Professional Documents
Culture Documents
CBWT3103 Wireless Technology
CBWT3103 Wireless Technology
CBWT3103 Wireless Technology
CBWT3103
Wireless Technology
Coordinators: Dr H K Lau
Dr Wilson Chu
OUHK
Adapted for
Open University Malaysia by: Prof Dr Mohammed Yusoff
Faculty of Information Technology and
Multimedia Communication, OUM
Copyright © Open
Copyright Open University
University Malaysia
Malaysia (OUM)
(OUM)
Table of Contents
Course Guide ix - xvi
COURSE AIMS
CBWT 3103 Introduction aims to develop your knowledge and understanding of
the basic principles and practice of wireless communications.
LEARNING OUTCOMES
After completing the course, you should be able to:
MODULE STRUCTURES
There three major units in this modules, they are:
Unit 2: Wireless Local Area Networks and Wireless Personal Area Networks
This unit focuses on wireless networks for wireless local area networks (WLANs)
and wireless personal area networks (WPANs). We begin the unit with an
introduction to wireless networks in general. The main differences between
WLANs and WPANs are highlighted and we discuss various ways to categorise
wireless networks. The advantages and disadvantages of using wireless networks
are then explained. In the second section of the unit, we take a closer look at
WLANs. We first look at IEEE 802.11, and different physical layer variants,
namely those based on frequency hopping spread spectrum (FHSS), direct
sequence spread spectrum (DSSS), infra-red (IR) and orthogonal frequency
division multiplexing (OFDM). The medium access control (MAC) of IEEE
802.11 will be briefly discussed in this unit. Another popular WLAN is
HIPERLAN1/2. A summary of the protocol structure of HIPERLAN/2 is also
given in this section. Apart from WLANs, WPANs are another area of interest.
The third section of the unit discusses WPANs, and we will explore the
architecture, radio specifications and baseband specifications of Bluetooth in
detail. No matter which kind of wireless network you are using, there is a risk that
authorised participants might ‘overhear’ and ‘tap’ the transmission in the network.
These security risks require various security resolutions, and in the fourth section
of the unit, we look at WLAN and WPAN security concerns and resolutions.
COURSE ASSESSMENT
Formal assessment for the course is of two components:
ONLINE DISCUSSION
Online discussion with your tutors, on academic issues or problems related to your
study, namely in understanding the materials in the module or doing your self-
tests in the module and also online discussion with your fellow students represent
important components of teaching and learning activities at OUM. To help you to
go through your online discussion, OUM has developed a computer-based Virtual
Learning Environment, known as myINSPIRE. The system have a number of
functionalities which enable the students to access OUM’s digital library,
communicate with the tutors and their fellow students. We strongly advised you to
use this system.
ASSIGNMENT
For this course you are required to do one assignment. The objectives of the
assignment is:
1 To provide a mechanism for you to check your progress and make sure that
you have met certain learning objectives.
2 To provide you with the chance to demonstrate your understanding of the
materials in the module.
3 To provide an opportunity for you to apply what you have learned.
Stott, V. (2002). Web server technology, 2nd edn., London: ABC Publishing.
ASSIGNMENT SCHEDULE
Assignment will be posted to myINSPIRE in Tutorial 1
Student are required to submit the assignment together with TMA form during
Tutorial 4.
Student will get their assignment marks and TMA form from their tutors during
tutorial 5. Please make sure to ask for the mark and TMA form from your tutor
during this tutorial 5 and keep your TMA form for future reference
COURSE EXAMINATION
Comprises two sections:
Section 1 (short subjective questions/objective question) 20%
Section 2 (subjective questions) 30%
TUTORIALS
The course includes 5 tutorial meetings of two hours each — 10 contact hours in
total. The tutorials are conducted to provide an opportunity for you to meet your
tutors and discussed important points or difficult points or concepts in the module.
In addition, you have an opportunity to discuss self-test with your tutors or share
your study experiences and difficulties in your peer-to-peer group discussions.
Although the tutorials are not compulsory, you are encouraged to attend the
tutorial meetings as far as possible. It is strongly recommended that you attend all
tutorials, as they will provide considerable assistance in your study of this course.
Moreover, you will have the chance to meet with other distance learners who are
taking the same course.
GROUP PROJECT
Please do group project if it is specified in the course. The group project provides
you with the opportunity to show your ability to work in group, namely to do
group problem solving, sharing and communicate your ideas to group members.
You are required to use myINSPIRE in this group project, i.e to communicate and
share your ideas with the group members.
Overview
Unit 1 starts by giving you a general introduction to wireless communication
systems including their history. Various commonly adopted wireless
communication systems are then outlined. These include paging systems, trunked
radio systems, cellular radio systems, wireless broadband communication
systems, satellite-based mobile communication systems and wireless personal
area data communication systems.
Figure 1.1 illustrates the functional building blocks of a basic digital wireless
communication system. Take a moment to look at the various elements of the
system and to see how they interrelate with other elements.
Channel
Source Channel Multiplexer spreading/ Modulator
encoder encoder Multiple
access
Analogue Transmitter
input
Digital Channel
input encoder
Air
channel
Digital Channel
output decoder
Analogue
output Receiver
Channel
Source Channel Demultiplexer despreading/ Demodulator
decoder decoder Multiple
access
In the following sections, we will briefly review each of the building blocks in
Figure 1.1. The basic purpose of each building block will be explained and
examples will be given so that you better understand the role of each.
FDMA divides the given frequency spectrum into individual channels. Each radio
user, upon requesting resources, is allocated one channel for the entire duration of
the call transmission.
User 3
Frequency
Guard band
User 2
User 1
Time
Figure 1.2 illustrates a guard band between each adjacent frequency channel. This
guard band prevents out-of-band emission due to carrier frequency equipment
instability. In Figure 1.2, each of the users is allocated with different frequencies
(i.e. different channels). If the spectrum can only accommodate three channels,
the fourth user, who requests resources, will encounter either blocking (if the
system follows the ‘blocked calls cleared’ concept, i.e. Erlang B traffic) or
queuing (if the system follows the ‘blocked calls delayed’ concept, i.e. Erlang C
traffic). Blocking and queuing refer to different ways the communication system
handles a call request when there are no available resources. Blocking refers to the
situation when the communication system rejects a caller when there are no
resources available. The caller will then encounter a ‘busy’ tone. Queuing refers
to the situation when the communication system does not reject the caller but puts
the caller on a queue list until resources are freed. When the caller is waiting, the
call is regarded as delayed. The communication system will not allow the caller to
wait for an indefinite period for resources but will only assign a certain queuing or
waiting time. If this time expires and no resources are available, the caller will
receive a ‘busy’ tone and will be dropped from the queue list. If resources are
available before the expiry time, the caller will be served on a first-come-first-
served basis.
Guard time
Frequency
User 1
User 2
User 3
Time
Most second-generation (2G) cellular radio systems, such as GSM and D-AMPS
systems, employ TDMA together with FDMA. They surpass 1G systems in terms
of their increase in subscriber capacity as multiple users can use the same
frequency band, rather than a single user as in 1G systems.
Unlike FDMA and TDMA, CDMA transmission does not allocate channels for
each call, but instead make use of the entire frequency spectrum for transmission
in every call. In other words, all users use the same frequency spectrum for
transmission. Now, you may ask how can this be done without mixing up all these
users. In order to identify each user, each one of them is assigned a unique code
and this code is transmitted over the same frequency spectrum. This transmission
mode is known as spread spectrum transmission. Figure 1.4 illustrates two
spectrums, in which three users have transmission in each of the spectrums. An
example of a CDMA scheme cellular radio system is IS-95.
Time
Information
Transmitter Receiver
(a) Simplex
Information
Transmitter Receiver
OR
Information
Receiver Transmitter
(b) Half-duplex
In simplex systems, data transmission is possible in one direction only, i.e., from a
transmitter to a receiver. Paging systems are simplex systems because messages
are received but not acknowledged by a pager. Half-duplex systems use the same
frequency channel for both transmission and reception, which allows two-way
data transmission in a ‘push-to-talk’ and ‘release-to-listen’ basis (i.e., the station
can only transmit or receive at one time). Full-duplex systems, on the other hand,
allow simultaneous data transmission and reception between a transmitter and a
receiver, by providing two simultaneous but separate channels for communication
to and from the user. This is particularly essential in voice communication
systems. Similar to multiple-access techniques, duplexing may be done in the
frequency domain or time domain, leading to Frequency-Division Duplexing and
Time-Division Duplexing respectively.
Downlink
Uplink
Frequency
Bsys Bsys
It should be noted that the frequency split between the forward and reverse
channels (i.e., the carrier frequency spacing shown in Figure 1.6) is constant
throughout the system, and regardless of the particular channel being used. In
addition, transmission and reception of signals are carried out through the same
antenna.
For a system using FDD, any duplex channel actually consists of two simplex
channels. A device called a duplexer is equipped inside each mobile station and
base station to allow simultaneous transmission and reception of signals on the
duplex channel pair, as illustrated in Figure 1.7.
Downlink
Uplink
Duplexer Duplexer
Frequency Frequency
domain Downlink
Downlink
Downlink
Uplink
Uplink
Uplink
Time Time
domain
Guard time
It can be seen that both the downlink and uplink signals are transmitted over the
same radio frequency channel but at different segments in time. If the time split
between the downlink and uplink time slot is small, the transmission and
reception of data appears simultaneous to the user.
Downlink
Uplink
Although the total bandwidth for TDD is the same as that for FDD, the occupied
bandwidth of each link (either uplink or downlink) is twice as wide as that for
FDD. This is because each signal has to transmit data during half a period for
FDD systems. In addition, the TDD system requires guard space (also called
guard time) for time alignment purposes, is already shown in Figure 1.8.
SELF-CHECK 1.1
• linear equalisers
• non-linear equalisers
• adaptive equalisers
• blind equalisers.
Diversity
Diversity can be used to reduce the depth and duration of the fades experienced by
a receiver in a fading channel. Reducing the fading effects eventually improves
the quality of the received signals. The diversity gain is obtained by providing
multiple but uncorrelated copies of the message to the receiver. Examples of
diversity and signal combining/selection techniques include:
• space diversity
• polarisation diversity
• frequency diversity
• time diversity
• selection diversity
• maximal radio combining
• equal gain combining.
The following reading from your textbook gives you some background on the
evolution of mobile radio communications after the birth of wireless technology.
The reading also gives you a broad context for the more detailed descriptions of
the wireless systems given in this section. Refer to this reading now, and then
return to the notes below.
Reading
Sections 1.1 and 1.2, pp. 1–6 in Wireless Communications: Principles &
Practice, 2nd edn.
• Graham Bell (who transmitted signals across the sea between England and the
Isle Wight by means of induction. This system of Wireless Telegraphy was not
developed on a large scale; the system is older than the system of aether-
waves.)
• Heinrich Rudolph Hertz (who discovered that the effect of electrical sparks are
based on a wave-phenomena in the aether. He confirmed the theory of
Maxwell, according to which these waves travel at the same speed as light.)
radio systems used the frequency modulation (FM) technique and end-users were
mostly from the police sectors. It was not until mid-1940s, that the first
interconnection between mobile radio users and a Public Switched Telephone
Network (PSTN) was made. Eventually a new class of service, ‘Mobile
Telephony’, was recognised. Telephony services were remarkably improved by
having full duplex and other functions such as auto-dial. This was another
milestone in the wireless communication era.
The driving force for continued WLAN development has been the accelerated
growth of Internet popularity, together with the advancement of computer
technologies. As end users become accustomed to a wired computer network, they
also become more interested in the possibility of including some sort of mobility
in the network.
The most widely adopted WLAN standard is the IEEE 802.11, which was
approved in 1997. The standard was then further extended with the aim of
increasing the data rate up to 54 Mbps per channel. As a counterpart to IEEE
802.11, HiperLAN was proposed as a European standard in 1996. This standard
was further extended and the most recent version supports point-to-point links
with a data rate up to 155 Mbps over a 150 m distance.
Handy electronic devices, such as Personal Data Assistants (PDAs) and notebook
computers have been well received and adopted in the market. As demand
increases to ‘link’ up such devices within a short range so that a person can set up
his/her own Wireless Personal Area Network (WPAN) and access information
and resources, vendors have developed technologies to cater for such wireless
communications.
SELF-CHECK 1.2
Describe the types of service that are provided by 1G, 2G, 2.5G and
3G mobile phone systems.
Terrestrial telecommunication
infrastructures
The previous section focused on the evolution of cellular radio systems after the
birth of wireless technology. Cellular radio systems are not the only type of
terrestrial wireless communication systems (‘terrestrial’ means of relating to earth
or its inhabitants).
Paging systems
The communication systems that we have looked at so far in this unit have been
two-way communication systems (i.e. half-duplex and full-duplex modes in which
messages can be sent between a sending side and a receiving side). However,
wireless communication systems also include one-way communications (i.e. the
simplex mode in which messages are sent from one side only). A very common
example is a paging system (although some advanced paging systems support two-
way communication).
What exactly are paging systems? What are they used for and how do they work?
The following textbook reading gives you a description of what a paging system
is and how it works. As you read, you should note the paging systems can vary in
complexity and the area of coverage.
Reading
Section 1.4.1, pp. 11–12 in Wireless Communications: Principles & Practice,
2nd edn.
Most paging systems provide simple one-way (i.e. simplex) radio communication
that sends brief messages to subscribers. These brief messages can be a numeric
message, an alphanumerical message or a voice message. The call set-up time (the
time required between putting up a call request and the call being successfully
established) for a typical pager is about one to three seconds.
1 local area paging (mainly for private use) for in-house usage, such as in a
shopping mall, factory, office, hospital or hotel; and
2 wide area paging (mainly for public use), such as POCSAG (Post Office Code
Standardization Advisory Group), ERMES (European Radio Message
Service), and Motorola FLEX systems.
Since most local area paging systems are proprietary systems, we only focus on
wide area paging systems.
There are several standards in wide area paging. We will briefly look at some of
them:
• POCSAG’s frequencies are in the VHF and UHF (25 MHz–512 MHz) band for
wide-area (country-wide) digital pagers. POCSAG supports only simplex
communication (i.e. simplex transmission).
The following table summarises the details of the paging standards we have
discussed.
With the popularity of cellular networks and more importantly the decrease in
capital investment for cellular systems per subscriber (as a result of the higher
capacity supported by 2G radio systems and beyond), paging systems are losing
importance in the wireless telecommunication arena. This is especially obvious in
economically well developed areas where cellular radio coverage can be
effectively provided. For suburban areas and remote areas, radio paging services
still play a significant role.
• the call set-up time for trunked radio systems (usually within 0.5 seconds) is
much shorter than the cellular radio systems (usually 5 to 6 seconds); and
Central switching
equipment
Figure 1.10 Basic network architecture of a trunked radio system
When one radio makes a one-to-many call (usually known as a group call), as
indicated in the upwards arrow from the bus to the transmitter at top left-hand
corner of Figure 1.10, all the mobile stations that are within the same group will
receive the call. Unlike a paging system, which is a simulcast system, a trunked
radio system will only allow transmission to respective group members of the
caller. This is made feasible by the central switching equipment that governs
mobility management of all the mobile stations in the trunked radio network. The
switching equipment keeps track of the location of all the mobile stations and
controls the respective base stations to send and receive communication
transmissions to and from the respective mobile stations. It should be noted that if
there is more than one mobile station of the same group within the coverage of
one transmitter radio and a radio group call is made to these mobile stations, only
one frequency channel is needed for all the radios within range of the same base
station. This adds an additional benefit of serving more users with the same
resources.
Like cellular radio systems, trunked radio systems have also gone through a
technological evolution from 1G, which was solely devoted to analogue systems,
to 2G, where a digital technology platform was introduced. The driving force for
Copyright © Open University Malaysia (OUM)
22 UNIT 1 INTRODUCTION TO WIRELESS COMMUNICATION SYSTEMS AND SERVICES
this evolution has been the limited capacity to accommodate the increasing
demand for trunked radio communication services. In addition, the popularity of
cellular radio communication services has also led to a demand for data services
over trunked radio systems.
Unlike 1G radio systems in cellular networks, standardisation did not take place
early on in 1G trunked radio systems. Each trunked radio system manufacturer
had a proprietary platform for deploying the infrastructure. It was not until the
mid-1990s that there was a move to standardise digital trunked radio systems. We
now look at the major trunked radio standards that emerged.
TETRA, which stands for TErrestrial Trunked RAdio, is the first open
standard for digital trunked radio system. The standard was formulated by the
European Telecommunication Standardisation Institution (ETSI). Several
manufacturers participated in the standardisation formulation, with the ultimate
goal being to establish an open standard for trunked radio systems, similar to what
has been achieved in GSM. Unlike GSM, a Home Location Register (HLR) is
embedded in the central switching equipment (details of the HLR in GSM will be
discussed in a later unit). Standardisation of TETRA is almost complete for
Release I; while standardisation of TETRA Release II has just started. In Release
II, the main purpose is to cater for high-speed data transmission.
The following table summarises the details of the trunked radio standards that we
have discussed.
Reading
Section 1.4.3, pp. 13–18 in Wireless Communications: Principles & Practice,
2nd edn.
