionospheric propagation in the 3–30 MHz range is highly dependent on
the state of solar activity and the subsequent levels of atmospheric
ionization. This wave can be highly reliable for telemetry, tracking,
weather forecasting, and tactical military applications. It is also used for
global maritime, military, and aeronautical communications and
shortwave broadcasting. Note that different wavelengths are reflected to
dissimilar extents in the troposphere and ionosphere.
31
(
Các dạng sóng vô tuyến
Sóng vô tuyến lan truyền trong không gian dưới nhiều dạng. Các đặc tính của sóng
lan truyền là quan tâm trong thiết kế nhiều hệ thống viễn thông không dây. Sóng vô
tuyến lan truyền có thể phân loại là sóng trực tiếp (hoặc không gian tự do), sóng mặt
đất, sóng trần khí quyển và sóng tầng điện ly. Các loại sóng này được minh họa trong
Hình 3.
Sóng trực tiếp, trong đó sự lan truyền là trong không gian tự do mà không có trở ngại,
là dạng đơn giản nhất của sóng vô tuyến. Chúng được chiếu trực tiếp theo tầm nhìn
LOS giữa thiết bị phát và thu. Hệ thống viễn thông di động tần số vô tuyến, điện thoại
di động và truyền thông cá nhân ít khi có dạng sóng này.
Sóng mặt đất bị giới hạn ở bầu khí quyển dưới hoặc bề mặt Trái Đất. Sóng mặt đất
bao gồm phần sóng vô tuyến trực tiếp chịu ảnh hưởng của địa hình và vật thể trên địa
hình. Nó lan truyền dọc theo bề mặt Trái Đất, phản xạ và phân tán trên các tòa nhà,
thảm thực vật, đồi núi và các đặc điểm bất thường khác trên bề mặt Trái Đất. Những
sóng này lan truyền ra xa ăng-ten nhưng bị khúc xạ do sự thay đổi mật độ khí quyển.
Sóng trần khí quyển và sóng tầng điện ly thường được gọi là sóng trời. Chúng lan
truyền trong vũ trụ bên ngoài nhưng có thể trở lại Trái Đất do phản xạ hay phân tán
hoặc trong trần khí quyển hoặc tầng điện ly. Sóng trần khí quyển là phần sóng vô
tuyến gần bề mặt Trái Đất do ánh xạ từ từ trong bầu khí quyển dưới. Sóng tầng điện
ly tương tự nhưng đi xa hơn và phản xạ xảy ra ở tầng điện ly cao hơn.
Lưu ý rằng các bước sóng khác nhau sẽ bị phản xạ ở mức độ khác nhau trong trần khí
quyển và tầng điện ly.
)
32
Radio-Frequency-Based Systems
35
mobile user. The AP can reside at any node on the wired network and
acts as a gateway for wireless users’ data routed to the wired network.
WLANs require special medium access control (MAC) layer protocols
because of the broadcast nature of radio communication (Chen, 1994).
A detailed discussion of WLAN is beyond the scope of this chapter.
WLANs have gained strong popularity lately and are used widely in
health care, industry, commerce, warehousing, and academia. An
important feature of the WLAN is that it can be used independent of a
wired network. That is, it can be used as a stand-alone network
anywhere to link multiple computers together without extending a wired
network. WLAN uses one of the three basic transmission protocols,
namely, direct sequence spread spectrum (DSSS), frequency hopping
spread spectrum (FHSS), or low-power narrowband. The majority of
RF-based WLANs operate in the industrial, scientific, and medical
(ISM) frequency bands, which are located at 902 to 928 MHz, 2.4 to
2.483 GHz, and 5.725 to 5.85 GHz, respectively. The different
architectures of WLAN based on Agrawal and Zeng (2003) are
summarized in Table 2, with symbols defined in the Glossary.
WLL is a system that connects telephone subscribers to the public
switched telephone network using radio waves (IEC, n.d., b). With
WLL, the traditional copper wire providing link between the subscriber
and the local exchange is replaced by a wireless RF network. WLL is
advantageous for remote areas where the cost of wire would be
prohibitive (i.e., adverse terrain or widely dispersed subscriber areas).
With WLL, new service providers can quickly deploy wireless
networks to meet customers’ telephony needs rapidly. Existing landline
operators can extend their networks using WLL. Cellular telephone
companies can deliver residential service using WLL without going
through the local telephone company.
(Hệ thống truyền thông không dây dựa trên băng tần vô tuyến
36
Hình 4 minh họa các dạng hệ thống truyền thông không dây dựa trên băng tần vô
tuyến, được phân loại thành sáu nhóm: hệ thống vô tuyến sóng vi ba, hệ thống vệ tinh
cố định và di động, mạng không dây và giao thức, hệ thống truyền thông cá nhân, hệ
thống phát hiện từ xa, và công nghệ không dây mới nổi. Không phân biệt giữa các lớp
và giao thức truyền thông trong phân loại này. Các hệ thống này truyền và thu sóng
vô tuyến điều chỉnh tần số cụ thể. Sóng vi ba được dùng một cách ngữ nghĩa để mô tả
mọi băng tần từ 1-40 GHz, bao gồm UHF, SHF và EHF.
Hệ thống sóng vi ba tần số thấp hơn (UHF) thường được sử dụng cho hệ thống RF
trên mặt đất, trong khi tần số cao hơn (SHF, EHF) dùng cho truyền thông vệ tinh. Hệ
thống sóng vi ba trên mặt đất truyền sóng tập trung chính xác từ ăng-ten phát đến ăng-
ten thu. Nó sử dụng lan truyền LOS giữa thiết bị phát và thu với khoảng cách ty thể
30 dặm.
Dịch vụ truyền thông cá nhân là thế hệ mới của công nghệ điện thoại không dây giới
thiệu nhiều tính năng và dịch vụ hơn so với hệ thống di động tương tự và số. Mạng
không dây và giao thức bao gồm các hệ thống WLAN, vòng kết nối không dây, WAP,
Bluetooth. Những hệ thống này chủ yếu cung cấp truyền thông dữ liệu. WLAN là mở
rộng hoặc thay thế mạng LAN dây, kết hợp kết nối dữ liệu với động lực người dùng.
