A comparison of wi-fi and wimax with case studies - Florida State ...
A comparison of wi-fi and wimax with case studies - Florida State ...
A comparison of wi-fi and wimax with case studies - Florida State ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
THE FLORIDA STATE UNIVERSITY<br />
COLLEGE OF ENGINEERING<br />
A COMPARISON OF WI-FI AND WIMAX WITH CASE STUDIES<br />
By<br />
Ming-Chieh Wu<br />
A Thesis submitted to the<br />
Department <strong>of</strong> Electrical <strong>and</strong> Computer Engineering<br />
in partial ful<strong>fi</strong>llment <strong>of</strong> the<br />
requirements for the degree <strong>of</strong><br />
Master <strong>of</strong> Science<br />
Degree Awarded:<br />
Fall Semester, 2007
The members <strong>of</strong> the Committee approve the Thesis <strong>of</strong> Ming-Chieh Wu defended on October 30 th ,<br />
2007.<br />
Approved:<br />
Bruce A. Harvey<br />
Pr<strong>of</strong>essor Directing Thesis<br />
Ming Yu<br />
Committee Member<br />
Simon Y. Foo<br />
Committee Member<br />
Victor DeBrunner, Chair, Department <strong>of</strong> Electrical <strong>and</strong> Computer Engineering<br />
Ching-Jen Chen, Dean, FAMU-FSU College <strong>of</strong> Engineering<br />
The Of<strong>fi</strong>ce <strong>of</strong> Graduate Studies has veri<strong>fi</strong>ed <strong>and</strong> approved the above named committee members.<br />
ii
TABLE OF CONTENTS<br />
List <strong>of</strong> Tables…………………………..………….………………………………………..……vi<br />
List <strong>of</strong> Figures………………………………….…………………………………………….…vii<br />
List <strong>of</strong> Abbreviations……………………..………….………………………………………….ix<br />
ABSTRACT……………………………………………..……………………………………...xii<br />
CHAPTER ONE<br />
1. Introduction …………………………………………………………………………………....1<br />
CHAPTER TWO<br />
2. 3G…………………………………..…………………………………………………………..5<br />
2.1. Introduction………………………………………………………………………...…..5<br />
2.2. Technologies…………………………………………………………………………...5<br />
2.2.1. WCDMA……………………………….………………………………………..5<br />
2.2.2. CDMA2000………………………………………………………………….…..6<br />
2.2.3. TD-SCDMA……………………………………………………………….…….6<br />
2.3. Development…………………………………………………..……………………….7<br />
2.4. Cases………………………………………………………………..…………….…….8<br />
2.5. Conclusion……………………………………………………………………….……..9<br />
CHAPTER THREE<br />
3. IEEE 802.11, Wireless LAN…………………………………………………...……………..10<br />
3.1. The background <strong>of</strong> IEEE 802.11…………………………………………….………10<br />
3.2. Capacity……………………………………………………………………….….….11<br />
3.3. The Physical Layer <strong>and</strong> MAC Layer…………………………………………...……14<br />
3.3.1. The Physical Layer………………………………………………..……….….14<br />
3.3.1.1. Introduction……………………………………………………….……14<br />
3.3.1.2. PLCP <strong>and</strong> PMD…………………..………………………...……….……15<br />
3.3.1.3. CS/CCA………………………………………………………….……….15<br />
3.3.1.4. IEEE 802.11b, DSSS <strong>and</strong> HR-DSSS…………………………..…...…..16<br />
3.3.1.4.1. Theory <strong>and</strong> Transmission method…………………………………16<br />
3.3.1.4.2. Against interference……………………..…………………………17<br />
3.3.1.4.3. PLCP <strong>and</strong> PMD <strong>of</strong> DSSS…………………….......................……..17<br />
3.3.1.4.4. HR-DSSS <strong>and</strong> CCK…………………………………………..……18<br />
3.3.1.4.5. PLCP <strong>and</strong> PMD <strong>of</strong> HR-DSSS………..……………....……………19<br />
3.3.1.5. IEEE 802.11a <strong>and</strong> OFDM…………………………………………….…20<br />
3.3.1.5.1. Background…………………………………………………..…….20<br />
3.3.1.5.2. Principles…………………………………………………………..20<br />
3.3.1.5.3. The IEEE 802.11a’s OFDM <strong>and</strong> its PLCP <strong>and</strong> PMD……………..22<br />
3.3.1.6. IEEE 802.11g <strong>and</strong> the Physical Layer……………………………………24<br />
3.3.1.6.1. Background <strong>and</strong> Backward Compatibility………….……...……24<br />
3.3.1.6.2. ERP-OFDM <strong>and</strong> DSSS-OFDM………………………………..…..25<br />
3.3.2. MAC Layer………………………………………………………………..…….27<br />
3.3.2.1. Introduction……………………………………………...….……………27<br />
3.3.2.2. DCF <strong>and</strong> PCF…………………………….……………………………..27<br />
iii
3.3.2.3. Hidden node <strong>and</strong> CSMA/CA……………………………......……………28<br />
3.3.2.4. Fragmentation………………………………………………………….30<br />
3.3.2.5. Interframe spacing………………………………………………………..30<br />
3.3.2.6. Power saving………………………………..…………………………….31<br />
3.3.2.7. Security…………………………………….……………………………..32<br />
3.4. The next generation st<strong>and</strong>ard…………………………………………………………..34<br />
3.4.1. IEEE 802.11n…………………………………………..………………………..34<br />
3.4.2. MIMO (Multiple-Input/Multiple-Output)………………….………………...…35<br />
3.5. Limitation………………………………………………………..……………………..35<br />
CHAPTER FOUR<br />
4. IEEE 802.16, Wireless MAN………………………………………………………...……….37<br />
4.1. The background <strong>of</strong> IEEE 802.16……………………………………...….………….37<br />
4.2. Capacity <strong>of</strong> the IEEE 802.16 family………………………………………...…………39<br />
4.2.1. IEEE 802.16………………………………………………………………….….39<br />
4.2.2. IEEE 802.16a………………………………………………………………..…..39<br />
4.2.3. IEEE 802.16c…………………………………………………………..………..39<br />
4.2.4. IEEE 802.16-2004.……………………………………………...…...………….39<br />
4.2.5. IEEE 802.16e-2005…………………………………………………………..….40<br />
4.2.6. IEEE 802.16f, IEEE 802.16g <strong>and</strong> IEEE 802.16h……………….…………….40<br />
4.3. The Physical Layer <strong>and</strong> MAC Layer…………………………….......…...……………42<br />
4.3.1. IEEE 802.16-2004……………………………………………….………..…..42<br />
4.3.1.1. Physical Layer…………………………………………….…………....42<br />
4.3.1.1.1. Four transmission mode: SC, SCa, OFDM <strong>and</strong> OFDMA…………44<br />
4.3.1.1.2. AMC (Adaptive Modulation <strong>and</strong> Coding)….…………………...44<br />
