Professional Documents
Culture Documents
HomeNetworkBasisTransmissionEnvironmentsandWiredWirelessProtocolsByWalterY Chen-1 PDF
HomeNetworkBasisTransmissionEnvironmentsandWiredWirelessProtocolsByWalterY Chen-1 PDF
Copyright
About Prentice Hall Professional Technical Reference
Preface
References
Acknowledgments
Chapter 1. Introduction
Section 1.1. Home Environment
Section 1.2. Available Means of Transmission
Section 1.3. Chapter Summaries
Section 1.4. References
Chapter 2. Twisted Pair
Section 2.1. Twisted Pair Cable
Section 2.2. Twisted Pair Cable Channel Model
Section 2.3. Noise Model
Section 2.4. Radio Frequency Interference
Section 2.5. Channel Capacity
Section 2.6. MATLAB Files
Section 2.7. References
Chapter 3. Coaxial Cable
Section 3.1. In-House TV Wiring
Section 3.2. Coaxial Cable Model
Section 3.3. Splitters
Section 3.4. Tap
Section 3.5. Cable TV Channel Allocation Scheme
Section 3.6. Channel Model
Section 3.7. Noise Environment
Section 3.8. Channel Capacity
Section 3.9. MATLAB Files
Section 3.10. References
Chapter 4. Electrical Wiring
Section 4.1. In-House Electrical Wiring Cable
Section 4.2. In-House Electrical Wiring Model
Section 4.3. Electromagnetic Emission and Power Spectrum Density
Section 4.4. Noise Environment
Section 4.5. Channel Capacity
Section 4.6. Matlab Files
Section 4.7. References
Chapter 5. Radio Wave
Section 5.1. Available Radio Frequency Spectra
Section 5.2. Indoor Radio Environment
Section 5.3. Channel Attenuation Model
Section 5.4. Channel Impulse Response Model
Section 5.5. Noise Level
Section 5.6. Channel Capacity Calculation
Section 5.7. MATLAB/Simulink Models
Section 5.8. References
Chapter 6. Ethernet
Section 6.1. Media Access and Control Protocol
Section 6.2. 10BaseT
Section 6.3. 100BaseT4
Section 6.4. 100BaseTX
Section 6.5. 100BaseT2
Section 6.6. Autonegotiation
Section 6.7. Media Independent Interface
Section 6.8. MATLAB Files
Section 6.9. References
Chapter 7. HomePNA
Section 7.1. HomePNA 1.0
Section 7.2. HomePNA 2.0 QAM
Section 7.3. MATLAB Files
Section 7.4. References
Chapter 8. FireWire
Section 8.1. Arbitration Protocol
Section 8.2. 1394-1995 Cable Physical Layer Attributes
Section 8.3. Highlights of 1394b
Section 8.4. 1394b Twisted Cable Physical Layer Attributes
Chen, Walter Y.
Home network basis : transmission environments and wired/
wireless protocols / Walter Y. Chen.
p. cm.
Includes bibliographical references and index.
ISBN 0-13-016511-5 (case)
1. Home computer networks. I. Title.
TK5105.75.C47 2003
004.6'8dc21
2003053152
Prentice Hall PTR offers excellent discounts on this book when ordered
in quantity for bulk purchases or special sales. For more information,
please contact:
International Sales
1-317-581-3793
international@pearsontechgroup.com
All rights reserved. No part of this book may be reproduced, in any form or by
any means, without permission in writing from the publisher.
Dedication
To Dr. J. J. Werner who had enabled many of us
About Prentice Hall Professional Technical
Reference
With origins reaching back to the industry's first computer science publishing
program in the 1960s, and formally launched as its own imprint in 1986,
Prentice Hall Professional Technical Reference (PH PTR) has developed into the
leading provider of technical books in the world today. Our editors now publish
over 200 books annually, authored by leaders in the fields of computing,
engineering, and business.
Our roots are firmly planted in the soil that gave rise to the technical
revolution. Our bookshelf contains many of the industry's computing and
engineering classics: Kernighan and Ritchie's C Programming Language,
Nemeth's UNIX System Adminstration Handbook, Horstmann's Core Java, and
Johnson's High-Speed Digital Design.
PH PTR acknowledges its auspicious beginnings while it looks to the future for
inspiration. We continue to evolve and break new ground in publishing by
providing today's professionals with tomorrow's solutions.
Preface
Broadband digital communication used to be limited only to backbone network
infrastructure and to private transmission facilities of large corporations.
Digital broadband access to average households had been promoted for video-
on-demand applications and succeeded, most recently, only as a fast Internet
extension. At this writing, there are at least 15 million homes with PCs
connected to the Internet through broadband access networks in forms of
either ADSL or cable modem. Networking PCs through a home router, with a
home network at one side and the broadband access modem at the other side,
is a good way to share the Internet access among multiple PCs and their users.
Many network service providers, such as AT&T Media One, have endorsed such
an approach rather than insisting that customers pay more for multiple IP
addresses. There are many different brands of home routers available on the
market with many varieties of home networking capabilities.
A home network system can be based on a few transmission media and many
existing and emerging standardized communication protocols are available. A
home network system can be based on in-house telephone wiring, TV coaxial
cable, existing power line, or radio frequency for wireless. Over the telephone
wiring, standards (HomePNA 1.0 and HomePNA 2.0) have been developed by
the HomePNA industry consortium. Using power line, a standard called
HomePlug is now finalized by the HomePlug group. For radio frequency
wireless communication systems, protocols (SWAP 1.0 and SWAP 2.0) are
produced by the HomeRF committee. These are a few of the emerging
transmission systems that have been developed on the concept of no new wire
for existing home applications. Transmission throughputs of these systems are
between 1 and 30 megabits per second (Mbps). They are also developed with
multimedia content in mind. Many of them can carry voice or music packets
with guaranteed quality of service. For newly constructed homes, Category 5
twisted pair cable can be installed in a home run or star configuration to take
advantage of Ethernet standards at transmission throughputs of 10 Mbps, 100
Mbps, or even 1 gigabit per secopnd (Gbps) for PC interconnection and sharing
Internet access. Wireless Local Area Network (LAN) technology defined by
IEEE 802.11, IEEE 802.11a, and IEEE 802.11b can also be used in the home
data networking environment.
I'll keep the Web files up to date and reflect reader feedback there.
References
Finally, I thank my wife, Nancy, and my sons, Aaron and Brian, for their warm
support in the writing of this book, as well as a few other ventures. I hope that
this book will also make my parents, Frank and Sally, and my sister, Linda,
proud.
Thanks, too, to IEEE and HomePNA for use of the following figures.
Figures 6.46.7, 6.136.15, 6.246.26, 6.30, 6.31, 6.33, 6.63, 6.64, 6.83 6.87,
and 6.896.91 reprinted with permission from IEEE Std 802.3, 2000 Ed., "IEEE
Standard for Information technology-telecommunications and information
exchange between systems-Local and metropolitan area networks-Specific
requirements Part 3: Carrier sense multiple access with collision detection
(CSMA/CD) access method and physical layer specifications," Copyright 2000,
by IEEE.
Figures 8.1, 8.2, 8.4 8.14, 8.21, and 8.22 reprinted with permission from IEEE
Std 1394-1995, "Standard for a High Performance Serial Bus-FireWire,"
Copyright 1995, by IEEE. The IEEE disclaims any responsibility or liability
resulting from the placement and use in the described manner.
Figures 8.24, 8.25, and 8.27 reprinted with permission from IEEE Std 1394B-
2002, "Standard for a High Performance Serial Bus-Amendment 2," Copyright
2001, by IEEE.
Figures 10.1810.20 reprinted with permission from IEEE Std. 802.11, First
Edition, "IEEE Standard for Information technology-Telecommunications and
information exchange between systems-Local and metropolitan area networks-
Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and
Physical Layer (PHY) specifications," Copyright 1999, by IEEE.
The IEEE disclaims any responsibility or liability resulting from the placement
and use in the described manner of the figures cited above.
Figures 7.1, 7.4, 7.9, 7.10, 7.127.14, 7.16, 7.17, and 7.21 reprinted with
permission from HomePNA Specifications,"Home Phoneline Networking Alliance
1M8 PHY Specification, Version 1.1, June 2, 1999" and "Interface Specification
for HomePNA 2.06 10M8 Technology, March 20, 2000," Copyright 1998 and
1999, by Home-PNA. HomePNA disclaims any responsibility or liability
resulting from the placement and use in the described manner.
Chapter 1. Introduction
Using a PC at home to finish a little bit of work or to access the Internet has
become a common practice. You might use a dial-up connection, a cable
modem, or a DSL (Digital Subscriber Line) for your access. A broadband access
service, such as a cable modem or a DSL, usually costs twice as much as that
of the dial-up service. However, it is a much better option than installing a
second phone line to keep the primary line open for in-coming calls, especially
during prime hours. Used with a wired or wireless home network, multiple PCs
and their users can share broadband access service at home simultaneously
without noticeable access time degradation. Because of the popularity of
broadband access services, the number of PCs at home, and the affordability of
transmission devices, home networks are turning up in a growing number of
households. With so many different households having network connections
and a wide range of electronic devices, you might wonder at one time what is
really going on when a Web page from a remote corner of the Earth is being
displayed on your PC screen.
After you gain access to the Internet, end-to-end application connections can
be established for useful services such as e-mail, Web browsing, and instant
messaging for known destinations based on the Internet Protocol (IP). Internet
destination addresses of particular interests can also be identified through
portals such as Yahoo. The information exchange between remote Internet
destinations is accomplished by transmitting a different type of packet. A
packet usually consists of a header and a body. The header normally contains
source and destination addresses as well as some kind of identification that
explains the purpose of the packet. The body can carry a command/response
or an encoded text/picture. The IP is defined based on a set of packet formats
and their exchanging procedures. The operation to detect and interpret these
IP conforming packets has been embedded into e-mail and Web browser
software such as Outlook and Netscape.
A home network can thus be used to share a broadband Internet access among
multiple PCs. PCs connected to a home network can also share files on their
hard disk drives and such peripheral devices as printers via the NetBEUI
(NetBIOS Extended User Interface) protocol, which is supplied with every
Windows operating system. Home networking has also been associated earlier
on with home automation where household lighting and appliances were
controlled automatically and remotely. One objective for implementing a
hassle-free home network has been "no-new-wiring." In fact, some wiring
infrastructures already exist in a typical home environment. There is usually
at least one power plug on each wall of a living quarter; multiple telephone
outlets and cable TV plugs can be found within a house. Wiring for the HVAC
(Heating, Ventilation, and Air Conditioning) system and networked smoke
detection devices is less accessible but still available. Wireless communication
devices that use either Radio Frequency (RF) or Infrared also meet the "no-
new-wiring" requirement very well. PC application-based home networks have
increased in popularity recently and can be further expanded to distribute
multimedia contents such as HDTV (High-Definition TV) signals. A high-
throughput minimum latency home network can also be easily adjusted to
accommodate other home networking needs such as home automation.
1.1 Home Environment
Our daily living places have many commonalities. Rooms are usually separated
by interior walls and interconnected by doors. Interior walls are normally made
of sheetrock nailed to a wood frame from both sides and covered by paint.
Electrical, telephony, cable TV, HVAC, and smoke detector wirings are typically
laid within these hollow walls during the construction of a home building.
Typical room dimensions range from 10 feet by 10 feet for bedrooms up to 20
feet by 20 feet for family-gathering living rooms. Room ceiling heights can
range from 7 feet up to 11 feet. A single family home usually consists of one
or two stories with a total living space of between 1500 and 4500 square feet.
The floor separation is usually made of sheetrock for the downstairs ceiling
and carpet laid over clapboard for upstairs floors. Exterior dimensions of a
single family home are from 20 feet by 30 feet up to 40 feet by 60 feet. The
exterior wall of a home building is usually covered by sidings of vinyl, wood,
brick, or stucco. A single-family home is usually located on a private lot of
from 1/8 to 1 acre. Children's play set, a swimming pool, or a garden are
normally located in the backyard of a single-family home's private lot. The
backyard is considered a part of the home living space especially during warm
weather.
Existing in-home wirings, including electrical, telephony, and cable TV, are all
the daisy-chain type and are connected to external service networks. From an
entrance point, usually located on one side of a home at the first-floor or
basement level, a few branches of wires are used to connect wall outlets or
plugs at different rooms through the whole house. The length of each wire
branch is related to the dimension of a house and is usually less than 100 feet.
Electrical wiring usually comes to a house with a neutral wire and two hot
wires of opposite phases. They are terminated at a distribution panel inside the
house and connected to in-home electrical wiring through circuit breakers. A
local ground wire is also introduced at the distribution panel. Each electrical
wall outlet is connected to a hot wire, the neutral wire, and the ground wire
for safety protection. Two phases of hot wires are used for heavy-duty home
appliances such as a wall oven or a clothes dryer. Otherwise, they are
randomly used throughout the whole house. In other words, electrical outlets
on different walls of the same room can be of opposite phases. The telephone
service network is connected to in-home telephone wiring at a demarcation
box located outside a house. In-home telephone wiring can have two pairs,
four pairs, or more. Some newer homes are wired with Category 5 data-grade
cables in a home-run configuration, where every telephone outlet is
individually connected to a central location, for telephone usage. An Ethernet
can be installed over home-run in-home telephone wiring as a home network.
The cable TV service is usually connected to in-home coaxial cables through a
lightning protection block located outside the structure. Multiple wall plugs are
all connected to the same entrance coaxial cable via splitters, which introduces
3 decibels (dB) of signal loss for every 1-to-2 split.
Telephony, data, and TV signal plugs can be located on the same wall plate for
this structured wiring approach. Figure 1.2 shows wall plates capable of
different numbers of outlets or plugs. Modular telephone (RJ-11), Ethernet
(RJ-45), coaxial cable, RCA (for audio), and S-video plugs, as shown in Figure
1.3, can be snapped into openings of a wall plate from behind. A blank module
can be used to cover nonoccupied openings.
The installation of structured wiring is more suitable for new homes. Because
the retrofit cost of structured wiring, which sometimes involves opening up
walls, can be too high to justify the benefit. RF-based networking approaches
are probably a better choice for most existing homes.
Ethernet [2] can be a good choice for home networking if home-run Category
5 or structured wiring is available. Ethernet can also be installed within a room
with twisted pair patch cables. Bob Metcalfe and his Xerox PARC (Palo Alto
Research Center) colleagues developed Ethernet in late 1972 to interconnect
personal workstations. The IEEE standards for the first version of twisted
pairbased Ethernet, 10BaseT, was released during 1990. 10BaseT has a
transmission data rate of 10 megabits per second (Mbps) over two pairs of
Category 3 or Category 5 twisted pair cable. The first 100-Mbps version of
twisted pairbased Ethernet, 100BaseTX, was standardized during 1995.
Network Interface Card (NIC), adaptors, and hubs capable of 10BaseT and
100BaseTX (also known as 10/100) Ethernet are available at very affordable
costs. The transmission throughput between NICs, adaptors, and a hub is
automatically negotiated. 10/100 Ethernet utilizes only two pairs of a
Category 5 twisted pair cable. Category 5 wiring is usually terminated with an
RJ-45 wall outlet connecting all four pairs or eight wires. The RJ-11 plug of a
telephone set can also be plugged into an RJ-45 wall outlet connecting only
the four middle pins. The middle two pins of an RJ-11 plug are commonly used
by a one-line telephone set. On the other hand, the middle two pins of an RJ-
45 plug are not used by 10/100 Ethernet. Therefore, home-run or structured
wiring can accommodate both the telephone and the data networking needs of
a typical home.
The IEEE 1394 transmission technology also known as FireWire or iLink can be
used to interconnect PCs and consumer electronics devices especially for
digital video connections. The FireWire name was originally coined by Apple
Computer, Inc. The iLink name has been used on SONY products. The IEEE
1394 serial bus technology was designed to handle both Asynchronous (such
as data) and Isochronous (such as video) packet transmissions. Most
standardization efforts were coordinated at the 1394 Trade Association (1394
TA) [7] meetings. The first FireWire standards, known as IEEE 1394-1995,
were released during 1995. This first version of 1394 technology is capable of
delivering transmission throughputs of 100, 200, and 400 Mbps over a special
shielded twisted pair cable of 4.5 meters. The new 1394b standards, released
during 2001, made the FireWire technology run faster and go further. 1394b
signals can be carried over a short shielded twisted pair cable of 4.5 meters at
up to 1600 Mbps as well as a Category 5 unshielded twisted pair cable of up to
100 meters at 100 Mbps. FireWire plugs can be found on some PCs, all iMACs,
some digital cameras, and all digital camcorders. The FireWire technology
holds a great potential for home network applications because it can carry
multimedia signals at high throughputs.
A home network can also be established using in-home electrical power lines
and wall plugs. There are mainly three available power linebased systems: X-
10, CEBus, and (most recently) HomePlug. The X-10 technology, with a
throughput of 60 bits per second (bps), was invented about 25 years ago by
engineers of a Scotland company called Pico Electronics. X-10 has since been
applied for home automation [8], where lights and other appliances can be
turned on and off via short command packets transmitted over the power line.
X-10-equipped lights, switches, and controllers can be found in electronics
shops as well as home improvement stores. CEBus (Consumer Electronics
Bus), with a throughput of 10 kilobytes per second (kps), is an industry
standard [9] intended for home automation and entertainment information
distribution applications. The effort for a CEBus standard was initiated during a
meeting in Washington, D.C., sponsored by Electronics Industries Alliance
(EIA) in April of 1984. The power linebased CEBus physical layer has found
good applications in commercial buildings as well as over the wiring of
commercial trucks for relaying information from different parts of a vehicle.
HomePlug [10] is the result of a common industry desire to have a single
transmission protocol for interconnecting PCs as well as entertainment
electronics "wirelessly" over the in-home power lines. The formation of the
HomePlug Powerline Alliance was announced on April 10, 2000. Under the
sponsorship of Radio Shack and Compaq, five residences around Dallas, Texas,
were chosen to field test prototypes from Adaptive Network [11], Cogency
[12], Enikia [13], Intellon [14], and Itran [15]. The system from Intellon with
a throughput of 10 Mbps was chosen as the basis for the HomePlug technology
on June 5, 2000, and the corresponding specification was subsequently
released on June 26, 2001. HomePlug retail products can be obtained from
Linksys [16], NETGEAR [17], and Phonex Broadband [18].
There was also a HomeRF consortium group formed by a few PC and wireless
technology companies during 1997. At that time, the IEEE 802.11 wireless
Ethernet standards were just released, and standards confirming transceivers
were relatively too expensive for home applications. Goals of the HomeRF
group were to develop an inexpensive wireless technology to connect not only
PCs but also other popular electronic devices in the home environment. The
version 1.0 of the HomeRF specification, also known as Shared Wireless Access
Protocol-Cordless Access (SWAP-CA), was released in January 1999 for
transmission throughputs of 0.8 or 1.6 Mbps. A higher throughput version of
HomeRF version 2.0 was released in May 2001 for transmission throughputs of
5 or 10 Mbps. The HomeRF consortium group does not exist, and its Web site
was taken down by January 1, 2003. HomeRF might be available through
university partners for further studies and experiments.
Type Rate (Mbps) Medium Coverage Int. 1999 2000 2001 2002
HomePNA 1.0 1 Telephone Wiring Whole House 1999 Avail Limit Limit
HomePNA 2.0 10 Telephone Wiring Whole House 1999 Avail Hot Limit
1394 100, 200, 400 STP 3.5 m 1995 Avail Avail Hot Avail
1394b ..., 800, 1600 UTP, STP, POF 4.5, 50, 100 m 2001 Avail
X-10 60 bps Electrical Wiring Whole House 1979 Avail Avail Avail Avail
CEBus 0.01 Electrical Wiring Whole House 1991 Limit Limit Limit Limit
802.11 FHSS 1, 2 2.4 GHz RF Whole House 1997 Avail Avail Avail Limit
802.11 DSSS 1, 2 2.4 GHz RF 90, 75 m 1997 Avail Avail Avail Limit
HomeRF 1.0 1, 2 2.4 GHz RF Whole House 1999 Avail Hot Avail
HomeRF 2.0 5, 10 2.4 GHz RF Whole House 2001
Home networks have a great potential for further growth. They will be fueled
by the combination of market, technology, and application development. The
current population growth of home networking is very much related to the
deployment of broadband access networks mainly consisting of cable modem
and DSL. Figure 1.4 shows the trend of total U.S. broadband access network
deployment. This deployment trend might continue in a worldwide scale for the
next few years before reaching 200 million households or about 10% of world
population, as a goal of DSL Forum [22]. A large percentage of broadband
access network subscribers will use home networks, because, in most cases,
they have multiple PCs and PC users. Because a home network involves
multiple transmission devices, the total installation number of these devices
could be similar to or larger than those of broadband subscribers.
This book is mainly organized into two parts: home transmission environment
(Chapters 2 to 5) and corresponding wired/wireless protocols (Chapters 6 to
11). The last chapter (Chapter 12) is about home network topology and
interconnection protocols. Each chapter in the first part of the book discusses a
particular environment by walking through corresponding transmission
medium characteristics, channel models, noise models, and channel capacities.
Some MATLAB files for related calculations are also included. Cable physical
dimensions are presented; then corresponding channel models are constructed
based on two-port network analysis for wired environment. ISM band
regulations are discussed and a few previously published channel models are
represented for RF wireless environment. Each chapter in the second part
covers standardized transmission protocols of a particular environment by
examining highlights of related standards and corresponding transceiver
structures followed by some performance estimations. Only highlights of
standards are included for the introduction to the related transmission
protocol. Full details can be more appreciated by subsequently studying related
standards documents. Thanks to the IEEE contract to the industry initiative,
Ethernet and Wireless Ethernet standards documents can be directly
downloaded from IEEE Web site [2, 19]. Other standards documents can also
be obtained by joining related standards groups [3, 7, 9, 10]. Transceiver
structures are presented by referencing some standards conforming product
implementations as well as Simulink modeling. Some MATLAB files are also
included for related calculations. Updated MATLAB and Simulink files of this
book are also posted at http://authors.phptr.com/chen/ and the Web site of
The MathWorks, Inc..
Specifically, Chapter 2 studies channel models for twisted pair cables. While
the dimension of the inner copper conductor is commonly measured by AWG
(American Wire Gauge), the transmission quality of data-grade twisted pair
cable is typically labeled as Categories 3 to 5 as specified by TIA/EIA
(Telecommunications Industry Association/Electronic Industries Alliance)
standards. Here, a larger category number means a better quality. On the
other hand, the transmission quality of in-home telephone wiring, especially
for data transmission application, is usually poor and not specified.
Transmission characteristics of a twisted pair cable can be represented by
frequency-dependent primary parameters of R, L, G, and C per unit length or a
parametrized model. They can also be represented by a frequency-dependent
transmission line model of Z and g. While there is only a straight Category 3 or
5 cable between Ethernet transceivers, wiring branches occur on in-home
telephone wirings. The ABCD matrix based two-port network analysis is
introduced for the construction of channel models involving cable sections and
branches. Thermal, crosstalk, and RF ingress/egress noises are also discussed
for the twisted pair cable environment. Channel capacities are then calculated
in accordance with these channel and noise models under different constraints.
MATLAB files for calculations of RLGC parameters, ABCD matrices, insertion
loss, and channel capacity are attached.
Chapter 5 first describes FCC regulations for RF usages in general and for ISM
specifically. Indoor RF radio transmission environment is studied through the
free space transmission expression as well as reflection and penetration
analysis. An in-home RF signal attenuation model is introduced along with
some real measurements at 2.4- and 5-GHz ISMs. A previously published RF
channel impulse response model with delay spread and its baseband
equivalence are then discussed. Antenna ambient noise, receiver noise figure,
and equivalent noise floor are analyzed. Channel capacities for the in-home RF
environment are calculated under different signal level constraints and noise
levels. MATLAB files for calculating reflection coefficients, signal attenuation,
impulse response channel model, and the equivalent baseband channel model
are attached.
1. www.swhowto.com/
2. standards.ieee.org/getieee802/802.3.html
3. www.homepna.org/
4. www.tutsys.com/
5. www.broadcom.com/
6. www.copper-gate.com/
7. www.1394ta.org/
8. www.smarthome.com/x10map.html
9. www.cebus.org/
10. www.homeplug.org/index_basic.html
11. www.adaptivenetworks.com
12. www.cogency.com/
13. www.enikia.com/index.html
14. www.intellon.com/
15. www.itrancomm.com/
16. www.linksys.com/
17. www.netgear.com/
18. www.phonex.com/
19. standards.ieee.org/getieee802/802.11.html
20. www.palowireless.com/bluetooth/
21. standards.ieee.org/getieee802/802.15.html
22. www.dslforum.org/
23. www.ce.org/
24. www.havi.org/
Chapter 2. Twisted Pair
In this chapter, we will study and construct transmission channel models for
twisted pair cables. The first type of twisted cable is the one used in existing
in-house telephone wiring. This in-house twisted pair wiring usually extends
from the entrance point of a telephone loop to telephone jacks distributed at
many different rooms within a residence. For a multiple-pair twisted pair cable,
the twist is usually applied to each individual pair with a particular twisting
angle. For in-house telephone-wiring twisted pair cable, the twist is normally
applied to all wires. Sometimes, flat cable with no twist is also used for in-
house telephone wiring. The conventional wiring procedure of this in-house
telephone loop extension is called star daisy-chain. At the center of the star is
the telephone loop entrance point. From this center, a few branches of twisted
pair cables are extended throughout the residence reaching all telephone
jacks. Each branch usually connects a few phone jacks along one floor or
within a particular region of residence involving multiple floors. Each star
daisy-chain branch contains a few cascade twisted pair cable sections
sequentially connected at phone jacks along the way. Sometimes, a branch can
become multiple branches along the way. For this type of in-house telephone
wiring, we will examine commonly used types of twisted pair cables, their
transmission and crosstalk characteristics, networking topology, and
impedances of telephony devices connected to this star daisy-chain network
through telephone jacks. Based on this information, we will calculate transfer
function, crosstalk loss, and channel capacity for a broadband communication
link established between two phone jacks of the in-house telephone-wiring
network.
The second type is the data-grade twisted pair cable. They are typically called
Category 3 or Category 5 twisted pair cables. Category 3 and Category 5
twisted pair cables are used as transmission media for 10BaseT and 100BaseT
Ethernet. Both require an active hub to connect all Ethernet transceivers
together. The wiring topology of a 10BaseT or a 100BaseT Ethernet is a star. A
hub with multiple transceivers is at the center of this wiring star. The star
topology telephone wiring can often be found at recently completed homes.
Data-grade twisted pair cables are often used in conjunction with the star
topology telephone wiring. For data-grade twisted pair cables, we will examine
their transmission and crosstalk characteristics and calculate the
corresponding transfer function, crosstalk loss, and channel capacity for a
point-to-point connection of a household dimension.
2.1 Twisted Pair Cable
Twisted pair cables consist of copper wires of small diameters which are usually
less than 0.1 inch for telephone, in-house, and office applications. Within a
plastic covering shield, there are many individually insulated copper wires
twisted with each other in pairs. Two wires in a tightly twisted pair experience
almost the same physical environment. Therefore, radio emission and noise
pickup are minimized when a differential signal is carried over the twisted pair.
Furthermore, each twisted pair has its own twisting angle to minimize
crosstalk between different pairs. The quality of the insulation material, the
tightness and the precision of twists, and the diameter of the copper wire
determine the transmission quality of a twisted pair cable.
The size of the copper wire is usually measured in American Wire Gauge.
Popular wire sizes for twisted pair cables are 19, 22, 24, and 26 AWG. Table
2.1 shows metric and English equivalences of AWG from 11 to 40. The English
unit is mil, which is 0.001 inch, and the metric unit is millimeter.
No AWG fits exactly an English or metric unit except AWG 36. However, the
ratio between adjacent AWGs is about 0.890524585333. More than 100 years
ago, wire gauges were set pretty much by how much you could reduce the
diameter of the wire in one step through a wire drawing die. For a variety of
reasons, each reduction is about the same ratio, leading to the geometric
sequence we now have. Around the turn of the last century, the AWG group
took the current gauge 10 and gauge 40 and interpolated accordingly. Similar
earlier European wire gauge standards existed, but the current European
definitions are metric based, and diameters of copper wire are specified to the
accuracy of 0.1 mm. For example, the metric equivalents of 24 and 26 AWG
twisted pair cables have diameters of 0.5 and 0.4 mm, respectively.
Twisted pair cables have been used for office wiring mainly to connect
computers over 10BaseT or 100BaseTX Ethernet. Twisted pair cable types
commonly used in office environments are Category 3 or Category 5. The
transmission characteristics of Category 5 cable are better than those of
Category 3 cable. There is also a Category 4 twisted pair cable with
transmission qualities that fall between the two. Detailed cable-type
recommendations as well as installation guidelines are in standards document
TIA/EIA-568A [1], and TIA/EIA-568-B [2]. Transmission qualities of these
twisted pair cables are generally defined by the attenuation at the frequency
of 10 MHz. At that particular frequency, the attenuation should be less than
98, 72, or 65 decibels per kilometer (dB/km) for Category 3, 4, or 5 type of
cable respectively. These cables can usually have 4 or 25 twisted pairs inside a
plastic shield. Category 3 cable consists of 24 gauge copper wires, while
Category 4 and Category 5 cables can be made with either 22 or 24 gauge
wires. Again, the transmission quality of a twisted cable is not just dependent
on the inside copper wire size.
There are no official standards for residential wiring practice. before the
divestiture of the Bell system, wiring practice was very much phone company
and region-dependent. These practices have been followed by regional phone
company technicians and building contractor electricians thereafter. A study
[3] has found most in-premises telephone wirings are either Quad or flat type.
A Quad cable has four wires all twisted together without individual pairing. A
flat cable has 4 wires lying next to each other in one layer without any
twisting. There are also three or six pair cables either all twisted together or
lying flat. The Quad cable usually consists of 22 AWG copper wires, while the
flat cable is usually made with 26 AWG copper wires.
Since transmission qualities of twisted pair cables vary depending on wire size
as well as other manufacturing processes, the performance of a particular
twisted pair cable can be accurately defined only by its primary electric
parameters in terms of resistance, inductance, capacitance, and conductance
per unit length. Such a definition is not considered as a manufacturing
standard but rather as an industry reference model. Twisted pair cable models
defined by their primary electric parameters have been very useful in
computer simulation studies leading to definitions of advanced broadband
communication systems such as DSL and Ethernet. Electric parameters of a
particular twisted pair cable might be a little different from those of the
reference model owing to temperature, measuring procedure, and
manufacturers. However, the general transmission performance of the
reference model can be maintained if differences are kept minimal.
Equation 2.1
where r0C is the copper DC resistance and r0S is steel DC resistance, while aC
and aS are constants characterizing the rise of resistance with frequency in the
"skin effect" for the series resistance
Equation 2.2
Equation 2.3
where c is the "contact" capacitance and c0 and ce are constants chosen to fit
the measurements for the shunt capacitance, and
Equation 2.4
where g0 and ge are constants chosen to fit the measurements for the shunt
conductance.
r0s is presented to take care of the double skin-effect of some copper-clad drop
wires with steel cores, and its value is normally for copper-only cables
according to measurements. Therefore, the parameterized model for the series
resistance is simplified to
Equation 2.5
Table 2.2 shows parameterized models, parameters in Equations 2.2 to 2.5, for
typical office and residential twisted pair cables.
Equation 2.6
Equation 2.7
For a simple twisted pair cable terminated with its characteristic impedance, its
transfer function or insertion loss is related to the propagation constant
according to the following expression:
Equation 2.8
where d is the length of the twisted pair cable. The measurement of the
transfer function or the insertion loss of a twisted pair cable is relatively
straightforward, and the measurement result is often expressed in terms of
the output-to-input power ratio. Specifically, a scaled version of the logarithm
of the output-to-input power ratio is used to describe the transfer function of a
twisted pair cable. The logarithmic version of transfer function is defined by
the following expression:
Equation 2.9
where a(f) is the real part of propagation constant g(f) . a(f) can be
approximately represented in the following expression:
Equation 2.10
Parameters of a and b for insertion loss are listed in Table 2.3 for different
twisted pair cables and in-house wirings [5]. These parameters should be used
in conjunction with distance d in terms of feet (ft) and frequency f in terms of
Hertz (Hz).
Type a b
In an office environment, twisted pair cables are wired from each desk to a
central location, usually a dedicated wiring closet, where an Ethernet hub is
used to connect every incoming cable at the center of a star. This is often
called a star wiring configuration. Under this star wiring configuration, a
straight twisted cable is used between a port of the hub and a computer NIC.
With ideal terminations at both ends of a twisted pair cable, the transfer
function of the twisted pairbased transmission channel can be estimated
accurately using its propagation constant (Equation 2.8 or 2.9) for an
identified distance. The star wiring configuration can also be found in some
residences, especially in some newly constructed residential areas where the
awareness of data transmission within a household exists. In a majority of
existing residential premises, however, twisted pair telephone cables are wired
following a daisy-chain fashion. For example, from the NID (Network Interface
Device), one twisted pair cable connects a few telephone jacks on the first
floor, and a second one connects all phone jacks on the second floor. The
homeowner may have added another twisted pair cable to connect the
computers, fax machines, and other auxiliary devices at a few different places.
The twisted pair cable transfer function based on the propagation constant,
H(d,f) = e-da(f) e-jdb(f), is only good for a single-gauge twisted pair with ideal
terminations at both ends. In-house telephone wiring, however, usually
consists of many twisted pair cables connected in a star daisy-chain fashion,
with ends that are either open or terminated with telephony devices of
nonideal impedances. To represent accurately an in-house wiring transfer
function from one phone jack to another, a two-port network and its ABCD
parameter representation are used in calculation.
For a stand-alone two-port network, the input and output voltage and current
relationship is represented as
Equation 2.11
Equation 2.12
or in matrix format as
Equation 2.13
Equation 2.14
Equation 2.15
ABCD parameters of a twisted pair cable are complex and frequency-
dependent. They are related to characteristic impedance, Z0(s), and
propagation constant, g(s), as
Equation 2.16
Equation 2.17
Equation 2.18
Many electronic circuits can be divided into a few simpler two-port networks.
These simpler two-port networks are usually connected either in series or in
parallel. A twisted pair telephone loop consists of many twisted pair cables in
series. The use of twisted pair ABCD parameters is convenient because each
section of a twisted pair subscriber loop can be described by its own ABCD
parameters, and the ABCD parameters of the whole subscriber loop are the
matrix product of individual ABCD matrices.
To obtain the ABCD parameters of two two-port networks in series, equate the
output port voltage and current of the first two-port network to the input port
voltage and current of the following network, as shown in Figure 2.10, and
then derive the relationship between the input port voltage and current of the
first two-port network to the output port voltage and current of the following
network.
For two two-port networks in series, the input and output voltage and current
relationship is represented as
Equation 2.19
Equation 2.20
and
Equation 2.21
Therefore, the ABCD parameter matrix for two two-port networks in series is
Equation 2.22
The voltage and current relationships of two two-port networks in parallel are
represented as
Equation 2.23
Equation 2.24
Equation 2.25
Equation 2.26
Equation 2.27
We also have
Equation 2.28
Equation 2.29
or
Equation 2.30
by using
Equation 2.31
Equation 2.32
Therefore, the ABCD parameter matrix for two two-port networks in parallel is
Equation 2.33
Equation 2.34
Equation 2.35
Equation 2.36
Equation 2.37
The ABCD matrix information of a twisted pair telephone loop can be easily
converted into its input impedance or transfer function. Corresponding
calculations can be put into a computer program [8] to generate channel
models in conjunction with a few tables of twisted pair cable primary
parameters.
The input impedance of a twisted pair loop with a terminal impedance of Zt(s)
is expressed as
Equation 2.38
where A(s), B(s), C(s), and D(s) are complex frequency-dependent ABCD
parameters of a twisted pair telephone cable. When the other end of the
twisted pair cable is left open, we have
Equation 2.39
This is also the impedance of a twisted pair cable branch with an open-end. An
open-ended cable branch can be considered as a two-port network with only a
shunt impedance. Therefore, the ABCD parameters of an open-ended branch
are as follows:
Equation 2.40
The transfer function of a twisted pair loop with a source impedance of Zs(s)
and a terminal impedance of Zt(s) is
Equation 2.41
When the effect of source impedance is excluded, that is, Zs(S) = 0 , we have
Equation 2.42
Following earlier practices of the Bell System [9], the insertion loss, which is
defined as
Equation 2.43
has been used as the channel model for DSL system performance simulation
studies. By using insertion loss, we avoid the signal loss caused by the voltage
division between source and loop input impedances while still including the
effect of the source impedance or the voltage division between source and
termination impedances when the loop is very short. For an example of a zero
length or null loop, that is, for
Equation 2.44
Equation 2.45
while the insertion loss is
Equation 2.46
The insertion loss more accurately represents the effect of a twisted pair cable
inserted between the source and the termination.
The insertion loss of in-house wiring can be studied in terms of wire loss,
branch loss, and reflection loss. Wire loss is relatively insignificant when it is
compared with those losses caused by branching and reflection. While the
branch loss is related to the number of branches, the reflection loss-caused
notch is related to the cable length of the branch. An average-size two-storey
house has a dimension of 20 ft (height) by 30 ft (width) and by 40 ft (length).
The summation of all house dimensions is therefore 90 ft. With the
consideration of some additional routing length, Figure 2.12 shows the
insertion loss of a 150-ft flat 26-gauge telephone in-house wire.
Equation 2.47
where fi is the ith frequency notch, l is the branch length, and c is the speed of
transmission over the in-house wiring. We have c 5.8 x 108 feet per second
(ft/sec). With that transmission speed, we can estimate that the first frequency
notch corresponding to a 20-ft branch is at around 7.25 MHz.
2.3 Noise Model
The severity of a particular noise can be measured from its power level or its
power density level. The magnitude of a noise can be as high as a few tens of
microvolts. The noise power is usually expressed in decibels (dbm), which is
defined as
Equation 2.48
where v is the average voltage of the noise, R = 100 is the receiver input
impedance, and Pm = 0.001 is the reference of 1 milliwatt (mW). The noise
power spectrum density (PSD) is usually expressed in decibels per hertz
(dBm/Hz), which is defined as
Equation 2.49
There are usually at least two pairs within a twisted pair cable or an in-house
telephone wiring. Because of capacitive and inductive in-balance coupling,
there is crosstalk between each pair even though pairs are well insulated at
DC. For broadband systems, where the signal bandwidth is well beyond the
voice frequency, the crosstalk could become a limiting factor to the achievable
transmission throughput. Crosstalk noise can be further divided into Near End
Crosstalk (NEXT) and Far End Crosstalk (FEXT) noises. The severity of
crosstalk could also be related to the system installation scale (i.e., the total
number of pairs used in the same twisted pair cable). Crosstalk coupling loss
models have been developed for NEXT and FEXT by considering the different
numbers of disturbers.
The simplified 49 disturber NEXT model developed for DSL simulation studies
has 57 dB of loss at 80 kHz and a linear (log-log scale) slope of 15 dB/decade.
Specifically, the NEXT model can be expressed as
Equation 2.50
where f is in hertz, kNEXT = 8.82 x 10-14, and NEXT49 is a ratio that can be
expressed in decibels by taking base 10 log of NEXT49 and then multipling 10.
This simplified NEXT model can also be generalized for N disturbers as
Equation 2.51
Notice that the loss difference between 1 disturber and 49 disturbers is about
10 dB.
The simplified 49-disturber FEXT model, which was also developed for DSL
studies, is proportional to the square of frequency and the insertion loss of the
twisted pair cable. The model can be expressed as
Equation 2.52
Because NEXT distribution is similar to FEXT distribution, the same power sum
scale for NEXT can also be applied to FEXT, in which case we have
Equation 2.53
NEXT models are more applicable for many Local Area Network (LAN) and
home network transmission simulation studies. Besides the simplified NEXT
model developed for DSL simulation studies, we can also derive NEXT models
for Category 3, Category 4, and Category 5 twisted pair cables as well as other
in-house telephone wirings based on some valid measurements. It was found
that the one disturber Category 3 twisted pair of 50-ft NEXT model is about
the same as that of 49 disturbers developed for DSL simulation studies. NEXT
models for Category 4 and 5 twisted cables have more losses. On the other
hand, some in-house wirings show much poorer NEXT characteristics.
Estimated values of NEXT49 of these twisted pair cables and a relatively poor
in-house wiring are listed in Table 2.4 [5].
Figure 2.17 shows NEXT models based on these estimated parameters. The
poor NEXT characteristics of some in-house wiring are a result of the fact that
each pair is not individually twisted or that there is no twist at all.
Figure 2.17. Estimated NEXT Loss
Twisted pair cable and other in-house wiring are used to carry signals from one
end, within an office or a home, to another end. Part of the signal energy is
lost during transmission; becoming heat and electromagnetic radio waves. At
high frequencies, the signal loss is relatively heavy, and the amount of
radiation could become quite significant to the degree that it could affect other
sensitive radio transmission systems occupying the same frequency band. The
radio interference caused by twisted pair cable or in-house wiring can be
considered as an extension of the crosstalk effect. Crosstalk is an
electromagnetic phenomenon between two pairs of cables laid next to each
other. The same electromagnetic wave that causes crosstalk also propagates
through open space. The fact that there is no electromagnetic shield on a
twisted pair cable or on most in-house wirings makes the radio propagation
worse.
In traditional terms, the pair causing the crosstalk is called the disturbing pair,
and the radio emission from a cable is called the egress. Therefore, the egress
from a twisted pair or an in-house wiring is from the disturbing pair. On the
other hand, the same electromagnetic mechanism causes a twisted pair cable
or in-house wiring to pick up noises from an interference field from other radio
transmission systems. Again, in traditional terms, the pair receiving the
crosstalk is called the disturbed pair, and the radio emission to a cable is called
the ingress. Therefore, the ingress to a twisted pair or in-house wiring is
picked up by the disturbed pair. In practice, a twisted pair cable or in-house
wiring is used to transmit and receive signals acting as both a disturbing and
disturbed pair simultaneously. A twisted pair cable or an in-house wiring needs
to deal with both egress and ingress issues.