WLAN hoạt động chủ yếu ở băng tần ISM 2.4GHz và 5GHz.
Hệ thống vòng kết nối không dây WLL kết nối người dùng điện thoại công cộng qua
sóng vô tuyến. WLL thay thế dây đồng truyền điện thoại bằng mạng vô tuyến, có lợi
ở khu vực xa xôi, địa hình phức tạp.
)
37
Table 2 Examples of Wireless Local Area Networks
5.825
Range 150 feet 150 feet 1,000 <150 feet 10 cm to
feet 100
m
Power Not specified Not Not 100 mW 1 mW, 10
consumpt specified specifi mW, and
ion ed 100 mW
support
Raw data 2, 11, 6–54 23.5, 54 288 1 and 2 1 Mbps
rate kbps
39
Mbps Mbps Mbps
DES 4 PHY)
Communica Peer-to- Peer-to- Peer- Peer- Master/
tion peer, peer, to- to- slave
technology MS-BS MS-BS peer peer,
MS-
BS
41
and the hypertext transfer protocol (HTTP) and is designed to work
with all wireless network technology. More information can be
obtained from the WAP Forum (2000) and in the chapter on WAP in
this encyclopedia.
Bluetooth is a wireless technology that makes possible connectivity
to the Internet from mobile computers, mobile phones, and portable
handheld devices without the need for cable connection. It facilitates
fast and secure transmission of both voice and data, without LOS
propagation. Some characteristics of Bluetooth technology are
summarized in Table 2. Detailed information on Bluetooth can be
found in another chapter in this encyclopedia.
Satellite communication is one of the traditional RF wireless
communication systems. Signals can be transmitted directly from a
ground station (GS) or gateway on earth to a satellite, and back to
another GS. Sometimes the signal can be routed through another
satellite (intersatellite) before it is transmitted back to the GS. We can
identify a satellite system by how far the satellite is from the earth. The
closer the satellite is to the earth, the shorter the time it takes to send
signals to the satellite. There are three satellite orbits: low earth orbit
(LEO), medium earth orbit (MEO), and geosynchronous earth orbit
(GEO). A geosynchronous satellite completes one orbit around the earth
in the same time it takes the earth to make one complete rotation. A
geostationary satellite is in an orbit located directly above the equator.
LEO satellites are closest to the earth, beginning about 100 miles
above the surface, and only take a couple of hours to circle the earth.
Because LEO systems are orbiting so quickly, multiple satellites are
required to provide constant coverage in one location. LEO systems
have the capability to receive calls from the earth and pass them to an
earth-based switching system in much shorter time than other satellites.
However, because of the speed of the satellite, it is frequently necessary
to hand off a particular call to a second satellite just rising over the
42
horizon.
43
This is similar to a cellular mobile radio system (discussed later), except
that in this case it is the cell site (the satellite) that is moving rather than
the user. The lower orbit has the advantage of allowing access to very
low-power devices (Printchard, 1993). LEO satellites are used mainly
for wireless transfer of electronic mail, pager systems, worldwide mobile
telephony, spying, remote sensing, and video conferencing.
GEO satellites circle the earth at a height of 22,300 miles, orbiting at
the same rate as the earth rotates so that they appear stationary from the
earth’s perspective. Most GEO satellites rely on passive bent-pipe
architecture so that they receive signals from transceivers on earth,
amplify them, and send them back to specific regions on earth. GEO
systems are used for a wide array of services including television
broadcasts, long-distance telecommunications, and various scientific and
military applications. GEO satellites are well suited to transmitting data
but may be undesirable for voice communications because of the long
propagation delay. It takes about one fourth of a second for a signal to
travel from a terrestrial GS to the satellite and back. If the receiver GS
replies, it takes another one fourth of a second, resulting in a total of half
a second (Printchard, 1993). This is an unacceptably long delay for
voice communication. Hence, voice communications are seldom carried
via GEO satellites.
MEO satellites can be found between 1,000 and 22,300 miles and are
mainly used for global positioning and navigation systems. MEO
satellites are not as popular as the LEO or GEO for reasons beyond the
scope of this chapter.
(Giao thức WAP là môi trường ứng dụng và tập giao thức truyền thông (ứng dụng,
phiên, giao dịch, bảo mật, vận chuyển) cho phép thiết bị không dây dễ dàng truy cập
internet và dịch vụ điện thoại nâng cao. WAP cho phép cung cấp dịch vụ di động
không giới hạn cho người dùng, độc lập với mạng, nhà sản xuất, nhà cung cấp hoặc
thiết bị.
44
Bluetooth là công nghệ không dây cho phép kết nối internet từ máy tính cầm tay, điện
thoại di động và thiết bị cầm tay mà không cần dây. Nó thúc đẩy truyền tải thanh và
dữ liệu nhanh và an toàn mà không cần LOS.
Vệ tinh truyền thông là một hệ thống RF không dây truyền thống. Tín hiệu có thể
truyền trực tiếp từ trạm mặt đất lên vệ tinh, và ngược lại. Có ba quỹ đạo vệ tinh: thấp
Trái Đất (LEO), trung bình Trái Đất (MEO) và địa tĩnh (GEO). Vệ tinh LEO gần Trái
Đất nhất, mất vài giờ để quay quanh Trái Đất. Vệ tinh GEO ở độ cao 22.300 dặm,
quay đồng bộ với tốc độ xoay của Trái Đất. Vệ tinh MEO được sử dụng chủ yếu cho
hệ thống vị trí và định vị toàn cầu.
)
45
various propagation impairments, and because of the nature of the
propagation itself, it is necessary to understand the properties of
radio wave propagation. This is most important in
telecommunication applications in predicting the transmission
characteristics of the channel. When radio waves are radiated from
an antenna, propagation is governed by the following mechanisms.
