Saturday, December 22, 2012

Wireless Networking Technology

Wireless Networking
Technology
From Principles to Successful Implementation
 
Chapter 1: Introducing Wireless Networking -1
Development of Wireless Networking  1
The Diversity of Wireless Networking Technologies - 2
Organisation of the Book  3
 
PART I: Wireless Network Architecture  7
Introduction  7
 
Chapter 2: Wireless Network Logical Architecture - 9
The OSI Network Model  9
Network Layer Technologies  13
Data Link Layer Technologies - 20
Physical Layer Technologies  25
Operating System Considerations  34
Summary  36
 
Chapter 3: Wireless Network Physical Architecture - 37
Wired Network Topologies – A Refresher  37
Wireless Network Topologies  40
Wireless LAN Devices - 45
Wireless PAN Devices - 60
Wireless MAN Devices  62
Summary of Part I  66
PART II: Wireless Communication - 69
Introduction  69
 
Chapter 4: Radio Communication Basics - 71
The RF Spectrum - 71
Spread Spectrum Transmission  76
Wireless Multiplexing and Multiple Access Techniques - 87
Digital Modulation Technique - 95
RF Signal Propagation and Reception  106
Ultra Wideband Radio  119
MIMO Radio - 124
Near Field Communications  126
 
Chapter 5: Infrared Communication Basics  129
The Ir Spectrum - 129
Infrared Propagation and Reception  129
Summary of Part II - 134
 
PART III: Wireless LAN Implementation  137
Introduction - 137
Chapter 6: Wireless LAN Standards  139
The 80211 WLAN Standards  139
The 80211 MAC Layer 144
80211 PHY Layer - 148
80211 Enhancements - 156
Other WLAN Standards - 170
Summary - 173

 
Chapter 7: Implementing Wireless LANs  175
Evaluating Wireless LAN Requirements  176
Planning and Designing the Wireless LAN- 183
Pilot Testing  190
Installation and Configuration  190
Operation and Support  197
A Case Study: Voice over WLAN - 199
 
Chapter 8: Wireless LAN Security  205
The Hacking Threat  205
WLAN Security - 208
WEP – Wired Equivalent Privacy Encryption  209
Wi-Fi Protected Access – WPA - 212
IEEE 80211i and WPA2  219
WLAN Security Measures - 230
Wireless Hotspot Security - 236
VoWLAN and VoIP Security - 239
Summary - 240
 
Chapter 9: Wireless LAN Troubleshooting - 241
Analysing Wireless LAN Problems  241
Troubleshooting using WLAN Analysers - 243
Bluetooth Coexistence with 80211 WLANs - 247
Summary of Part III  249
 
PART IV: Wireless PAN Implementation  251
Introduction - 251
 
Chapter 10: Wireless PAN Standards - 253
Introduction - 253
Bluetooth (IEEE 802151) - 254
Wireless USB - 265
ZigBee (IEEE 802154) - 273
IrDA  280
Near Field Communications  287
Summary - 292
 
Chapter 11: Implementing Wireless PANs - 295
Wireless PAN Technology Choices  295
Pilot Testing  300
Wireless PAN Security  300
Summary of Part IV  306
 
PART V: Wireless MAN Implementation  307
Introduction - 307
Chapter 12: Wireless MAN Standards  309
The 80216 Wireless MAN Standards  309
Other WMAN Standards  319
Metropolitan Area Mesh Networks  321
Summary - 322
 
Chapter 13: Implementing Wireless MANs - 323
Technical Planning - 323
Business Planning  332
Start-up Phase - 337
Operating Phase - 339
Summary of Part V - 340
 
PART VI: The Future of Wireless
Networking Technology - 343
Introduction - 343
 
Chapter 14: Leading Edge Wireless Networking Technologies  345
Wireless Mesh Network Routing  345
Network Independent Roaming - 347
Gigabit Wireless LANs  350
Cognitive Radio - 355
Summary of Part VI  358
 
PART VII: Wireless Networking
Information Resources - 361
Introduction - 361
 
Chapter 15: Further Sources of Information  363
General Information Sources - 363
Wireless PAN Resources by Standard  364
Wireless LAN Resources by Standard  367
Wireless MAN Resources by Standard - 369
 
Chapter 16: Glossary - 371
Networking and Wireless Networking Acronyms - 371
Networking and Wireless Networking Glossary  381
Subject Index - 397
Keyword :
 