4.3.1.1.3. Channel-quality Measurement……………………………………..45<br />
4.3.1.1.4. OFDM in WiMax……………………...………….……………….45<br />
4.3.1.2. MAC Layer……………………………………………………….…..…..46<br />
4.3.1.2.1. Three sublayers: CS, CPS <strong>and</strong> SS…………...…….………………46<br />
4.3.1.2.2. AAS (Advanced Antenna Systems)………………….…...……..47<br />
4.3.1.2.3. QoS……………………………………………………..………….47<br />
4.3.1.2.4. Security…………………………………………………………….49<br />
4.3.1.2.4.1. Overview……………………………………...……………49<br />
4.3.1.2.4.2. Overall Analysis………………….……………...………..52<br />
4.3.2. IEEE 802.16e-2005, the newest st<strong>and</strong>ard…………………………………….....53<br />
4.3.2.1. OFDMA-PHY………………………………...………………………..53<br />
4.3.2.1.1. Background…………………..…………………………………….53<br />
4.3.2.1.2. Frame structure…………………….………………………………53<br />
4.3.2.1.3. Various Subcarrier Allocation Modes……………………………..54<br />
4.3.2.2. MAC Layer…………..…………………………………………………..56<br />
4.3.2.2.1. QoS…………………….…………………………………………..56<br />
4.3.2.2.2. Power-saving………….………………………………………...…57<br />
4.3.2.2.2.1. Sleep Mode…………….……………………………………57<br />
4.3.2.2.2.2. Idle Mode……...…………………………………………….58<br />
4.4. The future <strong>of</strong> WiMax…………………………….……………..……………………58<br />
CHAPTER FIVE<br />
iv
5. Case study…………………………………………………………………………………….61<br />
5.1. FSU <strong>wi</strong>reless network………………………………………………………………….61<br />
5.1.1. Introduction………………………………………………………………...……61<br />
5.1.2. Implementation…………….……………………………………………………62<br />
5.1.3. Analysis…………………………………………………………….…………73<br />
5.1.4. Conclusion…………….……………………………………...…………………74<br />
5.2. WiFly in Taipei……………………………..………………………………………….74<br />
5.2.1. Introduction………………………..…………………………………………….74<br />
5.2.2. Implementation………………………………………………………………….75<br />
5.2.3. Analysis…………………………....………………………………………….83<br />
5.2.4. Conclusion……………………….…………………………………………....86<br />
5.3. Wibro in South Korea…………………………….……………………………………86<br />
5.3.1. Introduction…………………………….………………………………………..86<br />
5.3.2. History…………………………………………………………………….…..87<br />
5.3.3. Implementation……………………………………………….......................…..88<br />
5.3.4. Analysis……………………………………………………………………...….92<br />
5.3.5. Conclusion……………………………..…………………….……………….....93<br />
5.4 . Overall analysis………………………...………………………..……………..………94<br />
5.5. Other developing <strong>wi</strong>reless network………...……………………………….……….95<br />
CHAPTER SIX<br />
6. Conclusion…………………………………………………..…………………….………..98<br />
BIBLIOGRAPHY……………………………………...…………………………….………..101<br />
BIOGRAPHICAL SKETCH…………………………………………………………………110<br />
v
LIST OF TABLES<br />
Table 1-1 802.3 Family……………………………………………………..…………..……….2<br />
Table 3-1 Family <strong>of</strong> IEEE 802.11……………..……..……………………..…………………11<br />
Table 3-2 Capacities for 802.11a/b/g……………….……...…………….………………………12<br />
Table 3-3 IEEE 802.11b/g Channel Used for Different Countries……….……...………………12<br />
Table 3-4 IEEE 802.11a Channel Use for North America…………….……………............13<br />
Table 3-5 OFDM Modulation <strong>and</strong> Data Rate…………………...…………………..………..23<br />
Table 4-1 The Basic Data <strong>of</strong> IEEE 802.16………………………………………...….41<br />
Table 4-2 Modulation <strong>and</strong> Coding Supported in WiMax……………..…………..…..45<br />
Table 4-3 OFDM Parameters Used for WiMAX…………………..…………..…….46<br />
Table 4-4 Service Flows in WiMax……………………...……………………..…….48<br />
Table 4-5 DL Distributed Subcarrier Permutation (FUSC)………….………..………55<br />
Table 4-6 UL-DL Adjacent Subcarrier Permutation ………………………….………….……..56<br />
Table 5-1 The Basic Information <strong>of</strong> FSUWIN………………………………………...…66<br />
Table 5-2 Xirrus XS-3700 AP Technology Data………….……………………………....66<br />
Table 5-3 Foundry Networks IP250 Technology Data……………...……….…….......….66<br />
Table 5-4 Vivato 2.4 GHz Indoor & Outdoor Wi-Fi S<strong>wi</strong>tch Technology Data…...…..…68<br />
Table 5-5 Parameters <strong>of</strong> WLAN <strong>and</strong> Mesh Network……………………….....………..70<br />
Table 5-6 Features <strong>of</strong> Nortel Wireless Mesh Network………………..….…………..77<br />
Table 5-7 The Numbers <strong>of</strong> Subscribers………………...……………..…………………79<br />
Table 5-8 The Comparison <strong>of</strong> WiBro <strong>and</strong> WiMax……………………...….……………..92<br />
Table 5-9 The Basic Data <strong>of</strong> FSUWIN, WiFly <strong>and</strong> WiBro…………..…………………96<br />
Table 5-10 Current Internet Access Technologies……………….……..…………..……..97<br />
Table 6-1 3G, Wi-Fi <strong>and</strong> WiMax Overall Comparison………………………….………..98<br />
vi
LIST OF FIGURES<br />
Figure 2-1 The Evolution <strong>of</strong> 3G………………………………...………...…………..7<br />
Figure 3-1 OSI Model………………………………………..…………..…………..14<br />
Figure 3-2 802.11 PLCP, PMD <strong>and</strong> MAC Structure…………..………………..……15<br />
Figure 3-3 DSSS Transmission………………………………..…………………...…16<br />
Figure 3-4 DSSS PLCP………………………………………..………………..……18<br />
Figure 3-5 CCK Modulation…………………………………..……………………..19<br />
Figure 3-6 HR/DSSS PLCP Framing…………………………..…………………….19<br />
Figure 3-7 FDM <strong>and</strong> OFDM…………………………………..……………………..20<br />
Figure 3-8 CP <strong>and</strong> PP………………………………………..…….…………………21<br />
Figure 3-9 OFDM Modem……………………………………..….…………………22<br />
Figure 3-10 Constellations Diagram…………………………..……………………..23<br />
Figure 3-11 OFDM PLCP Structure………………………….………………………24<br />
Figure 3-12 DSSS-OFDM PSDU Format………………………..…..………………26<br />
Figure 3-13 DSSS-OFDM Long Preamble Structure……………..…………………..26<br />
Figure 3-14 DSSS-OFDM Short Preamble Structure……………………..…………..27<br />
Figure 3-15 The Hidden Node Problem………………………..………...……………28<br />
