文件名称:professional_wireless_mesh_networking.pdf
文件大小:10.72MB
文件格式:PDF
更新时间:2022-09-03 05:06:33
professional wireless mesh networking
Contents Preface......................................... xiii Glossary........................................ xvii 1 Introduction ..................................... 1 1.1TheEmergingInformationandCommunication TechnologyLandscape ............................ 1 1.1.1AutonomicCommunications .................... 3 1.1.2Bio-InspiredCommunicationSystems .............. 3 1.1.3PervasiveComputingandCommunications .......... 3 1.1.4ArtificialIntelligenceandNaturalCognition .......... 4 1.1.5VirtualReality ............................. 4 1.1.6AmbientEnvironments ....................... 5 1.1.7NanoscaleMaterials ......................... 5 1.1.8TheDisappearingComputer .................... 6 1.2MeshingLargeScaleWirelessNetworkElements:TheVision ofWirelessMobileMeshNetworking(WM2Net) ........... 7 1.2.1WM2NetApplicationAreas ..................... 9 1.3TechnicalChallengesandBookStructure ................ 13 2 WirelessMeshCommunicationArchitecturesandProtocols ...... 17 2.1Introduction ................................... 17 2.2WM2NetConfigurations ........................... 18 2.3HierarchicalversusFlatWM2NetArchitecture ............. 20 2.4RoutinginMobileWirelessNetworks .................. 23 2.5RoutingProtocolCategories......................... 27 2.5.1Topology-BasedRoutingProtocols ................. 27 2.5.2Proactive(Table-Driven)Routing.................. 27 2.5.3Reactive(On-Demand)Routing .................. 28 2.5.4HybridRouting(Haas,1997;RamanathanandSteenstrup, 1998;Krishnaetal.,1997;LinandGerla,1997;Gerla andTsai,1995) ............................. 29 2.5.5PositionorLocation-AidedRoutingProtocols(Iwataetal., 1999;Mauveetal.,2001;Jainetal.,2001;KarpandKung, 2000;LinandWang,1999;StojmenovicandLin,2001) .... 33 2.5.6MulticastinginMobileWirelessNetworks ............ 59 2.5.7MulticastinginWM2Nets ...................... 62 2.5.8NetworkCoding ............................ 66 2.6HazardousOperationinWM2Nets .................... 84 2.6.1APracticalApproachtoAddressingHazards inWM2SAnets ............................. 85 vii For more information about this title, click here viii Contents 2.7WM2NetTestbedsandPrototypes ..................... 92 2.7.1Measurement-BasedCharacterizationofaWireless MeshNetwork ............................. 93 2.7.2MeshDVNet:AFullyFunctionalIPv6WirelessMesh NetworkTestbed ............................ 100 2.7.3OntoSensor:AnOntologyforWM2SnetApplication Development,Deployment,andManagement ......... 109 3 Energy-AwareWM2NetCommunications .................. 119 3.1Introduction ................................... 119 3.2RelatedBackgroundonPowerConsumption .............. 120 3.3IssuesofPower-AwareCommunications ................ 121 3.4Power-AwareNetworkCategories .................... 125 3.4.1Battery-AwareRouting(BAR)forStreamingData TransmissionsinWirelessMeshNetworks ............ 128 3.4.2Power-AwareAlgorithmforHeterogeneousWireless MeshNetwork ............................. 143 3.4.3Cross-LayerEnergyOptimizationinMultihopWireless MeshNetworks ............................. 151 3.4.4TheNetworkSizeImpactontheNetworkLifetimein WirelessMeshNetwork ....................... 158 3.4.5Energy-EfficientPacketRelayinginSparseMobile MeshNetworks ............................. 171 3.4.6Energy-EfficientGeographicUnicastandMulticastRouting inMeshNetworks ........................... 181 3.4.7QoS-ConstrainedOptimalEnergy-ManagementMinimizing Download-TimesoverMultichannelWirelessLinks ...... 184 3.4.8BiologicallyInspiredAdaptivePowerManagement forWM2Snets .............................. 190 4 PrinciplesofCommunicationsCoverageinWM2Nets .......... 