A cellular radio system provides wireless communications for its radio users to
PSTN as long as the radio user is within the radio coverage of the cellular radio
system. In 2G cellular radio systems, more elements are incorporated in the
architecture. Figure 1.11 below illustrates typical network architecture for 2G and
beyond cellular radio systems.
Home other
Location networks
Register
(HLR)
Base Station
Controller
(BSC)
As we can see from Figure 1.11, base stations (fixed stations where transceivers
perform radio communication with mobile stations) are usually grouped,
according to their geographical locations, and connected to a different Base
Station Controller (BSC). As its name implies, a BSC controls base stations. It
manages the handoff of calls from one base station to its neigbouring base station
as the radio subscriber moves from one cell to the other. Several BSCs will be
connected to a Mobile Switching Centre (MSC).
A MSC is the switching office that manages the setup and teardown of calls to
and from the radio subscribers. When you compare the basic network architecture
of a trunked radio system and a 1G cellular radio system, you will find that they
are both one-tier systems that consist of a number of base stations together with a
central switching center. However, when you look at the network architecture of a
2G cellular radio system, you will find a two-tier system that consists of several
bunches of base stations connected to BSCs, while being further connected to an
MSC. The reason for such a two-tier system is for off-loading the traffic within
central switching equipment.
As mentioned in the above paragraphs, MSC performs all the main switching
functions of a GSM network and it also manages all information needed for call
processing and mobility management through database. On the other hand, a BSC
manages radio resources, radio call processing, traffic concentration between
MSC and BSC etc. Unlike 1G cellular radio systems where all the call processes
will be taken care by the MSC, the role of the MSC in a 2G cellular radio system
can be enhanced to incorporate more features and functions found in a standard
PSTN switch.
Apart from interfaces to a number of BSCs, the MSC is also interfaced to one or
more Home Location Registers (HLRs). A HLR contains subscriber-specific data.
It is actually a subscriber database and plays a crucial role in mobility
management. Mobility management refers to tracking where the radio subscribers
have moved to.
Reading
Section 11.1.1, pp. 534–35, Section 11.1.4, pp. 540–41, Section 11.2, pp. 541–
42, Section 11.3, p. 549, Section 11.4, p. 567 in Wireless Communications:
Principles & Practice, 2nd edn.
IS-95
CDMA (IS-95) was created to support increased subscriber demand capacity. It is
designed to operate in the same frequency spectrum of AMPS so that it is more
economical for vendors to produce dual band (AMPS/CDMA) mobile phones and
base station equipment. IS-95 is a Direct-Sequence Spread-Spectrum (DSSS)
CDMA system. It eliminates frequency planning requirements for every cell in a
FDMA/TDMA system. The frequency bandwidth of each IS-95 carrier is 1.25
MHz.
Unlike other cellular standards, user data rate changed in a real time fashion depends
on voice activity and requirements in the network. It also uses different modulation
and spreading techniques for forward and reverse links.
GSM is a multi-service system and has to manage mobility, security and radio
resources. The GSM system supports voice communication; data such as text and
pictures; facsimiles; computer files and messages, and short message services.
The GSM spectrum was originally assigned at around 900 MHz but it has
extended to 1800 MHz and 1900MHz to meet the ever-increasing demand of
radio subscribers. GSMs operating at 1800 MHz and 1900MHz are called PCSs or
GSM1800 and GSM1900, respectively.
position, and 40 kbps to 53 kbps with speed. Such speeds are already far beyond
the maximum speed of 9.6 kbps attained by standard GSM.
Enhanced Data Rates for Global Evolution (or previously ‘Enhanced Data
Rates for GSM Evolution’, EDGE)
The basic purpose with EDGE is to enhance the data throughout capabilities of
the GSM/GPRS network. This is primarily achieved through changing the air
interface modulation scheme from Gaussian Minimum Shift Keying (GMSK) in
GSM to 8 Phase Shift Keying (8-PSK). In theory, EDGE can support a maximum
data rate of 384 kbps, which is more advanced than GPRS. As a result, some
people have referred to EDGE as a ‘2.75G’ technology. However, in this module,
we will regard it as 2.5G technology for simplicity sake.
CDMA2000 (1xRTT)
CDMA2000 1xRTT is the first phase of CDMA2000, which is the ultimate 3G
platform in the United States. It is fully backward compatible with the IS-95
infrastructure and radio subscriber units. It supports voice, circuit-switched data,
short messages services, over the air provision and activation. In addition,
CDMA2000 1xRTT supports handoffs with IS-95 systems.
CDMA2000 x3
CDMA2000 is unique among other 3G access platforms, because although it
supports 3G services and bandwidth requirements, it caters for a logical migration
from the existing 2G platforms to 3G without forklifting the existing system.
Since CDMA2000 is backward-compatible with existing cdmaOne, or IS-95
networks, upgrades or changes to the network can be done in stages.
SELF-CHECK 1.3
Describe the main differences between radio paging, trunked radio and
cellular radio communication systems. In your comparison, refer to the
following:
• their call setup time (the time required between putting up a call
request and the call being successfully established).
With the explosion of the Internet, there has been an ever-increasing demand for
bandwidth requirements in communications and computer technologies. The
convergence of these two technologies has given birth to the wireless broadband
networks industry.
In traditional communication networks, this ‘last mile’ connection (i.e., the local
loop) is provided by copper wire. However, deployment costs for copper wire
communication systems are high. Therefore, fixed wireless networks are suitable
for the rapid deployment of broadband connections and these approaches are
becoming more popular for providing the ‘last mile’ of communication systems.
Besides their rapid deployment and low deployment costs, fixed wireless systems
also have the advantage of having a well-defined and time invariant propagation
channel between fixed transmitters and fixed receivers. Since these wireless fixed
communication technologies employ higher band frequencies, more bandwidth
can be used for data transmission.
The following reading concerns fixed wireless systems, including the Wireless
Local Loop (WLL), the Local Multipoint Distribution Service (LMDS) and the
Multipoint Microwave Distribution System (MMDS).
Reading
Section 2.3, pp. 40–45 in Wireless Communications: Principles & Practice,
2nd edn.
Let’s now look in more detail at these three broadband wireless systems:
• WLL
• LMDS
• MMDS.
Wireless broadband access makes use of high frequency microwave signals for
sending and receiving data between hubs located in the center of Local Multipoint
Distribution Service (LMDS).
broadcast services, satellite TV, satellite long distance telephone services, Global
Positioning Systems (GPS) and so on. Recently, Low-Earth Orbit (LEO) satellite
systems have been developed by several companies, such as Iridium, Globalstar,
and Teledesic. Iridium launched 66 LEO satellites to provide worldwide wireless
communication services in 1 November 1998. The company closed down in
March 2000 and Iridium services were not available again until early 2001. The
Globalstar system consists of 48 LEO satellites and provides communications
services by utilising CDMA transmission techniques. Teledesic is also developing
288 LEO satellite systems to provide worldwide wireless multimedia
communication in 2005. In this section, we will compare satellite-based cellular
systems with terrestial cellular systems and then briefly study how satellite
systems work. We then look at some satellite communications systems.
particular height there is a speed where the two forces balance and the satellite
stays in orbit.
There are three types of orbits for communication satellites and each orbit offers a
different level of coverage and supports different systems:
3 LEO (Low-Earth Orbit): A LEO’s altitude is about 1000 km. Since satellites
move in relation to the surface of the earth, a full complement of satellites
(called a constellation) must be operating to provide continuous, unbroken
service.
Iridium
The Iridium satellite communication system, a venture company partially funded
by Motorola, is a satellite-based, digital, worldwide cellular personal
communications system. It can provide voice, paging, fax or data services to any
point on earth. The system consists of 66 small satellites in Low-Earth Orbits
(LEO). There are six polar orbital planes with eleven satellites in each, as shown
in Figure 1.12. It offers 100% coverage of the earth.
3
31.6º 31.6º 4
2
31.6º
31.6º 5
31.6º
22º
6 N 6
2
4
3
Figure 1.12 66-LEO satellite constellation
Source: Roddy, D (1995) Satellite Communications, 2nd edn, McGraw-Hill.
The Iridium phone is the primary means by which callers communicate directly
through the Iridium network. Its multi-mode capability allows the telephone to
work as a terrestrial wireless telephone (in areas where a compatible cellular
service exists) and as a satellite telephone. For Iridium subscribers, this means a
single handheld phone for both cellular and satellite access. Motorola and
Kyocera are manufacturing Iridium phone models.
ACTIVITY 1.1
Visit the official homepage of Iridium at <http://www.iridium.com>
and try to figure out two services they offer.
In addition to Iridium, there are two other popular mobile satellite systems,
Globalstar and Teledesic.
SELF-CHECK 1.4
There are many wireless personal area data communication systems. The most
common type is the Wireless Local Area Network (Wireless LAN or WLAN). In
simple terms, Wireless LANs implement a LAN’s functionality by using wireless
data transfer. This replaces the corresponding cabled solution on the same
network level.
Antenna
RS-232 Terminal Audio UHF/VHF
Node
Digital Controller Analogue Ham Radio
PC Signal Signal
The TNC acts like a telephone modem, which converts the computer digital signal
into analogue signals for the ham radio to modulate and transmit over the air using
packet switching techniques.
In 1997, the Institute of Electrical and Electronic Engineers (IEEE) finalised the
initial standard for Wireless LANs: IEEE 802.11. This standard specifies that
WLAN operates at a 2.4 GHz frequency band with 1 Mbps and 2 Mbps. The
spread spectrum modulation schemes employed are Frequency Hopping (FHSS)
and Direct Sequence (DSSS).
In late 1999, IEEE extended the 802.11 standard to 802.11b and 802.11a where
802.11b has 11 Mbps and 802.11a has the 54 Mbps. 802.11b uses the DSSS
method at the 2.4 GHz ISM band for implementation of WLAN. It is also the
most popular standard now. The 802.11a employs the orthogonal frequency-
division multiplexing (OFDM) modulation technique in 5 GHz frequency
spectrum.
A new IEEE standard on WLAN is 802.11g. This standard is compatible with the
most popular existing standard, 802.11b, and it provides high capacity and a
higher data transfer rate at 54 Mbps.
WLAN
standard with 802.11 802.11a 802.11b 802.11g
versions
Anticipated
Standard
July 1997 September 1999 September 1999 final approval
approval
by June 20031
Available
83.5 MHz 300 MHz 83.5 MHz 83.5 MHz
bandwidth
2.4-2.4835 5.15-5.35 GHz
Unlicensed OFDM
GHz 2.4-2.4835GHz 2.4-2.4835GHz
frequencies of
DSSS, 5.725-5.825 GHz DSSS DSSS, OFDM
operation
FHSS OFDM
4 Indoor (UNII1)
Number of
3 4 Indoor/Outdoor 3
non- 3
(Indoor/ UNII2) (Indoor/Outdoo
overlapping2 (Indoor/Outdoor)
Outdoor) 4 Outdoor (UNII3 r)
channels
)
54, 36, 33, 24,
Data rate per 54, 48, 36, 24, 18, 11, 5.5, 2, 1
2, 1 Mbps 22,12, 11, 9, 6,
channel 12, 9, 6 Mbps Mbps
5.5, 2, 1 Mbps
Wi-Fi at
Compatibility 802.11 Wi-Fi5 Wi-Fi 11Mps and
below
1
Source: <http://grouper.ieee.org/groups/802/11/Reports/tgg_update.htm>.
2
Source: ETSI (ES 202 131 V1.1.1). For IEEE 802.11 systems using Direct-Sequence Spread
Spectrum, the adjacent channel is defined as the non-overlapping channel which is at least 30
MHz separated from the wanted signal. For IEEE 802.11b and IEEE 802.11g systems, the
adjacent channel is defined as the non-overlapping channel which is at least 25 MHz separated
from the wanted signal.
The original HiperLAN/2 standard has been extended with two new components,
HiperACCESS and HiperLINK. The HiperACCESS protocol (formerly
‘HiperLAN Type III’) has a point-to-multipoint architecture at 27 Mbps over up
to 5 km. The HiperLINK (formerly ‘HiperLAN Type IV’) is used for point-to-
point links with a data rate up to 155 Mbps over 150 meter distances.
The Bluetooth standard is mainly designed to target three applications at the PAN
level:
• cable replacement
• data and voice access points
• personal ad hoc networks.
The Bluetooth modules can be integrated into notebook computers or PDA
devices so as to facilitate the above-mentioned applications.
HomeRF
The founders of the HomeRF standard are Compaq, Hewlett-Packard, IBM, Intel
and Microsoft. They formed a working group in March 1998, which is called the
Home Radio Frequency Working Group (HomeRF WG). The aim of this working
group was to develop an open standard for industry. The latest version of
HomeRF is version 2.01 and it provides a bandwidth of 10Mbps.
A new ‘IrDA DATA’ standard was designed for two-way cordless infrared light
communications in 1994. IrDA DATA is recommended for high-speed short-
range, line-of-sight, point-to-point cordless data transfer applications such as
digital cameras and handheld data collection devices. It has the following
characteristics:
In 1998, a new ‘IrDA CONTROL’ standard was developed for wireless human
input devices, such as a mouse, a keyboard or a joystick. It is recommended for
Copyright © Open University Malaysia (OUM)
UNIT 1 INTRODUCTION TO WIRELESS COMMUNICATION SYSTEMS AND SERVICES 43
SELF-CHECK 1.5
Region 1: Europe, including all former USSR territory outside Europe; Mongolian
People’s Republic; Asia Minor; and Africa
Region 3: Australia, New Zealand; Oceania; and Asia, excluding former USSR
territory and Asia Minor.
You should note that different frequency bands are characterised for particular
application purposes. VLF and LF are used for carrying navigation and
underwater radio systems. Communication systems that employ frequencies
ranging from MF to UHF are used for data telephony, radio and television
transmission. For frequencies between SHF and EHF, directional, satellite radio
and radar are deployed.The UHF and SHF bands have been further divided:
Why are certain frequencies allocated certain services? As a general rule, the
higher the frequency, the shorter its range (since c=f, where c is the velocity of
light, f is the frequency and is the wavelength). This is due to attenuation of
electro-magnetic waves, in particularly, damping, dispersion, reflection and
absorption. Low frequency waves are spread ground waves. This implies they
follow the curvature of the earth and can thus reach great distances. Airwaves are
generated at higher frequencies. They can reach ranges of from 100 km to 150 km
since the waves are reflected by the ionosphere. As the frequency increases, the
effect diminishes and thus the distance the frequency can propagate is reduced.
Waves larger than 3 GHz are direct waves. The distance that they reach is known
as the line of sight limit.
Bandwidth (kHz) BRC FIX MOB Bandwidth (MHz) BRC FIX MOB
130 -160 23 23 18.168 -18.780 123
130 -148.5 1 87 -100 3 3 3
148.5 -255 1 87.5 -100
160 -190 23 88 -100 2
255 -283.5 100 -108 123
415 -435 1 136 -137 123
415 -495 23 150.05 -153 1 1
435 -495 1 150.05 -156.7625 23 23
505 -510 2 153 -154 1 1
505 -526.5 13 156.7625 -256.8365 123
510 -525 2 156.8375 -174 123 123
525 -535 2 174 -216 2
526.5 -535 3 174 -223 13 3 3
526.5 -1605.5 1 216 -225 2 2
535 -1605 23 223 -230 13 3 3
1605 -1625 2 225 -235 2 2
1605.5 -1800 3 3 230 -235 13 13
1606.5 -1625 1 1 406 -406.1 123b
1625 -1705 2 2 2 470 -512 2
1635 -1800 1 1 470 -585 3 3 3
1705 -1800 2 2 470 -790 1
1800 -2000 3 3 512 -608 2
1850 -2000 12 12 585 -610 3 3 3
610 -890 3 3 3
614 -806 2
790 -862 1 1
806 -890 2 2 2
862 -890 1 1 1
890 -902 2 3
890 -942 13 13 13
902 -942 2
942 -960 13 13 13
1530 -1660.5 Dedicated to mobile
satellite communica-
tions (land-mobile,
maritime-mobile, or
aeronautical-mobile)
1700 -2450 123 23
2450 -2500 123 123
2500 -2535 3 3
2500 -2655 123b 123 123
a BRC=broadcasting; FIX=fixed; MOB=mobile; 1=Region 1; 2=Region 2; 3=Region 3.
b Using satellite.
Source: Yakoub, M (1993) Foundations of Mobile Radio Engineering, Boca Raton, FL:
CRC Press.
Table 1.5 shows some radio services assigned by ITU, namely broadcasting
(BRC), fixed (FIX), and mobile (MOB) which have been allocated to the various
regions (1, 2, 3, or combinations of them). The mobile services may include land,
maritime, and/or aeronautical mobile communications.
You might think there would be a clear distinction between these standards and
that America would only adopt American standards, while Europe would only
adopt European standards. However, there are exceptional cases. An example of
such a case is GSM1900, which is based on the European standard GSM.
GSM1900 has been adopted in the United States. In Hong Kong, both American
and European wireless communication standards have been adopted.
Table 1.6 Wireless communication systems in the United States, Europe and Japan
Standardisation body /
Standard Type Country
Work group / Organisation
Standardisation body /
Standard Type Country
Work group / Organisation
CDMA2000
Cellular 3GPP US
1XRTT
CDMA2000
Cellular 3GPP US
3xRTT
SELF-CHECK 1.6
Referring to the above table, name two standards that are regarded as
proprietary standards (rather than open standards).