For the egress, the amount of radio emission from a twisted pair cable or in-
house wiring needs to be below the limits set forth by the Wireless
Telecommunications Bureau [10] under the Federal Communications
Commission. Specifically, some radiation limits have been imposed by Part 15
(Radio Frequency Devices) of the FCC rules and regulations, which is labeled
Code of Federal Regulation (CFR) Title 47. In Part 15 section 209 of Title 47,
the radiation limits are defined for four frequency bands as shown in Table 2.5.
In Table 2.5, the field strength is measured 3 m from the subject except for
the frequency band of 1.705 to 30 MHz, which is measured 30 m from the
subject. Notice that no specific measurement bandwidth is given and that the
measurement of the whole signal spectrum is assumed. These limits are
derived for narrow band radio transmission systems with a maximum
bandwidth of 9 kHz. For radio transmission systems with wider bandwidths, an
additional 13 dB of signal level is allowed above these limits.
We have expressed the noise power in terms of decibels, which is the power
ratio against 1 milliwatt. On the other hand, the strength of a radio
electromagnetic field is expressed in terms of decibel microvolts per meter
(dBµV/m), which is the ratio against 1 µV/m. An antenna is normally used to
pick up a signal from an electromagnetic field. In the receiving process, an
antenna converts the field strength to electrical power, which is usually
expressed in terms of decibel microvolts on a particular termination
impedance. The difference between the field strength and the electrical power
is expressed as the antenna gain in terms of decibels. In addition, for a
terminal impedance of 100 ohms, the equal power conversion factor between
decibels and decibel microvolts is expressed as
Equation 2.54
1.70530 30 30
3088 100 3
88216 150 3
216960 200 3
For example, an isotropic antenna has an antenna gain of 5 dB [11]. For this
particular isotropic antenna case, the dBm-to-dBµV/m conversion factor is 0
dBmV/m 110 5 = 115 dBm. On the other hand, the dBmV/m-to-dBm
conversion factor is 0 dBmV/m 110 5 = 115 dBm. In other words, an
antenna with 5 dB of antenna gain will generate an electromagnetic field
strength of 105 dBµV/m for a transmit signal of 0 dBm and pick up an electric
power of 0 dBm in an electromagnetic field with a field strength of 115
dBµV/m. A twisted pair cable or in-house wiring can also be characterized for
its equivalent antenna gain, which we call Radio Frequency Interference (RFI)
loss. Actually, we let RFI loss equal to the negative of antenna gain. RFI loss of
a particular twisted pair cable or in-house wiring can be measured within an
electromagnetic field of a certain calibrated field strength. Experiments [12]
have shown that the value of RFI loss for different types of twisted pair cables
and in-house wiring is between 40 to 60 dB in the frequency range of between
1 and 30 MHz.
The RFI loss can also be used to calculate field strength, caused by a twisted
pair cable or an in-house wiring carrying a signal of a particular power, at a
certain distance. We can estimate the field strength using the following
expression:
Equation 2.55
where E is the field strength measured in terms of dBµV/m, PSD is the power
spectrum density of the signal on a twisted pair cable or in-house wiring
measured in dBm/Hz, B is the bandwidth of the signal measured in hertz, R is
the terminal impedance measured in ohms, r is the distance from the cable or
wiring measured in meters, and RFI is the RFI loss measured in decibels.
Equation 2.56
The bandwidth of 2.2 kHz corresponds to that of a HAM radio. A HAM radio
receiver usually has a sensitivity of about 0 dBµV/m. Therefore, a twisted pair
cable or in-house wiring carrying a signal with a power spectrum density of 85
dBm/Hz will not cause any harm to a HAM radio located 30 m away. Even at a
distance closer than 3 m, the field strength is about 2.1 dBµV/m, which is still
below the sensitivity of a HAM radio receiver.
2.5 Channel Capacity
Channel capacities for a twisted pair cable or in-house wiring can be calculated
against background noise and NEXT. The background noise for the twisted pair
cable and in-house wiring environment is about 140 dBm/Hz. The received
signal power depends on the transmit signal power and the insertion loss of a
twisted pair cable or in-house wiring. The transmit signal power is limited by
the radiation from the nearby electromagnetic field strength. Between 1.705
and 30 MHz, the field strength is 29.5 dBµV/m at a distance of 30 m.
Assuming an RFI loss value of 40 dB, the allowed power within a 9-kHz
bandwidth over a twisted pair cable or in-house wiring is calculated as
Equation 2.57
The PSD within a 9-kHz bandwidth is therefore about 40 dBm/Hz. The total
allowed power for a signal with a bandwidth wider than 9 kHz is about 13 dBm.
At a PSD of 40 dBm/Hz, the bandwidth is about 180 kHz. Allowed PSD of
signals with different bandwidths are summarized in Table 2.6.
Equation 2.58
9 40
180 40
1,000 47.5
5,000 54.4
10,000 57.5
20,000 60.5
where S is the received signal power, N is the noise power, and the channel
capacity C is expressed in terms of bits per hertz. The S/N is expressed in
terms of power ratio. When the S/N is a constant over a frequency band, the
channel capacity of that frequency band can be calculated according to
Equation 2.59
where B is the bandwidth of the channel measured in hertz. When the S/N is a
variable over a frequency band, the channel capacity of that frequency band
can be calculated according to
Equation 2.60
where f1 and f2 are the lower and upper bounds of the frequency band. We will
first calculate channel capacities for different types of cables of a number of
signal bandwidths against a background white noise of 140 dBm/Hz. The lower
bound starts at 1.705 MHz, and the upper bound stops at 30 MHz. Figure 2.18
shows channel capacities of various twisted pair cables and in-house wirings of
100 m against the background white noise in a 9-kHz bandwidth for center
frequencies up to 15 MHz. Channel capacities are between 260 and 300 kbps.
Figure 2.19 shows channel capacity of various cables and in-house wirings also
against the background white noise in a 180-kHz bandwidth for center
frequencies up to 15 MHz. Channel capacities are between 5.1 and 5.8 Mbps.
The capacity increase is almost proportional to the increase of bandwidth
because the transmit PSDs are kept the same because the signal power for
signals with a bandwidth wider than 9 kHz was allowed 13 dB more. The 20
times increase in bandwidth is the maximum allowed to meet the 13-dB
allowance without reducing PSD.
The following MATLAB files should allow readers to re-create some of the
solutions in this chapter. These files can also be customized to solve variations
problems that a reader might later encounter.
function [r,l,g,c]=RLGCExpQ22(f);
r0c=406.65;
ac=0.2643;
l0=1.229;
linf=0.927;
fm=386e3;
b=0.794;
g0=0.0432;
ge=0.8805;
cinf=0.071;
c0=0.121;
ce=0.245;
r=sqrt(sqrt(r0c^4+ac.*f.^2));
l=(l0+linf*(f./fm).^b)./(1+(f./fm).^b);
g=g0.*f.^ge;
c=cinf+c0.*f.^(-ce);
function [a,b,c,d]=abcd(f,r,l,g,d);
jw=(j*2*pi).*f';
rf=interp1(r(:,1),r(:,2),f,'spline');
lf=interp1(l(:,1),l(:,2),f,'spline');
gf=interp1(g(:,1),g(:,2),f,'spline');
cf=0.083*ones(length(f),1);
gamma=((rf+jw.*lf*1e-3).*(gf*1e-6+jw.*cf*1e-6)).^0.5;
z=((rf+jw.*lf*1e-3)./(gf*1e-6+jw.*cf*1e-6)).^0.5;
gammad=gamma*d/5280;
a=cosh(gammad);
sinhg=sinh(gammad);
b=z.*sinhg;
c=sinhg./z;
d=a;
function [ht,h]=abcd2h(a,b,c,d);
r=100;
sz=length(a);
h=2*r*ones(sz,1)./(r*(c*r+d)+a*r+b);
phs=unwrap(angle(h));
phsjt=round(phs(sz)/pi);
phslt=phs(sz-250);
phs=[phs(1:sz-250)' spline([sz-250 sz],[phslt phsjt*pi],[sz-250+1:sz
hma=abs(h).*exp(j*phs);
h(1:sz)=real(hma(1:sz))+sqrt(-1)*imag(hma(1:sz));
h(sz+1:2*sz-1)=real(hma(sz:-1:2))-sqrt(-1)*imag(hma(sz:-1:2));
ht=real(ifft(h);
f=[1:1025]/1025*15e6;
df=max(f)/1024;
psd1=-40;
psd2=-47.5;
psd3=-54.4;
psd4=-57.5;
psdwn=-140;
lpsdwn=10^(-140/10);
d=100/0.3048;
a3=8.17e-7;
b3=8.07e-11;
a4=7.37e-7;
b4=9.12e-12;
a5=7.26e-7;
b5=4.56e-12;
aq=6.77e-7;
bq=4.97e-11;
af=9.17e-7;
bf=4.87e-11;
he3=-(a3.*sqrt(f)+b3.*f).*328.*8.686;
he4=-(a4.*sqrt(f)+b4.*f).*328.*8.686;
he5=-(a5.*sqrt(f)+b5.*f).*328.*8.686;
heq=-(aq.*sqrt(f)+bq.*f).*328.*8.686;
hef=-(af.*sqrt(f)+bf.*f).*328.*8.686;
%Category 3
Sd1e3=10.^((psd1+he3)./10);
Sd2e3=10.^((psd2+he3)./10);
Sd3e3=10.^((psd3+he3)./10);
Sd4e3=10.^((psd4+he3)./10);
%Category 4
Sd1e4=10.^((psd1+he4)./10);
Sd2e4=10.^((psd2+he4)./10);
Sd3e4=10.^((psd3+he4)./10);
Sd4e4=10.^((psd4+he4)./10);
%Category 5
Sd1e5=10.^((psd1+he5)./10);
Sd2e5=10.^((psd2+he5)./10);
Sd3e5=10.^((psd3+he5)./10);
Sd4e5=10.^((psd4+he5)./10);
% Quad-22
Sd1eq=10.^((psd1+heq)./10);
Sd2eq=10.^((psd2+heq)./10);
Sd3eq=10.^((psd3+heq)./10);
Sd4eq=10.^((psd4+heq)./10);
% FW-26
Sd1ef=10.^((psd1+hef)./10);
Sd2ef=10.^((psd2+hef)./10);
Sd3ef=10.^((psd3+hef)./10);
Sd4ef=10.^((psd4+hef)./10);
figure(2)
plot(f,he3,'k',f,he4,'k',f,he5,'k',f,heq,'k',f,hef,'k')
%plot(f,he3,f,he4,f,he5,f,heq,f,hef,f,20*log10(abs(hq(1:1025))),f,20
grid
xlabel('Frequency (Hz)')
ylabel('Insertion Loss (dB)')
figure(3)
%Category 3
Cd0e3=9000*log2(1+Sd1e3/lpsdwn);
Cd1e3=zeros(1,1013);
fCd1e=f(5:1017);
for i=1:1013
for j=i:i+11
Cd1e3(i)=Cd1e3(i)+df*log2(1+Sd1e3(j)/lpsdwn);
end
end
Cd2e3=zeros(1,957);
fCd2e=f(34:990);
for i=1:957
for j=i:i+67
Cd2e3(i)=Cd2e3(i)+df*log2(1+Sd2e3(j)/lpsdwn);
end
end
Cd3e3=zeros(1,684);
fCd3e=f(171:854);
for i=1:684
for j=i:i+340
Cd3e3(i)=Cd3e3(i)+df*log2(1+Sd3e3(j)/lpsdwn);
end
end
Cd4e3=zeros(1,343);
fCd4e=f(341:683);
for i=1:343
for j=i:i+681
Cd4e3(i)=Cd4e3(i)+df*log2(1+Sd4e3(j)/lpsdwn);
end
end
%Category 4
Cd0e4=9000*log2(1+Sd1e4/lpsdwn);
Cd1e4=zeros(1,1013);
for i=1:1013
for j=i:i+11
Cd1e4(i)=Cd1e4(i)+df*log2(1+Sd1e4(j)/lpsdwn);
end
end
Cd2e4=zeros(1,957);
for i=1:957
for j=i:i+67
Cd2e4(i)=Cd2e4(i)+df*log2(1+Sd2e4(j)/lpsdwn);
end
end
Cd3e4=zeros(1,684);
for i=1:684
for j=i:i+340
Cd3e4(i)=Cd3e4(i)+df*log2(1+Sd3e4(j)/lpsdwn);
end
end
Cd4e4=zeros(1,343);
for i=1:343
for j=i:i+681
Cd4e4(i)=Cd4e4(i)+df*log2(1+Sd4e4(j)/lpsdwn);
end
end
%Category 5
Cd0e5=9000*log2(1+Sd1e5/lpsdwn);
Cd1e5=zeros(1,1013);
for i=1:1013
for j=i:i+11
Cd1e5(i)=Cd1e5(i)+df*log2(1+Sd1e5(j)/lpsdwn);
end
end
Cd2e5=zeros(1,957);
for i=1:957
for j=i:i+67
Cd2e5(i)=Cd2e5(i)+df*log2(1+Sd2e5(j)/lpsdwn);
end
end
Cd3e5=zeros(1,684);
for i=1:684
for j=i:i+340
Cd3e5(i)=Cd3e5(i)+df*log2(1+Sd3e5(j)/lpsdwn);
end
end
Cd4e5=zeros(1,343);
for i=1:343
for j=i:i+681
Cd4e5(i)=Cd4e5(i)+df*log2(1+Sd4e5(j)/lpsdwn);
end
end
%Quad 22
Cd0eq=9000*log2(1+Sd1eq/lpsdwn);
Cd1eq=zeros(1,1013);
for i=1:1013
for j=i:i+11
Cd1eq(i)=Cd1eq(i)+df*log2(1+Sd1eq(j)/lpsdwn);
end
end
Cd2eq=zeros(1,957);
for i=1:957
for j=i:i+67
Cd2eq(i)=Cd2eq(i)+df*log2(1+Sd2eq(j)/lpsdwn);
end
end
Cd3eq=zeros(1,684);
for i=1:684
for j=i:i+340
Cd3eq(i)=Cd3eq(i)+df*log2(1+Sd3eq(j)/lpsdwn);
end
end
Cd4eq=zeros(1,343);
for i=1:343
for j=i:i+681
Cd4eq(i)=Cd4eq(i)+df*log2(1+Sd4eq(j)/lpsdwn);
end
end
%FW-26
Cd0ef=9000*log2(1+Sd1ef/lpsdwn);
Cd1ef=zeros(1,1013);
for i=1:1013
for j=i:i+11
Cd1ef(i)=Cd1ef(i)+df*log2(1+Sd1ef(j)/lpsdwn);
end
end
Cd2ef=zeros(1,957);
for i=1:957
for j=i:i+67
Cd2ef(i)=Cd2ef(i)+df*log2(1+Sd2ef(j)/lpsdwn);
end
end
Cd3ef=zeros(1,684);
for i=1:684
for j=i:i+340
Cd3ef(i)=Cd3ef(i)+df*log2(1+Sd3ef(j)/lpsdwn);
end
end
Cd4ef=zeros(1,343);
for i=1:343
for j=i:i+681
Cd4ef(i)=Cd4ef(i)+df*log2(1+Sd4ef(j)/lpsdwn);
end
end
figure(1)
plot(f,Cd0e3,'k',f,Cd0e4,'k',f,Cd0e5,'k',f,Cd0eq,'k',f,Cd0ef,'k')
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
figure(2)
plot(fCd1e,Cd1e3,'k',fCd1e,Cd1e4,'k',fCd1e,Cd1e5,'k',fCd1e,Cd1eq,'k'
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
figure(3)
plot(fCd2e,Cd2e3,'k',fCd2e,Cd2e4,'k',fCd2e,Cd2e5,'k',fCd2e,Cd2eq,'k'
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
figure(4)
plot(fCd3e,Cd3e3,'k',fCd3e,Cd3e4,'k',fCd3e,Cd3e5,'k',fCd3e,Cd3eq,'k'
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
figure(5)
plot(fCd4e,Cd4e3,'k',fCd4e,Cd4e4,'k',fCd4e,Cd4e5,'k',fCd4e,Cd4eq,'k'
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
f=[1:1025]/1025*15e6;
df=max(f)/1024;
hnpw=5.88e-12.*f.^1.5;
hn3=7.94e-14.*f.^1.5;
hn4=2.51e-15.*f.^1.5;
hn5=6.31e-16.*f.^1.5;
lpsdwn=10^(-140/10);
d=100/0.3048;
a3=8.17e-7;
b3=8.07e-11;
a4=7.37e-7;
b4=9.12e-12;
a5=7.26e-7;
b5=4.56e-12;
aq=6.77e-7;
bq=4.97e-11;
af=9.17e-7;
bf=4.87e-11;
he3=-(a3.*sqrt(f)+b3.*f).*328.*8.686;
he4=-(a4.*sqrt(f)+b4.*f).*328.*8.686;
he5=-(a5.*sqrt(f)+b5.*f).*328.*8.686;
heq=-(aq.*sqrt(f)+bq.*f).*328.*8.686;
hef=-(af.*sqrt(f)+bf.*f).*328.*8.686;
%Category 3
S3=10.^(he3./10);
%Category 4
S4=10.^(he4./10);
%Category 5
S5=10.^(he5./10);
% Quad-22
Sq=10.^(heq./10);
% FW-26
Sf=10.^(hef./10);
%Category 3
Cd0e3=9000*log2(1+S3./hn3);
Cd1e3=zeros(1,1013);
fCd1e=f(5:1017);
for i=1:1013
for j=i:i+11
Cd1e3(i)=Cd1e3(i)+df*log2(1+S3(j)/hn3(j));
end
end
Cd2e3=zeros(1,957);
fCd2e=f(34:990);
for i=1:957
for j=i:i+67
Cd2e3(i)=Cd2e3(i)+df*log2(1+S3(j)/hn3(j));
end
end
Cd3e3=zeros(1,684);
fCd3e=f(171:854);
for i=1:684
for j=i:i+340
Cd3e3(i)=Cd3e3(i)+df*log2(1+S3(j)/hn3(j));
end
end
Cd4e3=zeros(1,343);
fCd4e=f(341:683);
for i=1:343
for j=i:i+681
Cd4e3(i)=Cd4e3(i)+df*log2(1+S3(j)/hn3(j));
end
end
%Category 4
Cd0e4=9000*log2(1+S4./hn4);
Cd1e4=zeros(1,1013);
for i=1:1013
for j=i:i+11
Cd1e4(i)=Cd1e4(i)+df*log2(1+S4(j)/hn4(j));
end
end
Cd2e4=zeros(1,957);
for i=1:957
for j=i:i+67
Cd2e4(i)=Cd2e4(i)+df*log2(1+S4(j)/hn4(j));
end
end
Cd3e4=zeros(1,684);
for i=1:684
for j=i:i+340
Cd3e4(i)=Cd3e4(i)+df*log2(1+S4(j)/hn4(j));
end
end
Cd4e4=zeros(1,343);
for i=1:343
for j=i:i+681
Cd4e4(i)=Cd4e4(i)+df*log2(1+S4(j)/hn4(j));
end
end
%Category 5
Cd0e5=9000*log2(1+S5./hn5);
Cd1e5=zeros(1,1013);
for i=1:1013
for j=i:i+11
Cd1e5(i)=Cd1e5(i)+df*log2(1+S5(j)/hn5(j));
end
end
Cd2e5=zeros(1,957);
for i=1:957
for j=i:i+67
Cd2e5(i)=Cd2e5(i)+df*log2(1+S5(j)/hn5(j));
end
end
Cd3e5=zeros(1,684);
for i=1:684
for j=i:i+340
Cd3e5(i)=Cd3e5(i)+df*log2(1+S5(j)/hn5(j));
end
end
Cd4e5=zeros(1,343);
for i=1:343
for j=i:i+681
Cd4e5(i)=Cd4e5(i)+df*log2(1+S5(j)/hn5(j));
end
end
%Quad 22
Cd0eq=9000*log2(1+Sq./hnpw);
Cd1eq=zeros(1,1013);
for i=1:1013
for j=i:i+11
Cd1eq(i)=Cd1eq(i)+df*log2(1+Sq(j)/hnpw(j));
end
end
Cd2eq=zeros(1,957);
for i=1:957
for j=i:i+67
Cd2eq(i)=Cd2eq(i)+df*log2(1+Sq(j)/hnpw(j));
end
end
Cd3eq=zeros(1,684);
for i=1:684
for j=i:i+340
Cd3eq(i)=Cd3eq(i)+df*log2(1+Sq(j)/hnpw(j));
end
end
Cd4eq=zeros(1,343);
for i=1:343
for j=i:i+681
Cd4eq(i)=Cd4eq(i)+df*log2(1+Sq(j)/hnpw(j));
end
end
%FW-26
Cd0ef=9000*log2(1+Sf./hnpw);
Cd1ef=zeros(1,1013);
for i=1:1013
for j=i:i+11
Cd1ef(i)=Cd1ef(i)+df*log2(1+Sf(j)/hnpw(j));
end
end
Cd2ef=zeros(1,957);
for i=1:957
for j=i:i+67
Cd2ef(i)=Cd2ef(i)+df*log2(1+Sf(j)/hnpw(j));
end
end
Cd3ef=zeros(1,684);
for i=1:684
for j=i:i+340
Cd3ef(i)=Cd3ef(i)+df*log2(1+Sf(j)/hnpw(j));
end
end
Cd4ef=zeros(1,343);
for i=1:343
for j=i:i+681
Cd4ef(i)=Cd4ef(i)+df*log2(1+Sf(j)/hnpw(j));
end
end
figure(1)
plot(f,Cd0e3,'k',f,Cd0e4,'k',f,Cd0e5,'k',f,Cd0eq,'k',f,Cd0ef,'k')
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
figure(2)
plot(fCd1e,Cd1e3,'k',fCd1e,Cd1e4,'k',fCd1e,Cd1e5,'k',fCd1e,Cd1eq,'k'
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
figure(3)
plot(fCd2e,Cd2e3,'k',fCd2e,Cd2e4,'k',fCd2e,Cd2e5,'k',fCd2e,Cd2eq,'k'
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
figure(4)
plot(fCd3e,Cd3e3,'k',fCd3e,Cd3e4,'k',fCd3e,Cd3e5,'k',fCd3e,Cd3eq,'k'
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
figure(5)
plot(fCd4e,Cd4e3,'k',fCd4e,Cd4e4,'k',fCd4e,Cd4e5,'k',fCd4e,Cd4eq,'k'
grid
xlabel('Frequency (dB)')
ylabel('Channel Capacity (Bit/Sec.)')
2.7 References
7. A. F. Bennet, "An improved circuit for the telephone set," BSTJ, vol. 32, pp.
611626, May 1953.
10. www.fcc.gov/wtb/
11. P. N. Saveskie, Radio Propagation Handbook, TAB Books Inc., Blue Ridge
Summit, PA, 1980.
The in-house TV signal wiring has not been widely publicized as a transmission
medium for home networking for several reasons. First, for most households
where the coaxial cables are installed by cable TV companies as an extension
to their cable TV network, there are usually not many cable connections, and
the cable TV company owns the wiring infrastructure. For households where
the coaxial cable TV wiring is built in and many cable connections are
accessible, the available spectrum for home network is limited once the cable
TV signal is brought into the in-house TV signal wiring infrastructure. Finally,
signal losses between different in-house coaxial cable connections could be
pretty high because of the use of splitters where signal loss between branches
are engineered high to satisfy impedance match requirement and to minimize
reflections. Despite these limitations or constraints, a high throughput home
network can still be constructed over the in-house TV signal wiring within
frequency gaps of cable TV channels using proper modulation methods of
suitable signal strength.
3.1 In-House TV Wiring
Figure 3.1 shows the general arrangement of the cable TV hybrid fiber coaxial
and tree branch distribution network connecting all subscribers. TV signals are
originated from the head end. Two-way services such as cable modem for
Internet access and POTS are also terminated and managed at the head end. A
dual optical ring is used to connect all head ends and hubs over the SONET
and ATM infrastructure for delivering and exchanging digital programs. AM
fiber links are extended to a number of fiber nodes. From each fiber node, a
few coaxial trunk cables, each of which serves a few hundred subscribers, are
further extended to neighborhoods. Subscribers are connected to trunk cables
through drop coaxial cables. The configuration illustrates that there might be
some possibilities of interference between neighboring cable TV subscribers if
in-house wiring is used for a high throughput home network. However, the
degree of interference is minimized by additional drop cable losses and the
signal-splitting loss introduced inside the Tap devices.
Traditionally, the only attention that has been paid to signal attenuation has
been the use of different types of coaxial cable. The primary parameters for
twisted pair cables have been published, but similar information is not
available for coaxial cables. To better understand the effects of termination and
branch splitting when trying to identify a suitable transmission system for a
high-throughput home network system over existing in-house TV signal
wiring, we have attempted to estimate the primary parameters for coaxial
cable. These estimates are based on cable loss measurements as well as cable
physical dimensions. They are to be verified and improved by further
experiments and measurements.
Equation 3.1
To study termination and splitting branch effects, we can estimate the primary
parameters of coaxial cables based on their physical dimensions and
attenuation values. The shunt capacitance C of a coaxial cable can be
calculated according to the geometry of the coaxial cable according to the
following expression:
Equation 3.2
where a is the diameter of the center conductor, b is the inside diameter of the
outer conductor, and er is the relative permeability. We assume er = 1.
Equation 3.3
The coaxial cable attenuation can also be related to its serial resistance R
according to the following expression:
Equation 3.5
Equation 3.6
R(ohms/mile)
G 0 0 0 0
Splitters are used at coaxial cable branch points where the even distribution of
power and impedance match are both important. There are power splitters
with a different number of output ports. However, all power splitters are built
upon the basic one-to-two power splitter component. A one-to-four power
splitter/combiner is made by cascading three one-to-two power splitters
together (Figure 3.3). Inside a one-to-four power splitter, output ports of the
first one-to-two splitter are connected to input ports of two other one-to-two
splitters resulting in a total of four external output ports. Using this cascading
method, the signal can be evenly distributed among a number of output ports
while maintaining impedance matching at all ports.
To study the interaction between coaxial cables and splitters, the ABCD
parameters of a splitter from the input port to one output port can be derived.
We connect an impedance Z0 to one output port and treat the input port and
the remaining output port as a two-port network. The ABCD parameters for
this two-port network are described by Equations 3.7 and 3.8. Corresponding
to the structure of a splitter, Equation 3.7 has three parts. The first part
represents the primary coil; the second part, the capacitance; and the third
part, the second coil together with the resistor. Equation 3.8 shows details of
the third part.
Equation 3.7
Equation 3.8
a is the tapping ratio, k1 is the coupling coefficient of the primary coil, and k2
is the coupling coefficient of the second coil. L1 is the inductance of the
primary coil, L2 is the inductance of the second coil, C is the capacitance, and
R is the resistance. Typical parameters are listed as follows. We have a =
0.707 for impedance match of 75 to 37.75 ohms,L1 = 40 mH, L2 = 0.1 mH, k1 =
0.9997, k2 = 0.9997, C = 4.5 pF, and R = 220 ohms. Figure 3.5 shows the
frequency responses of a splitter from the input port to one output port with
the other output port either terminated with a resistor of 75 ohms or not
terminated.
With both output ports terminated with coaxial cables of 75 ohms, the splitter
produces a signal-splitting loss of about 3 dB across a broad frequency range
of up to the design specification of 500 MHz for this special case. This is the
expected result because 3 dB corresponds to half of the energy split. When
only one output port is connected, the loss values could vary along the
frequency band.
The ABCD parameters from one output port to the other output port are
Equation 3.9
Equation 3.10
Equation 3.11
Equation 3.12
where Zm = a2Z1 and Z1 is the impedance connected at the input port. Figure
3.6 shows the transfer function of a typical one-to-two splitter from an output
port to the other output port with the input port either terminated by a coaxial
cable of impedance 75 ohms or open. Losses between two output ports are
about 25 dB when the input port is connected with a coaxial cable and very
high when the input port is open.
Figure 3.6. Transfer Function of a Splitter from Output-to-
Output
3.4 Tap
Taps are used to connect drop cables to a distribution cable. A tap introduces a
much higher signal loss to drop cables than is seen in its transmission path
along the distribution cable. A two-port tap consists of a line coupling part and
a two-port splitter as shown in Figure 3.7. In general, an n-port tap consists of
a coupling part and an n-port splitter. Impedances of the distribution cable and
the input port of the splitter are all 75 ohms. The coupling circuit matches
impedances of distribution cables at both input and output ports and of the
splitter while introducing a small loss in the distribution cable, and coupling
the signal to the splitter. Signal coupling is done through a combination of
parallel and serial energy tapping. The transformer B1 is in series with the
distribution cable, while the transformer B2 is in parallel. The ABCD
parameters of the coupling circuit can be derived in the interest of studying
the transmission performance of the cable TV distribution plant. However, for
the purpose of home networking using in-house coaxial cable, we just simply
assume that the drop cable is properly terminated with an impedance of 75
ohms by examining the internal structure of a tap.
The in-house coaxial cable wiring carries many channels of TV signals. The
conventional TV VHF channels, channels 2 to 13, occupy frequencies from 54
to 216 MHz with frequency gaps in between for FM broadcast stations. The off-
the-air UHF channels, channels 14 to 69, occupy frequencies from 470 to 806
MHz. Table 3.4 shows frequency arrangement for off-the-air TV channels.
VHF Channel Frequency Band UHF Channel Frequency Band UHF Channel Frequency Band
No. (MHz) No. (MHz) No. (MHz)
26 542548 50 686692
27 548554 51 692698
28 554560 52 698704
29 560566 53 704710
30 566572 54 710716
31 572578 55 716722
32 578584 56 722728
33 584590 57 728734
34 590596 58 734740
35 596602 59 740746
36 602608 60 746752
37 608614 61 752758
62 758764
63 764770
64 770776
65 776782
66 782788
67 788794
68 794800
69 800806
77 540546
78 546552
The majority of the frequency band on existing in-house wiring has been
occupied by cable TV channel allocations. CEBus [4] has recommended a dual
coaxial cable wiring system to carry local video signals as well as data traffic.
In case a second coaxial cable is not available, the frequency band between
the upper edge of reverse channel at 42 MHz and the lower edge of TV
channel 2 at 54 MHz can be used to establish a coaxial cablebased home
network. This coaxial cablebased home network should not interfere with
either TV channels or reverse channels by minimizing out-of-band energy at
60 dB below these TV or reverse channel signals.
3.6 Channel Model
Compared with a straight coaxial cable, the insertion loss of this channel
model is much higher and is not even along the frequency scale. The high and
uneven signal loss is mainly related to the output port-to-output port path of a
splitter. When only attenuation is considered for the normal purpose of a
splitter between output ports, the unevenness of the attenuation does not
matter. Depending on the signal bandwidth, proper signal-processing
techniques might be necessary when a signal is sent through the output port-
to-output port path of a splitter. Otherwise, the time domain reflection, as
indicated in Figure 3.10, could limit the signaling baud rate.
This coaxial cable channel model is established based upon limited laboratory
measurements. Improvements to this model can be achieved by further
confirming coaxial cable and splitter models. Transmission characteristics of
splitters vary much depending on manufacturers. The effect of the variation
can be experimented with by changing the coupling coefficients of the first coil
and the second coil of the splitter.
3.7 Noise Environment
A digital filter can be constructed according to this noise model. Colored noise
can then be generated by passing white noise through this ingress noise filter
for simulation studies. For relatively narrow band transmission systems
occupying only a part of the frequency spectrum, this ingress noise model can
be multiplied with bandpass filters. The combined narrow band ingress noise
filter might be easier to implement for simulation studies. In the frequency
band between 40 and 52 MHz, the ingress noise level is close to the noise floor
of 40 dBµV. Interference carriers in this particular frequency band are also
relatively few.
3.8 Channel Capacity
Equation 3.13
At a minimal transmit signal level of 0 dBµV, the channel capacity of the in-
house coaxial cable wiring is small in the frequency band between 42 and 52
MHz. This is because the signal level is close to the noise floor of about 40
dBµV when the channel loss is about 30 dBµV. The effect of additional noise
interference carriers further reduces the channel capacity. On the other hand,
when the transmit signal level is relatively strong at 50 dBµV, about 316
millivolts (mV) on an impedance of 75 ohms, the channel capacity becomes
about 60 Mbps. Under this transmit signal level, a home network transmission
system with reasonable complexity of signal processing can be implemented
for a transmission throughput of higher than 30 Mbps in the frequency gap of
between 42 and 52 MHz.
3.9 MATLAB Files
function [ht,h]=abcd2hcx(a,b,c,d);
d=a;
r=75;
sz=length(a);
h=2*r*ones(sz,1)./(r*(r*c+d)+(r*a+b));
h(sz+1:2*(sz-1))=real(h(sz-1:-1:2))-sqrt(-1)*imag(h(sz-1:-1:2));
ht=real(ifft(h));
function [a,b,c,d]=splitio(f,z0);
l1=4e-5;
l2=1e-7;
k1=0.9997;
k2=0.9997;
a=0.707;
r=220;
C=4.5e-12;
lf=length(f);
W=2*pi*f';
a10=ones(lf,1)/a/k1;
b10=j*W*l1*a*(1-k1^2)/k1;
c10=ones(lf,1)./(j*W*l1*a*k1);
d10=ones(lf,1)*a/k1;
a3=ones(lf,1);
b3=zeros(lf,1);
c3=j*C*W;
d3=a3;
a1=a10.*a3+b10.*c3;
b1=a10.*b3+b10.*d3;
c1=c10.*a3+d10.*c3;
d1=c10.*b3+d10.*d3;
a2=j*W*l2*(2*(1+k2)*z0+r)+r*z0-(1-k2^2)*W.^2*l2^2;
b2=j*W*l2*r*z0-(1-k2^2)*W.^2*l2^2*(r+z0);
c2=2*j*W*l2*(1+k2)+r;
d2=2*j*W*l2*(1+k2)*(r+z0)+r*z0;
a=a1.*a2+b1.*c2;
b=a1.*b2+b1.*d2;
c=c1.*a2+d1.*c2;
d=c1.*b2+d1.*d2;
delt=j*W*l2*(1+k2)*(r+2*z0)+r*z0;
a=a./delt;
b=b./delt;
c=c./delt;
d=d./delt;
function [a,b,c,d]=splitoo(f,z1);
l1=4e-5;
l2=1e-7;
k1=0.9997;
k2=0.9997;
a=0.707;
r=220;
C=4.5e-12;
lf=length(f);
W=2*pi*f';
zm=a^2*z1;
a1=zm+j*W*l2;
b1=j*W*l2*(1+k2).*(j*W*l2*(1-k2)+2*zm);
c1=ones(lf,1);
d1=zm+j*W*l2;
a=b1+a1*r;
b=r*b1;
c=C*(r+b1)-(1-a1).^2;
d=b1+a1*r;
delt=r+b1;
a=a./delt;
b=b./delt;
c=c./delt;
d=d./delt;
f=[1:1025]/1025*1.5e8;
l1=100;
l2=25;
l3=35;
z0=75;
z1=75;
load c6.mod
load c59.mod
[a1,b1,c1,d1]=abcdcx(f,c6(:,1),c6(:,2),c6(:,3),c6(:,4),c6(:,5),l1);
[a2,b2,c2,d2]=abcdcx(f,c6(:,1),c6(:,2),c6(:,3),c6(:,4),c6(:,5),l2);
[a3,b3,c3,d3]=abcdcx(f,c6(:,1),c6(:,2),c6(:,3),c6(:,4),c6(:,5),l3);
[as1,bs1,cs1,ds1]=splitoo(f,z1);
[as2,bs2,cs2,ds2]=splitio(f,z0);
[chip1,h1]=abcd2hcx(a1,b1,c1,d1);
y1=20*log10(abs(h1(1:1025)));
at1=a1.*as1+b1.*cs1;
bt1=a1.*bs1+b1.*ds1;
ct1=c1.*as1+d1.*cs1;
dt1=c1.*bs1+d1.*ds1;
[chip2,h2]=abcd2hcx(at1,bt1,ct1,dt1);
y2=20*log10(abs(h2(1:1025)));
at2=at1.*a2+bt1.*c2;
bt2=at1.*b2+bt1.*d2;
ct2=ct1.*a2+dt1.*c2;
dt2=ct1.*b2+dt1.*d2;
[chip3,h3]=abcd2hcx(at2,bt2,ct2,dt2);
y3=20*log10(abs(h3(1:1025)));
at3=at2.*as2+bt2.*cs2;
bt3=at2.*bs2+bt2.*ds2;
ct3=ct2.*as2+dt2.*cs2;
dt3=ct2.*bs2+dt2.*ds2;
[chip4,h4]=abcd2hcx(at3,bt3,ct3,dt3);
y4=20*log10(abs(h4(1:1025)));
a=at3.*a3+bt3.*c3;
b=at3.*b3+bt3.*d3;
c=ct3.*a3+dt3.*c3;
d=ct3.*b3+dt3.*d3;
[chip,h]=abcd2hcx(a,b,c,d);
y5=20*log10(abs(h(1:1025)));
figure(2)
plot(f,y1,'k',f,y5,'k')
figure(3)
plot([1:1025]/2/1.5e8,chip(1:1025),'k')
psize=2049;
nsub=500;
perc=0.5;
f=[0:psize-1]/2048*50e6;
f(1)=0.00001;
%define shortwave radio bands
mask1l=5.5e6;
mask1h=6e6;
mask2l=7e6;
mask2h=7.5e6;
mask3l=9e6;
mask3h=9.8e6;
mask4l=11.5e6;
mask4h=12e6;
mask5l=13.5e6;
mask5h=14e6;
mask6l=14.8e6;
mask6h=15e6;
mask7l=17.5e6;
mask7h=18e6;
mask8l=21.5e6;
mask8h=21.8e6;
%define 30 random peaks
rloc1=rand(1,30)*50e6;
rloc2=rand(1,30)*50e6;
rloc3=rand(1,30)*50e6;
rloc4=rand(1,30)*50e6;
rloc5=rand(1,30)*50e6;
rloc6=rand(1,30)*50e6;
rloc7=rand(1,30)*50e6;
rloc8=rand(1,30)*50e6;
%noise floor
nsfllog=-40;
nsflflog=ones(1,psize)*nsfllog;
nsflf=10.^(nsflflog/10);
%radio background noise level, e-filed
efildlog=34.5-20;
efildflog=ones(1,psize)*efildlog;
epowflog=efildflog-44.5;
epowf=10.^(epowflog/10);
%radio interference noise level, random e-field
erfildflog=rand(1,psize)*45;
%spectrum mask
erfmask=ones(1,psize)*0.1;
for i=1:psize
if f(i)>mask1l & f(i)<mask1h
erfmask(i)=1;
end
if f(i)>mask2l & f(i)<mask2h
erfmask(i)=1;
end
if f(i)>mask3l & f(i)<mask3h
erfmask(i)=1;
end
if f(i)>mask4l & f(i)<mask4h
erfmask(i)=1;
end
if f(i)>mask5l & f(i)<mask5h
erfmask(i)=1;
end
if f(i)>mask6l & f(i)<mask6h
erfmask(i)=1;
end
if f(i)>mask7l & f(i)<mask7h
erfmask(i)=1;
end
if f(i)>mask8l & f(i)<mask8h
erfmask(i)=1;
end
for j=1:30
if f(i)>rloc1(j)-100e3 & f(i)<rloc1(j)+100e3
erfmask(i)=0.2;
end
if f(i)>rloc2(j)-100e3 & f(i)<rloc2(j)+100e3
erfmask(i)=0.3;
end
if f(i)>rloc3(j)-100e3 & f(i)<rloc3(j)+100e3
erfmask(i)=0.4;
end
if f(i)>rloc4(j)-100e3 & f(i)<rloc4(j)+100e3
erfmask(i)=0.5;
end
if f(i)>rloc5(j)-100e3 & f(i)<rloc5(j)+100e3
erfmask(i)=0.6;
end
if f(i)>rloc6(j)-100e3 & f(i)<rloc6(j)+100e3
erfmask(i)=0.7;
end
if f(i)>rloc7(j)-100e3 & f(i)<rloc7(j)+100e3
erfmask(i)=0.8;
end
if f(i)>rloc8(j)-100e3 & f(i)<rloc8(j)+100e3
erfmask(i)=0.9;
end
end
end
erfildflog=erfildflog.*erfmask;
%conversion at 10 MHz
erpowflog=erfildflog-44.5;
erpowf=10.^(erpowflog/10);
%sum of background and interference noise power
epowf=epowf+erpowf;
%field to power: propotional to the power of wavelength
epowf=epowf.*(10e6./f).^2;
epowft=perc*epowf+nsflf;
f(1)=0;
nfilt=fir2(900,f/max(f),sqrt(epowft));
[h,w]=freqz(nfilt,1,1024);
px=[1:1024]/1024*50e6;
py=20*log10(abs(h));
plot(px(102:1024),py(102:1024),'k');
grid
xlabel('Frequency (Hz)')
ylabel('Noise Level (dBµV)')
3.9.6 Channel Capacity Calculation
coaxmod;
h2=(abs(h(1:1024))).^2;
nmdl;
n2=(abs(h(1:1024))).^2;
df=max(f)/1025;
f1=ceil(1025*42e6/1.5e8);
f2=ceil(1025*52e6/1.5e8);
for psd=0:50
chacap(psd+1)=sum(log(1+10^(psd/10).*h2(f1:f2)./n2(f1:f2)))*df/log(2
end
px=[0:50]
figure(3)
plot(px,chacap,'k');
grid
xlabel('Transmit Signal Level (dBµV)')
ylabel('Channel Capacity (Bits/Sec)')
3.10 References
The Romex brand from General Cable [1] has been used for many residential
electrical wirings. Within the Romex brand, NM-B type has been used for
indoor branch wiring, and UF-B type, for outdoor use such as the cable to a
post light. SE-U or USE-2 can be used as feeder cable for the service entrance.