Free Space Propagation
This is the ideal propagation mechanism when the Tx and the Rx have
direct LOS and are separated by a distance d between the Tx and the
Rx. If Pt is the transmitted power, the received power Pr, a function of
distance d, is given by (Rappaport, 2002)
2 Aet Aet
where Ae, G, and L are the effective area, antenna gain, and system loss
factor, respectively. The subscripts t and r refer to the transmitter and
receiver respectively. From this relationship, we observe that the
received power diminishes at the rate of 20 dB/decade as the distance
increases. The product PtGt is defined as EIRP, introduced earlier (i.e.,
EIRP = PtGt).
Reflection and Refraction
47
conductor, the wave is totally reflected and the angle of incidence is
the same as the angle of reflection.
Refraction (see Figure 5) occurs at the boundary between two
dielectrics, when the incident wave propagates into another medium at
an angle. When radio waves propagate from a medium of one density to
a medium of another density, the speed of the wave changes. This
change in speed will cause the wave to bend at the boundary between
the two media. The wave will always bend toward the denser medium.
Direct
path
Diffraction
Reflection
Diffraction
from House
& Reflection
Base
Station
Reflection of
moving truck
Mobile Receiver
Reflection Reflection
Factory from House from building Scatering Object
Diffraction
48
Diffraction of radio waves occurs when the waves encounter some
obstruction along their path and tend to propagate around the edges and
corners and behind the obstruction. This is illustrated in Figure 5. The
height or dimension of the obstruction has to be comparable to the
wavelength of the transmission. The same obstruction height may
produce lower diffraction loss at higher than at lower . The result of
this effect is that the object shadows the radio wave. The field strength
of the wave decreases as the receiver moves deeper into a shadowed
region.
49
Scattering
Interference can occur when the transmitted radio wave arrives at the
same location via two or more paths (multipath). One of the ways this
can happen is illustrated in Figure 6. This figure shows three waves
arriving at a mobile receiver (the car) after traveling slightly different
paths. Because of their phase differences, the radio waves can add either
constructively or destructively at the receiver. If the phase shift
experienced by the propagating waves is time-varying, then it can cause
a rapid variation in the received signal, resulting in fading.
Base
Station
1 3
1
2
3
2
time:t
time:t
Absorption
50
material or substance and gets converted to heat. Two cases of
absorption of radio waves are prevalent. One occurs when radio
51
waves are incident upon a lossy medium and the other is due to
atmospheric effects. When the radio wave strikes an object, the incident
wave (perpendicular wave) propagates into the lossy medium and the
radio energy experiences exponential decay with distance as it travels
into the material. The wave either is totally dissipated or will reemerge
from the material with smaller amplitude and continue the propagation.
The skin depth is the distance for the field strength to be reduced to 37%
of its original value—the energy of the wave is reduced by 0.37.
Particles in the atmosphere absorb RF energy. Absorption through the
atmosphere also depends on the weather conditions—fair and dry,
drizzle, heavy rain, fog, snow, hail, and so on. Usually, the absorption of
RF energy is ignored below 10 GHz.
Doppler Effect
the effective velocity of the mobile (Garg & Wilkes, 1996). The
Doppler shift, bounded by fm, is related to the phase change
52
caused by the change in path length. Because each component of the
received multipath signal arrives from a different direction, each
contributes a different value to the Doppler spreading. This effectively
increases the bandwidth of the received signal. Depending on the
direction of motion and the source, the frequency can be shifted up or
down (i.e., fm). The result of this shift is a random phase and
frequency modulation of the received
53
RF carrier, which may necessitate the use of differential phase
and frequency detection techniques.
The propagation mechanisms just described strongly influence system
design parameters such as the choice of transmitting and receiving
antennas, Tx powers, modulation techniques, and much more. Each of
these propagation mechanisms contributes to losses in the RF energy
and hence limits system performance. In wireless mobile
communications, propagation losses are commonly classified into path
loss, shadowing, and multipath fading. These losses are described next.
Path Loss
Path loss (PL) refers to the large-scale envelope fluctuation in the radio
propagation environment, which varies with the distance between the Tx
and Rx. Because the Rx is located at some distance d from the Tx, a loss
factor is used to relate the transmitted power to the received power. For
amplitude fading, an increase in d normally results in an increase in PL.
Different models have been used to model path loss, but each model
obeys the distance propagation law.
In free space, PL is expressed as the ratio of the radiated power Pt, to
the received power Pr and is given by
P G G 2
t
PL(dB) 10 t (4
10 log log )
r
10 10 (4 )2 d 2 Pr
Shadowing
54
Because of topographical variations along the transmission path, the
signal is diffracted and the average power of the received signal is not
constant. Shadowing or large-scale fading refers to slow variations in
the local mean of the received signal strength. This variation causes
55
shadowing. The signal is shadowed by obstructions such as buildings
and natural terrain, which leads to gradual variations in the mean power
of the received signal. The effect is a very slow change in the local
mean signal, say Ps. Shadowing is generally modeled by a lognormal
distribution, meaning that sd = 10 log10Ps is normally distributed, with
sd given in dB (Yacoub, 1993). Shadowing is the dominant factor
determining signal fading.
Multipath Fading
56
The loss factor associated with multipath fading is usually modeled in
the channel impulse response. A transmitted impulse will arrive at the
Rx as the sum of several impulses with different magnitudes, delays, and
phases. For M multipath, the composite impulse response h(t,) for any
given locations of the Tx and Rx is given by
h(t, ) M k (t) j (t)
t k (t)e k , (5)
k
1
where k,(t), k(t), and k(t) represent the time-varying amplitude, delay, and
phase of the kth
path signal, is the Dirac delta function. This shows that, in general, the
and received signal
58
(Eng, 1996). Hence, achieving reliable communication over a wireless
channel is a daunting task.
To counter this problem, techniques have been developed for efficient
wireless communication. These include spread spectrum, multiple
access, diversity, equalization, coding, and related techniques such as
multicarrier modulation, orthogonal frequency division multiplexing,
multicode and multirate techniques, and multiple input multiple output
system, to mention only a few. All these techniques are aimed at
increasing the reliability of the channel and the performance of the
system. Discussion of some of these techniques is beyond the scope of
this chapter. However, a summary of the major wireless communication
techniques follows.