Figure 3-16 CDMA/CA………………………………………..…………….………29<br />
Figure 3-17 Virtual Channel Sensing…………………………..……………………..29<br />
Figure 3-18 A Fragment Burst…………………………………..…………………....30<br />
Figure 3-19 Frame Interval for IEEE 802.11…………...………..…………………..31<br />
Figure 3-20 WEP Frame <strong>and</strong> Operation…………………………..…………………..33<br />
Figure 3-21 The WEP Encryption Process………………………….………………..33<br />
Figure 4-1 The Layer Structure <strong>of</strong> IEEE802.16……………………..………...………43<br />
Figure 4-2 A Spatial Multiplexing MIMO System…………………....………………44<br />
Figure 4-3 PKM Authorization Process <strong>and</strong> Parameters………………..…………….50<br />
Figure 4-4 PKM Protocol Messages Exchange Process <strong>and</strong> Parameters…….....……………..51<br />
Figure 4-5 Encryption Frame Structure <strong>and</strong> Process……………………..…….……..52<br />
Figure 4-6 OFDMA Frame Structure……………………………………..…………..54<br />
Figure 4-7 Coverage <strong>and</strong> Capacity for Different Wireless Access Techniques…..….....59<br />
Figure 5-1 The Coverage <strong>of</strong> FSU Wireless Network………….…..……………………….62<br />
Figure 5-2 Fisher Lecture Hall………………………..………..…………………….64<br />
Figure 5-3 L<strong>and</strong>is Green………………………………………..…..………………..65<br />
Figure 5-4 Shores Library……………………………………..………………….….65<br />
Figure 5-5 Stadium……………………………………………..……………………66<br />
Figure 5-6 Xirrus XS-3700 AP…………………………………………………………..67<br />
Figure 5-7 Foundry Networks IP250……..………………………..………...…………..69<br />
Figure 5-8 Vivato 2.4 GHz Indoor & Outdoor Wi-Fi S<strong>wi</strong>tches………..……………..72<br />
Figure 5-9 FSUWIN Login System……………………………………..…………….74<br />
Figure 5-10 Wireless Mesh Network Structure I……………...………..…………….76<br />
Figure 5-11 Wireless Mesh Network Structure II………………….…..…………….76<br />
Figure 5-12 Wireless Access Point 7220………………………………..….………..77<br />
Figure 5-13 Nortel Wireless Mesh Network Solution Example…………..…………..80<br />
Figure 5-14 The Relationship Between WiMax <strong>and</strong> WiBro……...……..……………..87<br />
Figure 5-15 The Network Structure <strong>of</strong> WiBro……………………..……..……………87<br />
vii
Figure 5-16 The Operation B<strong>and</strong> <strong>of</strong> WiBro……………………………………..………...…….88<br />
Figure 5-17 WiBro Features………………………...…………………..…………..……89<br />
Figure 5-18 MAC Layer Model…………………………………………..……….……..90<br />
Figure 5-19 U-RAS Premium……………………………………………..…….………91<br />
Figure 5-20 ACR Basic Data……………………..……………………………………….91<br />
Figure 5-21 An Example Application <strong>of</strong> 3G, Wi-Fi <strong>and</strong> WiMax…………………..……..95<br />
Figure 6-1 Cooperation <strong>of</strong> WiMax <strong>and</strong> Wi-Fi………………………………………...…100<br />
viii
LIST OF ABBREVIATIONS<br />
Abbreviation Full Name Page<br />
3G Third generation <strong>of</strong> mobile phone st<strong>and</strong>ards <strong>and</strong> technologies 5<br />
3GPP 3 rd Generation Partnership Project 5<br />
AAS Advanced Antenna Systems 42<br />
ACK Acknowledgement 26<br />
AGC Automatic Gain Control 21<br />
AMC Adaptive Modulation <strong>and</strong> Coding 40<br />
AP Access Point 32<br />
APEC Asia Paci<strong>fi</strong>c Economic Cooperation 93<br />
ARPA Advanced Research Projects Agency 1<br />
BE Best-effort service 44<br />
BER Bit Error Rate 20<br />
BS Base Station 29<br />
BTC Block Turbo Codes 40<br />
BWA Broadb<strong>and</strong> Wireless Access 34<br />
CCK Complementary Code Keying 16<br />
CDMA/CA Carrier Sense Multiple Access/Collision Avoidance 25<br />
CDMA/CD Carrier Sense Multiple Access/Collision Detection 26<br />
CDMA2000 1X<br />
Evolution-Data Only 6<br />
EV-DO<br />
CID Connection Identi<strong>fi</strong>er 42<br />
COFDM Coded OFDM 20<br />
CP cyclic pre<strong>fi</strong>x 19<br />
CS/CCA Carrier Sense/Clear Channel Assessment 14<br />
CT Communication Technology ix<br />
CTC Convolution Turbo Codes 40<br />
CTS Clear To Send 23, 26<br />
DBPSK Differential Binary Phase shift Keying 15<br />
DCF Distributed Coordination Function 25<br />
DECT Digital-Enhanced Cordless Telephony 34<br />
DIFS DCF InterFrame Spacing 28<br />
DL Downlink 48<br />
DQPSK Differential Quadrature Phase shift Keying 15<br />
DSSS Direct Sequence Spread Spectrum 14<br />
EIFS Extended InterFrame Spacing 28<br />
ERP Extended Rate PHY 22<br />
ertPS Extended Real-Time Polling Service 51<br />
FCC Federal Communications Commission 11<br />
FDD Frequency Division Duplexing 35<br />
FDM Frequency Division Multiplexing 18<br />
FDMA Frequency Division Multiple Access 47<br />
FEC Forward Error Correction 40<br />
FFT Fast Fourier Transform 19<br />
ix
FOMA Freedom <strong>of</strong> Mobile Multimedia Access 8<br />
FSUWIN <strong>Florida</strong> <strong>State</strong> University Wireless Integrated Network 55<br />
FUSC Fully Used Subchannelization 48, 49<br />
GPRS General Packet Radio Service 5<br />
GSM<br />
Global System for Mobile Communications/Pan-European digital<br />
5<br />
cellular l<strong>and</strong> mobile telecommunication system<br />
ICI inter-carrier interference 19<br />
ICV Integrity Check Value 29<br />
IEEE Institute <strong>of</strong> Electrical <strong>and</strong> Electronic Engineers 1<br />
IFFT inverse Fast Fourier Transform 19<br />
IMT International Mobile Telecommunication 5<br />
ISI Inter-symbol interference 19<br />
ISP Internet Service Provider 33<br />
IT Information Technology ix<br />
ITU International Telecommunication Union 5<br />
IV Initialization Vector 29<br />
KT Korean Telecoms Industry 86<br />
LDPC Low Density Parity Check 40<br />
LMDS Local Multipoint Distribution Systems 34<br />