2B1Q, 29–30
3GPP, 349
4B/5B, 27
4-PPM, 283
4-way handshake
BSS transitions, 164
RSN key management, 222
16-QAM, 102
Gray coding, 102–3
80211a OFDM, 151
64-QAM, 102
80211a OFDM, 151
8021x, 212
authentication framework, 214
EAPoL transport, 217
8022, 20
8023, 26
8025, 24
80211
basic service set 142
CSMA/CA, 145
enhancements, 156
extended service set, 143
logical architecture, 141
logical link control, 144
media access control, 144
MAC coordination functions, 145
network components, 142
origins, 139
PHY layer, 148
resources, 367
standards suite, 140
VoIP enhancements, 202
80211a, 150, 345
80211h compliance, 160
HiperLAN/2 similarity, 171
key features, 140
modulation and coding schemes, 172
OFDM, 92
operating range, 180
PHY layer, 150
QAM modulation, 102
QPSK modulation, 100
ratification, 139, 150
80211b, 46
channel allocation, 186–88
channel availability at 24 GHz, 154
frequency hopping parameters, 84
high rate DSSS, 149
key features, 140
modulation and coding schemes, 172
modulation methods, 153
operating range, 180
PHY layer, 152
QPSK modulation, 100
ratification, 139
spread spectrum techniques, 80, 83
80211d
key features, 140
80211e, 157–60
ESS mesh QoS, 168
key features, 140
voice traffic, 201
WiMedia MAC, 267
80211f
key features, 140
80211g
key features, 140
modulation and coding schemes, 172
OFDM, 92
operating range, 180
PHY layer, 154
QAM modulation, 102
ratification, 139, 154
80211h, 160, 345
key features, 140
spectrum management, 151
80211i, 48, 209, 219–20
key features, 140
RSN security protocol, 227
troubleshooting, 245
WPA interim measure, 212
80211j
key features, 140
80211k, 143, 162
key features, 140
transmit power control, 119, 163
80211n, 46, 125, 165
Enhanced Wireless Consortium, 165
gigabit wireless LAN, 350
key features, 140
OFDM modulation, 167
80211p
key features, 140
80211r, 162
key features, 140
fast BSS transitions, 164
voice services, 201
80211s, 45, 167–69
key features, 140
resources, 368
80211T, 248
key features, 140
80211u
key features, 140
80211v
key features, 140
80211w
key features, 140
80215, 253
802151
origins, 254
resources, 364
see also Bluetooth
80215, 253 (Continued)
802154a, 80, 273, 280
impulse radio, 121
MAC security services, 305
radio, 100
resources, 365
standards and task groups, 254
standing committee SCwgn, 293
see also ZigBee
80216, 309–19, 328
80216-2004, 310, 321
80216a, 309
key parameters, 313
80216e, 66, 316–18
80216f/g, 319
frame structure, 311
key parameters, 311
management connections, 314
optional air interfaces, 313
PHY layer, 310
resources, 369
standards suite, 310
80221
media independent
handover, 165, 348
80222, 356–58
A
Access categories see Traffic classes
Access point
array, 43, 52
BSS example, 142
channel allocation, 186–88
channel switching, 161
configuration, 189, 191–94
automatic, 196
fat, 46, 196
functionality, 46
link margin report, 161
location, 183
pilot testing, 191
rogue
detection, 189, 235–36
hacking threat, 207
thin, 47
transitions between, 162, 201
transmit power control, 161
wireless LAN controller, 48
Index
398
Adaptive burst profiling
80216 radio link control, 315
glossary, 381
Adaptive frequency hopping
glossary, 381
Adaptive rate selection see Dynamic rate
shifting
Address resolution protocol, 13
1394 ARP, 32
ARP cache, 16
Ad-hoc mode
IBSS operation, 142
dynamic frequency selection, 162
topology, 143
Advanced encryption standard, 212, 225
CCMP encryption, 228–29
SSL support, 237
WPA2 implementation, 220
AIFS see Arbitrary inter-frame spacing
ALOHANET, 1
Alternating wireless medium access, 249
Ambient noise, 118
Antenna
adaptive beam, 57
MIMO compared, 59
beam-forming see adaptive beam
dipole, 107
radiation pattern, 107–8
directed beam, 58
directional, 107
radiation pattern, 107–8
wireless MAN application, 327
diversity, 57
diversity gain, 166
gain, 107
helical, 56
impedance, 108
omnidirectional, 55
wireless MAN application, 327
parabolic, 331
patch, 331
plasma, 59
polarisation, 55
sector, 41, 52, 55
wireless MAN application, 327
smart, 56, 94
80216a support, 312
switched beam, 57
Antenna (Continued)
wireless MAN, 64–5
wireless PAN, 62
Yagi
radiation pattern, 108
AntHocNet, 43, 346–47
APIPA, 15
Apple Computer Inc
iLink, 30
Application layer
described, 10
e-mail example, 11
MSDU and, 22
Arbitrary inter-frame spacing, 157
ARIB, 73–5
80211b channels, 153
ARP spoofing, 207
Association
80211 networks, 147
MAC distribution system service, 149
TPC in association frame, 161
Asynchronous
connectionless links, 259
IrDA SIR format, 282
WiMedia MAC, 269
Authenticator, 214
Authentication
80211 networks, 147
8021x, 164, 212
Bluetooth security, 301
EAP, 216
MAC station service, 148
server, 213–19
wireless LAN security, 208
wireless robust authenticated protocol, 227
wireless USB security, 304
Authorisation
Bluetooth security, 301
Auto-correlation
chipping codes, 82
B
Backhaul
glossary, 382
MAN provisioning, 332–33
Back-off period
in CSMA/CA, 25, 145
in CSMA/CD, 24
Index
399
Back-off period (Continued)
mixed mode operation, 155
randomised, 145
traffic class dependence, 157, 159
Bandwidth
dynamic control, 119
glossary, 382
granting in 80216, 314–16
Bandwidth efficiency see Spectral efficiency
Barker codes, 80–3, 110
80211b PHY, 152–53
glossary, 382
Base station, 327
Baseband
Bluetooth, 259
glossary, 382
Basic service set
ad-hoc mode, 142
beacon frames, 142
benefits, 143
BSSID, 142
infrastructure mode, 142
transitions, 163–64
Beacon frames, 142
time synchronisation, 147
quiet period specification, 161
SSID broadcast, 231
Beacon reports
80211k, 163
Beam pattern
infra-red, 131–32
WLAN antennas, 107–8
Binary phase shift keying, 98
80211a, 151
80211b, 153
glossary, 382
Bit error rate, 96, 109, 112, 129
data rate dependence, 153
WLAN layout, 188
Block cipher
cipher block chaining, 227
counter mode operation, 226
electronic code book, 226
offset code book, 227
Bluesnarfing, 302
Bluetooth
application profiles, 256
connection states, 260
Bluetooth (Continued)
enhanced data rate, 101
devices, 60, 255
discovery, 259
features, 61
security levels, 301
frequency hopping spread
spectrum, 85
glossary, 382
host controller interface, 260
jamming, 207
L2CAP, 261
link manager protocol, 260
master device, 40
maximum transmission unit, 261
packet types, 259
pairing, 262
power classes, 258
profiles, 255–56
protocol stack, 257
radio, 258
DPSK modulation, 101, 258
Gaussian FSK, 102, 258
resources, 364
RFCOMM, 261
security, 300–03
services
discovery, 262
security levels, 301
special interest group, 255, 265
standard data rate, 102
usage examples, 263
VoIP connection, 349
vulnerabilities, 302
Bridging, 53
WLAN point-to-point, 189
British Telecom, 349
Broadcast, 383
monitoring, 207
Broadband wireless access, 309
BSS see Basic service set
BSSID, 142
Business planning
MAN implementation, 323, 332
C
Cash flow projection, 336–37
Change control, 197
Index
400
Channel allocation
80211b access points, 186–88
Channel bonding
80211g enhancement, 156
Channel state information
MIMO radio, 125
80211k reports, 163–64
Channel switching
access point initiation, 161
Chipping codes, 80, 82
auto-correlation, 82
direct sequence UWB radio, 122
glossary, 383
length versus processing gain, 153
multi-channel CDMA, 353
orthogonality, 82, 353
Ciphers
block, 225
cipher block chaining, 227
counter mode operation, 226
electronic code book, 226
offset code book, 227
Rijndael, 225
stream, 225
Code division multiple access, 94
Coding rate
80211a PHY, 151–52
80211g PHY, 154
80211n mechanisms, 166
defined, 151
Coexistence
alternating wireless medium access, 249
Bluetooth and 80211, 247
deterministic frequency nulling, 249
wireless LAN attribute, 178
wireless PAN attribute, 298
Cognitive radio, 355
resources, 370
Communication services
connection oriented, 21, 314, 383
connectionless, 21
Complementary code keying, 82
80211b PHY, 152–53
glossary, 383
Connection oriented, 21, 383
80216 MAC, 314
Contention period, 25
Contention free period, 147
Control frames
CTS/ACK, 146
DTR/DSR, 261
mixed mode operation, 155
RTS/CTS, 155
Bluetooth RFCOMM, 261
Cover ge holes,
WLAN site survey, 184
Cross-correlation
chipping codes, 82
Cryptoanalytic attacks, 207
CSMA/CA, 25, 145
glossary, 383
CSMA/CD, 23
glossary, 383
timing, 24
Customer mapping, 334
Customer premises equipment, 331
installation, 332
Cyclic redundancy check
glossary, 384
WEP message integrity, 210, 213
D
Data encryption standard, 226
Data link layer
described, 10
e-mail example, 11
technologies, 20
ISDN, 30
Data rate
80211/a/b/g comparison, 157
effective, 156, 165
headline versus effective, 156
versus operating range, 2
Data transfer
asynchronous, 32
see also Asynchronous
isochronous, 32
see also Isochronous
dBm
defined, 106
glossary, 384
DCF see Distributed
coordination function
Deauthentication
MAC station service, 148
Default gateway, 14
Index
401
Delay spread
glossary, 384
mobile WiMAX, 316
multipath, 114
voice services, 201
Denial of service, 206
Detector sensitivity
infra-red, 132
wavelength dependence, 133
Deterministic frequency nulling, 249
DFS see Dynamic frequency selection
Differential phase shift keying, 100
80211b DPSK, 152
glossary, 384
DIFS see Distributed inter-frame spacing
Digital signatures
PKI certificates, 219
SSL certificates, 239
voice service security, 203
Direct sequence spread spectrum, 83–4
glossary, 385
interference with FHSS, 248
ZigBee radio, 276
Direct sequence UWB radio, 121
Directed beaconing
wireless USB devices, 270
Disassociation
MAC distribution system service, 149
Distributed coordination function, 145
80211e enhancements, 157
timing, 146
Distributed inter-frame spacing, 145
Distributed reservation channel access, 168
Distributed reservation protocol
WiMedia MAC, 268
Distribution system
ESS operation, 144
MAC services, 147, 149
mesh networks, 167
wired, 143
wireless, 167
Diversity
frequency, 318
glossary, 385
spatial, 59
Diversity gain, 166
Dual band radios
WLAN application, 183
Dual carrier modulation, 104, 123
Dual mode
VoIP handsets, 202
Dynamic rate shifting
80211b PHY, 152
Dynamic frequency selection
80211h, 160–62
ad-hoc mode, 162
glossary, 385
E
EAP see Extensible authentication
protocol
ECMA 340, 287
field strength specification, 288
modulation and coding, 289
Effective data rate
Bluetooth, 255
wireless LAN attribute, 178
wireless PAN attribute, 297
Effective isotropic radiated power
80211a limits, 150
defined, 107
FCC and ETSI limits, 73–4
glossary, 385
wireless MAN set-up, 326
Electromagnetic spectrum
see Spectrum
Encoding
2B1Q, 29–30
4B/5B, 27–28
MLT-3, 28
Manchester, 28
NRZI, 33
noise immunity and, 34
E-mail
OSI example, 11
Emitter power density, 131
Encryption
cipher block chaining, 220
counter mode, 226
electronic code book, 226
stream ciphers, 225
Enhanced DCF, 145
timing, 158–59
Enhanced Wireless
Consortium, 165
Ericson Mobile Communications, 254
Index
402