Both NM-B and UF-B cables are constructed with individual THHN cables of
class B solid or strands of bare annealed copper conductors with an overall PVC
jacket. THHN is derived from the specification of Thermoplastic insulation
(PVC), High Heat resistance, and Nylon jacket. The THHN cable has a 90°C
rating and is recommended for use at dry or damp locations. NM-B stands for
Non-Metallic sheathed cable with class B THHN individual conductors. Similarly
UF-B stands for Underground Feeder cable with class B THHN individual
conductors. SE-U stands for Service Entrance Unarmored. An SE-U cable is
constructed with individual THHN or individual XHHW conductors with an
overall PVC jacket. XHHW is derived from the specification of XLPE (Cross-
linked polyethylene) insulation, High Heat resistance, for wet and dry
locations. USE-2 stands for Underground Service Entrance. The USE-2 cable is
XLPE insulated and designed for direct burial application. Table 4.1 shows
AWG, conductor diameter, external dimension, and ampacities of NM-B and UF-
B cables for a few popular home installation choices.
These external dimensions are for cables that have a copper ground. Two-
conductor cables are for normal usage, while the three-conductor cables can
be used for providing two phases of electricity for a combined 240 V to supply
an oven or a dryer. A three-conductor cable is also useful for connecting three-
way switches. These ampacities are defined by the National Electric Code [2].
The general guidelines are illustrated by Figure 4.1.
Type AWG Ampacity # of Cond. Strand Dia. # of Strands Overall Dia. Ext. Dim. (inches)
A 100 ampacity might fit the usage of a small home, while the 175 ampacity
could be required for a large home. Two ampacity estimation examples follow
[3]. The first example is for a small home with a living area of 800 square
feet, a 5-kilowatt wall-mount oven, a 6-kilowatt cooking unit, and a 15-
ampere air conditioner. Besides these heavy-duty applinces, the lighting load is
estimated at 3 watts per square feet (W/ft2). We also give 3 kilowatts (kW) for
small kitchen appliances and 1.5 kW for the laundry room. The breakdown of
ampacities is listed in Table 4.3.
For the combined lighting, appliance, and laundry usage, we can rate the first
3000 W as 100% and the remaining watts at 35% because they are not likely
to be in use at the same time. Therefore, the total wattage for lighting,
appliances, and laundry is reduced to 4365 W and the effective total wattage is
18,965 W. The ampacity requirement for the household is derived by dividing
the effective total wattage by 240 V because 120-V supplies are parts of the
two-phase 240-V supply. This example shows that the AWG 2 cables can be
used to supply electricity to a small home.
The second example is for a large home with a living area of 3800 square feet,
a 12-kW electrical range; a 1-kW, 120-V garbage disposal; a 10-kW, 240-V
strip heater; a 6-kW, 240-V hot water heater; two 28-ampere, 240-V air
conditioners, and four 1/2-horsepower, 120-V blow motors. The lighting load is
also estimated at 3 W/ft2. We still give 3 kW for small kitchen appliances and
1.5 kW for the laundry room. The breakdown of ampacities is listed in Table
4.4.
Again for the combined lighting, appliance, and laundry usage, we can rate the
first 3000 W as 100% and the remaining watts at 35%. Therefore, the total
wattage for lighting, appliances, and laundry is reduced to 7515 W. Because
the heater and air conditioner will not operate at the same time and the air
conditioner takes more electricity, only the ampacity of the air conditioner is
considered in the estimation. For the combined disposal, range, and water
heater, we can rate the first 10,000 W at 100% and the remaining watts at
40%. Therefore, the total wattage for disposal, range, and water heater is
reduced to 13,600 W, and the effective total wattage is (7,515 + 13,600 +
4,704 + 13,440) = 39,259. The ampacity requirement for the household is
163.58 amperes. This example shows that the AWG 3/0 cables can be used to
supply electricity to a large home.
Equation 4.1
Equation 4.2
where D is the distance between centers of two conductors. The shunt
capacitance C can be expressed by
Equation 4.3
Equation 4.4
Equation 4.5
Equation 4.6
Equation 4.7
Equation 4.8
where d is measured in feet. We know that a = 5.8 x 108, and b = 1.5 x 105
for this 12 AWG electrical wiring cable. This approximation is also plotted and
is virtually the same as that derived from primary parameters in Figure 4.4.
In the twisted pair telephone cable study, crosstalk was analyzed based on
capacitance unbalances of four conductors among two pairs [5]. For this
electrical wiring case, crosstalk between these two phases of electrical supply
can also be analyzed by examining shunt capacitances among these three
conductors. The effect of crosstalk can be better analyzed by using the concept
of three two-port networks as shown in Figure 4.8. ZH1 is the input impedance
between the first phase and the neutral conductors. ZH2 is the input
impedance between the second phase and the neutral conductors. ZHH is the
input impedance between two conductors of different phases. TP1 consists of
the ZH1 as a shunt impedance. TP2 consists of ZHH as a series impedance. TP3
consists of ZH2 as a shunt impedance.
Equation 4.10
Equation 4.11
Equation 4.12
Primary parameters are estimated between two hot phase conductors also for
the 12 AWG round cable. For e/e0 1, D/2r = 2.3, r = 2 x 103, and, cosh-1
(D/2r) = 1.475, we have the following primary parameters.
Equation 4.13
Equation 4.14
Equation 4.15
The following expressions are used to calculate the crosstalk model. The
characteristic impedance of a twisted pair cable is related to primary
parameters according to
Equation 4.16
Equation 4.17
Equation 4.18
Equation 4.19
Equation 4.20
Equation 4.21
Equation 4.22
Equation 4.23
Equation 4.24
The ABCD matrix for the crosstalk is then
Equation 4.25
Equation 4.26
Using ABCD parameters in MCrossTalk, the insertion loss is then calculated using
Equation 4.27
Equation 4.28
By replacing with values of ABCD, we have
Equation 4.29
The insertion loss of the crosstalk model for a three-conductor 100-ft 12 AWG
electrical cable with 200-ohm resistive terminations at the far end Z = 100and
is shown in Figure 4.9.
Electricity has found its applications in every household for about 100 years.
To ensure the safe use of electricity, the first edition of the National Electrical
Code (NEC) was published during 1897. Since then the NEC has been updated
every two or three years to keep up with technological developments [2]. The
National Fire Protection Association has acted as a sponsor for the NEC since
the 1911 edition. NEC gives guidelines on methods, material, wiring, and
protection for residential and other end-user applications. The essential part of
the NEC has been voluntarily adopted by most states and municipalities. NEC
has provided safety for electricity usage and uniformity in wiring practices.
When electrical devices are turned off, impedances of these devices are not
attached to branch cables. Terminals of branch cables can be considered open
ended except that some capacitors can still be attached for surge protection.
These capacitors can have a capacitance of up to a few microfarads. When a
light is on, its load resistance can be calculated according to its power rating.
For example, a 60 W, 120-V light bulb allows a current of 0.5 amperes and,
therefore, has a load resistance of 240 ohms. On the other hand, a heavy-duty
appliance consuming a few kilowatts has a much smaller load resistance. For
example, a 3600 W, 240-V oven allows a current of 15 amperes and has a load
resistance of only 16 ohms. Most electrical loads are resistive, such as lights,
or partially inductive, such as motors or voltage converting power supplies in
appliances.
Depending on the time of the day and activities, the electrical load within a
household is dynamic, which means that the total load resistance changes
from time to time on the usage time scale of a few minutes by human
intervention. On the other hand, many electrical devices with automatic
control, such as a refrigerator or an air conditioner, can vary their load
resistance on a time scale of a few seconds. Furthermore, some devices such
as a light dimmer or a motor speed controller can turn on and off an electrical
device in a fraction of a second. An electronic dimmer switch uses a transistor-
like device called a TRIAC to switch the electricity on and off 120 times each
second. One cycle of household 60 Hz AC electrical power is shown in Figure
4.14. A TRIAC turns itself off each time voltage reverses direction/sign/polarity
and then on after a certain delay. The rotating or sliding control on the switch
decides the delay time. As the delay time becomes shorter, the light is on more
of the time and is, thus, brighter. As the delay time goes longer, the light is on
less of the time and is, thus, dimmer.
Figure 4.14. The Operation of a Dimmer Switch
Load terminations on electrical wiring are very dynamic. They can be at the
middle or end of a branch cable. We call a load termination in the middle of a
branch cable a bridged load termination. Load terminations can also be
attached and detached from time to time. Even when attached, they can be
switched on and off rapidly. As far as using the electrical wiring as a
transmission medium is concerned, the open-ended, bridged, as well as low-
impedance terminations can all cause significant reflections. Another important
factor is that branch cables are generally imbalanced despite the parallel
construction of the cable as far as the radio emission is concerned. This is in
part because light switches are often used to break only the hot but not the
neutral conductor. Cable imbalance can also be caused by the wiring of three-
way light switches.
Equation 4.30
With these terms defined, the related FCC regulation in Section 15.109(e)
says that carrier current systems used as unintentional radiators or
unintentional radiators that are designed to conduct their radio frequency
emissions via connecting wires or cables and that operate in the frequency
range of 9 kHz to 30 MHz shall comply with the radiated emission limits for
intentional radiators provided in Section 15.209 for the frequency range of 9
kHz to 30 MHz. The related radiated emission limit provided in Section 15.209
is shown in Table 4.5. This same limit has been applied to the emission from
twisted pair cables.
MHz µV/m m
1.70530.0 30 30
Equation 4.31
Equation 4.32
Equation 4.33
where CF is the Coupling Factor. Since the FCC limits are defined for a
bandwidth of 9 kHz, the PSD can be related to the field strength using
Equation 4.34
Equation 4.35
Some field measurements have shown that CFs are in the range of between 65
and 45 dB at a distance of about 30 m. Therefore, for the worst case, the PSD
is limited at 72 dBm/Hz.
4.4 Noise Environment
The noise level on a power line can be measured using a spectrum analyzer. A
special coupling device called LISN (Line Impedance Stabilization Network) is
normally used to connect the 50-ohm input of a spectrum analyzer to the
power line. A transient limiter might also be required to prevent surge current
from entering the spectrum analyzer as shown in the middle of Figure 4.24. A
preamplifier might also be necessary between the transient limiter and the
spectrum analyzer because many spectrum analyzers have a relatively high
noise floor of around 110 dBm/Hz. Depending on the noise floor of the
spectrum analyzer, a gain of up to 40 dB might be required for the
preamplifier.
The internal circuit of a part of LISN is shown in Figure 4.25. This circuit shows
either the hot or the neutral wire part of an LISN. A switch in the front panel
of an LISN can select either the hot or the neutral wire. When selected, either
the hot or the neutral wire is connected to the spectrum analyzer via a C-L-C-R
network giving a stabilized impedance of 50 ohms at above 100 kHz.
This measured noise environment on power lines can also be modeled using
the controlled random variables method developed in Chapter 3 for the coaxial
cable. This noise environment is a combination of the background noise floor
at a level of about 145 dBm/Hz, a frequency-dependent radio background
noise, strong radio interference carriers within short-wave radio frequency
bands, and randomly distributed radio interference carriers. Figure 4.28 shows
the ingress noise model. The MATLAB file for generating this noise model
appears at the end of this chapter.
Equation 4.36
where we have used CFs in the range of between 65 and 45 dB at a distance
of about 30 m. Figure 4.29 shows a simulated power line channel model, a
simulated power line noise model, transmit signal PSDs, and received signal
PSDs. In Figure 4.29, the top curve is the power line channel model, the
bottom curve is the noise model, two straight lines are for transmit signal PSD
of 52 and 72 dBm/Hz, and Receive1/Receive2 are for received signals with
transmit PSD of 52 and 72 dBm/Hz, respectively.
Equation 4.37
where f1 is 1 MHz, f2 is 30 MHz, S(f) is the received signal level, and N(f) is
the noise level. For a transmit PSD of 52 dBm/Hz, we have a channel capacity
of 474.18 Mbps; for a transmit PSD of 72 dBm/Hz, we have 282.96 Mbps. They
correspond to 16 and 9 bits per Hertz, respectively. We also calculated channel
capacities of the power line against a flat background noise level of 145
dBm/Hz. Corresponding results are 573.05 and 380.32 Mbps for 52 and 72
dBm/Hz transmit signal PSDs, respectively. Therefore, we found that ingress
noises of this noise model reduced channel capacities by 20 and 34%,
respectively.
4.6 Matlab Files
for ii=1:100
a0=0;
a1=8e-6;
k=0.5;
j=sqrt(-1);
%di=[150];
di=150*rand(1,10);
%gi=[0.4];
gi=0.2*(rand(1,10)-0.5);
f=[1:1000]/1000*30e6;
for i=1:1000
Hf(i)=sum(gi.*exp(-(a0+a1*f(i)^k).*di).*exp(-2e-6/150*pi*j*f(i).*
Hfcj=real(Hf(1000:-1:1))-j*imag(Hf(1000:-1:1));
HHf=[Hf Hfcj];
imp=real(ifft(HHf));
end
figure(1)
plot(f,20*log10(abs(Hf)))
figure(2)
plot(imp)
pause
end
psize=2049;
nsub=500;
perc=0.5;
f=[0:psize-1]/2048*50e6;
f(1)=0.00001;
%define shortwave radio bands
mask1l=5.5e6;
mask1h=6e6;
mask2l=7e6;
mask2h=7.5e6;
mask3l=9e6;
mask3h=9.8e6;
mask4l=11.5e6;
mask4h=12e6;
mask5l=13.5e6;
mask5h=14e6;
mask6l=14.8e6;
mask6h=15e6;
mask7l=17.5e6;
mask7h=18e6;
mask8l=21.5e6;
mask8h=21.8e6;
%define 30 random peaks
rloc1=rand(1,30)*50e6;
rloc2=rand(1,30)*50e6;
rloc3=rand(1,30)*50e6;
rloc4=rand(1,30)*50e6;
rloc5=rand(1,30)*50e6;
rloc6=rand(1,30)*50e6;
rloc7=rand(1,30)*50e6;
rloc8=rand(1,30)*50e6;
rloc9=rand(1,30)*50e6;
rloc10=rand(1,30)*50e6;
%noise floor
nsfllog=-145;
nsflflog=ones(1,psize)*nsfllog;
nsflf=10.^(nsflflog/10);
%radio background noise level, e-filed
efildlog=34.5-20;
efildflog=ones(1,psize)*efildlog;
epowflog=efildflog-149.5;
epowf=10.^(epowflog/10);
%radio interference noise level, random e-field
erfildflog=rand(1,psize)*65;
%spectrum mask
erfmask=ones(1,psize)*0.1;
for i=1:psize
if f(i)>mask1l & f(i)<mask1h
erfmask(i)=1;
end
if f(i)>mask2l & f(i)<mask2h
erfmask(i)=1;
end
if f(i)>mask3l & f(i)<mask3h
erfmask(i)=1;
end
if f(i)>mask4l & f(i)<mask4h
erfmask(i)=1;
end
if f(i)>mask5l & f(i)<mask5h
erfmask(i)=1;
end
if f(i)>mask6l & f(i)<mask6h
erfmask(i)=1;
end
if f(i)>mask7l & f(i)<mask7h
erfmask(i)=1;
end
if f(i)>mask8l & f(i)<mask8h
erfmask(i)=1;
end
for j=1:30
if f(i)>rloc1(j)-100e3 & f(i)<rloc1(j)+100e3
erfmask(i)=0.2;
end
if f(i)>rloc2(j)-100e3 & f(i)<rloc2(j)+100e3
erfmask(i)=0.3;
end
if f(i)>rloc3(j)-100e3 & f(i)<rloc3(j)+100e3
erfmask(i)=0.4;
end
if f(i)>rloc4(j)-100e3 & f(i)<rloc4(j)+100e3
erfmask(i)=0.5;
end
if f(i)>rloc5(j)-100e3 & f(i)<rloc5(j)+100e3
erfmask(i)=0.6;
end
if f(i)>rloc6(j)-100e3 & f(i)<rloc6(j)+100e3
erfmask(i)=0.7;
end
if f(i)>rloc7(j)-100e3 & f(i)<rloc7(j)+100e3
erfmask(i)=0.8;
end
if f(i)>rloc8(j)-100e3 & f(i)<rloc8(j)+100e3
erfmask(i)=0.9;
end
end
end
erfildflog=erfildflog.*erfmask;
%conversion at 10 MHz
erpowflog=erfildflog-149.5;
erpowf=10.^(erpowflog/10);
%sum of background and interference noise power
epowf=epowf+erpowf;
%field to power: propotional to the power of wavelength
epowf=epowf.*(5e6./f).^2;
epowft=perc*epowf+nsflf;
f(1)=0;
nfilt=fir2(900,f/max(f),sqrt(epowft));
[h,w]=freqz(nfilt,1,1024);
px=[1:1024]/1024*50e6;
py=20*log10(abs(h));
plot(px(10:1024),py(10:1024),'k');
grid
xlabel('Frequency (Hz)')
ylabel('Noise Level (dBm/Hz)')
C1=sum(log(1+((abs(Hf(34:1000))).^2)./((abs(h(34:1000)')).^2)/1.58e5
C2=sum(log(1+((abs(Hf(34:1000))).^2)./((abs(h(34:1000)')).^2)/1.58e7
C3=sum(log(1+((abs(Hf(34:1000))).^2)/5.01e-10))*30e6/1000/log(2)
C4=sum(log(1+((abs(Hf(34:1000))).^2)/5.01e-8))*30e6/1000/log(2)
Ctest=966*log(1+1.9952e7)*30e6/1000/log(2)
4.7 References
1. www.generalcable.com/
10. D. Liu, E. Flint, B. Gaucher, and Y. Kwark, "Wide band AC power line
characterization," IEEE Trans. on Consumer Electronics, vol. 45, no. 4, pp.
10871097, November 1999.
Chapter 5. Radio Wave
In this chapter, we will study the transmission environment and construct
channel models for indoor radio frequency applications. First, we will examine
available radio frequency spectra suitable for indoor home networking devices.
We will then look at transmission characteristics at these frequency bands.
5.1 Available Radio Frequency Spectra
Table 5.2 shows a portion of the Part 2 title 47 radio frequency usage
allocation table for frequencies between 2402 and 2500 MHz. In these three
leftmost columns, radio frequency utilization is authorized for applications
according to individual frequency bands and geographic regions. In the next
two columns near the center of the table, radio frequency bands are allocated
for government and nongovernment U.S. utilization. Corresponding FCC rules
and regulations part numbers as well as special-use frequency notification are
listed in the last two rightmost columns. There are several ways to categorize
how these radio frequencies are used. For two-way communications purposes,
radio frequencies are allocated for land, mobile, maritime, aeronautical mobile,
and aviation applications. Radio frequencies are allocated for broadcast radio
and TV channels, as well as for broadcasting standard time and frequency
signals. There are radio frequency usages for satellite communication, radio
astronomy, meteorological, and navigation purposes. Amateur radios are also
authorized for use at certain frequency bands.
The primary type service for a particular band is annotated by all capital
letters, the secondary service annotation uses normal letters, and permitted
services are annotated also by capital letters but enclosed in oblique strokes
(e.g., /RADIOLOCATION/). Permitted and primary services have equal rights.
However, in the preparation of frequency plans, the primary services, as
compared with the permitted services, have prior choice of frequencies.
Stations of a secondary service should not cause harmful interference to
stations of primary or permitted services to which frequencies are already
assigned or to which frequencies may be assigned at a later date. They cannot
claim protection from harmful interference from stations of a primary or
permitted service; however, they can claim protection from harmful
interference from stations of the same or other secondary services to which
frequencies may be assigned at a later date.
Radio frequency usages from 4 kHz to 400 GHz are all defined in detail with no
spare gap at all. Defined details are noted in Table 5.2 by either the new "S"
numbering scheme or the old numbering scheme. These notes are included in
the text of the CFR title 47 document in Part 2. For example, S5.150 says
that: "The following bands: 1353313567 kHz (center frequency 13560 kHz),
2695727283 kHz (center frequency 27120 kHz), 40.6640.70 MHz (center
frequency 40.68 MHz), 902928 MHz in Region 2 (center frequency 915 MHz),
24002500 MHz (center frequency 2450 MHz), 57255875 MHz (center
frequency 5800 MHz), and 2424.25 GHz (center frequency 24.125 GHz) are
also designated for industrial, scientific and medical (ISM) applications. Radio
communication services operating within these bands must accept harmful
interference which may be caused by these applications."
These notes specify frequency bands and service types. Technical specifications
of service typessuch as signal level, bandwidth, and modulation methodare
usually also defined in detail in referenced documents. Licenses issued by
government authorized agencies are usually required for operators of
equipment for these services. The combined regulation and licensing procedure
ensures that only authorized services are operational at their desired
performance level within particular frequency bands. Regulated radio
communication applications have been developed since the early 1940s. For
historical reasons, many authorized applications are based on earlier analog
technologies. Recent development of digital transmission technologies have
opened up a tremendous opportunity window for further realization of the
potential of radio frequency spectra. A process involving experimenting,
petition, regulation, and licensing is usually required for the introduction of a
new service within a certain radio frequency band.
For the case of frequency hopping, the instantaneous signal power density is
much higher than the background noise if the transmitter and receiver are in
sync. Interference between different frequency-hopping systems could occur
occasionally if some of their hopping frequencies are the same. Interference
could be minimized or avoided if hopping sequences can be coordinated among
different frequency-hopping systems. For the direct sequence case, the
received signal-to-noise ratio is enhanced by the reverse of the spreading
process. The amount of signal-to-noise ratio enhancement is called spread
gain. Different direct sequence spread spectrum systems can occupy the same
frequency band. The desired signal is recovered through the despreading using
a correlation process of the correct sequence code from the rest of other
sequence coded signals. The effective signal-to-noise ratio decreases when
more direct sequence spread systems are occupying the same frequency band.
As shown by Maxwell's equation, radio waves travel at the speed of light which
has been measured at 186,281.7 miles/second or, equivalently, 299,792.8
kilometers/second in open space. For optimal performance, the dimensions of
radio transceiver antenna depend on the radio wavelength. In the normal
condition the wavelength is obtained by dividing the speed of light by the
frequency of the radio wave as in
Equation 5.1
where c is the speed of light and f is the frequency of the radio wave. These
wavelengths are between 0.32 and 0.33 m, 0.12 and 0.125 m, and 0.051 and
0.053 m for the 902928 MHz, 2.42.4835 GHz, and 5.7255.850 GHz frequency
bands, respectively.
Wooden
5 1 0 0.03
panel
Copper
1 1 5.76 0.003
sheet
Equation 5.2
The permitted transmit power at these ISM bands is 0.25 or 1 W. The antenna
gain is usually between 0 to 6 dB. The wavelengths are approximately 0.32,
0.12, and 0.052 m for the 902- to 928-MHz, 2.4- to 2.4835-GHz, and 5.725-
to 5.850-GHz frequency bands, respectively. The received power to transmit
power ratios are 40 to 52, 48.5 to 60.5, and 55.8 to 67.8 dB for these ISM
frequency bands, respectively, at a distance of 10 m. For a transmit power of 1
W, the directly received powers at a distance of 10 m are 6100, 0.914, and
0.162.8 microwatts (µW), respectively.
Figure 5.2 shows the relationship between the incident, reflected, and
transmitted waves. A wave arrives with an angle of qi and reflected with an
angle of qr. In general, the incident wave angle and the reflected wave angle
are the same (i.e., qi = qr). Incident and transmitted wave angles are related
by their dielectric properties as shown by
Equation 5.3
Equation 5.4
where
Equation 5.5
At the boundary interface, the transmitted wave equals the sum of the
incident and the reflected waves; that is, Et = Ei + Er = (1 = )Ei = TEi. For
parallel and perpendicular components, we have Et = T||Ei and Et = T Eifor
Equation 5.6
Equation 5.7
Equation 5.8
Equation 5.9
Equation 5.10
Equation 5.11
We find that about 22% of the parallel components and 70% of the
perpendicular components of the incident wave are reflected, while 78% of the
parallel components and 30% of the perpendicular components are
transmitted through the air-to-wall interface. When a radio wave travels
through one medium to another with a higher permittivity, through air to a
wall for this case, the reflected wave has an 180° phase change, while the
phase of the transmitted wave is the same as that of the incident wave. Also
the magnitude of the wave at the interface boundary is reduced.
Equation 5.12
Equation 5.13
We then calculate T|| and T as shown by
Equation 5.14
Equation 5.15
Equation 5.16
Equation 5.17
Equation 5.18
Equation 5.19
Equation 5.20
Equation 5.21
We then calculate energy transmission coefficients T|| and T as shown by
Equation 5.22
Equation 5.23
Equation 5.24
Equation 5.25
Equation 5.26
Equation 5.27
The minimum transmit angle is about 70.5°. In fact, when the incident angle
approaches zero, the reflection coefficient approaches one and the transmit
coefficient approaches zero for both parallel and perpendicular components of
the wave. Figure 5.4 shows parallel components of reflection and transmit
coefficients as variables of the air-to-wall incident angle. At an incident angle
of about 19°, the reflection coefficient is about zero while the transmit
coefficient is about one for the parallel component of the wave.
Figure 5.4. Parallel Reflection and Transmit Coefficient
Equation 5.28
where L is the modification factor whose value could be smaller than one for
the effect of reflection enhancement or larger than one for the effect of barrier
attenuation.
Figure 5.10 shows received power to transmit power ratios according to the
modified field strength formula with L = 0.5, 1, and 3 for the 900-MHz
frequency band. The top curve corresponds to L = 0.5 with reflection
enhancement. The middle one corresponds to L = 1 (i.e., the free space
formula). The bottom one corresponds to L = 3 representing additional losses
due to wall barriers.
Figure 5.11 shows received power to transmit power ratios also according to
the modified field strength formula for the 2.4-GHz frequency band. The top (L
= 0.5), middle (L = 1), and bottom (L = 3) curves are plotted together with
some real indoor signal strength measurements. These measurements are
close to estimations according to the formula. At longer distances, the radio
wave is usually attenuated by multiple wall barriers resulting in heavier losses.
Equation 5.29
The measurement of the indoor radio channel can be carried out in the time
domain or in the frequency domain. To measure the indoor radio channel
impulse response in the time domain, we need to send a short time duration
pulse (simulating an impulse) at one point and synchronously receive the
pulse at another point. To represent the channel accurately, the sampling rate
needs to be fast (at least twice the interested bandwidth). At gigahertz
frequency bands, the direct sampling of the radio frequency channel at a high
enough resolution presents a challenge to existing measurement equipment.
In practice, the measurement of the indoor radio frequency channel is usually
carried out in the frequency domain. The channel attenuation at each
frequency is measured step by step to cover the whole spectrum. The time
domain information is obtained through offline Fourier transforms. The step
frequency should be chosen such that the Fourier-transform time domain
response is long enough to cover all possible reflections. For example, a 1-MHz
step frequency results in a time domain duration of 1 microsecond (µs). Since
only the power attenuation level is measured, the Fourier-transform time
domain information represents the squared magnitudes along with different
time delays. The amplitude of the impulse response can be obtained by taking
the square root. However, the phase information is still missing. This is the
shortcoming of the frequency measurement method. A method of random
phase has been used to supplement the information gathered from these
Fourier-transform measurements when a complete channel impulse response
is desired.
The general indoor radio frequency channel impulse response has the format
[4, 5]
Equation 5.30
where ak is the amplitude at kth delay time, qk is the corresponding phase, and
d(t - tk) is the delta function marking that particular delay instant. The
statistical indoor radio frequency channel model gives detailed information for
the sequence of aks based on separation distance and whether the signal is
directly received. There are four statistical characteristics for the channel
impulse response model. First, the amplitude is separation distancedependent.
The amplitude is related to the separation distance as measured in terms of
wavelength. Second, the amplitude is also delay sensitive. In general, the
longer the delay, the smaller the amplitude. Specifically, the average
amplitude at consecutive delay instances of the impulse response channel
model is expressed as
Equation 5.31
Equation 5.33
Third, the amplitude at each delay instance is a Gaussian random variable with
the average amplitude as the mean and a standard deviation of 4 or 5 dB for
LOS and OBS cases, respectively. Last, the occurrence of reflections at
subsequent delay instances is a random variable with certain probabilities
according to delay times. Specifically, for the LOS case, we have the following
occurrence probabilities:
Equation 5.34
Equation 5.35
In summary, amplitudes of the indoor radio frequency channel impulse
response model are Gaussian random variables as described by the following
expression when reflections at particular delay instances exist:
Equation 5.36
Equation 5.37
where are baud rate signaling impulses, f(t) is the low-pass pulse
shaping filter, w c is the carrier frequency, is the in-phase part of the
carrier, and h(t) is the indoor RF channel impulse response. When a signal
passes through a filter or a channel, it is going through a convolution process
that is denoted by the X(t) h(t),where X(t) is the signal and h(t) represents
a filter or the channel impulse response.
In particular, the transmit-shaping filtering process is described by
Equation 5.38
Then the modulation process, a combination of the shaping and the carrier
frequency multiplication, is described by
Equation 5.39
Equation 5.40
Equation 5.41
After the whole demodulation process, including receiver low-pass filtering, the
signal is represented by
Equation 5.42
Equation 5.43
Because of the low-pass nature of the filter f(t), the filtering process will
eliminate the high-frequency term cosw c(2t - i ). We then have
Equation 5.44
Equation 5.45
It can be shown that the same equivalent channel response exists for the
quadrature channel. Figure 5.18 shows the received signal pulse using a raised
cosine frequency response for the transmit and receiver filter pair and a
signaling baud rate of 1 MHz over the 2.4-GHz indoor radio frequency channel.
The distortion to the signal represented by this raised cosine pulse at a baud
rate of 1 MHz is relatively small. The differences at baud sampling points of 1
T, 2 T, and so on indicate the magnitude of distortions. Because of the random
nature of the indoor radio frequency channel, some pulse responses might be
a little worse than this example. After observations at many random instances,
it is concluded that a transceiver can be constructed without the use of a
channel equalizer at this baud rate. Figure 5.19 shows the received signal
pulse for a signaling baud rate of 2 MHz over the same 2.4-GHz indoor radio
frequency channel.
This example shows that the use of an adaptive channel equalizer is necessary
at a baud rate of 2 MHz. Otherwise, the negative peak before the main one
will seriously affect the performance of a receiver. To make an adaptive
channel equalizer work effectively under the rapidly changing radio frequency
environment, some training sequence along with the random data information
must be sent from the transmitter to the receiver. These training sequences
become an overhead on the data and could reduce the net transmission
throughput of the radio frequency channel. The optimal baud rate with or
without the use of an adaptive channel equalizer can be found by performing
experiments with this indoor radio frequency impulse response channel model.
Most current indoor radio frequency transmission system signals at, around, or
below 1 MHz to avoid using an adaptive channel equalizer.
5.5 Noise Level
It is critical to know the noise level at the very front end of a receiver because
the signal-to-noise ratio determined there cannot be further improved by
subsequent electronics. For wired communication systems, the minimum noise
level is determined by the thermal temperature of electronic components at
the very front end. Sometimes the noise level of the environment could be
higher than the receiver front end thermal noise level. For the indoor radio
frequency channel, the similar logic of noise level determination applies except
the noise level of the environment is related to the antenna ambient noise
temperature. The ambient noise temperature is measured for the radio
environment where the antenna is located and can be higher or lower than the
temperature of the antenna. This situation is similar to that of the
environment noise level, which can be higher or lower than the wired
communication system. The receiver front-end noise level for the indoor radio
frequency environment is determined by the higher of either environment or
antenna temperature. For the indoor radio frequency environment, this
usually is the room temperature which is between 17 and 27°C, 63 and 75°F,
or 290 and 300°K. The noise power at a particular temperature is expressed
by
Equation 5.46
Equation 5.47
where R is the antenna impedance.
Equation 5.48
The corresponding power density level is Pn/B = 1.37 x 1023 x 294 = 4.03 x
1021 = 173 dBm/Hz.
Equation 5.49
Equation 5.50
Equation 5.50 also applies to a passive device with loss where G will be
smaller than unity in terms of ratio or negative in terms of decibels. If input
and output noise levels are similar because of the ambient temperature for a
passive device, the loss of the passive device becomes the noise figure as
illustrated by
Equation 5.51
Equation 5.52
Equation 5.53
If we have a receiver consisting of three stages with F1 = 5 db, F2 = 6 dB, F3 =
7 dB, G1 = 20 dB, G2 = 25 dB, and G3 = 15 dB, the system noise figure is
calculated as
Equation 5.54
Notice again that the front-end noise figure is dominant. With an antenna
ambient temperature of 68°F, or 294°F, the equivalent noise temperature is
calculated by
Equation 5.55
Equation 5.56
Equation 5.57
5.6 Channel Capacity Calculation
The channel capacity for the indoor radio frequency environment can be
calculated based on the received signal strength and the corresponding noise
level. The received signal strength depends on the transmit signal power level
and the indoor radio frequency channel loss. According to the FCC rule, 1 W of
transmit power is allowed at a spectrum of 1 MHz. This translates to a power
spectrum density level of 30 dBm/Hz. On the other hand, the FCC rule clearly
states that the transmit power spectrum density is limited at 32 dBm/Hz in
every 3-kHz bandwidth. According to Figures 5.11 and 5.12, the worst case
channel losses are 70 and 78 dB at less than 30 ft for frequency bands of 2.4
and 5.7 GHz, respectively. The channel capacity can be calculated according to
Equation 5.58
The answer is expressed in terms of bits per hertz. Assuming a noise power
spectrum density of 168 dBm/Hz. The channel capacity for the 2.4-GHz
frequency band is shown by
Equation 5.59
Equation 5.60
corresponding to the signal power spectrum density of 32 78 = 110 dBm/Hz.
These calculations are based on a radio frequency interference-free
environment where the noise floor is determined by the environment thermal
noise. However, this indoor radio frequency channel is within an IMS band and
the channel might be contaminated by radio frequency interference noise from
other IMS band transmission systems. Figure 5.20 shows channel capacity
figures corresponding to different noise power spectrum density levels for 2.4-
and 5.7-GHz frequency bands, respectively. For a signaling bandwidth of 1
MHz, a channel capacity of 12 bits/Hz, which can be maintained with a noise
power spectrum density level of 150 dBm/Hz, can be designed for a
transmission system with a throughput of 10 Mbps. Figure 5.20 indicates that
some research and study activities can be conducted for the development of
high throughput, 10 Mbps and above, indoor radio frequency transmission
systems.
%clear
m1=1;
m2=1;
e1=1;
e2=9;
n1=sqrt(m1/e1);
n2=sqrt(m2/e2);
thtaid=[0:90];
thtai=thtaid/180*pi;
thtar=thtai;
thtat=acos(cos(thtai).*sqrt(m1*e1/m2/e2));
ii=1;
for i=1:91
if imag(thtat(i))~=0
ii=ii+1;
end
end
whitebg('white')
figure(1)
plot(thtaid,thtat/pi*180,'k')
grid
xlabel('Incident Angle (Degree)')
ylabel('Transmit Angle (Degree)')
R1=ones(91,1);
R2=ones(91,1);
T1=zeros(91,1);
T2=zeros(91,1);
R1(ii:91)=((-n1.*sin(thtai(ii:91))+n2.*sin(thtat(ii:91)))./(n1.*sin(
(thtat(ii:91)))).^2;
R2(ii:91)=((n2.*sin(thtai(ii:91))-n1.*sin(thtat(ii:91)))./(n2.*sin(t
(thtat(ii:91)))).^2;
T1(ii:91)=(4*n1*n2.*sin(thtai(ii:91)).*sin(thtat(ii:91)))./(n1.*sin(
(thtat(ii:91))).^2;
T2(ii:91)=(4*n1*n2.*sin(thtai(ii:91)).*sin(thtat(ii:91)))./(n2.*sin(
(thtat(ii:91))).^2;
whitebg('white')
figure(2)
plot(thtaid,R1,'k',thtaid,T1,'k');
grid
xlabel('Angle (Degree)');
ylabel('Coefficient');
gtext('Parallel Reflection Coefficient')
gtext('Parallel Transmit Coefficient')
whitebg('white')
figure(3)
plot(thtaid,R2,'k',thtaid,T2,'k');
grid
xlabel('Angle (Degree)');
ylabel('Coefficient');
gtext('Perpendicular Reflection Coefficient')
gtext('Perpendicular Transmit Coefficient')
d=[3:50];
l1=0.32*39.37/12;
l2=0.12*39.37/12;
l3=0.052*39.37/12;
lu=0.5;
ll=3;
data1=[3.5 6; 3.5 14; 3.9 12; 5 11; 5 19; 5 24; 7 15; 7.3 13; 7.3 17
7.3 24; 7.3 27; 7.5 20; 7.5 18; 8.2 21; 8.2 27; 9.0 18; 9.0 28; 9.0
10 20; 10 26; 12 32; 12 35];
data2=[2.3 6; 2.3 12; 3.1 7; 3.1 11; 3.5 13; 4 12; 4 19; 4 24; 5 8;
5 12; 5 15; 5 21; 6 20; 7 16; 7 29; 8 22; 8 32; 9 25; 9 28; 10 24;
10 30; 13 23; 13 26; 13 27; 13 33; 13 39];
whitebg('white')
figure(1)
provptu=10*log10(l1^2/16/pi^2/lu./d.^2);
provpt=10*log10(l1^2/16/pi^2./d.^2);
provptl=10*log10(l1^2/16/pi^2/ll./d.^2);
plot(d,provptu,'k',d,provpt,'k',d,provptl,'k');
grid
xlabel('Distance (ft)')
ylabel('Attenuation (dB)')
whitebg('white')
figure(2)
provptu=10*log10(l2^2/16/pi^2/lu./d.^2);
provpt=10*log10(l2^2/16/pi^2./d.^2);
provptl=10*log10(l2^2/16/pi^2/ll./d.^2);
plot(d,provptu,'k',d,provpt,'k',d,provptl,'k',data1(:,1)*39.37/12,-d
grid
xlabel('Distance (ft)')
ylabel('Attenuation (dB)')
whitebg('white')
figure(3)
provptu=10*log10(l3^2/16/pi^2/lu./d.^2);
provpt=10*log10(l3^2/16/pi^2./d.^2);
provptl=10*log10(l3^2/16/pi^2/ll./d.^2);
plot(d,provptu,'k',d,provpt,'k',d,provptl,'k',data2(:,1)*39.37/12,-d
grid
xlabel('Distance (ft)')
ylabel('Attenuation (dB)')
for j=1:20
ModelType='OBS';
%Separation distance Eexpressed in meet
Dn=5;
switch ModelType
% For line-of-sight
case 'LOS'
% Probability of receiving a multipath
for i=1:14
PTk(i)=1-i*7.8/367;
end
for i=15:25
PTk(i)=0.65-(i*7.8-110)/360;
end
for i=26:64
PTk(i)=0.22-(i*7.8-200)/1360;
end
% Delay related path loss exponent
for i=1:2
nTk(i)=2.5+i*7.8/39;
end
for i=3:32
nTk(i)=3+(i*7.8-15.6)/380;
end
for i=33:64
nTk(i)=3.6;
end
% Mean
mean1=10*nTk*log10(Dn/2.3);
% Standard Deviation
std1=4;
case 'OBS'
% Probability of receiving a multipath
for i=1:12
PTk(i)=0.55+i*7.8/667;
end
for i=13:64
PTk(i)=0.08+0.62*exp(-(i*7.8-100)/75);
end
% Delay related path loss exponent
for i=1:39
nTk(i)=3.65+i*7.8/536;
end
for i=40:64
nTk(i)=4.23;
end
% Mean
mean1=10*nTk*log10(Dn/2.3);
% Standard Deviation
std1=5;
otherwise
end
OcTk=ceil(PTk-rand(1,64));
Ak1=zeros(1,64);
Ak0=rand(1,64)*std1+mean1;
for i=1:64
if OcTk(i)==1
Ak1(i)=Ak0(i);
end
end
ak1=zeros(1,64);
for i=1:64
if OcTk(i)==1
ak1(i)=10^(-Ak1(i)/20);
end
end
plot([1:64],ak1/max(ak1),'k')
aak1(j,:)=ak1;
end
mesh(aak1/max(aak1(:,1)))
view(30,30)
xlabel('Excess Delay (ns)')
ylabel('Channel Index')
zlabel('Relative Magnitude')
ModelType='LOS';
%Separation distance Eexpressed in meet
Dn=5;
switch ModelType
% For line-of-sight
case 'LOS'
% Probability of receiving a multipath
for i=1:14
PTk(i)=1-i*7.8/367;
end
for i=15:25
PTk(i)=0.65-(i*7.8-110)/360;
end
for i=26:64
PTk(i)=0.22-(i*7.8-200)/1360;
end
% Delay related path loss exponent
for i=1:2
nTk(i)=2.5+i*7.8/39;
end
for i=3:32
nTk(i)=3+(i*7.8-15.6)/380;
end
for i=33:64
nTk(i)=3.6;
end
% Mean
mean1=10*nTk*log10(Dn/2.3);
% Standard Deviation
std1=4;
case 'OBS'
% Probability of receiving a multipath
for i=1:12
PTk(i)=0.55+i*7.8/667;
end
for i=13:64
PTk(i)=0.08+0.62*exp(-(i*7.8-100)/75);
end
% Delay related path loss exponent
for i=1:39
nTk(i)=3.65+i*7.8/536;
end
for i=40:64
nTk(i)=4.23;
end
% Mean
mean1=10*nTk*log10(Dn/2.3);
% Standard Deviation
std1=5;
otherwise
end
OcTk=ceil(PTk-rand(1,64));
Ak1=zeros(1,64);
Ak0=rand(1,64)*std1+mean1;
for i=1:64
if OcTk(i)==1
Ak1(i)=Ak0(i);
end
end
ak1=zeros(1,64);
for i=1:64
if OcTk(i)==1
ak1(i)=10^(-Ak1(i)/20);
end
end
figure(1)
plot([1:64],ak1/max(ak1),'k')
xlabel('Excess Delay (ns)')
ylabel('Channel Index')
%raised cosie pulse
alp=0.15;
xt=[-385:385]/64;
gt=sin(pi*xt)./(pi.*xt).*cos(alp.*pi.*xt)./(1-(2.*alp.*xt).^2);
gt(386)=1;
figure(2)
plot(xt,gt)
gtchnl=zeros(1,834);
for i=1:64
gtchnl(i:i+770)=ak1(i).*cos(2*pi*2.4e9*(i-1)*7.8e-9)*gt+gtchnl(i:
end
figure(3)
plot(gtchnl)
maxgtchnl=max(gtchnl);
mingtchnl=min(gtchnl);
if maxgtchnl>-mingtchnl
gtchnl=gtchnl/maxgtchnl;
else
gtchnl=gtchnl/mingtchnl;
end
for i=1:834
if gtchnl(i)==1;
maxj=i;
end
end
xtgtchnl=([1:834]-maxj)/64;
figure(4)
plot(xt,gt,'k',xtgtchnl,gtchnl,'k')
grid
xlabel('Symbol Interval')
ylabel('Magnitude')
5.8 References
1. www.fcc.gov/wtb/
5. A. A.M. Saleh and R. A. Valenzuela, "A statistical model for indoor multipath
propagation," IEEE Journal on Selected Areas in Communication, vol. SAC-5,
no. 2, pp. 128137, February 1987.