LOS Line <strong>of</strong> Sight 34<br />
MAC Media Access Control 25<br />
MIMO Multiple-Input/Multiple-Output 31<br />
MMDS Multichannel Multipoint Distribution Services 34<br />
MMS Multimedia Message Service) 5<br />
MPDUs MAC Protocol Data Units 13<br />
MS Mobile Station 28<br />
MSDUs MAC Service Data Units 41<br />
NAV Network Allocation Vector 23, 26<br />
NLOS Non-Line <strong>of</strong> Sight 35<br />
nrtPS Non-real-time polling service 43<br />
OFDM Orthogonal Frequency Division Multiplexing 9, 19<br />
OFDMA Orthogonal Frequency Division Multiple Access 47<br />
OSI Open System Interconnection 12<br />
OTC Of<strong>fi</strong>ce <strong>of</strong> Telecommunications <strong>and</strong> Networking 55<br />
PBCC Packet Binary Convolution Coding 22<br />
PCF Point Coordination Function 25<br />
PIFS PCF InterFrame Spacing 28<br />
PKM Privacy <strong>and</strong> Key Management 44<br />
PLCP Physical Layer Convergence Protocol 13<br />
PMD Physical Medium Dependent 13<br />
PN Codes Pseudor<strong>and</strong>om Noise Codes 15<br />
PP cyclic post<strong>fi</strong>x 19<br />
PPDU PLCP Protocol Data Unit 13<br />
PRNG Pseudor<strong>and</strong>om Number Generator 29<br />
PSDU PLCP Service Data Unit 13<br />
x
PSS Portable Subscriber Station 89<br />
PUSC Partially Used Subchannelization 48, 50<br />
QAM Quadrature Amplitude Modulation 20<br />
QoS Quality <strong>of</strong> Service 42<br />
RAS Radio Access Station 89<br />
RCF Request to Send 26<br />
RS-CC Reed Solomon – Convolution Code 40<br />
rtPS Real-time polling services 43<br />
SA Security Associations 44<br />
SDUs Service Data Units 51<br />
SIFS Short Inter-Frame Space 23, 28<br />
SKT South Korea Telecom 8<br />
SS Subscriber Station 44<br />
STBC Space-Time Block Coding 32<br />
TCP/IP Transmission Control protocol/Internet Protocol 3<br />
TDD Time Division Duplexing 35<br />
TDM Time Division Multiplexing 35<br />
TD-SCDMA Time Division - Synchronized Code Division Multiple Access 5<br />
UGS Unsolicited grant services 43<br />
UL Uplink 48<br />
UMTS Universal Mobile Telecommunications System 5<br />
VoIP Voice over IP 32<br />
WCDMA Wideb<strong>and</strong> Code Division Multiple Access 5<br />
WEP Wired Equivalent Privacy 29<br />
WiBro Wireless Broadb<strong>and</strong> Access Service 86<br />
Wi-Fi Wireless <strong>fi</strong>delity 31<br />
WiMax World Interoperability for Microwave Access 35<br />
WISP Wireless Internet Service Provider 34<br />
WLAN Wireless Local Area Network 9<br />
WLL Wireless Local-Loop 34<br />
WMAN Wireless Metropolitan Area Network 35<br />
WWW World Wide Web 3<br />
xi
ABSTRACT<br />
Currently over 50% <strong>of</strong> the world’s population check their e-mails everyday. Collecting<br />
information from the Internet is a routine. In the early 21 st century, <strong>wi</strong>reless communication has<br />
become a hot topic in IT (Information Technology) <strong>and</strong> CT (Communication Technology), as<br />
evidenced by the growth <strong>of</strong> <strong>wi</strong>reless technologies such as 3G, Wi-Fi <strong>and</strong> WiMax. 3G is a cellular<br />
technology developed in conjunction <strong>wi</strong>th the cellular phone network. Wi-Fi is a <strong>wi</strong>reless local<br />
area network technology. WiMax is designed for the <strong>wi</strong>reless metropolitan area network. Today,<br />
people not only want the <strong>fi</strong>xed <strong>wi</strong>reless access to the Internet, but also want the mobile <strong>wi</strong>reless<br />
access as well. They want a ubiquitous connection, even when in a train, a cab, or the subway.<br />
This dem<strong>and</strong> is resulting in increasing competition between the leading <strong>wi</strong>reless technologies.<br />
3G, Wi-Fi <strong>and</strong> WiMax all appear to have the potential to feed the dem<strong>and</strong>, but still have issues<br />
that need to be addressed. The future direction <strong>of</strong> <strong>wi</strong>reless Internet access is uncertain, including<br />
whether these three technologies <strong>wi</strong>ll operate cooperatively or competitively. This thesis is<br />
going to predict the future direction by analysis <strong>of</strong> 3G, Wi-Fi <strong>and</strong> WiMax technologies <strong>and</strong> the<br />
evaluation <strong>of</strong> three <strong>wi</strong>reless access <strong>case</strong> <strong>studies</strong>.<br />
This thesis <strong>wi</strong>ll begin <strong>wi</strong>th an introduction to the history <strong>of</strong> Internet <strong>and</strong> <strong>wi</strong>ll then continue<br />
<strong>wi</strong>th a discussion <strong>of</strong> the technical aspects <strong>of</strong> 3G, Wi-Fi <strong>and</strong> WiMax. After the technology<br />
introduction, this thesis <strong>wi</strong>ll evaluate three current implementations <strong>of</strong> <strong>wi</strong>reless Internet access as<br />
<strong>case</strong> <strong>studies</strong> to verify the capabilities <strong>of</strong> Wi-Fi <strong>and</strong> WiMax, <strong>and</strong> to discuss the feasibility <strong>of</strong><br />
building a city-<strong>wi</strong>de <strong>wi</strong>reless network. Finally, a reasonable prediction <strong>of</strong> the future<br />
implementation <strong>of</strong> a city-<strong>wi</strong>de <strong>wi</strong>reless Internet structure <strong>wi</strong>ll be presented.<br />
xii
CHAPTER ONE<br />
1. Introduction<br />
The cellphone company Nokia uses the slogan <strong>of</strong> “connecting people” in its advertising<br />