Spread Spectrum
C B 1SNR , (6)
log
2
60
where Tb and Tc are the bit period and the chip period, respectively. Gp
is sometimes known as the “spreading factor” (Rappaport, 2002). From
a system viewpoint, Gp is the performance increase achieved by
spreading. It determines the number of users that can be allowed in a
system, and hence the amount of multipath reduction effect. It is used
to describe the signal fidelity gained at the cost of bandwidth. It is
through Gp that increased system performance is achieved without
requiring a higher SNR. For SS systems, it is advantageous to have Gp
as high as possible, because the greater the Gp, the greater the system's
ability to suppress interference. SS techniques are used in cellular
mobile telephones, global positioning satellites (GPS), and very small
aperture satellite terminals. The strength of this system is that when Gp
is large, the system offers great immunity to interference.
There are two major methods of SS modulation: direct sequence
spread spectrum and frequency hopping spread spectrum. In DSSS, the
frequency of the given signal is spread across a band of frequencies, as
described earlier. The spreading algorithm changes in a random fashion
that appears to make the spread signal a random noise source. FHSS is
the repeated switching of fc from one band to another during
transmission. Radio signals hop from one fc to another at a specific
hopping rate and the sequence appears to be random. In this case, the
instantaneous frequency output of the Tx jumps from one value to
another based on the pseudo-random input from the code generator. The
overall bandwidth required for FHSS is much wider than that required
to transmit the same information using only one carrier. However, each
fc and its associated sidebands must stay within a defined bandwidth.
Diversity
61
Diversity is one of the techniques widely used to increase system
performance in wireless communication systems. Diversity combining
refers to the system in which two or more closely similar copies of some
desired signal are available and experience independent fading. In
diversity systems, the received signals from several transmission paths,
all carrying the same information with individual statistics, are
combined with the hope of improving the SNR of the decision variables
used in the detection process. Diversity-combining techniques could be
based on space (antenna), frequency, angle of arrival, polarization, and
time of reception (Eng, 1996; Yacoub, 1993). For example, in space
diversity, the transmitted signal is received via N different antennas with
each multipath received through a particular antenna. This can be
regarded as communication over N parallel fading channels. Diversity
reception is known to improve the reliability of the systems without
increasing either the transmitter power or the channel bandwidth.
Regardless of the type of diversity used, the signals must be combined
and detected at the receiver. A proper combination of the signal from
various branches results in improved performance. The method of
diversity combining chosen will affect the receiver performance and
complexity. The common combining techniques in wireless
communication are maximal ratio combining (MRC), equal gain
combining (EGC), and selection diversity (SD). In MRC, the received
signals from individual paths are weighted and added so as to emphasize
more credible signals and suppress less credible ones (Yacoub, 1993).
In EGC, the received signals are equally weighted and then combined
without regard to the individual signal strength. In SD, the branch with
the best or most desirable signal is selected and the weaker ones are
ignored.
Multiple Access
62
Because the RF spectrum is finite and a limited resource, it is necessary
to share the available resources between users. Multiple access
techniques are the primary means of sharing the resources in wireless
systems. These techniques are multiplexing protocols that allow more
than a pair of transceivers to share a common medium, which can be
achieved through frequency, time, or code, giving rise to three popular
techniques known as frequency division multiple access (FDMA), time
division multiple access (TDMA), and code division multiple access
(CDMA). In FDMA, the whole spectrum is divided into subbands, and
the subbands are assigned to individual users on demand. The users use
the entire channel for the duration of their transmissions. If the
transmission path deteriorates, the user is switched to another channel.
This access technique is widely used in wireless multiuser systems.
Instead of dividing the available frequency as in FDMA, the available
time is divided into frames of equal duration in the case of TDMA. Only
one user is allowed to either transmit or receive in each time frame. The
transmissions from various users are interlaced into cyclic time
structure. Instead of using frequencies or time slots, CDMA techniques
distinguish between multiple users using digital codes. Each user is
assigned a unique PN code sequence, which is uncorrelated with the
data.
Because the signals are distinguished by codes, many users can
share the same bandwidth simultaneously (i.e., signals are
transmitted in the same frequency at the same time).
CELLULAR COMMUNICATIONS
64
with the cellular telephone structures. Each cell has a base station (BS)
or cell site, which in comparison uses much less power. The BS can
communicate with mobiles as long as they are within range. To
prevent interference, adjacent cells are assigned different portions of
the available frequencies. With a certain distance between two cells,
the assigned spectrum of a given cell can be reused. To explain the
concept of cellular mobile communication, a summary of the major
concepts and techniques is now presented.
Cells and Clusters
66
Frequency reuse is a technique of allocating channels to cellular
systems. Because of the unavailability of spectrum at the cellular band,
channel frequencies must be reused. Cells are assigned groups of
channels that are completely different from those of neighboring cells.
Cells with the same number have the same set of frequencies. If the
number of available frequencies is 7, the frequency reuse factor is 1/7,
which implies that each cell is using one seventh of available
frequencies (Rappaport, 2002). Frequency reuse introduces interference
into the system.
Interference
67
Large Cell 5
3 2
5 5
Radio tower
7
3 2 3 2 4
1 Pico Cells
7 D 7
4 R 1 4 1 6
6 6 Small Cell
3
1
2
Original frequency Cel e er transceiver
Coverage reuse lul a 3. Good transmission
6. Demand in 2. M quality
ar
excess of Cl u 4. Acceptable delays
69
Cell sectors of 60° and 120° are illustrated in Figure 7. When cells are
sectored, R is unchanged, D is reduced, the amount of frequency reuse
is increased, and hence capacity is increased. It is observed that the
spectral efficiency of the system is enhanced because the frequency can
be reused more often.
Handoff
72
two-key cryptography, in which each user is provided with the key
consisting of a public portion generating the public transformation, and a
private portion (secret), generating the private transformation (Computer
Security Resource Center [CSRC], 2001). Finally, because of the limited
bandwidth and processing power of wireless systems (e.g., mobile
device), robust encryption schemes may be difficult to attend.