Chapter 6. Ethernet
Ethernet will play a very important role in home networking. It can be directly
installed within a room with a bunch of twisted pair patch cables or in a house
with home run wired Category 5 twisted pair cables. Furthermore, other
existing wiringbased home networking systems are also based on the Ethernet
frame format and the Media Access and Control protocol. Operation principles
of wireless Ethernet and its home networking variations are very close to that
of the original Ethernet. The concept of Ethernet was originated by Bob
Metcalfe and his Xerox PARC colleagues in late 1972 to interconnect personal
workstations. Their first experimental network was called the Alto Aloha
Network. In 1973, Metcalfe changed the name to Ethernet, to make it clear
that the system could support any computer and to point out that his new
network mechanisms had evolved well beyond the Aloha system. He chose to
base the name on the word "ether" as a way of describing an essential feature
of the system: the physical medium (i.e., a cable) carries bits to all stations,
much the same way that the old luminiferous ether was once thought to
propagate electromagnetic waves through space.
After some refinement, the second generation called Ethernet II was widely
used. Ethernet from this period is often called DIX after its corporate sponsors
Digital, Intel, and Xerox. As the holder of the trademark, Xerox established
and published the original standards for a coaxial cablebased Ethernet in 1980.
The Institute of Electrical and Electronics Engineers (IEEE) was assigned the
task of developing formal international standards for all Local Area Network
technology. It formed the "802" committee to look at Ethernet, Token Ring,
Fiber Optic, and other LAN technology. The thick coaxial media system was the
first media system specified in the IEEE Ethernet, CSMA/CD, standard of 1985.
The thick coaxial cablebased Ethernet is also called 10Base5 and can carry a
transmission data rate of 10 Mbps. 10Base5 uses relatively inflexible coaxial
cable with a diameter of 1 centimeter. A thin coaxial cable version of Ethernet,
named 10Base2, was subsequently developed in 1987. The diameter of a thin
coaxial cable is 0.5 centimeter (cm). This thin coaxial cable is also known as
RG-58 and has an impedance of 50 ohms. In comparison, coaxial TV cables are
either RG-6 or RG-59 and have an impedance of 75 ohms.
10Base5 and 10Base2 have maximum transmission distances of 500 and 185
m, respectively. Although 10Base2 coaxial cables are relatively flexible, they
are still not as easy to handle as twisted pair cables. The IEEE standards for a
twisted pair version of Ethernet, known as 10BaseT, was released during 1990.
10BaseT has a transmission data rate of 10 Mbps over two pairs of Category 3
or Category 5 twisted pair cable. Multiple pairs, 2 or 4, are usually included in
a Category 3 or Category 5 twisted pair cable. Twisted pairbased Ethernet has
a star topology with an active hub at the center in contrast to the bus topology
of coaxial cablebased Ethernet. The first 100-Mbps version of twisted pairbased
Ethernet, known as 100BaseTX, was standardized during 1995. 100BaseTX
utilizes two out of four pairs of a Category 5 twisted pair cable. Another
version of 100-Mbps Ethernet using all four pairs of a Category 3 twisted pair
cable was also standardized during 1995 and known as 100BaseT4. A 100-
Mbps Ethernet using only two pairs of a Category 3 twisted pair cable was
standardized during 1997 and known as 100BaseT2. The 1000-Mbps Ethernet
using all four pairs of a Category 5 cable was standardized during 1999 and
known as 1000BaseT. Today most sites use twisted pair media for Ethernet
connections to the desktop.
We start this chapter with frame structure and MAC protocol, which are
common features for all versions of Ethernet. We then look into each twisted
pairbased Ethernet version individually in the sequence of 10BaseT,
100BaseT4, 100BaseTX, and 100BaseT2. The discussion of 1000BaseT is
postponed as a future topic. For each version, we highlight features of the
standards, examine its typical transceiver structure, and study corresponding
transmission performance. Other common features known as autonegotiation
and Media Independent Interface are also discussed.
6.1 Media Access and Control Protocol
Figure 6.1 shows the format of an Ethernet frame as defined in the original
IEEE 802.3 standard. An Ethernet frame starts with a preamble and ends with
a Frame Check Sequence (FCS).
FCS stands for Frame Check Sequence and contains a 4-byte Cyclical
Redundancy Check value used for error checking. When a source station
assembles a frame, it performs a CRC calculation on all the bits in the frame
from the Destination Address through the Pad fields (that is, all fields except
the Preamble, SFD, and FCS). The source station stores the value in this field
and transmits it as part of the frame. When the frame is received by the
destination station, it performs an identical check. If the calculated value does
not match the value in this field, the destination station assumes that an error
has occurred during transmission and discards the frame.
Equation 6.1
Relying on this polynomial, the CRC values are generated with the following
procedure.
Since we are only interested in the remainder, the operation of CRC can be
implemented on the binary format frame with the following procedure:
Exclusive OR the first 33 bits of the frame with the G(x) binary sequence of
100000100110000010001110110110111.
Throw away zeros to the left of the first one (counting from left) and
combine the remainder binary sequence with the rest of the frame (the frame
before Step 2 minus 33 bits) to form a reduced length frame.
If the number of bits for the new frame is larger than or equal to 33, start
from Step 2 again.
Fill zeros at left side to make the remainder a 32-bit binary sequence, and
complement this sequence for the CRC.
Equation 6.2
Because of collision, the average number of packets to be transmitted from
each station becomes l' > l. The traffic intensity with collision can be
expressed by
Equation 6.3
Equation 6.4
We can find that the maximum traffic intensity is about 0.184 of the available
transmission throughput as far as each newly generated packet is concerned.
Equation 6.5
We can find that the maximum traffic intensity is about 0.368 of the available
transmission throughput as far as each newly generated packet is concerned.
Compared with the Aloha protocol, synchronization is required among all
stations. The preceding expressions only show the general behaviors of these
two protocols. Detailed studies can be conducted with computer simulation. We
can write a computer simulation program with the following inputs: number of
stations, physical transmission throughput, average length of packets, and
average packet arrival rate. With additional specifications of protocol type and
simulation running time, we can observe simulation results of number of
collisions, actual transmission throughput, and transmission delay under
different input values. Figure 6.2 shows simulated results against analytical
expressions for the Aloha protocol on the left and the Slotted Aloha on the
right. The efficiency of the Aloha tends to improve when the random waiting
time window is expanded.
The CSMA/CD protocol is similar to those of Aloha and Slotted Aloha in that
both will back off and retransmit if a collision is detected. However, details are
quite different. CSMA/CD does not follow a synchronized slot time to start
transmission. On the other hand, a slot time of 512 bits is defined as the
minimum size of an Ethernet frame for transmission throughputs of 10 and
100 Mbps. The slot time is 4096 bits for Gigabit Ethernet. The size of the slot
time is designed such that collisions can be detected between stations located
furthest away at opposite ends of the transmission medium. The carrier sense
before transmission made the CSMA/CD an efficient random access protocol
because it could avoid some avoidable collisions and end a transmission almost
right after it detects a collision. In addition, the backoff procedure of Ethernet
also reduces the chance of repeated collisions. The backoff algorithm
implemented in Ethernet is known as truncated binary exponential backoff.
Following a collision, each station generates a random number that falls within
a specified range of values. It then waits that number of slot times before
attempting retransmission. The range of values increases exponentially after
each failed retransmission.
Equation 6.6
This shows that the transmission efficiency of the CSMA/CD protocol is
dependent on the packet length for a given network topology. For an average
packet size of 800 bytes or 6400 bits and a transmission delay of 200 bits, the
transmission efficiency is 0.832. When the average packet length decreases to
200 bytes or 1600 bits, the transmission efficiency becomes 0.383. Expression
6.6 shows the general behavior of the CSMA/CD protocols. Detailed studies
can also be conducted with computer simulation. Figure 6.3 shows some
simulated Ethernet traffic efficiency results obtained using the MATLAB
program attached at the end of this chapter. In this simulation, collision can be
detected after one simulation iteration which is about 1000 bits. The
transmission delay is therefore t = 500 bits, a = 500/800 = 0.0625, and the
transmission efficiency is S < 1(1 + 6.44a) = 0.713.
Since ports of a hub are not physically connected to each other, traffic between
different transceivers can be intelligently controlled. Collisions can be avoided
if messages from different ports to the same destination port can be queued
and multiple connections can be established simultaneously between pairs of
transceivers. This leads to the general idea of a switched hub. There is no
standard regulating the detailed architecture of a switched hub. If
implemented properly, a switched hub should be able to talk to conventional
twisted pairbased Ethernet transceivers and make a significant improvement in
transmission efficiency. A switched hub can make the transmission efficiency
close to 1 on each individual port and larger than 1 in the aggregate.
6.2 10BaseT
For a cable with striped wires, wires sharing the same color form a pair. It is
interesting to note that wires of the orange pair for Type A and of the green
pair for Type B are not connected to adjacent pins. This design allows the
wiring to be shared with a telephone connection where the center two pins are
normally utilized and the RJ-11 plug can be inserted into an RJ-45 wall
connector. When RJ-45 connectors at both ends of a twisted pair cable are
connected to colored wires according to the same convention, Type A or Type
B, a straight through cable is created. When two different types of conventions
are applied at different ends of a twisted pair cable, it becomes a crossover
cable.
All 10BaseT connections are point-to-point. This implies that a 10BaseT cable
can have a maximum of two Ethernet transceivers, with one at each end of the
cable. One end of the cable is typically attached to a 10BaseT hub. The other
end is attached directly to a computer station's Network Interface Card. These
point-to-point cable connections of 10BaseT result in a star network topology,
which consists of a central hub and many radiated NICs. Straight through
cables are used to connect a NIC to the hub. An embedded crossover function
is implied inside the hub to match the transmitter of a NIC to a receiver of the
hub and vice versa (Figure 6.5). Two 10BaseT NICs may be directly attached to
each other without a hub using a crossover cable (Figure 6.6). The
independent transmit and receive paths of the 10BaseT allow the full-duplex
mode of operation to be optionally supported. The full-duplex mode can
effectively double the transmission throughput over that particular connection.
To support full-duplex mode, both the NIC and the hub must be capable of, and
be configured for, full-duplex operation.
By defining proper ABCD matrices for different sections of this circuit and after
several steps of parallel and serial two-port network combination, the insertion
loss of this model is shown in Figure 6.8 together with that obtained according
to the propagation model of Chapter 2. Insertion losses are about 9.5 and 15
dB at frequencies of 10 and 20 MHz, respectively.
Equation 6.7
Equation 6.8
The frequency is measured in megahertz. Equations 6.7 and 6.8 are for
Category 3 cables with 25 and 4 pairs, respectively. Figure 6.9 shows the
crosstalk coupling losses corresponding to these expressions as well as one, in
the middle, according to the NEXT model of Chapter 2 with 25 disturbers. The
specified Category 3 cable crosstalk loss is around 26 and 30 dB at 10 MHz for
25 and 4 pairs, respectively. Although there exists only 1 crosstalk pair in a
practical 10BaseT setting, multiple-pair crosstalk models can be used for a
better transceiver design. The four-pair crosstalk model has less crosstalk loss
and, therefore, produces more crosstalk noises. It has been chosen for
following 10BaseT transmission simulation studies.
Figure 6.9. Worst Case NEXT Insertion Loss
Information bits are converted to signal levels applied to the twisted pair using
the Manchester encoding where a 0 bit is represented by a positive to negative
transition and a 1 bit is represented by a negative to positive transition as
shown in Figure 6.10. This encoding process can be implemented by switching
between two opposite phases of a bit-rate clock that alters between positive
and negative amplitude during each bit interval.
The differential voltage level across two wires of a twisted pair with a nominal
impedance of 100 ohms is specified to be between 2.2 and 2.8 volts (V). The
transmit power is therefore between 48.4 and 78.4 milliwatts (mW) or
between 17 and 19 dBm. The normalized Power Spectrum Density of a
Manchester encoded signal can be described by
Equation 6.9
where T is the duration of a bit interval. Figure 6.11 shows the PSD of this
Manchester encoded signal at 10 Mbps based on a signal level of 2.8 V on an
impedance of 100 ohms. This PSD is obtained by multiplying the normalized
PSD for Manchester encoding with the power factor of P = V2/R = 2.82/100 =
0.0784.
In Figure 6.16, shift registers are used in the transmitter as well as in the
receiver to get in and send out information bits. The clock in the transmitter
on the left side of the block diagram drives the shift register, and its two
phases are inputs to the multiplexer switch. The information bits coming out of
the shift register determine which clock phase to be used as the transmit
signal. The phase-locked loop recovers the 10-MHz clock in the receiver. The
received signal and the recovered clock as well as its opposite phase are used
by a pair of phase detectors. Outputs of phase detectors are compared to
determine the correct phase of the received signal. The phase-locked loop
should be designed to be invariant to the frequent 180 phase shift of the
received signal while recovering a stable 10-MHz clock. Additional important
functions are also required in a real implementation of a 10BaseT transceiver.
Collision detection and link integrity tests are partially implemented in the
transceiver physical layer as well. Additional details of an example
implementation of a 10BaseT transceiver can be found in the data sheet of the
National Semiconductor's DP83907 chip [2].
Equation 6.10
At about 60 Mbps, the channel capacity is about six times the throughput of
the 10BaseT transmission protocol.
Figure 6.20 shows the structure of this model 10BaseT transmitter. The
Manchester encoding is accomplished with a 10-MHz clock signal and a phase
modulator. The original or the opposite phase of a 10-MHz clock is selected
depending on the input data sequence through a switch multiplexer. The
original phase is selected if the data bit is one, and the opposite phase is
selected otherwise. The phase-modulated clock, with zero and positive levels,
is then converted into positive, +1, and negative, 1, levels. This signal is
passed through an eighth-order Butterworth low-pass filter with a corner
frequency of 15 MHz before entering the transmission channel.
Figure 6.21 shows the structure of this model 10BaseT receiver. It consists of a
Costas Phase-Locked Loop (PLL) with the received signal as its input and a
recovered clock and its 90° phase-delayed version as outputs, a phase
comparator, and a sample-and-hold device. The phase comparator compares
the input signal and its negated version with the recovered clock and
generates corresponding zeros and ones as recovered data bits. The glitches at
phase transitions are effectively removed by the sample-and-hold device
driven by the 90o phase-delayed clock.
Figure 6.21. 10BaseT Receiver Simulink Model
Figure 6.22 shows the structure of the Costas PLL for the clock recovery. The
amplitude-adjusted received signal is multiplied by the sine and cosine phases
of a local clock signal generated from a VCO (Voltage-Controlled Oscillator)
individually. Voltages dependent only on phase differences are derived after
loop filters of second-order Butterworth low-pass type with corner frequencies
at 796 kHz. The effect of the received signal polarity is void in the product of
these two phase differences. Therefore, this Costas PLL is blind to the frequent
180° phase reversal in the received signal. When the phase of the VCO is
lagging behind that of the received signal, a positive voltage is generated and
applied to the VCO to raise the frequency slightly, therefore eliminating the
phase difference.
Equation 6.12
All four twisted pairs of a Category 3 cable are occupied by 100BaseT4. Among
these four pairs, one is always used for transmitting, another one is always
used for receiving, and the remaining two are used for either activity,
depending on the data traffic direction. The 100-Mbps transmission throughput
is equally divided among three transmitting pairs. Each byte (8 bits) group of
binary information bits on one twisted pair is further converted into a group of
six ternary symbols of three possible values: 1, 0, and +1. The symbol baud
rate on each twisted pair is therefore 100/3 x 6/8 = 25 MHz. The always
transmitting pair is connected to pin #1 and pin #2 and the always receiving
pair is connected to pin #3 and pin #6 on an RJ-45 connector for a 100BaseT4
NIC as shown in Figure 6.24. These transmitting and receiving pair pin
positions are consistent with those of 10BaseT; therefore, the autonegotiation
procedure can be carried out without signaling conflict. Two 100BaseT4 NICs
can also be connected directly with a crossover cable as defined in Figure 6.25.
Equation 6.13
Equation 6.14
NEXT models are defined as 24.5 and 21.4 dB at 12.5 MHz for single- and
multiple-pair disturbers by Equations 6.15 and 6.16, respectively.
Equation 6.15
Equation 6.16
The 15-dB/decade three-pair crosstalk model with a loss of 21.4 dB at 12.5
MHz is approximated with an RLC network using the basic sectional structure
of the circuit channel model. Figure 6.29 shows the insertion loss of this RLC
network as well as that of the 15-dB/decade model. Loss differences are less
than 0.5 dB in the frequency range of 130 MHz. This circuit multiple pair NEXT
model can also be described by a fractional polynomial in complex frequency,
s, domain as
Equation 6.17
The mapping between a byte and a group of six ternary symbols is specified in
the Appendix of the IEEE standard and is repeated in Table 6.3 here for
convenience. It is worth noting that the coding table is not zero balanced
because there is a positive bias if you add all ternary groups together. To be
exact, there are 122 ternary groups of symbols with 1 net positive pulse when
positive and negative pulses within a symbol are compared. The DC balance on
the twisted pair is maintained by the DC balance algorithm built into the
transmitter. A bit is reserved to monitor the accumulation of DC balance. The
bit is set to zero at the beginning. If the bit is zero while a positive biased
ternary group is encountered, the bit is set to 1, and the ternary code is
transmitted. However, if the bit is one when a positive biased ternary group is
encountered, the bit is reset to zero, and every ternary symbol of this group is
negated and then transmitted. The negated group of ternary symbols can be
revised in the receiver since only groups of ternary symbols with zero or
positive bias are defined.
Normalized transmit pulse masks are defined in the standards for two
examples of a zero-separated positive and negative pulse sequence and an
adjacent positive and negative pulse sequence as shown by Figures 6.30 and
6.31. In Figure 6.30, the positive and negative pulses are separated by five
zeros. Each pulse can be formulated with a 100% excessive bandwidth raised
cosine filter followed by a third-order low-pass Butterworth filter with a corner
frequency of 25 MHz. Figure 6.32 shows the PSD of the 100BaseT4 signal with
filters in comparison with that formed by rectangle pulses. These filters
significantly reduce the energy level at above 25 MHz.
Data nibbles (4 bits) from the MII interface are recombined into three
sequences of bytes and evenly distributed among three twisted pairs for
transmission according to frame structures as shown in Figure 6.33. Preambles
are initiated after data nibbles become available and are inserted before data
ternary symbols. Depending on a particularly identified twisted pair, a
preamble contains a combination of groups of P3, P4, SOSA, or SOSB ternary
symbols. P3 consists of a pair of adjacent positive and negative ternary pulses.
P4 consists of two adjacent P3s for a total of four ternary pulses. SOSA is a
sequence of three P3s for a total of six ternary pulses. SOSB consists of a P4
followed by a negated P3 also for a total of six ternary symbols. At the
transmitter side, data ternary symbols appear on the BI_D4 twisted pair first,
on the TX_D1 pair next, and on the BI_D3 pair last. Data symbol group
latencies are two ternary symbols apart from one pair to the next. The
preamble on the BI_D4 pair consists of a P4, a SOSA, and a SOSB in sequence
and lasts 16 ternary symbols. The preamble on the TX_D1 pair consists of two
SOSAs and one SOSB and lasts 18 ternary symbols. The preamble on the
BI_D3 pair consists of a P3, two SOSAs, and a SOSB in sequence and lasts 20
ternary symbols.
Groups of End of Packets (EOP) ternary symbols are appended at the end of
data ternary symbols at each of these three transmitting twisted pairs. The
pair with the last group of data ternary symbols is appended with an EOP_3
consisting of two positive ternary symbols followed by two negative ternary
symbols (and followed by two zeros) or [+1 +1 1 1 0 0]. The pair with the
next-to-the-last group of data ternary symbols is appended with EOP_2 ([+1
+1 +1 +1 1 1]) and EOP_5 ([1 1 0 0 0 0]). The remaining pair is appended
with EOP_1 ([+1 +1 +1 +1 +1 +1]) and EOP_4 ([1 1 1 1 1 1]). The last group
of data ternary symbols could be at any of these three transmitting twisted
pairs depending on the length of data from MII.
6.3.2 100BaseT4 Transceiver Structure and Performance
Estimation
Based on these receiver front-end SNRs, the channel capacity for the
100BaseT4 transmission environment is found using
Equation 6.18
At about 108 Mbps, the channel capacity is about 3.3 times the throughput of
the 100BaseT4 transmission protocol.
Figure 6.38 shows the internal structure of the Simulink model transmitter.
The data are separated byte-by-byte into three streams. The separated data
stream is passed through an 8B6T encoder consisting of a lookup translation
table. The line voltage is produced by driving the combination of a 100%
excessive bandwidth raised cosine and a third-order Butterworth low-pass
filter with these ternary symbols.
Equation 6.19
With the 4B5B encoding, every 4 bits of information are converted into a 5-bit
code resulting in an effective bit rate of 125 Mbps over the transmission
media. 100BaseTX uses a higher grade unshielded twisted pair cable of
Category 5 instead of the Category 3 cable used by 10BaseT and 100BaseT4.
The Category 5 cable is rated for transmission at frequencies up to 100 MHz,
while the Category 3 cable is rated for only 16 MHz. In other words, Category
5 cable has less attenuation and crosstalk. On the other hand, signaling at a
rate of 125 Mbps requires adaptive channel equalization to compensate for
intersymbol interferences caused by amplitude and phase distortions of twisted
pair cables of different lengths. The adaptive channel equalization for
100BaseTX transceiver can be implemented in either analog or digital circuits.
The digital adaptive channel equalizer performs better but demands a high-
speed Analog-to-Digital Convertor (ADC) and digital circuits.
The 4B5B encoding table is defined in the 100BaseX part of the Ethernet
standards and appears here as Table 6.4 for your convenience.
There are a few groups of 4B5B codes. The first is the data group of 16 codes
that maps any combination of 4 bits to a unique 5-bit code. As far as this
group is concerned, the code utilization is 80%. The second is the code group
for control purposes that includes character representation of J, K, T, and R.
Enough transitions are chosen for the selection of these two code groups to
ensure clock recovery in cases when scrambling is not used. The last group is a
collection of idle, dead, and error (represented by the character H). Besides
other details, the 100BaseX also defines the MAC encapsulation frame. The
encapsulation simply adds an SSD (Start-of-Stream Delimitor) and an ESD
(End-of-Stream Delimiter) at the beginning and at the end of each MAC frame.
The SSD consists of characters of J and K and the ESD consists of characters of
T and R.
Note that there is no DC balance issue for these 5-bit codes because the MLT-3
encoder will use these codes to drive the line to the +1, 0, or 1 signal level.
Each "1" bit in these codes will cause a signal-level transition, and transitions
are made in the sequence of ..., 0, +1, 0, 1, 0, +1, . . . . The 100BaseTX
standards specify that the transmit and receive pairs should be connected in
the same fashion as those defined for 10BaseT. In other words, the transmit
pair is connected to pins 1 and 2 and the receive pair is connected to pins 3
and 6 of an RJ45 connector for a conventional NIC card. Similar rules of
10BaseT for crossover cable and hub side connection also apply.
Equation 6.20
Equation 6.21
Equation 6.23
Equation 6.24
Equation 6.25
Digital adaptive channel equalization techniques have been used for most
current versions of 100BaseTX transceivers. An ADC is used to sample the
received signal at the bit rate of 125 MHz. The length of a digital adaptive
equalizer is related to the duration of the longest Category 5 twisted pair cable
channel impulse response. Figure 6.49 shows the impulse response of a typical
long Category 5 twisted pair cable. The channel delay to the beginning of the
impulse response is about 400 ns. We mark the peak of the impulse response
as the cursor. The precursor duration (from the beginning to the cursor) of the
channel impulse response is then about 100 ns, or 12 samples, and the
postcursor duration (from the cursor to the end of the impulse response) is
about 400 ns, or 50 samples. The length of a digital channel equalizer is then
about 62 taps. Among them, 12 can be feedforward filter taps, and 50,
feedback filter taps.
Figure 6.50 shows the structure of a decision feedback channel equalizer. The
received signal is first sampled by the A/D convertor and sent to the
feedforward as its input. Past decisions are sent to the feedback filter as its
input. The feedforward filter compensates for reflections in the precursor, while
the feedback filter cancels the postcursor based on previous decisions.
Feedforward and feedback filter coefficients are adjusted adaptively according
to
Equation 6.26
Figure 6.50. The Structure of an Adaptive Decision Feedback
Channel Equalizer
Equation 6.27
The timing recovery is a very important part along with the channel
equalization. Not just the operation of the equalizer needs to be in
synchronization with the baud rate of the received signal, but the sampling
phase should also be selected to optimize equalization performance. A
traditional analog phaselocked loop can be used in conjunction with digital
equalization, but some baud ratebased digital timing recovery circuits are
preferred. Timing information can be recovered from the equalizer output with
reference to corresponding signal levels [4]. A digital phaselocked loop can
then be used to refine the recovered clock signal.
The MLT-3 seems like a DC balanced line code except that there is still a slight
probability that it can stay at the +1 or 1 level for a long duration. This might
occur for a sequence whose scrambled version consists of a long sequence of
zeros; therefore, the MLT-3 encoded line voltage will stay at one level during
that duration. Since a line transformer is used to couple the transceiver circuit
to the twisted pair cable, low-frequency components caused by long zero
sequences experience more attenuation. Effectively, a long-lasting +1 or 1
sequence tends to lose its amplitude toward zero. DC wandering compensation
circuits are utilized in some transceiver implementations to avoid this problem.
Equation 6.28
At about 500 Mbps, the channel capacity is about four times the throughput of
the 100BaseTX transmission protocol.
Figure 6.54 shows that the internal structure of the Simulink model
transmitter consists of a 4B5B encoder and an MLT-3 encoder. Since the
simulation is carried out at a sampling rate of 125 MHz, the rise and fall time
filter is omitted. The scrambler and descrambler are also omitted for simplicity.
Figure 6.55 shows the internal structure of the model 4B5B encoder. The serial
data stream is converted into 4-bit parallel. Each 4-bit group is used as the
input to the 4B5B encoding lookup table. The 5-bit parallel output from the
table is reconverted to serial stream.
Figure 6.56 shows the internal structure of the model MLT-3 encoder. The 125-
MHz clock is masked by the input data. In other words, only input 1's result-
to-output signal level changes. Every 125-MHz clock pulse will cause the first
D flip-flop on the left to change its output from a 0 to a 1 and vice versa. Using
the output of the first D flip-flop as its CLK input, the second D flip-flop
changes its output from a 0 to a 1 and vice versa for every two 125-MHz clock
pulses. Meanwhile the output of the second D flip-flop determines the sign of
the MLT-3 encoder output. A zero output from the second D flip-flop negates
the output of the first D flip-flop.
Figure 6.58 shows the internal structure of the Simulink model receiver
consisting of an adaptive channel equalizer and an MLT-3 decoder. The 4B5B
decoder can also be implemented using a lookup table with a structure similar
to that of the 4B5B encoder and is omitted because the implementation of bit
group synchronization can be quite involved. Also because of the 125-MHz
sampling rate simulation, the function of a digital timing recovery circuit is not
included in this Simulink simulation model.
Figure 6.58. Receiver Model
Figure 6.59 shows the internal structure of the adaptive equalizer consisting of
a feedforward filter and a feedback filter. A received signal detector is used to
activate the adaptation process. There is no training sequence defined in the
100BaseTX standards. The equalizer can be converged during the idle time
based on the principle of blind equalization [5] because only three output
levels are involved. The convergence can be further assured by preloading
some filter coefficients representing some typical Category 5 twisted pair
channels.
Figure 6.60 shows the internal structure of the MLT-3 decoder model. The
decoder simply generates a 1 bit if two consecutive inputs are not equal and a
0 bit otherwise.
Meanwhile, the sign block S converts 0's and 1's of pseudo-random sequences
of an and bn to +1's and 1's respectively. Because of this sign-scrambling
process involving an, S, and the multiplier for line A, the final line signal
consists of 2, 1, 0, +1, and +2 levels, while the occurrence probability of 2 or
+2 level is only a half of those for 1, 0, or +1 level. The same sign-scrambling
process involving bn, S, and another multiplier also applies to line B. A 5 by 5
square constellation is thus obtained with a nonuniform distribution of
occurrences as shown in Figure 6.62.
All random sequences used for bit/sign scrambling are from a single pseudo-
random sequence generator of length 233 1 = 8,589,934,591. The random
sequence of the master transmitter is generated according to
Equation 6.29
Equation 6.30
As shown in Figure 6.65, random sequences an and bn are directly from the
same pseudo-random sequence generator. Specifically, we have
Equation 6.31
Equation 6.32
San and Sbn are a swapped version of Xn and Yn. San equals Xn and Sbn equals
Ynwhen sn is 1, and San equals Yn and Sbn equals Xn when sn is 0. sn itself is the
current output of the the same pseudo-random sequence generator (i.e., sn =
s[n]). Values of Xn and Yn are dependent on random sequences of xn and yn as
well as the odd/even sequence index according to Tables 6.5 and 6.6. The
values in Table 6.5 apply when the local receiver is ready. Only values defined
for the even index are used otherwise. The values in Table 6.6 apply all the
time despite the readiness of the receiver. xn and yn are also obtained from the
same pseudo-random sequence generator according to
Equation 6.33
Equation 6.34
If mapped directly without Exclusive OR operations with data bits, TXDn(0),
TXDn(1), TXDn(2), TXDn(3), and Xn generate signal levels of 1 and +1, and Yn
generates signal levels of 0 and 2. This characteristic leads to the interesting
idle constellation shown in Figure 6.66 when data bits are all zeros and with
the additional help of random swapping between Xn and Yn according to the
value of sn. Between data and idle transmissions, the beginning of a data
stream is marked by the Start-of-Stream Delimiter, and the end of a data
stream is marked by the End-of-Stream Delimiter. Both SSD and ESD last two
symbols and consist of line levels of An = ±2, Bn = ±2, An+1 = ±2, and Bn+1 =
0.
xn k Xn
0 even [1,0]
0 odd [0,1]
1 even [0,1]
1 odd [1,0]
0 even [0,0]
0 odd [1,1]
1 even [1,1]
1 odd [0,0]
The Category 3 twisted pair cable channel model defined by the 100BaseT2
standards is given in the frequency domain by
Equation 6.35
Equation 6.36
Equation 6.37
Equation 6.38
Assuming the effect of NEXT can be minimized using the digital cancellation
technique, the FEXT noise will then dominate the performance of a 100BaseT2
transmission system. Since the transmitted data sequence is not readily
available at the receiver end, the FEXT cancellation is not as easy to
implement and not recommended in the 100BaseT2 standards.
FEXT coupling loss for a 100-m Category 3 twisted pair cable is defined for a
single disturber by an attenuation of 20.9 dB at 16 MHz and a slope of 20
dB/decade as shown in
Equation 6.39
Equation 6.40
The 100BaseT2 standards specify that the same two pairs of a four-pair
Category 3 cable should be connected for transmission as those defined for
10BaseT. In other words, one pair is connected to pins 1 and 2 and the other
pair is connected to pins 3 and 6 of an RJ45 connector for a conventional NIC
card. During autonegotiation, the transmit is connected to the pair of pins 1
and 2 and the receive is connected to the pair of pins 3 and 6. Similar rules of
10BaseT for crossover cable and hub side connection also apply.
Equation 6.41
At about 156 Mbps, the channel capacity is about three times the throughput
of the 100BaseT2 transmission protocol because each pair carries half of the
traffic.
Figure 6.77 shows the internal structure of the Simulink model transmitter
consisting of a binary to four-level mapper, a sign scrambling function using a
random sequence generator, a unit negative gain, a switch, a transmit filter
function with an interpolation filter, a FIR filter, and a third-order Butterworth
low-pass antialiasing filter.
Figure 6.78 shows the internal structure of the bit to four-level mapper. The
input to the mapper is the binary data stream, and the output is the four-level,
2, 1, 0, and 1, line signal. The buffer converts the data stream to 2-bit wide
and the lookup table generates the line signal.
Figure 6.78. Bit-to-Line-Signal Mapper
Figure 6.80 shows the internal structure of the Simulink model receiver
consisting of a down sampling filter, an adaptive decision feedback channel
equalizer, a five-level decision device, and a data bit demapper. For simplicity,
the echo and NEXT cancellation circuits are not included in this simulation
model. They can be constructed using adaptive filters.
Figure 6.82 shows the internal structure of the demapper model. The decoder
simply generates 1 if two consecutive inputs are not equal and 0 otherwise.
The sign descrambling function consists of a random sequence generator, a
delay element, a unit negative gain, and a switch. The descrambled signal
level is used to drive a two-dimensional lookup table for recovering the data
bit stream.
The Priority Resolution function includes Table 6.7, which represents the
relative priorities of different twisted pairbased Ethernet transmission systems,
where the system in the higher row poses the higher priority. The rationale for
this hierarchy is straightforward. 10BaseT is the lowest common denominator
and therefore has the lowest priority. Full-duplex solutions are always higher
in priority than their half-duplex counterparts. 100BaseT2 is ahead of
100BaseTX and 100BaseT4 because 100BaseT2 runs across a broader spectrum
of copper cabling and requires only two pairs. 100BaseT4 is ahead of
100BaseTX because 100BASET4 runs across a broader spectrum of copper
cabling. It should be noticed that the 1000BaseT transmission system,
although not examined here because it will probably not be used in homes in
the near future, has a higher priority than 100-Mbps technologies.
Type
100BaseT4
100BaseTX
10BaseT
The 100BaseT4 idle signal is similar to the 10BaseT idle signal, but with
100BaseT4 ternary signal levels and a faster repetition rate. The 100BaseT4
idle signal is called TP_IDL_100. The TP_IDL_100 signal is a repeating
sequence formed from one 1.2 ± 0.6-ms period of silence and one link test
pulse. Each link test pulse is a succession of two ternary symbols having
logical values of 1 and 1.
Figure 6.85. FLP and NLP mapping (From IEEE Std. 802.3.
Copyright © 2000 IEEE. All rights reserved.)
The first pulse in an FLP burst is always a clock pulse. Clock pulses within an
FLP burst are spaced at 125 ± 14 µs. A logic one is represented by a pulse
occurring 62.5 ± 7 µs after the preceding clock pulse. A logic zero is
represented by a mission pulse within two adjacent clock pulses at least 111
µs apart as shown in Figure 6.86. Each clock or data pulse lasts 100 ns. Each
FLP burst lasts 2 ms, and FLP bursts are scheduled 16 ms apart just like those
of NLPs.
In each FLP burst, 16 bits of data can be encoded. Among these bits, the first 5
bits belong to the selector field, and the next 8 bits belong to the technology
ability field for the Base Link Code Word or Base Page as shown in Figure 6.87.
The selector field code is used to identify the type of standards and the code
for 802.3 Ethernet is 00001. The technology field encoding for the 802.3
selector is shown in Figure 6.88.
The 14th bit, D13, of the Base Page is used for Remote Fault (RF) indication.
The 15th bit, D14, is an acknowledgment (Ack) to indicate that a device has
successfully received its Link Partner's Link Code Word. The 16th bit, D15, is
used for Next Page (NP). The NP is set to one if a transceiver is willing to
exchange a Next Page. The Next Page can have either a Message Page or an
Unformated Page encoding. The Message Page Encoding is shown in Figure
6.89. These first 11 bits of a message page belong to the Message Code Field.
The message code indicating the 100BaseT2 capability is 11100000000
starting with bit M0. In the message page, bit D11, Toggle (T) is used by the
arbitration function to ensure synchronization with the transceiver at the
other end during Next Page exchange. This bit shall always take the opposite
value of the Toggle bit in the previously exchanged page. The initial value of
the Toggle bit in the first Next Page transmitted is the inverse of bit 11 of the
base page. Bit D12, Acknowledge 2 (Ack2), is used by the Next Page function
to indicate that a device has the ability to comply with the message. Bit D13,
Message Page (MP), is used by the Next Page function to differentiate a
Message Page from an Unformated Page. MP is set to one for a message page.
Bit D14, Ack, is defined the same as for the Base Page. Bit D15, Next Page
(NP), is used by the Next Page function to indicate whether or not this is the
last Next Page to be transmitted. NP is set to zero if this is the last page.
A transceiver can set its Ack bit to one after it receives three consecutive and
consistent FLP bursts from the other end. The arbitration function of the
transceiver can then compare its own capabilities with those at the other end
and determine the transmission method for both ends according to the same
priority resolution procedure. Initialization for that particular transmission
method can proceed to establish the communication link. The Parallel
Detection function should have already identified the transmission method of
the transceiver at the other end, if FLP bursts are not received, and the
transceiver can therefore start an initialization procedure.
6.7 Media Independent Interface
All Ethernet transmission systems defined by the 802.3 standards share the
same MAC protocol. The 802.3-defined MAC basically needs to know if the
medium is free before the transmission and if there is a collision during the
transmission. Therefore, different physical layers can be presented to the MAC
through a common interface encompassing these sensing and transmission
capabilities. A Media Independent Interface is defined in the Ethernet
standards to separate the common MAC function from different physical layer
transmission systems. This separation is very valuable to a multiple physical
layer capable Ethernet transceiver as well as to the organization of technology
development efforts. Besides these media-sensing and data-transmitting
capabilities, a management interface is also defined as a part of the MII to
enable functions such as autonegotiation.
The data transmitting capabilities of the MII include transmit clock, transmit
enable, transmit error, and 4 bits of transmit data, in the transmit direction,
and receive clock, receive enable, receive error, and 4 bits of receive data in
the receive direction. Because the transmit and receive paths are separate,
MII is capable of full-duplex operation. There are also a carrier sense pin and a
collision detection pin defined for media sensing. For management purposes, a
Management Data Clock (MDC) pin and a Management Data I/O (MDIO) pin
are defined, but a 40-pin connector is also defined in case that physical layer
and the MAC circuits are implemented separately. On this 40-pin connector, 4
power supply pins and 18 ground pins are also defined in addition to these 18
media sensing, data transmission, and management clock and I/O pins.
For the transmit path, the clock, TX_CLK, is supplied by the physical layer
(PHY) and can be present all the time. Because the data path is 4 bits wide,
the TX_CLK frequency is a quarter of the bit rate of a particular Ethernet
transmission system (i.e., 2.5 MHz for 10BaseT and 25 MHz for 100BaseT4,
100BaseTX, and 100BaseT2). The transmit enable, TX_EN, coincides with the
presence of data bits, TXD<3:0>, and they are all from the MAC. Meanwhile,
the carrier sense, CRS, detects the same transmission on the media by the
PHY and becomes active after a little delay as shown in Figure 6.90. Any
transmission error detected by the PHY is relayed to the MAC over the TX_ER
pin.
Figure 6.90. Transmit Timing Diagram (From IEEE Std. 802.3.
Copyright © 2000 IEEE. All rights reserved.)
For the receive path, the clock, RX_CLK, can also be present all the time. The
RX_CLK frequency should also be one fourth of the transmission throughput
(i.e., 2.5 MHz for 10BaseT and 25 MHz for 100BaseT4, 100BaseTX, and
100BaseT2). The receive data valid, RX_DV, starts during the preamble and no
later than the Start Frame Delimiter (SFD) as shown in Figure 6.91. Any
receive error detected by the MAC is relayed to the PHY over the RX_ER pin.
All receive path signals are from the PHY.
MDC is sent from the MAC to the PHY as the timing reference for transfer of
information on the MDIO signal. MDC is an aperiodic signal that has no
maximum high or low times. The minimum high and low times for MDC shall
be 160 ns each, and the minimum period for MDC shall be 400 ns. MDIO is a
bidirectional signal between the MAC and the PHY. It is used to transfer control
information and status. Control information is driven by the MAC
synchronously with respect to MDC and is sampled synchronously by the
physical layer. Status information is supplied by the PHY synchronously with
respect to MDC and is sampled synchronously by the MAC.
The MII has been very well adapted by the Ethernet manufacturers such that a
qualified stand-alone PHY device can be used in conjunction with any other
qualified MAC components over this interface.