campaign. That means that technologies should be based on dem<strong>and</strong> <strong>and</strong> humility. In the <strong>fi</strong>eld <strong>of</strong><br />
the Internet, the basis <strong>of</strong> all research <strong>and</strong> innovation is geared towards making transmission <strong>of</strong><br />
communication more ef<strong>fi</strong>cient. The network technology that would eventually evolve into “the<br />
Internet” was initially developed by the military requisition called ARPANET, during late 1960s.<br />
ARPA is the acronym for Advanced Research Projects Agency an agency <strong>of</strong> the Department <strong>of</strong><br />
Defense. This network was the pioneer <strong>of</strong> the “packet s<strong>wi</strong>tch” type network. Little did the<br />
originators <strong>of</strong> ARPANET realize that this network would eventually lead to a method that could<br />
connect every PC in the world for sharing <strong>and</strong> exchanging information. The two most signi<strong>fi</strong>cant<br />
features <strong>of</strong> ARPANET were the concept <strong>of</strong> network routing <strong>and</strong> the use <strong>of</strong> packet for data<br />
transfer. In ARPANET, each computer was a node <strong>and</strong> it received the data <strong>and</strong> then routed it to<br />
next node. ARPANET was also the <strong>fi</strong>rst network using packet s<strong>wi</strong>tching to transmit data. Each<br />
node could send each packet to its destination by different paths, so it could improve the<br />
transmission to become more ef<strong>fi</strong>cient <strong>and</strong> more reliable. In the beginning, this project only<br />
included four locations, Stanford Research institute, UCLA, UC Santa Barbara <strong>and</strong> Utah<br />
University. After it was initiated successfully in 1969, the locations extended to the east coast the<br />
follo<strong>wi</strong>ng year including MIT, Harvard, Beranek <strong>and</strong> Newman. This was the world’s <strong>fi</strong>rst WAN<br />
(Wide Area Network).<br />
In 1973, the Xerox Corporation, located in California, developed the LAN (Local Area<br />
Network) for connecting PCs <strong>wi</strong>thin a local area. Therefore, the Ethernet was formed. The DIX<br />
alliance (DEC, Intel <strong>and</strong> Xerox) was the <strong>fi</strong>rst pusher <strong>of</strong> Ethernet <strong>and</strong> then transferred the patent<br />
right to IEEE (Institute <strong>of</strong> Electrical <strong>and</strong> Electronic Engineers). This move made Ethernet<br />
become popular very quickly. In 1982, DIX published Ethernet Version 2 (EV2) <strong>and</strong> later on<br />
IEEE published IEEE 802.3 CDMA/CD st<strong>and</strong>ard which was based on EV2 in 1983. Today, the<br />
IEEE 802.3 series is the most well-known Ethernet st<strong>and</strong>ard. The IEEE 802.3 is a big family that<br />
is presented in table 1-1[67][86]. They can support speeds from 10 Mbps to 1 Gbps. The<br />
increased technology causes the Internet to continually speed up.<br />
Communication technology continues to develop <strong>and</strong> an increasing number <strong>of</strong><br />
communication technologies have been implemented. However these technologies may not be<br />
compatible <strong>wi</strong>th each other. The ARPANET researchers developed a set <strong>of</strong> protocols called<br />
TCP/IP (Transmission Control protocol/Internet Protocol) to integrate networks that may be<br />
based on differing communications technologies <strong>and</strong> protocols. Internet research was not only<br />
conducted in U.S., but also in other places such as Europe, Asia, Canada <strong>and</strong> so on. Competing<br />
1
protocols such as the X.25 protocol from Europe were developed, but eventually TCI/IP became<br />
accepted as a world-<strong>wi</strong>de st<strong>and</strong>ard <strong>and</strong> the world-<strong>wi</strong>de Internet was formed.<br />
Ethernet<br />
St<strong>and</strong>ard<br />
Experimental<br />
Ethernet<br />
Ethernet II<br />
(DIX v2.0)<br />
Table 1-1 802.3 Family<br />
Date Description<br />
1972 2.94 Mbit/s (367 kB/s) over coaxial cable (coax) cable bus<br />
1982<br />
10 Mbit/s (1.25 MB/s) over thin coax (thinnet) - Frames have a Type <strong>fi</strong>eld. This<br />
frame format is used on all forms <strong>of</strong> Ethernet by protocols in the Internet<br />
protocol suite.<br />
IEEE 802.3 1983<br />
10BASE5 10 Mbit/s (1.25MB/s) over thick coax - same as DIX except Type<br />
<strong>fi</strong>eld is replaced by Length, <strong>and</strong> an 802.2 LLC header follows the 802.3 header<br />
802.3a 1985 10BASE2 10 Mbit/s (1.25 MB/s) over thin Coax (thinnet or cheapernet)<br />
802.3b 1985 10BROAD36<br />
802.3c 1985 10 Mbit/s (1.25 MB/s) repeater specs<br />
802.3d 1987 FOIRL (Fiber-Optic Inter-Repeater Link)<br />
802.3e 1987 1BASE5 or StarLAN<br />
802.3i 1990 10BASE-T 10 Mbit/s (1.25 MB/s) over t<strong>wi</strong>sted pair<br />
802.3j 1993 10BASE-F 10 Mbit/s (1.25 MB/s) over Fiber-Optic<br />
802.3u 1995<br />
100BASE-TX, 100BASE-T4, 100BASE-FX Fast Ethernet at 100 Mbit/s (12.5<br />
MB/s) w/auto negotiation<br />
802.3x 1997<br />
Full Duplex <strong>and</strong> flow control; also incorporates DIX framing, so there's no<br />
longer a DIX/802.3 split<br />
802.3y 1998 100BASE-T2 100 Mbit/s (12.5 MB/s) over low quality t<strong>wi</strong>sted pair<br />
802.3z 1998 1000BASE-X Gbit/s Ethernet over Fiber-Optic at 1 Gbit/s (125 MB/s)<br />