Error correction
80216e enhancements, 317
cyclic redundancy check, 384,
210, 213
forward error correction, 386
low density parity check, 351
ESS see Extended service set
Ethernet, 1, 26
address, 22
collision detection, 145
CSMA/CD and, 23
fast, 27
ETSI, 73–75
80211b channels, 153
Bluetooth RFCOMM adaptation, 261
DECT and HomeRF, 170
HIPERMAN, 319
Evil twin intercept, 207
Exposed station, 76
Extended service set
defined, 143
roaming between, 144
Extended unique identifier
1394 ARP and, 32
glossary, 386
Extensible authentication
protocol, 215
4-way handshake, 223
EAPoL, 216
EAP types, 217
key hierarchy, 222
F
Fade margin, 116–17
Fading
glossary, 386
Fast Fourier transform, 92
multi-channel CDMA, 353
FCC, 73–5, 150
80211b channels, 153
spectrum policy review, 356
television spectrum reuse, 356–58
Financial plan, 336
profitability analysis, 337
Firewall
glossary, 386
voice service security, 239
wireless hotspot security, 238
FireWire, 26
CSR architecture
range, 31
resources, 366
topology, 31
wireless 1394, 123, 272
Frame bursting see Packet bursting
Free space loss, 112–14
Frequency diversity, 318
Frequency division duplexing, 88–89
80216, 311
Frequency division multiple
access, 88–89
Frequency hopping spread
spectrum, 84–85
Bluetooth hopping patterns, 262
French regulations, 85
glossary, 387
interference, 247–48
multi-band OFDM, 123
Frequency reuse, 355
glossary, 386
polarisation based, 355
Frequency shift keying, 101
Gaussian, 102
Freshness check
ZigBee security, 305
Fresnel zone theory, 114
glossary, 387
WMAN site survey, 324
G
Gaussian frequency shift keying, 102
Gateway, 387
Gigabit wireless LAN, 350
usage scenarios, 351
Grant per connection, 316
Gray coding, 102–103
Guard interval, 92
80211n, 166
multi-channel CDMA, 353
Guard tones, 123
H
Hacking threats, 205
Harris Semiconductor, 82
HCF see Hybrid coordination function
HCF controlled channel access, 159
Index
403
Hidden station, 76
80211k reports, 163–64
wireless USB awareness, 270
HiperLAN/2, 171–73, 183
resources, 369
HIPERMAN, 319
key parameters, 320
Home area network, 274
Home automation, 61
Home RF, 87, 170, 183
shared wireless access protocol, 170
Hub
active, 38
passive, 39
switching, 39
glossary, 394
Hybrid coordination function, 158
I
IBSS see Independent basic service set
ICMP, 17
IEEE
OSI model and, 12
IEEE 1394 see FireWire
iLink see FireWire
Impedance matching, 108
Impulse radio
pulse position modulation, 104
UWB radio, 121
ZigBee candidate PHY layer, 86
Independent basic service set, 142
topology, 143
Inductive coupling
load modulation, 128
NFC devices, 127
Industry Canada, 73–4
Infrastructure mode
BSS operation, 142
glossary, 387
topology, 143
Initialisation vector
glossary, 387
WEP encryption, 209
Insertion attack
hacking threat, 207
Instrument, Scientific and Medical, 71
spectrum allocation, 72
Interference
80211h extensions, 160
Interference (Continued)
dynamic rate shifting, 152
DSSS and FHSS, 248
mitigation techniques, 118
multipath, 58, 91, 114
packet fragmentation strategy, 155
site survey, 184
transmit power control, 161
wireless LAN attribute, 178
wireless PAN attribute, 298
ZigBee, 279
Inter-frame spacing
traffic class dependence, 159
International Telecommunications Union, 73
spectrum harmonisation, 151
Internet Engineering Task Force, 49, 51
Internet point-of-presence, 332
glossary, 391
Interoperability
80211b and 80211g, 139, 155
Bluetooth and UWB, 265
IrDA, 283
spectrum sharing, 357
wireless PAN user requirement, 297
Inter-packet gap, 27
Inter-symbol interference, 91
Intrusion detection, 235–37
Inverse fast Fourier transform
multi-channel CDMA, 353
Inverse square law, 131
IP address, 13
access point configuration, 193
glossary, 388
IANA, 15
IP 1394, 32
IP v6, 15
IP v7, 16
private, 15, 18–9
IrBurst, 296
IrDA
device alignment, 281
LAN access, 286
link distance, 282
minimum emitter power, 132
origins, 280
physical layer, 131, 282
protocol stack, 282
optional, 284
pulse position modulation, 104
Index
404
IrDA (Continued)
resources, 366
security, 305
ISDN, 26, 29
ISM see Instrument, Scientific and Medical
Isochronous
glossary, 388
WiMedia MAC, 268–69, 271
ITU see International Telecommunications
Union
J
Jamming
hacking threat, 207
Jitter
glossary, 387
voice services, 201
K
Kerberos, 235–36
L
Last mile broadband access, 309
Latency
glossary, 388
Leasing agreements, 338
Light emitting diode
emitter power density, 131
polar diagram, 132
Line-of-sight
glossary, 388
Link budget, 116, 129
access point report, 161
ambient noise environment, 118
fade margin, 116–17
wireless MAN set-up, 326, 339
Link distance
infra-red, 133
Link margin see Link budget, fade margin
Link quality indicator, 119
Linux, 35
Load modulation, 128, 289
Location based services, 272
Logial architecture, 9
Logical link control, 20
Losses
cables and connectors, 108
free space loss, 112–14
path loss, 161
Low density parity check, 351–53
glossary, 389
Lucent Technologies, 82
LWAPP, 49
functions, 51
M
MAC see Media access control
MAN see Metropolitan area network
Manchester coding
glossary, 389
NFC coding, 289–90
MANET see Mesh networks
Man-in-the-middle attack, 207
Magnetic field strength, 288
Marketing plan, 333
Massachusetts Institute of
Technology, 235
MBOA Alliance, 123
MC-CDMA, 2
Media access control, 21
address, 20, 22
filtering, 234
alternating wireless, 249
contention based, 145
ZigBee, 276
coordination functions, 145
CSMA/CA, 25, 276
CSMA/CD, 23
data link layer technology, 20
distribution system services, 147
efficiency
defined, 167
gigabit wireless LAN, 351
TDMA versus CSMA/CA, 171
frame
four address format, 168
structure, 22–3
glossary, 389
header, 229
protocol data unit
encryption, 228–29
service access point, 53
glossary, 389
service data unit, 21–22
services, 144
station services, 147–48
wireless, 144
WiMedia MAC media access slots, 268
Index
405
Media access control (Continued)
wired networks, 22
token, 24
wireless networks, 25
Media independent handover, 347–50
Media reservations
pre-allocation in 80211r, 165
Mesh coordination function, 168
Mesh networks, 43
distributed control, 43
implementation considerations, 279
metropolitan area, 321
resources, 368
routing, 43, 345–46
ant inspired, 346–47
security, 168
throughput, 44
Message integrity check, 212, 389
wireless LAN security measure, 208
wireless robust authenticated
protocol, 227
WEP, 210
Metropolitan Area Network
antennas, 64
location, 328, 330
selection, 327
backhaul, 332–33
business planning, 332
configuration, 66
coverage options, 328–29
CPE installation, 331, 339–40
customer mapping, 334
base station, 41, 63
selection, 327
devices, 62
equipment location, 326
financial plan, 336
implementation, 323
link budget, 326
management and operations
plan, 335
mesh networks, 321
mobile MAN devices, 66
service bundle, 335
site surveying, 324, 339
transmitter power, 331
uptake curves, 334
Miller coding, 390
MIMO, 2, 43, 59, 124
glossary, 390
space division multiplexing, 124
Minimum threshold irradiance, 132–33
MISO, 125–26
Mixed mode operation
80211b and 80211g, 155
throughput impact, 155
Mobility
distribution system, 144
wireless PAN user requirement, 296
Modulation, 95
4-PPM, 283
80211a OFDM methods, 151
80211n mechanisms, 166
80211n OFDM methods, 167
80216, 312
adaptive burst control, 315
binary phase shift keying, 98
bit error rate, 110
differential phase shift keying, 100
dual carrier, 104, 123
frequency shift keying, 101
glossary, 390
HHH, 283
IrDA, 283
NRZI, 97
offset QPSK, 100, 276
on-off keying, 97
phase shift keying, 98
pulse amplitude modulation, 29, 86, 121–22
pulse position modulation, 86, 104
pulse shape modulation, 105, 122
quadrature amplitude modulation, 102
quadrature phase shift keying, 99
RZI, 97, 282–83
Modulation index, 390
Motorola, 349
Multi-band OFDM
spatial location, 61
UWB radio, 121–22
Multicast, 390, 220
Multi-path propagation, 58, 91
80216, 312, 317
Multiple access techniques, 87
code division, 94
frequency division, 88
OFDM, 89
Index
406
Multiple access techniques (Continued)
space division, 94, 124
time division, 87
N
Near field communications
collision detection, 290
devices, 126
modulation methods, 289
origins, 287
PHY layer, 288
protocol stack, 289
resources, 367
usage models, 291
NetStumbler, 246
Network adapter
MAC address, 22
See also Network interface car
Network address translation, 18
glossary, 390
static and dynamic, 19
static NAT table, 18
Network architecture
logical, 9
physical, 37–67
Network bridging see Bridging
Network capacity
bandwidth requirements, 180
comparison for WLAN
technologies, 181
voice calls, 199–200
WLAN attribute, 178
Network ID
determining, 14
Network interface card
configuration, 194
disabling, 238
wireless, 45
Network layer
described, 10
e-mail example, 11
ISDN and, 30
technologies, 13
Network management, 196
Network operating system
configuration, 191, 195
considerations, 34
Network performance monitoring, 197
Network policies, 198
Network throughput
signal strength dependency, 112
Network topology see Topology
NFC see Near field communications
Noise floor
graphical display, 185
WMAN survey, 325
Noise power density, 109
Noise and interference survey
WLAN site survey, 184
Nonce
CBC-MAC, 227
glossary, 390
key generation, 222
Novell Netware, 35
Null tones, 123
O
OBEX, 281
IrOBEX, 285
OFDM see Orthogonal frequency division
multiplexing
OFDMA
scalable, 316
Offset QPSK modulation, 100, 276
Operating mode
access point configuration, 193–94
Operating procedures
wireless MAN, 336
Operating range
factors influencing in WLANs, 180, 182
indoor versus PHY data rate, 182
versus data rate, 2
wireless PAN attribute, 298
Operating system
considerations, 34
see also Network operating system
Operations
customer helpline, 339
financial, 340
leasing agreement, 338
performance monitoring, 197–98
subscriber agreement, 338
wireless LAN, 197
wireless MAN, 335
operating cost elements, 336
start-up phase, 337
Index
407
Orthogonal frequency division
multiplexing, 2, 89, 151
80211a, 151
80211g, 154
enhanced channel bandwidths, 165
glossary, 391
pilot tones, 92
tone orthogonality, 90
transciever block diagram, 93
Orthogonality
multiple access codes, 95
chipping codes, 82, 353
OFDM tones, 90
OSI model, 9–13
P
Packet binary convolution coding
80211b optional modulation, 153
glossary, 391
Packet bursting, 155
Packet delay
voice services, 201
Packet error rate, 109
payload size dependency, 119
Packet fragmentation, 155
Pairing
glossary, 391
Pairwise temporal keys
glossary, 391
hierarchy, 222
PAN see Personal Area Network
Passphrase, 209
Bluetooth device pairing, 262
changing default, 232
wireless USB security, 304
Password authentication protocol, 216
Path loss
access point estimate, 161
PBCC see Packet binary
convolution coding
PCF see Point coordination function
Peer-to-peer mode see Ad-hoc mode
Penetration
reduced at 5 GHz, 152