Security Protocol. Protocol is a set of rules that govern the
communication between the transmitter and the receiver. In wireless
systems, wired equivalent privacy (WEP) and the wireless transport
layer security (WTLS) are the two main security protocols. WEP is the
standard for encryption in the IEEE 802.11 wireless LAN standard. One
weakness of WEP is that a single key is shared between all the users
(mobile stations) and access points (APs). This is not very reliable and
also cumbersome to manage as security problems have been reported
with the WEP (CSRC 2002a, 2002b; Mathews, 2002). However, the Wi-
Fi protected access (WPA) provided better security features compared
with the WEP. Yet no matter how messy the birthing process, WPA
seems to be a improvement over the present state of WLAN security by
providing improved encryption and simple but robust user authentication
that can be used in home wireless networks.
The WTLS is the security layer in the WAP that adds security to
mobile devices with little computing power by making the encryption
process efficient. At the WAP gateway, the wireless data must be
unencrypted from WTLS and reencrypted into a wired encryption
protocol like the secure socket layer (SSL).
Access Control. Illegal intrusions into a network are controlled by
access-control methods or devices such as firewalls, RADIUS (remote
authentication dial-in user service), and authentication servers. A
firewall provides preliminary filtering of unauthorized traffic to
73
specific resources or network segments, and a typical firewall
classifies traffic on the basis of predefined addresses (IP addresses).
Authentication and authorization mechanisms restrict access to the
network and its resources, enabling usage only when provided with a
legal identification and password. With authentication the genuineness
of the user, or lack of it, is determined. Unfortunately, this is not very
reliable, because user identifications and passwords can be obtained or
guessed, and therefore a user connecting to a network or service may not
necessarily be the authorized user.
A secure wireless system must be capable of protecting the
confidentiality, integrity, and nonrepudiation of the message
(Bhargarva & Agrawal, 2001; Venkataraman & Agrawal, 2000).
Threats on security can be viewed as potential violations of security.
Hence, a wireless communication systems requires secure medium
access control (MAC) protocols. MAC protocols must be able to have
various mechanisms to handle the diverse traffic demands of different
services in as securely as possible. Figure 8 summarizes the various
categories of attacks that could be brought on wireless.
Wireless Security
75
control systems have different levels of security demands and
expectations. For most systems, the cost for security increases
exponentially with increased level of security needed. Hence, there is a
tradeoff between the level of increasing system security and the
potential cost incurred. The wireless security services are summarized in
Figure 8. To provide efficient security, the system must address the five
cardinal security service depicted in Figure 8. Some of the mechanisms
used for preventing or mitigating the effect of attacks in wireless
systems are summarized in Table 3.
Security Remark
mechanism
Security Enforces security during the operation of a system by
prevention preventing security
77
(f) loss of physical and infrastructure support, (g) industrial espionage,
(h) errors and omissions, and (i) foreign government espionage. All of
these represent potential threats in wireless systems as well. These
threats, if successful, place information at risk. Security services (e.g.,
confidentiality, integrity, and availability) of wireless systems are the
prime objectives of all security methods and practices.
Risks in wireless networks include the risk of wired network in
addition to the new risks introduced by the wireless nature of the
system. Threats can be accidental or intentional.
Accidental threats result due to operational mistakes of system and
hardware or software failure. Intentional threats (attacks) are actions
performed by an entity with an intention to violate security. Specific
threats and vulnerabilities to wireless systems in general are
summarized in Table 4.
Threats
Wired system These include all the vulnerabilities that exist in a
risks conventional wired
network.
Unauthorized This includes unauthorized access to a network through
wireless
access
connections, bypassing any firewall protections.
Fraud and theft 1. Due to the portability of wireless devices, theft is
78
more likely to be committed by authorized and
unauthorized users of the system. Hence, the
information contained in the device can be
compromised.
2. Stolen wireless devices can reveal sensitive or private
information.
79
Malicious 1. Malicious hackers or crackers can break into a
hackers system without authorization, usually for personal
gain or to do harm. Such hackers may gain access to
the wireless network access point by eavesdropping.
2. Sensitive information may be intercepted and
disclosed and perhaps maliciously used.
3. Malicious entities may steal the identity of
legitimate users and masquerade on the
networks.
4. Malicious entities may be able to violate the privacy
of legitimate users and be able to track their actual
movements.
5. Data may be extracted without detection from
improperly configured
devices.
Malicious code 1. Denial of service attacks may be directed at
wireless connections or devices.
2. Malicious code such as viruses, worms, Trojan
horses, logic bombs, or other unwanted software,
designed to damage files or bring down a system,
can easily be introduced into a wireless system.
3. Sensitive data may be corrupted during improper
synchronization.
80
thereby disable or disrupt operations.
Industrial and 1. Industrial and foreign espionage involve gathering
proprietary data
81
foreign from corporations or intelligence information from
espionage governments through eavesdropping. In wireless
networks, the espionage threat stems from the
relative ease in which eavesdropping can occur on
radio transmissions.
2. Spying for military applications also fall under this
category.
Security attacks can be broadly divided into two groups: active and
passive attacks. These two broad classes are then subdivided into other
types of attacks as illustrated in Figure 9. An attack is said to be passive
when an unauthorized user simply gains access to a network without
modifying its content such as in eavesdropping and traffic flow analysis.
In eavesdropping, the attacker simply monitors transmissions for
message content. An example of this attack is a person listening in on
transmissions on a local area network between two workstations, or
tuning into transmissions between a wireless handset and a base station.
In traffic analysis, the attacker, in a more subtle way, gains
intelligence by monitoring the transmissions patterns for messages
between communicating units, which can yield significant amount of
information through the flow of information.
An attack is said to be active when an unauthorized user makes
modifications to a message, data stream, or file. It is possible to detect
this type of attack, but it may not be preventable.
Active attacks may be in the form of one or more of the following:
masquerading, replay, message modification, and denial-of-service
(DoS). In masquerading, the attacker impersonates an authorized user
and thereby gains certain unauthorized privileges. In replay, the
attacker monitors transmissions (passive attack) and, using the obtained
information, retransmits messages as the legitimate user. Message
82
modification involves an attacker who alters a
83
legitimate message by deleting, adding to, changing, or reordering the
message. In DoS, the attacker prevents or prohibits the normal use or
management of communications facilities. DoS involves hijacking of
the resources, thereby preventing authorized user from utilizing
network resources.