802.3-1998 1998 A revision <strong>of</strong> base st<strong>and</strong>ard incorporating the above amendments <strong>and</strong> errata<br />
802.3ab 1999 1000BASE-T Gbit/s Ethernet over t<strong>wi</strong>sted pair at 1 Gbit/s (125 MB/s)<br />
802.3ac 1998<br />
Max frame size extended to 1522 bytes (to allow "Q-tag") The Q-tag includes<br />
802.1Q VLAN information <strong>and</strong> 802.1p priority information.<br />
802.3ad 2000 Link aggregation for parallel links<br />
802.3-2002 2002 A revision <strong>of</strong> base st<strong>and</strong>ard incorporating the three prior amendments <strong>and</strong> errata<br />
802.3ae 2003<br />
10 Gbit/s (1,250 MB/s) Ethernet over <strong>fi</strong>ber; 10GBASE-SR, 10GBASE-LR,<br />
10GBASE-ER, 10GBASE-SW, 10GBASE-LW, 10GBASE-EW<br />
802.3af 2003 Power over Ethernet<br />
802.3ah 2004 Ethernet in the First Mile<br />
802.3ak 2004 10GBASE-CX4 10 Gbit/s (1,250 MB/s) Ethernet over t<strong>wi</strong>n-axial cable<br />
802.3-2005 2005 A revision <strong>of</strong> base st<strong>and</strong>ard incorporating the four prior amendments <strong>and</strong> errata.<br />
2
Table 1-1 Cont.<br />
802.3an 2006 10GBASE-T 10 Gbit/s (1,250 MB/s) Ethernet over unshielded t<strong>wi</strong>sted pair(UTP)<br />
802.3ap 2007<br />
Backplane Ethernet (1 <strong>and</strong> 10 Gbit/s (125 <strong>and</strong> 1,250 MB/s) over printed circuit<br />
boards)<br />
802.3aq 2006 10GBASE-LRM 10 Gbit/s (1,250 MB/s) Ethernet over multimode <strong>fi</strong>ber<br />
802.3ar<br />
On<br />
Hold<br />
Congestion management<br />
802.3as 2006 Frame expansion<br />
802.3at<br />
exp.<br />
2008<br />
Power over Ethernet enhancements<br />
802.3au 2006 Isolation requirements for Power Over Ethernet (802.3-2005/Cor 1)<br />
802.3av<br />
exp.<br />
2009<br />
802.3aw 2007<br />
802.3ax<br />
802.3ay<br />
802.3ba<br />
exp<br />
2008<br />
exp<br />
2008<br />
exp.<br />
2009<br />
10 Gbit/s EPON<br />
Fixed an equation in the publication <strong>of</strong> 10GBASE-T (released as 802.3-2005/Cor<br />
2)<br />
Move Link aggregation out <strong>of</strong> 802.3 to IEEE 802.1<br />
Maintenance to base st<strong>and</strong>ard<br />
Higher Speed Study Group. 40 Gb/s over 1m backplane, 10m Cu cable assembly<br />
(several pairs) <strong>and</strong> 100m <strong>of</strong> MMF <strong>and</strong> 100 Gb/s up to 10m or Cu cable assembly,<br />
100 m <strong>of</strong> MMF or 40 km <strong>of</strong> SMF respectively<br />
For creating a common information sharing space to physicists, Tim Berners-Lee (1955- ,<br />
British) designed the World Wide Web (WWW). At that time he was in the European Laboratory<br />
for Particle Physics, CERN (Conseil Européen pour la Recherche Nucléaire, European Council<br />
for Nuclear Research), <strong>and</strong> wanted to create a simple way to share <strong>and</strong> cooperate <strong>wi</strong>th other<br />
physicists around the world. Now WWW becomes another name for the Internet.<br />
In the 1990s, data transmission went into the <strong>wi</strong>reless era. Wireless transmission includes<br />
Bluetooth, Infrared, RF, IEEE 802.11, IEEE 802.16 <strong>and</strong> 3G. Currently there are several<br />
competing communication technologies for providing <strong>wi</strong>reless Internet access. The primary<br />
competitors are 3G, Wi-Fi (IEEE 802.11) <strong>and</strong> WiMax (IEEE 802.16). 3G is a cellular technology<br />
<strong>and</strong> is currently evolving into all-IP network. Wi-Fi is a <strong>wi</strong>reless local area network technology<br />
designed for home <strong>and</strong> small area implementations. WiMax is a <strong>wi</strong>reless metropolitan area<br />
network technology which can cover larger area <strong>and</strong> support mobile Internet access at speeds up<br />
to 120km/hr. Each individual technology is designed for a particular application, but their<br />
capabilities at least partially overlap. WiMax is a newer technology that promises longer ranges<br />
<strong>and</strong> mobile access. Wi-Fi has been used for ten years, but has recently been implemented in<br />
campus-<strong>wi</strong>de <strong>and</strong> city-<strong>wi</strong>de networks. Moreover 3G is trying to increase its market share in<br />
3
Internet access using the <strong>wi</strong>de availability <strong>of</strong> the cellular telephone networks. These factors make<br />
it really dif<strong>fi</strong>cult to predict the future <strong>of</strong> <strong>wi</strong>reless Internet access.<br />
In this thesis, the focus is primarily implementations <strong>of</strong> IEEE 802.11 <strong>and</strong> IEEE 802.16. In<br />
chapter 2, 3G <strong>wi</strong>ll be discussed briefly, but the low data rate <strong>of</strong> current 3G implementations limit<br />
it’s applicability for general <strong>wi</strong>reless Internet access. And for clarifying the capabilities <strong>of</strong> Wi-Fi<br />
<strong>and</strong> WiMax, this thesis <strong>wi</strong>ll include three <strong>case</strong> <strong>studies</strong>. The <strong>case</strong> <strong>studies</strong> are the FSU (<strong>Florida</strong><br />
<strong>State</strong> Univ.) campus Wi-Fi network, the city-<strong>wi</strong>de Wi-Fi network in Taipei, Taiwan, <strong>and</strong> the<br />
city-<strong>wi</strong>de WiMax network in Seoul, Korea. By comparing these three <strong>case</strong>s, the design problems<br />
<strong>and</strong> operation dif<strong>fi</strong>culties can be identi<strong>fi</strong>ed. Taipei <strong>and</strong> Seoul are both the <strong>fi</strong>rst complete city<strong>wi</strong>de<br />