see also Signal attenuation
Personal Area Network
devices, 60
rate versus range, 292
Personal operating space, 253
Phase constellation, 99
frequency hopping, 123
Gray coding, 102–3
multi-band UWB radio, 122
Phase shift keying, 98
Photodiode
minimum threshold irradiance, 132–33
wavelength dependence, 133
Physical layer
described, 10
infra-red, 149
IrDA, 131
technologies, 25
maximum data rate and, 26
wired networks, 26
wireless networks, 34–5
PLCP, 25
PMD sublayer, 26
Physical layout
designing for WLAN, 185–89
factors influencing, 186–87
planning tools, 187
provisional, 185
testing for WLAN, 183
wireless switches, 189
Physical medium, 26
copper cable, 31
glossary, 394
optical fibre, 31
radio transmission, 75
twisted pair (UTP), 27–8
Piconet, 255, 262
Pilot testing
voice services, 202
wireless LAN, 176, 190
aspects, 191
wireless PAN, 300
Pilot tones, 92, 123
80211a PHY, 151
80211g PHY, 154
PKI see Public key infrastructure
Point coordination function, 145–46
Inter-frame spacing, 147
quality of service, 147
Polarisation, 55–56
WMAN site survey, 325
gigabit WLAN frequency reuse, 355
Index
408
Port address translation, 19
PAT table, 20
Power density, 81
infra-red, 130
Power efficiency, 96
Presentation layer
described, 10
security see SSL
Print server, 53
Probe frame
80211 association, 147
DFS specification, 161
Processing gain, 109
packet binary convolution coding, 153
glossary, 392
Profitability analysis, 337
Protocols
installing, 195
Pseudo-noise code, 80–1, 94, 121
Public key infrastructure, 219
secure socket layer, 237
Pulse amplitude modulation, 29,
86, 121–22
Pulse position modulation, 86, 104
infra-red PHY, 149
Pulse shape modulation, 105,122
Q
Quadrature phase shift keying, 99
80211a OFDM, 151
80216, 312
glossary, 392
Quality of service
80211e, 157
80216, 314
Bluetooth, 261
continuous through transitions, 165
Enhanced DCF, 158
VoIP services, 201
wireless LAN attribute, 178
wireless PAN attribute, 298
R
Radian sphere
defined, 126
Radiant intensity
infra-red, 130–131
Radio resource measurements, 162
RADIUS
authentication server, 215–18
EAP over RADIUS, 215
RC4 cipher, 207, 209–10, 225
weakness in WEP implementation, 211
secure socket layer support, 237
Reassociation
MAC distribution system
service, 149
TPC in association frame, 161
Received signal strength indicator, 119
Bluetooth class 1 devices, 258
roaming decisions, 163
WLAN layout, 188
Receiver sensitivity, 108
defined, 111
glossary, 392
receiver noise figure, 110
receiver noise floor, 108, 110–11
defined, 111
Reflection coefficient
infra-red, 134
Replay attack, 207
Request for Comments
glossary, 392
RFC 1918, 15
RFID, 126, 287
RF propagation
local environmental conditions, 186
transmitter power, 106
RF spectrum, 71
regulation, 73
unlicenced use, 74
Rijndael cipher, 225
Roaming
80211k, 162
algorithm, 163
alternative access points, 144
roaming decisions, 163
transition times, 201
WLAN scenarios, 162
voice services, 201
Robust security network, 220
AES-CCMP, 228
authentication, 221
information element content, 221
key management, 222
parameter negotiation, 221
Index
409
Robust security network (Continued)
wireless robust authenticated protocol, 227
Routing
ant inspired, 346–47
bandwidth impact, 345
distribution system, 144
dynamic, 43
glossary, 385
glossary, 393
MANETS, 18
mesh networks, 168–69, 345
RIP, 17
router table, 16, 275
stochastic, 346
transitions
heterogeneous, 348
homogeneous, 347
RSA algorithm, 237
glossary, 393
RSN see Robust security network
RSSI see Received signal
strength indicator
S
Scalable OFDMA, 316–18
Scatternet, 255, 262
glossary, 393
Secure Socket Layer,
presentation layer security, 11, 237–39
Security
access point configuration, 193–94
Bluetooth, 300–303
denial of service attack, 202, 206
IrDA, 305
MAC address filtering, 234
mesh networks, 168–69
troubleshooting, 247
wireless hotspot, 236
wireless LAN
practical measures, 230–36
security attribute, 178
security measures, 208
wireless PAN, 300
wireless switch features, 196
wireless USB, 303–4
voice services, 202, 239
ZigBee, 304–5
SEEMesh, 45, 168
Serial Ir link, 281
Service access points
data rate at, 156
LLC SAP, 21
MAC SAP, 21
Session highjacking, 207
Session layer
described, 10
Shared keys
changing default, 232
Shared wireless access protocol, 170
Short inter-frame spacing, 146
DFS channel switch
announcement, 161–62
Side channel attacks, 208
Siemens AG, 355
SIFS see Short inter-frame spacing
Signal attenuation
building materials, 116
indoors, 115
Signal strength survey
results display, 186
WLAN survey aspects, 185
Signal-to-interference ratio, 188
Signal-to-noise ratio, 109–12
data rate dependence, 153
defined, 109
WLAN layout, 188
SIMO, 125
SISO, 125
Site report
80211k report, 163–64
Site survey
fade margin, 116
Fresnel zone, 324
objectives, 183
simulation, 324
subscriber location, 325, 339
troubleshooting, 246–47
Slot time, 145
Smart antennas, 56, 94
80216 support, 312
SNMP
glossary, 393
performance data collection, 197
WLAN security, 236
Software defined radio, 355
Solid angle
defined, 130
Space division multiple access, 94
Index
410
Space division multiplexing, 124
Space time block coding, 126
Spam over internet telephony, 203
Spatial diversity, 59
Spatial location, 61, 272
Spatial reuse, 169
Spectral efficiency, 83, 96, 102, 111
gigabit wireless LAN, 351
glossary, 393
Spectral shaping
multi-band OFDM, 123
Spectrum
electromagnetic, 129
radio frequency, 71
FCC allocation, 72
map for spectrum sharing, 358
sensing for vertical sharing, 357
Spectrum agile radio, 74, 356–58
see also Cognitive radio
Spectrum analyser
WMAN site survey, 325
Spread spectrum, 76–87
benefits, 86–7
chirp, 121
direct sequence, 78, 83–4
frequency hopping, 78, 84–5
glossary, 394
hacking threats, 205
hybrid, 79–80
pulsed FM, 79
time hopping, 78
types, 77
SSID, 51
access point configuration, 193–94
broadcast, 193
disabling broadcast, 231
glossary, 393
probe frame, 147
Standards
IEEE 1394, 31
OSI model, 9
proprietary extensions, 155
Steradian, 130
Stigmergy, 346
Stress testing
voice services, 202
Subchanelization, 316, 318
Subnet mask, 14, 17
Supplicant, 214
Switch
wireless LAN switch, 41
features, 50
LWAPP, 49
see also Hub, switching
Synchronous
connection oriented links, 259
glossary, 394
IrDA FIR, 283
links, interference, 248
T
Technical planning
MAN implementation, 323
Technical requirements
wireless LAN
comparison of technologies, 181
establishing, 179
wireless PAN
comparison of technologies, 299
establishing, 297
Temporal keys integrity protocol, 212
glossary, 394
key mixing, 214
RSN key hierarchy, 223
WPA feature, 212
Texas Instruments, 153
Thermal noise floor, 110
Time division multiple access, 87
80216, 311
alternating wireless medium access, 249
HiperLAN/2, 171
IrLAP, 284
MAC efficiency, 171
ZigBee, 276
Time division multiplexing
80216, 310
Bluetooth baseband, 259
Time-frequency codes, 123
wireless USB radio, 267
Time hopping spread spectrum, 85–6
Topology
ad-hoc mode, 143
bus, 38
daisy chain, 31, 33, 39
IBSS, 143
infrastructure mode, 143
ring, 37
star, 37
Index
411
Topology (Continued)
switched, 42
wireless networks, 40
tree, 31, 33, 53
ZigBee supported, 275
Traffic classes
80211e, 157
described, 160
queues, 158
voice traffic, 201
Transitions
heterogeneous, 348
homogeneous, 347
Transition security network, 222
Transmit opportunity, 159
spectrum sharing, 358
Transmitter power, 106
access point configuration, 193
automatic adjustment, 189
FCC specified maximum, 107
RA specified maximum, 107
transmit power control, 119
80211h, 160
80216 radio link control, 315
Bluetooth class 1 devices, 258
Transport Control Protocol
e-mail example, 11
Transport layer
described, 10
Troubleshooting
connectivity, 242, 245
performance, 242, 246
problem identification, 242
solution strategies, 244
wireless LAN, 241
wireless LAN analysers, 243–46, 249
Tunnelling
glossary, 394
TLS tunnel, 219
Turbo codes, 351–53
glossary, 394
U
Ultra fast Ir, 286
Ultra wideband, 2, 119–24
EIRP limits, 120
FCC definition, 120
FCC spectrum allocation, 73, 120
Ultra Wideband (Continued)
glossary, 394
wireless USB radio, 265
wireless USB MBOA bands
Unicast, 395, 220
U-NII
80211a OFDM PHY, 150
University of Essex, 355
UNIX, 35
Uptake curves, 334
USB, 26, 32
pipes, 33
topology, 33
wireless USB, 123
User requirements
wireless LAN, 175
considerations, 177
establishing, 176
wireless PAN
considerations, 296–97
establishing, 295
UWB see Ultra wideband
V
Virtual LAN
glossary, 395
voice service security, 239
Voice over wireless, 157
80211r support, 164
bandwidth requirements, 199
case study, 199
security, 239
VPN
glossary, 395
voice service security, 239
wireless hotspot security, 238
W
Walsh/Hadamard transform, 83, 95
code division multiple access, 353
Walsh codes, 95
War chalking
symbols, 206
War driving, 205
Wavelength, 71, 112
infra-red, 129
Wavenumber
defined, 129
Index
412
WDS see Distribution system, wireless
WECA see Wi-Fi Alliance
WEP see Wired equivalent privacy
WiBro, 66, 320
key parameters, 321
Wi-Fi see 80211
Wi-Fi Alliance, 1, 220
glossary, 396
WMM adoption, 159
Wi-Fi multimedia, 159, 201
access category descriptions, 160
voice traffic, 201
Wi-Fi protected access, 48, 169, 209
glossary, 396
TKIP, 212
WPA2, 219
compared, 220
WIGWAM see Gigabit wireless LAN
WiMAX, 40, 309–19
forum, 319
mobile, 316
resources, 369
see also 80216
WiMedia MAC, 267–68
distributed reservation protocol, 268
media access slots, 268
superframe structure, 268
WiMedia-MBOA Alliance, 266
WiMesh Alliance, 45, 168
logical architecture, 169
quality of service, 169
Windows
network operating system, 34
winipcfg utility, 22
Wired equivalent privacy, 48, 169
cryptographic weakness, 209, 211
encryption key length, 209
encryption process, 211
glossary, 395
key management, 213
key stream generation, 210
passphrase, 209
war chalking symbol, 206
Wireless distribution system see Distribution
system, wireless
Wireless hotspots
security, 236–39
Wireless regional area networks, 356
Wireless robust authenticated
protocol, 227
Wireless switch
automatic WLAN configuration, 196
layout planning, 189
Wireless USB
channel creation using DRP, 269
design objectives, 266
devices, 270–71
MBOA bands, 268
origins, 265
protocol stack, 266
radio, 267
resources, 365
security, 303–4
WMM see Wi-Fi multimedia
Workgroups
operating system configuration, 195
WPA see Wi-Fi protected access
X
X-10
glossary, 396
Z
ZigBee, 40, 273
20 specification, 280
802154 radio, 100
applications, 278
devices, 61, 63, 273, 278
features, 62
general operating framework, 275
glossary, 396
interference, 279
mesh implementation considerations, 279
optional spread spectrum
techniques, 80
O-QPSK modulation, 100
origins, 273
PHY layer, 275
protocol stack, 274
pulse modulation, 105
resources, 365
security, 304–5
superframe structure, 277
topologies, 275
ZigBee Alliance, 273, 280
 