In general, it is harder to detect passive attacks because they do not disturb
the system.
Security Attacks
Message Denial-of-
Masquerade Replay Eavesdropping Traffic Analysis
Modification Service
SECURITY OF WLAN
85
mobile cellular (2G) network, cellular digital packet data (CDPD),
global system for mobile communications (GSM), and Mobitex. WLAN
includes systems such as IEEE 802.11a (54 Mbps @ 5 GHz), IEEE
802.11b (11 Mbps @ 2.4 GHz), IEEE 802.11g (54 Mbps @ 2.4 GHz),
and
HiperLAN (54 Mbps @ 5 GHz, used in Europe). WPAN are network
technologies such as Bluetooth and HomeRF. Although their coverage
areas are different, their communication techniques are similar because
they transmit and receive information using radio waves. Because
wireless network and technology are so diverse, I limit our discussion
on the security issues related to the IEEE 802.11 WLAN technology as
an example.
Security Methods in Wireless LAN
87
vulnerable. The security services are provided largely by the WEP
security protocol. WEP has two main design goals: to protect against
eavesdropping and to prevent unauthorized access. WEP uses RC4
encryption on a 40- or 128-bit shared key. Encrypts of payload is
undertaken while frame is “in the air.”
IEEE 802.11 defines mechanism for encrypting frames using WEP as
follows:
+ IV, it generates RC4 key schedule. WEP selects new IV for every packet.
AP AP
Hub
Laptop
Admi Print comput
nist er er
rato (Mobil
r Wired e unit)
unit LAN
Cryptography
(Uses RC4)
Non- cryptography
(RC4 not used)
90
Figure 11: Authentication processes in 802.11 WLAN standards. AP
= access point; SSID = service set identifier; WEP = wired equivalent
privacy.
92
attention is now being focused on the security of 802.11, more
vulnerability is likely to be discovered. To present a concise
discussion on the issue of security for WLAN, some of the problems
associated with WEP security techniques in the IEEE 802.11
WLAN standard are summarized in Table 4.
Security Remar
Issues ks
and
Vulnerabili
ty
Cryptograph 1. Cryptographic keys are short. Standard 40-bit keys
y are inadequate and vulnerable to attacks. The longer
the key, the less likely the key can be recomputed
from a brute-force attack. It has been shown that 80-
bit or more key size is more secure.
2. Keys are shared. If keys are shared,
confidentiality could be compromised.
3. Keys not updated automatically and frequently.
Cryptographic keys
94
3. Authentication not automatically enabled. Identity-
based systems are highly vulnerable particularly in a
wireless system because only simple service set
identifier; identification occurs.
4. Authentications by MAC address lookup.
Wired 1. RC4 used in WEP has a weak key schedule. The IV in
equivalent WEP uses a 24- bit key sent in the clear text portion.
privacy It has been shown that using this key combined with
(WEP) a weakness in the initial few bytes of the RC4
keystream, it is possible to attack the system
successfully.
Packet 1. Packet integrity is poor. Cyclic redundancy check
integrity (CRC)-32 and other linear block codes are
inadequate for cryptographic integrity. Message
modification is possible.
2. Cryptographic protection is required to prevent
deliberate attacks.
3. Use of noncryptographic protocols often facilitates
attacks against the network.
Securit 1. Security features in hardware, although poor in some
y cases, are often not enabled when shipped, and users
hardw do not enable them when installed. Hence, many
are systems operate without security.
2. Bad security is generally better than no security.
96
subscribers, the continued popularity of the Internet, and the increasing
use of portable computing devices suggests that high-speed, high-
capacity, and high-quality wireless communication systems will become
a major focus in the telecommunication industry. In today’s technology
era, emerging personal communication systems are expected to provide
a wide range of services that require high data rates—not only for voice,
but also in data, images, video, and multimedia information transmission
over wireless channels. With the continued growth of the Internet and
World Wide Web, mobile users are continually looking for high-
performance wireless Internet technology to enhance their
communication capabilities. The third-generation (3G) systems were
intended to provide high data rates (between 384 kbps for low mobility
users to 2 Mbps for stationary users; The Shoesteck Group, 2001),
significantly expands the range of options available to users and allows
multimedia communication via wireless terminals.
Unfortunately, these objectives have not been fully realized.
97
most promising approaches to 3G is to combine a
98
wideband code division multiple access air interface with the fixed
network of a global system for mobile communications (GSM). It is
expected that these new technologies will increase the performance of
the existing wireless systems. These technologies will provide
multimedia capability at much higher rates with Internet connectivity.
Although 3G technologies have been deployed, they have not
experienced market success compared with the 2G systems. The 3G
standard was created by the International Telecommunication Union
(ITU) and is more widely known as International Mobile
Telecommunications – 2000 (IMT-2000). The aim of IMT-2000 is to
harmonize worldwide 3G systems to provide global roaming.
Harmonizing so many standards proved extremely difficult.
Furthermore, the definition of what is and what is not “3G” is murky.
Figure 12 shows the various terrestrial radio interfaces referred to as 3G
standards and is based on the IMT-2000 standardization. Of many
variants, only three dominant standards (wideband code division
multiple access [W-CDMA], CDMA2000, and TD- SCDMA) allow full
network coverage over macro cells, micro cells, and pico cells and can
thus be considered as full 3G solutions. As shown in Figure 12, other
non-CDMA technologies such as UWC-136 and DECT+ are also
considered 3G technologies. In W-CDMA technology, data is
transferred over wireless networks in digital format over a range of
frequencies, which makes the data move faster but also uses more
bandwidth than digital voice services. The competing 3G CDMA
technologies differs technically but provide comparable services.