6.8 MATLAB Files
gx=[1 0 0 0 0 0 1 0 0 1 1 0 0 0 0 0 1 0 0 0 1 1 1 0 1 1 0 1 1 0 1 1
x=ceil(2*rand(1,8000)-1);
xs=~x(1:33);
for i=1:length(x)-33
if xs(1)~=0
xs=xor(xs,gx);
end
xs(1:32)=xs(2:33);
xs(33)=x(i+33);
end
fcs=~xs
%SIMULATION PARAMETERS
%simulation for pure Aloha protocol
%total simulation time in seconds
runtime=0.2;
%total number of stations
nstation=10;
%transmission throughput of the media in bits per second
netthrou=10e6;
%frame size in bits
fsize=8000;
%avarage frame arrival rate per second for each station
%frate=10;
for frate=1:5:150
%average frame arrival rate per simulation iteration
trh=frate/10000;
%random wait window in number of simulation iterations
wwind=100;
%EVENTS VARIABLES
%transmit active
tr=zeros(1,nstation);
%transmit queue
tq=zeros(1,nstation);
%transmit progress counter
tcnt=zeros(1,nstation);
%collision keeper
colis=zeros(1,10000*runtime);
%collision station index
colin=zeros(1,nstation);
%random wait after collision
rwait=zeros(1,nstation);
%transmit keeper
trkeep=zeros(nstation,10000*runtime);
%packet arrival keeper
pakeep=0;
for i=1:10000*runtime
for j=1:nstation
%check if the transmitter is active
if tr(j)==1
trkeep(j,i)=1;
end
%check if the packet has been sent
if tcnt(j)>0
tcnt(j)=tcnt(j)-1;
if tcnt(j)==0
tr(j)=0;
%check if the transmission is collision free
if colin(j)==1
rwait(j)=ceil(wwind*rand(1,1));
tq(j)=tq(j)+1;
colin(j)=0;
end
end
else
if tq(j)>0 & rwait(j)==0
tr(j)=1;
tcnt(j)=ceil(fsize/netthrou*10000);
tq(j)=tq(j)-1;
end
end
%check if a new packet has arrived
pa=rand(1,1);
if pa<trh
pakeep=pakeep+1;
%if the transmit is ready
if tr(j)==0 & rwait(j)==0
tr(j)=1;
tcnt(j)=ceil(fsize/netthrou*10000);
else
tq(j)=tq(j)+1;
end
end
%decrease random waiting count
if rwait(j)>0
rwait(j)=rwait(j)-1;
end
end
%check for collision
if sum(tr)>1
colis(i)=1;
for k=1:nstation
if tr(k)==1
colin(k)=1;
end
end
end
end
px1(frate)=(pakeep-sum(tq));
py1(frate)=pakeep;
end
g1=[0:0.01:1.2];
s1=g1.*exp(-2*g1);
figure(1)
plot(px1*8000/runtime,py1*8000/runtime,'x',s1*1e7,g1*1e7,'-')
grid
xlabel('Throughput (bps)')
ylabel('Arrival Rate (bps)')
%SIMULATION PARAMETERS
%simulation for slotted Aloha protocol
%total simulation time in seconds
runtime=0.2;
%total number of stations
nstation=10;
%transmission throughput of the media in bits per second
netthrou=10e6;
%frame size in bits
fsize=8000;
%avarage frame arrival rate per second for each station
%frate=10;
for frate=1:5:150
%average frame arrival rate per simulation iteration
trh=frate/10000;
%random wait window
wwind=100;
%EVENTS VARIABLES
%transmit active
tr=zeros(1,nstation);
%transmit queue
tq=zeros(1,nstation);
%transmit progress counter
tcnt=zeros(1,nstation);
%collision keeper
colis=zeros(1,10000*runtime);
%collision station index
colin=zeros(1,nstation);
%random wait after collision
rwait=zeros(1,nstation);
%transmit keeper
trkeep=zeros(nstation,10000*runtime);
%packet arrival keeper
pakeep=0;
for i=1:10000*runtime
for j=1:nstation
%check if the transmitter is active
if tr(j)==1
trkeep(j,i)=1;
end
%check if the packet has been sent
if tcnt(j)>0
tcnt(j)=tcnt(j)-1;
if tcnt(j)==0
tr(j)=0;
%check if the transmission is collision free
if colin(j)==1
rwait(j)=ceil(wwind*rand(1,1));
tq(j)=tq(j)+1;
colin(j)=0;
end
end
else
if tq(j)>0 & rwait(j)==0 & mod(i,8)==0
tr(j)=1;
tcnt(j)=ceil(fsize/netthrou*10000);
tq(j)=tq(j)-1;
end
end
%check if a new packet has arrived
pa=rand(1,1);
if pa<trh
pakeep=pakeep+1;
%if the transmit is ready
if tr(j)==0 & rwait(j)==0 & mod(i,8)==0
tr(j)=1;
tcnt(j)=ceil(fsize/netthrou*10000);
else
tq(j)=tq(j)+1;
end
end
%decrease random waiting count
if rwait(j)>0
rwait(j)=rwait(j)-1;
end
end
%check for collision
if sum(tr)>1
colis(i)=1;
for k=1:nstation
if tr(k)==1
colin(k)=1;
end
end
end
end
px2(frate)=(pakeep-sum(tq));
py2(frate)=pakeep;
end
g2=[0:0.01:1.2];
s2=g2.*exp(-g2);
figure(2)
plot(px2*8000/runtime,py2*8000/runtime,'x',s2*1e7,g2*1e7,'-')
grid
xlabel('Throughput (bps)')
ylabel('Arrival Rate (bps)')
%SIMULATION PARAMETERS
%simulation for Ethernet protocol
%total simulation time in seconds
runtime=0.2;
%total number of stations
nstation=10;
%transmission throughput of the media in bits per second
netthrou=10e6;
%frame size in bits
fsize=8000;
%avarage frame arrival rate per second for each station
%frate=10;
for frate=1:5:150
%average frame arrival rate per simulation iteration
trh=frate/10000;
%random wait window
wwind=100;
%EVENTS VARIABLES
%transmit active
tr=zeros(1,nstation);
%transmit active at previous iteration
trp=zeros(1,nstation);
%transmit queue
tq=zeros(1,nstation);
%transmit progress counter
tcnt=zeros(1,nstation);
%collision keeper
colis=zeros(1,10000*runtime);
%collision station index
colin=zeros(1,nstation);
%random wait after collision
rwait=zeros(1,nstation);
%transmit keeper
trkeep=zeros(nstation,10000*runtime);
%packet arrival keeper
pakeep=0;
for i=1:10000*runtime
%save the media status
trp=tr;
for j=1:nstation
%check if the transmitter is active
if tr(j)==1
trkeep(j,i)=1;
end
%check if the packet has been sent
if tcnt(j)>0
%check if the transmission is collision free
if colin(j)==1
rwait(j)=ceil(wwind*rand(1,1));
tq(j)=tq(j)+1;
colin(j)=0;
tcnt(j)=0;
else
tcnt(j)=tcnt(j)-1;
end
if tcnt(j)==0
tr(j)=0;
end
else
if tq(j)>0 & rwait(j)==0 & sum(trp)==0
tr(j)=1;
tcnt(j)=ceil(fsize/netthrou*10000);
tq(j)=tq(j)-1;
end
end
%check if a new packet has arrived
pa=rand(1,1);
if pa<trh
pakeep=pakeep+1;
%if the transmit is ready
if tr(j)==0 & rwait(j)==0 & sum(trp)==0
tr(j)=1;
tcnt(j)=ceil(fsize/netthrou*10000);
else
tq(j)=tq(j)+1;
end
end
%decrease random waiting count
if rwait(j)>0
rwait(j)=rwait(j)-1;
end
end
%check for collision
sum(tr)
if sum(tr)>1
colis(i)=1;
for k=1:nstation
if tr(k)==1
colin(k)=1;
end
end
end
end
px2(frate)=(pakeep-sum(tq));
py2(frate)=pakeep;
end
figure(1)
plot(px2*8000/runtime,py2*8000/runtime,'x')
grid
xlabel('Throughput (bps)')
ylabel('Arrival Rate (bps)')
function [a,b,c,d]=blockabcd(r1,r2,r3,r4,r5,r6,l,c,f);
dm=length(f);
j=sqrt(-1);
jw=j*2*pi*f;
a1=ones(1,dm);
b1=r1*ones(1,dm);
c1=zeros(1,dm);
d1=ones(1,dm);
a2=ones(1,dm);
b2=r2+l*jw;
c2=zeros(1,dm);
d2=ones(1,dm);
a3=ones(1,dm);
b3=r3*ones(1,dm);
c3=zeros(1,dm);
d3=ones(1,dm);
a4=ones(1,dm);
b4=r4*ones(1,dm);
c4=zeros(1,dm);
d4=ones(1,dm);
a5=ones(1,dm);
b5=zeros(1,dm);
c5=ones(1,dm)./(r5+r6./(r6*c*jw+ones(1,dm)));
d5=ones(1,dm);
a12=(a1.*b2+b1.*a2)./(b1+b2);
b12=(b1.*b2)./(b1+b2);
c12=((b1+b2).*(c1+c2)-(a1-a2).*(d1-d2))./(b1+b2);
d12=(b1.*d2+d1.*b2)./(b1+b2);
a34=a3.*a4+b3.*c4;
b34=a3.*b4+b3.*d4;
c34=c3.*a4+d3.*c4;
d34=c3.*b4+d3.*d4;
a345=a34.*a5+b34.*c5;
b345=a34.*b5+b34.*d5;
c345=c34.*a5+d34.*c5;
d345=c34.*b5+d34.*d5;
a=(a12.*b345+b12.*a345)./(b12+b345);
b=(b12.*b345)./(b12+b345);
c=((b12+b345).*(c12+c345)-(a12-a345).*(d12-d345))./(b12+b345);
d=(b12.*d345+d12.*b345)./(b12+b345);
f=[1:1025]/1025*20e6;
r1=133;
r2=14;
r3=95.3;
r4=95.3;
r5=68.1;
r6=649;
l=5.6e-6;
c=560e-12;
[a1,b1,c1,d1]=blockabcd(r1,r2,r3,r4,r5,r6,l,c,f);
r1=2320;
r2=1;
r3=95.3;
r4=95.3;
r5=3.83;
r6=11300;
l=0.68e-6;
c=68e-12;
[a2,b2,c2,d2]=blockabcd(r1,r2,r3,r4,r5,r6,l,c,f);
r1=14000;
r2=1;
r3=95.3;
r4=95.3;
r5=1;
r6=10000;
l=0.82e-6;
c=82e-12;
[a3,b3,c3,d3]=blockabcd(r1,r2,r3,r4,r5,r6,l,c,f);
r1=22600;
r2=1;
r3=95.3;
r4=95.3;
r5=0;
r6=11800;
l=0.82e-6;
c=82e-12;
[a4,b4,c4,d4]=blockabcd(r1,r2,r3,r4,r5,r6,l,c,f);
a12=a1.*a2+b1.*c2;
b12=a1.*b2+b1.*d2;
c12=c1.*a2+d1.*c2;
d12=c1.*b2+d1.*d2;
a34=a3.*a4+b3.*c4;
b34=a3.*b4+b3.*d4;
c34=c3.*a4+d3.*c4;
d34=c3.*b4+d3.*d4;
a1234=a12.*a34+b12.*c34;
b1234=a12.*b34+b12.*d34;
c1234=c12.*a34+d12.*c34;
d1234=c12.*b34+d12.*d34;
[imp,h]=abcd2hbk(a1234,b1234,c1234,d1234);
figure(1)
plot(f,20*log10(abs(h(1:1025))));
grid
xlabel('Frequency (Hz)')
ylabel('Magnitude (dB)')
%fisrt block
r1=133;
r2=14;
r3=95.3;
r4=95.3;
r5=68.1;
r6=649;
l=5.6e-6;
c=560e-12;
[aa,ba,ca,da,adn]=sablockclc(r1,r2,l);
aa=aa(2:3);
ba=ba(2:3);
ca=ca(2:3);
da=da(2:3);
adn=adn(2:3);
[ab,bb,cb,db,bdn]=sbblockclc(r3,r4,r5,r6,c);
[A1,B1,C1,D1,Dn1]=sblockclc(aa,ba,ca,da,adn,ab,bb,cb,db,bdn);
%second block
r1=2320;
r2=1;
r3=95.3;
r4=95.3;
r5=3.83;
r6=11300;
l=0.68e-6;
c=68e-12;
[aa,ba,ca,da,adn]=sablockclc(r1,r2,l);
aa=aa(2:3);
ba=ba(2:3);
ca=ca(2:3);
da=da(2:3);
adn=adn(2:3);
[ab,bb,cb,db,bdn]=sbblockclc(r3,r4,r5,r6,c);
[A2,B2,C2,D2,Dn2]=sblockclc(aa,ba,ca,da,adn,ab,bb,cb,db,bdn);
%third block
r1=14000;
r2=1;
r3=95.3;
r4=95.3;
r5=1;
r6=10000;
l=0.82e-6;
c=82e-12;
[aa,ba,ca,da,adn]=sablockclc(r1,r2,l);
aa=aa(2:3);
ba=ba(2:3);
ca=ca(2:3);
da=da(2:3);
adn=adn(2:3);
[ab,bb,cb,db,bdn]=sbblockclc(r3,r4,r5,r6,c);
[A3,B3,C3,D3,Dn3]=sblockclc(aa,ba,ca,da,adn,ab,bb,cb,db,bdn);
%fourth block
r1=22600;
r2=1;
r3=95.3;
r4=95.3;
r5=0;
r6=11800;
l=0.82e-6;
c=82e-12;
[aa,ba,ca,da,adn]=sablockclc(r1,r2,l);
aa=aa(2:3);
ba=ba(2:3);
ca=ca(2:3);
da=da(2:3);
adn=adn(2:3);
[ab,bb,cb,db,bdn]=sbblockclc(r3,r4,r5,r6,c);
[A4,B4,C4,D4,Dn4]=sblockclc(aa,ba,ca,da,adn,ab,bb,cb,db,bdn);
a12=conv(A1,A2)+conv(B1,C2);
b12=conv(A1,B2)+conv(B1,D2);
c12=conv(C1,A2)+conv(D1,C2);
d12=conv(C1,B2)+conv(D1,D2);
dn12=conv(Dn1,Dn2);
a123=conv(a12,A3)+conv(b12,C3);
b123=conv(a12,B3)+conv(b12,D3);
c123=conv(c12,A3)+conv(d12,C3);
d123=conv(c12,B3)+conv(d12,D3);
dn123=conv(dn12,Dn3);
a1234=conv(a123,A4)+conv(b123,C4);
b1234=conv(a123,B4)+conv(b123,D4);
c1234=conv(c123,A4)+conv(d123,C4);
d1234=conv(c123,B4)+conv(d123,D4);
dn1234=conv(dn123,Dn4);
f=[1:200]/200*20e6;
hsn=200*dn1234;
hsd=100*100*c1234+100*d1234+100*a1234+b1234;
h=freqs(hsn,hsd,2*pi*f);
figure(1)
plot(f,20*log10(abs(h)))
grid
xlabel('Frequency (Hz)')
ylabel('Magnitude (dB)')
function [aa,ba,ca,da,adn]=sablockclc(r1,r2,l);
a1=1;
b1=r1;
c1=0;
d1=1;
dn1=1;
a2=[0 1];
b2=[l r2];
c2=[0 0];
d2=[0 1];
dn2=[0 1];
b1pb2=conv(b1,dn2)+conv(b2,dn1);
c1pc2=conv(c1,dn2)+conv(c2,dn1);
a1ma2=conv(a1,dn2)-conv(a2,dn1);
d1md2=conv(d1,dn2)-conv(d2,dn1);
b1b2=conv(b1,b2);
b1d2pd1b2=conv(b1,d2)+conv(d1,b2);
a1b2pb1a2=conv(a1,b2)+conv(b1,a2);
dn12=conv(dn1,dn2);
adn=conv(b1pb2,dn12);
ca=conv(b1pb2,c1pc2)-conv(a1ma2,d1md2);
aa=conv(a1b2pb1a2,dn12);
ba=conv(b1b2,dn12);
da=conv(b1d2pd1b2,dn12);
function [ab,bb,cb,db,bdn]=sbblockclc(r3,r4,r5,r6,c);
a3=1;
b3=r3;
c3=0;
d3=1;
dn3=1;
a4=[r6*r5*c r5+r6];
b4=[0 0];
c4=[r6*c 1];
d4=[r6*r5*c r5+r6];
dn4=[r6*r5*c r5+r6];
a5=1;
b5=r4;
c5=0;
d5=1;
dn5=1;
a34=conv(a3,a4)+conv(b3,c4);
b34=conv(a3,b4)+conv(b3,d4);
c34=conv(c3,a4)+conv(d3,c4);
d34=conv(c3,b4)+conv(d3,d4);
dn34=conv(dn3,dn4);
ab=conv(a34,a5)+conv(b34,c5);
bb=conv(a34,b5)+conv(b34,d5);
cb=conv(c34,a5)+conv(d34,c5);
db=conv(c34,b5)+conv(d34,d5);
bdn=conv(dn34,dn5);
function [A1,B1,C1,D1,Dn1]=sblockclc(aa,ba,ca,da,adn,ab,bb,cb,db,bdn
%Parallel matrix calculation
bapbb=conv(ba,bdn)+conv(bb,adn);
capcb=conv(ca,bdn)+conv(cb,adn);
aamab=conv(aa,bdn)-conv(ab,adn);
damdb=conv(da,bdn)-conv(db,adn);
babb=conv(ba,bb);
badbdabb=conv(ba,db)+conv(da,bb);
aabbpbaab=conv(aa,bb)+conv(ba,ab);
abdn=conv(adn,bdn);
dn1=conv(bapbb,abdn);
c1=conv(bapbb,capcb)-conv(aamab,damdb);
a1=conv(aabbpbaab,abdn);
b1=conv(babb,abdn);
d1=conv(badbdabb,abdn);
%remove zeros at the highest order
if a1(1)==0
a1=a1(2:length(a1));
b1=b1(2:length(b1));
c1=c1(2:length(c1));
d1=d1(2:length(d1));
dn1=dn1(2:length(dn1));
end
%remove common roots
a1norm=a1(1);
b1norm=b1(1);
c1norm=c1(1);
d1norm=d1(1);
dn1norm=dn1(1);
a1n=a1/a1norm;
b1n=b1/b1norm;
c1n=c1/c1norm;
d1n=d1/d1norm;
dn1n=dn1/dn1norm;
rtn=roots(a1n);
rtd=roots(dn1n);
n=0;
for i=1:length(rtn)
for j=1:length(rtd)
if abs(rtn(i)-rtd(j))<1e-3
n=n+1;
compoly(n,:)=[1 -rtn(i)];
end
end
end
for i=1:n
a1n=deconv(a1n,compoly(i,:));
b1n=deconv(b1n,compoly(i,:));
c1n=deconv(c1n,compoly(i,:));
d1n=deconv(d1n,compoly(i,:));
dn1n=deconv(dn1n,compoly(i,:));
end
A1=a1n*a1norm;
B1=b1n*b1norm;
C1=c1n*c1norm;
D1=d1n*d1norm;
Dn1=dn1n*dn1norm;
%first block
R11=200e3;
R12=18e3;
R13=3e3;
R14=3e3;
R15=0.04e3;
R16=200e3;
C1=0.35e-12;
L1=3.8e-6;
a1=1;
b1=R11;
c1=0;
d1=1;
dn1=1;
a2=[C1 0];
b2=[R12*C1 1];
c2=[0 0];
d2=[C1 0];
dn2=[C1 0];
b1pb2=conv(b1,dn2)+conv(b2,dn1);
c1pc2=conv(c1,dn2)+conv(c2,dn1);
a1ma2=conv(a1,dn2)-conv(a2,dn1);
d1md2=conv(d1,dn2)-conv(d2,dn1);
b1b2=conv(b1,b2);
b1d2pd1b2=conv(b1,d2)+conv(d1,b2);
a1b2pb1a2=conv(a1,b2)+conv(b1,a2);
dn12=conv(dn1,dn2);
adn=conv(b1pb2,dn12);
ca=conv(b1pb2,c1pc2)-conv(a1ma2,d1md2);
aa=conv(a1b2pb1a2,dn12);
ba=conv(b1b2,dn12);
da=conv(b1d2pd1b2,dn12);
if adn(3)==0 | ca(3)==0 | ba(3)==0 | aa(3)==0 | da(3)==0
aa=aa(1:2);
ba=ba(1:2);
ca=ca(1:2);
da=da(1:2);
adn=adn(1:2);
end
a3=1;
b3=R13;
c3=0;
d3=1;
dn3=1;
a4=[(R15+R16)*L1 R15*R16];
b4=[0 0];
c4=[L1 R16];
d4=[(R15+R16)*L1 R15*R16];
dn4=[(R15+R16)*L1 R15*R16];
a5=1;
b5=R14;
c5=0;
d5=1;
dn5=1;
a34=conv(a3,a4)+conv(b3,c4);
b34=conv(a3,b4)+conv(b3,d4);
c34=conv(c3,a4)+conv(d3,c4);
d34=conv(c3,b4)+conv(d3,d4);
dn34=conv(dn3,dn4);
ab=conv(a34,a5)+conv(b34,c5);
bb=conv(a34,b5)+conv(b34,d5);
cb=conv(c34,a5)+conv(d34,c5);
db=conv(c34,b5)+conv(d34,d5);
bdn=conv(dn34,dn5);
bapbb=conv(ba,bdn)+conv(bb,adn);
capcb=conv(ca,bdn)+conv(cb,adn);
aamab=conv(aa,bdn)-conv(ab,adn);
damdb=conv(da,bdn)-conv(db,adn);
babb=conv(ba,bb);
badbdabb=conv(ba,db)+conv(da,bb);
aabbpbaab=conv(aa,bb)+conv(ba,ab);
abdn=conv(adn,bdn);
dn=conv(bapbb,abdn);
c=conv(bapbb,capcb)-conv(aamab,damdb);
a=conv(aabbpbaab,abdn);
b=conv(babb,abdn);
d=conv(badbdabb,abdn);
f=[1:200]/200*40e6;
hsn=20000*dn;
hsd=10000*10000*c+10000*d+10000*a+b;
nnorm=hsn(1);
hsnn=hsn/nnorm;
rtn=roots(hsnn);
dnorm=hsd(1);
hsdn=hsd/dnorm;
rtd=roots(hsdn);
n=0;
for i=1:size(rtn)
for j=1:size(rtd)
if abs(rtn(i)-rtd(j))<1e-6
n=n+1;
compoly(n,:)=[1 -rtn(i)];
end
end
end
for i=1:n
hsnn=deconv(hsnn,compoly(i,:));
hsdn=deconv(hsdn,compoly(i,:));
end
h=freqs(hsn,hsd,2*pi*f);
hsnn=nnorm*hsnn;
hsdn=dnorm*hsdn;
ndnorm=hsnn(length(hsnn));
hsnn=hsnn/ndnorm;
hsdn=hsdn/ndnorm;
h1=freqs(hsnn,hsdn,2*pi*f);
cstkmdl=-26+15*log10(f/1e7);
figure(1)
plot(f,cstkmdl,f,20*log10(abs(h1)))
grid
xlabel('Frequency (Hz)')
ylabel('Magnitude (dB)')
x=[-2:0.125:2];
pmask=sin(pi*x)./(pi*x).*cos(pi*x)./(1-4*x.^2);
pmask(17)=1;
pmask(13)=(pmask(12)+pmask(14))/2;
pmask(21)=(pmask(20)+pmask(22))/2;
[B,A]=butter(3,0.25);
pmask=filter(B,A,[pmask 0 0 0 0 0 0 0]);
btsq=[3 1 2 2 3 1
2 3 1 3 1 2
3 1 2 3 1 2
1 2 3 3 1 2
1 2 3 2 3 1
2 3 1 1 2 3
3 1 2 1 2 3
1 2 3 1 2 3
1 3 2 2 3 1
2 1 3 3 1 2
1 3 2 3 1 2
3 2 1 3 1 2
3 2 1 2 3 1
2 1 3 1 2 3
1 3 2 1 2 3
3 2 1 1 2 3
3 2 3 1 1 2
3 3 2 1 2 1
3 2 3 1 2 1
2 3 3 1 2 1
2 3 3 1 1 2
3 3 2 2 1 1
3 2 3 2 1 1
2 3 3 2 1 1
2 3 1 2 3 1
2 3 1 2 1 3
2 3 1 3 3 1
2 3 1 2 2 3
2 1 3 2 2 3
2 1 3 3 3 1
2 1 3 2 1 3
2 1 3 2 3 1
2 2 1 3 3 1
1 1 3 2 2 3
3 3 1 2 3 1
3 3 1 2 1 3
2 2 3 2 1 3
2 2 3 2 3 1
2 2 1 2 2 3
1 1 3 3 3 1
1 2 1 3 3 2
1 1 2 3 2 3
1 2 1 3 2 3
2 1 1 3 2 3
2 1 1 3 3 2
1 1 2 2 3 3
1 2 1 2 3 3
2 1 1 2 3 3
3 1 2 2 1 3
2 3 1 1 3 2
3 1 2 1 3 2
1 2 3 1 3 2
1 2 3 2 1 3
2 3 1 3 2 1
3 1 2 3 2 1
1 2 3 3 2 1
1 3 2 2 1 3
2 1 3 1 3 2
1 3 2 1 3 2
3 2 1 1 3 2
3 2 1 2 1 3
2 1 3 3 2 1
1 3 2 3 2 1
3 2 1 3 2 1
3 2 3 2 2 1
3 3 2 2 1 2
3 2 3 2 1 2
2 3 3 2 1 2
2 3 3 2 2 1
3 3 2 1 2 2
3 2 3 1 2 2
2 3 3 1 2 2
2 2 2 3 2 2
2 2 2 1 3 3
2 2 2 3 1 3
2 2 2 3 3 1
2 2 2 1 3 2
2 2 2 1 2 3
2 2 2 3 1 2
2 2 2 3 2 1
3 2 3 1 1 3
3 3 2 1 3 1
3 2 3 1 3 1
2 3 3 1 3 1
2 3 3 1 1 3
3 3 2 3 1 1
3 2 3 3 1 1
2 3 3 3 1 1
3 3 3 2 1 1
3 3 3 1 2 1
3 3 3 1 1 2
3 3 2 1 1 2
3 3 2 1 1 3
3 3 2 2 2 1
1 1 3 3 3 2
2 2 1 3 3 2
2 1 2 3 3 2
2 2 1 3 2 3
2 1 2 3 2 3
1 2 2 3 2 3
1 2 2 3 3 2
2 2 1 2 3 3
2 1 2 2 3 3
1 2 2 2 3 3
1 3 1 3 3 2
1 1 3 3 2 3
1 3 1 3 2 3
3 1 1 3 2 3
3 1 1 3 3 2
1 1 3 2 3 3
1 3 1 2 3 3
3 1 1 2 3 3
1 3 3 2 2 2
3 1 3 2 2 2
3 3 1 2 2 2
2 2 3 2 2 2
1 2 3 2 2 2
2 1 3 2 2 2
3 2 1 2 2 2
2 3 1 2 2 2
2 1 1 3 3 3
1 2 1 3 3 3
1 1 2 3 3 3
1 1 2 3 3 2
3 3 1 2 2 1
2 2 3 2 2 1
3 3 1 1 1 3
2 2 3 1 1 3
3 1 3 2 2 1
3 3 1 2 1 2
3 1 3 2 1 2
1 3 3 2 1 2
1 3 3 2 2 1
3 3 1 1 2 2
3 1 3 1 2 2
1 3 3 1 2 2
2 3 2 2 2 1
2 2 3 2 1 2
2 3 2 2 1 2
3 2 2 2 1 2
3 2 2 2 2 1
2 2 3 1 2 2
2 3 2 1 2 2
3 2 2 1 2 2
3 1 3 1 1 3
3 3 1 1 3 1
3 1 3 1 3 1
1 3 3 1 3 1
1 3 3 1 1 3
3 3 1 3 1 1
3 1 3 3 1 1
1 3 3 3 1 1
2 3 2 1 1 3
2 2 3 1 3 1
2 3 2 1 3 1
3 2 2 1 3 1
3 2 2 1 1 3
2 2 3 3 1 1
2 3 2 3 1 1
3 2 2 3 1 1
2 1 2 3 3 1
2 2 1 3 1 3
2 1 2 3 1 3
1 2 2 3 1 3
1 2 2 3 3 1
2 2 1 1 3 3
2 1 2 1 3 3
1 2 2 1 3 3
1 3 1 3 3 1
1 1 3 3 1 3
1 3 1 3 1 3
3 1 1 3 1 3
3 1 1 3 3 1
1 1 3 1 3 3
1 3 1 1 3 3
3 1 1 1 3 3
2 1 2 2 2 3
2 2 1 2 3 2
2 1 2 2 3 2
1 2 2 2 3 2
1 2 2 2 2 3
2 2 1 3 2 2
2 1 2 3 2 2
1 2 2 3 2 2
1 3 1 2 2 3
1 1 3 2 3 2
1 3 1 2 3 2
3 1 1 2 3 2
3 1 1 2 2 3
1 1 3 3 2 2
1 3 1 3 2 2
3 1 1 3 2 2
3 1 3 2 3 1
3 3 1 3 1 2
3 1 3 3 1 2
1 3 3 3 1 2
1 3 3 2 3 1
3 3 1 1 2 3
3 1 3 1 2 3
1 3 3 1 2 3
2 3 2 2 3 1
2 2 3 3 1 2
2 3 2 3 1 2
3 2 2 3 1 2
3 2 2 2 3 1
2 2 3 1 2 3
2 3 2 1 2 3
3 2 2 1 2 3
3 1 3 2 1 3
3 3 1 1 3 2
3 1 3 1 3 2
1 3 3 1 3 2
1 3 3 2 1 3
3 3 1 3 2 1
3 1 3 3 2 1
1 3 3 3 2 1
2 3 2 2 1 3
2 2 3 1 3 2
2 3 2 1 3 2
3 2 2 1 3 2
3 2 2 2 1 3
2 2 3 3 2 1
2 3 2 3 2 1
3 2 2 3 2 1
3 1 2 3 3 1
2 3 1 3 1 3
3 1 2 3 1 3
1 2 3 3 1 3
1 2 3 3 3 1
2 3 1 1 3 3
3 1 2 1 3 3
1 2 3 1 3 3
1 3 2 3 3 1
2 1 3 3 1 3
1 3 2 3 1 3
3 2 1 3 1 3
3 2 1 3 3 1
2 1 3 1 3 3
1 3 2 1 3 3
3 2 1 1 3 3
3 1 2 2 2 3
2 3 1 2 3 2
3 1 2 2 3 2
1 2 3 2 3 2
1 2 3 2 2 3
2 3 1 3 2 2
3 1 2 3 2 2
1 2 3 3 2 2
1 3 2 2 2 3
2 1 3 2 3 2
1 3 2 2 3 2
3 2 1 2 3 2
3 2 1 2 2 3
2 1 3 3 2 2
1 3 2 3 2 2
3 2 1 3 2 2];
pspc=zeros(1,1024);
pspc1=zeros(1,1024);
for i=1:256
swave=zeros(1,24);
swave1=zeros(1,84);
for j=1:6
swindx=(j-1)*4+1;
swindx1=(j-1)*8+1;
if btsq(i,j)==1
swave(swindx:swindx+3)=-ones(1,4);
swave1(swindx1:swindx1+39)=swave1(swindx1:swindx1+39)-pmask;
end
if btsq(i,j)==3
swave(swindx:swindx+3)=ones(1,4);
swave1(swindx1:swindx1+39)=swave1(swindx1:swindx1+39)+pmask;
end
end
pspc=pspc+abs(fft(swave,1024));
pspc1=pspc1+abs(fft(swave1,1024));
end
pspc=pspc/256;
pspc=pspc.^2*3.5^2/100/0.001/25e6/24;
pspc1=pspc1/256;
pspc1=pspc1.^2*3.5^2/100/0.001/25e6/48;
px=[1:512]/512*5e7;
px1=[1:256]/256*5e7;
py1=10*log10(abs(pspc(1:512)));
py2=10*log10(abs(pspc1(1:256)));
figure(2)
plot(px,py1,px1,py2)
grid
xlabel('Frequency (Hz)')
ylabel('Magnitude (dBm/Hz)')
a=7.26e-7;
b=4.56e-12;
f=[1:1024]/1024*2.5e8;
d4=300;
H4=-8.68*d4*(a*sqrt(f)+b*f);
C1=-35+15*log10(f/16e6);
txmask
rcv=loghfpspc+H4;
crsn=loghfpspc+C1;
SNR=H4-C1;
figure(1)
plot(f(1:200),rcv(1:200),f(1:200),crsn(1:200))
grid
xlabel('Frequency (Hz)')
ylabel('PSD (dBm/Hz)')
figure(2)
plot(f(1:200),SNR(1:200))
grid
xlabel('Frequency (Hz)')
ylabel('SNR (dB)')
capci=sum(log2(1+10.^(SNR(1:200)/10)))*5e7/200
%calculating PSD
pspc=zeros(1024,1);
pspcf=zeros(1024,1);
for ii=1:256
x=ceil(rand(256,3)*2-1);
for i=1:256
if x(i,1)==0
xa=-1;
xb=0;
else
xa=1;
xb=-2;
end
if x(i,2)==0
xl(i)=xa;
else
xl(i)=xb;
end
if x(i,3)==1
xl(i)=xl(i)*(-1);
end
end
xl=0.9*xl;
xll=zeros(1024,1);
xll(1:4:1024)=xl;
tfilt=[0.36 0.8 1 0.75 0.26];
xlf=conv(xll,tfilt);
xll(2:4:1024)=xl;
xll(3:4:1024)=xl;
xll(4:4:1024)=xl;
pspc=pspc+abs(fft(xll,1024));
pspcf=pspcf+abs(fft(xlf(3:1026),1024));
end
pspc=pspc/256;
pspc=pspc.^2/100/0.001/5e7/4;
pspcf=pspcf/256;
pspcf=pspcf.^2/100/0.001/5e7/4;
figure(1)
logpspc=10*log10(pspc(1:513));
logpspcf=10*log10(pspcf(1:513));
f=[1:513]/513*5e7;
plot(f,logpspc,f,logpspcf)
grid
xlabel('Frequency (Hz)')
ylabel('PSD (dBm/Hz)')
a=1.537e-6;
b=4.55e-12;
f=[1:513]/513*100e6;
l=100;
j=sqrt(-1);
H=exp(-((1+j)*a*sqrt(pi.*f)+b*2*pi*f)*l).*10^(-1.2/20);
figure(1)
plot(f(1:128),20*log10(abs(H(1:128))))
H(1024:-1:514)=real(H(2:512))-j*imag(H(2:512));
ht=real(ifft(H));
figure(2)
plot([1:100]/200e6,ht(1:100));
NEXT=19.3-16.6*log10(f/16e6);
FEXT=20.9-20*log10(f/16e6);
figure(3)
plot(f(1:128),-NEXT(1:128),f(1:128),-FEXT(1:128))
grid
xlabel('Frequency (Hz)')
ylabel('Crosstalk Losses (dB)')
t2mask
cat3channel
logh=20*log10(abs(H(1:513)));
SNR=logh+FEXT;
figure(1)
plot(f,SNR)
capci=sum(log2(1+10.^(SNR/10)))*100e6/513
figure(2)
plot(f,logh'+logpspcf,f,logpspcf-FEXT')
6.9 References
2. www.national.com/pf/DP/DP83907.html
After standards are established for DSL systems, many companies rushed
ahead competing for the most effective realization of practical systems. Some
other companies looked around for alternative markets applying the general
idea and similar technology. Companies such as Tut Systems and Epigram, now
a home network division of Broadcom, found the in-house wiring a very
attractive transmission medium to which to apply advanced transceiver
technologies. After extensive internal development by many companies, an
industrial consortium called HomePNA was formed to promote the in-house
wiring-based transmission technologies. Tut Systems' Pulse Position Modulation
system was selected as the HomePNA 1.0 line code [1]. Although no extensive
signal-processing techniques were used, the PPM line code is relatively
effective at combating impairments such as reflection and noise commonly
found in this particular home environment. Epigram's QAM line code was later
selected as the standard for HomePNA 2.0 [2]. Adaptive equalization and
spectrum reuse through FDQAM (Frequency Diverse QAM) enable HomePNA
2.0 to achieve a transmission throughput of up to 10 Mbps over common in-
house telephone wiring. Through the duplication of the HomePNA 1.0
mechanism, HomePNA 2.0 is also backward-compatible. Home PNA 2.0
transceivers can talk to previously deployed HomePNA 1.0 transceivers.
7.1 HomePNA 1.0
The HomePNA 1.0 signaling method can be analyzed by examining its general
frame structure as shown in Figure 7.1. A HomePNA 1.0 transmitter
encapsulates the binary information of an Ethernet packet by adding a header
to it. The header consists of eight synchronization symbols followed by two
data training symbols and a Proprietary Communication (Reserved), or PCOM,
period. This header replaces the preamble and Start Frame Delimiter of the
Ethernet packet. Symbol 0 is the null synchronization symbol consisting of two
pulses. Symbols 1 through 4 carry transceiver Access ID (AID) information.
With each AID symbol carrying 2 bits, a total of 8 bits are allocated for AID.
This leads to 256 different AID combinations. Symbols 5 and 6 are used for
transmitting remote control management commands across the network.
Symbol 7 is a silence interval. On the other hand, many more data bits are
encoded into an equivalent synchronization symbol interval. Because of the
run length encoding, there is no exact timing boundary for every data-bits-
carrying symbol. The end symbol is a nonvalid data symbol with the pulse
position anywhere beyond those defined for data symbols. Training symbols
and the PCOM period (all zeros by default) are defined by operation
procedures through the management layer.
Figure 7.1. HomePNA 1.0 Frame Structure (From HomePNA
specification 1.0. Copyright © 1998 HomePNA. All rights
reserved.)
This frame structure is established on a timing base called TIC (Time Interval
Clock). A TIC is equal to 7/60 x 106 seconds. Each synchronization symbol
occupies a fixed time period of 129 TICs. Synchronization symbol zero has one
pulse at TIC = 0 and a second pulse at TIC = 126. For AID symbols 1 to 6, two
bits are encoded for each symbol. Pulse positions for AID symbols are defined
20 TICs apart. Pulse position 1 of an AID symbol is at TIC 66 representing the
bit combination of 00, pulse position 2 is at TIC 86 representing 01, pulse
position 3 is at TIC 106 representing 10, and pulse position 4 is at TIC 126
representing 11.
Two transmission throughputs, high rate and low rate, are defined for the
HomePNA 1.0 by different data symbol pulse starting positions. The same
header structure and synchronization symbols are used for both rates. In
contrast, pulse positions for data symbols are defined only one TIC apart.
There are 32 (031) pulse positions defined for the purpose of data symbol
encoding. Pulse position 0 is defined at TIC 28 and TIC 44 for high rate and
low rate, respectively. The next position is one TIC away (i.e., pulse position 1
is at either TIC 29 or TIC 45). The counting of TICs starts from the time of the
previous pulse position. If all 32 pulse positions are used, 5 bits of information
can be carried by each symbol with the conventional PPM encoding method.
However, only pulse positions 0 to 24 are valid for data encoding.
This results in a slightly lower transmission throughput (i.e., 4.64 bits per
symbol). In practice, a procedure similar to that of run length coding for data
storage is used to encode a fractional number of information bits. A Run
Length Code (RLC) is a conceptually simple form of compression. An RLC
consists of the process of searching for repeated runs of a single symbol in an
input stream and replacing them by a single instance of the symbol and a run
count. For the HomePNA 1.0 case, up to three consecutive zeros can be
counted by using three different groups of positions for subsequent bit
encoding. Right after a group of previously coded bits, if the first bit is 1, then
the next three bits are coded using positions 1 through 8. If the first bit is zero
and the second bit is one, then the next three bits (third, fourth, and fifth) are
encoded using positions 9 through 16. If the first and the second bits are zeros
and the third is one, then the subsequent three bits (fourth, fifth, and sixth)
are encoded using positions 17 through 24. If the first three bits are all zeros,
position 0 is used. The pulse position representations of binary bit sequences
are summarized in Table 7.1.
0 000 13 01100
1 1000 14 01101
2 1001 15 01110
3 1010 16 01111
4 1011 17 001000
5 1100 18 001001
6 1101 19 001010
7 1110 20 001011
8 1111 21 001100
9 01000 22 001101
10 01001 23 001110
11 01010 24 001111
12 01011
We can calculate the average number of bits each data symbol carries. For half
of the time, the first bit is 1 and the next three bits are encoded into a symbol
for a total of 4 bits. For a quarter of the time, the first two 01 bits and the next
three bits are encoded for a total of 5 bits. For one eighth of the time, the first
three 001 bits and the next three bits are encoded for a total 6 bits. For the
remaining one eighth of the time, the first three 000 bits themselves are
encoded for a total of 3 bits. Therefore, the average number of data bits a data
symbol can carry is
Equation 7.1
We can also calculate the average length of a data symbol. The average pulse
position for 4 bits encoding (1 followed by 3 bits) is 4.5 TICs away from pulse
position zero. The average pulse position for 5 bits encoding (01 followed by 3
bits), is 12.5 TICs away. The average pulse position for 6 bits encoding (001
followed by 3 bits) is 20.5 TICs away. The average symbol length in number of
TIC is therefore
Equation 7.2
Equation 7.3
Equation 7.4
To carry 4.375 bits using the conventional PPM, 24.375 = 20.75 pulse positions
are required for an average longer symbol length of 28 + 20.75/2 = 38.375
TICs. On the other hand, the average symbol length of 35.9375 TICs can only
carry log2[(35.9375 28) x 2] = 3.989 bits by the conventional PPM code. The
coding efficiency improvement provided by the RLL code over the conventional
PPM code is (4.375 3.989)/3.989 = 0.0967 = 9.67%.
Similarly, for low rates we have the following. The average symbol length in
number of TICs is
Equation 7.5
Equation 7.6
Equation 7.7
Assuming every node on the HomePNA 1.0 network can generally hear each
other, the collision detection is only performed during AID and silent intervals
(AID symbols 0 through 7). During a collision, a transmitter reads back an AID
value that does not match its own and recognizes the event as a collision,
alerting other stations with a JAM signal. A JAM pattern consists of 1 pulse
every 32 TICs and continues until at least the end of the AID intervals. When
a transmitter receives pulses in a position earlier than the position it
transmitted, it recognizes it as a pulse transmitted by another transceiver and
signals a collision. Guaranteed collision detection is possible only as long as
the spacing between successive possible pulse positions in an AID symbol (20
TICs or 2.3 µs) is greater than the round trip delay between the colliding
nodes. At approximately 1.5-ns propagation delay per foot, the maximum
distance between two HomePNA 1.0 transceivers must therefore not be
greater than 500 ft for collision detection purposes.