Wednesday, December 19, 2012

Advances in Audio and Speech Signal Processing: Technologies and Applications

Advances in Audio and
Speech Signal Processing:
Technologies and Applications

Chapter.I
Introduction.to.Audio.and.Speech.Signal.Processing
................................................. 1
Hector Perez-Meana, National Polytechnic Institute, Mexico
Mariko Nakano-Miyatake, National Polytechnic Institute, Mexico
Section.I
Audio.and.Speech.Signal.Processing.Technology
 
Chapter.II
Digital.Filters.for.Digital.Audio.Effects.
.................................................................... 22
Gordana Jovanovic Dolecek, National Institute of Astrophysics, Mexico
Alfonso Fernandez-Vazquez, National Institute of Astrophysics, Mexico
 
Chapter.III
Spectral-Based.Analysis.and.Synthesis.of.Audio.Signals
......................................... 56
Paulo A.A. Esquef, Nokia Institute of Technology, Brazil
Luiz W.P. Biscainho, Federal University of Rio de Janeiro, Brazil

Chapter.IV
DSP.Techniques.for.Sound.Enhancement.of.Old.Recordings
................................. 93
Paulo A.A. Esquef, Nokia Institute of Technology, Brazil
Luiz W.P. Biscainho, Federal University of Rio de Janeiro, Brazil
Section.II
Speech.and.Audio.Watermarking.Methods
 
Chapter.V
Digital.Watermarking.Techniques.for.Audio.and.Speech.Signals
......................... 132
Aparna Gurijala, Michigan State University, USA
John R. Deller, Jr., Michigan State University, USA
 
Chapter.VI
Audio.and.Speech.Watermarking.and.Quality.Evaluation
................................... 161
Ronghui Tu, University of Ottawa, Canada
Jiying Zhao, University of Ottawa, Canada
Section.III
Adaptive.Filter.Algorithms
 
Chapter.VII
Adaptive.Filters:.Structures,.Algorithms,.and.Applications
.................................. 190
Sergio L. Netto, Federal University of Rio de Janeiro, Brazil
Luiz W.P. Biscainho, Federal University of Rio de Janeiro, Brazil
 
Chapter.VIII
Adaptive.Digital.Filtering.and.Its.Algorithms.for.Acoustic.
Echo.Canceling
...........................................................................................................225
Mohammad Reza Asharif, University of Okinawa, Japan
Rui Chen, University of Okinawa, Japan
 
Chapter.IX
Active.Noise.Canceling:.Structures.and.Adaption.Algorithms
.............................. 286
Hector Perez-Meana, National Polytechnic Institute, Mexico
Mariko Nakano-Miyatake, National Polytechnic Institute, Mexico
 
Chapter.X
Differentially Fed Artificial Neural Networks for Speech Signal Prediction
........ 309
Manjunath Ramachandra Iyer, Banglore University, India
Section.IV
Feature.Extraction.Algorithms.and.Speech.Speaker.Recognition
 
Chapter.XI
Introduction.to.Speech.Recognition
.........................................................................325
Sergio Suárez-Guerra, National Polytechnic Institute, Mexico
Jose Luis Oropeza-Rodriguez, National Polytechnic Institute, Mexico
 
Chapter.XII
Advanced.Techniques.in.Speech.Recognition
......................................................... 349
Jose Luis Oropeza-Rodriguez, National Polytechnic Institute, Mexico
Sergio Suárez-Guerra, National Polytechnic Institute, Mexico
 
Chapter.XIII
Speaker.Recognition
.................................................................................................. 371
Shung-Yung Lung, National University of Taiwan, Taiwan
 
Chapter.XIV
Speech.Technologies.for.Language.Therapy
........................................................... 408
Ingrid Kirschning, University de las Americas, Mexico
Ronald Cole, University of Colorado, USA
 
About.the.Authors......................................................................................................434
Index............................................................................................................................439