<strong>wi</strong>reless network in the world. The current statuses <strong>of</strong> their networks reflect the capabilities<br />
<strong>of</strong> WiMax <strong>and</strong> Wi-Fi. By study these <strong>case</strong> <strong>studies</strong>, this paper is going to evaluate the feasibility<br />
<strong>of</strong> building a Wireless Networked City using WiMax <strong>and</strong>/or Wi-Fi.<br />
4
2.1. Introduction<br />
CHAPTER TWO<br />
2. 3G<br />
3G st<strong>and</strong>s for “third generation <strong>of</strong> mobile phone st<strong>and</strong>ards <strong>and</strong> technologies”. It was<br />
developed under the IMT-2000 program (IMT, International Mobile Telecommunication) by the<br />
International Telecommunication Union (ITU). 3G has three st<strong>and</strong>ards, WCDMA (Wideb<strong>and</strong><br />
Code Division Multiple Access), CDMA2000 <strong>and</strong> TD-SCDMA (Time Division - Synchronized<br />
Code Division Multiple Access). Also, 3G’s network is a <strong>wi</strong>de area cellular telephone network.<br />
It can provide internet access <strong>and</strong> video telephone. Compared to 2G, the 3G has higher<br />
b<strong>and</strong><strong>wi</strong>dth <strong>and</strong> faster speed. With this advantage, 3G can provide varieties <strong>of</strong> service. 3G<br />
supports both <strong>fi</strong>xed <strong>and</strong> mobile environment <strong>and</strong> is also backward compatible <strong>wi</strong>th 2G.<br />
[68][69][136] – [138]<br />
When doing vocal transmission, 3G can use Circuit S<strong>wi</strong>tch Mode for voice <strong>and</strong> video phone;<br />
for internet access/data transmission, 3G uses Packet S<strong>wi</strong>tch Mode. In this mode, users pay for<br />
how much they used, for example 0.099 cents per packet. Multimedia Message Service (MMS)<br />
is an important application <strong>of</strong> 3G. Although MMS has been applied to General Packet Radio<br />
Service (GPRS) as the 2.5G major application, <strong>wi</strong>th 3G’s advantages, <strong>wi</strong>reless communication<br />
companies can provide more choices (video, audio, pictures <strong>and</strong> text) <strong>wi</strong>th MMS.<br />
2.2. Technologies<br />
2.2.1. WCDMA<br />
WCDMA was developed by an organization called 3GPP (3 rd Generation Partnership<br />
Project, December 1998) <strong>and</strong> also a part <strong>of</strong> IMT-2000 program. The WCDMA is based on GSM<br />
(Global System for Mobile Communications/Pan-European digital cellular l<strong>and</strong> mobile<br />
telecommunication system) <strong>and</strong> GPRS. GSM is based on Circuit S<strong>wi</strong>tch Mode <strong>and</strong> GPRS is<br />
based on Packet S<strong>wi</strong>tch Mode. In Europe, WCDMA is called Universal Mobile<br />
Telecommunications System (UMTS). This technology came from the early third generation<br />
<strong>wi</strong>reless network <strong>studies</strong> in Japan <strong>and</strong> Europe. Since the GSM was such a success, Europe began<br />
actively working on developing 3G. In 1995, Europe established Advanced Communications<br />
Technologies <strong>and</strong> Services (ACTS) for research <strong>and</strong> development <strong>of</strong> 3G. Also, in Japan the<br />
Association <strong>of</strong> Radio Industries <strong>and</strong> Businesses (ARIB) was established in 1993 as a committee<br />
for studying <strong>and</strong> developing Japan’s 3G technology. The WCDMA has several versions, R99, R4,<br />
R5 <strong>and</strong> the follo<strong>wi</strong>ng ones. [69][139] – [141]<br />
5
R99 was introduced in 1999 <strong>and</strong> could support 64 kbps circuit s<strong>wi</strong>tching payload <strong>and</strong> up to<br />
2Mbps packet s<strong>wi</strong>tching payload. It is also compatible <strong>wi</strong>th GSM <strong>and</strong> GPRS services. The core<br />
network structure has two layers, Circuit S<strong>wi</strong>tch Layer <strong>and</strong> Packet S<strong>wi</strong>tch Layer. Circuit S<strong>wi</strong>tch<br />
Layer used GSM network <strong>and</strong> Packet S<strong>wi</strong>tch Layer used GPRS network. R99 inherited services<br />
<strong>and</strong> features <strong>of</strong> GSM <strong>and</strong> GPRS. The commercialized WCDMA network in the world are all<br />
based on this WCDMA Release 99 version. [69]<br />
R4 was <strong>fi</strong>nalized in March 2001. Comparing <strong>wi</strong>th R99, the network structure did not change.<br />
The most different parts were in interface setup <strong>and</strong> functions improvements. One major change<br />
was in MSC (Mobile S<strong>wi</strong>tching Center). R4 split it into two parts MSC service <strong>and</strong> MGW<br />
(Media Gateway). The idea behind this was to separate control <strong>and</strong> payload. The other major<br />
change was introducing IP transmission to Circuit S<strong>wi</strong>tch Layer. R4 is an important step to All<br />
IP network. [69]<br />
R5 was stopped upgrading in September 2002. It is a starting point <strong>of</strong> all-IP network <strong>of</strong><br />
WCDMA network. R5 supports IP transmission <strong>and</strong> services. The most important component <strong>of</strong><br />
R5 was IMS (IP Multimedia Subsystem). This subsystem can provide multimedia service based<br />
on the Internet. It is the bridge to integrate cellular system <strong>and</strong> the Internet. [69]<br />
2.2.2. CDMA2000<br />