Figure 7.3 shows the PSD of the HomePNA 1.0 low-power version. The high-
power version's PSD is 6 dB higher between 5.5 and 9.5 MHz as a result of the
doubled voltage level. Figure 7.4 shows a HomePNA 1.0 test wiring
configuration as a typical in-house wiring channel model. Figure 7.5 shows the
frequency response of this channel model over a frequency range of 20 MHz.
At frequencies above 5 MHz, the attenuation is between 20 and 30 dB for a
configuration with total wiring length less than 700 ft. These attenuations are
caused by branching and reflection losses. A deep frequency notch caused by
the coincidence of many reflections has a heavy loss of more than 60 dB at
around 4 MHz for this particular wiring configuration.
The purpose of the bandpass filter is to shape the transmit signal according to
the defined PSD, as shown in Figure 7.3. These frequency characteristics of the
bandpass filter will help to minimize band noise in the receive path. The in-
band PSD level is 62 dBm/Hz. This PSD level is designed to achieve satisfying
transmission performance over average condition in-house wiring while
minimizing interference to other transmission systems such as those in the
Amateur Radio band. For in-house wiring with higher attenuation, this PSD
level can be raised to 56 dBm/Hz. Because the symbol is a modulated
passband signal, an envelop detection circuit is used for all threshold
identification and data detection purposes.
Figure 7.7 shows the received signal in time domain along with the
transmitted signal scaled down by 10 times in magnitude. In comparison, the
received signal is attenuated by about 20 dB. The pulse duration is about 3 µs
compared with about 2 µs for the transmitted signal. The extra duration is
caused mainly by reflection. To examine the intersymbol interference, we
compare the symbol duration with the average symbol period. The average
symbol period is about 6 µs. The reflection has died out before the next symbol
arrives. To examine the accuracy of symbol position detection, we look at the
pulse rise time in comparison with the TIC interval. The rise time is about 0.6
µs. Because the TICs are 7/60 µs apart, rising peaks are well separated.
Equation 7.8
Equation 7.9
Equation 7.10
Equation 7.11
Equation 7.12
By replacing the variable x with x/s in Equation 7.11 we have
Equation 7.13
For SNR = 48 dB, we have SNR 63095, , and the probability of error
is
Equation 7.14
For SNR = 28 dB, we have SNR 631, , and the probability of error
becomes
If for some reason, such as a higher receiver front-end electronic noise level
combined with a higher channel attenuation, the SNR dropps to 15 dB, and we
then have SNR 31.6, , and a probability of error of
This analysis shows that a HomePNA 1.0 transmission system can operate
reliably under a relatively low SNR unless effects of extensive reflections come
into play in forms of intersymbol interference or a retarded rising time. This
analysis is based on background white noise. Impulse noise with a magnitude
close to that of the received signal can also cause transmission errors.
The original in-house wiringbased transmission proposal from Tut Systems for
the HomePNA 1.0 is a baseband system. Each symbol was a continuous pulse
(instead of a sequence of positive and negative pulses with a period of about
0.1333 µs). Figure 7.8 shows the received baseband pulse compared with the
transmitted symbol formed by sending a rectangular pulse through a low-pass
filter. The transmitted and received symbols have the same scale. Over the
same test wiring configuration, the baseband symbol is only slightly
attenuated. The peak attenuation is only about 2 dB compared with the
passband attenuation of about 20 dB. The move of the spectrum to a passband
with a center frequency of 7.5 MHz was necessary for spectrum compatibility
with Asymmetrical Digital Subscriber Line (ADSL). Because the attenuation is
much lower, the baseband method should have a better performance in terms
of either a higher transmission throughput or a longer transmission distance.
The HomePNA 1.0 allows Ethernet packets to be transported over existing in-
house telephone wiring, with no modifications, using the standard Ethernet
CSMA/CD-based Media Access Control procedures as specified in the IEEE
802.3 standard. A HomePNA 1.0 physical layer to 802.3 MAC interface is
defined as shown in Figure 7.9.
Much like the MII, a transmit path and a receive path are defined separately
with transmit clock, TxClk, and receive clock, RxClk, both from the physical
layer. In contrast, only a single bit, instead of 4 bits, is defined for both
transmit and receive data paths and the Receive Data Valid, RX_DV, pin is
omitted. There are also a Carrier Sense pin, CarSns, and a Collision Detection
pin, Coll, defined for the HomePNA 1.0 to MAC interface. There are no
management pins defined over this interface. A HomePNA 1.0 transceiver can
be managed by either remote controlword management commands embedded
in the AID header over the wire network or management messages from
attached host hardware.
7.2 HomePNA 2.0 QAM
The establishment of the HomePNA 1.0 standard was a success story for a
group of industry promoters and supporters. These efforts involved laboratory
testing, field verification, and compromising. Right after the confirmation of
the HomePNA 1.0, the HomePNA consortium started the standardization effort
of HomePNA 2.0 for a higher transmission throughput. It was the goal that the
2.0 version should be backward-compatible with the 1.0 version. Many
participating companies have contributed individually or jointly. The joint
technology proposal from Epigram and Lucent was selected as the base for the
HomePNA 2.0 specifications. Because of its successful proposal, Epigram was
subsequently bought by Broadcom. Very few knew that Epigram partially
bought the idea of a telephone wiringbased home network from Travetim.
Travetim was a start-up founded by Pete Foley with funding from Benchmark
capital. I was involved with the feasibility analysis of a high-throughputCAP
(Carrierless AM/PM)-based transmission system over the existing in-house
wiring for Travetim. My early analysis showed that a telephone wiringbased
home network transmission system had a channel capacity of about 100 Mbps
and that a practical system can be implemented at 30 Mbps with the adaptive
equalization technique.
The HomePNA 2.0 [3], [4] signaling method can also be analyzed by
examining its frame structure as shown in Figure 7.10. A HomePNA 2.0
transmitter encapsulates the binary information of an Ethernet packet by
adding a starter and a trailer to it. The starter consists of 16 bytes for
Preamble64 and 4 bytes for Frame Control. The starter and the Destination
Address (DA), Source Address (SA), and Type of an Ethernet packet combined
together become the header of a HomePNA 2.0 packet. Header information is
encoded with the 2-Mbaud FDQAM for a better interference tolerance. The
trailer consists of 2 bytes of CRC16, variable bytes of PAD, and 1 byte of EOF
(End of Frame). CRC16 and PAD are encoded with the same constellation as
the preceding Ethernet Data. The EOF is also encoded with the 2-Mbaud
FDQAM.
The FT is a mechanism for providing forward compatibility, and is all zero bits
for HomePNA 2.0. RSVD is set to zero by a transmitter and is ignored by a
receiver. The 3-bit PRI refers to the absolute priority that a specific frame will
be given when determining media access. Priority 7 has preferential access
over Priority 0. SI contains the bit pattern for initializing the scrambler. PE
decides the baud rate and the constellation size with 1 through 7 defining a
baud rate of 2 MHz and 9 through 15 defining a baud rate of 4 MHz both with
2 to 8 bits per baud. A smaller PE number indicates a lower transmission
throughput. HCS is computed as a function of the 128-bit sequence in
transmission order starting with the FT bits and ending with the Ethernet SA
bits, with zeros substituted for the uncomputed HCS field. The encoding is
defined by
Equation 7.15
Equation 7.16
Equation 7.17
The incoming bits are grouped into N-bit symbols, where N is the number of
bits per baud specified in the PE field. Constellation sizes range from QPSK, 8-
phase SK, 16 QAM, 32 QAM, 64 QAM, 128 QAM, up to 256 QAM for 2 bits, 3
bits, 4 bits, 5 bits, 6 bits, 7 bits, and 8 bits per symbol, respectively. Symbols
at 4 MBaud are transmitted at 0.707 times the amplitude of symbols at 2
MBaud. The carrier frequency for these constellations is 7 MHz. FDQAM is
promoted in HomePNA 2.0 specifications as a low-complexity modulation
scheme for improving the performance of uncoded QAM by a few decibels
under conditions where a part of the signal spectrum is severely attenuated.
FDQAM is simply QAM in which the baud rate is less than half the spectral
bandwidth of the transmit filter. The 2-Mbaud FDQAM signal is generated by
inserting zeros between every 2-Mbaud symbol while passing the same
transmitter filter with a passband designed for the 4-Mbaud symbols. With a
higher amplitude but only half of the rate, a 2-Mbaud symbol sequence
produces about the same line voltage as a 4-Mbaud symbol sequence does.
The line voltage of HomePNA 2.0 signal is defined to be less than 15 dBVrms
across a 135-ohm load and to be within 0.58 and +0.58 volt peak to peak.
This line voltage limitation leads to a HomePNA PSD of less than 71.5 dBm/Hz
as shown in Figure 7.13 for the frequency band of between 4 and 10 MHz. A
spectrum notch of equal to or larger than 10 dB is defined between 7 and 7.3
MHz to minimize the interference to Amateur Radios.
In the transmit path, groups of binary information bits are first framed,
scrambled, encoded into symbols, and then modulated into passband in the
DSP part of a HomePNA 2.0 transceiver. The gap insertion is required for the
compatibility mode. After scrambling, bits are encoded into symbols.
Depending on the transmission throughputs, between 2 to 8 bits can be
encoded into each symbol. For a baud rate of 2 MHz, this corresponds to
transmission throughputs of between 4 and 16 Mbps. At a 4-MHz baud rate,
the transmission throughput can be as high as 32 Mbps. The hybrid circuit can
provide at least 15 dB of attenuation and is necessary for collision detection.
In the receive path, ADC converted samples are equalized, demodulated into
symbols, decoded into a bit stream, descrambled into the original data bits,
and deframed. A gap removal function is also required for compatibility mode.
Equation 7.18
For 16 QAM, additional constellation points are at (+3, +1), (+3, +3), (+1,
+3), (1, +3), (3, +3), (3, +1), (3, 1), (3, 3), (1, 3), (+1, 3), (+3, 3), and (+3,
1). The average signal power is proportional to
Equation 7.19
Equation 7.20
where n is the number of bits the constellation can carry. n = 2 for 4 QAM, n =
4 for 16 QAM, n = 6 for 64 QAM, and n = 8 for 256 QAM. On the other hand,
an error occurs when the addition of noise causes the result signal (signal plus
noise) to fall into the region of the adjacent constellation point. This means
the magnitude of noise exceeds 1 in either the x or y direction. Therefore, the
probability of error can be expressed by
Equation 7.21
where s is the noise power and is the noise power in each of x and y
directions. By replacing variable x with , Equation 7.21 can also be
expressed as
Equation 7.22
Equation 7.23
where n is the number of bits each symbol can carry. This expression in
general also applies to constellations encoded with an odd number of bits. The
required SNR for a 4 QAM constellation at an error rate of 1 x 10-7 is about
14.6 dB. Using the scaling factor of 3/(2n 1), we can infer that the required
SNR is about 33.9 dB for a 256 QAM constellation also at an error rate of 1 x
10-7. Table 7.2 shows scaling factors, in terms of dB, relating the 4 QAM to
other constellation sizes. Table 7.3 shows typical desired probabilities of errors
for the 4 QAM constellation and corresponding SNR. With these two tables, the
required SNR at a particular error rate can be estimated for the majority of
popular constellation sizes.
4 2 0
8 3 3.68
16 4 6.99
32 5 10.14
64 6 13.22
128 7 16.27
256 8 19.29
The shaping, upsampling low-pass filter converts the baud rate to the sampling
rate and is usually designed according to the square-root Nyquist function.
Coefficient values of a square-root Nyquist shaping filter can be described by
Equation 7.24
where a controls the excessive bandwidth (i.e., the slope of the band edge)
and n is the upsampling rate. For a symbol rate of 2 MHz and a shaping filter
sampling rate of 24 MHz, the upsampling rate is n = 12. There is one
discontinuity at k = 0. The value at k = 0 is calculated using
Equation 7.25
Spectrum-shaping filters consist of a notch filter for reducing the PSD within
the 7- to 7.3-MHz Amateur Radio band and an analog aliasing suppression
bandpass filter for meeting the out-of-band PSD mask of the 140-dBm/Hz
requirement.
Equation 7.26
At about 90 Mbps, the channel capacity is about nine times the nominal 10
Mbps throughput of HomePNA 2.0.
Under the compatibility mode, all HomePNA 2.0 transceivers can send packets
conforming to the compatibility frame to each other and exchange HomePNA
1.0 packets with HomePNA 1.0 transceivers based on the basic 802.3 MAC
protocol recommended by the HomePNA 1.0 specifications. On the other hand,
there are eight priority levels defined for a HomePNA 2.0 transceiver only
environment. Different priority levels are distinguished by the number of time
slots a transceiver has to wait before attempting transmission after sensing a
quiet medium. There are eight time slots, which are defined as shown in
Figure 7.21. The highest priority level is priority 7, and the lowest is priority 0.
A transceiver with priority 7 can attempt to transmit right after the IFG
(InterFrame Gap), while the one with the lowest priority must wait for an
additional seven time slots, each of which lasts 21 µs. High priority levels can
be assigned to timing-sensitive packets, such as those of video or audio, such
that random data packets with lower priorities would not interrupt timing-
critical applications.
With the help of a good hybrid circuit, a HomePNA 2.0 transceiver is expected
to detect a collision of its own packet with another one of up to 36 dB lower
signal level from a distant transceiver. After a collision is detected, the
transceiver terminates the packet with an EOF right after the Ethertype field.
Thus a collided packet lasts about 70 µs while a valid packet lasts at least 92.5
µs. For a HomePNA 2.0 transceiver without the priority capability, the waiting
time after sensing a quiet medium is set to the equivalent of priority 2. The
basic 802.3 MAC protocol requires a counter for the collision resolution
procedure to decide when to resend the same packet. Eight collision resolution
counters are required for the HomePNA 2.0 priority protocol. The priority level
of a collision can be inferred from the priority slot where the collision occurs.
The corresponding counter can then be used properly.
The physical layer and the MAC layer of a HomePNA 2.0 transceiver can be
implemented separately. In fact, the Ethernet MII can be utilized to separate
the HomePNA 2.0 physical layer from the MAC layer. A 802.3 MAC chip with an
MII can be used in conjunction with a HomePNA 2.0 physical layer chip to build
a HomePNA 2.0 transceiver. Because only two fixed clock rates are specified
for 10- and 100-Mbps versions of Ethernet and the transfer rate of HomePNA
2.0 can be higher than 10 Mbps while lower than 100 Mbps, an innovative way
of using the CRS is necessary to utilize the 25-MHz clock. When transmitting,
the HomePNA 2.0 physical layer asserts CRS some time after TX_EN comes
true but drops CRS after TX_EN becomes false and when the physical layer is
ready to receive another packet from the MAC. Only after CRS falls will the
MAC assert TX_EN after a time out of 0.96 µs if there is another packet to
send. The MAC can thus be held back to match the physical layer's
transmission speed. On the other hand, the COL (collision detection) signal is
not used by a HomePNA 2.0 physical layer. In other words, the collision
resolution procedure can be implemented in the HomePNA 2.0 physical layer
chip.
x=[0:0.01:100];
for i=100:1000
Pe(i)=0.01*sqrt(2/pi)*sum(exp(-0.5*x(i:10000).^2));
end
x=[-35:35]/7;
alp=0.5;
gx=(sin(pi*(1-alp)*x)+4*alp.*x.*cos(pi*(1+alp).*x))./(pi*x.*(1-(4*al
gx(36)=(1-alp)+4*alp/pi;
figure(1)
plot(gx)
xlabel('Filter Coefficients')
[gf,w]=freqz(gx,1,100);
figure(2)
plot([1:100]/100*20e6, 20*log10(abs(gf)))
grid
xlabel('Frequency (Hz)')
ylabel('Magnitude (dB)')
logh1=20*log10(abs(H1(1:1025)));
logh2=20*log10(abs(H2(1:1025)));
SNR1=logh1+140-72;
SNR2=logh2+140-72;
figure(4)
plot(f,SNR1,f,SNR2)
grid
xlabel('Frequency (Hz)')
ylabel('SNR (dB)')
gtext('Loop #6')
gtext('Loop #8')
capci1=sum(log2(1+10.^(SNR1(204:512)/10)))*20e6/1025
capci2=sum(log2(1+10.^(SNR2(204:512)/10)))*20e6/1025
7.3.4 HCS
%Variable initialization
gx=[1 1 1 0 1 0 1 0 1];
hx=[1 1 1 1 0 1 1 1];
FT=[0 0 0 0 0 0 0 0];
RSVD=[0];
PRI=[0 1 0];
SI=[0 1 0 0];
PE=[0 0 0 0 1 0 1 0];
HCS=[0 0 0 0 0 0 0 0];
FC=[FT RSVD PRI SI PE HCS];
DA=ceil(rand(1,48)*2-1);
SA=ceil(rand(1,48)*2-1);
FC2SA=[FC DA SA];
%Mathematically, the CRC value corresponding to a given frame
%is defined by the following procedure.
% The first 8 bits of the input bit sequence are complemented.
FC2SA(1:8)=bitcmp(FC2SA(1:8),1);
% The 128 bits of the sequence is multiplied by x^8 and
% divided
% by G(x), producing a remainder R(x) of degree <= 7.
FC2SA=[FC2SA zeros(1,8)];
rx=FC2SA(1:8);
for i=1:128
nm=[rx FC2SA(i+8)];
if nm(1)==1
rx=xor(nm(2:9),gx(2:9));
else
rx=nm(2:9);
end
end
% R(x) is multiplied by H(x) to produce N(x)
nx(1:8)=rx;
for i=1:7
if hx(i+1)==1
nx(i+1:i+7)=xor(rx(1:7),nx(i+1:i+7));
nx(i+8)=rx(8);
else
nx(i+8)=0;
end
end
% N(x) is divided by G(x), producing a remainder R'(x) of
% degree <= 7.
rrx=nx(1:8);
for i=1:7
nm=[rrx nx(i+8)];
if nm(1)==1
rrx=xor(nm(2:9),gx(2:9));
else
rrx=nm(2:9);
end
end
% The bit sequence is complemented and the result is the CRC'.
rrx=bitcmp(rrx,1);
%The 8 bits of the CRC' are placed in the HCS field so that x^7
%is the least-significant bit of the octet and x^0 term is the
%most-significant bit of the octet. The bits of the CRC' are
%thus transmitted in the order x^7, x^6, .. x^1, x^0.
7.3.5 CRC16
%Variable initialization
gx=[1 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 1];
x=ceil(rand(1,1000)*2-1);
x=[x zeros(1,16)];
%Mathematically, the CRC value corresponding to a given frame
%is defined by the following procedure.
% The first 16 bits of the input bit sequence are
% complemented.
rx=bitcmp(x(1:16),1);
% The bit sequence is divided by G(x), producing a remainder
% R(x) of degree <= 15.
for i=1:1000
nm=[rx x(i+16)];
if nm(1)==1
rx=xor(nm(2:17),gx(2:17));
else
rx=nm(2:17);
end
end
rx=bitcmp(rx,1);
%SYMBOL ENCODING
SEQ16=[1 1 1 1 1 1 0 0 0 1 0 0 1 0 0 0 0 0 1 1 0 0 0 0 1 0 0 0 0 1 0
PREA64=[SEQ16 SEQ16 SEQ16 SEQ16];
% Call for hcs.m routine
hcs
FC=[FT RSVD PRI SI PE rrx];
ET=ceil(rand(1,16)*2-1);
EOF=[1 1 1 1 1 1 0 0];
PKT=[PREA64 FC DA SA ET EOF];
%2 Mbaud with zero insertion
x=zeros(1,280);
x(1:2:280)=PKT(2:2:280)*2-1;
ak=x;
y=zeros(1,280);
y(1:2:280)=PKT(1:2:280)*2-1;
bk=y;
%MODULATION
%7 times up sampling
xup7=zeros(1,1960);
xup7(1:7:1960)=x;
yup7=zeros(1,1960);
yup7(1:7:1960)=y;
% Call for filter gx routine
sqnqf7
xfilt=conv(xup7,gx);
yfilt=conv(yup7,gx);
t=[0:2128]/28e6;
cos2pift=cos(2*pi*7e6*t);
sin2pift=sin(2*pi*7e6*t);
xcos=xfilt.*cos2pift(1:2030);
ysin=yfilt.*sin2pift(1:2030);
ft=xcos+ysin;
%PASSING CHANNEL
% Get channel impulse response
load loop8
%loop8=zeros(100,1);
%loop8(13:15)=[0.5 1 0.5];
ftlp=conv(loop8,ft);
%DEMODULATION
xlp=ftlp.*cos2pift;
ylp=ftlp.*sin2pift;
xlpf=2*conv(xlp,gx);
ylpf=2*conv(ylp,gx);
xlpfd=xlpf(70:7:2199);
ylpfd=ylpf(70:7:2199);
%EQUALIZER INITILIZATION
rxx=zeros(20,20);
ryy=zeros(20,20);
rxy=zeros(20,20);
ryx=zeros(20,20);
rax=zeros(20,1);
ray=zeros(20,1);
rbx=zeros(20,1);
rby=zeros(20,1);
xk=zeros(20,1);
yk=zeros(20,1);
for i=1:128
xk(:,1)=xlpfd(i:i+19)';
yk(:,1)=ylpfd(i:i+19)';
rxx=rxx+xk*xk'/128;
ryy=ryy+yk*yk'/128;
rxy=rxy+xk*yk'/128;
ryx=ryx+yk*xk'/128;
rax=rax+ak(i)*xk/128;
ray=ray+ak(i)*yk/128;
rbx=rbx+bk(i)*xk/128;
rby=rby+bk(i)*yk/128;
end
eq=inv([rxx rxy; ryx ryy])*[rax' ray']';
eq1=inv([ryy ryx; rxy rxx])*[rby' rbx']';
eqi=eq(1:20)/2+eq1(1:20)/2;
eqx=eq(21:40)/2-eq1(21:40)/2;
%ADAPTIVE EQUALIZATION
for i=1:280
xf=xlpfd(i:i+19);
yf=ylpfd(i:i+19);
xout(i)=xf*eqi+yf*eqx;
yout(i)=yf*eqi-xf*eqx;
e1=ak(i)-xout(i);
e2=bk(i)-yout(i);
eqi=eqi+0.001*xf'*e1;
eqx=eqx+0.001*yf'*e1;
eqi=eqi+0.001*yf'*e2;
eqx=eqx+0.001*xf'*e2;
end
figure(1)
plot([1:280],xout)
xlabel('Real Data')
figure(2)
plot([1:280],yout)
xlabel('Imaginary Data')
figure(3)
plot([1:20],eqi,[1:20],eqx)
xlabel('Equalizer Coefficients')
%DATA RECOVERY
for i=1:280
if xout(i)>0
xr(i)=1;
else
xr(i)=0;
end
if yout(i)>0
yr(i)=1;
else
yr(i)=0;
end
end
PKTR=zeros(1,280);
PKTR(2:2:280)=xr(1:2:280);
PKTR(1:2:280)=yr(1:2:280);
7.4 References
The structure of a 1394 serial bus is unique in that the transmission media,
consisting of many point-to-point connections between pairs of individual
ports, are shared through the repetition of packets received on one port to
other active ports by each node. The topology of a 1394 serial bus resembles a
tree with many intermediate nodes located at branching joints and a single
node at the root. All requests for transmission are either filtered out by
intermediate nodes or propagated to the root node for an arbitration decision.
A permission to transmit is granted by the root node and delivered through
intermediate nodes. The configuration of the tree structure and the election of
a root node are automatically carried out during the initialization process and
after each bus reset whenever a new port joins the 1394 serial bus. An
isochronous packet transmission interval is allocated ahead of the
asynchronous interval during each cycle, and these transmission cycles are
repeated under the guidance of the cycle master who periodically sends cycle
start packets.
8.1.1 Topology
The FireWire transmission system is also called Serial Bus in the IEEE 1394-
1995 standards document. A serial bus is different than a serial connection
such as RS232, which makes point-to-point connections only. A serial bus is
not a conventional bus where multiple devices share a common transmission
medium directly. A serial bus connects devices over multiple sections of serial
links organized by a communications protocol. The USB (Universal Serial Bus)
is another instance of a serial bus. The FireWire serial bus technology
addresses both backplane (interior to a computer or communication device)
and cable-based transmission physical layers. We only discuss the cable-based
physical layer in this chapter. A communication or computing device can have
more than one FireWire port. A tree and branch topology is formed when these
FireWire ports are interconnected among multiple devices as shown in Figure
8.1. A device can talk to another via these connections. Once permission is
granted, a device transmits a packet to its direct neighbors, and they repeat
the transmission to their neighbors located further away. Such a device can
reach another over multiple devices and links in between.
Because of this unique random tree and branch topology, a connection might
need to pass through multiple ports of a device. These power wires are
necessary to keep those ports active even when the associated communication
or computing device is not powered on. A FireWire cable with power wires is
terminated by a unique six-pin plug at each end as shown on the left side of
Figure 8.3. Shields of twisted pairs are connected to the power ground while
the external shield is linked to metal parts of plugs at both ends. Another type
of four-pin plug for terminating FireWire cables without power wires is shown
on the right side of Figure 8.3
A device with FireWire ports can be considered as a node in the tree branch
configuration. A node with only one connection is called a leaf, and a node with
more than one connection is called a branch. A node can have a parent port
and a number of child ports. A leaf has only one active parent port. A branch
has one active parent port and a number of active child ports. The root of the
tree has only active child ports. The role of each node, be it a leaf, a branch, or
a root, is identified during the serial bus initialization process when multiple
devices are interconnected and powered on. After each node is identified, the
request for packet transmission over this serial bus is passed up to the root,
and the decision for which device to transmit is initiated at the root.
The serial bus initialization process is carried out in three phases: bus
initialization, tree identification, and self-identification. The initialization
process starts when two nodes are initially connected and repeats whenever a
new node joins in. During the bus initialization phase, a bus reset signal forces
all nodes into a special state that clears all topology information and thereafter
identifies only if each node is a branch, a leaf, or not connected, as indicated
by Figure 8.4. In this example, three nodes with only one active port each are
identified as leaves, and two nodes with more than one active port are
identified as branches.
A node is elected as the root during the tree identification phase, and all active
ports of other nodes are identified as either a parent or a child port depending
on whether their connected port is closer to the root as shown in Figure 8.5,
where "p" and "ch" stand for parent and child ports, respectively. To elect a
root, all leaf nodes send parent notifications to their connected ports first.
Branch nodes that received parent notifications from leaf nodes send child
notifications as confirmations. Meanwhile, branch nodes send parent
notifications through remaining ports. A branch node that received a parent
notification before sending out its own parent notification over the same port
confirms the child-parent relationship by acknowledging with a child
notification. A root contention process starts when two branch nodes
exchanged their parent notifications. Each branch node waits a random time
before sending out another parent notification during the root contention
process. The node that received a parent notification first becomes the parent
of the pair in the contention.
Figure 8.14. Root Withdraws the Grant (From IEEE Std. 1394-
1995. Copyright © 1995 IEEE. All rights reserved.)
Because there is no collision, for at least one request is granted immediately
among multiple devices having pending packets, and no random backoff
procedure is involved, the efficiency of the FireWire multiple access process
can be calculated based on arbitration duration a, gap time g, and packet
length p. We have
Equation 8.1
For, a = 2.6, ms, g = 10 ms, and a long packet of p = 160 ms, the efficiency is
about
Equation 8.2
The efficiency decreases when the packet becomes shorter as a result of fewer
bits or higher transmission throughput. For example, for p = 40 ms,
representing a transmission throughput of 400 Mbps, we have
Equation 8.3
8.2 1394-1995 Cable Physical Layer Attributes
The 1394 shielded twisted pair cable-based physical layer can be characterized
by its packet format, transceiver circuit, DATA/STROBE line code, and PSDs.
There are three subtypes of physical layer packets: self-ID (xx = 10), link-ON
(xx = 01), and PHY configuration (xx = 00). The body of the first self-ID
packet contains information on link active indication, gap_cnt, transmission
throughput capabilities, a delay parameter, link management capability, power
supply capabilities, and port status. Gap_cnt is a value used for calculating
subaction and reset gap timing. Up to three additional self-ID packets can be
delivered if a node has more than 3 ports to reveal the status of up to 27
ports. The body of a link-ON packet consists of 3 zero-bytes. The body of a PHY
management packet has 1 byte consisting of an R bit, T bit, and 6-bit gap_cnt
followed by 2 zero-bytes. The R bit is used to set up a root, and the T bit is
used to set up the gap_cnt.
CRC for header and data of both asynchronous and isochronous packets is
implemented using the same generator polynomial as that used by the
Ethernet:
Equation 8.4
The same CRC generation and checking procedures are also adapted. The CRC
values are generated with the following procedures.
The data sequence is transmitted using binary nonreturn to zero (NRZ) pulses.
Instead of using the conventional data and clock signaling, the data sequence
is sent via twisted pair B and a strobe sequence is sent via twisted pair A. The
strobe sequence changes from 0 to 1 and vice versa whenever two consecutive
data bits are the same as shown in Figure 8.22. This encoding mechanism
ensures that transitions occur every bit interval among both pairs. At the
receiver side, the clock can be recovered by the exclusive OR operation of data
and strobe sequences. The amplitude of data and strobe signaling voltage is in
the range of 172 to 265 mV for 1 and 172 to 265 mV for 0.
Equation 8.5
where T is the period of a bit. PSDs for S100, S200, and S400 are shown in
Figure 8.23 with u = 0.2 V and R = 110 ohms.
Figure 8.23. FireWire Power Spectrum Densities
8.3 Highlights of 1394b
UTP5 100 m x
POF 50 m x x
HPCF 100 m x x
MMF 100 m x x x
STP 4.5 m x x x
When transmission rates extend into the gigabit per second range and
interconnect distances approach 100 m, the bus efficiency attainable with the
subaction gapbased arbitration mechanism becomes unacceptably low. The
new specification improves the bus efficiency by taking advantage of the full-
duplex nature of Beta mode signaling to implement a new BOSS arbitration
method. In BOSS operation, arbitration request signaling is overlapped with
data transmission on the full-duplex bus, and both isochronous and
asynchronous requests may be pipelined for servicing in the succeeding
isochronous or asynchronous intervals, respectively. Figure 8.24 illustrates the
general concept of BOSS operation and shows how arbitration signaling is
overlapped with data transmission on the full-duplex bus.
In the BOSS arbitration mode, the start of the isochronous interval is marked
by a CYCLE_START_EVEN/CYCLE_START_ODD control symbol transmitted by
the cycle master and the gap between isochronous and asynchronous intervals
is replaced by an ASYNC_EVEN/ASYNC_ODD control symbol sent by the BOSS
that finished the last isochronous packet transmission. The purpose of
alternating CYCLE_START_EVEN and CYCLE_START_ODD or ASYNC_EVEN and
ASYNC_ODD symbols is to distinguish the current transmission interval from
the next one. For example, a request for transmission of an asynchronous
packet during the next transmission interval can be made by using the
NEXT_ODD request symbol during an even interval. A control symbol consists
of 4 bits. Bit combinations are 0001, 0010, 1101, and 1110 for
CYCLE_START_EVEN, CYCLE_START_ODD, ASYNC_EVEN, and ASYNC_ODD,
respectively. We also have bit combinations of 1000, 1011, 1010 (or 1001),
and 0101 for GRANT, GRANT_ISOCH, DATA_PREFIX, and DATA_END as control
symbols, respectively. The choice of 1010 or 1001 for DATA_PREFIX depends
on whether the running bias is larger or smaller than 0. A request-to-transmit
symbol consists of an isochronous request part of 3 bits and an asynchronous
request part of 3 bits. Bit combinations are 001, 010, 100, 101, and 110 for
CURRENT, NEXT_EVEN, NONE_ODD, NEXT_ODD, and NONE_EVEN
asynchronous requests, respectively. Bit combinations are 00xx1, 01xx0,
10xx0, and 11xx0 for ISOCH_CURRENT, ISOCH_NONE, ISOCH_EVEN, and
ISOCH_ODD isochronous requests, respectively. A request symbol of 8 bits is
formed by concatenating an asynchronous request, as first 3 bits, and an
isochronous request, as next 5 bits.
Control and request symbols are scrambled before being transmitted over the
media. A common scrambler with the following generator polynomial is used
for control/request symbols as well as for data packets:
Equation 8.6
These 4 bits of a control symbol are exclusive ORed with those 4 even bits of a
group of 8 bits from the scrambler. A 4-bit scrambled control symbol is then
encoded into a 10-bit character, named Cx for x = 0, 1, 2, . . . , 15, according
to Table 8.2 for transmission over the media. Sometimes, the transmission of a
control symbol is repeated to ensure proper propagation over connections with
low transmission rates.
On the other hand, these 8 bits of a request symbol are exclusive ORed with a
group of 8 bits from the scrambler. In addition, sixth and seventh bits of a
scrambled request symbol are set to zeros. An 8-bit scrambled request symbol
is encoded into a 10-bit character, named Dx.y for x = 0, 1, 2, . . . , 31, and y
= 0, 1, 2, . . . , 7, according to these 8B10B rules, to be discussed shortly, for
transmission over the media.
The 1394b bus initialization process is also carried out in bus initialization,
tree identification, and self-identification phases. During the 1394b bus
initialization phase, those nodes with only one active port are identified as
leaves, and those nodes with more than one active port are identified as
branches. Similarly, a node is elected as the root during the 1394b tree
identification phase, and all active ports of other nodes are identified as either
a parent or a child port depending on if their connected port is closer to the
root. The election of a root begins by all leaf nodes sending a PARENT_NOTIFY
request, 11000xx0, to their connected ports. Branch nodes that received
PARENT_NOTIFY requests from leaf nodes send CHILD_NOTIFY requests,
01000xx0, as confirmations. Meanwhile, branch nodes send PARENT_NOTIFY
requests through remaining ports. If a branch node receives a PARENT_NOTIFY
request before sending out its own over the same port it confirms the child-
parent relationship by acknowledging with a CHILD_NOTIFY request. The root
contention process is used to resolve the situation when two branch nodes
exchange their PARENT_NOTIFY requests. During the 1394b self-identification
phase, each node selects a unique ID number and sends one to three short
self-identification packets over the serial bus to any management entity.
To accommodate higher rates, two new 1394b short cables have been defined
along with these new connectors. These two new 1394b cables still consist of
two shielded twisted signal pairs and one pair of power wires. The stranded
copper wire of twisted signal pairs for the 4.5-m version of new cable is 25
AWG and associated power stranded copper wire is 22 AWG. Each stranded
copper wire still consists of seven conductors. These conductors are 33 AWG
for twisted pairs and 30 AWG for power wires, respectively. The stranded
copper wire of these twisted pairs for the 2-m version of new cable is 30 AWG
and the associated power stranded copper wire is 26 AWG. Each stranded
copper wire also consists of seven conductors. These conductors are 38 AWG
for twisted signal pairs and 34 AWG for power wires.
The maximum voltage level delivered by a line driver over a 1394b shielded
twisted pair is 800 mV for baud rates of about 491, 983, and 1966 MHz
corresponding to data rates of S400b, S800b, and S1600b* respectively, where
b denotes the Beta mode. The 20% overhead for these higher baud rates is
due to the 8B10B encoding. Power spectrum densities for 1394b at these baud
rates can be calculated according to
Equation 8.7
where T is the period of baud rate. PSDs for S400b, S800b, and S1600b are
shown in Figure 8.29 with u = 0.8 V and R = 110 ohms.
Replacing the line driver and the receiver amplifier of those used for 1394b
shielded twisted pair with a combination of a MLT-3 encoder, a transmit filter,
and a line driver for unshielded twisted pair and another combination of a
corresponding receiver amplifier, an adaptive channel equalizer, a timing
recovery circuit, and a 3-level decoder, the 1394b signal can be carried over
Category 5 twisted pair cable at a maximum distance of 100 m as shown in
Figure 8.30. Detailed requirements of MLT-3 transmission and reception can be
found in ANSI X3.263-1995 standards document. Implementation and
transmission performance of this MLT-3 line codebased transceiver are similar
to those of 100BaseTX. These new 1394b 8B10B encoding and arbitration
techniques have made the choice of the transmission media relatively
independent to the rest of transceiver design.
The same RJ45 connector is also used for the Category 5 twisted pair
cablebased 1394b transmission system. However, twisted pairs connected to
pins 1/2 and to pins 7/8 are used to distinguish 1394b signals from those of
100BaseTX. The line voltage level of ±1 V and rising/falling time of 4 ns as
defined for 100BaseTX are also adapted. Consequently, the corresponding PSD
should be the same as that of 100BaseTX. This is also based on assumptions
that the use of 8B10B instead of 4B5B encoding and the order of scrambling
and encoding do not affect PSD.
8.5 MATLAB Files
f=[0:1000]/1000*4e8;
k=0.2^2/110/0.001;
T1=1/98.304e6;
T2=T1/2;
T3=T2/2;
PSDs1=10*log10(k/T1*((sin(pi*f*T1)).^2./(pi*f).^2));
PSDs2=10*log10(k/T2*((sin(pi*f*T2)).^2./(pi*f).^2));
PSDs3=10*log10(k/T3*((sin(pi*f*T3)).^2./(pi*f).^2));
for i=1:1000
if PSDs1(i)<-140
PSDs1(i)=-140;
end
if PSDs2(i)<-140
PSDs2(i)=-140;
end
if PSDs3(i)<-140
PSDs3(i)=-140;
end
end
plot(f,PSDs1,f,PSDs2,f,PSDs3);
grid
xlabel('Frequency (Hz)')
ylabel('PSD (dBm/Hz)')
gtext('S100')
gtext('S200')
gtext('S400')
8.6 References
2. P1394b, IEEE Draft Standard for a High Performance Serial Bus (High Speed
Supplement).
Among many indoor power linebased communication systems, X-10 has found
applications mainly for home automation, where lights and other appliances
can be turned on and off via short command packets transmitted over the
power line. CEBus is an industry standard intended for the same home
automation and entertainment information distribution applications. CEBus
standards define multiple transmission systems over existing home wiring
(including telephone wiring, coaxial cable, and power line), radio frequency,
and infrared as well as a control application language called CAL. The power
linebased CEBus physical layer has found good applications in commercial
buildings as well as over the wiring of commercial trucks for relaying
information from different parts of a vehicle. Most recently, many attempts
have been made to carry broadband data traffic, equivalent to that of
Ethernet, over the indoor power line. After numerous field tests and trials, a
HomePlug specification has been established for a power linebased
transmission system capable of a throughput of more than 10 Mbps.
9.1 X-10
The X-10 technology was invented about 25 years ago by engineers with a
Scotland company. Pico Electronics Ltd. of Glenrothes, Scot-land, was founded
in the early 1970s for the growing electronic calculator market. Every time
Pico began a new project, it was given an experiment number. Experiments 1
through 8 were increasingly more complex calculator Integrated Circuits (ICs).
Experiment 9 was a project for a programmable record changer. This work was
done for BSR (British Sound Reproduction). Experiment 10, therefore the
name of X-10, was also requested by BSR to provide a wireless method of
remote control for its equipment. It was determined that wireless over existing
electrical wiring was better than other alternatives such as RF or Infrared. X
10 devices were first introduced to the U.S. market in early 1979 by a New
York mail order electronics company. X-10 devices were also later available
from Radio Shack (as Plug 'n' Power) and Sears. Today, many companies make
X-10-based home automation devices, such as switch and lamp modules,
available over Web sites and in electronics stores.
An X-10 switch module sends signals over existing electrical wiring to a lamp
module. X-10 modules can be either adapters that plug into wall outlets or
units that replace conventional manual devices. X-10 power line technology
transmits binary data in 1-ms bursts of 120 kHz during these zero-voltage
crossing points of the 60 Hz AC sine wave between positive or negative
transitions. The zero-crossing point was considered as having the least noise
and interference from other devices on the power line. For robustness, X-10
requires two zero crossings to transmit either a zero or one bit. Every bit
requires a full 60-Hz cycle; therefore, the X-10 transmission rate is limited to
only 60 bps. A complete X-10 command consists of two packets with a three-
cycle gap between each packet. Each packet contains two identical messages of
11 bits (or 11 cycles) each. Therefore, a complete X-10 command consumes 47
cycles, which yields a transmission time of about 0.7833 seconds. Because
signal bursts are operating in a relatively low frequency of 120 kHz, a
capacitive coupling bridge between different phases of an in-house electrical
wiring system might be necessary to minimize attenuations.
The Hail Req is transmitted to see if there are other X-10 systems within
listening range. This allows an installer to assign a different Housecode if a
Hail Ack is received. Ext Code 1 is for data and control. The Ext Code 1 is
followed by bytes that can represent analog data (after A to D conversion).
There should be no gaps between the Ext Code 1 and the following data bytes,
as well as no gaps between data bytes. The format and meaning of these data
bytes can be defined based on particular applications. Ext Code 2 is for meter
read and DSM. Ext Code 2 is also followed by data bytes with no gaps and is
variable in length. Ext Code 3 has been assigned for security message, but its
format has not yet been defined.
For all these house, number, and command codes, the 1 bit is a burst of 120
kHz on the first zero crossing followed by a silent zero crossing and the 0 bit is
a silent zero crossing followed by a burst on the next zero crossing as shown in
Figure 9.2. In particular, the 120-kHz burst lasts about 1 ms with a starting
tolerance of 0.2 ms while a receiver opens its detection window for about 0.6
ms.