Comment to request full ebook

KEYWORDS

Index
A
absolute category rating (ACR) method
178
acoustic
echo cancellation systems 222
impulse responses 229, 275
noise control (ANC) 269
active
noise
cancellation (ANC) 286, 287
control 222
adaptive
digital filtering (ADF) 225
echo cancellation 2
filter 198
linear combiner 193
noise canceller 5
advanced audio coding (AAC) 148
affine-projection 190
air traffic control 136
allpass
filters 25, 51
reverberator 42
American Defense Department (DoD) 13
amplitude estimator 120
analog
-to-digital (A/D) 289
hole 144
analysis tool 120
ANC
algorithm 305
filter 291
systems 18
anti-aliasing filter 289
artificial
larynx transducer (ALT) 14
neural networks 179
neuronal networks 331
reverberation 24
spectrum 80
vibrato 84
ASR system 328
audio
and speech watermarking techniques
136
applications 94
de-clicking 96, 99
de-hissing 96
de-noising 83
equalization 45
morphing 84
segment 83
signal 59
Stirmark 156
watermarking algorithm 139
authentication 136
autocorrelation method 153
automatic
gain control (AGC) 191
speech recognition (ASR) 325, 350
systems 350
autoregressive (AR) 74, 96
based
audio de-clicker 109
interpolators 114, 115
linear prediction 78
model 100, 108
coefficients 100
estimators 101
order 113
parameters 337
separation method 100
synthesis filter 114
B
backward-extrapolated fragment 114
bandpass filters 74
bidirectional channel 2
binary phase shift keying (BPSK)
152, 171
Bit-stream watermarking 148
block
division 181
LMS (BLMS) 245
bounded-Q transform 74
broadband
audio watermarking algorithms 151
noise (hiss) 95
broadcast monitoring 136, 137, 166
C
capella 81
Center for Spoken Language Research
(CSLR) 412
cepstrales coefficients (CLPC) 345
chorusing 30
classifier techniques 375
codebook design 382
codebook exited linear predictive coding
(CELP) 10
/hybrid codecs 180
codecs 13
coefficient 99, 145, 227, 253
quantization 181
selection 181
collusion attack 144
comb
filter 22, 40
reverberator 42
computational
cost 165
model 179
consonants 409
Constant-Q transform (CQT) 74
content
authentication 137, 166
management 137
continuous density hidden Markov models
(CDHMMs) 349, 358
copy
attack 144
control 136, 137, 166
copyright
protection 136, 137, 165
correlation
function 262, 275
LMS (CLMS) 258
coustic
impulse response 245
coversignal 133
-to-watermark 150
cropping attack 135
cross-correlation
coefficients 99
function 263
vector 257
cryptographic attacks 168
CSLU toolkit 410
D
DANN 314
data payload 132, 134, 164
data time warping (DTW) 350
algorithm 350
dead-lock attack 144
demand only O(N) 122
desynchronized stegosignal 135
detection blindness 164
digital
-to-analog (D/A) 143
audio
technology 94
watermarking 185
filters 226
literacy 225, 325
record 133
signal processing (DSP) 2, 23, 191
chips 13
solutions 111
diphthongs 420
direct-sequence spread spectrum (DSSS)
169
discrete
-time Fourier transform (DTFT) 59, 379
cosine transform (DCT) 82, 139, 145
Fourier
series (DFS) 379
transform (DFT) 58, 117, 175
wavelet transform (DWT)
120, 181, 264, 394
disyllables words 363
dither
modulation (DM) 148
vectors 148
double-talk detector (DTD) 254
dragon dictate 349
dual port RAM (DPR) 251
DWT
coefficient 122
decomposition 181
domain-based watermarking algorithm
183
dynamic
programming (DP) 391
time warping (DTW) 331, 403
E
e-model 179
echo
hiding techniques 140
return loss (ERL) 228
return loss enhancement (ERLE) 252
speech signals 35
ECLMS algorithm 267
embedding patient information 138
emerging track 75
endpoint detection 379
energy
analysis 336
function of the high frequency (ERO
parameter) 365
environmental noise 180
Ephraim and Malah suppression rule
(EMSR) 120
equation error (EE) 190, 211
solution 217
error
measurement 192
microphone 289
esophageal speech 14
Eucldian distance 395
evolving track 75
expectation maximization (EM) 358
experimental design 371
F
fast
Fourier transform (FFT)
58, 178, 208, 330, 379
buffer 70
coefficients 178
kernel 264
transversal filter (FTF) 208
feature
extraction 374
selection 371
fidelity 134
filter
banks 378
coefficients 340
fingerprinting 138, 166
finite impulse response (FIR)
38, 191, 366
adaptive filters 4
flanging 30, 43
formant
amplitudes 373
frequencies 373
frequency transitions 373
forward-extrapolated signal 114
Fourier transform 379
fragile speech watermarking algorithm
155
frame 378
frequency
bin adaptive filtering (FBAF) 245, 247
domain adaptive filtering (FDAF) 245
domain ECLMS (FECLMS)
algorithm 262, 267
domain synthesis 80
hopping spread spectrum (FHSS) 169
fundamental tone (T0) 345
fuzzy C-means algorithm (FCM) 387
FxRLS algorithms 286, 291
G
Gaussian
densities 356
estimators 314
HMM 422
mixture model (GMM)
179, 311, 312, 378
mixtures 356
genetic algorithm(GA) 382
geometric attacks 144, 168
group vector quantization (GVQ) 380
H
Hanning window 71, 72
harmonic
and individual lines plus noise (HILN)
87
signal 84
head-related
impulse response 218
transfer functions 218
hidden Markov models (HMMs) 78, 312,
326, 350, 396, 408
-neural networks (HMM-NN) 327
hidden wavelet Markov model (HWMM)
378
human
auditory system (HAS) 18, 138, 162
-based audio encoding operations 139
-based perceptual models 141, 151
-based psychoacoustic auditory model
141
visual system (HVS) 162
hybrid 379
methods 331
transformer 2
I
IBM's SpeechView 417
imperceptibility 164
implicit 379
individualized instruction 415
infinite impulse response (IIR)
37, 191, 227
filter 36
information embedding rate 143
input signal power spectral 344
instructor 418
integer 395
intelligent learning systems 412
international telecommunication union
(ITU) 179
interpolation 83
interpolators 111
Intonation 409
inusoidal modeling parameters 78
inverse
discrete wavelet transform (IDWT)
121, 266
reconstruction 183
Fourier transform 174, 344
inversion 144
isolated peaks 71
iteration 183
J
Jean Piaget School 422
K
Karhunen-Loeve
expansion 384
transform (KLT) 377, 384
kernels 146
keys 144
L
Lagrange multipliers 386
language therapy 409, 411
learning vector quantization (LVQ) 379
algorithm 380
least mean square (LMS)
190, 191, 203, 234
-based algorithm 191
-Newton algorithm 205
-type family 204
algorithm 201, 208
convergence speed 201
least significant bit (LSB) 140
-based watermarking schemes 147
least square
error (LSE) 154
least squares
autoregressive (LSAR) 112
interpolator 113
spectral optimization method 74
Linde-Buzo-Grey (LBG)
algorithm 379, 380, 382
codebooks 381
linear prediction (LP) 140, 338
coding (LPC) 65, 198, 227, 330, 350
method 337
linguistic message 373
local maxima 73
log-to-digital (A/D) 143
logarithm 344
logarithmic spectrum 344
long-playing (LP) 94
cepstral coefficients 389
model 152, 153
parameters 153
long-term 153
parametric code 153
loudspeaker enclosure microphone system
(LEMS) 253
low-bit audio coding 83
low-order AR models 80
lowpass
filtering 26
reverberation filters 25
M
Markov model 313
MATLAB 25
matrix quantization (MQ) 379
maximum a posteriori (MAP) 101, 359
mean opinion score (MOS) 178
value 180
mean square consistency 194
mean squared error (MSE) 142, 227, 253
measure analysis 371
minimum-distance decoder 148
misadjustment 194
model
-based detectors 111
language 366
parameters 101
modified discrete cosine transform
(MDCT) 149
modulated complex lapped transform
(MCLT) 170
modulation 409
monosyllabic words 363
morph 84
mother-wavelet 121
moving-average autoregressive (ARMA)
74
MPEG
-1 psychoacoustic model 174
audio compression 140
compression 139
MQ codebooks 379
multi-band excitation (MBE) 13
multi-resolution singular value decomposition
(MSVD) 386
multimedia
data 137
design 415
multiple
echo filtering 35
echo filters 25
transcoding 180
multipulse excited (MPE) 10
mutually independent 195
N
natural
reverberation 53
sound recognition 17
Newton
-like algorithm 204
-type algorithm 202
algorithm 195
Neyman-Pearson paradigm 135
non-decimated filterbank 58
non-linear network 314
non-parametric 74
signal 120
normalization 257
normalized
digital frequencies 28
least mean square (NLMS) 235
version 190
Nyquist frequency 84
O
objective
function 192
testing method 179
optimization method 192
optimum Wiener solution 237
orthogonal 194
orthogonalized ANC 305
output-error (OE) 190
algorithm 212
P
packet losses 180
parabolic interpolation 69, 72
parameter
-based algorithms 179
estimation 71
parametric
audio coding 87
representation 83
watermarking 153
parent node 395
PARSHL program 75
peaking filters 45
peak parameters 67
percentage of correctly extracted watermark
bit (PCEW) 181
perceptual
evaluation of speech quality (PESQ) 179
algorithm 180
linear prediction analysis (PLP) 331
model 179
personal identification number (PIN) 319
phase vocoder 58
phonetic-based system 328
pitch 373
-based extended AR model 113
dynamics 373
synchronous overlap and add (PSOLA)
algorithm 155
polynomial filtering 102
post-masking 174
posteriori 120, 359
power spectral density 28
pre-echo phenomenon 63
pre-masking 174
preamplifier 289
Presentation 419
primitives 375
priori 106, 120, 200
probability density function (pdf) 13
protocol attacks 144, 168
pseudo
-noise (PN) 139
-random noise (PN) 181
psychoacoustical mask 174
psychoacoustic auditory model 139, 141
psychoacoustics 57
Q
quantization
index modulation (QIM) 145, 147
scale (QS) 181
quantized-data algorithms 204
R
re-synthesized signal 84
real life audio signals 62
recording/reproduction techniques 94
recursive least squares (RLS) 190, 205
algorithm 191
regular pulse excited (RPE) 10
code 11
render inharmonic 84
reverb 30
reverberation
filters 25, 42
time 24
rhythm 409
robust 134
bit-stream watermarking 145
S
SAR algorithm 275
SBD-ANC scheme 305
scanners 1, 22, 56, 93, 132, 225, 309
, 371
security 165
segmental CWR 142
segment durations 373
set-membership variation 190
shelving filters 45
short-term total energy function (STTEF)
365
short-time
fourier transform (STFT) 71
sinusoid 120
spectral attenuation (STSA) 116
-based de-hisser 119
signal
-based algorithms 179
-to-noise ratio (S/N) 107, 252
quality 140
segmentation 59
simple hyperstable algorithm for recursive
filters (SHARF) 213
single echo filter 25
sinusoidal
modeling 56, 81, 111
parameters 80
sinusoids
+noise synthesis scheme 81
smart acoustic room (SAR)
225, 227, 269
social agents 415
sound source separation 83
speaker
classifiers 371
model 378
recognition system 311
spectrograms 373
speech
/audio signals 136
quality evaluation 185
signal 35, 227, 248
preprocessing 374
spread spectrum (SS) 145
signaling 152
watermarking 145
statistical models 331
stegosignal 133
fidelity 139
stirmark benchmark for audio (SBMA)
168
stochastic
framework 359
model simplifications 360
sub-band
adaptive 205
methods 111
syllabic
-based system 328
units 329
synthesis
filters 10, 13
methods 87
systemic processes 134
T
temporal domain based algorithm 184
three-syllabic words 363
time
-scale modifications 83
domain adaptive filter (TDAF) 245
Toeplitz matrix 264
transaction tracking 138
transform
-domain 205
LMS 205
encryption coding (TEC) 149
transmission error 180
triangular window technique 69
two
-pass split window (TPSW) 66, 102
-based estimate 105
filtering procedure 103
-syllabic words 363
one-directional channels 2
V
vanishing track 75
variable delay 180
vector
codebooks 311
quantization (VQ) 379, 382
speaker model 379
quantizer codebook 12
virtual humans 414
VLSI technology 2
voice over internet protocol (VoIP) 179
vowels 409
VQ
-based classifier 380
model 379
W
watermark 143
algorithms 132
applications 132, 138
detector 166
embedding 182
literature 133
robustness 132
sequence 143
signal 144
fidelity 132
techniques 136
waveform
codecs 180
substitution schemes 111
wavelet
Markov model (WMM) 396
neural network (WNN) 378
transform (WT) 386
WECLMS algorithm 267
weighted least-squares (WLS) 205
white noise 120

Thursday, December 13, 2012

Wireless Sensor Network Designs

Wireless Sensor Network Designs

1 Networked Embedded Systems 1
1.1. Introduction 1
1.2. Object-Oriented Design 3
1.3. Design Integration 4
1.4. Design Optimization 6
1.5. Co-design and Reconfiguration 9
1.6. Java-Driven Co-design and Prototyping 12
1.6.1. Java-Based Co-design 13
1.6.2. Run-Time Management 15
1.6.3. Embedded Systems Platform 17
1.7. Hardware and Software Prototyping 20
1.8. Multiple Application Support 23
1.8.1. FPGA-Based System Architecture 25
1.9. Summary 27
Problems 28
Learning Objectives 28
Practice Problems 29
Practice Problem Solutions 29