As will be shown in Unit 10, 2.5G’s system architecture, voice and data are still
supported by two different cores paths (one for voice services employing circuit-
switched and one for packet data employing packet-switched). As packet-
switched technology evolves, quality of service (QoS) might become an issue,
since from a wireless network viewpoint the provision for a quality service affects
end-to-end performance, especially with the air interface being a major
bandwidth-limiting factor in a wireless data network. The solution is the
development of IP-based networks that support IP version 6 (IPv6) that allow
maintenance of QoS.
Smart antennas
Radio coverage is a topic that every wireless communication system has to face.
Coverage planning is particularly challenging in complex environments, such as
in Hong Kong, where there are a lot of high-rise buildings, tangles of roads, and
changing traffic conditions. An alternative is to employ smart antennas.
Smart antennas provide greater capacity and performance benefits than standard
antennas because they can be used to customise and fine-tune antenna coverage
patterns to match traffic conditions in a wireless network, or to better suit complex
radio frequency environments
Software radios
In contrast to conventional radios, there has been discussion on the possibility of
developing software radios by putting a radio under software control so that it can
support any type of technology, and process signals in the digital domain. A
Summary
This unit has introduced you to the history of wireless communications and
discussed various wireless communication system standards. We have also looked
at wireless communication system standards around the world. We ended the unit
by looking briefly at emerging trends in wireless communication systems and
services, and later in the course you will have many opportunities to reduce future
possible innovations in the industry.
References
Geier, J (2002) Wireless LANs implementing high performance IEEE 802.11
networks, 2nd edn, Indianapolis, IN: SAMS.
Sikora, A (2003) Wireless personal and local area networks, John Wiley & Sons.
<http://www.privateline.com/PCS/history.htm>
<http://home.luna.nl/~arjan-muil/radio/history.html>
<http://www.iridium.com>
<http://www.wlana.org>
<http://www.cdg.org>
<http://www.ofta.gov.hk>
Feedback to activities
Activity 1.1
Iridium offers the following services:
• data services
• voice services
• global paging services
• crew calling.
Self-test 1.2
1G: voice services.
Self-test 1.3
Communication Modes of Key elements Popularity in the Call
service communication in system market setup
architecture time
Radio paging One-way Paging control Widely adopted and 1–3
communication centre received by the public, seconds
or simulcast Paging but has withered as a
transmitters result of popularity of
cellular radio services
Trunked radio Two-way Central Not very popular 0.5
communication switching among the general seconds
(full-duplex or equipment public but is popular in
semi-duplex) (with HLR large organisations or
embedded) private companies
Base stations
Cellular radio Two-way Mobile Station Widely adopted and 5–6
communication Controller received by the public seconds
(full-duplex) Base Station
Controller
Base stations
Home
Location
Register
Self-test 1.4
Satellite-based cellular systems can cover larger areas over mountains, rural areas
and ocean, and provide worldwide wireless communications (paging, broadcast
and emergency services), but they require more transmitting power and larger
antennas. Terrestrial cellular radio systems can support indoor, high-density area
wireless services at a low cost. For a given frequency allocation, since the
coverage of terrestrial mobile systems is much smaller than that of space-based
cellular systems, land-based mobile systems can serve more users.
Self-test 1.5
WLAN: 1 provides Local Area Network functionality using wireless data
transfer
Self-test 1.6
FLEX, a paging standard developed by Motorola, and TACS, a cellular standard
developed by Vodafone and Cellnet, are two examples of propriety standards.
Glossary
1G First generation
2G Second generation
2.5G 2.5 generation
3G Third generation
4G Fourth generation
AMPS Advanced Mobile Phone System
BSC Base Station Controller
CDMA Code-Division Multiple-Access
D-AMPS Digital AMPS
DSSS Direct-Sequence Spread-Spectrum
EDGE Enhanced Data Rates for Global Evolution (or previously
Enhanced Data Rates for GSM Evolution)
FDD Frequency-Division Duplex
FDMA Frequency-Division Multiple-Access
FHSS Frequency-Hopping Spread-Spectrum
Copyright © Open University Malaysia (OUM)
54 UNIT 1 INTRODUCTION TO WIRELESS COMMUNICATION SYSTEMS AND SERVICES
FM Frequency Modulation
GEO Geostationary-Earth Orbits
GGSN Gateway GPRS Support Node
GMSK Gaussian Minimum Shift Keying
GPRS General Packet Radio Service
GPS Global Positioning System
HiperLAN High-performance LAN
HLR Home Location Register
IPv6 IP Version 6
IrDA Infrared Data Association
ISI Intersymbol Interference
ISDN Integrated Service Digital Network
LEO Low-Earth Orbit
LMDS Local Multipoint Distribution Service
MEO Medium-Earth Orbit
MMS Multimedia Messaging Services
MMDS Multi-point Microwave Distribution System (also known as Multi-
Channel Multipoint Distribution System)
MSC Mobile Station Controller or Mobile Switching Centre
N-AMPS Narrowband AMPS
OFDM Orthogonal Frequency-Division Multiplexing
PAN Personal Area Networks
PDA Personal Data Assistant
PSTN Public Switched Telephone Network
OFTA Office of the Telecommunication Authority
QoS Quality of Service
Overview
This unit focuses on wireless networks for wireless local area networks (WLANs)
and wireless personal area networks (WPANs).
We begin the unit with an introduction to wireless networks in general. The main
differences between WLANs and WPANs are highlighted and we discuss various
ways to categorise wireless networks. The advantages and disadvantages of using
wireless networks are then explained.
In the second section of the unit, we take a closer took at WLANs. We first look
at IEEE 802.11, and different physical layer variants, namely those based on
frequency hopping spread spectrum (FHSS), direct sequence spread spectrum
(DSSS), infra-red (IR) and orthogonal frequency division multiplexing (OFDM).
The medium access control (MAC) of IEEE 802.11 will be briefly discussed in
this unit. Another popular WLAN is HIPERLAN1/2. A summary of the protocol
structure of HIPERLAN/2 is also given in this section.
Apart from WLANs, WPANs are another area of interest. The third section of the
unit discusses WPANs, and we will explore the architecture, radio specifications
and baseband specifications of Bluetooth in detail.
No matter which kind of wireless network you are using, there is a risk that
authorised participants might ‘overhear’ and ‘tap’ the transmission in the network.
These security risks require various security resolutions, and in the fourth section
of the unit, we look at WLAN and WPAN security concerns and resolutions.
There are, however, several differences between WLAN technologies and WPAN
technologies.
Before taking a closer look at what exactly WLANs and WPANs are, let us first
examine some fundamental ways for classifying different types of wireless
networks. We then investigate the restrictions of various types of wireless
networks.
This list is not exhaustive, and it’s also possible to group technologies according
to a combination of these criteria.
Figure 2.1 Data rate of various wireless network technologies in accordance to nature
of usage
The first group relates to short-range transmissions with distances ranging from a
couple of meters to hundreds of meters. In addition to the length of transmission,
the movement of the radio is confined and the environment is relatively speaking
stable. Here stable refers to having less external disturbance, which can result
from external interference.
You will find that in a more stable environment, i.e. when radios are indoors, the
data rate achieved is much higher than in an outdoor environment. The reason is
that if the environment is stable, the possibility of having successful higher speed
data transmission will be greater and the chance of retransmission as a result of
transmission loss will be reduced.
One point worth nothing is that the hand-off capability applies to cellular radio
networks only and not to the other types of wireless network technologies. Can
you think of the reason for this? Imagine you are having a conversation on your
mobile phone when you are travelling by car at 50 km/hr. We have mentioned that
wireless networks that are classified for outdoors can have transmission over
distances up to a few kilometers. If you have a conversation that lasts for one
minute, your car has already travelled about 833 m. This distance is much greater
than a normal cell site in an urban area, which might be 200 m to 400 m across,
i.e. with a 100 m to 200 m radius. What would happen if there was no handover
from one cell to its adjacent cell? Of course, the conversation would be
disconnected.
SELF-CHECK 2.1
There are other criteria for classifying wireless network technologies. The
following classifications are only some of them. They are relatively self-
explanatory.
Scale of mobility
Scale of mobility refers to the degree of radio movement from one place to the
other. The following categories are derived from the scale of mobility used:
• Terrestrial-ness (e.g. over a country, the whole world) — cellular radio, radio
paging.
You can note that the above descriptions consist of possible radio movements,
from confined (as in indoors) to unrestricted (as in terrestrial-ness).
Mode of communication
Mode of communication is a very traditional way to categorise communication
systems. The simplest categories based on mode of communication are:
With the advancement of technology and the ever-increasing demand for more
communication services, it is rare to find evolutions in one-way communication
technology. The only remaining widely used form of one-way communication is
radio paging. On the other hand, more and more two-way communication
technologies are emerging in the market. One of the driving forces that lead to the
evolution of such technologies is the ever-increasing complexity of services that
are demanded. Such complexity results in the need for higher speed transmission.
Types of services
We can also categorise technologies according to the services they support. Here
are some categories of service:
• Data and voice — cellular radio (e.g. GSM, IS-95), trunked radio.
• Messaging — radio paging.
Generally speaking, cellular radio networks mainly support voice services, while
WLANs and wireless ATMs mostly support data and video services. However, as
new cellular technologies support higher-speed data transmission, cellular
networks are now also supporting data services. Similarly, with the maturity of
voice over IP (VoIP) over LAN environments, voice services over WLAN
environments are becoming more widespread.
physical connection between the individual mobile station and base stations in
order to have communication between them. In comparison, a wired system, such
as public service telephone network, requires physical cabling to connect each of
the individual telephones in the system to the local telephone exchange station.
Telephone service providers have to lay cable under roads or highways and this
involves a lot of installation and engineering work, as well as co-ordination work
with authorities.
Availability of bandwidth
Bandwidth spectrum is limited, so having a large number of wireless systems of
the same kind is impossible. In some countries, licensing is required for operating
wireless networks so that government authorities can control the number of
wireless networks operating.
Range
The range of wireless systems is restricted since as a general rule, the higher the
frequency, the shorter the range. This is due to the special diffusion of
electromagnetic waves that includes attenuation, reflection, dispersion and
absorption.
Electromagnetic radiation
As wireless systems involve electromagnetic radiation, there is more and more
concern from the public about whether such radiation is hazardous to human
health. This topic is by all means controversial and lawsuits have been launched
against mobile phone manufacturers by GSM users who have argued that the
electromagnetic radiation incurred by mobile products has damaged their health.
International organisations (such as the International Commission for Non-
Ionizing Radiation Protection, CNIRP and the American National Standards
Institute, ANSI) now set guidelines or recommendations for wireless products.
Interference
Whenever electromagnetic waves are transmitted over the air, they will be
vulnerable to interference. Interference is an external unwanted signal or noise
that affects the performance of a communication channel. Interference can be
generated naturally (e.g. lightning) or unnaturally (e.g. by inadequate frequency
planning of a wireless network).
Security
As the range of radio transmission cannot be restricted solely to the area in which
potential recipients or users are located but also reaches other areas, there is a risk
that the transmission will be ‘overheard’ by unauthorised recipients.
Authentication and encryption are possible solutions to this of security problem.
SELF-CHECK 2.2
1 What criteria can be used to classify wireless networks?
Advantages Disadvantages
the sake of communication and the sharing of information and resources. These
devices are normally linked up via cables. It might be more accurate to say that a
LAN employs transmission technology that consists of a single cable to which the
devices are attached. Traditional LANs operate at speeds from 10 Mbps to
100 Mbps.
LANs are usually regarded as broadcast LANs, i.e. each computer or device
which is hooked up to the cable receives the same piece of information
irrespective of whether that piece of information is sent to it. In order to
distinguish whether the information is to be sent to a particular computer,
identifiers are attached to the information so that the targeted computer knows it is
the designated device to receive the information.
Figure 2.2 shows two of the most common topologies of broadcast LANs.
(a) (b)
Figure 2.2 The two most common topologies of broadcast LANs
(a) Bus (b) Ring
Bus networks
In a bus network, as shown in Figure 2.2(a), one of the computers acts as master
and is allowed to transmit, while all other computers are required to refrain from
transmission. If more than one computer wants to transmit, there will be conflict.
In order to resolve such conflict, an arbitration mechanism is introduced. The
concept of the arbitration mechanism is that if two or more computers want to
transmit, each computer just waits a random amount of time and then tries to
transmit again.
Ring networks
Another type of broadcast LAN is the ring network, as depicted in Figure 2.2(b).
A typical example is the token ring. In order to identify which computer is
allowed to transmit, and thus reduce conflict between two or more computers
sending at the same time, a token is being used. A computer can transmit
information only if it seizes the token. Each piece of information propagates
around the ring until it reaches back to the sender where the sender removes it
from the ring. When the traffic is not heavy, i.e. when computers are not
transmitting most of the time, the token simply circulates around the ring.
However when the traffic is heavy, the computers have to wait or queue for the
token in order to get ‘permission’ to transmit. Once a computer finishes
transmitting information, it regenerates a new token, which will then be seized by
its downstream counterpart in the ring. In this way, the ‘permission’ to send is
circulated around the ring. This mechanism is also known as round-robin.
In simple terms, a WLAN is a LAN that has been put over a wireless environment
but retains all the characteristics of a wired LAN. As mentioned in Unit 1, there
are various international standardisation bodies that govern telecommunication
standards in various parts of the globe. WLANs are no exception. In this unit, we
will focus on two WLAN standards, namely IEEE 802.11 and HIPERLAN2. The
former is an American standard and the latter is a European standard.
Assignment
of OSI layers
802.10 Security
Data
802.1 Bridging Link
802.1 Management
Layer
802.3 802.5 802.6 802.11 802.15 802.16
MAC MAC MAC MAC MAC MAC
802.3 802.5 802.6 802.11 802.15 802.16
PHY PHY PHY PHY PHY PHY Physical
Ethernet Token DQDB WLAN WPAN WMAN Layer
Ring
Figure 2.3 The most important standards in the IEEE 802 family and their relationships
Source: Sikora, A (2003) Wireless Personal and Local Area Networks, UK: Wiley,
Figure 4.1, p. 57.
Among the IEEE 802 family, one young member has drawn a lot of attention in
the industry. This young member is the IEEE 802.11 WLAN standard, and it is
one of the themes of this unit.
The standard IEEE 802.11, which was formulated in 1997, specifies a WLAN that
operates at the 2.4 GHz frequency bandwith 1 Mbps and 2 Mbps. There are three
alternative PHYs, namely:
• frequency hopping spread spectrum (FHSS);
• direct sequence spread spectrum (DSSS); and
• infra-red (IR).
In 1999, IEEE 802.11b, which is also known as the IEEE 802.11 high rate
standard, was approved. It provides users with a data rate capability of 11 Mbps
and 5.5 Mbps in addition to the original 2 Mbps and 1 Mbps in IEEE 802.11. 2.4
illustrates three alternative PHY protocols on IEEE 802.11 and the PHY protocols
adopted in IEEE 802.11b using DSSS and IEEE 802.11a using orthogonal
frequency division multiplexing (OFDM) technology.
The latest physical layer variant (as of October 2003) is the IEEE 802.11g, which
employs both DSSS and OFDM technologies. It should be noted that IEEE
802.11g is compatible with IEEE 802.11b. A summary of these standards is given
in Table 2.1 below.
It should be noted that the same MAC layer protocol is used no matter what
variant of PHY layer is used.
As shown in Figure 2.4, there are different types of media over which IEEE
802.11 standards are supported. These different types of media are generally
regarded as IEEE 802.11 physical layer definitions. Before going into the details
of different IEEE 802.11 physical layer definitions, it is worthwhile looking into
the architecture of the physical layer since this architecture is the same,
irrespective of the physical layer definition.
Figure 2.5 illustrates the architecture of the IEEE 802.11 physical layer.
We’ve noted that in the IEEE 802.11 physical layer definitions, there are four
specifications for radio systems, namely:
Many WLAN products have been developed based on the first two definitions,
however, there is currently no product released based on infra-red. In this unit, we
focus mostly on FHSS and DSSS but some discussion of the standard for IR and
OFDM will also be presented.
Both the FHSS and DSSS operate at around 2.4 GHz, which falls within
unlicensed bands. This implies one does not need any license for the spectrum
from a local telecommunication authority and subsequently no payment is
imposed for the spectrum in order to operate IEEE 802.11 WLAN equipment at
this band. This arrangement has speeded up technological advancement over the
past decade since it allows the development of inexpensive and compact radio
transceivers.
Unlicensed bands
Unlicensed bands are also known as ISM (industrial, scientific and medical)
bands. Anyone can employ equipment that complies with some technical
specifications. As there is no frequency planning and no restriction on the number
of users of an unlicensed band, a certain degree of interference occurs. It is
therefore impossible to claim protection from interference incurred by other users
on these bands.
One feasible and effective way to reduce interference is to limit the transmission
power of the equipment. This limitation on power guarantees that the potential
sources of interference are physically at a short or medium distance away from the
receiver, or in other words, the coverage range of transmitters is confined to
specific areas. For example, the coverage range of transmitters in industrial
buildings and shopping malls can be confined to indoor coverage.