The effort for a Consumer Electronics Bus standard was initiated during a
Washington, DC, hotel room meeting, sponsored by Electronics Industries
Alliance and attended by 12 members representing 12 different companies in
April of 1984. Similar to that of X-10, the original goal of CEBus was to
develop an infrared remote control standard. Not surprisingly, some parts of
the CEBus standards are used for residential and industrial control
applications. During 1986, GE's Homenet was selected as the foundation of
CEBus protocol. During 1988, an early version of the CEBus Power Line
physical layer was proposed using the 1-Kbps Amplitude Shift Keying (ASK)
technique. Some techniques for transmission over other media, such as
Twisted Pair (TP) and Coaxial Cable (CX), were also proposed thereafter. The
current version of the CEBus PL physical layer is based on Intellon's spread
spectrum technique proposed during 1991. A control application language was
adapted during 1998. CEBus standards were developed to interconnect
consumer electronic devices within a home and to link these devices to
services provided by external resources at a very economical cost. Details of
CEBus standards are described in EIA-600 documents [13].
Two components of these CEBus standards have achieved some limited success
in real-world applications. The first is the CEBus PL physical layer and the
second is the CAL. The CEBus PL physical layer can transmit data packets at
about 10 Kbps using a special type of spread spectrum technique. Each CEBus
PL packet contains sender and receiver addresses. The CEBus protocol uses a
peer-to-peer communications model so that any node on the network has
access to the media at any time. To avoid data collisions, it uses a Carrier
Sense Multiple Access/Collision Detection and Resolution (CSMA/CDCR)
protocol. CAL allows devices to communicate commands and status requests
between each other using a common command syntax and vocabulary. CAL
defines various electronic device functional subunits as contexts. For example,
the audio control of a TV, a stereo, a CD player, or a VCR is a CAL context.
Each context is further broken down into objects, which represent various
control functions of the context (e.g., volume, bass, treble, or mute functions).
Finally, objects are defined by a set of instance variables that specify the
operation of the function of the object, such as the default or current setting of
the volume object.
A common CEBus packet format, as shown in Figure 9.8, is defined for use on
all different physical layers. A CEBus packet always starts with a preamble for
synchronization purposes. The preamble is followed by the DLPDU (Data Link
Protocol Data Unit) header, which consists of a control field, a to-address, and
a from-address. The 1-byte control field can be used to request one of several
acknowledgments. The DLPDU header is followed by the NPDU (Network
Protocol Data Unit) header. The NPDU header can be 1 to 8 bytes and is used
to send segmentation or routing information. The NPDU header is followed by
the APDU (Application Protocol Data Unit) header. The APDU can be either 1
byte for nonsecure service requests or multiple bytes for security
authentication services. The APDU header is followed by a CAL message of
variable length. The CEBus packet ends with an FCS (Frame Check Sequence)
of 8 bits. This packet format reflects CEBus's protocol of five layers: CAL,
application, network, data link, and physical. The preamble field is terminated
with a PEOF (Preamble End Of Field) symbol. All other fields are separated by
an EOF (End Of Field) symbol and a CEBus packet is terminated by an EOP
(End Of Packet) symbol.
One and zero as well as some symbols with special meanings are all coded by
their durations of signaling as shown in Table 9.2. A CEBus UST (Unit Symbol
Time) is defined as 100 µs. A 1 bit consumes 1 UST and a 0 bit consumes 2
UST. Adjacent symbols and their durations are distinguished by alternating
Superio and Inferio states of signaling. Depending on a particular physical
medium, Superio and Inferio states can be represented with quite different
methods. For the CEBus PL physical layer, the Superio state is represented by
the normal phase of a spread spectrum burst, and the Inferio state is
represented by the opposite phase of the spread spectrum burst except for the
preamble period. For the CEBus CX physical layer, the Superio state is
represented by the presence of a 5.5-MHz carrier, for control information, and
the Inferio state is represented by the absence of the carrier.
One 100 1
Zero 200 2
EOF 300 3
PEOF 800 8
EOP 400 4
A chirp is a CEBus PL physical layer base signaling unit. The spread spectrum
characteristics of the CEBus PL physical layer is the result of the special
waveform of its chirp as shown in Figure 9.9. To achieve the maximum
autocorrelation gain in a CEBus receiver, the chirp waveform should be
constructed exactly 360 digitized points according to the CEBus standards [2].
A chirp waveform starts at 200 kHz and sweeps to 400 kHz, jumps to 100 kHz,
and then sweeps to 200 kHz. The complete waveform takes 25 cycles in 100
µs. The chirp waveform is limited to a peak-to-peak voltage of 7 V while the
out-of-band voltage should be less than 5 mV at below 100 kHz and below 1
mV above 400 kHz. This can be achieved with the help of additional bandpass
filters. With a load impedance of 10 ohms, the in-band PSD level of the CEBus
PL physical layer signal is about 27 dBm/Hz as shown in Figure 9.10.
The basic chirp waveform defined in the CEBus standards is used as the
Superio state. The Inferio state is represented by the absence of the waveform
during preamble only and by the phase inverse of the waveform in the rest of
the packet. In other words, a 0 bit is represented by the absence of the chirp
waveform for 200 µs during the preamble and by two inverted chirp
waveforms in the following fields. EOF and EOP can take either Superio or
Inferio waveforms depending on if the preceding last bit is 0 or 1, respectively.
The use of residential dual coaxial cable for exchanging control and data
information is also defined by the CEBus standards [3], but they are not
broadly recognized. The structure of Node 0 for the CEBus CX physical layer is
worth a close examination because any other residential coaxial cablebased
transmission system will face the same signal redistribution problem at a cable
TV entrance point. Figure 9.12 shows the coaxial cable portion of the Node 0
structure defined by the CEBus.
Because of the use of a block converter, the CEBus CX control signal can be
transmitted with a carrier frequency of 5.5 MHz and received at 4.5 MHz as
shown in Figure 9.13. Similarly, data information can be transmitted in the
frequency band of 54 to 150 MHz on the internal coaxial cable and received in
the 324- to 420-MHz band on the same coaxial cable. At a carrier frequency of
4.5/5.5 MHz, the Superio state is represented by the presence of the carrier,
and the Inferio state, by the absence.
The same redistribution problem can also be addressed with a simpler solution
as shown in Figure 9.14. We can leave the input port of a splitter open to let
the redistribution be taken care of by the natural reflection of the open port.
Because of the strong reflection, the external cable or off-the-air TV signal can
be connected to another output port of the splitter for distribution at its
original frequency.
The HomePlug MAC is a variant of the Carrier Sense Multiple Access with
Collision Avoidance protocol. The MAC uses a Virtual Carrier Sense (VCS)
mechanism to minimize the number of collisions. Upon receipt of a preamble in
the head, the receiver attempts to determine the duration of the packet and
wait accordingly. The destination receiver responds with a short
acknowledgment packet. If the source fails to receive the acknowledgment, it
assumes that a collision has occurred. When packets collide, the HomePlug
MAC uses a random back-off algorithm to resolve for the next transmitter. To
interconnect entertainment electronics, four different priority levels are
included in the HomePlug MAC. Higher priority levels can be assigned to
timing-sensitive packets, such as those of music, as compared to PC-oriented
data packets.
Equation 9.1
This sequence generator is initialized with all ones. The scrambled data bits
are then passed through a Reed-Solomon (255, 239, 8) or (255, 247, 4)
encoder, where the first number represents the code word size, the second
number the message size, and the third the number of correctable errors all in
bytes. The generator polynomial is g(x) = (x + a)(x + a2)...(x + a16) for
regular transmission modes and g(x) = (x + a)(x + a2)...(x + a8) for the
ROBO mode.
For rate 3/4 convolution-encoded data bits, a zero is inserted after the first pair
of xy bits and another is inserted after the second pair of yx bits in the
depuncturing process. Bits from a HomePlug convolution encoder depend on
their input bit as well as the current state, which is a collection of six previous
input bits. Instead of taking bits from each subcarrier as received data bits
directly, the Viterbi decoding algorithm exclusive ORs these bits with ideal bit
patterns from the current state to all possible next states. These results are
accumulated and kept for a few potential paths of different passing states until
a path with a significantly low sum of exclusive OR results can be identified.
After a correct path is identified, the bit sequence along that path is released
as correct received data bits.
When the size of an original data packet exceeds that available within a
HomePlug packet, a segmentation process is carried out in the source
transceiver to use multiple HomePlug packets to carry the data packet and a
reassembly process is carried out in the destination transceiver to put the data
packet together based on multiple received HomePlug packets. All
segmentation information such as segment length, segment count, and last
segment flag are contained in the segment control field of frame header. With
the segmentation information, a destination transceiver can reassemble the
data packet. Each correct reception of a normal packet is acknowledged by the
destination transceiver responding with a short packet.
Assuming that correct timing information can be recovered from the preamble,
the construction of a HomePlug simulation model for performance studies
mainly involves putting together functional blocks of Reed-Solomon as well as
convolution coding/decoding and FFT/IFFT. These functions, at a command or
block level (such as RSENCODE, RSDECODE, CONVENC, VITDEC, FFT, IFFT)
can all be found in Communications and Signal Processing tool boxes of
MATLAB and Simulink, respectively. To understand them for the purpose of
implementation, detailed realization procedures and steps of these functions
with HomePlug parameters are discussed in this section. Related MATLAB files
are also included at the end of this chapter.
The power representation with the highest index in the 28 Galois field is a254.
The finite field nature brings a255 back to a0 = 1 (i.e., a255 = a0 = 1). Because
each bit in the binary representation of the 28 Galois field carries a weight of
ai for i less than 8, the binary presentation can also be expressed in the
polynomial format. For example, the binary representation of a8 is 00011101
and the corresponding polynomial format is a4 + a3 + a2 + 1. The binary and
polynomial equivalents of any power representations in the 28 Galois field with
an index larger than 7 can be found using its primitive polynomial and the fact
that the polynomial becomes zero when the variable x is substituted by a.
Equation 9.2
A lookup table can thus be established to relate the power index to binary and
polynomial representations as partially demonstrated in Table 9.3. Analogous
to the conventional log function, this can also be called the inverse log table of
the 28 Galois field since it takes the power index as inputs and produces binary
as outputs. A log table of the 28 Galois field can also be configured by taking
binary as inputs and producing power index as outputs. These tables are
necessary for Reed-Solomon encoding and decoding because conversions
between different representations happen frequently during alternating
multiplication and addition operations. The MATLAB program to generate these
tables appears at the end of this chapter. The MATLAB function GFTPLE can
also be used to generate these tables.
The GF (28) Reed-Solomon code used in HomePlug has a block or code word
size of 28 1 = 255 symbols or bytes, or equivalently, 255 x 8 = 2040 bits. For
regular operation, a code word consists of 239 message bytes and 16 parity
bytes, and the number of correctable error bytes is 8. Parity bytes, c(x), are
the remainder of the message polynomial divided by the generator polynomial:
Equation 9.3
0 0 00000000 0
1 1 00000001 1
a a 00000010 2
a2 a2 00000100 4
a3 a3 00001000 8
a4 a4 00010000 16
a5 a5 00100000 32
a6 a6 01000000 64
a7 a7 10000000 128
...
Equation 9.4
Equation 9.5
The generator polynomial of the Reed-Solomon (255, 239, 8) code has the
following product format:
Equation 9.6
Equation 9.7
This conventional format can be obtained using the MATLAB function RSPOLY.
Code words are formed by combining message bytes with parity bytes.
Equation 9.8
Equation 9.9
If 2L k, then go to Step 7.
Set L = k L and T(x) = L(k-1) / D(k).
These v roots of the error locator polynomial can be found using Chien's
search algorithm by substituting x with a, a2, ..., into L(x) to find L(bi) =
0 for i = 1, …, v. The z(x) polynomial is then formed using error syndromes
and coefficients of the error locator polynomial as
Equation 9.10
These v error values can be found by replacing x in the z(x) polynomial with
roots of the error locator polynomial as
Equation 9.11
Errors are then corrected based on error locations and corresponding error
values. The MATLAB program of this Reed-Solomon decoding process is listed
at the end of this chapter [7]. The decoding process can also be accomplished
using MATLAB function RSDECODE.
Generating x and y bits using the convolution encoder can be based on the
current and previous 6 input data bits. These previous 6 input bits also
determine the current state and, similarly, the next state is determined by the
current and previous 5 input bits. Relationships between input bit, output bits,
current state, and the next state are summarized in Table 9.4. This lookup
table can be used for encoding to produce x and y outputs based on current
state and input bits, but it is more useful for Viterbi decoding [8].
1. For every pair of received bits, the number of bit differences from
each surviving state to the next two possible states are calculated
using exclusive OR and SUM operations.
The accumulated number of bit differences are updated for each next
possible state.
MATLAB programs for HomePlug convolution encoding and Viterbi decoding are
listed at the end of this chapter. They are equivalent to MATLAB functions of
CONVENC and VITDEC in the Communication toolbox.
FFT and IFFT are usually carried out with either a decimation-in-time or
decimation-in-frequency algorithm [9]. The decimation-in-time algorithm
starts with two-point operations and finishes with an operation of the full FFT
size. The decimation-in-frequency algorithm starts with an operation of the full
IFFT size and finishes with two-point operations. Either algorithm can be used
for FFT or IFFT with the proper definition of the base complex exponent,
f=[0:359]/359*1.75e5+0.75e5;
%f=4e5;
t=[0:359]/359*1e-4;
chirp1=sin(2*pi*f.*t);
chirp=3.5*[chirp1(131:360) chirp1(1:130)];
figure(1)
plot(t,chirp)
xlabel('Time (Sec.)')
ylabel('Magnitude')
F=fft(chirp);
figure(2)
py=10*log10((abs(F(1:100))).^2/360/10/0.001/3.6e6*2);
plot([1:100]/360*3.6e6, py)
grid
xlabel('Frequency (Hz)')
ylabel('PSD (dBm/Hz)')
%Primitive Polynomial
%pp=[1 0 1 1];
%pp=[1 0 0 1 1];
%pp=[1 0 0 1 0 1];
%pp=[1 0 0 0 0 1 1];
%pp=[1 0 0 0 1 0 0 1];
pp=[1 0 0 0 1 1 1 0 1];
m=length(pp)-1;
bpr=zeros(2^m,m+1);
%Binary presentation
%Up to mth power
for i=2:m+1
bpr(i,m+3-i)=1;
end
%Larger than mth power
for i=m+2:2^m
for j=1:m
bpr(i,j)=bpr(i-1,j+1);
end
bpr(i,m+1)=0;
if bpr(i,1)==1
bpr(i,:)=xor(bpr(i,:),pp);
end
end
%Binary to decimal
b2d=zeros(2^m,1);
for i=1:2^m
for j=1:m
b2d(i)=b2d(i)+bpr(i,j+1)*2^(m-j);
end
end
%Log table
[xx,ppr]=sort(b2d(2:2^m));
ppr=ppr-1;
%Inverse log table
dpr=b2d(3:2^m);
%Generator Polynomial
%Initialize ppr and dpr tables
rsprp
%GF size
n=8;
%Polynomial order
m=16;
%Initialization
gp=-1*ones(1,m+1);
%Set up for m=1
gp(1)=0;
gp(2)=1;
%Multiplication loop
for i=2:m
gpp=gp;
for j=1:i
co1=p2bin(gpp(j+1),n,bpr);
co2=p2bin(gpp(j)+i,n,bpr);
gp(j+1)=b2pw(xor(co1,co2),n,ppr);
end
end
function b=p2bin(p,n,bpr);
if p>-1;
p=mod(p,2^n-1);
end
b=bpr(p+2,:);
function p=b2pw(b,n,ppr);
d=0;
for i=2:n+1
d=d+b(i)*2^(n-i+1)
end
if d==0;
p=-1
else
p=ppr(d)
end
9.4.4 RS Encoder
%GF size
n=8;
%Random bits
mx=ceil(rand(8,239)-0.5);
%Initialize code words
cw=zeros(8,16);
%Get generator polynomial
gpoly
%Encoding
for i=1:239
%Calculate register feedback value
rf=xor(cw(:,1),mx(:,i));
if sum(rf)>0
%Power representation
prf=b2pw8(rf,n,ppr);
for j=1:15
cw(:,j)=xor(p2bin8(gp(j+1)+prf,n,bpr),cw(:,j+1));
end
cw(:,16)=p2bin8(gp(17)+prf,n,bpr);
else
for j=1:15
cw(:,j)=cw(:,j+1);
end
cw(:,16)=zeros(8,1);
end
end
%Find the power form
for i=1:239
mxp(i)=b2pw8(mx(:,i),8,ppr);
end
for i=1:16
cwp(i)=b2pw8(cw(:,i),8,ppr);
end
function p=b2pw8(b,n,ppr);
b=[0 b']';
p=b2pw(b,n,ppr);
function b=p2bin8(p,n,bpr);
b=p2bin(p,n,bpr);
b=b(2:9)';
9.4.5 RS Decoder
%Received word
rc=[mx cw];
%Calculate Syndrom
synd=zeros(8,16);
for i=1:16
for j=1:255
if sum(rc(:,j))~=0
pp=b2pw8(rc(:,j),8,ppr)+i*(255-j);
bpp=p2bin8(pp,8,bpr);
synd(:,i)=xor(synd(:,i),bpp);
end
end
end
clear rts
clear txp
%Check if there is error to run the rest of the decoding algorithm
if sum(sum(synd))~=0
%Find the error locator polynomial
tx=zeros(8,2);
tx(8,2)=1;
L=0;
cnp=zeros(8,1);
cnp(8,1)=1;
delt=synd(:,1);
if sum(delt)~=0
cnp=[[0 0 0 0 0 0 0 1]' delt];
L=1;
tx=p2bin8(255-b2pw8(delt,8,ppr),8,bpr);
end
tx=[zeros(8,1) tx];
for i=2:m
delt=synd(:,i);
for j=1:L
cnpp=b2pw8(cnp(:,j+1),8,ppr);
syndp=b2pw8(synd(:,i-j),8,ppr);
cnpsynd=p2bin8(cnpp+syndp,8,bpr);
delt=xor(delt,cnpsynd);
end
if sum(delt)~=0
deltp=b2pw8(delt,8,ppr);
[txa,txb]=size(tx);
deltmtx=zeros(txa,txb);
for k=1:txb
txp(k)=b2pw8(tx(:,k),8,ppr);
if txp(k)~=-1
deltmtx(:,k)=p2bin8(deltp+txp(k),8,bpr);
end
end
cnppr=cnp;
[cnpa,cnpb]=size(cnp);
if cnpb<txb
cnpe=[cnp zeros(8,txb-cnpb)];
else
cnpe=cnp;
end
cnp=xor(cnpe,deltmtx);
if 2*L<i
L=i-L;
clear tx
for k=1:cnpb
cnpprp=b2pw8(cnppr(:,k),8,ppr);
cnpddelt=cnpprp-deltp;
if cnpddelt<0
cnpddelt=cnpddelt+255;
end
tx(:,k)=p2bin8(cnpddelt,8,bpr);
end
end
end
tx=[zeros(8,1) tx];
end
%Find roots and error locators
[cnpa,cnpb]=size(cnp);
for i=1:cnpb
cnpw(i)=b2pw8(cnp(:,i),8,ppr);
end
rtcnt=0;
for i=0:254
cns=[0 0 0 0 0 0 0 1]';
for j=2:cnpb
cns=xor(cns,p2bin8(cnpw(j)+i*(j-1),8,bpr));
end
if sum(cns)==0
rtcnt=rtcnt+1;
rts(rtcnt)=i;
end
end
%Form the z(x) polynomial
zx=[0 0 0 0 0 0 0 1]';
for i=1:length(rts)
zcoe=xor(synd(:,i),cnp(:,i+1));
for j=2:i
pcnsy=b2pw8(synd(:,j-1),8,ppr)+b2pw8(cnp(:,i-j+2),8,ppr);
zcoe=xor(zcoe,p2bin8(pcnsy,8,bpr));
end
zx=[zx zcoe];
end
clear zxp
[zxa,zxb]=size(zx);
for i=1:zxb
zxp(i)=b2pw8(zx(:,i),8,ppr);
end
%Find Error values
clear er
for i=1:length(rts)
zxb=[0 0 0 0 0 0 0 1]';
for j=1:length(zxp)-1
zxc=zxp(j+1)+rts(i)*j;
zxcb=p2bin8(zxc,8,bpr);
zxb=xor(zxb,zxcb);
end
zxbp=b2pw8(zxb,8,ppr);
pbb=0;
for j=1:length(rts)
if j~=i
rtsrtsm=rts(i)-rts(j);
if rtsrtsm<0
rtsrtsm=rtsrtsm+255;
end
blr=xor([0 0 0 0 0 0 0 1]',p2bin8(rtsrtsm,8,bpr));
pbb=pbb+b2pw8(blr,8,ppr);
end
end
er(i)=zxbp-pbb;
for j=1:3
if er(i)<0
er(i)=er(i)+255;
end
end
end
rts
er
end
xy(i*2)=xor(xor(xor(dline(1),dline(3)),xor(dline(4),dline(6))),dline
end
%Punctuation
for i=1:166
xyp((i-1)*4+1)=xy((i-1)*6+1);
xyp((i-1)*4+2)=xy((i-1)*6+2);
xyp((i-1)*4+3)=xy((i-1)*6+4);
xyp(i*4)=xy((i-1)*6+5);
end
6. drake.ee.washington.edu/~adina/rsc/slide/slide.html. A. Matache,
Encoding/Decoding Reed Solomon Codes, 1996.
The original IEEE 802.11 wireless Ethernet standards released during June
1997 included three versions of physical layers: one for Infrared and the other
two for Radio Frequency in the ISM band of 2.4 GHz. Only RF versions of
wireless Ethernet are discussed in this book. The FHSS version of wireless
Ethernet defined by the IEEE 802.11 standards have two transmission
throughputs of 1 and 2 Mbps using Gaussian frequency keying modulation. At
a minimum of 2.5 hops per second and at least 6 MHz per hop, up to 78
different frequencies can be used depending on system parameters initialized
and maintained by a wireless Ethernet access point. The DSSS version of
wireless Ethernet defined by the IEEE 802.11 standards also has transmission
throughputs of 1 and 2 Mbps. The bandwidth of every bit or every pair of bits
is expanded to 11 MHz by a spreading process based on an 11-chip Barker
code running at a chip rate of 11 MHz. There are also 11 carriers, with 5-MHz
separation between adjacent carriers, allocated for use by DSSS wireless
Ethernet. Two DSSS wireless Ethernets can be established in the same location
without much interference.
A common MAC protocol is defined for all wireless Ethernet physical layers.
Modulation methoddependent packet formats are used by different physical
layers to carry MAC frames. Because of the dynamic nature of received
signals, the collision detection in the RF environment is sometimes not
guaranteed. The wireless Ethernet uses CSMA/CA, where every reception of a
long packet is acknowledged, instead of CSMA/CD as defined for conventional
Ethernet. In addition, a Wired Equivalent Privacy (WEP) encryption procedure
is defined for protection against eavesdropping over the open air. The IEEE
802.11b standard for a high-throughput extension to the DSSS wireless
Ethernet was later released during 1999. The High Rate Direct Sequence
Spread Spectrum (HRDSSS) wireless Ethernet uses a Complementary Code
Keying modulation method to carry 4 or 8 data bits on each signaling symbol
consisting of 8 chips. The chip rate of HRDSSS is also 11 MHz. HRDSSS can
have transmission throughputs of 5.5 and 11 Mbps. An IEEE 802.11a standard
for an Orthogonal Frequency Division Multiplex (OFDM) wireless Ethernet was
also released during 1999. OFDM wireless Ethernet operates in 5-GHz ISM
bands and provides transmission throughputs of 6, 9, 12, 18, 24, 36, 48, and
54 Mbps.
We start this chapter with frame structure and MAC protocol which are
common features for all versions of wireless Ethernet. We then look into each
RF wireless Ethernet version individually in the sequence of FHSS, DSSS,
HRDSSS, and OFDM. For each version, we highlight features of the standards,
examine its typical transceiver structure, and study corresponding
transmission performance.
10.1 Media Access Control Protocol
The wireless Ethernet MAC defined in the 802.11 standards is common for all
different implementations of RF transmission methods including FHSS, DSS,
HRDSS, and OFDM, as well as for the infrared implementation. The main
CDMA/CA protocol is defined as a distributed coordination function (DCF) and
also sometimes called the frame exchange protocol. This protocol defines
different MAC frames and procedures for exchanging frames. These MAC
frames are to be encapsulated with different preambles and packet headers in
accordance with particular transmission methods. A polling system using a
point coordinator is also defined as the point coordination function (PCF) for
timing-sensitive applications. PCF is built upon DCF, and they can
simultaneously share the same transmission medium. To fight against the
possibility of eavesdropping, a WEP is also defined using encryption with
shared keys distributed through secure channels other than over the air.
Figure 10.1 shows the general format of a wireless Ethernet MAC frame as
defined by the IEEE 802.11 standards. A particular version of wireless
Ethernet packet is formed by encapsulating the MAC frame with a physical
layerdependent preamble and header. Therefore, no preamble is defined for
the wireless Ethernet frame.
The Duration/ID field has 16 bits, which identify the transceiver for the power
save poll subtype of the control type frame or the duration value for other
types of frames. Four address fields follow the duration field in the MAC frame.
These fields are used to indicate the basic service set identifier (BSSID),
source address (SA), destination address (DA), transmitting transceiver
address (TA), and receiving transceiver address (RA). The location of a
particular type of address among these address fields depends on the specific
frame type. The Sequence Control field has 16 bits and consists of two
subfields, the Sequence Number and the Fragment Number. The Sequence
Number field is a 12-bit field indicating the sequence number of a MAC frame.
The Fragment Number field is a 4-bit field indicating the number of each
fragment of MAC frame. The fragment number is set to zero in the first or only
fragment and is incremented by one for each successive fragment. The Frame
Body can have 0 to 2312 bytes.
The FCS field contains a 32-bit CRC. The FCS is calculated over all the fields of
the MAC header and the Frame Body field using the same generator
polynomial of degree 32 as that of Ethernet defined by the 802.3 standards:
Equation 10.1
The wireless Ethernet FCS is the 1's complement of the exclusive OR of the
remainder of xk(x31 + x30 + x29 + … + x2 + x + 1) divided by G(x) and the
remainder of the message polynomial multiplied by x32 and then divided by
G(x), where k is the number of message bits. As a typical implementation, at
the transmitter, the initial remainder of the division is preset to all 1's and is
then modified by division of the message polynomial by the generator
polynomial G(x). The 1's complement of this remainder is transmitted, with
the highest-order bit first, as the FCS field. At the receiver, the initial
remainder is preset to all 1's and the serial incoming bits of the message and
FCS, when divided by G(x), results in a unique nonzero polynomial of
Equation 10.2
in the absence of any transmission error.
There are three frame typescontrol, data, and managementand six control
frame subtypesRequest To Send (RTS), Clear To Send (CTS), Acknowledgment
(ACK), Power Save-Poll (PS-Poll), contention-free-end (CF-End), and
contention-free-end acknowledge (CF-End+CF-ACK). The RTS frame format is
as defined in Figure 10.2. The duration value is the time (in microseconds)
required to transmit the pending packet. The RA is the intended receiving
transceiver address. The TA is the transmitting transceiver address.
The CTS frame format is as defined in Figure 10.3. The duration value is the
value obtained from the Duration field of the immediately previous RTS frame
minus the time required to transmit the CTS frame. The RA is copied from the
TA field of the immediately previous RTS frame.
The ACK frame format is as that of CTS. If the More Fragment bit is set to 0 in
the Frame Control field of the immediately previous directed frame, the
duration value is set to 0. If the More Fragment bit is set to 1, the duration
value is the value obtained from the Duration field of the immediately previous
frame, minus the time required to transmit the ACK frame.The RA of the ACK
frame is copied from the Address 2 field of the immediately previous directed
frame.
The PS-Poll frame is as defined in Figure 10.4. The AID is the value assigned
to the transmitting transceiver by the access point. The BSSID is the address
of the access point transceiver. The TA is the address of the transmitting
transceiver.
Figure 10.4. PS-Poll Frame Format
The CF-End frame format is as defined in Figure 10.5. The Duration field is set
to 0. The RA is the broadcast group address. The BSSID is the address of the
access point transceiver.
The CF-End+CF-ACK frame format is the same as that of CF-End. The Duration
field is set to 0. The RA is the broadcast group address. The BSSID is the
address of access point transceiver.
The data frame has the general MAC frame format as defined in Figure 10.1.
The content of the address fields in the data frame is dependent upon the
values of the To DS and From DS bits as shown in Table 10.1. Where the
content of a field is shown as not applicable (N/A), the field is omitted.
The frame format for a Management frame is as defined in Figure 10.6. Eleven
management frame subtypes share the same frame format but have different
sizes of frame bodies: Beacon, IBSS Announcement Traffic Indication Message
(ATIM), Disassociation, Association Request, Association Response,
Reassociation Request, Reassociation Response, Probe Request, Probe
Response, Authentication, and Deauthentication.
0 0 DA SA BSSID N/A
0 1 DA BSSID SA N/A
1 0 BSSID SA DA N/A
1 1 RA TA DA SA
The CSMA/CA MAC protocol is similar to that of CSMA/CD in that both use the
basic carrier sensing mechanism to share a transmission medium among many
transceivers. Some additional procedures are adopted by the CSMA/CA
protocol owing to the fact that the detection of a collision is not guaranteed for
the RF transmission medium. This can happen when two transmitters that are
far apart compete for the attention of a receiver in the middle. Under the
CSMA/CA protocol, a short acknowledgment packet is expected from the
intended receiver back to the transmitter after every reception of an original
long packet after the correct FCS is checked. To guarantee the reception of the
short packet, an acknowledgment transceiver can respond immediately under
the definition of the short interframe space (SIFS), while other transceivers
must wait through a priority interframe space (PIFS) or a distributed
interframe space (DIFS) time window. To avoid potential collision of long
packets, which is sometimes called the hidden node problem, an RTS short
packet is sent first and the intended receiver responds with a CTS short packet
within the SIFS prior to the target long packet transmission. The CTS short
packet enables transceivers that do not receive the RTS directly also to be
aware of pending transmission. Because of this unique RF transmission
environment, the virtual carrier sensing is also implemented via the detection
of pending transmission duration from the CTS packet by other transceivers
for CSMA/CA. Transceivers that detect pending transmissions set their Network
Allocation Vectors (NAV) accordingly, and no transmissions are attempted until
the NAV duration has expired.
The SIFS is used for an ACK frame, a CTS frame, and the second or
subsequent packets of a fragment burst. The SIFS timing consists of
transmission, receiver detection, MAC decision, and turn-around time delays.
The PIFS is used only by transceivers operating under the point coordinated
function (PCF), which will be discussed in the next section, for timing-sensitive
applications to gain priority access to the medium at the start of the CFP. The
duration of a PIFS is the duration of SIFS plus one slot time of 50 µs.
Transceivers use the DIFS operating under the DCF to transmit data frames
and management frames. The duration of a DIFS is the duration of PIFS plus
one slot time of 50 µs. The DCF uses the EIFS whenever the transceiver has
indicated to the MAC that a frame transmission was begun and did not result
in the correct reception of a complete MAC frame with a correct FCS value.
The duration of an EIFS is the duration of a DIFS plus another slot time of 50
µs.
The 802.11 wireless Ethernet protocol allows either open system or shared key
authentication. Under the open system authentication, a transceiver sends a
management packet requesting open system authentication to another
transceiver that returns a management packet to acknowledge the completion
of mutual authentication. The initiation of a shared key authentication
procedure can be completed by exchanging four management packets between
a pair of transceivers. As soon as the shared key authentication is confirmed,
transceivers encrypt the frame body part of each packet using the WEP
mechanism. Because WEP relies on the knowledge of a secret key that is
distributed by means other than over the open air, it should provide privacy for
the wireless LAN that is equivalent to that provided by a wired LAN. The
encryption structure for the shared key authentication is illustrated in Figure
10.9.
This WEP structure consists mainly of the RC4 encryption and CRC-32
algorithms, the exclusive OR operation between the pseudo-random sequence
generated from the encryption process and the data and frame check
combined sequence. This RC4 algorithm starts with a 64-bit key consisting of a
24-bit initialization vector (IV) and a 40-bit secret key. A 128-bit secret key
has also been used recently for better protection. IV is attached at the
beginning of every encrypted frame body as indicated by the use of the S1
switch and can be different from packet to packet. The frame check sequence,
after being exclusive ORed with the pseudo-random sequence, is called the
integrity check vector (ICV) and is attached at the end of each encrypted
frame body as indicated by the use of the S2 switch. This WEP encryption
structure produces a frame body in a format as shown in Figure 10.10. The 2-
bit ID can be used to identify one of four agreed-upon secret keys.
The RC4 encryption algorithm was developed by Ron Rivest of RSA Data
Security, Inc. (RSADSI), now a part of Network Associates Inc., during 1987.
RC4 is a symmetric stream cipher, which uses the same key and algorithm for
both encryption and decryption and supports a variable length key of up to
256 bytes. RC4 used to be a trade secret of RSADSI, but some anonymous
person distributed a version of the source code, which can produce compatible
encrypted messages, on the Internet during September 1994. The name RC4
might still be a trademark and some other versions of compatible codes use
different names, such as ARC4. The pseudo-random sequence of RC4 is based
on an array of size 256 filled with numbers from 0 to 255 in an order
determined according to the key [1]. Specifically, the array is created
according to following steps, which are illustrated with MATLAB commands.
For i=1:256
S(i)=i-1;
end
Create another array, K, of size 256 filled with the key, MyKey, and its
repetitions. MyKey is an array of bytes for the secret key.
For i=0:255
K(i+1)=MyKey(mod(i,length(MyKey))+1);
end
j=0;
for i=0:255
j=mod(j+S(i+1)+K(i+1),256);
temp=S(i+1);
S(i+1)=S(j+1);
S(j+1)=temp;
end
The pseudo sequence, PS, is generated one byte at a time. i and j are
initialized to 0 to start.
i=mod(i+1, 256);
j=mod(j+S(i+1), 256);
temp=S(i+1);
S(i+1)=S(j+1);
S(j+1)=temp;
t=mod(S(i+1)+S(j+1),256);
PS=S(t+1);
The MATLAB implementation of WEP encryption with a 64-bit key that
correlates to this procedure is included at the end of this chapter.
10.2 Frequency-Hopping Spread Spectrum
The packet format for the FHSS implementation of wireless Ethernet is shown
in Figure 10.12. An FHSS packet consists of a preamble, a header, and a
whitened MAC frame. The FHSS preamble has a Sync field of 80 bits and a
Start Frame Delimiter of 16 bits. The FHSS header has a PSDU length word
(PLW) of 12 bits, a Physical Layer Convergence Protocol (PLCP) signaling field
(PSF) of 4 bits, and a header error check (HEC) field of 16 bits, where PLCP
stands for physical layer convergence protocol and PSDU stands for PLCP SDU
(Service Data Unit). PLCP is a physical layer-dependent function connecting
the MAC to a particular transmission mechanism.
Equation 10.3
Equation 10.4
FHSS standards recommend the use of a f3dBT = 0.5 Gaussian modulation. For
a symbol rate of 1 MHz, T = 1 x 106, f3dB = 0.5 x 106 Hz, and a = 1.1774 x
The time impulse response disappears quickly beyond the baud interval. An
FHSS transceiver needs to generate RF signals that are at least 10 dBm but
not to exceed 20 dBm. Averaged over a bandwidth of 1.32 MHz for 1 Mbps or
1.432 MHz for 2 Mbps, the maximum PSD levels are 41.2 and 41.6 dBm/Hz,
respectively.
Within the 2.4-GHz ISM band, 79 frequency channels that are 1 MHz apart are
located for FHSS transceivers starting with channel 0 at 2.402 GHz and ending
with channel 79 at 2.48 GHz. Among these channels, 78 of them are used for
three hopping frequency sets. They are set 1 with channels of 0, 3, 6, 9, 12,
15, 18, 21, 24, 27, 30, 33, 36, 39,42, 45, 48, 51, 54, 57, 60, 63, 66, 69, 72,
and 75; set 2 with channels of 1, 4, 7, 10, 13, 16, 19, 22, 25, 28, 31, 34, 37,
40, 43, 46, 49, 52, 55, 58, 61, 64, 67, 70, 73, and 76; and set 3 with
channels of 2, 5, 8, 11, 14, 17, 20, 23, 26, 29, 32, 35, 38, 41, 44, 47, 50, 53,
56, 59, 62, 65, 68, 72, 74, and 77. Within each set, channel frequencies are 3
MHz apart. Using different hopping frequency sets, up to three different FHSS
wireless networks can be created within the same area.
Figure 10.15 shows the application of this radio transceiver chip for a complete
FHSS transceiver. Additional components include a receive LNA, a power
amplifier, an RF bandpass filter connected to the antenna, an RF bandpass
filter after the LNA, a surface acoustic wave (SAW) IF bandpass filter, an
inductor capacitor (LC) IF bandpass filter, a VCO, a loop filter for PLL, an RLC
tank circuit for FSK demodulation, an RC low-pass filter in conjunction with
FSK demodulation, and a microcontroller with a operating system and MAC
software. The whole transceiver is usually assembled as a module of compact
size. The use of a module for further system integration avoids potential
complications when RF and IF parts are placed improperly causing performance
degradation.
Equation 10.5
At a signal-to-noise level of about 30 dB, the channel capacity for the FHSS
environment is
Equation 10.6
The packet format for the DSSS implementation of wireless Ethernet is shown
in Figure 10.17. A DSSS packet consists of a preamble, a header, and a MAC
frame. The DSSS preamble has a Sync field of 128 bits and a Start Frame
Delimiter of 16 bits. The DSSS header has a Signal field of 8 bits, a Service
field of 8 bits, a Length field of 16 bits, and a CRC field of 16 bits.
The DSSS preamble Sync field contains 128 bits of scrambled 1s to be used by
the receiver to detect a signal and to achieve frequency and timing
synchronization with the rest of the received packet. The SFD consists of the
binary pattern of 1111 0011 1010 0000 used for start of frame indication. The
SFD least significant bit (lsb) is transmitted first in time. The Signal field
indicates the modulation rate used for the MAC frame. The data rate equals
the Signal field value multiplied by 100 kbps (i.e., 0000 1010 for 1 Mbps and
0001 0100 for 2 Mbps). The Service field is reserved for future use. The value
0000 0000 signifies compliance. The Length field indicates the number of
microseconds, up to 216 1, required to transmit the MAC frame. The Length
lsb is also transmitted first in time. The CRC is a frame check sequence
generated against Signal, Service, and Length fields using the same Comite
Consulatif International Telephonique et Telegraphique (CCITT) CRC-16
polynomial of G(x) = x16 + x12 + x5 + 1. All bits in a DSSS packet are
scrambled with a self-synchronizing scrambler based on the generator
polynomial of G(z) = z-7 + z-4 + 1. Figure 10.18 shows a possible way of
implementation using delay elements and exclusive OR operations. The
scrambler can be initialized to any state except all 1s when transmitting.
Figure 10.19 shows a possible implementation for the descrambler.
Within the 2.4-GHz IMS band, there are 11 carriers that are 5 MHz apart,
allocated by the FCC for U.S. and Canada DSSS operations starting at 2.412
GHz. To minimize interference, coexisting carriers need to be 30 MHz apart.
Therefore, at least two separate DSSS wireless Ethernets can coexist at the
same location. Starting from the MAC frame, each bit, for 1 Mbps, or each pair
of bits, for 2 Mbps, are modulated to the radio carrier frequency at a rate of 1
million symbols per second. For the MAC frame, each symbol carries 1 or 2 bits
for 1 Mbps or 2 Mbps, respectively. On the other hand, each symbol consists of
11 chips corresponding to the 11-bit Barker code of +1 1 +1 +1 1 +1 +1 +1 1
1 1. In other words, the bandwidth-related signaling rate is effectively 11
Mega-chips per second (Mcps). Because of the use of this Barker code, the
spectrum of the DSSS wireless Ethernet becomes 11 MHz, even though the
symbol rate is only 1 MHz. The Barker code is used because of its very high
peak autocorrelation value when aligned for further SNR enhancement at the
receiver. Let the Barker code be B(k), we have
Equation 10.7
and
Equation 10.8
For 1 Mbps, a 1 bit is represented by the original Barker code, or 0 phase, and
a 0 bit is represented by the sign reversal of the Barker code, or a p shift. For
2 Mbps, bit combinations of 00, 01, 11, and 10 are represented by 0, p/2, p,
and p/2 phase shifts of the Barker code, respectively. p/2 and p/2 phase shifts
are implemented using in-phase and quadrature channels of amplitude-
scaled Barker codes. The process of formulating a Barker code of desired phase
is called spreading, and the process of multiplying the received chip and
accumulating the sum is called despread. The use of this 11-bit Barker code
can provide a spreading gain of 10 x log (11) 10.4 dB. The DSSS wireless
Ethernet transmit power resulting from the 11-Mcps Barker code is defined to
be between 1 and 1000 mW. With a bandwidth of 11 MHz, the PSD level is
between 70 and 40 dBm/Hz. The unfiltered power spectrum resulting from the
Barker code and the spectrum mask defined by the standards are shown in
Figure 10.20. Additional low-pass, at Barker code, or bandpass, at IF or RF,
filtering is required to meet the mask requirement.
Figure 10.22 shows an example of a DSSS transceiver chip set from Intersil.
This chip set consists of a MAC part, a baseband processor, an IF modem, an
RF/IF convertor, an LNA, and a PA. The MAC part is based on a 16-bit ARM core
with control and MAC firmware residing on external memory. The ARM core is
a RISC (Reduced Instruction Set Computer) microcontroller. The MAC part uses
dedicated circuits for WEP processing. The MAC part also contains a host
interface to a PC or other devices, a radio control interface, and a digital serial
interface to write to or read from registers on other chips. The baseband
processor contains in-phase and quadrature channel ADCs, an RSSI ADC, and
demodulation and modulation circuits. The IF modem contains in-phase and
quadrature channel digital-to-analog convertors (DAC), IF modulation and
demodulation circuits, and IF amplifiers. The RF/IF convertor contains RF
amplifiers and RF modulator and demodulators. This chip set needs two
external oscillators, RF and IF bandpass filters, and some memory chips to
form a DSSS transceiver.