2 Smart Sensor Networks 31
2.1. Introduction 31
2.2. Vibration Sensors 32
2.3. Smart Sensor Application to Condition Based Maintenance 34
2.4. Smart Transducer Networking 42
2.5. Controller Area Network 46
2.6. Summary 58
Problems 60
Learning Objectives 60
Practice Problems 60
Practice Problem Solutions 60
3 Power-Aware Wireless Sensor Networks 63
3.1. Introduction 63
3.2. Distributed Power-Aware Microsensor Networks 65
3.3. Dynamic Voltage Scaling Techniques 71
3.4. Operating System for Energy Scalable Wireless Sensor Networks 75
3.5. Dynamic Power Management in Wireless Sensor Networks 79
3.6. Energy-Efficient Communication 81
3.7. Power Awareness of VLSI Systems 85
3.8. Summary 95
Problems 97
Learning Objectives 97
Practice Problems 97
Practice Problem Solutions 98
4 Routing in Wireless Sensor Networks 101
4.1. Introduction 101
4.2. Energy-Aware Routing for Sensor Networks 102
4.3. Altruists or Friendly Neighbors in the Pico Radio Sensor Network 109
4.3.1. Energy-Aware Routing 111
4.3.2. Altruists or Friendly Neighbors 114
4.3.3. Analysis of Energy Aware and Altruists Routing Schemes 116
4.4. Aggregate Queries in Sensor Networks 120
4.4.1. Aggregation Techniques 125
4.4.2. Grouping 133
4.5. Summary 135
Problems 136
Learning Objectives 136
Practice Problems 137
Practice Problem Solutions 137
5 Distributed Sensor Networks 141
5.1. Introduction 141
5.2. Bluetooth in the Distributed Sensor Network 142
5.2.1. Bluetooth Components and Devices 144
5.2.2. Bluetooth Communication and Networking 146
5.2.3. Different Technologies 151
5.3. Mobile Networking for Smart-Dust 154
5.3.1. Smart-Dust Technology 154
5.3.2. Communication and Networking 159
5.4. Summary 162
Problems 163
Learning Objectives 163
Practice Problems 163
Practice Problem Solutions 163
6 Clustering Techniques in Wireless Sensor Networks
6.1. Introduction 165
6.2. Topology Discovery and Clusters in Sensor Networks 166
6.2.1. Topology Discovery Algorithm 169
6.2.2. Clusters in Sensor Networks 171
6.2.3. Applications of Topology Discovery 177
6.3. Adaptive Clustering with Deterministic Cluster-Head Selection 181
6.4. Sensor Clusters’ Performance 185
6.4.1. Distributed Sensor Processing 187
6.5. Power-Aware Functions in Wireless Sensor Networks 192
6.5.1. Power Aware Software 196
6.6. Efficient Flooding with Passive Clustering 198
6.6.1. Passive Clustering 203
6.7. Summary 207
Problems 208
Learning Objectives 208
Practice Problems 209
Practice Problem Solutions 209
7 Security Protocols for Wireless Sensor Networks 213
7.1. Introduction 213
7.2. Security Protocols in Sensor Networks 214
7.2.1. Sensor Network Security Requirements 216
7.2.2. Authenticated Broadcast 219
7.2.3. Applications 223
7.3. Communication Security in Sensor Networks 225
7.4. Summary 230
Problems 230
Learning Objectives 230
Practice Problems 231
Practice Problem Solutions 231
8 Operating Systems for Embedded Applications 235
8.1. Introduction 235
8.2. The Inferno Operating System 236
8.3. The Pebble Component-Based Operating System 242
8.3.1. Protection Domains and Portals 246
8.3.2. Scheduling and Synchronization 250
8.3.3. Implementation 253
8.3.4. Embedded Applications 258
8.4. Embedded Operating System Energy Analysis 264
8.5. Summary 270
Problems 271
Learning Objectives 271
Practice Problems 272
Practice Problem Solutions 272
9 Network Support for Embedded Applications 275
9.1. Introduction 275
9.2. Bluetooth Architecture 277
9.3. Bluetooth Interoperability with the Internet and Quality of Service 283
9.4. Implementation Issues in Bluetooth-Based Wireless Sensor Networks 288
9.5. Low-Rate Wireless Personal Area Networks 297
9.6. Data-Centric Storage in Wireless Sensor Networks 306
9.7. Summary 314
Problems 315
Learning Objectives 315
Practice Problems 315
Practice Problem Solutions 316
10 Applications of Wireless Sensor Networks 323
10.1. Introduction 323
10.2. Application and Communication Support for Wireless Sensor Networks 325
10.3. Area Monitoring and Integrated Vehicle Health Management Applications 334
10.3.1. Development Platform 338
10.3.2. Applications 343
10.4. Building and Managing Aggregates in Wireless Sensor Networks 345
10.5. Habitat and Environmental Monitoring 349
10.5.1. Island Habitat Monitoring 350
10.5.2. Implementation 355
10.6. Summary 360
Problems 362
Learning Objectives 362
Practice Problems 362
Practice Problem Solutions 363
References 369
Index 385

PREFACE
The emergence of compact, low-power, wireless communication sensors
and actuators in the technology supporting the ongoing miniaturization of
processing and storage, allows for entirely new kinds of embedded system.
These systems are distributed and deployed in environments where they
may not have been designed into a particular control path, and are often very
dynamic. Collections of devices can communicate to achieve a higher level of
coordinated behavior.
Wireless sensor nodes deposited in various places provide light, temperature,
and activity measurements. Wireless nodes attached to circuits
or appliances sense the current or control the usage. Together they form a
dynamic, multi-hop, routing network connecting each node to more powerful
networks and processing resources.
Wireless sensor networks are application-specific, and therefore they have
to involve both software and hardware. They also use protocols that relate to
both the application and to the wireless network.
Wireless sensor networks are consumer devices supporting multimedia
applications, for example personal digital assistants, network computers, and
mobile communication devices. Emerging embedded systems run multiple
applications, such as web browsers, and audio and video communication
applications. These include capturing video data, processing audio streams,
and browsing the World Wide Web (WWW). There is a wide range of data
gathering applications, energy-agile applications, including remote climate
monitoring, battlefield surveillance, and intra-machine monitoring. Example
applications are microclimate control in buildings, environmental monitoring,
home automation, distributed monitoring of factory plants or chemical
processes, interactive museums, etc. An application of collective awareness
is a credit card anti-theft mode. There is also a target tracking application,
and applications ranging from medical monitoring and diagnosis to target
detection, hazard detection, and automotive and industrial control. In short,
there are applications in military (e.g. battlefields), commercial (e.g. distributed
mobile computing, disaster discovery systems, etc.), and educational
environments (e.g. conferences, conventions, etc.) alike.
This book introduces networked embedded systems, smart sensors, and
wireless sensor networks. The focus of the book is on the architecture,
applications, protocols, and distributed systems support for these networks.
Wireless sensor networks use new technology and standards. They involve
small, energy-efficient devices, hardware/software co-design, and networking
support. Wireless sensor networks are becoming an important part of
everyday life, industrial and military applications. It is a rapidly growing area
as new technologies are emerging, and new applications are being developed.
The characteristics of modern embedded systems are the capability to communicate
over the networks and to adapt to different operating environments.
Designing an embedded system’s digital hardware has become increasingly
similar to software design. The wide spread use of hardware description
languages and synthesis tools makes circuit design more abstract. A cosynthesis
method and prototyping platform can be developed specifically for
embedded devices, combining tightly integrated hardware and software
components.
Users are demanding devices, appliances, and systems with better capabilities
and higher levels of functionality. In these devices and systems, sensors
are used to provide information about the measured parameters or to identify
control states. These sensors are candidates for increased built-in intelligence.
Microprocessors are used in smart sensors and devices, and a smart sensor
can communicate measurements directly to an instrument or a system. The
networking of transducers (sensors or actuators) in a system can provide flexibility,
improve system performance, and make it easier to install, upgrade
and maintain systems.
The sensor market is extremely diverse and sensors are used in most
industries. Sensor manufacturers are seeking ways to add new technology in
order to build low-cost, smart sensors that are easy to use and which meet
the continuous demand for more sophisticated applications. Networking is
becoming pervasive in various industrial settings, and decisions about the use
of sensors, networks, and application software can all be made independently,
based on application requirements.
The IEEE (Institute of Electrical and Electronics Engineers) 1451 smart
transducer interface standards provide the common interface and enabling
technology for the connectivity of transducers to microprocessors, control
and field networks, and data acquisition and instrumentation systems. The
standardized Transducer Electronic Data Sheet (TEDS) specified by IEEE
1451.2 allows for self-description of sensors. The interfaces provide a standardized
mechanism to facilitate the plug and play of sensors to networks.
The network-independent smart transducer object model, defined by IEEE
1451.1, allows sensor manufacturers to support multiple networks and protocols.
This way, transducer-to-network interoperability can be supported.
IEEE standards P1451.3 and P1451.4 will meet the needs of analog transducer
users for high-speed applications. Transducer vendors and users, system integrators,
as well as network providers can benefit from the IEEE 1451 interface
standards. Networks of distributed microsensors are emerging as a solution
for a wide range of data gathering applications. Perhaps the most substantial
challenge faced by designers of small but long-lived microsensor nodes, is
the need for significant reductions in energy consumption. A power-aware
design methodology emphasizes the graceful scalability of energy consumption
with factors such as available resources, event frequency, and desired
output quality, at all levels of the system hierarchy. The architecture for a
power-aware microsensor node highlights the collaboration between software
that is capable of energy-quality tradeoffs and hardware with scalable
energy consumption.
Power-aware methodology uses an embedded micro-operating system to
reduce node energy consumption by exploiting both sleep state and active
power management. Wireless distributed microsensor networks have gained
importance in awide spectrum of civil and military applications. Advances in
MEMS (Micro Electro Mechanical Systems) technology, combined with lowpower,
low-cost, Digital Signal Processors (DSPs) and Radio Frequency (RF)
circuits have resulted in feasible, inexpensive, wireless microsensor networks.
A distributed, self-configuring network of adaptive sensors has significant
benefits. They can be used for remote monitoring in inhospitable and toxic
environments. A large class of benign environments also requires the deployment
of a large number of sensors, such as intelligent patient monitoring,
object tracking, and assembly line sensing. The massively distributed nature
of these networks provides increased resolution and fault tolerance as compared
with a single sensor node. Networking a large number of low-power
mobile nodes involves routing, addressing and support for different classes
of service at the network layer. Self-configuring wireless sensor networks
consist of hundreds or thousands of small, cheap, battery-driven, spread-out
nodes, bearing a wireless modem to accomplish a monitoring or control task
jointly. Therefore, an important concern is the network lifetime: as nodes
run out of power, the connectivity decreases and the network can finally be
partitioned and become dysfunctional.
Deployment of large networks of sensors requires tools to collect and
query data from these networks. Of particular interest are aggregates whose
operations summarize current sensor values in part or all of an entire sensor
network. Given a dense network of a thousand sensors querying for example,
temperature, users want to know temperature patterns in relatively large
regions encompassing tens of sensors, and individual sensor readings are of
little value.
Networks of wireless sensors are the result of rapid convergence of three
key technologies: digital circuitry, wireless communications, and MEMS.
Advances in hardware technology and engineering design have led to reductions
in size, power consumption, and cost. This has enabled compact,
autonomous nodes, each containing one or more sensors, computation and
communication capabilities, and a power supply. Ubiquitous computing is
based on the idea that future computers merge with their environment until
they become completely invisible to the user. Ubiquitous computing envisions
everyday objects as being augmented with computation and communication
capabilities. While such artifacts retain their original use and appearance,
their augmentation can seamlessly enhance and extend their usage, thus
opening up novel interaction patterns and applications. Distributed wireless
microsensor networks are an important component of ubiquitous computing,
and small dimensions are a design goal for microsensors. The energy supply
of the sensors is a main constraint of the intended miniaturization process. It
can be reduced only to a specific degree since energy density of conventional
energy sources increases slowly. In addition to improvements in energy density,
energy consumption can be reduced. This approach includes the use of
energy-conserving hardware. Moreover, a higher lifetime of sensor networks
can be accomplished through optimized applications, operating systems, and
communication protocols. Particular modules of the sensor hardware can be
turned off when they are not needed. Wireless distributed microsensor systems
enable fault-tolerant monitoring and control of a variety of applications.
Due to the large number of microsensor nodes that may be deployed, and the
long system lifetimes required, replacing the battery is not an option. Sensor
systems must utilize minimal energy while operating over a wide range of
operating scenarios. These include power-aware computation and communication
component technology, low-energy signaling and networking, system
partitioning considering computation and communication trade-offs, and a
power-aware software infrastructure. Routing and data dissemination in sensor
networks requires a simple and scalable solution. The topology discovery
algorithm for wireless sensor networks selects a set of distinguished nodes,
and constructs a reachability map based on their information. The topology
discovery algorithm logically organizes the network in the form of clusters
and forms a tree of clusters rooted at the monitoring node. The topology
discovery algorithm is completely distributed, uses only local information,
and is highly scalable.
To achieve optimal performance in a wireless sensor network, it is important
to consider the interactions among the algorithms operating at the
different layers of the protocol stack. For sensor networks, one question is
how the self-organization of the network into clusters affects the sensing
performance. Thousands to millions of small sensors form self-organizing
wireless networks, and providing security for these sensor networks is not
easy since the sensors have limited processing power, storage, bandwidth,
and energy. Aset of Security Protocols for Sensor Networks (SPINS), explores
the challenges for security in sensor networks. SPINS include: TESLA (the
micro version of the Timed, Efficient, Streaming, Loss-tolerant Authentication
Protocol), providing authenticated streaming broadcast, and SNEP (Secure
Network Encryption Protocol) providing data confidentiality, two-party data
authentication, and data freshness, with low overhead. An authenticated
routing protocol uses SPINS building blocks. Wireless networks, in general,
are more vulnerable to security attacks than wired networks, due to the
broadcast nature of the transmission medium. Furthermore, wireless sensor
networks have an additional vulnerability because nodes are often placed in
a hostile or dangerous environment, where they are not physically protected.
The essence of ubiquitous computing is the creation of environments saturated
with computing and communication in an unobtrusive way. WWRF
(Wireless World Research Forum) and ISTAG (Information Society Technologies
Advisory Group) envision a vast number of various intelligent devices,
embedded in the environment, sensing, monitoring and actuating the physical
world, communicating with each other and with humans. The main
features of the IEEE 802.15.4 standard are network flexibility, low cost, and
low power consumption. This standard is suitable for many applications in
the home requiring low data rate communications in an ad hoc self-organizing
network.
The IEEE 802.15.4 standard defines a low-rate wireless personal area
network (LR-WPAN) which has ultra-low complexity, cost, and power, for
low data rate wireless connectivity among inexpensive fixed, portable, and
moving devices. The IEEE 802.15.4 standard defines the physical (PHY)
layer and Media Access Control (MAC) layer specifications. In contrast to
traditional communication networks, the single major resource constraint in
sensor networks is power, due to the limited battery life of sensor devices.
Data-centric methodologies can be used to solve this problem efficiently. In
Data Centric Storage (DCS) data dissemination frameworks, all event data
are stored by type at designated nodes in the network and can later be
retrieved by distributed mobile access points in the network. Resilient Data-
Centric Storage (R-DCS) is amethod of achieving scalability and resilience by
replicating data at strategic locations in the sensor network. Various wireless
technologies, like simple RF, Bluetooth, UWB (ultrawideband) or infrared
can be used for communication between sensors. Wireless sensor networks
require low-power, low-cost devices that accommodate powerful processors,
a sensing unit, wireless communication interface and power source, in a
robust and tiny package. These devices have to work autonomously, to require
no maintenance, and to be able to adapt to the environment. Wireless Sensor
Network Designs focuses on the newest technology in wireless sensor networks,
networked embedded systems, and their applications. A real applicationsoriented
approach to solving sensor network problems is presented. The book
includes a broad range of topics from networked embedded systems and
smart sensor networks, to power-aware wireless sensor networks, routing,
clustering, security, and operating systems along with networks support.
The book is organized into ten chapters, with the goal to explain the newest
sensor technology, design issues, protocols, and solutions to wireless sensor
network architectures.
As previously discussed, Chapter 1 describes networked embedded systems,
their design, prototyping, and application support. Chapter 2 introduces
smart sensor networks and their applications. Chapter 3 introduces
power-aware wireless sensor networks. Routing in wireless sensor networks
and the aggregation techniques are discussed in Chapter 4. Distributed sensor
networks are presented in Chapter 5, and clustering techniques in wireless
sensor networks are introduced in Chapter 6. Chapter 7 presents security
protocols in sensor networks. Operating systems for embedded applications
are discussed in Chapter 8. Chapter 9 presents network support for embedded
applications. Applications of wireless sensor networks are studied in
Chapter 10.