Table 2.2 Output power level for WLANs at the ISM band in Hong Kong
Frequency
Output power level Spurious emission level
range
2.4 GHz– a peak e.i.r.p. not to exceed e.r.p. not to exceed 10µW
2.4835 GHz 4 W for frequency outside the frequency band in
hopping spread spectrum which the fundamental
modulation or digital frequencies are located
modulation systems; or
b aggregate e.r.p. not to
exceed 100mW for any
modulation
Note: ‘e.r.p.’ means effective radiated power and ‘e.i.r.p.’ means equivalent isotropically radiated
power.
be extracted? You would probably get the right answer — the receiver should
know the correct sequence on how the frequency hops. Figure 2.6 illustrates the
concept of frequency hopping.
(fx)
(T)
In Figure 2.6, fx is the frequency number, and the carrier is hopped periodically,
at an interval of T, from one frequency to the other The frequency hopping
technique provides extra benefits to systems in terms of immunisation from
interference and tackling multipath problems.
One might ask, ‘What will happen if two or more frequency hopping systems are
working on the same band within the same coverage?’ The possibility of
interference on other systems will be reduced since interference will occur only
when bursts of two or more systems coincide in the same carrier.
coming from different paths. On the other hand, some frequencies might be
constructively combined at the receiver end, thereby reinforcing the received
power.
In frequency hopping systems, only some bursts suffer from fading, while other
would be received perfectly. Those that anticipate interference, which contribute
only a small percentage of the transmission, can be recovered either by
retransmissions or forward error coding.
f n 2400 n MHz
Table 2.3 summarises the IEEE 802.11 FHSS channel assignments in different
regions around the world.
0 23 62 8 43 16 71 47 19 61 76 29 59 22 52 63
26 77 31 2 18 11 36 72 54 69 21 3 37 10 34 66
7 68 75 4 60 27 12 25 14 57 41 74 32 70 9 58
78 45 20 73 64 39 13 33 65 50 56 42 48 15 5 17
6 67 49 40 1 28 55 35 53 24 44 51 38 30 46
Using this base-hopping sequence, the exact channel number pattern for
frequency hopping for North America and Europe can be determined using the
following equation:
where, x is the offset; and mod ( ) is the function of modulus (for example,
78 mod (79) = 78 and 80 mod (79) = 1). For North America and Europe, this
offset is divided into three sets, as indicated in Table 2.5.
In each of these three sets, there are a total number of 26 patterns. It has been
calculated that within each set, long periods of collisions of bursts as a result of
frequency hopping can be avoided. It should be noted that different regions in the
world have different channel numbers and base-hopping sequence relationships.
Here are some examples of these differences.
Japan
f x (i ) (i 1) x mod(23) 73 (7.2)
Spain
France
Similarly the base-hopping sequences and the offsets for assigning frequency
sequences are different. Table 2.19 to Table 2.23 (in Appendix A) indicate
difference sequences for base-hopping in the countries mentioned above.
SELF-CHECK 2.3
In any system that employs 2-level GFSK, the following rules of transmission are
applied:
• 1-symbol be transmitted as ft = fc + f
• 0-symbol be transmitted as ft = fc – f
• 00-symbol be transmitted as ft = fc – ¾ f
• 01-symbol be transmitted as ft = fc – ½ f
• 11-symbol be transmitted as ft = fc + ¾ f
• 10-symbol be transmitted as ft = fc + ½ f
In the IEEE 802.11 specification, f at 2-level GFSK is 160 kHz which is the
nominal frequency deviation, while f at 4-level GFSK is 288 kHz and the
nominal frequency deviation is 216 kHz.
The maximum dwell time (i.e. the time for a center frequency to hop from one to
another) is defined by the regional telecommunication authority. In North
America, the maximum dwell time is 0.4 seconds. However, the minimum dwell
time, irrespective of the region, is 2 ms, i.e. 500 hops per second. This figure is set
for the sake of transmission efficiency.
The following related IEEE 802.11 physical specifications of FHSS are worth
noting:
• the reference receiver sensitivity is -80 dBm (for 1 Mbps) or -75 dBm (for
2 Mbps).
Now let us move on to the second type of IEEE 802.11 physical layer definition
— direct sequence spread spectrum.
Although the concept of direct sequence systems is pretty straight forward, there
are some practical considerations that you should not overlook. These
considerations include:
• methods for ‘combining’ the bit sequence and the chip sequence;
Criteria Advantage
Interference Since a direct sequence system employs a spread spectrum, its power
spectral density will be decreased. This lowers the chance of
interfering with other systems within the same band. Furthermore,
direct sequence systems that employ uncorrelated chip sequences can
share the same spectrum without interfering with each other provided
that they use an uncorrelated chip sequence.
Privacy One of the key characteristics of direct sequence is the chip sequence
that is used to ‘combine’ with the bit sequence at the transmitter. The
receiver must know this chip sequence in order to retrieve the bit
sequence being sent. This adds privacy in communication if the chip
sequence is kept between the transmitting party and the receiving
party. However it should be noted that in the IEEE 802.11 standard, the
chip sequence is public and is in fact the same for all users.
Noise At the receiver, the incoming signal bandwidth will be reduced after
rejection the bit sequence is restored, and this reduced signal bandwidth can be
filtered out. All the components, including noise and interference that
are outside the band, will be filtered out as well. This means that direct
sequence systems possess a certain level of noise rejection and
immunity to interference.
Codes are usually periodic. The length of their period, however, can vary from a
few symbols time to thousands of symbols time. The advantage of having a short
code period is that it helps the receiver in synchronisation, while the advantage of
having a long code period is that it guarantees privacy in communication. Despite
this variation in the length of their period, any type of code in direct sequence
systems possesses the following two characteristics:
• Balanced code. This means the codes will have almost the same number of 0s
and 1s (which is called ‘balanced code’). This has the advantage of avoiding
any DC component in electronic circuits.
• The chip rate is always a multiple of a bit rate. This implies that the two
sequences are always synchronised. This helps reduce high-frequency energy
at the transmitter due to a mismatch of transitions of the two sequences.
Example of
Type Characteristics
application
Orthogonal When correlated with other orthogonal codes, Central node to
the result is exactly zero only when they have remote receivers
the same time reference. Walsh sequence in
Even a very small level of uncorrelated codes the IS-95 system
will result in an uncontrolled level of
interference.
(This implies the systems must be perfectly
synchronised among all users.)
Quasi- When correlated with other quasi-orthogonal Subsets of Gold
orthogonal codes in phase, a very small level of codes in CDMA
correlation, usually known as residue, results. satellite
Code can withstand some degree of communication
displacement with no significant degradation in
mutual interference.
(Usually employed in synchronised systems.)
Uncorrelated When correlated with other uncorrelated codes Gold codes
in time, it results in a low level of correlation in
time displacements
(Usually used in systems when there is no time
synchronisation.)
It should be noted that the first two types of codes are usually short codes, while
the last one is a long code. A long code helps to reduce the level of correlation
since it increases the possibility of and time between interference peaks. These
codes are usually generated from pseudorandom generators, which can be
implemented with a displacement of registers and with some linear feedback.
Table 2.8 illustrates the channel assignment of IEEE 802.11 DSSS in different
regions.
Using the information from Table 2.8, we can reduce that the maximum number
of channels that can be held within the band without overlapping is three. Figure
2.7 shows how channels 1, 6 and 11 result in non-overlapping channels.
Figure 2.7 Illustration of the non-overlapping channels concept in IEEE 802.11 DSSS
(not all the channels are shown in the figure)
It should be noted that the band interval for non-overlapping channels is at least
3 MHz.
SELF-CHECK 2.4
+1, -1, +1, +1, -1, +1, +1, +1, -1, -1, -1
For systems that employ BPSK to achieve 1 Mbps transmission, the following
rules of transmission are applied:
The transmit power of IEEE 802.11 DSSS varies from region to region as shown
in Table 2.9.
Source: IEEE, ‘Part 11’ in Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) Specifications — Higher-Speed Physical Layer Extension in 2.4GHz band,
IEEE 802.11b, 1999 edn, IEEE, Table 115, p. 52.
Note: In addition, power control is a mandatory requirement under the IEEE 802.11 DSSS
standard if the maximum power is greater than 100 mW.
The third type of IEEE 802.11 physical layer definition is infra-red (IR).
Infra-red (IR)
Infra-red transmission is a good candidate for sending and receiving information
in a closed area where there is line-of-site (LOS) between transmitter and
receiver, e.g. when the transmission is confined to a meeting room or a classroom.
As for FHSS and DSSS, IR supports two modes of transmission at 1 Mbps and
2 Mbps respectively. The modulation technique that it employs is pulse position
modulation (PPM). For a data rate at 1 Mbps, 4-PPM is employed; while for a
data rate at 2 Mbps, 16-PPM is adopted.
• it operates at a band around 2.4 GHz (the same as IEEE 802.11 DSS);
• it adds in two more data rates, one at 5.5 Mbps and another 11 Mbps;
The Baker sequence is still employed in the 1 Mbps and 2 Mbps data rates, while
the CCK helps to provide the spreading sequences for the 5.5 Mbps and 11 Mbps
data rates.
U-NII stands for ‘unlicensed national information structure’. Each of the bands
has a bandwidth of 100 MHz and each has four 20 MHz channels. It should be
noted that each of these bands has different output power limits. Table 2.10
summarises these limits.
Table 2.10 IEEE 802.11 OFDM channels with output power limits
For the modulation of IEEE 802.11a, a combination of BPSK, QPSK and QAM
are employed, depending on the data rates. Table 2.11 is a summary of these. We
will not investigate each of these individually.
Table 2.11 IEEE 802.11 OFDM modulation techniques with respect to data rates
The medium access control (MAC) is a sublayer of the data link layer in a
WLAN. Its function is to employ the same transmission medium irrespective of
the kind of wireless media that is used. In other words, the MAC layer is designed
to be independent from the type of physical layer, whether IEEE 802.11-DSSS,
IEEE 802.11-FHSS, IEEE 802.11a, etc. The main functions of the MAC layer
include:
• They support data transfer within the same WLAN (there is no connectivity or
capability to link up to other WLANs).
The distribution system can be regarded as the backbone network or the transport
medium that carries the MAC service data units (MSDU). According to IEEE
802.11 specifications, this distribution system is implementation independent, i.e.
it can be of a wireless medium, as any one of the above discussed IEEE 802.11
physical layer alternatives, or it can be of a wired medium such as IEEE 802.3
Ethernet LAN or IEEE 802.5 Token Ring.
Before transmitting a frame, the MAC coordination must obtain the access grant
of the network by one of the following modes:
In addition to the above coordination functions in the MAC sublayer that relate to
channel access, a fragmentation/defragmentation process is also implemented in
the MAC sublayer in order to divide a long message into smaller units to increase
the reliability of transmission.
The DCF is a mandatory access method for transferring asynchronous data to best
effect in IEEE 802.11. The DCF operates exclusively in ad hoc networks but can
coexist with the point coordination function (PCF) in infrastructure networks. The
operation of the DCF is based on the carrier-sense multiple access with collision
avoidance (CSMA/CA) algorithm. This CSMA/CA algorithm avoids the
Physical and virtual carrier sense mechanisms are used for the MAC coordination
function to determine the state of the medium.
The virtual carrier sense function is carried out by the MAC sublayer. There are
two means of distributing reservation information, namely:
• the Duration/ID field in directed frames. This field reserves the period of time
of the medium, either to the end of the next ACK frame or, in the case of a
fragment sequence, to the end of the ACK frame following the next fragment.
The procedure for performing the CSMA/CA algorithm of the MAC coordination
function is as follows:
No
NAV = 0
?
Yes
No Random
Medium Backoff
idle ? Time
Yes
Transmit
Frame
Yes
Collision?
No
Frame Transmission
Successful
The procedure for the DCF to solve the hidden station problem is summarised
below:
• The sender station (i.e. Station 1) sends the RTS frame, which is addressed to
Station 2, to all stations within its coverage (i.e. Stations 2 and 4).
• Only the addressed station (Station 2) responds with a CTS frame to the sender
station. The other station (Station 4) receives the RTS frame and goes into
‘stay quiet’ mode until a time specified in the RTS frame.
• After sending a CTS frame, the addressed station starts communication with
the sender station, while the other stations within the coverage of the sender
station remain in a ‘stay quiet’ mode.
The above DCF with the RTS and CTS mechanism is an optional feature in the
IEEE 802.11 standard. Details of the RTS and CTS mechanism are discussed in
Appendix B.
After sending the beacon frame, the PC transmits one of the following frames:
• A data + CF poll frame, which is a combined frame that can increase the
efficiency of the system.
The details of how the PCF sets up a CF period are discussed in Appendix C.
SELF-CHECK 2.5
Compare the DCF and the PCF by completing the following table.
DCF PCF
Type of network
Contention method
Data type
Initiating Authenticating
station station / AP
First authentication frame
Content of this frame :
Type : Management
Subtype : Authentication
Information items :
Authentication algorithm identification = open system
Station identity assertion (in SA field)
Authentication transaction sequence number =1
Authentication algorithm dependent information (none)
• The requesting station sends out a management frame for authentication to the
responding station or AP and indicates that it uses a ‘shared key’ for
authentication.
• The requesting station copies the challenge text from the second frame into a
third frame. The whole of the third frame is encrypted by the WEP with the
shared key for transmission.
• The responding station decrypts the challenge text by the WEP algorithm with
the shared key. If the decrypted challenge text is the same as the challenge text
sent earlier, the responding station replies with a successful authentication.
Copyright © Open University Malaysia (OUM)
UNIT 2 WIRELESS LOCAL AREA NETWORKS AND WIRELESS PERSONAL AREA 95
NETWORKS
Requesting Responding
station station / AP
First authentication frame
Content of this frame :
Type : Management
Subtype : Authentication
Information items :
Authentication algorithm identification = shared key
Station identity assertion (in SA field)
Authentication transaction sequence number =1
Authentication algorithm dependent information (none)
Privacy transmission
To prevent eavesdropping over the wireless medium, IEEE 802.11 specifies the
WEP encryption algorithm, which intends to provide the same amount of security
as wired transmission. WEP is a symmetric algorithm, which means that it uses
the same secret key for encryption and decryption. The process of WEP
encryption and decryption is illustrated in Figure 2.15.
Initialization IV
vector (IV) Seed WEP Key sequence
Secret key PRNG Ciphertext
Plaintext
Integrity algorithm
Message
WEP decryption process
• The WEP algorithm is described in the RC4 algorithm from RSA Data
Security, Inc.
• Plaintext goes into the integrity algorithm and this algorithm generates a 4-
octets integrity check value (ICV) which is used to protect against
unauthorised modification.
• The plaintext is concatenated with the ICV. If the number of octets of the
plaintext is n, the number of octets of resulting message with ICV will be n +
4. Therefore the key sequence is equal to the plaintext and ICV in order to
carry out a bit-wise XOR function.
• The output of this process is a message containing the IV and the ciphered
text. Only the plaintext and the ICV will be encrypted.
The process of decryption is the reversed process of encryption with the same
secret key but the decryption process has to compare the ICV values, which are
generated in the decryption process and decrypted from the information. If the
values are different, this means that the received data is in error.
SELF-CHECK 2.6
• Control frame: A control frame is used to deliver control messages. It does not
have a frame body, which is used to carry data information.
Details of the above MAC frame structure will not be discussed here.
IEEE 802.11 is not the only standard available in the market to provide wireless
communication services supporting voice, video and data transmission. On the
Copyright © Open University Malaysia (OUM)
98 UNIT 2 WIRELESS LOCAL AREA NETWORKS AND WIRELESS PERSONAL AREA
NETWORKS
other side of the globe, a European counterpart of the IEEE 802.11 standard
supports wireless communication services of a similar kind. In the following
section, the European wireless communication standard HIPERLAN will be
discussed.
HIPERLAN
Aware of an increasing demand for wireless voice, video and data
communications services, the European Telecommunications Standards Institute
(ETSI) created the broadband radio access network (BRAN) project to develop
the standards and specifications for these demands in the market. Consequently
HIPERLAN (high performance radio local area network) was developed.
HYPERLAN/2
There are two frequency bands assigned for HIPERLAN/2, namely the lower
frequency band from 5.150 GHz to 5.350 GHz and the upper frequency band from
5.47 GHz to 5.725 GHz. If we look at the bands in Hong Kong, only two 5 GHz
bands are assigned for WLANs, namely the 5.150 GHz to 5.350 GHz band and
the 5.725 GHz to 5.850 GHz band. This implies that HIPERLAN/2 will not be
officially adopted in Hong Kong.
Centralised mode
This mode of operation is mainly used when an area which is larger than a radio
cell has to be covered. When HIPERLAN/2 is operating in a centralised mode, an
AP is connected to a core network, e.g. an ATM, IP or cellular network. All the
traffic from mobile terminals (MTs) has to pass the AP or central controller (CC),
either between the MTs within the AP, or between the MT and others MT
anywhere within the network.
Direct mode
The direct mode is for ad-hoc networking and is mainly used in private home
environments, where a radio cell covers the whole serving area. All data
exchanges between the MT within the same AP or CC do not pass the CC and AP
but are under the control of the CC or AP.