Although there are five terrestrial standards, most of the attention in the
industry has been focused on the CDMA standards. As technology
improves, the functionality of handheld devices is becoming more
feature-rich and portable. For example, mobile phones have increased
functionality that now allows them to serve as PDAs and digital cameras
in addition to phones. Smart phones can now provide voice services, e-
99
mail, text messaging, paging, Web access, voice recognition, and
10
0
digital camera capability. Next-generation mobile phones, already on
the market, are quickly incorporating PDA, infrared (IR), wireless
Internet, e-mail, and global positioning system capabilities. More
significantly, manufacturers are combining standards as well, with the
goal to provide a device capable of delivering multiple services. Table 5
summarizes the services and applications of the various generations of
wireless services.
W-CDMA
(UMTS)
CDMA2000 1X
CDMA2000 1xEV
UTRA TDD &
TD-SCDMA
UWC- DECT+
136 &
3G CDMA Technology
EDG
E
10
1
operate in the range from 3.1 to
10.6 GHz, at a limited transmit power of –41 dBm/MHz. Consequently,
UWB provides dramatic channel capacity at short range that limits
interference. UWB communication systems offer several potential
advantages. Because of the potentially large processing gain, many of
the characteristics and advantages of spread spectrum communication
carry over to UWB systems. For instance, a UWB system is capable of
supporting multiple users; is robust against jamming,
10
2
interference, and multipath fading; and is suitable for applications
requiring low probabilities of interception and low probability of
detection by unintended user. It follows that their wide bandwidth
makes them more robust to multipath interference with multiuser access
capability. UWB provides the highest bandwidths with the lowest
vulnerability to multipath interference. It also offers potentially high bit
rate transmission with capacity increasing almost linearly with power.
The fine time resolution makes it a good candidate in applications such
as ranging, remote sensing, search and rescue missions, and
measurement applications under extremely harsh weather conditions.
Unfortunately, before UWB systems can become fully implemented
and commercially viable, many challenging problems need to be
resolved. Some of these include wideband antenna design, timing
acquisition and synchronization, channel modeling, and interference
from or to other systems. For example, the performance of UWB
systems under realistic channel model is being investigated. In addition,
with low transmission power and a highly spread bandwidth, acquisition
of a UWB signal is difficult (Fleming, Kushner, Roberts, & Nandiwada,
2002). For instance, if packets are transmitted, a long preamble is
needed to ensure acquisition of each packet at the receiver, reducing
throughput and increasing overhead. This problem is amplified when
multiple hops are traversed in a network from the source to the
destination. Also, because UWB systems are overlaid on existing
wireless systems, issues of interference become critical (Fontana, 2002;
Siwiak, 2001). Interference suppression algorithms are needed to
minimize interference from or to other users. Other research interests
include the implementation of UWB systems in a dense network
environment.
Another wireless communication application is local multipoint
distribution services (LMDS), a fixed wireless technology that operates
in the Ka band and offers LOS coverage over distances
10
3
up to 3–5 kilometers (Wireless Communications Association
International, n.d.). It can be used to provide digital two-way voice,
data, Internet, and video services to numerous customers from a single
node. LMDS is a broadband wireless point-to-multipoint
communication system operating in the Ka-band and above. LMDS is
one solution for bringing high-bandwidth services to homes and offices
within the “last mile” of connectivity, an area where cable or optical
fiber may not be convenient or economical. The technology is similar to
the cellular systems in that network architecture of microwave radios
placed at the client’s location and at the company’s base station to
deliver fixed services—mainly telephony, video, and Internet access.
With LDMS, customers can receive data rates between 64 kbps and 155
Mbps. Advantages of LMDS include low deployment costs, fast
deployment capability, scalable system architecture, and variable
component cost because no large capital investment is required. The
system requires LOS between the base station hub and the customer
premises, however, and LDMS signals are affected by weather
conditions.
2G 2.5G 3 3.5G 4G
G
(Evolve (Evolve
d 2G) d 3G)
9.6– 64–144 384 384 100
14.4 kbps kbps– kbps– Mbps
10
4
kbps
2 20
Mbps Mbps
1. Circ 1.Packet 1. Seamless 1. Interactive multimedia
uit services services broadband services—voice,
swit 2.Interact over video, wireless Internet
ched ive multiple 2. High speed, high capacity
2. Voice 3.Web accesses and low cost per bit
3. Simple
browsing 2. Improvements
messa , 4.E- of existing air- 3. Global mobility, service
ge/SM mail and interfaces portability, scalable
(including new
spectrum)
10
5
S attachmen 3. Multimedia mobile networks
ts
4. Event 4. High 4. Seamless switching,
File
5. interactivity, variety of services based
notifica transfer real-time road on quality-of-service
tion s, maps requirements
transact 5. Medical imaging 5. Better scheduling and
5. Fax ions/e- call admission control
commer 6. Audio streaming techniques.
ce 6. Ad hoc networks and
6. Instant 7. Video streaming multihop networks and
messaging high capacity optical
8. Video telephony networking
7. Advanced antenna systems
and multihop systems
Multicarrier—CDMA or
8.
OFDM
Fair QoS End-to-end QoS End-to-end QoS
TDM GPRS 3GPP New air interface and
A (EDGE,UMTS) protocols
MC1X
GSM W-CDMA
PCD CDMA2000
CDM TD-CDMA/
Aone TD-SCDMA
DECT and
10
6
UWC-136
10
7
known vulnerabilities of WEP and allow operation on existing wireless-
fidelity (Wi-Fi)-certified hardware. This will address the problems
without requiring hardware changes (only changes to firmware and
software drivers required).
CONCLUDING REMARKS
10
9
emphasizing cellular mobile radio, currently the most prevalent wireless
communication system. Finally, emerging wireless technologies were
briefly introduced.
Although wireless systems are commonplace in our society, the future
of the industry is filled with both promise and challenge. Future
wireless technologies under consideration include the full realization of
3G technologies and the development of 4G technologies. 4G wireless
technology based on ultra-wideband communications could enable the
use of low-power, high- bandwidth (100–500 Mbps) networks,
supporting devices with sense and radar capabilities.
Multimedia messaging will allow pictures and sound to be transmitted
along with text message over the mobile phone in a seamless manner.
Mobile handsets will support full-color display screens, some with
embedded Java capabilities, others with built-in digital cameras. It is
expected that Bluetooth technology will move from theory and hype to
practicality, and issues regarding the security of mobile commerce and
information security in general will dissipate.