KEYWORDS:
Index
access point (AP), 152
Active Message (AM), 327, 364
actuator, 34, 58, 110, 112
Ad Hoc On Demand Distance Vector
Routing (AODV), 103, 105, 190
address space identifier (ASID), 254, 255
Advanced Configuration and Power
Interface (ACPI), 78
AES-128 (advanced encryption standard
128-bit cryptographic keys), 302
aggregate queries, 120, 121
altruist, 109, 114, 115
analog to digital converter (ADC), 33, 35,
52, 57, 66, 323, 334, 340, 356, 357, 361
application programming interface
(API), 11, 15, 16, 24, 47, 54, 122, 197,
198, 230, 291, 196, 318
application specific integrated circuit
(ASIC), 23, 28, 93
Asynchronous Connectionless (ACL)
link, 276, 282–284, 315, 317
attribute-based addressing, 101
authenticated broadcast, 219, 222
authentication, 241
Automatic Repeat Request (ARQ), 276,
281, 283
base station (BS), 215, 225, 337
base station transceiver (BTS), 151,
156–163
Baseband (BB) protocol, 278
Berkeley Software Distribution (BSD),
258, 259
Binary Phase Shift Keying (BPSK),
305
bit error rate (BER)
Bluetooth, 110, 142, 144–153, 162, 275,
277–288, 290, 293–298, 300, 314–319
broadcasting, 84, 222
C/OS, 265, 271, 341
Carrier Sense Multiple Access (CSMA),
117, 119, 120, 122, 199, 302, 332
carrier sense multiple access / collision
avoidance (CSMA/CA), 104, 110, 159,
302
Cellular IP, 287, 288
central processor unit (CPU), 19, 79, 80,
144, 243, 251
certifying authority (CA), 241
channel interface module (CIM), 46
cipher-block chaining (CBC), 217
class-based addressing, 104, 105
Wireless Sensor Network Designs A. Ha´c
. 2003 John Wiley & Sons, Ltd ISBN: 0-470-86736-1
386 INDEX
cluster head, 71, 72, 181–184, 198,
203–205, 207, 209
cluster, 171, 178, 185, 191, 192, 203, 208,
209
clustering, 81, 181, 198, 199, 202, 319
code generation, 20
codesign and reconfiguration, 2, 9
Complementary Metal-Oxide
Semiconductor (CMOS), 67, 68, 97, 98,
334, 343, 356
condition based maintenance, 24, 58, 325
connectivity map, 177
continuous variable slope delta
modulation (CVSD), 276, 281, 284
controller area network (CAN), 46, 47,
54, 55, 56, 59
Corner Cube Retroreflector (CCR), 156,
157, 160
cosynthesis method and prototyping
platform, 2, 4
counter mode (CTR), 217, 218
cue, 189, 343
Cyclic Redundancy Check (CRC), 276,
281, 283, 301, 317
data aggregation, 67, 70, 193, 194, 293,
319, 349
Data Encryption Standard (DES), 242
Data Encryption Standard – Cipher
Block Chaining (DES-CBC), 218, 242
data fusion, 72
data link layer (DLL), 298, 299, 320
data-centric storage (DCS), 276, 306,
308–310, 314, 322
DES cipher-block chaining (DES-CBC),
242
DES electronic code book (DES-ECB),
242
design integration, 4
Destination Sequenced Distance Vector
Routing protocol (DSDV), 105
Digital Cordless Telephone (DCT), 338,
339, 341
Digital Signal Processing (DSP), 64, 75,
93, 95, 192, 196
direct sequence spread spectrum (DSSS),
152, 302, 305, 321
directed diffusion, 81
Distance Vector Multicast Routing
Protocol (DVMRP), 161
distributed aggregate management
(DAM), 346
distributed hash-table (DHT), 308, 309
Distributed Multidrop System (DMS), 38
distributed sensor networks, 141
dynamic power management (DMP), 76,
79
Dynamic Source Routing (DSR), 190
dynamic voltage scaling (DVS), 64, 68,
69, 73–75, 79, 95, 97–99
dynamically reconfigurable
field-programmable gate array
(DPGA) board, 4–7, 10, 11, 14–19, 29
Electronically Erasable Programmable
Read Only Memory (EEPROM), 54,
122, 333, 356, 357, 361
embedded application, 235, 258, 275
embedded Cygnus operating system
(eCOS), 67, 74, 271
embedded device, 12
embedded operating system, 26, 264, 265
embedded system, 1–8, 12, 64, 261, 357
embedded systems platform, 17
encryption algorithm, 2
energy aware routing (EAR), 101–103,
106, 107, 109–113, 115–117, 119, 120,
136
energy-efficient communication, 81
energy-quality (E-Q), 64, 65, 69, 70, 76,
208
epoch, 224
Ethernet, 47, 56, 111
External Storage (ES), 308
Fast Fourier Transform (FFT), 33, 194
Field Programmable Gate Array (FPGA),
5, 9, 10, 14, 16, 17, 20, 22–30, 93
Finite Impulse Response (FIR), 17, 69
FIR filter, 17, 69, 72, 75, 196
INDEX 387
First Node Dies (FND), 181, 184
flooding, 84, 112, 198, 199, 200, 211
Forward Error Correction (FEC), 195,
196, 276, 281, 283, 317
FPGA architecture, 25
Frame Check Sequence (FCS), 301
Frequency Hopping Spread Spectrum
(FHSS), 153, 154, 275, 283
friendly neighbor, 109, 114
garbage collection, 260
gateway, 147, 198, 204, 205, 290, 291, 293,
295–297, 318, 319, 336, 359
General Purpose Interface Bus (GPIB), 35
Geographical Adaptive Fidelity (GAF),
359
global positioning system (GPS), 186, 199
Global Standard for Mobile (GSM), 188
Great Duck Island (GDI), 351, 352, 358,
359
Greedy Perimeter Stateless Routing
(GPSR), 306, 308, 309, 315, 322
grouping, 133
guaranteed time slots (GTS), 301
Half of the Nodes Alive (HNA), 181, 184
hardware abstraction layer (HAL), 340,
341
hardware and software codesign, 3
Heating, Ventilation, and Air
Conditioning (HVAC), 298
high-level synthesis (HLS), 20, 30
HiperLAN/2, 152
Host Controller Interface (HCI), 144, 146
IEEE 1451 Standards for Smart
Transducer Interface for Sensors and
Actuators, 32–49, 52, 54–61
IEEE 802.11, 82, 114, 115, 150, 152, 206,
298, 299, 358
IEEE 802.15, 152, 276, 298–306,
314–316, 320, 321
IETF Unidirectional Link Routing
Working Group, 161
implicit entry-exit pair (IEEP), 267, 268
IMT2000 (International Mobile
Telecommunication), 23, 24
in-network aggregation, 125, 133, 135
Industry Scientific Medical (ISM), 67,
143, 152, 153, 280, 281, 283, 294, 302,
316, 321, 340
Inferno operating system, 236, 239–241,
261, 274
Information Society Technologies
Advisory Group (ISTAG), 276
infrared data association (IrDA), 279,
286
infrared object exchange (IrOBEX), 279
Integrated Circuit (IC), 302
Integrated Device Technology (IDT), 261
Integrated Electronics, PiezoElectric
(IEPE), 40, 41
Inter Integrated Circuit, 143, 356, 357
International Telecommunication
Union – Telecommunication
Standardization Sector (ITU-T), 301
Internet Engineering Task Force (IETF),
161, 287
Internet Protocol (IP), 42, 203, 204,
286–288, 306, 307, 322
Internet, 4, 12, 46, 283, 317
interprocess communication (IPC), 243,
265, 266, 269, 270
interprotection domain call, 262, 264
interrupt handler, 263
interrupt latency, 263, 264
interrupt service routine (ISR), 265
interrupt, 251, 252, 254
JaCoP (Java driven codesign and
prototyping environment), 2, 12, 13,
16–18, 29
Java Beans specification, 13, 17
Java Native Interface (JNI), 11, 15, 24, 27
Java programming language, 12, 39, 259,
260
Java virtual machine (JVM), 10, 15, 19,
22, 27, 29
Joint Test Action Group (JTAG), 339
388 INDEX
Large Scale Office Scenario (LSOSC),
118, 119, 120
LaserMirror Scanner (LMS), 70
Last Node Dies (LND), 181, 184
Light Emitting Diode (LED), 145
line-of-bearing (LOB), 194
line-of-sight, 161, 164
Link Manager (LM), 278
Link State Routing (LSR), 105
Linked Cluster algorithm (LCA), 191,
192
Linux, 11, 14, 18, 146, 149, 265, 268, 271,
357
local area network (LAN), 46, 150, 286,
287
Local Storage (LS), 308
logical link control (LLC), 278, 299, 300,
320, 321
Logical Link Control and Adaptation
Protocol (L2CAP), 146
Low Energy Adaptive Clustering
Hierarchy (LEACH), 81, 181, 182, 184,
193
Low Power Oscillator (LPO), 281, 282,
284
low-rate wireless personal area network
(LR-WPAN), 298, 301, 306, 314
Management Information Base (MIB),
168
master, 146, 153, 163, 281–285, 294–296,
317, 319
maximum transmission unit (MTU), 279,
286, 317
Media Access Control (MAC), 81, 82, 83,
96, 103, 104, 109–111, 113, 114, 116,
117, 120, 137, 159, 186, 187, 292,
298–304, 314, 320, 321, 324, 332, 358,
359, 360
MAC common part sublayer
(MCPS-SAP), 300, 321
MAC footer (MFR), 300
MAC header (MHR), 300
MAC layer management entity
(MLME-SAP), 300, 321
MAC protocol data unit (MPDU), 300
MAC service data unit (MSDU), 300
message authentication code (MAC),
216, 218–225, 232
Message Digest 4 (MD4), 241
Message Digest 5 (MD5), 221, 241, 242
Micro Controller Unit (MCU), 145
Micro Electro Mechanical Systems
(MEMS), 65, 67, 75, 95, 141, 151, 154,
157, 161, 165, 192, 288, 292, 314, 334,
345
micro-Adaptive Multi-domain
Power-aware Sensors (µAMPS), 71,
72, 73, 84, 95
micro-TESLA, 213–215, 217, 220–222,
224, 230, 231, 233
microcontroller, 35
microprocessor, 31, 58
microsensor, 35, 64, 65, 72, 77, 81, 192,
338
Million Instructions Per Second (MIPS),
92, 144, 236, 243, 245, 253, 254, 261
minimum shift keying (MSK), 305
mobile ad hoc network (MANET), 185,
187, 190, 198–201, 203, 208
Mobile IP, 287
mote, 121, 152, 156–158, 359
Motion Pictures Experts Group (MPEG),
237, 260
MPR Node (MPRN), 201
multifunction systems, 2
multimode systems, 2
Multipoint Relay (MPR), 201–103
Network Capable Application Processor
(NCAP), 36–38, 43, 45–49, 52–56, 59,
61
networked embedded system, 2, 9,
11–30
nucleus, 251, 253, 255
object-oriented design, 3, 13, 88
Offset Quadrature Phase Shift Keying
(O-QPSK), 305
Open Shortest Path First (OSPF), 161
INDEX 389
open systems interconnection (OSI)
reference model, 299
operating system (OS), 235, 236,
242–245, 264, 266–270, 273, 341
operation, administration, and
maintenance (OA&M), 237
output feedback mode (OFB), 217
passive clustering, 198–200, 203–207,
210
PC Interface (PCI), 5, 11, 15, 18, 23, 24
Pebble operating system, 235, 242–245,
252, 253, 255, 257–259, 261, 271, 273
Perimeter Refresh Protocol, 309
Personal Area Network (PAN), 152, 301,
302
Personal Computer (PC), 4, 5, 14, 18, 19,
125, 277, 285, 291, 297–299, 320, 341
personal digital assistant (PDA), 23, 24,
153, 188, 259, 275, 277, 286, 291, 298,
352, 355
Phase Lock Loop (PLL), 68, 69, 73
physical (PHY) layer, 298, 300, 314, 321
physical layer protocol data unit
(PPDU), 304
physical layer service data unit (PSDU),
304
piconet, 146, 147, 153, 282, 284, 294, 296,
316, 317, 319
Plan 9 operating system, 238, 244
plug-and-play, 58
Point Coordination Function (PCF), 114
portal manager, 253, 274
portal traversal, 248
portal, 244, 246, 247, 249, 250, 252,
255–258, 261, 271, 272, 273, 336
power management (PM), 76, 78
power-aware design, 65
power-aware wireless sensor networks,
63
Printed Circuit Board (PCB), 73
profiling, 3
programming language C++, 242, 260,
327
programming language C, 145, 238–240,
242, 258, 260, 271, 340, 341, 364
programming language Limbo, 238, 239,
240, 259
programming language Pascal, 238
protection domain (PD), 246–249, 272
Pseudo-Noise (PN), 305
Quality of Service (QoS), 2, 93, 152, 283,
305, 315
Quantum Effect Design (QED), 261
radio frequency (RF), 75, 95, 154, 162,
192, 215, 275, 278, 288, 290, 314, 318,
323, 330, 340
random access memory (RAM), 7, 18, 52,
54, 57, 58, 67, 133
reachability map, 177
Read Only Memory (ROM), 54, 67
Received Signal Strength Indicator
(RSSI), 84, 281
Reduced Instruction Set Computer
(RISC), 18, 93, 144, 153, 335, 339
request to send / clear to send
(RTS/CTS), 159
Resilient Data-Centric Storage (R-DCS),
276, 307, 310, 312
Resource Reservation Protocol (RSVP),
288
reuse library, 3
RF Module (RFM), 122
RFCOMM, 279
RFM (RF Monolithics), 330, 331, 355
Route Reply (RREP), 106
Route Request (RREQ), 105, 106
Routing Information Protocol (RIP), 161
routing, 123, 190
RS232, 143, 144, 339, 341
run-time system (RTS), 20, 22, 23
runtime management, 15
S-MAC (sensor-MAC), 360
scatternet, 153, 294, 295, 316, 319
scratch-pad memory, 7
Secure Hash Algorithm (SHA), 241, 242
390 INDEX
Secure Network Encryption Protocol
(SNEP), 213, 217–219, 221, 223, 225,
230
Security Protocols for Sensor Networks
(SPINS), 213, 216, 217, 223, 230, 231
self-configuring wireless sensor
network, 109
self-organizing wireless network, 276
semaphore, 247, 250, 262
sensor fusion, 338
Serial Peripheral Interface (SPI) protocol,
52, 339
service access point (SAP), 299, 300
Service Discovery Protocol (SDP), 296
service-specific convergence sublayer
(SSCS), 299, 300, 321
signal to interference ratio (SIR)
signal to noise ratio (SNR), 66, 96
Simple Mail Transfer Protocol (SMTP),
355
simulated annealing, 8
sink, 112, 118, 176
slave, 146, 147, 153, 163, 281–285, 294,
295, 317, 319
Small to Medium Enterprise (SME),
56
Smart Dust, 151, 152, 154, 158, 159,
164
smart sensor, 31, 34, 58, 121
Smart Transducer Interface Module
(STIM), 37–41, 43, 45–49, 51–56, 58,
61
software synthesis, 4
source, 112, 138
special function register (SFR), 57, 58
specification, 3
static RAM (SRAM), 144, 339, 340
station-to-station (STS), 241
steam-based function (SBF), 25
StrongARM, 67–69, 72, 76, 78, 84, 339,
357
Structured Query Language (SQL), 102,
121, 124, 126, 134, 135, 347
Structured Replication in DCS (SR-DCS)
scheme, 309
Styx protocol, 238
Surface Mount Device (SMD), 151
symmetric block cipher (RC6), 227
symmetric key stream cipher (RC4), 242
Synchronous Connection Oriented
(SCO) link, 276, 282–284, 315, 317
synthesis, 9
system call entry-exit pair (SCEEP), 267,
268
System Developers Toolkit (SDT), 341
system programming interface (SPI), 53,
145
Systems Performance Evaluation
Consortium (SPEC92), 92
target tracking, 214
thread, 6, 190, 248, 251, 262–264
Time Division Duplex (TDD), 283, 294
time division multiple access (TDMA),
160, 337, 341, 358
Timed, Efficient, Streaming,
Loss-tolerant Authentication Protocol
(TESLA), 215, 220
TinyOS, 152, 323, 324, 326–328, 330–333,
360, 362, 364
topology discovery, 166, 169, 171, 177,
209
Transaction Control Protocol (TCP), 288
Transaction Control Protocol/Internet
Protocol (TCP/IP), 36, 46, 279, 286,
317, 358
Transducer Bus Interface Module
(TBIM), 38, 43, 47, 48, 60
Transducer Electronic Data Sheet
(TEDS), 32, 33, 38, 39, 42–44, 47–49,
51, 54, 57–59, 60
Transducer Independent Interface (TII),
37, 49, 51, 54, 57
translation lookaside buffer (TLB), 243,
253–255
transmit power control (TPC), 152
ubiquitous computing, 325
Ultra Wide Band (UWB), 288, 290, 314,
318
INDEX 391
universal asynchronous receiver
transmitter (UART), 144, 145, 326, 330
Universal Serial Bus (USB), 144
Unix, 236, 240, 256, 257, 260, 262
untrusted location, 215
User Datagram Protocol (UDP), 286
Very Large Scale Integration (VLSI), 64,
85, 92, 95
VHDL (VHSIC Hardware Description
Language), 4, 10, 14, 22, 30, 325
VHSIC (Very High Scale Integrated
Circuit), 325
VHSIC Hardware Description Language
(VHDL), 4, 10, 14, 22, 30, 325
vibration sensors, 32–34
Video Cassette Recorder (VCR), 298
virtual memory (VM), 11, 15, 243, 248,
249, 253
VLSI systems, 64, 85, 97
voltage controlled oscillator (VCO), 68
weak freshness, 219, 232
Web-based applications, 3
wide area network (WAN), 353, 354
wireless application protocol (WAP),
279, 286
Wireless Integrated Network Sensors
(WINS), 162, 324, 334–338, 340, 341,
343–345, 362, 363, 365, 366
Wireless Local Area Network (WLAN),
150, 152
Wireless World Research Forum
(WWRF), 276
World Wide Web (WWW), 2
zone routing protocol (ZRP), 190, 191

Google : The top most search engine

Google : MAGIC BOX

nRelate - Posts and Homepage

LinkWithin

Related Posts Plugin for WordPress, Blogger...

Which is the toughest subject ?