• physical layer;
• data link layer;
• convergence layer; and
• higher layers.
The data link layer has medium access control, a radio link control sublayer and a
data link control sublayer. The functions of the physical layer, data link layer and
convergence layer will be discussed individually.
The data rates of HIPERLAN/2 range from 6 Mbps to 54 Mbps and these data
rates are varied by applying different puncturing patterns to the mother
convolution codes in the forward error correction (FEC) coding functional block
and by applying different modulation methods (e.g. BPSK and 64QAM). Table
2.12 lists HIPERLAN/2’s modulation schemes.
Personal electronic devices such as cellular phones and personal digital assistants
(PDAs) have become more popular, more intelligent and interactive. Their data
capabilities have also been enhanced: they can connect with other devices and
they can support various types of information. For example, many PDA devices
process personal calendars and to-do lists and can synchronise these capabilities
with databases in personal computers.
However, there has been one common difficulty when using these personal
electronic devices. Propriety special-purpose cables have long been used to
interconnect personal devices. As a result a person who uses several personal
devices has needed several different types of cables, e.g. a cable for the headset
and mobile phone, a cable for connecting the PDA and computer. People have
found it frustrating to manipulate all these cables, and if an old model of cable is
lost or damaged, it is usually quite difficult to obtain a replacement. This
frustration with cables has been the main driving force for developing wireless
connectivity solutions for interconnecting personal devices.
In 1994, Ericsson Mobile Communications Division carried out studies with the
aim of finding out what could be used to replace cable connections between
mobile phones and their various peripheral devices. Five companies, IBM,
Toshiba, Intel, Ericsson and Nokia, founded the Bluetooth Special Interest Group
(BSIC) in 1998 with the aim of creating a non-proprietary standard for personal
area networks (PANs). In the rest of this section, we will look at Bluetooth.
What is Bluetooth?
The first 1.0 draft version of the Bluetooth standard was finalised in July 1999 and
was revised to 1.0b in December 1999. The latest version is 1.1. Details of version
1.1 are available from http://www.bluetooth.org/.
The Bluetooth standard positions itself at the PAN level. Compared with WLANs
and HIPERLANs, Bluetooth is more handy and portable.
A computer is not always necessary for the above Bluetooth applications. Very
often a cheap and simple device (such as a mobile phone and its headset) with a
wireless connection can be used for such applications. The Bluetooth chip is also
very inexpensive.
vCard/vCal WAE
OBEX WAP
AT-
TCS BIN SDP
Commands
UDP TCP
IP
PPP
RFCOMM
Audio
1.2CAP
Baseband
Bluetooth radio
From Figure 2.18, we can see that different applications run on different protocols
stacks, while all the applications run on the same physical and data link layers.
The protocols can be classified as:
Adopted protocols
The adopted protocols are described in Table 2.14.
Table 2.14 Bluetooth adopted protocols
Transmission control One of the main protocols in TCP/IP networks. Whereas the IP
protocol (TCP) protocol deals only with packets, TCP enables two hosts to
establish a connection and exchange streams of data. TCP
guarantees delivery of data and guarantees that packets are
delivered in the same order in which they were sent.
Internet protocol (IP) Specifies the format of packets, also called datagrams, and the
addressing scheme. Most networks combine IP with a higher-
level protocol called transmission control protocol (TCP), which
establishes a virtual connection between a destination and a
source.
Object exchange A session protocol in the OSI model. OBEX can be used to
(OBEX) protocol exchange all kinds of objects like files, pictures, calendar entries
(vCal) and business cards (vCard) in a simple and spontaneous
manner.
Content formats (e.g. vCard, vCal): vCard and vCal only specify
the specification formats of electronic business cards and
electronic calendaring and scheduling and these specifications
are now under the control of the Internet Mail Consortium.
Bluetooth architecture
A Bluetooth network adopts a master-and-slave architecture. The master device
controls traffic flow within the architecture, while the slave device simply follows
commands from the master device. The master devices in Bluetooth system can
either form a point-to-point connection or point-to-multipoint connection with its
slave devices.
In a piconet configuration, there is only one master device while there is at least one
and up to seven active slave devices. In other words, a piconet configuration adopts
both a point-to-point connection (where there is one master device and one slave
device) and a point-to-multipoint connection (where there is one master device but
more than one slave device).
A network that operates with one master device and one slave device is usually
said to be in single slave operation. On the other hand, in a network where there is
one master device and up to seven slave devices, the same physical channel in a
piconet is shared among them. If there are more than seven active devices, the
additional ones can participate passively in a ‘parked’ state.
Copyright © Open University Malaysia (OUM)
UNIT 2 WIRELESS LOCAL AREA NETWORKS AND WIRELESS PERSONAL AREA 107
NETWORKS
Figure 2.19 (a) Piconet with a single slave operation, (b) Piconet with a multi-slave
operation, (c) Scatternet operation
Source: Bluetooth SIG (2001) Specification of the Bluetooth System, version 1.1,
Bluetooth SIG, Figure 1.2, p. 42.
SELF-CHECK 2.7
A total of 79 channels are used in most countries, as shown in Table 2.15, with
channel spacing being 1 MHz. Since the ISM band encounters interference
problems, frequency hopping algorithms are implemented in the radio
transmission.
Physical channel
The physical channel of Bluetooth is formed by a pseudorandom hopping
sequence which hops through 79 or 23 radio frequency channels. Most countries
use 79 radio frequency channels, while a few countries (e.g. France) use 23 radio
frequency channels. Each physical channel is divided into time slots where each
time slot uses an RF hop frequency to transmit. Consecutive time slots use a
different RF hop frequency to transmit. The nominal hop rate is 1600 hops/s
because the duration of each time slot is 625 s. All Bluetooth units in piconet
shall be time- and hop-synchronised to the channel.
The time division duplexing (TDD) scheme is used in the Bluetooth system for
master and slave devices to transmit their data. This TDD scheme divides the
physical channel into time slots, each 625 µs in length, as shown in Figure 2.20.
Time slots are numbered from 0 to 227–1 with a total of 227 numbered time slots.
Time slot numbering is done in a cyclic assignment. The master device transmits
its data in even-numbered time slots while a slave device transmits in odd-
numbered time slots. The beginning of each packet of data is aligned with the start
of each time slot but the packet can be extended up to five time slots for master or
slave device data transmission. This extension is called a multi-slot packet. Figure
2.21 illustrates a master device transmitting a multi-slot packet.
Physical links
As mentioned, the Bluetooth system has two architectures, namely:
Two kinds of physical links are therefore required in order to cater to the different
requirements of these architectures. They are:
The SCO link is a symmetric, point-to-point link between the master and a
specific slave in a single-slave piconet. The master device maintains an SCO link
by reserving time slots at regular intervals and therefore an SCO link may be
considered as a circuit-switched connection between the master and the slave.
A typical application SCO link supports time-bounded information such as voice.
A master can support up to three SCO links to the same slave or to different
slaves. A slave can support up to three SCO links from the same master, or two
SCO links if the links originate from different masters. It should be noted that an
SCO link is a synchronous connection between master and slave devices;
therefore, SCO packets will never be retransmitted. This is very similar to voice
transmission in a mobile phone system. Any time slots which are not reserved for
SCO links can be used by the master device to communicate with its slave on a
per-slot basis.
Packets
In order to support the SCO and ACL physical links, Bluetooth has defined three
groups of packets: control link packets, SCO packets and ACL packets. Details of
Bluetooth packet formats are beyond the scope of this course and will not be
discussed further.
Logical channels
There are five logical channels which are carried by packets:
• Link control (LC) channel: This is always carried by the packet header and
carries link control information such as flow control and payload types.
• Link manager (LM) control channel: This is carried by the payload of the ACL
link and carries control information between the link managers of the master
and the slave(s).
• User asynchronous (UA) user channel: This is carried by the payload of the
ACL link and transports L2CAP asynchronous data.
• User isochronous (UI) user channel: This is carried by the payload of the ACL
link.
SELF-CHECK 2.8
Error correction
Three error correction schemes are used in the Bluetooth system:
• 1/3 FEC;
• 2/3 FEC; and
• ARQ scheme for data.
The purpose of the FEC scheme on the data payload is to reduce the number of
retransmissions. If the Bluetooth system is in an error-free environment, it is not
necessary to use high redundancy correction schemes such as 1/3 FEC. Therefore,
the Bluetooth system can adopt a flexible approach to its error correction scheme
for payload, for example, the data-medium rate (DM) and data-high rate (DH)
packets in the ACL link and the high-quality voice (HV) packets in the SCO link.
ARQ scheme
Bluetooth uses an unnumbered fast acknowledgement ARQ scheme. If a slave
device receives a packet from its master successfully, it acknowledges this by
setting the ARQN to 1 so that its master will not retransmit the packet. However,
if the master device receives ARQN = 0, it will keep on retransmitting the packet
until it receives the successful indication (ARQN = 1) from the slave or until
timeout. This is a fast method that minimises the retransmission of packets.
Bluetooth audio
Two formats can be supported in the Bluetooth air interface: 64 kbps log pulse
coded modulation (PCM) format (A-law or µ-law) or 64 kbps CVSD (continuous
variable slope delta modulation).
CVSD CODEC
Instead of using fixed step size delta modulation, Bluetooth employs continuous
variable slope delta (CVSD) modulation. The step size of CVSD modulation can
be adapted according to the average signal slope to reduce the slope overload
effect. The slope overload effect occurs when the change in information is so fast
that the quantised information waveform cannot follow the original information
waveform.
Bluetooth security
Bluetooth has three modes of security:
• security mode 1: non-secure data transfer;
• security mode 2: service-level security; and
• security mode 3: link-level security.
Mode 1 — non-secure
In this mode of operation, the device never initiates a security procedure. Examples
of non-secure data transfer are a vCard and vCalender.
• 128 bit random number (RAND): A pseudo random number generator is built
inside a Bluetooth unit. This generator provides a 128 bit random number for
generating the encryption and authentication keys, etc.
• Authentication key: A 128 bit authentication key is used to authenticate a
Bluetooth unit.
• Encryption key: The encryption key is used to protect the information which
transfers between devices. The length of this encryption key varies from 8 bits
to 128 bits to meet the requirements for cryptographic algorithms in different
countries and to facilitate future security upgrades by minimising the hardware
upgrade cost.
Authentication
The authentication process is performed by the link manager protocol, which is
defined in the Bluetooth specification, to verify the identity of a device before
establishment of a link connection. It is a challenge-response method of
authentication. The requesting device sends a challenge message to another device
and the responding device determines whether it has the correct shared key for
establishing the connection. Secret or link keys are exchanged during the
initialisation phase of this procedure. The following four types of link keys can be
used for authentication:
Encryption
After the authentication process has been completed successfully, the Bluetooth
device can initiate encryption to encode the data so that it can be transmitted
securely. The encryption depends on the encryption key, whose size varies from 8
bits to 128 bits. The size of this encryption key must be negotiated between the
two devices. The encryption procedure is as follows:
• The authentication process is completed successfully between two devices.
• An encryption key is negotiated and derived from the link key.
• Both devices agree on the size of encryption key and encryption is carried out.
• Encryption is performed for transmitted data between the two devices.
Let’s look at how the physical layer of the IrDA standard supports different
transmission rates.
Electrical
signal Start Stop
bit Data bits bit
delivered
by/to the 0 1 0 1 0 0 1 1 0 1
UART
Electrical
IrDA
frame
Bit Pulse width
time = (3/16) × bit time
The signaling rate and pulse width at the IrDA encoder are listed in Table 2.16.
Table 2.16 Signaling rate and pulse width at the IrDA encoder
(for a transmission rate from 2.4 kbps to 115 kbps)
This electrical IrDA frame from the encoder is transmitted by the infra-red
transducer module. Reception of IrDA is the reverse process of transmission.
Figure 2.25 Frame format for transmission at 576 kbps and 1.152 Mbps
Source: Bluetooth SIG (2001) Specification of the Bluetooth System, version 1.1, Bluetooth SIG,
Figure 2.5, p. 16.
The ADDR and data (where data includes control and information) fields are
defined in the IrDA link access protocol (IrLAP) layer; while the information field
in data is optional. The signaling rates and pulse duration for these transmission
rates are defined in Table 2.17.
Table 2.17 Signaling rates and pulse durations of the IrDA encoder
(transmission of rate at 576 kbps and 1.152 Mbps)
00 1000
01 0100
10 0010
11 0001
Figure 2.26 illustrates how the data information is correlated to the 4PPM data
symbol and transmitted stream.
Start flag (STA): A specific symbol is used to indicate the beginning of the data
information symbol as shown in Figure 2.29.
Stop flag (STO): A specific symbol pattern is used to define the end of frame and
end of data symbol, as shown in Figure 2.30.
SELF-CHECK 2.9
What are the coding schemes for different transmission rates in IrDA?
If all of the staff in a company use the same static key to access the Internet, an
intruder might obtain this key information via human conversation.
• An intruder can obtain the secret key by using some known plaintext and its
encrypted data to work out the keys used for encryption. The known plaintext
can be derived from the known structure of IP packets, or from known
constants.
• Although the cyclic redundancy check (CRC), which is inside the ICV, is also
encrypted using the WEP algorithm, an intruder can change the bits in the
payload and update the encrypted CRC accordingly. Therefore, the receiver
may not be aware of a modification of data.
• Per-packet key construction and distribution: The encryption key for each
client is generated automatically and periodically by WPA. In fact, each frame
uses a unique key in WPA. This prevents the same key being used for a long
time, e.g. weeks or even months.
This PSK provides home and SOHO users with TKIP encryption just as IEEE
802.11x with EAP does. However, there is a major difference between the
authentication in IEEE 802.11 and PSK. In PSK, a password (or PSK) is manually
input on the client device and AP for authentication.
SELF-CHECK 2.10
• Entering and storing a personal identity number (PIN): The PIN can be used
with other variables to generate a link and encryption key. Users input the PIN
and transmit it over the air to other users in order to set up a secure link. Such
transmission of PINs over the air makes the wireless system vulnerable as
intruders can easily invade the network by capturing the PIN and then posing
as a user. In addition, users at both ends input this PIN in the Bluetooth system
in order to form a secure link. This kind of PIN storage in the Bluetooth device
will be a problem if the device is lost.
• Bluetooth device address: Every Bluetooth device has a unique address. If this
unique address is stolen, activities can be traced and monitored through this
address.
• By forming a small size ad hoc network and keeping the network in a secure
place, e.g. in a conference room. Intruders will not be able to gain access to the
network easily because the maximum distance for the Bluetooth connection is
around 10 meters.
Applications of WLANs
Wireless LANs can be used for indoor applications or building-to-building
applications.
Indoor applications
Indoor applications extend the connection of wired LANs to anywhere in a
building by access points (APs). There are several advantages to installing a
WLAN indoors rather than installing a wired LAN. For example, the
reconfiguration or reinstallation costs of a WLAN are much lower than wired
LAN and expansion of a wireless network is much easier. In addition, the user can
choose to provide coverage anywhere in the building. The installation time of the
WLAN is very short and, therefore, it can be used to provide a temporary LAN
service for special events. Finally, a WLAN provides an easy way to extend the
number of users. For example, one additional access point can provide LAN
access for around 250 users.
• public buildings;
• business environments;
• domestic buildings; and
• industrial environments.
• Law courts: If courtrooms are situated in old buildings that lack a wired LAN,
WLANs can be used to access reference documents and previous court cases
for reference.
Building-to-building applications
WLAN bridges and antennas are required for building-to-building applications.
There are two kinds of topologies for building-to-building applications: point-to-
point topology and point-to-multipoint topology. Point-to-point topology requires
a panel antenna with a WLAN bridge as shown in Figure 2.34.
SELF-CHECK 2.11
• Telephony profiles: Under this category, Bluetooth SIG has further defined
application profiles for intercoms, cordless telephony, headsets, fax and dial-
up networking.
• LAN access profiles: These profiles mainly allow Bluetooth devices to access
a LAN.
• ObEx profiles: Under this category, three application profiles have been
defined: synchronisation, file transfer and object push. These application
profiles are mainly for data transfer between two Bluetooth devices.
Headset
Server
Laptop or PC
Figure 2.37 Dial-up for the Internet access
Source: Bakker, D M and McMichael Gilster, D (2002) Bluetooth End to End, New
York: M&T Books, Figure 13.4, p. 190.
In addition, the Bluetooth LAN profile can also be used to support Internet access
where Bluetooth devices, such as cellular phone, PDA and computer, establish a
Bluetooth link to LAN equipment that has Bluetooth capability. In Figure 2.38
below, the dotted line represents a link that supports the Bluetooth LAN profile,
while the solid line represents a wired cable.
LAN
LAN access point Data terminal
Cellular Phone
Intercom
Cordless
Telephone
A cellular phone with the Bluetooth cordless telephone profile can also
communicate with the public service telephone network (PSTN) via a cordless
phone base station which is connected to PSTN. The cordless phone base station
also supports the Bluetooth telephone profile and is commonly used at home.