Equation 10.9
At a signal-to-noise level of about 9.59 dB, the channel capacity for the DSSS
environment is
Equation 10.10
Figure 10.25 shows the internal structure of the Simulink receiver model. The
received signal is first bandpass-filtered to minimize out-off-band noise. This
second-order Butterworth bandpass filter has corner frequencies at 5.5 and
16.5 MHz. The bandpass-filtered signal is demodulated with cosine and sine
waves of an 11-MHz carrier. In-phase and quadrature baseband channels are
also recovered after low-pass filtering by low-pass filters of the fourth order.
Low-pass filtered signals are decimated to 11 mega samples per second for
despreading by Barker code filters. Peaks are then registered to recover data
symbols.
Two different preambles and headers are defined: the mandatory supported
long preamble and header, which is interoperable with the 1- and 2-Mbps
DSSS specification, and an optional short preamble and header. Figure 10.26
shows the long packet format for HRDSSS transceivers. The long packet
format is the same as that used by DSSS transceivers. There are several new
definitions in the Signal and Service fields. High rates and corresponding
encodings are different in the Signal field. A bit is used in the Service field to
indicate the length that is expressed in whole microseconds. Another bit is
used in the Service field to indicate whether the optional PBCC mode is being
used. One bit is used in the Service field to indicate that the transmit carrier
frequency and bit clocks are locked.
Figure 10.27 shows the optional short packet format for HRDSSS transceivers.
The short packet format also consists of a preamble, a header, and a MAC
frame. The short packet format preamble has a Sync field of only 56 scrambled
0 bits and a Start Frame Delimiter of 16 bits. The short packet format SFD is
the time reversal of long packet format SFD. The short packet format SFD has
a binary pattern of 0000 0101 1100 1111 transmitted lsb first. The short
packet format header also has a Signal field of 8 bits, a Service field of 8 bits,
a Length field of 16 bits, and a CRC field of 16 bits. The CRC is generated
using the same CCITT CRC-16 polynomial of G(x) = x16 + x12 + x5 + 1. The
short packet format preamble uses the 1-Mbps Barker code DBPSK modulation.
The short packet format header uses the 2-Mbps Barker code DQPSK
modulation, and the MAC frame is transmitted at 2, 5.5, or 11 Mbps. All bits in
an HRDSSS packet are scrambled with the same self-synchronizing scrambler
based on the generator polynomial of G(z) = z7 + z4 + 1.
The CCK modulation for HRDSSS wireless Ethernet was jointly proposed by
Harris and Lucent during the 1998 July 802.11b working group meeting.
Before that joint proposal, both companies made similar but different
modulation proposals based on the 11-MHz chip signaling rate for HRDSSS.
Lucent proposed the Barker code pulse position modulation (BCPM) method
and Harris proposed the M-array Bi-Orthogonal Keying (MBOK) and
Quadrature M-array Bi-Orthogonal Keying (QMBOK) methods. The joint CCK
proposal uses 4 bits to select an eight-chip code word among 16 code words for
5.5 Mbps and 8 bits to select an 8-chip code word among 256 code words for
11 Mbps. Because each chip can be represented by a binary complex number
for the in-phase and the quadrature channels, significant distances are
maintained among different code words.
Lucent's earlier BCPM [2] proposal defined eight different pulse positions for
the Barker code chip sequence (i.e., the original Barker code and seven
additional time-rotated versions are used for signaling). Three additional bits
can be carried on each symbol if in-phase and quadrature channels use the
same time-rotated Barker code, and six additional bits can be carried on each
symbol if in-phase and quadrature channels can choose their time-rotated
Barker codes independently. These additional 3 and 6 bits lead to transmission
rates of 5 and 8 Mbps, respectively. The transmission rate can be further
increased to 8 x 11/9 = 9.78 if the symbol duration is reduced to 9 chips
instead of 11. To recover bit information carried in pulse positions, channel
equalization techniques are necessary to minimize the effect of intersymbol
interference caused by channel dispersion.
Equation 10.11
where is the sign reversal version of Hn. Starting with H1=[1], we have
MBOK uses 3 bits to select one codeword from the preceding eight codewords
and 1 bit to reverse signs of every bit in the codeword. The transmission rate
of MBOK is therefore 4 x 11/8 = 5.5 Mbps. QMBOK uses 4 bits for the in-phase
channel codeword and another 4 bits for the quadrature channel codeword
independent selections. The transmission rate of QMBOK is 8 x 11/8 = 11
Mbps. These modified Walsh codewords are called bi-orthogonal for zero cross
correlation between codewords except for codeword pairs with reversed signs
where the cross correlation is the negative of the autocorrelation.
Equation 10.13
Equation 10.14
Equation 10.15
Data Symbol
0000 10121030
0001 32301030
0010 30323010
0011 12103010
Equation 10.17
Equation 10.18
Equation 10.19
Before finalizing the adaptation of the CCK modulation for 802.11b, another
binary convolution code (BCC)based modulation proposal was presented by
Alantro, which later became a subsidiary of Texas Instruments, Inc. It was
argued that BCC can provide additional coding gain for its Trellis structure and
that the multipath channel effect can be minimized by using scrambling.
Although not accepted as the standardized modulation method, texts for the
Direct Sequence Spread Spectrum with packet binary convolution code
(DSSS/PBCC) were included in the 802.11b standards as an optional
modulation method. The binary convolution code proposed for DSSS/PBCC is
defined by the
Equation 10.20
Equation 10.21
The convolution encoding process can be implemented with six delay elements
and exclusive OR operations as shown in Figure 10.31. For every data bit input
x, two output bits y0 and y1 are generated.
The transmit power level and the PSD mask of HRDSSS are the same as those
defined for DSSS for spectrum compatibility where different HRDSSS and
DSSS transceivers can share the same spectrum to operate. On the other
hand, the minimum separation frequency is reduced to 25 MHz for non-
overlapping channels. Three non-overlapping channels with carrier frequencies
at 2.412, 2.437, and 2.462 GHz and six overlapping channels with carrier
frequencies at 2.412, 2.422, 2.432, 2.442, 2.452, and 2.462 are defined for
North American HRDSSS operations.
Equation 10.22
where X is an input column vector of size N, HN is a Walsh-Hadamard matrix of
dimension N by N, and Y is the output column vector of size N. The original
data vector can be recovered by the inverse Walsh transform of the output
column vector Y, as defined by
Equation 10.23
Equation 10.24
where X, HN, and Y all are dimension N by N matrices. The inverse two-
dimensional Walsh transform is shown by
Equation 10.25
Equation 10.27
Equation 10.28
where has only two nonzero entries on each row. For example, we have
Equation 10.29
Similarly, we have
Equation 10.30
For this example, these three matrix multiplications, starting from the
rightmost, lead to the butterfly structure shown in Figure 10.33.
This FWT cannot be used for the quadrature phase complementary codewords
directly. Similar fast transformations involving only one operation between a
pair of numbers can be derived by examining relationships between pairs of
adjacent bits, groups of four bits, and valid codewords. A butterfly structure for
processing quadrature phase complementary codewords using the FWT
principle is shown in Figure 10.34. From each data point, the top line indicates
an addition, the second a 90° rotated addition, the third a subtraction, and the
bottom a 90° rotated subtraction. Notice that chip 2 (X6), and chip 5 (X3) are
negated before the execution of the butterfly computation. Only two of the
three stages of operation are included in Figure 10.34. The last stage of the
operation pairs an output from the second stage of the left block with one from
the second stage of the right block of the same row and performs +, j, , and j
calculations. Inputs X0 through X7 are either real or imaginary for an ideal
channel and can be complex numbers owing to channel distortion. A real
operation adds or subtracts real and imaginary components separately. An
operation involving j adds or subtracts real components to or from imaginary
ones and vice versa. There are 64 complex outputs from the last stage of the
butterfly operation. The output with the largest amplitude indicates matched
codewords. The phase of the output indicates the rotation of the codewords.
This modified FWT for quadrature phase complementary codewords can also be
described by the following matrix expression involving 8 by 16, 16 by 32, and
32 by 64 matrices whose rows contain only two nonzero elements:
Equation 10.31
Details of the baseband transmit block are shown in Figure 10.37. Data bits
are first passed through the scrambler. A preamble and a header are attached
before the Barker code or CCK modulation for 1, 2 or 5.5, 11 Mbps,
respectively. Data symbols are then passed through transmit filters before
reaching DACs. An AGC is used to regulate the transmit power. The gain and
the output power level of a Power Amplifier might vary considerably because of
different variations introduced during the manufacturing process. If not
regulated, the transmit power level might vary in a range of 5 dB. That might
lead some transceivers to exceed the power limits and others to not transmit
enough power. The power level of the PA is monitored through an ADC and the
gain of the IF amplifier is properly controlled through a DAC via an AGC loop.
Equation 10.32
The transmission performance of an HRDSSS wireless Ethernet transceiver can
be further studied by computer simulation. Figure 10.39 shows a simplified
Simulink model which consists of a random data sequence generator, a
transmitter, a multipath channel model, and a receiver.
Figure 10.40 shows the internal structure of the Simulink transmitter model. A
binary data sequence is fed through the CCK encoder to generate in-phase and
quadrature chips at a chip rate of 11 megahertz per second (MHz/s). The
sampling rate of these chips is further increased tenfold for low-pass filtering.
These two fourth-order Butterworth low-pass filters have corner frequencies at
5.5 MHz. To use the baseband multipath channel model, the modulation
process is omitted.
Figure 10.41 shows a possible implementation of the CCK encoder. Four pairs
of bits are formed to generate four individual base phases after the serial-to-
parallel conversion. Eight phases are then calculated for each individual chip.
These phases are then translated to in-phase and quadrature chip values via
separate parallel-to-serial conversion processes.
Figure 10.44 shows the multipath channel model consisting of in-phase and
quadrature FIR filters whose coefficients are calculated according to Equations
10.17, 10.18, and 10.19.
Figure 10.44. A Simulink Multipath Channel Model
Figure 10.45 shows the internal structure of the Simulink receiver model. With
the demodulation process omitted for simplicity, received signals are passed
through the in-phase and the quadrature-matched filters first. Filtered signals
are then decimated to the original chip rate of 11 MHz. An FWT is used to
generate 64 codeword correlation outputs. These correlation outputs are
converted to four base phases by the four-phase decoder. Original bit streams
are recovered by the phase-to-bit (P2B) decoder. Original chips are also
recreated by the phase-to-chip (P2C) decoder to be used by the decision
feedback channel equalizer for interchip interference cancellation.
Figure 10.46 shows the implementation of the FWT functional block, which
consists mainly of three matrices, each of which has only two nonzero entries
in each row, as described by Equation 10.31.
The packet format for the OFDM implementation of wireless Ethernet at 5 GHz
is shown in Figure 10.53. An OFDM packet consists of a preamble, a header,
and a MAC frame. The OFDM preamble has a Sync field of 10 short symbols
and 2 long symbols. The OFDM header has 1 Signal symbol including a Rate
field of 4 bits, followed by a reserved bit, a Length field of 12 bits, followed by
a parity bit and 6 tail bits. The MAC frame is further encapsulated with a
Service field of 16 bits in the beginning and 6 tail bits as well as some
necessary PAD bits at the end.
The OFDM preamble Sync field is to be used by the receiver to detect a signal
and to achieve initial frequency and timing synchronization to receive the rest
of the packet. The preamble lasts 16 µs as shown in Figure 10.54. Short
preamble symbols are indicated by t1 through t10, and long preamble symbols
are labeled as T1 and T2.
Figure 10.54. Preamble Structure (From IEEE Std. 802.11.
Copyright © 1999 IEEE. All rights reserved.)
A normal OFDM symbol is created through the inverse fast Fourier transform
of data bits in a transmitter. Data bits are recovered in a receiver using the
fast Fourier transform. The IFFT/FFT size for 802.11a is 64. Each IFFT/FFT
block has 64 complex time domain points and 64 complex subcarriers in
frequency domain. Complex time domain signals are represented by in-phase
and quadrature parts of an OFDM wireless Ethernet carrier frequency. The
interval between adjacent time points is 50 ns corresponding to a base
sampling rate of 20 MHz. The duration of an IFFT/FFT block T is 64 x 50 = 3.3
µs. The frequency between adjacent subcarriers is therefore 20 MHz/64 =
312.5 kHz. Among these subcarriers, 48 are used for carrying data bits, 4 are
reserved for pilot tones with carrier/timing information, carrier 1 is not used
for avoiding DC bias, and carriers 2838 are not used for minimizing
interference between coallocated 802.11a wireless Ethernet systems using
adjacent channel frequencies. To avoid channel intersymbol interference, a
cyclic prefix of 16 points is appended in front of each time domain OFDM
symbol. A normal OFDM symbol duration is therefore 80 x 50 ns = 4 µs. The
OFDM symbol rate is 250 kHz.
The Signal field of 24 bits contains Rate and Length subfields. The first 4 bits
encode the Rate information. The fifth bit is reserved for future use. The next
12 Length bits indicate the number of bytes for the MAC frame before
encapsulation. The following bit is a positive parity (even parity) bit for the
previous 17 bits. The last 6 bits constitute the Signal Tail field and are all
zeros. The size of the signal field is doubled to 48 bits after the rate 1/2
convolution encoding, and these 48 bits are mapped to 48 data-carrying
subcarriers to create the single Signal OFDM symbol with BPSK modulation.
The Service field before the MAC frame consists of 16 bits. The first 7 bits are
zeros and are used to synchronize the descrambler in the receiver; the
remaining 9 bits are reserved for future use. These 6 tail bits, which are
required to reset the convolutional encoder, after the MAC frame are also all
zeros. A number of PAD bits are added to make the encapsulated MAC frame
fill a multiple number of whole OFDM symbols of 48, 96, 192, or 288 bits.
Equation 10.33
Equation 10.34
Equation 10.35
Equation 10.36
The function floor( ) denotes the largest integer not exceeding the parameter
(i.e., floor[5.6] = 5). The second permutation is defined by
Equation 10.37
The value of s is determined by the number of coded bits per subcarrier NBPSC
according to
Equation 10.38
The second permutation effectively is not required for NCBPS = 48 and s = 1.
For NCBPS = 48, s = 1, and k = 7, we have i = 21 and j = 21; and for NCBPS =
192, s = 4, and k = 7, we have i = 84 and j = 85.
The deinterleaver, which performs the inverse relation, is also defined by two
permutations. We denote j as the index of the original received bit before the
first permutation, i as the index after the first and before the second
permutation, and k as the index after the second permutation. The first
permutation is defined by
Equation 10.39
Equation 10.40
For NCBPS = 48, s = 1, and j = 21, we have i = 21 and k = 7; for NCBPS = 192,
s = 4, and j = 85, we have i = 84 and j = 7.
We can have BPSK, QPSK, 16QAM, and 64QAM for subcarrier modulations
depending on the RF channel SNR. Each subcarrier for a particular
encapsulated MAC frame uses the same modulation method. Each OFDM
symbol can therefore carry 48, 96, 192, or 288 bits corresponding to BPSK of
1 bit, QPSK of 2 bits, 16QAM of 4 bits, and 64QAM of 6 bits per subcarrier.
Combined with convolution encoding ratio of 1/2, 2/3, or 3/4 and a symbol rate
of 250 kHz, available OFDM wireless Ethernet transmission throughputs are 6,
9, 12, 18, 24, 36, 48, and 54 Mbps. They use 1/2 and BPSK, 3/4 and BPSK, 1/2
and QPSK, 3/4 and QPSK, 1/2 and 16QAM, 3/4 16QAM, 2/3 and 64QAM, and 3/4
and 64QAM encoding ratios and modulation methods, respectively.
The transmit power of an OFDM wireless Ethernet is limited to 40, 200, and
800 mW for 5.155.25, 5.255.35, and 5.7255.825 GHz frequency bands,
respectively. There are four OFDM wireless Ethernet channels defined for each
of the above three frequency bands. These carrier frequencies are 5.18, 5.20,
5.22, 5.24, 5.26, 5.28, 5.30, 5.32, 5.745, 5.765, 5.785, and 5.805 GHz.
Adjacent channels are 20 MHz apart. The PSD of each OFDM wireless Ethernet
channel is defined by the mask as shown in Figure 10.57. PSD limits are 56.5,
49.5, and 43.5 dBm/Hz for a signal bandwidth of 18 MHz for these three
frequency bands, respectively.
Figure 10.59 shows an example of a OFDM transceiver chip set from Atheros.
This chip set consists of a baseband/MAC part (AR5210) and an RF part
(AR5110). ADCs and DACs are contained in the baseband/MAC part. The host
interface function is also included in the baseband/MAC part. The RF part
contains RF/IF receive amplification and demodulation functions including LNA,
RF/IF transmit modulation and amplification functions including PA, a
frequency synthesizer, and some bias/control functions. This chip set needs
external crystals, an RF filter, a transmit/receive switch, baseband filters, and
an external Erasable Programmable Read-Only Memory (EPROM) memory chip
to form an OFDM transceiver.
Equation 10.41
6 82 5 41
9 81 6 46
12 79 8 57
18 77 10 69
24 74 13 87
36 70 17 113
48 66 21 139
Figure 10.63 shows the possible implementation of a 4QAM encoding cell. Two
bits are separately used to drive the real and imaginary parts of a subcarrier.
Figure 10.64 shows the possible implementation of the prefix addition and
parallel-to-serial conversion function block. The last 16 points of the IFFT
output are repeated in front of the 64-point original output to create an 80-
point complex time domain symbol. Real and imaginary parts are separated for
the multipath channel model for this simulation and for separate in-phase and
quadrature channel modulations in a real implementation.
HomeRF 1.0 can provide transmission throughputs of about 0.8 or 1.6 Mbps
for asynchronous data as well as up to four voice connections. The HomeRF
transmission physical layer is based on the FHSS 2FSK (Frequency Shift
Keying) and 4FSK technology defined by IEEE 802.11 standards. Under the
CSMA/CA mechanism, the reception of every asynchronous data packet is
acknowledged by a short packet. Voice connections to telephony devices, called
I-nodes (where I stands for Isochronous), are established and managed by a
Connection Point (CP). Each voice connection consists of a pair of downstream
and upstream TDMA (Time Division Multiple Access) slots. Instead of an
acknowledgment packet, the reception of a voice packet in the downstream is
indicated by a bit in the header of the packet in the upstream direction. Voice
packets are exchanged between the CP and I-nodes periodically in
synchronization with frequency hops. Transmission of voice packets occurs
right before each frequency hop, and retransmission of voice packets is
allowed right after the frequency hop. The recently approved HomeRF 2.0 can
provide higher transmission throughputs of about 5 or 10 Mbps using a
signaling rate of 5 MHz in conjunction with 2FSK and 4FSK modulations.
The HomeRF MAC is designed to handle both asynchronous data and TDMA
(Time Division Multiple Access) voice packet transmissions. On the other hand,
the point coordination function part of IEEE 802.11 MAC is designed to handle
timing-sensitive applications through a polling system. HomeRF can be viewed
as a specialized version of IEEE 802.11 wireless Ethernet whose MAC is a
combination CSMA/CA of IEEE 802.11 and TDMA of DECT and that uses the
FHSS modulation method of IEEE 802.11. To guarantee the periodic delivery of
voice packets, a superframe is defined for HomeRF. A frequency hop starts
every superframe. Original voice packet transmissions are allocated near the
end of the superframe, and retransmission of voice packets is allowed right
after the frequency hop at the beginning of the superframe to benefit from the
frequency and time diversity. Asynchronous data transmission occurs after a
DIFS. The reception of every asynchronous data packet is acknowledged by a
short packet within a SIFS. On the other hand, all voice packets are separated
by a SIFS. Therefore, asynchronous data transmission can start a DIFS after
the frequency hop if there is no retransmission voice packets. Different
HomeRF MAC frames are defined for management tasks, asynchronous data
transmissions, and TDMA connections. For security purposes, HomeRF uses a
different encryption algorithm than the WEP of IEEE 802.11.
Up to four pairs of voice slots and four pairs of retransmission slots can be
allocated in each superframe. All voice slots are separated by SIFS while
pending data packets need to wait for a DIFS. The duration of a super frame is
actually marked from the start of a frequency hop to the next frequency hop.
Under this definition, retransmission voice slots appear right after the Beacon
frame. Asynchronous data transmission starts whenever a DIFS can be
detected. Voice slots start by counting backwards from the end of the
superframe or the next frequency hop time. The information on the number of
voice slots is broadcast by the Beacon frame. Data transmissions are
constrained not to extend to these voice slots.
A SIFS lasts about 142 µs and a DIFS lasts about 309 µs. With 1-Mbps GFSK,
a voice packet lasts about 1 ms. On the other hand, the Beacon frame takes
about 1.3 ms. We also give the frequency hop process about 300 µs.
Therefore, a 20-ms superframe can provide a duration of about 18.258 ms for
packet transmission after the deduction of the frequency hop and Beacon
frame overhead. The duration is just about enough for allocating four pairs of
voice slots and four pairs of retransmission slots. In other words, if four voice
connections are allocated in an unfavorable transmission environment, data
transmission throughput will be reduced to below 0.5 Mbps depending on how
often retransmission occurs. On the other hand, a maximum of 17,949
asynchronous symbols can be transmitted during a superframe with no voice
or retransmission slots considering the DIFS. This leads to a maximum payload
of about 17,621 bits, or about 2202 bytes, with the 1-Mbps GFSK modulation
considering preamble, header, and CRC overhead. This is a little less than the
maximum payload size of 2312 bytes defined by IEEE 802.11 standards. In
practice, one or two voice connections can be established simultaneously with
data transmission throughputs of about 0.8 Mbps, assuming retransmission
happens not very often with the 1-Mbps GFSK modulation.
Asynchronous data packets are transmitted using the CSMA/CA algorithm. The
reception of every data packet is acknowledged by a short ACK packet within
the SIFS. A HomeRF SIFS is defined as the time for transmission delay, CRC
calculation, and turning around a transceiver from a receive mode to a
transmit mode. A HomeRF DIFS is defined as the SIFS plus a slot duration. A
slot duration is defined as the time for a transceiver to perform a CCA
operation. To avoid potential collision, transceivers wait for additional random
slot durations after the DIFS before sending their pending packets.
Management frames are also transmitted during the asynchronous data
transmission time period.
Figure 11.2 shows these general HomeRF MAC frame formats as defined by
the standards. A HomeRF MAC frame can have a type 2 or 3 header only or a
type 1, 2, or 3 header followed by a MAC frame body and its CRC.
The HomeRF type 2 header is associated with CSMA/CA MAC frames and
additionally has a Destination Address and Source Address fields of 48 bits
each as shown in Figure 11.4.
Equation 11.1
The MAC frame header CRC is the 1's complement of the exclusive OR of the
remainder of xk (x15 + x14 +... + x + 1 divided by G(x) and the remainder of
the message polynomial multiplied by x16 and then divided by G(x), where k is
the number of MAC frame header bits. As a typical implementation, at the
transmitter, the initial remainder of the division is preset to all 1's and is then
modified by division of the message polynomial by the generator polynomial
G(x). The 1's complement of this remainder is transmitted, with the highest
order bit first, as the CRC field. At the receiver, the initial remainder is preset
to all 1's, and the serial incoming bits of the MAC frame header and CRC, when
divided by G(x), results in a unique nonzero polynomial, G(x) = x12 + x11 +
x10 + x8 + x3 + x2 + x + 1, in the absence of any transmission error.
The MAC frame body is the 1's complement of the exclusive OR of the
remainder of xk (x31 + x30 + x29 + ... + x2 + x + 1 divided by G(X) and the
remainder of the MAC frame body polynomial multiplied by x32 and then
divided by G(x), where k is the number of MAC frame body bits. As a typical
implementation, at the transmitter, the remainder of the division is initially
preset to all 1's and is then modified by dividing of the message polynomial by
the generator polynomial G(x). The 1's complement of this remainder is
transmitted, with the highest order bit first, as the FCS field. At the receiver,
the remainder is initially preset to all 1's and the serial incoming bits of the
message and FCS, when divided by G(x), results in a unique nonzero
polynomial
Equation 11.3
There are seven HomeRF MAC frame types: Information Request and Station
Information (IR and SI), Data, TDMA, Connection Point Service (CPS), Ad-hoc
Beacon, CP Beacon, and Connection Point Assertion. The IR and SI frame
format is as defined in Figure 11.6. An IR and SI frame has a Type 2 header of
21 bytes, a Managed Capabilities field of 1 byte, and a Base Capabilities field
of 1 byte and is followed by a 4-byte CRC. An IR and SI frame carries the
transmitting node modulation, compression, transmit power, power savings,
and TDMA capabilities.
The CPS frame is as defined in Figure 11.8. A CPS frame has a Type 2 Header
of 21 bytes, a CPS request ID of 1 byte, a CSID (service ID of a power
management request) of 1 byte, and a MAC Address of 6 bytes and is followed
by a 4-byte CRC. A CPS frame is used by a transceiver for service
management.
The Ad-hoc Beacon frame consists of only a Type 3 Header and is used by an
ad-hoc network to maintain synchronization.
The Connection Point Assertion frame has the frame format as defined in
Figure 11.10. A CP Assertion frame has a Type 2 Header of 21 bytes, an ACP
dwell counter of 4 bytes, a CP Priority field of 4 bits, and a CP Type field of 4
bits and is followed by a 4-byte CRC. A CP Assertion frame is broadcast by an
active CP to ensure that there is only one active CP on the network.
11.1.3 Encryption
To maintain an even DC level across the received signal, the physical layer
uses a data-whitening algorithm, called Bias Suppression Encoding, similar to
that used for FHSS wireless Ethernet. Both MAC frame header, PSDU1, and
MAC frame body, PSDU2, are whitened using a pseudo-random sequence of
length 127, which is created based on the generator polynomial S(x) = x7 + x4
+ 1. The preamble and the 4FSK Symbol field are not whitened. The original
MAC frame is exclusive-ORed with the repetition of this pseudo-random
sequence to form the whitened MAC frame. In addition, a stuff symbol is
inserted after the preamble and after every 32 whitened MAC frame symbols.
The 4FSK Symbol field is bypassed if it exists and a stuff symbol is inserted
after the 4FSK Symbol field and after every 32 whitened PSDU2 symbols.
11.2.3 Modulation
A Gaussian filter with a nominal bandwidth period product of 0.5 is used for
both 2FSK and 4FSK modulations. For 2FSK modulation, a symbol for a 1 bit is
represented by a positive frequency shift of 160 kHz from the carrier
frequency and a symbol for a 0 bit is represented by a negative frequency shift
of 160 kHz from the same carrier frequency. For 4FSK modulation, there are
four possible frequency shifts of ±72 kHz and ±216 kHz. Bit combinations of
10, 11, 01, and 00 are represented by frequency shifts of 216, 72, 72, and
216 kHz, respectively. Bit rates of 1 and 2 Mbps are provided by 2FSK and
4FSK modulations, respectively. For the normal operation, the transmit power
is defined to be between 16 and 20 dBm. For the low power operation, the
transmit power is defined to be between 0 and 4 dBm. Averaged over an
approximate bandwidth of 1.4 MHz accounting for both Gaussian filtering and
modulation effects, PSD levels are between 45.5 and 49.5 dBm/Hz or 61.5 and
57.5 dBm/Hz for normal or low power operations, respectively. A HomeRF
transceiver can operate on a received signal level of 76 and 62 dBm for 2FSK
and 4FSK, respectively. The transceiver can also operate for received signals
as strong as 20 dBm.
Within the 2.4-GHz ISM band, 79 frequency channels, at 1 MHz apart, are
defined starting with channel 0 of 2.402 GHz and ending with channel 79 of
2.48 GHz. Among these channels, 75 of them, channels 478, are used by
HomeRF. A base-hopping sequence for HomeRF is defined by
Equation 11.4
where f(I) is the hopping channel number, x is the hop pattern, I is the hop
index, and b(I) is the base-hopping sequence as defined by Figure 11.13.
Different HomeRF home wireless networks can be established using different
hop patterns. When the hop pattern x is zero, a HomeRF network hops
following the base-hopping sequence.
Equation 11.5
Equation 11.6
At signal-to-noise levels of about 36.5 and 23 dB, channel capacities for the
HomeRF environment are
Equation 11.7
Equation 11.8
11.3 Highlights of HomeRF 2.0
Equation 11.9
Assuming the required signal level of 76 and 62 dBm for 2FSK and 4FSK,
respectively, the SNRs at the receiver front end are about 31 and 17 dB. The
corresponding channel capacities for the HomeRF 2.0 environment are
Equation 11.10
Equation 11.11
11.4 Reference
The ISP usually assigns a single IP address for each subscriber. Multiple IP
addresses are usually available at extra costs. However, this might not be
necessary if a home router can be used instead. The ISP can assign either a
fixed or a dynamic IP address for its subscriber. The fixed IP address is
assigned and reserved whenever a subscriber signs up for the service. A
dynamic IP address, on the other hand, can be assigned when a subscriber
accesses the Internet, and the same IP address can be reassigned to another
subscriber when it is no longer utilized. Because the available number of IP
addresses is limited, most ISPs prefer assigning dynamic IP addresses on
demand. An IP address is used by Internet applications such as a Web browser.
When hot links of a Web page are activated through clicking, IP packets are
exchanged between a PC and Web servers across the Internet. The choice of
using a fixed or a dynamic IP address also needs to be specified in the network
portion of a PC operating system. For Windows operating systems, it is
specified by defining TCP/IP (Transmission Control Protocol/Internet Protocol)
properties of the corresponding NIC, which can be located through the Network
icon within the Control Panel. A fixed IP address and associated subnet mask
can be entered or a dynamic IP address can be obtained automatically when
the PC is turned on and Internet applications are activated by selecting the
corresponding choice.
Along with the assigned fixed IP address, other information such as router (or
Gateway) IP address, DNS (Domain Name Server) IP address also need to be
specified in the network portion of a PC for Internet applications to function
properly. For the dynamically assigned IP address case, DHCP (Dynamic Host
Configuration Protocol) is used to obtain an IP address through the ISP router.
The PC first sends a broadcast request (called a DISCOVER or
DHCPDISCOVER), looking for a DHCP server to answer. The ISP router then
directs the DISCOVER packet to the DHCP server. The DHCP server then
temporarily reserves an IP address for the PC and sends back an OFFER (or
DHCPOFFER) packet, with that address information. The PC sends a REQUEST
(or DHCPREQUEST) packet, letting the server know that it intends to use the
address. The server sends an ACK (or DHCPACK) packet, confirming that the
PC has been given a lease on the address for a specified period of time. The
server also configures the PC's DNS servers, WINS (Windows Internet Naming
Service) servers, and sometimes other services as well.
Next let us examine what is involved in connecting a single user to the cable
modem service. Figure 12.3 shows the general cable modem installation for a
single PC in a household. A cable modem can be located anywhere in a
household as long as a regular cable TV (RG6) plug is available. The
connection between the cable modem and the PC is also via a crossover
Category 5 patch cable.
Let us look at the cable modem end-to-end system architecture to learn what
communication protocols are involved in connecting a cable modem user to the
Internet [2]. Figure 12.4 shows a cable modem end-to-end architecture from a
user to the Internet including cable modems, coaxial feeder and distribution
cables, fiber nodes, fiber cables, headend CMTS (Cable Modem Termination
Systems), ATM or packet communication links, and the ISP. The CMTS contains
a downstream modulator, an upstream demodulator, and backbone network
interface adaptors. The headend equipment also provides channel-combining
and -splitting functions because modulated cable modem RF signals share the
transmission media and frequency spectrum with other cable TV video
channels. Protocol stacks along the cable modem transmission path are also
demonstrated at the bottom part of Figure 12.4. Not shown is another MAC
layer within the HFC (Hybrid Fiber Coaxial) transmission system between cable
modems and CMTS. Details of this architecture are defined by specifications
under the name of DOCSIS (Data Over Cable System Interface Specification)
released by Cable Labs [3].
Ethernet packets that arrive at a cable modem from a PC are attached with a
new MAC header of 6 bytes to form a cable modem MAC frame, scrambled
using a generator polynomial of G(x) = x15 + x14 + 1, Reed-Solomon encoded
with t = 110 as specified by CMTS, appended with a preamble of a variable
length also specified by CMTS, and modulated to an RF carrier of between 5
and 30 MHz in the upstream direction (from a cable modem to CMTS).
Depending on the modulation baud rate, an upstream RF carrier has a
bandwidth of between 200 kHz to 3.2 MHz including guard bands. A multiple
number of upstream RF carriers can be arranged in the available upstream
spectrum of between 5 and 30 MHz. Each upstream RF carrier is shared by a
group of cable modems according to the definition of minislots of duration kt,
where k = 1, 2, 4, 8, 16, 32, 64 or 128 and t = 6.25 µs. The cable modem
MAC is designed to ensure multiple access to a specific upstream RF carrier by
multiple cable modems without much collision. Motion Picture Expert Group
(MPEG) packets that arrive at a cable modem from a CMTS have a header of 4
bytes and a payload of 184 bytes for a total length of 188 bytes. Each MPEG
packet can contain more than one cable modem MAC frame or a partial of a
MAC frame.
Both cable modem and CMTS can be LLC hosts and IP hosts. A cable modem
and its CMTS can identify each other via the LLC layer through exchange XID
packets. IP packets can also be exchanged between a cable modem and CMTS
via the LLC layer using either DIX (DEC, Intel, and Xerox also called Ethernet
II) or SNAP protocol. Figure 12.5 shows the general Ethernet LLC frame
structure [4]. An LLC frame consists of a 2-byte Destination Service Access
Point (DSAP) address, a 2-byte Source Service Access Point (SSAP) address,
and a 1- or 2-byte Control field and is followed by data of a variable number of
bytes. Figure 12.6 shows the Ethernet II frame structure.
Another popular home network application is for sharing files on hard disk
drives, printers, scanners, cameras, and the like among multiple PCs. Figure
12.7 shows how multiple PCs in a household can be interconnected via a
Category 5 twisted pairbased 10BaseT/100BaseTX Ethernet. To locate the
Ethernet hub at a central location, a star or home-run telephone wiring
topology with data-grade cables is required. Because only two pairs are used
by the Ethernet, conventional telephone sets can still be connected to the
telephone service using one remaining pair of the same Category 5 twisted
pair cable. On each wall plate, one RJ-45 jack connected to Orange/Orange
stripe and Green/Green stripe pairs is used for data networking, and another
RJ-11 jack connected to the Blue/Blue stripe pair is used for telephone service.
Home-run Category 5 wiring becomes more popular for newly constructed
homes. Without home-run data-grade cable wiring, a home network can still
be implemented using HomePNA based on existing regular telephone wiring,
HomePlug based on in-house electrical wiring, or wireless technologies such as
HomeRF and IEEE 802.11.
The NBF-based peer-to-peer home network does not provide the Internet
sharing capability. Windows 98 second edition and later versions include an
Internet Connection Sharing (ICS) function. Sometimes, it might be more
convenient to use a dedicated hardware home router to share a broadband
Internet access such as an ADSL or a cable modem without paying for multiple
IP addresses. Figure 12.8 shows multiple PCs sharing an ADSL via a home
router with a built-in Ethernet hub. Figure 12.9 shows a similar configuration
sharing a cable modem among multiple PCs. Figure 12.10 shows multiple PCs
sharing a cable modem via a wireless Ethernet access point with built-in home
router function. The home router obtains either a fixed or a dynamic IP
address from the ISP and assigns dynamic internal IP addresses for sharing
PCs. The home router can usually be configured (e.g., by entering a fixed IP
address) via a Web page accessible through a connected PC.
The total number of IP addresses defined by 4 bytes is large enough (about 4.3
billion), but because of routing issues, they can only be used in blocks. There
are three common classes (A, B, and C) for IP addresses with 7, 14, and 21
bits allocated for network IDs and 24, 16, and 8 bits set aside for host IDs
after 1, 2, and 3 initial bits are excluded for class identifications, respectively.
Therefore each class is capable of providing 126, 16,256, and 2,064,512
networks with 16,777,214, 65,534, and 254 hosts for each network,
respectively. Addresses with all 0s and all 1s have been reserved for self-
identification and broadcast. A network ID is usually identified by an
organization, and a host ID, by a computer within that organization. The
network ID is usually used for routing purposes. To allow more computers
access to the Internet, an organization can use a NAT to allocate dynamically
available IP addresses to computers that are actively using the Internet.
Blocks of IP addresses, 10.0.0.0 through 10.255.255.255 for Class A,
172.16.0.0 through 172.31.255.255 16 for Class B, and 192.168.0.0. through
192.168.255.255 255 for Class C, have been reserved as internal IP
addresses. A NAT not only keeps a map relating internal IP addresses of active
computers to these assigned public IP addresses but also replaces an internal
source IP address with a mapped public IP address when sending a packet to
the Internet and replaces the corresponding public destination IP address with
the mapped Internal IP address when receiving a packet from the Internet
before delivering it through the internal network. A NAT also needs to
recalculate and replace the Header Checksum after replacing an IP address.
For the home network environment where only one IP address is available, the
use of port numbers is necessary for the NAT process. IP data within an IP
packet are usually represented in either a TCP or a UDP packet format. Port
numbers are within a TCP or UDP packet header. Figure 12.12 shows the
format of a TCP packet. A TCP packet contains Source and Destination Port
numbers of 2 bytes each. The Checksum field is the 16-bit one's complement
of the one's complement sum of all 16-bit words in the header and TCP data.
While computing the checksum, the checksum field itself is replaced with
zeros. The checksum also covers a 96-bit pseudo header conceptually prefixed
to the TCP header. This pseudo header contains the source address, destination
address, protocol number, and TCP packet length and protects the TCP against
misrouted segments. The TCP header padding, composed of zeros, is used to
ensure that the TCP header ends and data begins on a multiple of 4 bytes.
A home router sometimes can have more than one means to connect to PCs. A
home router can have a built-in Ethernet hub and a built-in wireless Ethernet
access point as shown in Figure 12.16. PCs connected to either Ethernet or
wireless Ethernet can share not only the ADSL broadband access service but
also files (over a peer-to-peer network), if the MAC bridge function (as defined
by the IEEE 802.1D standards [7]) is included in the home router. All LANs
(defined under the IEEE 802 standards document group) have similar but
different frame formats. A MAC bridge reframes a received packet from one
port of a LAN and forwards it to a destination node through another port
connected to a different LAN. Sometimes the recalculation of FCS is also
necessary because different LANs might use different FCS methods.
Figure 12.17 shows the basic structure of a MAC bridge, which consists of an
Ethernet NIC, a wireless Ethernet NIC, and an address table. A MAC bridge can
have more than two NICs and identifies MAC addresses of attached LANs by
monitoring transmission traffic. A MAC bridge also forwards broadcast packets
across different LANs to help nodes on different LANs discover each other.
Once learned, a MAC bridge forwards received packets to another LAN
according to its MAC address and makes boundaries between different LANs
transparent. It does not have to be inside a home router and a home router
can be connected to any particular LAN among a number of different LANs
connected through a MAC bridge. IEEE 802.1D allows multiple MAC bridges to
exist across a number of different LANs, and any potential loop is avoided
through the execution of the Spanning Tree algorithm.
Figure 12.17. Components of a MAC Bridge
Packets other than those of an IEEE LAN cannot be forwarded through a MAC
bridge directly; however, they can be delivered across an Ethernet-based home
network through proper encapsulation. Figure 12.18 shows the sharing of in-
house electrical wiring with an Ethernet-based HomePlug home network and
an X-10 home automation network. All three PCs have HomePlug NICs, and
one PC can control some lights and appliances equipped with X-10 devices. The
PC with an X-10 device can control these lights and appliances by sending
proper X-10 packets generated by choosing the corresponding items through
an on-screen display. Another similar screen interface can also be developed
and implemented on PCs without X-10 devices to send Ethernet (via
HomePlug) encapsulated X-10 packets to the PC with the X-10 device and ask
the PC to deliver the packets for them. The PC delivering the X-10 packet
performs a similar function as that by a MAC bridge. However, the PC might
need to provide much more help if an X-10 device is interested in talking back
to a PC that is not directly connected to the X-10 home automation network.
The task might be classified as translation instead of bridging.
4. ANSI/IEEE Std 802.2, Part 2: Logic Link Control (LLC), 1998 Edition.
5. ourworld.compuserve.com/homepages/timothydevans/cmpibmpc.htm.
6. www.suse.de/~mha/linux-ip-nat/diplom/nat.html.
7. ANSI/IEEE Std 802.1D, Part 3: Media Access Control (MAC) Bridges, 1998
Edition.
About the Author
Dr. Walter Y. Chen grew up in Shanghai, China, during the cultural revolution
of Chairman Mao. The traditional (Soviet) style of language, math, and science
curriculum was totally interrupted during the third grade of his six-year
elementary school education. Students of his age began studying newspaper
propaganda articles and attending confession-style group self-examinations
and political gatherings and street demonstrations. With so much spare time
but no formal academic work, Walter turned his curiosity to assembling
electronic devices, starting with a crystal radio and advancing to black and
white transistor television sets, with help from his uncles. Initially they helped
him debug his electronic circuits, but then they began to introduce him to
relevant books. Eventually, Walter was not only reading electronics books but
also many of his uncles' high school and college math and physics textbooks.
From this exposure, Walter determined that writing books was probably an
interesting and worthwhile thing to do.
After graduating summa cum laude from Polytechnic Institute of New York with
a B.S. degree in Electrical Engineering, Walter joined Bell Labs' One Year On
Campus (OYOC) educational program. He received his M.S. degree in Electrical
Engineering from California Institute of Technology. Walter subsequently spent
13 years working in different Bell divisions, among them AT&T Information
Systems, Bell Labs, NYNEX, and Bellcore. During these years, he was involved
in PBX systems engineering, DataPhone II ASIC design, as well as HDSL,
ADSL, and Cable Modem systems engineering, laying the foundation for the
information he presents in this book. He also earned his Ph.D. degree in
Electrical Engineering from Polytechnic University while with the Bell system.