Home > Store

Principles of Wireless Networks: A Unified Approach

Register your product to gain access to bonus material or receive a coupon.

Principles of Wireless Networks: A Unified Approach


  • This product currently is not for sale.
Not for Sale



  • First single volume to integrate all aspects of wireless communications and networking independent of a specific standard.
    • Addresses the needs of a wide variety of students. Ex.___

  • Essential aspects common to a variety of wireless systems.
    • Allows students to see the similarity hidden in the diversity of wireless networks by addressing the overlaps in the design of the physical layer, medium access, network planning and deployment, and network operation in systems such as cellular voice networks and wireless local area networks (WLANs). Ex.___

  • Overview of the evolution of the major wireless standards and products—For voice and data applications, as well as the principles of design and operation of wireless networks.
    • Allows students to understand the context for the current state of wireless technology, and to begin building a framework for understanding future advances in wireless technology. Ex.___

  • Examples of current popular wireless networks.
    • Allows students to apply the principles presented early in the book to real-world examples of actual networks. Ex.___


  • Copyright 2002
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-093003-2
  • ISBN-13: 978-0-13-093003-3

A unified foundation for understanding and building any wireless network.

  • A true systems approach to wireless networking
  • Air interference design and network operation
  • Planning, mobility management, radio resources, power management, and security
  • 3G, WLANs, HIPERLAN, WATM, Bluetooth, WPAN, OFDM, UWB, wireless geolocation, and more

This is the first book to present a unified common foundation for understanding and building any contemporary wireless network, voice or data—from PCS to wireless LANs, Bluetooth to IMT-2000 3G. Using extensive practical examples, Kaveh Pahlavan and Prashant Krishnamurthy present a true systems approach, illuminating the principles, commonalities, key differences, and specific implementation issues associated with virtually every leading wireless system. Coverage includes:

  • Air interference design: wireless medium characteristics, media access, and an exceptionally thorough discussion of physical layer issues
  • Wireless network operation: planning, mobility management, radio resources, power management, and security
  • Implementation of cellular telephone and mobile data networks based on CDMA, TDMA, and GSM
  • Key wideband local access technologies: IEEE 802.11 WLANs, HIPERLAN, and connection-based voice-oriented WATM
  • Emerging OFDM and Ultrawideband (UWB) technologies
  • Ad hoc networking, Bluetooth, and WPAN
  • Wireless geolocation and indoor positioning techniques and systems
  • The most detailed discussions of channel characteristics and deployment tools available in any book

Whether you're an electrical engineer, telecommunications/networking specialist, or software professional, Principles of Wireless Networks brings together the insights and techniques you need to begin building any wireless system.

Sample Content

Online Sample Chapter

Wireless Networks: Where We Are, Where We're Headed

Table of Contents

1. Overview of Wireless Networks.

Introduction. Different Generations of Wireless Networks. Structure of the Book. Appendix 1A Backbone Networks for Wireless Access. Appendix 1. Summary of Important Standards. Organizations. Questions.


2. Characteristics of the Wireless Medium.

Introduction. Radio Propagation Mechanisms. Path-Loss Modeling and Signal Coverage. Effects of Multipath and Dopple. Channel Measurement and Modeling Techniques. Simulation of the Radio Channel. Appendix 2A What is dB? Appendix 2B Wired Media. Appendix 2C Path Loss Models. Appendix 2D Wideband Channel Models. Questions. Problems.

3. Physical Layer Alternatives for Wireless Networks.

Introduction. Applied Wireless Transmission Techniques. Short Distance Baseband Transmission. Pulse Transmission. Carrier Modulated Transmission. Traditional Digital Cellular Transmission. Broadband Modems for Higher Speeds. Spread Spectrum Transmissions. High-Speed Modems for Spread Spectrum Technology. Diversity and Smart Receiving Techniques. Comparison of Modulation Schemes. Coding Techniques for Wireless Communications. A Brief Overview of Software Radio. Appendix 3APerformance of Communication Systems. Appendix 3BCoding and Correlation. Questions. Problems.