Synchronization Synchronization
of data of data
Synchronization
of data
PDA
Cellular phone
Mobile computer
After releasing the above profiles in Bluetooth specification version 1.1, the
Bluetooth SIG carried on its development of new profiles to support new
applications:
• Human interface device (HID) profile: The draft of this profile was produced
in 2000 and its adopted version 1.0 was released in May 2003. This profile is
used for devices that are used by humans to control computer systems, e.g.
keyboards, pointing devices, control buttons, bar code readers, etc.
• Advanced audio distribution profile: The adopted version 1.0 was finalised in
May 2003. This profile is defined for distributing high-quality audio content
on asynchronous connectionless link (ACL) channels. However, this
‘advanced audio’ will be distinguished from ‘Bluetooth audio’, which is
narrow band voice on synchronous connection-oriented (SCO) channels. A
typical application for this profile is the distribution of audio content from a
stereo music player to headphones or speakers.
Besides the above mentioned profiles, there are many others that are currently
under construction by the Bluetooth SIG. These profiles can be found on the
following webpage:
https://www.bluetooth.org/docman2/ViewCategory.php?group_id=53&category_i
d=214
(Note that you may have to register at www.bluetooth.org before accessing the
above webpage.)
• http://grouper.ieee.org/groups/802/15/pub/2001/Jan01/01066r0P802-15_TG2-
Coexistence-of-BT-with-80211g.ppt
• http://grouper.ieee.org/groups/802/15/pub/2001/Jan01/01077r0P802-15_TG2-
Bluetooth-Interference-with-WLAN-DS.ppt
Set up cost
Setting up an IEEE 802.11 network is more expensive than a Bluetooth network
since a client card and AP are required in a wireless LAN. The set up cost of a
Bluetooth network is relatively low as the Bluetooth chip is already integrated into
the device and the cost of the chip is about US$5. Therefore, it is expected that by
2006, the number of Bluetooth devices will outnumber that of WLANs by ten
times in Europe (according to Forrester Research, http://www.forrester.com/ER/
Research/Report/Summary/0,1338,11827,00.html).
Coverage area
Although a WLAN is more expensive to set up, its coverage is about
300 m; much larger than Bluetooth’s coverage of 10 m.
Data rate
The maximum data rate of a WLAN is 54 Mbps while Bluetooth’s is only
1 Mbps. In practice, the maximum asymmetric data rate is around 721 kbps and
the symmetric data rate is 432.6 kbps.
Ad-hoc networking
The ad-hoc network is one of the strengths of Bluetooth. It is much easier to set
up an ad-hoc network in Bluetooth than in IEEE 802.11.
Power consumption
Bluetooth devices consume less power than IEEE 802.11 devices. Therefore,
Bluetooth is more suitable for applications run on mobile phones and portable
devices. The transmitting power of Bluetooth can be 1 mW, 2.5 mW or 100 mW,
while that of a WLAN is 100 mW or 1 W. The higher the transmitting power, the
shorter the duration that a device can be supported by the same battery capacity.
Information type
IEEE 802.11 is mainly employed for data transfer applications. If voice
communication is required, it can only be done on voice over IP (VoIP).
However, Bluetooth is designed for supporting both data and voice applications.
SELF-CHECK 2.12
An IEEE standard for wireless local area networks (WLANs) that offers
wireless transmission over relatively short distances at up to 54 megabits per
second (Mbps) compared with the 11 megabits per second of the 802.11b (Wi-
Fi) standard. Like 802.11b, IEEE802.11g operates in the 2.4 GHz range and is
thus compatible with it. IEEE802.11g operates on DSSS and OFDM.
The IEEE task group is continuing to develop future IEEE 802.11 standards to
improve the functionalities of wireless LAN. These developments include:
• IEEE 802.11e: This standard will extend the function of the MAC layer to
support applications such as voice or video with the quality-of-service (QOS)
requirement. Since it is a new standard on the MAC layer, it will be common
to all IEEE 802.11 physical layer variants.
• IEEE 802.11i: The existing encryption security provided by the MAC layer is
through the use of WEP and is a relatively weak security method. IEEE
80211i has been designed to incorporate 802.1x, which uses extensible
authentication protocol (EAP) for user authentication, and stronger encryption
techniques such as AES (advanced encryption standard).
• IEEE 802.11n. The first official meeting was held in Sept 2003. The aim of the
task group is to define a new standard of data transfer of at least 100 Mbps.
Evolution of HIPERLAN/2
The first release of the HIPERLAN/2 specification was published in April 2000,
while the prototype and product demonstration were held at the end of 2002. ETSI
is still carrying on its work on the future development on the interworking
between HIPERLAN/2 and 3G mobile phone infrastructures.
Evolution of Bluetooth
The Bluetooth standard evolved from version 1.1 to version 1.2, which
incorporates new features for security and avoiding frequency interference with
WLAN at 2.4 GHz. The new standard was officially released in June 2003 and
includes the following new features:
• Anonymity mode: masks the physical address of radio to raise the security
level of the Bluetooth system.
Summary
This unit has looked at various wireless technologies for WLANs and WPANs.
Such technologies include IEEE 802.11, HIPERLAN/2 and Bluetooth.
For IEEE 802.11, physical layer variants including DSSS, FHSS, IR and OFDM
were explained. Different MAC layer frame structures and functions were touched
on. We also looked at HIPERLAN, and described different functional blocks of
the HIPERLAN/2 physical layer.
In our discussion of WPANs, we took a closer look at one of the most popular
standards in the current market, Bluetooth. This standard has the fundamental
application of replacing physical cables between different devices. Its baseband
specification was elaborated in some detail.
Various applications that make use of WLAN and WPAN technologies were also
discussed. These applications are gaining more attention and popularity in the
market. We also examined the evolution of these wireless technologies and looked
at some of their possible future applications.
Last but not least, there are various signs in the market that different
standardisation bodies are making an effort to facilitate the coexistence of these
wireless networks in the market. We looked at these efforts and briefly touched on
some possible future trends in the WLAN and WPAN markets.
References
Asuncion, S and Lopez-Hernandez, F J (2003) Wireless LAN standards and
application, Norwood, MA: Artech House.
Bakker, D M and McMichael Gilster, D (2002) Bluetooth end to end, New York:
M&T Books.
IEEE, ‘Part 11’ in Wireless LAN Medium Access Control (MAC) and Physical
Layer (PHY) Specifications — Higher-Speed Physical Layer Extension in
2.4GHz band, IEEE 802.11b, 1999 edn, IEEE.
Sikora, A (2003) Wireless personal and local area networks, UK: Wiley.
Assume that the base station provides radio coverage in a circular footprint, as
depicted above. The diameter of the coverage is two times that of the radius of the
radio coverage, which is:
Diameter = 2 Radius = 2 1 km = 2 km
For a vehicle to travel at 100 km/hour, let the time taken to travel 2 km be T.
This implies the car takes 1.2 minutes to travel from one end of the cell to the
other end. A cell with a 1 km radius can be regarded as nominal. For base stations
providing radio coverage in urban areas, a smaller radius is normally employed.
Confined radio coverage could increase overall traffic capacity in the network
since the frequency reuse factor can be higher.
Do you think the 1.2 minutes taken to travel from one end of the cell to the other
end is long or short? Think of the average length of time of your mobile phone
conversations. Is it longer or shorter than 1.2 minutes? I bet that most of your calls
are longer than that. If the base stations do not possess any capability to handover
the mobile phone from one base station to another, the call will be dropped and
the conversation discontinued. Now, you should understand why handover is
important to any wireless systems that are employed in situations where there is
outdoor mobility of mobile stations.
Self-test 2.2
1 The following criteria can be used to classify wireless networks:
Advantages Disadvantages
• Flexible and cableless • Bandwidth spectrum is
connection limited
• No problems with • Restricted range
incompatible connectors • Electromagnetic radiation
• Easily formed ad hoc may pose health hazards
networking • Vulnerable to interference
• Rapid deployment with • Security risks
low cost for infrastructure
Self-test 2.3
Taking the offset of channel assignment, x, as 31, and the region as France, the
following table is obtained.
17 5 18 32 23 7 16 4 13
33 26 10 31 20 29 22 12 6
28 14 25 0 8 1 15 3 11
30 24 9 27 19 2 21 34
f x (i ) b(i ) x mod(35) 48
This implies that the channel frequency number of the first five hopping
frequencies are 61, 49, 62, 76 and 51.
Self-test 2.4
The band interval between two consecutive center frequencies in IEEE 802.11
DSSS is B = 5 MHz. The bandwidth of a channel in IEEE 802.11 DSSS =
22 MHz (this implies half of the bandwidth B½bw= 11 MHz).
Let X be the band interval between the two nearest non-overlapping channels, e.g.
between channel 1 and channel 6, as used in this example.
Self-test 2.5
DCF PCF
Type of network Ad hoc and Infrastructure
infrastructure network only
network
Contention method CSMA/CA Contention free
Data type Asynchronous data Synchronous data
Self-test 2.6
1 The function of authentication is to verify the identity of users before their
connection to the network.
2 There are two methods for authentication. They are open system
authentication and shared key authentication.
3 The encryption method for IEEE 802.11 is wired equivalent privacy (WEP).
The initialisation vector (IV) is used to extend the lifetime of the secret key
because the IV can be changed periodically without changing the secret key.
Self-test 2.7
The configurations of Bluetooth are piconets with one slave, piconets with
multiple slaves, or scatternet configurations. An example of a piconet with one
slave is a mobile phone and its cordless handset. An example of a piconet with
multiple slaves is a personal computer (master device) connected with a Bluetooth
mouse, keyboard and printer (slave devices).
Mouse
Mouse
Keyboard
PC PC
Printer Headset
Piconet Piconet
Self-test 2.8
Channels
LC Control
Channel is Are transferred as payload in the packet
transferred to the
header of every
packet except ID
packet
Packet *
AUX1
NULL
POLL
NULL
POLL
DM1
DM1
DM3
DM5
FHS
FHS
DH1
DH3
DH5
HV1
HV2
HV3
DV1
ID
ID
Header
Physical
Note : Packet* - A complete packet shall have “Access Code”, “Header” and “Payload”, but above diagram only shows the
“Header” and “Payload” parts of packet. In addition, the physical link shall be formed basis on a complete packet.
Self-test 2.9
Signaling rate Coding scheme
2.4 kbps RZI (Return-to-zero inverted)
9.6 kbps RZI
19.2 kbps RZI
38.4 kbps RZI
57.6 kbps RZI
115.2 kbps RZI
576 kbps RZI
1.152 Mbps RZI
4 Mbps 4PPM
16 Mbps HHH(1,13)
Self-test 2.10
Problem Current security Resolved by WPA
methods of IEEE
802.11
Authentication Intruders can 1 Open system — is 802.1x — is a four-way
access the a null handshaking
network by authentication authentication process
stealing the system and anyone and requires an
key. can access the authentication server to
network. distribute the access key
2 ‘Shared-key’ to the client stations and
system — requires AP for access.
a key to gain access PSK — requires the user
to the network but to manually distribute the
this key is password or key to the
distributed client stations and the AP
manually to every for authentication.
user.
Self-test 2.11
Both host and client buildings require the following equipment:
• a hub.
Panel or
Panel or omnidirectional
omnidirectional antenna
antenna
RF cable RF cable
WLAN WLAN
bridge bridge
Self-test 2.12
Although Bluetooth and WLAN overlap in certain applications, they should
complement each other in the market, rather than directly compete with each
other. According to the comparisons of their strengths and weaknesses, we can see
that Bluetooth is not designed to directly compete with WLAN IEEE 802.11
because it is designed for WPAN applications as a cable replacement and to
provide an ad-hoc network. For corporate or home LAN applications, customers
will continue to use WLAN devices rather than Bluetooth devices since the data
transmission rate of Bluetooth is only 1 Mbps. The only problem with the
coexistence of WLANs and Bluetooth is interference, because they use the same
ISM frequency spectrum at the 2.4 GHz band.
Recognising this problem, the IEEE 802.15 task group was formed to investigate
coexistence mechanisms between IEEE 802.11 and Bluetooth. There are two
mechanisms for reducing interference between Bluetooth and IEEE 802.11: non-
collaborative and collaboration mechanisms. The details of these mechanisms can
be found at http://www.hp.com/sbso/wireless/wifiBluetooth.html.
Glossary
ACL Asynchronous connectionless link
ACK Acknowledgement
AES Advanced encryption standard
AP Access point
ARQ Automatic repeat request
ATM Asynchronous transfer mode
ANSI American national standards institute
BSS Basic service set
CF Contention-free
CNIRP Non-ionising radiation protection
CRC Cyclic redundancy check
CSMA Carrier-sense multiple access
CTS Clear to send
CVSD Continuous variable slope delta modulation
DCF Distributed coordination function
DLL Data link layer
DSSS Direct sequence spread spectrum
EAP Extensible authentication protocols
EIRP Equivalent (or effective) isotropically radiated
power
ERP Effective radiated power
FCC Federal Communications Commission
FHSS Frequency hopping spread spectrum
HIPERLAN/ High performance radio local area network type 2
2
Appendices
Appendix A Base-hopping sequence for different countries
Table 2.19 Base-hopping sequence for Spain
13 4 24 18 5 12 3 10 25 19
8 23 15 22 9 21 0 6 14 1
20 7 16 2 11 17 26
17 5 18 32 23 7 16 4 13
33 26 10 31 20 29 22 12 6
28 14 25 0 8 1 15 3 11
30 24 9 27 19 2 21 34
Set 1 0 3 6 9
Set 2 1 4 7 10
Set 3 2 5 8 11
Set 1 0 3 6 9 12 15 18 21 24
Set 2 1 4 7 10 13 16 19 22 25
Set 3 2 5 8 11 14 17 20 23 26
Set 1 0 3 6 9 12 15 18 21 24 27 30
Set 2 1 4 7 10 13 16 19 22 25 28 31
Set 3 2 5 8 11 14 17 20 23 26 29 32
1 5 7
Send Receive Receive
SIFS
Send frame
Station RTS CTS ACK
S1
3 10 6
Receive Send Send
SIFS
SIFS
Receive frame
RTS CTS ACK
DIFS
Station 4
S2 Receive Net Allocation Vector
CTS (NAC CTS)
2
Station Receive Net Allocation Vector
S4 RTS (NAV RTS)
Notes:
1 At a particular point in time Station 1 starts transmitting an RTS frame that is addressed to
Station S2. This frame can be received by stations S2 and S4.
2 After Station S4 successfully receives the RTS frame it sets the NAV time counter and ‘stays
quiet’. The NAV counter on Station S4 then gets the time it requires for the CTS, data and
ACK frames in addition to the corresponding SIFS intervals.
3 Later on, after a SIFS time interval, Station S2 transmits the CTS frame. This can be received
by Stations S1 and S3.
4 Station S3 sets its NAV counter to the time required to transfer the data and ACK frames, as
well as the intervening SIFS time, and then ‘stays quiet’.
5 After Station S1 has successfully received the CTS frame, and waited for a SIFS interval, it
then transfers the data frame.
6 After waiting for a SIFS interval, Station 2 sends an ACK frame to confirm successful
reception.
7 The data has been transferred successfully, the NAV counters in both stations that were not
involved in the communication have run out and, after a DIFS time period has elapsed, a new
data transmission can start.
Figure 2.41 RTS and CTS mechanism
Source: Sikora, A (2003) Wireless Personal and Local Area Networks, UK: Wiley,
Figure 4.11, p. 69.
Further notes: ‘SIFS’ refers to ‘short interframe space’. The actions on the first
line (top line) are performed by Station 1, while the actions on the second line are
performed by Station 2 and so on. The actions on the fourth line (bottom line) are
performed by Station 4. Only Station 2 and Station 4 are within the radio coverage
of Station 1, while Station 3 is beyond the radio coverage of Station 1 as shown in
Figure 2.12.
CF_Max_Duration
1 The point coordinator (PC) sends out a beacon frame to start the CFP.
2 When all stations receive the beacon frame, they update their NAV value by
the parameter value, CFPMaxDuration, which is carried by the beacon frame.
This NAV prevents the stations from taking control of the medium so that a
contention-free period is set up for all stations.
3 After sending out a beacon frame, the PC waits for at least one SIFS period
and then transmits a contention-free poll (CF-poll) frame, a data frame, a
data+CF-poll frame or a contention-free end frame (CF-end). The CF-end
frame will be sent immediately to terminate the CFP if there is no buffered
traffic in the PC. CF-poll contains the address of the station which is to be
called by the PC. In Figure 242, the PC/AP sends out the combined data (D1)
with a CF-poll frame to the destination station.
5 If the PC/AP wants to send another piece of data to a different station, it sends
out the combined data with CF-ACK and CF-poll. The CF-ACK part is used
to acknowledge the previous reception of data (D1) to the old station, while
the CF-poll and data (D2), as shown in Figure 242, is addressed to a new
station.
7 The PC/AP sends out a CF-poll with/without data but it does not receive any
CF-ACK within the interval PIFS. The PC/AP starts to transmit another piece
of data (D4) to a new station by CF-ACK.
8 Finally, the contention-free period is ended when the PC/AP sends out the CF-
end frame.
Overview
This unit introduces you to fixed wireless wide area networks. Wide area
networks (WANs) are generally used to deploy broadband services with high-
speed data transmission applications, such as multimedia services and video-on-
demand services. The demand for high-speed data transmission is a result of the
popularity of the Internet. In addition, the commercial acquisition and mergers in
recent years of telecommunications companies, software companies and
entertainment companies have also contributed to the growth in demand for high-
speed data transmission.
