Yi-Bing Lin and Ai-Chun Pang, Wireless and Mobile All-IP Networks, errata and notes

Notes written by G. Q. Maguire Jr. for use with the course 2G1330: Wireless and Mobile Network Architectures (Arkitekturer för trådlösa och mobila nätverk)

This document containts notes and errata concerning:
Yi-Bing Lin and Ai-Chun Pang,
Wireless and Mobile All-IP Networks,
John Wiley & Sons; 2005, ISBN: 0-471-74922-2.


On pages vii and later on page 39, there is a reference to http://liny.csie.nctu.edu.tw/supplementary as containing "equivalent materials" to chapters 9 and 18 in the earlier book: Yi-Bing Lin and Imrich Chlamtac, John Wiley & Sons; 2001 ISBN: 0-471-39492-0 . However, this is URL (as of 2007.01.05) only had a URL to a PowerPoint file containing the table of contents and a PDF file of solutions to some of the modeling problems.

Chapter 1

Note that the statistics in section 1.1.2 do not indicate the system which they are from

pg. 8, "theyfailed" should be "they failed"

pg. 17, note that TCP port number 1122 is a registered port and not register by these authors

pg. 19, note that the fixed witing time of 1000 seconds at line 16 in figure 1.13 is an example of bad coding: in not using a defined constant, in being at the top of the loop, and being nearly 15 minutes - much better would be to wait until there is a message, by waiting on an event or I/O.

pg. 21, note that the "instant transmission" is not really "instant" nor does it imply rapid delivery to the recipient; additionally it says nothng about the queuing delays at the SMSC. For more about the later see: Adrian Mahdavi, " Value Added Services and Content Platforms", M.Sc. Thesis Report, Institutionen för Mikroelektronik och Informationsteknik (IMIT), Royal Institute of Technology (KTH), June 2003.

pg. 22, note that the "Volume" is not really the size of the last transaction, but rather the number of shares traded upto this point of the day

pg. 27, "a message in a group of phones" should be "a message to a group of phones"

pg. 29, note that the it is possible with most GSM phones to transfer the phone book in the phone to a file on the SIM card, then move this SIM card to another phone or load the phone book from this card into a phone (it is also possible to transfer this file to and from a computer using a SIM card reader).

Chapter 2

Chapter 3

Chapter 4

pg. 111, The IPv6 addresses used of the form 2002:1234:5678:1111:2222:3333:4444:xxxx should not have been used as 2002:0000::/16 is reserved for 6to4 use; while 2001:DB8::/32 is reserved for documentation use (hence should have been used here). Additionally the example range of 2002:1234:5678:1111:2222:3333:4444:001 to 2002:1234:5678:1111:2222:3333:4444:fffe - represened as failure to understand how the low order 64 bits are likely to be used - since they are most like to be generated based on the interface's MAC address. Further more the range is only 65,533 entries long!

Chapter 5

Chapter 6

Chapter 7

Chapter 8

Chapter 9

pg. 231, A clear issue in section 9.2.1 is how do you know which one is really the fake

pg. 235 section 9.2.2, note that the valid user U is not denied service!

pg. 242 section 9.3, the comment about avoiding eavesdropping by purchasing your own handset and investigating your bill is rather naïve as the user has very little way of knowing if the phone really contains the software that it should, not that that software does not have eavesdropping features built-in. Additionally, in many countries per call billing records cost extra, hence many users only see aggregated amounts on their bill. Finally of course, there is little that is done to authenticate the bills which are received - so it may be possible for a user to be fooled for quite sometime (perhaps for ever) - assuming that the adversary is willing to expend sufficient funds to do so.

Chapter 10

Chapter 11

Chapter 12

Chapter 13

Chapter 14

pg. 255, section 14.1., it might have been simpler to state in the second paragraph of "Service aspects" that the push to establish communication can come via any of the available network connections which can receive this incoming traffic (such as SMS in the case of GPRS or simply via the WLAN). Of course if the use is connected via WLAN then there really isn't a need for a push - assuming that their SIP client is running and listening for incoming INVITEs.

Chapter 15

pg 409, section 15.6 suggests that the "almost free" fixed internet access business model should be re-investigated, but other than saying that "Wireless Internet needs a new model so that end-user will be willing to pay for secure, convenient wireless data service" - the authors fail to state what evidence there is to support the assertion that the users would be willing to pay or that there is a need to greater security than the user is used to on the fixed internet. The authors go on to assert that there is a need for market stratification - but don't give any basis for this assertion.

Chapter 16

pg. 424, section 16.2.1, the authors seem to indicate that if IMS verification was not required that user B could send a valid registration for user A. However, this seems to ignore the fact that there is generally some authentication as part of the SIP REGISTER request, hence it is not clear how user B would be able to fake this authentication. What is clear is that the added mechanism of the Multimedia Authentication Request Parameter and the Multimedia Authentication Answer Parameter - are not really needed.

Chapter 17

pg. 428, section 16.2.2. figure 16.11 - it should be emphasized that the value of delta is not only be less than one, but is likely to be much less than one (see page 426) - hence there is actually very little difference between the curves - so the results are essentially independent of the number of elements in the AV array. Hence the difference between the one-pass and two-pass solution is only a factor of 2. In addition, since this process only concerns identification and not sending of any content, it is not clear that for a mobile device that is ever used for making or receivign a call that there is any real difference.

pg. 432, section 16.3 - while some storage space can be saved with the proposed scheme, this should be put into context. For example, section 17.1.2 on page 447 points out that 1Gb of storage is affordable for many customers - so is the storage space savings actually significant?

Offical disclaimer required by KTH central administration

Detta är en personlig hemsida och åsikter framförda här eller i tillhandahållna länkar representerar inte KTH.

This is a personal homepage. Opinions expressed here or implied by links provided, do not represent the official views of KTH.

For information contact maguire@it.kth.se
Latest update 11 January 2007
© 2007 G. Q. Maguire Jr., KTH/ICT

Valid HTML 4.01 Transitional