GLOSSARY
1G, 2G, 3G, 4G First-, second, third-, and fourth-generation wireless systems.
11
1
Antenna A device used for receiving or transmitting signals.
Ciphertext Data output from the cipher or input to the inverse cipher.
11
2
DoS Denial-of-service. An attack that floods a network with an
overwhelming amount of traffic, slowing its response time for
legitimate traffic or grinding it to a halt completely.
11
3
Decryption Decryption is the process of converting encrypted data back
into its original form so that it can be understood
Decipher Inverse transformations that converts ciphertext to plaintext using the
Cipher Key.
11
4
Ground Station The ground equipment needed to receive
or transmit satellite telecommunications signals, including
a dish and other electronics components.
GSM Global system for mobile communications; the mobile phone
platform used in Europe and many parts of the world.
Handoff Transfer of wireless call in progress from one site to another
without disconnection. HomeRF Home radio frequency (HomeRF) is
a home networking standard that combines the 802.11b and digital
enhanced cordless telecommunication portable phone standards into a
single system. HomeRF uses a frequency-hopping technique to
deliver speeds of up to 1.6 Mbps over distances of up to 150 feet.
HiperLAN HiperLAN is a set of WLAN communication standards
primarily used in Europe, adopted by the European
Telecommunications Standards Institute (ETSI).
Institute of Electrical and Electronics Engineers (IEEE) A
worldwide professional association for electrical and electronics
engineers that sets standards for telecommunications and computing
applications.
IEEE 802.11 The IEEE’s proposed standard for wireless LANs that
places specifications on the parameters of both the physical and
medium access control layers of the network.
Infrared (IR) An invisible band of radiation at the lower end
of the electromagnetic spectrum.
Isotropic Refers to a theoretical reference antenna that radiates equally well
in all directions.
11
5
Malicious Code A term used to refer to various types of software
that can cause problems or damage to the network. The more
common types of malicious code are viruses, worms, Trojan horses,
macro viruses, and backdoors
Modulation Process of varying a characteristic of a carrier with an
information-bearing signal.
Pulse Code Modulation (PCM) A basic form of digital
modulation in which an analog signal is sampled, the sample is
quantized independently of other samples, and is then converted
to a digital signal.
Personal Communications Services (PCS) Any of several types
of wireless voice or data communications systems, typically
incorporating digital technology.
Personal Digital Assistant (PDA) A handheld computer that
serves as an organizer for personal information.
Propagation Radiation of electromagnetic waves.
11
6
Rivest Cipher 4 (RC4) A common encryption algorithm used by
the WEP protocol and TKIP.
Receiver A device on a transmission line that converts a signal to
whatever type of signal is needed to complete the transmission.
Radio Frequency (RF) A radio signal.
11
7
Transmitter The source or generator of any signal on a transmission
medium.
11
8
Uplink Data transmission in the direction from the subscriber to
the network (back to the provider or Internet provider).
Wireless Application Protocol (WAP) A technology designed to
provide users of mobile terminals with limited access to the Internet.
A standard for providing cellular telephones, pagers, and other
handheld devices with secure access to e-mail and text-based Web
pages. Wavelength Distance between points of corresponding phase
in two consecutive cycles of a wave.
Wired Equivalent Privacy (WEP) A security protocol, specified
in the IEEE 802.11 standard, that attempts to provide a WLAN
with a minimal level of security and privacy comparable to a
typical wired LAN.
Wideband Code Division Multiple Access (W-CDMA). A 3G
mobile standard under the IMT-2000 banner, first deployed in
Japan.
Wireless Fidelity (Wi-Fi) The industry name for WLAN
communication technology related to the IEEE 802.11 family of
wireless networking standards.
Wireless Local Area Network (WLAN) Wireless network
communication over short distances using radio signals instead
of traditional network cabling.
Wireless Transport Layer Security (WTLS)_The security level for
WAP applications that was developed to address the problematic
issues surrounding mobile network devices—such as limited
processing power and memory capacity and low bandwidth—and to
provide adequate authentication, data integrity, and privacy
protection mechanisms.
Wireless Local Loop (WLL) A wireless system meant to bypass a
local landline telephone system.
11
9
Cross References
REFERENCES
Bing, B. (2000). High-speed wireless ATM and LANs. Boston: Artech House.
Cardwell, A., & Woollard, S. (2001). Clinic: What are the biggest
12
0
security risks associated with wireless technology? What do I need
to consider if my organization wants to introduce this kind of
technology to my corporate LAN? Retrieved from
http://www.itsecurity.com.
12
1
Cellular communications services in the USA by Euromonitor International
June 1, 2003.
Cox, J. (2003, November 10). WLAN protocol hits standards trail, LWAPP is
on its way.
12
3
Eng, T., Kong, N., & Milstein, L. (1996). Comparison of diversity
combining techniques for Rayleigh fading channels. IEEE
Transactions on Communication, 44, 1117–1129.
Fleming, R., Kushner, C., Roberts, G., & Nandiwada, U. (2002, May).
Rapid acquisition for ultra-wideband localizers. Proceedings of the
IEEE Conference on Ultra-Wideband System and Technologies (pp.
245–250), Baltimore Maryland.
12
5
Geier, J. (1999). Wireless LANs: Implementing interpretable
networks. Indianapolis, IN: Macmillan Technical.
Haykin, S. (2001). Communications systems (4th ed.). New York, New York,
John Wiley.
IEEE Working Group for WLAN Standards. (n.d.). IEEE 802.11TM wireless
local area networks.
12
7
Mathews, S. (2002a, March). Explaining encryption. Retrieved
December 19, 2003, from ITsecurity.com:
http://www.itsecurity.com/chapters/articsoft3.htm
12
9
Stallings, W. (2002). Wireless communications and networks. Upper
Saddle River, NJ: Prentice Hall.
Xu, H., Rappaport, T., Boyle, B., & Schaffner, J. (2000). Measurements
and models for 38-GHz point-to-multipoint radiowave propagation.
IEEE Journal on Selected Areas in Communications, 18, 310–321.