Fixed wireless WANs are networks that provide wireless communication services
to radio subscribers who are at fixed locations. It shall be noted that the
counterparts of fixed wireless WANs are mobile wireless WANs, where target
radio subscribers do not have rigid or fixed locations during data transfers within
the networks.
Many people claim that the main force driving broadband services originated
from the Internet, where Web browsing has almost become a daily part of life.
Furthermore, the amount of data being downloaded or retrieved by end-users
during Web browsing has increased to a very large extent, thereby increasing
demand for high-speed data networks that can provide fast and efficient data
transmissions.
In addition, with the maturity of voice over IP (VoIP), voice messages over the
Internet have contributed to the demand for broadband services. VoIP is directly
competing with traditional long-distance-call services provided by
telecommunications services providers in providing inexpensive voice messages
between Internet users. However, VoIP is not without problems. The current
version of IP packet data transmission over networks, IPv4, does not support
grade of service (GOS). This implies packets will be sent from the initiator to the
recipient in a best effort mode. Thus, there is no guarantee that a packet can be
called through at a certain level of GOS. In the next version of IP packet, IPv6,
GOS on packet transmission over networks can be assured.
Business forces
Apart from technical forces, business forces also explain the rapid rise in
broadband use. In recent years, there have been a number of global mergers and
acquisitions among technology-media-telecom (TMT) companies. A very familiar
case in Hong Kong was the acquisition of Hong Kong Telecom by Pacific
Century CyberWorks (PCCW). The former was a dominant telecommunications
operator, while the latter was an Internet startup company.
It has been argued that traditional television, radio and telephone services are in
decline and that the coming era will be the age of multimedia services deployed
with computers, mobile phones and digital televisions. This is one of the reasons
why there have been strategic alliances between mobile phone makers and
Internet giants, as well as portable communication devices manufacturers. There
has consequently been an increasing demand for wireless broadband networks
since the traditional way of building up a wired broadband network (requiring
cable laying and an enormous degree of road work) cannot cope with the rising
demand for service deployment.
Now, let us take a look at the different types of wireless technologies that can be
employed as fixed and mobile wireless broadband networks.
• cost of deployment;
• speed of deployment;
• flexibility of the network; and
• reliability of the network.
ACTIVITY 3.1
In the past, most of the wireless broadband connections were deployed for private
use and these were primarily point-to-point connections between private
buildings. However, after the government released new licenses for building
wireless broadband networks, a number of companies deployed wireless
broadband services in metropolitan areas to provide public services. We refer to
these companies as competitive local exchange carriers (CLECs) or Internet
service providers (ISPs). They use wireless broadband technology to provide the
‘last mile’ from their base stations to customer premises instead of laying physical
cables (e.g. twisted copper cable or fiber cable).
Capacity limitation
A wireless broadband network employs radio spectrum, which is a finite resource.
This finite resource limits the number of users or traffic that can be used on the
network. In general, we can equate the amount of spectrum with data throughput,
1 Hz spectrum yielding 1 bps to 4 bps depending on various factors, such as the
modulation scheme and environmental factors.
Line-of-sight operation
Proper and effective operation of a wireless broadband network relies heavily on
having line-of-sight between transmitters and receivers. This requirement restricts
the distance between the hub station and the customer’s premises (this usually
varies from a few kilometers to tens of kilometers). For this reason, the antenna at
the customer’s premises is usually installed on the rooftop of the building so that
line-of-sight can easily be obtained between the antenna at the customer’s
premises and the hub station. In addition, the beam width of the antenna at the
customer’s premises should be very narrow, normally 3 to 4 degrees, to allow
direct focus to the hub station. However, the beam width of the antenna at the hub
station will be wide enough (normally 90 degrees) for point-to-multipoint
operation.
Equipment interoperability
Since there are different standards for wireless broadband networks currently in
the market, it is difficult to ensure that the equipment from different vendors can
inter-operate properly. Therefore, service providers normally purchase all of the
equipment from one vendor to ensure the network works properly.
Radio spectrum
Wireless broadband networks employ frequency bands between 900 MHz and 40
GHz. Some of the bands require licenses but some do not. At the end of this
section, we will outline which bands require licenses and which do not.
In general, a higher frequency band has an advantage over a lower frequency band
because higher frequency bands have more available spectrum for deploying
services. In addition, the antenna dimension is smaller for a higher frequency band
than for a lower frequency band, and, therefore, it is easier to install the antenna
for a higher frequency band at the customer’s premises. However, higher
frequency band transmission also has its drawbacks: its signal strength attenuates
more than a lower frequency band under bad weather conditions such as rain and
fog.
Both private and public carriers have their own reasons for using a licensed
spectrum or an unlicensed spectrum. The main advantage of using a licensed
spectrum is that the government regulates and assigns the spectrum to designated
operators and interference among different users is therefore minimised. On the
other hand, unlicensed bands are free for anyone to use but the networks
experience more unregulated interference.
The radio spectrums for wireless broadband are listed in the Table 3.3.
Table 3.3 Radio spectrums for wireless broadband networks in the United States
wants to have a private link to bridge a LAN system between two points, he/she
can apply to the FCC in the United States for a licensed frequency between 21.2
GHz to 23.6 GHz.
SELF-CHECK 3.1
What are the pros and cons of wired and wireless broadband networks?
If radio subscribers have to ‘roam’ from here to there and require high speed data
rate transmissions during their travels, they will want mobile wireless broadband
services, while if radio subscribers are fixed at some locations (usually remote
ones) and need high-speed data rate transmissions, fixed wireless broadband
services should be their choice.
This section will discuss the technologies which are used for mobile and fixed
wireless broadband services. In addition, the differences between mobile
communication technologies and fixed wireless broadband communication in the
context of WLL will be elaborated.
Examples of such include the advanced mobile phone system (AMPS), total
access communication system (TACS), global system for mobile communication
or Groupe Spéciale Mobile (GSM), digital European cordless telephone (DECT),
multipoint microwave distribution system or multichannel multipoint distribution
system (MMDS), local multipoint distribution service (LMDS), etc. In the
following sub-sections, each of these types of technologies will be elaborated.
Cellular technologies
There are many variants of cellular technologies, which can be used for the
application of the last-mile of WLL systems in order to provide narrow or
broadband services to end-users. (Last-mile technology is any
telecommunications technology, such as wireless radio, that carries signals from
broad telecommunication on across the relatively short distance — hence, the ‘last
mile’ — to and from a home or business.) These variants of technologies include
AMPS, TACS, GSM, general packet radio service (GPRS), CDMA2000 and third
generation (3G). Detailed elaboration of each of these technologies, including
system configurations and operational principles, will be given in Units 9 and 10.
Proprietary technologies
Proprietary technologies systems employ both TDMA and CDMA techniques and
were particularly designed for the implementation of fixed broadband wireless
communication systems. They, therefore, offer better quality than either cordless
or cellular technologies in terms of the following aspects:
• bit rates;
• coverage size; and
• voice quality.
Nortel Proximity I operates at the 3.4 GHz to 3.6 GHz frequency range and uses
frequency division duplex (FDD) to provide simultaneously full duplex
communication on uplink and downlink. Each carrier can support ten 32 kbps
channels, in other words, it is TDMA based. Two lines are provided for each
subscriber, therefore, a maximum of 64 kbps (32 kbps2) bandwidth is made
available per subscriber.
Proprietary technologies systems usually have excellent voice quality and data
capabilities but their main drawback is that they are very expensive compared
with other wireless technologies. The reason behind this is that open wireless
systems are widely adopted by most operators thereby lowering the cost of
equipment owing to a large economy of scale. However, as closed or proprietary
systems are not adopted widely, the equipment cost remains very high.
Microwave technologies
Microwave technologies systems were originally used to provide the multichannel
broadband broadcasting of video signals. As video signal transmission is one-
direction only, i.e. from the broadcasting transmitter to end-users’ receivers,
microwave technologies systems were designed to provide one-way signal
transmission, or more precisely, downlink only. Recently, microwave
technologies-based systems have been developed into asymmetric full duplex
communication systems that can transmit both uplink and downlink signals at the
same time so that they can support broadband wireless services (e.g. Internet).
Copyright © Open University Malaysia (OUM)
170 UNIT 3 FIXED WIRELESS WIDE AREA NETWORKS
Range High (>> 35 km) Low (6–15 km) Very low (5 High (30 km)
(radius) km)
ACTIVITY 3.2
Interpret the information in Table 3.4 and comment on the pros and
cons of the various technologies.
Of the above list of technologies adopted for fixed wireless broadband networks,
cordless phone technologies are not suitable for deploying mobile wireless
broadband services as there is no roaming between cells. This heavily hinders
smooth call throws when radio subscribers travel from one place to another during
data transmission.
In addition, microwave technologies are not suitable for mobile services since
there are stringent requirements for having line-of-sight between microwave
transceivers in order to attain a transmission link between the two ends. This can
hardly be fulfilled when radio subscribers are moving within the network.
Cellular technologies
As mentioned in the previous section, there are various cellular technologies,
namely 1G technologies such as AMPS, TACS; 2G technologies such as GSM
and narrowband CDMA; 2.5G technologies such as GPRS and EDGE; and 3G
technologies such as CDMA2000 and UMTS. A detailed description of these
technologies will be given in Units 9 and 10.
Yet WLAN IEEE 802.11b is not without challenges. Interference resistance and
security are the two prime concerns of employing WLAN as a mobile wireless
broadband network. A detailed discussion of WLAN technologies was already
included in Unit 7. You can revisit that unit if needed.
SELF-CHECK 3.2
There are four methods for implementing the wireless local loop for
fixed wireless broadband communication services.
List them and give an example of each method. Also explain why the
line-of-sight transmission criterion is important for some methods but
not important for others.
The frequency spectrum assigned for LMDS is from 28 GHz to 31 GHz, but there
are slight variations of such frequency spectrum from country to country. Table
3.5 lists the frequency spectrum of LMDS in different countries.
Since the frequency spectrum allocation of LMDS is near 28 GHz, its wavelength
is very short, ranging from 0.0107 meters to 0.01XX meters). A signal with such a
short wavelength is suitable for direct line-of-sight communication between two
fixed locations (e.g. a base station location and a subscriber’s home or office)
only. The advantages of using LMDS to provide fixed wireless broadband
services include the following:
On the other side of the base station, the microwave antenna will be connected. It
is used for communicating with the equipment in the customer’s premises.
• access methods;
• modulation; and
• the network interface unit (NIU), which is equipment that is installed in the
customer’s premises.
• A co-sited base station: This is the most commonly adopted method for
installing an LMDS base station where both the digital equipment and its
microwave equipment are installed at the same building, as shown in
Figure 3.1.
Access methods
The access methods which are currently implemented in LMDS are frequency
division multiple access (FDMA) and time division multiple access (TDMA). The
access method that is in a downlink direction (i.e. from the LMDS base station to
the customers’ premises) commonly employs TDMA technology where the
customers share the downlink connection, as shown in Figure 3.3. The data to
each customer is carried by the individual time slot of the carrier in the downlink
direction.
SELF-CHECK 3.3
In Figures 3.3 and 3.4, we can see that the carrier uses the TDMA for
downlink (from the base station to the customers’ premises) if the
customers’ services are mainly for Internet traffic. Why is TDMA,
rather than FDMA, used for downlink in this situation?
In addition to the above traffic factor, there are a lot of other issues that might
affect the choice of TDMA or FDMA link. Such factors include but are not
limited to the following:
Table 3.6 lists some other issues related to TDMA and FDMA links.
*Note: The FEC percentage indicates the percentage of packets that are FEC packets. The greater the
FEC percentage is, the greater the packet loss that can be handled. If it is 100%, a redundant stream is
created to protect against packet loss.
FEC packets are used to strengthen the stream against data packet loss. They accomplish this by
containing redundant information about the preceding packets. This redundant information can be
used to reconstruct the stream in the event of packet loss.
Modulation
The modulation methods for TDMA and FDMA are almost the same. The
estimated bandwidth for FDMA access schemes for a 2 Mbps constant bit rate
(CBR) connection is listed in Table 3.7.
Note: The estimated bandwidth excludes the effects of guard bands, filters and transport overhead.
The new LMDS equipment even supports the 256-QAM modulation method.
Legend:
NIU
STB Set-top box
VC Video codec
VC
STB TV
PBX
LAN
• a chassis for easy housing of the various modules of the unit; and
• a power supply.
In addition to the above components, a set-top box (STB) can be connected to the
NIU to provide interactive television services for residential subscribers.
Furthermore, a video coder (VC) can be installed in the NIU to provide a video
conferencing facility to business subscribers.
Propagation issues
Among the various propagation issues, the following two aspects require special
consideration:
• Multipath fading: The multipath fading effect occurs less in LMDS. There are
four reasons for this:
2 The height of the antenna also plays an important role in the multipath
effect. If the antenna is located higher up, its multipath effect will be lower.
The antenna of LMDS is normally installed on the rooftop of the
customer’s premises and is more than six meters above ground level,
whereas the height of a mobile radio (GSM or PCS communication
system) is about two meters high (i.e., the height of a human being).
Therefore, the multipath fading effect is weaker in the LDMS system.
3 The type of antenna will also affect the reception of the multipath signal.
The mobile radio employs an omni-directional antenna which can receive
and transmit in 360° on a horizontal plane, and, therefore, can receive all
multipath signals from all horizontal directions. However, LDMS uses a
directional antenna (normally with a 10° to 15° horizontal transmission
pattern). As a result, fewer multipath signals can be received in the LMDS
system.
4 A moving environment has more multipath signals and mobile radios are
usually moving (e.g. the customer carries the mobile radio while walking
on the street or traveling in a bus). However, the antenna of LMDS is
fixed. As a result it will have a less pronounced multipath fading effect.
• the data rate for transmission that can be achieved with respect to its frequency
spectrum, i.e. spectral efficiency; and
In the following sub-sections, system capacity for both FDMA and TDMA will be
explained.
In order to illustrate the data capacity of an LMDS system, the spectral efficiency
of the modulation methods being employed shall be used. As discussed in Unit 5,
spectral efficiency is measured in bits per second per hertz. Table 3.8 lists the
spectral efficiencies of the three most common methods employed in QAM.
Now let us assume an operator has a usable spectrum of S GHz with a frequency
reuse ratio of n. Here usable spectrum refers to the total spectrum that is
employed in deploying the operator’s wireless communication services, while
frequency reuse ratio refers to the number of times that the operator utilises the
same channel within the same wireless network. In applications such as those for
LDMS, frequency reuse ratio is usually related to the number of sectors ns in the
network.
A simple equation that relates usable spectrum, frequency reuse ratio and the
spectrum of each sector in a network can be derived as
S = n Sn
Example 8.1
Assume each customer premises site uses a 5 MHz FDMA link at
4-QAM modulation.
The data rate for each customer site is 5 spectrum efficiency with
4-QAM from Table 3.8.
The data rate for each customer site is = 5 1.5 Mbps = 7.5 Mbps
We have 125 MHz usable of the downlink and 125 MHz for uplink. Therefore,
the total available downstream links are (125 MHz / 5 MHz) = 25 links.
Therefore, the total data rate for downstream links per sector, which use 4-QAM
modulation, is 7.5 Mbps 25 links = 187.5 Mbps.
The maximum number of customer sites per sector = 125 MHz / 5 MHz = 25.
SELF-CHECK 3.4
Assuming that each customer premises site uses a 5 MHz FDMA link at
16-QAM and the usable spectrum is 500 MHz as well, what is the data
rate for each customer?
1
Can you think of examples of the need to have ‘unbalanced’ uplink and downlink transmission
assignment? A typical example is Internet browsing where downlink data traffic (from the
server to the subscriber’s computer) is very much heavier than its uplink data traffic (from the
subscriber’s computer to the server), since subscribers perform data enquiry and data
downloading more frequently and in larger bulk than uploading.
For the sake of easy comparison between the system capacity of the FDMA and
TDMA systems, let us assume that there is a 250 MHz bandwidth available for
uplink and downlink transmission (as in the illustration mentioned in the previous
sub-section ‘System capacity for FDMA’). This will result in 50 links (250 MHz /
5 MHz) being supported by each sector of the TDMA access system. As a result,
each sector can support up to 50 5.12 Mbps = 256 Mbps for downlink and
uplink transmission.
As each user will employ one time slot for transmission, the total number of
simultaneous users that can be supported will be 50 links 80 time slots = 4000
time slots per sector. If we assume a concentration level of 5:1 over the sector,
there will be 4000 time slots 5 = 20000 connections per sector within the
designed blocking level. The assumption of a 5:1 concentration level reflects the
Internet usage of these connections.
History of MMDS
The MMDS service was first launched as instructional television fixed
programming (ITFS) in the late 1960s. The frequency spectrum was
2.5 GHz to 2.7 GHz. It was used by universities to provide supplementary lecture
material and campus information. The FCC of the United States recognised
MMDS’s commercial applications and it allocated a number of 6 MHz channels
in the 2.5–2.7 GHz range for TV broadcasting, called the metropolitan
distribution system (MDS). The market for this service seemed very attractive but
it gradually lost its potential because of its limitations for providing bandwidth for
more TV channels and services. Until the mid-1980s, the MMDS system was
deployed in several countries including Australia, Canada, France and Hong
Kong.