4. Wireless Medium Access Alternatives.

Introduction. Fixed-Assignment Access for Voice-Oriented Networks. Random Access for Data-Oriented Networks. Integration of Voice and Data Traffic. Questions. Problems.


5. Network Planning.

Introduction. Wireless Network Topologies. Cellular Topology. Cell Fundamentals. Signal-to-Interference Ratio Calculation. Capacity Expansion Techniques. Network Planning for CDMA Systems. Questions. Problems.

6. Wireless Network Operation.

Introduction. Mobility Management. Radio Resources and Power Management. Security in Wireless Networks. Appendix 6A The Diffie-Hellman (DH) Key Exchange Protocol. Appendix 6B Nonrepudiation and Digital Signatures. Questions. Problems.


7. GSM and TDMA Technology.

Introduction. What Is GSM? Mechanisms to Support a Mobile Environment. Communications in the Infrastructure. Questions. Problems.

8. CDMA Technology, IS-95, and IMT-2000.

Introduction. Reference Architecture for North American Systems. What Is CDMA? IMT-2000. Questions. Problems.

9. Mobile Data Networks.

Introduction. The Data-Oriented CDPD Network. GPRS and Higher Data Rates. Short Messaging Service in GSM. Mobile Application Protocols. Questions. Problems.


10. Introduction to Wireless LANs.

Introduction. Historical Overview of the LAN Industry. Evolution of the WLAN Industry. New Interest from Military and Service Providers. A New Explosion of Market and Technology. Wireless Home Networking. Questions. Problems.

11. IEEE 802.11 WLANs.

Introduction. What Is IEEE 802.11? The PHY Layer. MAC Sublayer. MAC Management Sublayer. Questions. Problems.

12. Wireless ATM and HIPERLAN.

Introduction. What Is Wireless ATM? What Is HIPERLAN? HIPERLAN-2. Questions. Problems.

13. Ad Hoc Networking and WPAN.

Introduction. What Is IEEE 802.15 WPAN? What Is HomeRF? What Is Bluetooth? Interference between Bluetooth and 802.11. Questions. Problems.

14. Wireless Geolocation Systems.

Introduction. What Is Wireless Geolocation? Wireless Geolocation System Architecture. Technologies for Wireless Geolocation. Geolocation Standards for E-911 Services. Performance Measures for Geolocation Systems. Questions. Problems.

Acronyms and Abbreviations.



Wireless networking has emerged as its own discipline over the past decade. From cellular voice telephony to wireless access to the Internet and wireless home networking, wireless networks have profoundly impacted our lifestyle. After a decade of exponential growth, today's wireless industry is one of the largest industries in the world. At the time of this writing, close to one billion people subscribe to cellular services, close to 200 billion GSM short messages are exchanged yearly, and the penetration of the cellular telephone in Finland exceeded 75%, the highest in the world. In response to this growth, a number of universities and other educational institutions have started wireless research and teaching programs and a number of engineers and scientists are re-educating themselves in this field. There are a number of recent textbooks in the general area of networking that also address some aspects of wireless networks. The treatment in these books is not adequate because design and analysis of wireless networks are very different from wired networks. In wireless networks the complexity resides in the design of air-interface and support of mobility, neither of which play a dominant role in wired networks. Therefore, we have always needed a comprehensive textbook on wireless networks that provides a deeper understanding of the issues specific to the wireless networks.

In 1995 when wireless networking was an emerging discipline, the principal author, along with Allen Levesque, wrote the first comprehensive textbook in Wireless Information Networks that addressed cellular and PCS systems as well as mobile data and wireless LANs. Wireless-related books published prior to that book were focused on analog cellular systems. Wireless Information Networks covered 2G digital cellular systems, had significant emphasis on physical layer issues, and was written for students with background in electrical engineering, especially communications and signal processing. With the growth of the wireless industry in the latter part of the past decade, several books have emerged that explain the latest developments of specific standards or groups of standards like GSM, IS-95, W-CDMA, wireless LANs and Bluetooth. However, there is no textbook that integrates all the aspects of current wireless networks together. In this book, like the previous book, we address the need for a comprehensive treatment that provides a unified foundation of principles of all voice- and data-oriented wireless networks. The novelty of this book is that it covers 3G and wireless broadband ad hoc networking as well as 2G legacy systems, places emphasis on higher-layer communications issues, and is written for software and systems engineers as well as modern telecommunications engineers with electrical engineering or computer science backgrounds.