203 4.1GeneralPrinciples ............................... 203 4.2ComparativeEfficiencyofAccessMeshandCellular ......... 205 4.3ConnectivityPrinciplesinWM2Nets ................... 208 4.3.1RobustConnectivityEnergy-AwareRoutingforWireless MeshNetworks ............................. 211 4.3.2RelayPlacementforTopologyDesignofWirelessMesh Networks................................. 217 4.4EnsuringConnectivityinWirelessMobileNetworks ......... 221 4.5NetworkPartitioningversusNetworkDisconnection......... 223 4.5.1ForecastingNetworkDisconnectionsinMobileWireless MeshNetworks(Aggélou,2005) .................. 225 5 MediumAccessControlPrinciplesinWM2Nets .............. 253 5.1Introduction ................................... 253 5.2ApproachestoMitigatetheHiddenandExposed TerminalProblem ............................... 255 ix Contents 5.2.1TacklingtheProblemattheMACLayer ............. 255 5.2.2RTS/CTSCollisionsandLossofStateInformation....... 256 5.2.3TacklingtheProblematthePHY .................. 258 5.2.4TacklingtheProblemwithSmartAntennas ........... 258 5.3OverviewoftheIEEE802.11ProtocolSpecifications ......... 261 5.3.1IEEE802.11Architecture ....................... 261 5.3.2KeyIEEE802.11MACLayerFeatures ............... 266 5.3.3IEEE802.11asAdHocNetwork .................. 274 5.4TheWorldwideInteroperabilityforMicrowaveAccess(WiMAX) . 274 5.4.1WiMAXStandards ........................... 274 5.4.2TheAirInterfaceSpecificationsforFixedAccess ........ 276 5.4.3TheMobileAirInterfaceSpecifications .............. 279 5.4.4TheSecuritySublayer ........................ 283 5.5EnhancingEfficiencyandEffectivenessof802.11MACinWireless MeshNetworks ................................ 284 5.5.1IncreasingParallelismbyPowerControlandEnhanced CarrierSensing ............................. 284 5.5.2StaticBasicCarrierSensingBasedonInterferenceModel .. 285 5.5.3DynamicSchemeswithVirtualCarrierSensing......... 287 5.5.4ExploitChanneland/orSpatialDiversitywithMAC-Layer Scheduling ................................ 291 5.6OntheEffectofOptimalPowerControlinWM2Nets ......... 294 5.6.1Introduction ............................... 294 5.6.2SystemModel .............................. 295 5.6.3MathematicalAnalysis ........................ 297 5.7DynamicSleepSchedulinginRechargeableWM2Nets ........ 300 5.7.1RechargeableMeshSystems ..................... 300 5.7.2PerformanceCriteria ......................... 302 5.7.3Threshold-BasedSleepScheduling................. 303 5.7.4PerformanceEvaluationforIdenticalCoverage......... 303 5.7.5DistributedAlgorithm ........................ 305 5.7.6PerformanceEvaluationforGeneralNetwork ......... 305 5.8OnImprovingThroughputandFairnessinWirelessMesh Networks:AListen-and-LearnApproach ................ 307 5.8.1Introduction ............................... 307 5.9MathematicalModelingandPerformanceEvaluationfor CentralizedSchedulinginWiMAXMeshNetworks.......... 315 5.9.1Preliminaries .............................. 315 6 CapacityPrinciplesinWM2Nets ........................ 325 6.1Introduction ................................... 325 6.2AddFixedNodestoEnhanceCapacity .................. 330 6.3UsingSmartAntennaTechnologyandBeamformingTechniques toIncreaseCapacity .............................. 332 6.3.1BackgroundonSmartAntennaTechnologies .......... 333 6.3.2BackgroundonMultiple-AntennaSystems ........... 336 x Contents 6.3.3SpatialDiversityCoding ....................... 339 6.3.4SpatialMultiplexing .......................... 340 6.3.5Beamforming .............................. 341 6.3.6CapacityEnhancementsUsingDirectional AntennaTechniques .......................... 342 6.4SpatiotemporalCorrelationPropertiesandDataFusion ....... 