In the United States, the MMDS service operators use the system to provide
analogue TV and data communication services. The system architecture of
MMDS to provide one-way communication will be discussed in the next section,
and its options for two-way data service is also discussed in this unit.
In Hong Kong, i-Cable Communication Ltd has operated its Cable TV service
since 1993. Initially Cable TV employed the MMDS technology to provide TV
programmes to Hong Kong customers because MMDS deployment was cheaper
and faster. However, the company had to build a hybrid fibre coaxial (HFC)
infrastructure to provide the Cable TV service in line with its commitments. The
statistics in Table 3.9 show that the number of subscribers to the MMDS service
has gradually decreased, while the number of subscribers to the HFC service has
increased.
Table 3.9 Cable TV subscribers served by the MMDS HFC networks in Hong Kong
Nowadays, Cable TV services are mainly provided by the two-way HFC network
and only a small portion of subscribers, living in remote areas, use the MMDS
network in Hong Kong.
Network architecture
The MMDS network can be used to provide:
• TV broadcast; and
• two-way broadband Internet access.
Let’s examine some of the differences in the network architecture for providing
TV and two-way broadband Internet access.
Satellite Decoders/
Amplifier
receiver encoder
Cable Converter/
Cable transmitter/ Modulation Up converter decoder
receiver
TV
Video distribution station
Subscriber
Figure 3.6 MMDS system configuration for broadcasting TV only
Source: Held, G (2000) Data Over Wireless Networks: Bluetooth, WAP, and Wireless
LANs, McGraw-Hill, Figure 9-1, p. 198.
Figure 3.6 shows how a video distribution station receives the TV signal either
from the cable or the satellite: it is rare to have both. In Hong Kong, the Cable TV
company runs cable to distribute the TV signal to video distribution stations.
Normally, the antenna of this station is very high so that it can cover a large area.
The coverage area cannot be as large as a typical MMDS running at 2.5 GHz,
which covers around
50 km to 100 km. The MMDS system receives the VHF frequency and then,
rescrambled, upconverts it into a 2.5 GHz frequency, amplifies the signal and
transmits it to subscribers.
service provider uses the POTS return path for customers who transmit small
amounts of data back to the Internet but download a lot data from the Internet.
Figure 3.7 illustrates the configuration of wired returns. (This is the current
supercell configuration.)
100 Mbps
10/100 Mbps
CMD-2000B LAN card
LAC
Upstream terminal
server
(modem bank)
Modulator Modulator
card card
IF
Transmitter
Transmitter
3 × 2 MHz channel
IF downstream
Other transmitters:
One digital transmitter
per 6 MHz channel Waveguide combiner
Antenna
Telephone
network
Antenna/Transceiver
• The downstream router and modulator has a LAN interface and a modulator,
which provides 64-QAM, 16-QAM and QPSK modulation. It also provides
the intermediate frequency (IF) signal for the transmitter. In the MMDS
system, there is one transmitter per channel.
• The upstream terminal server is a modem bank to provide the dial-up Internet
service for the return path of subscribers.
• The transmitter converts the IF signal from the downstream router and
modulator to the carrier frequency at 2.5 GHz and it also amplifies the signal
magnitude.
• The waveguide combiner combines several signals from the transmitter and
feeds these signals into a cable feeder for an antenna.
• The wireless broadband router provides the modulation (e.g. QPSK, 16-QAM
and 64-QAM) and gives the LAN and RS232 interface for the customer’s
Internet service connection.
Figure 3.8 Wireless return path of the MMDS system in the ISM band
Source: International Engineering Consortium, Wireless Broadband Modems,
http://www.iec.org/online/tutorials/wire_broad, Figure 4, p. 11.
The cable modem (e.g. Hybrid CCM) has a RS232 signal output port and it can be
used to drive a commercial available spread spectrum modulator at 900 MHz. A
transverter module converts the signal from 900 MHz to 2.4 GHz in the ISM band
for the return path. Therefore, a spread spectrum demodulator is employed at the
base station to decode the signal of transmission. Since this ISM band is an
unlicensed band for transmission, the problem of interference is addressed in this
method. A highly directional 2.4 GHz antenna is normally installed at the
customer’s premises to minimise the probability of interference with other users.
• the down converter, the main function of which is to convert the data at the
carrier frequency (2.4 GHz) down to the intermediate frequency (IF) for the
splitters, upstream router and demodulator;
• splitters, which split uplink signals into each demodulation module; and
• an upstream router and a demodulator which has a LAN interface and provides
64-QAM, 16-QAM and QPSK demodulation to obtain the data.
Antenna/Transceiver
End user
computer Wireless broadband router
10Base-T/USB
Multipath communications
The signal to be transmitted at microwave frequency (e.g. 2.5 GHz) is affected by
the multipath signals, which are created by the reflection of the objects in the path
between the transmitter and receiver, such as trees, houses, etc. These multipath
signals are superimposed with the original signal and the composition of the
signals is received by the receiver. If obstacle objects are near the receiver, the
time delay between the reflected signals and the original signal is very slight and
the phase difference between them is also slight, as is shown in Figure 3.10(a).
However, if obstacles are far from the receiver, the time delay between them is
apart and they have a high degree of phase misalignment, as is shown in Figure
3.10(b).
Primary Primary
received received
signal signal
(a) Reflected signals due to near objects (b) Reflected signals due to far objects
Figure 3.10 Multipath effect
Source: Held, G (2000) Data Over Wireless Networks: Bluetooth, WAP, and Wireless
LANs, McGraw-Hill, Figure 9-3, p. 203.
In the OFDM system, there are a number of subcarriers within an OFDM carrier.
These subcarriers are considered to be orthogonal and independent of each other.
Therefore, there is no need to have a guard band for each subcarrier. As a result,
the frequency utilisation of OFDM is better than for a FDM system, which
requires a guard band for each carrier. However, note that guard bands are
required for each OFDM carrier.
In addition, each OFDM symbol has a cyclic prefix and this cyclic prefix is just a
redundancy copy of a part of the symbol. It acts as a guard period for the
multipath signal. As a result, the OFDM system is more robust to the multipath
effect. This modulation scheme is also used by vendors for their equipment.
VOFDM employs spatial diversity to the OFDM system, and the spatial diversity
actually uses multiple antennas in the hub and customer sites, as shown in Figure
3.11. Different multipath signals are received by different antennas and the system
adds these multipath signals into a stronger useful signal using the vector
processing technique. Therefore, the spacing of the antennas needs to be at least
100 times the wavelength of the MMDS system in order for the VOFDM spatial
diversity technique to function properly. Since the MMDS system operates at 2.5
GHz, the required spacing of each antenna is about 12 metres.
SELF-CHECK 3.5
Compare LMDS and MMDS in terms of architecture (base station,
customer premises equipment, and return path) and propagation.
• Internet phone: This acts like a regular phone, yet it does not make any circuit-
switch connection to PSTN. Voice message transmissions are all through IP
packet data via an IP data network (e.g. wireless broadband networks).
• IP fax machine: This is similar to an Internet phone. This device transmits fax
data via an IP data network (e.g. wireless broadband networks).
• ‘Yuppie appliances’: These include devices such as the ‘pet tracker’, which is
a collar on a pet that tracks the pet’s location via global positioning satellite
(GPS).
• Set-top box: This device sits on top of a TV and provides various services,
such as digital TV, Internet access, and gaming (interactive video games).
Gateway core
Applications
Home LAN Management Local loop Last mile
interface(s) Network services interface technologies
RTOS
Processor
• Work at home (telework): Employees can connect to their office to work via
this high-speed wireless data network.
In the future, all home entertainment appliances (such as TVs, VCRs and stereo
systems), telephone systems and computers may be connected to a home gateway
for Internet access.
terms of deployment cost, deployment time, equipment cost, data rate supported,
etc.
Among the various wired and wireless broadband access technologies, we have
chosen those technologies that are most commonly adopted in the market. These
technologies include:
• cable modem;
• satellite.
Table 3.11 Comparison of different wireless and wired broadband access methods
Data rate 128 kbps 1–8 Mbps 30 Mbps 27 Mbps 36 Mbps 36 Mbps
(both (downlink), (shared (shared (shared (shared
uplink 384/640 downlink), downlink downlink downlink
and kbps 0–384 ), 0–5 ), 0–8 ), 2 Mbps
downlink) (uplink) kbps Mbps Mbps (shared
(uplink) (shared (shared uplink)
uplink) uplink)
ACTIVITY 3.3
Interpret the information in the Table 3.11 and compare the various
technologies for broadband networks in terms of:
• deployment cost;
• deployment time;
• data rate;
• capacity; and
• coverage.
What are the relative strengths and weaknesses of each technology?
After you have made some notes on the strengths and weaknesses of the
access methods for different technologies, compare your notes with the
feedback at the end of the unit.
Future trends
If we want to try to assess future trends in wireless broadband networks, there are
various aspects to consider. In this section, we will look at the future prospects of
wireless broadband networks with regard to:
T-1/E-1
FR
Broadband TDM
wireless ATM
Transceiver POTS
10BaseT
T-1/E-1 HDSL
line modem T-1/E-1
Frame
Service
TDM
distribution
ATM
backbone
ATM fiber services
MainStreetXpress ATM switch
36170
base station
10BaseT
ADSL ADSL
Ethernet modem
Figure 3.13 Wireless and wired-line network integration
Source: Vacca, J R (2001) Wireless Broadband Networks Handbook: 3G, LMDS, and
Wireless Internet, McGraw-Hill, Figure 27-1, p. 702.
There are at least two strategies for implementing a wired-line and wireless
integrated network:
• Companies build a core fiber network in the metropolitan area and extend
fibers to buildings only within 400 m of the core fiber network, while a fixed
wireless broadband network provides service to customers who are located 4
km away from the core fiber network. The company can gradually extend its
fiber connection by moving fiber to the first points of wireless broadband
connection and shifting the wireless broadband base station further away.
Nextlink in the United States has adopted this network expansion strategy.
In Hong Kong, two LMDS carriers acquired their wired-line licenses in 2002.
Some customers in Hong Kong are served by hybrid wireless and wired-line
networks. To find out more about this, complete the following activity.
ACTIVITY 3.4
IEEE 802.16
The IEEE 802.16 working group started its work in 1999 to create a standard for
wireless broadband access for offering a high speed, high capacity, low cost, and a
scalable solution to extend fiber optic backbones. The progress of 802.16
standards is listed below:
• The first IEEE 802.16 standard (‘air interface for fixed broadband wireless
access systems’) was approved in December 2001. This standard defines
operating frequencies of wireless broadband network between 10 GHz and 66
GHz.
• The IEEE 802.16 working group published a standard called IEEE 802.16.2
recommending the operation of multiple, different broadband systems in the
10 GHz to 66 GHz frequency range.
• The IEEE 802.16 working group continued its development of standards and it
approved the development of a new amendment IEEE 802.16e, which
extended the standard to include ‘combined fixed and mobile operation in
licensed bands’ (2 GHz to 6 GHz), in December 2002.
ETSI Standard
The European Telecommunications Standards Institute (ETSI) has created a
broadband radio access networks (BRAN) project for the development of two
standards: HIPERACCESS and HIPERMAN. HIPERACCESS covers frequencies
above 11 GHz while HIPERMAN is for frequencies below 11 GHz.
HIPERACCESS
• The current version v1.3.1 of the HIPERACCESS Data Link Control (DLC)
Protocol specification was published in December 2003.
HIPERMAN
SELF-CHECK 3.6
Summary
This unit has discussed some fundamental concepts in wireless broadband
networks and examined some of the reasons why broadband services are
becoming more and more popular.
After completing this unit, you should understand that broadband services can be
provided by wireless networks, wired-line networks or hybrid networks (i.e.
integrated wireless and wired-line networks). In this unit, we have considered
some basic broadband issues such as the choice between a private or a public
carrier, the unique aspects of wireless broadband, the radio spectrum of wireless
broadband systems, and some issues related to deploying broadband services such
as deployment cost and deployment pace.
Two types of microwave technologies that are widely employed for providing
broadband services, local multipoint distribution service (LMDS) and multipoint
microwave distribution system/multichannel multipoint distribution system
(MMDS), were discussed in this unit. The applications and services that are
provided by these technologies were also elaborated.
References
Cisco Systems (2001) ‘Multipoint broadband wireless: Leading Cisco technology
surmounts near line-of-sight limitations’, Packet, 13(2),
http://www.cisco.com/en/US/about/ac123/ac114/ac173/ac167/
about_cisco_packet_department09186a008010f7d7.html.
Held, G (2000) Data over wireless networks: Bluetooth, WAP, and Wireless
LANs, McGraw-Hill.
Feedback to activities
Activity 3.1
The five companies that obtained fixed wireless broadband licenses were:
• PSINET Hong Kong Limited (now called Winstar Wireless Hong Kong Ltd);
Activity 3.2
From Table 2.4, you can see that the cellular technologies, proprietary
technologies and cordless phone technologies are good at providing telephony
services, while solely microwave technologies are good at offering optimised data
services. This is backed by the high data rate support and high capacity
characteristics that can realise services such as broadband wireless services, where
there are many subscribers or users.
Activity 3.3
In terms of the deployment cost of broadband access services, we can see from
Table 3.11 that employing ISDN, ADSL and cable modem as technologies is
expensive, whereas their deployment time is medium. Can you think of the reason
behind this? These technologies rely on wired media in order to deploy services,
and laying cable from the central hubs to subscriber premises is a huge task
requiring a lot of expensive road work. The deployment of broadband services via
these technologies is justified from an investment viewpoint in highly populated
areas, such as in high rise residential buildings or in commercial buildings. ISDN
and ADSL technologies do not have the coverage area span of cable modem
technology since the latter technology is primarily accompanied by ordinary
household cable television services provision.
However, you should also note that the data rate attained under ISDN and ADSL
technologies is low compared with other technologies. Such a data rate might still
be acceptable to subscribers for carrying services such as Internet browsing and
data downloading or retrieval. For services that need high bandwidth, such as
video-on-demand, these technologies will severely handicap users.
Now, let us look at the various wireless technologies being adopted to deploy
broadband access methods, i.e. MMDS, LMDS and satellite technology. All of
these have a low deployment time. This is because the operator only needs to set
up transceivers for receiving and transmitting the signal between the central office
and the subscribers’ premises. All that is needed is line-of-sight between the
central office and the transceiver, and there is no need for road work. However,
deployment costs are high for satellite technologies, since the operator has to
launch a number of satellites into space to provide the service.
Regarding the data rate that can be supported by wireless technologies, we can
conclude from Table 3.11 that wireless technologies are superior to wired
technologies in deploying broadband services.
Activity 3.4
Existing LMDS only carriers:
The pros of the wireless broadband network (or the cons of the wired broadband
network) include:
The cons of the wireless broadband network (or the pros of the wired-line
broadband network) include:
Copyright © Open University Malaysia (OUM)
208 UNIT 3 FIXED WIRELESS WIDE AREA NETWORKS
Self-test 3.2
• Cellular technology, for example, AMPS, TACS, GSM, IS95.
Line-of-sight transmission is not critical because of the frequency transmission
at 800/900 MHz.
Self-test 3.3
Since Internet traffic is bursty, customers do not need to hold up the channel
during their idle time. Therefore, TDM access is more appropriate because it
allows customers to share the carriers. In contrast, with FDM access, the physical
Self-test 3.4
From Table 3.8, the spectral efficiency of 16-QAM is 3.5 bps/Hz and the
customer premises site uses 5 MHz FDMA.
The data rate for each customer site is 5 MHz spectrum efficiency with 16-
QAM.
The data rate for each customer site is = 5 MHz 3.5 bps = 17.5 Mbps
Self-test 3.5
LMDS and MMDS can be compared with respect to system architecture and
propagation.
Architecture
Both LMDS and MMDS have:
• a physical link, e.g. E1, ATM, OC3, or OC12 interface for connection between
the base station and the central switch office; and
Yet, there are differences between the architecture of LMDS and MMDS. LMDS
is designed to support two-way communication, and, therefore, its return path uses
the same technology as its forward path. MMDS, on the other hand, is designed
for one-way communication, and, therefore, its return path can use different
technologies, such as dial up, DSSS technique in the ISM band, and limited
special frequency in the MMDS band.
Propagation
• LMDS requires direct line-of-sight propagation because its frequency
spectrum is in 28 GHz.
• MMDS does not require direct line-of-sight propagation because its frequency
spectrum is in 2.5GHz in the US. However, it is around
Self-test 3.6
The current challenges in the standardisation of wireless broadband networks
include:
Glossary
3G Third generation
ADPCM Adaptive differential pulse code modulation
ADSL Asymmetric digital subscriber line
AM Amplitude modulation
AMPS Advanced mobile phone system
ATM Asynchronous transfer mode
CBR Constant bit rate
CDMA Code division multiple access
CLEC Competitive local exchange carrier
DECT Digital European cordless telephone
Copyright © Open University Malaysia (OUM)
UNIT 3 FIXED WIRELESS WIDE AREA NETWORKS 211
OR
Thank you.