Traditionally, voice-oriented wireless networks have been the focus of books on wireless systems. However, with the exponential growth of the Internet, wireless data-oriented networks are also becoming very popular. The third generation (3G) wide area cellular systems are designed to support several hundreds of kbps with comprehensive coverage and up to 2 Mbps for local selected zones. Even before the emergence of 3G services, mobile data networks such as the general packet radio service (GPRS) over TDMA systems and high-speed packet data over CDMA systems are becoming increasingly popular. At the same time, after the introduction of Bluetooth technology in 1998, local broadband and ad hoc wireless networks have attracted tremendous attention. This sector of the wireless networking industry includes the traditional wireless local area networks (WLANs) and the emerging wireless personal area networks (WPANs). Wireless broadband and ad hoc networking is expected to create a revolution in the future of Internet access, home networking, and wireless consumer products. While there is a plurality of standards and a differentiation between voice and data networks, the essential aspects of wireless systems remain the same. We see that wireless networks share a common foundation in the design of the physical layer, medium access, network planning and deployment, and network operation. Principles of Wireless Networks: A Unified Approach emphasizes this similarity hidden in the diversity of wireless networks.

The structure and sequence of material for this book was first formed in a lecture series by the principal author at Digital Equipment Corporation in 1996. The principal author also taught shorter versions of the course focused on broadband and ad hoc networking in several conferences and industrial forums. The core of the book is based on presentation material and reference papers prepared by the principal author for a course called "Wireless Mobile Data Networks" first taught in spring 1999 as a fourteen-week, 3 hour/week graduate course at Worcester Polytechnic Institute, Massachusetts. In summer 1999, he also taught another ten-week, 3 hour/week, version of the course titled "Advances in Wireless Networks" at the University of Oulu, Finland. The co-author of the book has taught material from this book in spring 2000 and summer 2001 at the University of Pittsburgh in a course entitled Mobile Data Networks. These courses were taught for students with electrical engineering, computer science, and networking backgrounds, both from the academia and the industry.

Providing an overall organization for understanding both legacy voice-oriented and emerging data-oriented wireless networks for a diverse audience comprising managers, engineers, scientists, and students who need to understand this industry is very challenging. If we provide an in-depth treatment of specific topics related to the air-interface, such as channel modeling or modem design, we lose the overall systems-engineering perception. If we avoid the details of air-interface, there will be no wireless content, as this forms the core of the difference between wireless and wired networks. Our approach has been to try striking a balance between intuitive understanding of the wireless medium and detailed aspects of the system. We divide the topics in three categories: (1) overview, comparative evaluation, and logical classification of important standards, (2) explanation of principles of design and analysis of wireless networks, and (3) detailed description of important wireless systems. Overview of the popular standards is treated in Chapter one. Principles of wireless network design and analysis is divided into principles of air-interface design (Chapters 2-4) and principles of network deployment and operation (Chapters 5-6). System descriptions are divided into two parts covering legacy wide area wireless networks (Chapters 7-9) and emerging broadband local and ad hoc wireless networks (Chapters 10-14). The partitioned structure of the book allows flexibility in teaching the material and makes it easier for the text to be used as a reference book as well. Therefore, depending on selection of the material, depth of the coverage, and background of the students, this book can be used for senior undergraduate or first- or second-year graduate courses in computer science (CS), telecommunications, electrical and computer engineering (ECE), or electrical engineering (EE) departments as one course or a sequence of two courses.