345 6.4.1OnMaximizingCapacityinFixedMeshNetworkswith MIMOLinks............................... 346 6.4.2WM2SnetDeployment:AnExperimentalApproach ...... 352 6.4.3SpatiotemporalCorrelationTheoryinWM2Snets ....... 363 6.4.4Order-OptimalDataAggregationinWM2Nets ......... 369 6.4.5Transmit-DiversityTechniquesforMIMO–OFDM MeshNetworks ............................. 378 6.4.6UWBMeshNetworksinHostileEnvironment:Interference AnalysisandPerformanceStudy .................. 387 6.5PrinciplesofCommunicationsinWM2Nets—The PhysicalLayer ................................. 398 6.5.1PHYLayerSpecifications....................... 398 6.5.2ImplementationIssues ........................ 401 7 SecurityIssuesinWM2Nets ........................... 405 7.1Introduction ................................... 405 7.2SecurityOverviewofZigBee ........................ 406 7.2.1SecurityArchitectureofZigBee ................... 406 7.2.2WeaknessesintheZigBeeSecurityArchitecture ........ 412 7.3CoordinatedPacketTracebackinWM2Nets ............... 414 7.3.1RelatedWorkonTraceback ..................... 414 7.3.2MultidimensionalHashTable .................... 415 7.4OntheIdentity-BasedEncryptionforWM2Nets ............ 425 7.4.1RelatedWorkonKeyManagement ................ 425 7.4.2Pairings:Concepts ........................... 425 7.4.3ApplyingIBEtoWM2Nets ...................... 426 7.4.4ImplementationandEvaluation .................. 427 7.4.5Result ................................... 429 7.5KeyManagementforWM2Snets ...................... 429 7.5.1TaxonomyofKeyManagementSchemes ............. 429 7.5.2PairwiseKeyManagementSchemes ................ 430 7.5.3GroupKeySchemes .......................... 434 7.5.4AGlobalKeyManagementScheme ................ 435 7.6LightweightKeyManagementinWM2NetsbyLeveraging InitialTrust ................................... 435 7.6.1NotationandCryptographicPrimitives ............. 435 7.6.2BootstrappingService ......................... 436 7.6.3MultiphaseDeployment ....................... 439 7.6.4UsingSecureLocalLinks ....................... 440 7.6.5Implementation............................. 441 xi Contents 8 AutonomicSelfwareWM2NetCommunications .............. 447 8.1Introduction ................................... 447 8.2RelatedStandardizationEfforts ...................... 449 8.3RelatedIndustrialInitiatives ........................ 450 8.3.1IBM’sAutonomicComputing .................... 450 8.3.2Hitachi’sHarmoniousComputing ................. 452 8.3.3NTT’sResonantCommunicationNetworkArchitecture ... 452 8.4RelatedR&DProjects; ............................. 453 8.5PotentialImpactofAConFutureCommunicationParadigms ... 455 8.5.1RemovingIsolationandPatchworkfromNetwork ControlPlane .............................. 455 8.5.2FacilitatingDesignforEvolvability ................ 455 8.5.3ReconfigurabilityontheFly ..................... 456 8.5.4DistributedandAutonomousButGlobally OptimalControl ............................ 456 8.5.5DesignforUnexpected ........................ 456 8.5.6HowtoAllowEveryPartytoExpressHerInterestsand BeHeard ................................. 457 8.5.7GenericServiceComposition .................... 457 8.5.8RunningSystemsfromContext ................... 457 8.5.9HowtoReuseSuccessfulDesigns ................. 458 8.5.10ImmunityandModel-DrivenSecurity .............. 458 8.6PrinciplesofACNetworkArchitectures ................. 458 8.6.1DeviceandTechnologyHeterogeneity .............. 459 8.6.2CooperationandMisbehavior.................... 460 8.6.3BuildingBlocksforSelf-EvolvingCommunicationSystems . 463 8.6.4Self-ManagementandResilience .................. 474 References ...................................... 477 Index .......................................... 513