In the last offering of the course at WPI to ECE and CS students, the first two weeks were devoted to the introduction of wireless networks. The first week was a lecture entitled "Overview of Wireless Networks" from Chapter 1 that provided the overall structure of the standards and trends in wireless networks. The second week was a lecture on "Overview of Networking Aspects" from Chapter 5 that clarified the technical issues that are related to wireless networks. The next part of the course (about six weeks) involved the detailed technical aspects of wireless networks. This part began with a lecture on "Characteristics of Wireless Medium" from Chapter 2. The next lectures in this sequence were from Chapter 5, "Principles of Network Planning" that spanned two weeks. This was followed by "PHY Layer Alternatives" from Chapter 3 that together with the next lecture on "Medium Access Alternatives" took three weeks. At this stage students were ready to understand the details of standards so that a two-week lecture on "GSM--An Example of TDMA Technology" could follow. This was a detailed treatment of an overall structure of GSM from Chapter 7. This lecture was followed by a one-week lecture on "CDMA Technology: IS-95 and IMT-2000" from Chapter 8. Wireless broadband and ad hoc networks formed the last four weeks of the course with the first lecture on "Wireless LANs and IEEE 802.11" from Chapters 10 and 11 followed by a one-week lecture from Chapters 12 and 13 on "Voice-Oriented HIPERLAN-2 and Bluetooth." We spent approximately two weeks on administration of the exams and presentations by students. The students had weekly homework that consisted of a set of questions and some problems relevant to the lecture. They were also required to do a mandatory project on handoff and an optional term paper.

The Finnish version taught at the University of Oulu to EE and CS students roughly covered the same material in ten three-hour lectures. In a period of several months after the lectures, two examinations were arranged, and the students performed a project mandated for completion of the course. The emphasis on lectures in Finland was on the last part of the book as students had prior exposure to GSM and W-CDMA systems. The principal author has also used the last five chapters of this book with parts of Stalling's book Local & Metropolitan Area Networks in a 30-hour lecture course entitled "Wired and Wireless LANs" at the University of Oulu for students from university and the industry in the summer of 2001. The flexibility in using the book can be seen from the course "Mobile Data Networks" taught by the co-author of the book in spring 2000 and summer 2001 at the University of Pittsburgh. The course spanned a quick review of the first part of the book and some parts of Chapter 7 followed by Chapters 9-14 that primarily considered wireless data networks.

Most of the writing and preparations of the principal author took place in several months of his teachings and scholarship at the University of Oulu, Finland, as the first non-Finn Nokia Fellow in 1999 and the first Fulbright-Nokia scholar in 2000. He would like to express his deep appreciation to Nokia Foundation, Fulbright Foundation, University of Oulu, and Worcester Polytechnic Institute for allowing these opportunities to occur. In particular he appreciates the help of Prof. Pentti Leppanen, director of the Telecommunication Laboratory at the University of Oulu, for his continual encouragement and creative administrative support and Dr. Yrjo Neuvo, Executive VP and CTO of Nokia Mobile Phone, for his support through the Nokia Foundation. Also, he appreciates Prof. John Orr, Head of the ECE department, and Provost John Carney, Vice President of Academic Affairs of WPI for their support and understanding, in particular during the Fulbright-Nokia scholarship period. The co-author's involvement in this project began during his stay at CWINS in WPI and extended into his current position at the University of Pittsburgh. At the University of Pittsburgh, he has been involved in the Wireless Information Systems track in the Master of Science in Telecommunications with Profs. David Tipper and Joseph Kabara, who have helped him immensely in his teaching and research work. The director of the Telecommunications Program at the University of Pittsburgh, Prof. Richard Thompson, and the chair of the Department of Information Science and Telecommunications, Prof. Martin Weiss, have fostered an environment that supports innovation and freedom, which has been a significant reason behind the co-author's ability to contribute to this book. He would also like to thank his colleagues, Profs. Sujata Banerjee and Taieb Znati for their support during the last two years in his academic efforts.


Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.


Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.


If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information

Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.


This site is not directed to children under the age of 13.


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information

If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information

Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents

California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure

Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact

Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice

We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020