CDMA2000 is the trade mark <strong>of</strong> TIA-USA (Telecommunication Industry Association) <strong>and</strong><br />
which developed by 3GPP2. There were several versions <strong>of</strong> CDMA, CDMA2000 1X,<br />
CDMA2000 1X EV-DO. [69][142][143]<br />
The evolution direction was the same <strong>wi</strong>th WCDMA, All IP network. Therefore, in CDMA-<br />
LMSD (Legacy MS Domain), the separation <strong>of</strong> control <strong>and</strong> payload was introduced. There are<br />
four phases in the CDMA2000 evolution. In phase 0, the main issues were to improve the present<br />
system. In phase 1/2 were to upgrade the system to become the All IP network system. In phase<br />
3, the All IP network was formed <strong>and</strong> MMD (Multimedia Domain) started to show in the system.<br />
[69]<br />
2.2.3. TD-SCDMA<br />
This st<strong>and</strong>ard was individually developed by China <strong>and</strong> co-work <strong>wi</strong>th 3GPP. Future<br />
development is still ongoing. [69] [144]<br />
6
2.3. Development<br />
3G has been in development for couple years already. During this period <strong>of</strong> time, the<br />
telecommunication industry almost crashed in Europe. 3G is a promising technology, but the<br />
over-expectation made the European telecommunication industries spend too much money on<br />
the license <strong>of</strong> b<strong>and</strong> operation, set up infrastructures <strong>and</strong> marketing. The result was that many<br />
companies cannot recoup their pr<strong>of</strong>its, <strong>and</strong> many <strong>of</strong> them had to give up the license <strong>and</strong> projects<br />
in order to lower the debt or litigate <strong>wi</strong>th government. These facts caused the development <strong>of</strong> 3G<br />
slowed down greatly in Europe. The most successful <strong>case</strong> in Asia is Japan. There are two<br />
companies running the business, NTT DoCoMo <strong>and</strong> KDDI. The NTT DoCoMo uses WCDMA<br />
<strong>and</strong> KDDI uses CDMA2000. Taiwan initialed the 3G service in 2005. In North America 3G is in<br />
sprout stage. Around the world, there are total 29 countries has 3G network so far. Figure 2-1<br />
shows the evolution steps <strong>of</strong> 3G. [69][77]<br />
Figure 2-1 The Evolution <strong>of</strong> 3G<br />
The popularization <strong>of</strong> 3G has several factors, such as the user’s habits, market positioning,<br />
applications, <strong>and</strong> infrastructures. 3G has two opponents which are Wi-Fi <strong>and</strong> WiMax. They<br />
could be partners or enemies <strong>and</strong> it all depends on applications <strong>and</strong> market positioning. These<br />
<strong>wi</strong>reless st<strong>and</strong>ards have their own advantages. 3G has bigger coverage <strong>and</strong> support mobility, but<br />
has lower data rate, <strong>and</strong> Wi-Fi has higher data rate, but smaller coverage <strong>and</strong> does not support<br />
7
mobility. On the other h<strong>and</strong>, WiMax has the biggest coverage, highest data rate <strong>and</strong> also support<br />
mobility. [69][78]<br />
The applications <strong>of</strong> 3G partially overlap <strong>wi</strong>th Wi-Fi <strong>and</strong> WiMax. 3G is a mobile phone<br />
technology, so its main stage is in the cell-phone market; internet access is only an additional<br />
bene<strong>fi</strong>t. 3G’s signal <strong>wi</strong>ll fade out fast when there are too many people in the nearby area tring to<br />
access the Internet at the same time. 3G’s interface is mainly onthrough the cell-phone.<br />
Considering the operation convenience, it is tolerable for checking or sending e-mail, time tables,<br />
or MMS. However for high throughput applications, 3G appears to be not as good as the other<br />
two st<strong>and</strong>ards. The cell-phone’s inborn limitation, keyboard <strong>and</strong> screen size, makes it unsuitable<br />
for internet access. Moreover, 3G’s data rate <strong>and</strong> b<strong>and</strong><strong>wi</strong>dth are not fast enough for internet use.<br />
2.4. Cases<br />
Japan is a successful <strong>case</strong> for 3G development <strong>and</strong> mobile Internet access <strong>and</strong> there are<br />
some unique reasons for this. Japanese 3G service was started in late 2001 called FOMA<br />
(Freedom <strong>of</strong> Mobile Multimedia Access) by NTT DoCoMo. FOMA is the br<strong>and</strong> name <strong>of</strong> NTT<br />
DoCoMo’s 3G service. As the network coverage rate became higher <strong>and</strong> higher, most Japanese<br />
started to get used to checking <strong>and</strong> sending e-mail as well as getting daily information by phones.<br />
This phenomenon especially happens during rush hours in mass transit systems. Teenagers also<br />
like to share secrets, pictures <strong>and</strong> gossip by e-mail <strong>and</strong> MMS. Therefore, FOMA has become part<br />
<strong>of</strong> life <strong>and</strong> Multimedia service is the major applications <strong>of</strong> 3G. The most popular service in Japan<br />
now is called i-mode, it was in 2G <strong>and</strong> then upgrade to 3G. [69][76] – [78]<br />
The 3G service in Korea is called JUNE. It is pushed by SKT (South Korea Telecom) in<br />
November 2002 <strong>and</strong> based on CDMA2000 1X EV-DO. Similar to Japan, it is also focused on<br />
multimedia service. In August 2003, just 8 month later, the users already increased to one million.<br />
JUNE has a music channel, video channel, MMS service <strong>and</strong> NOUL (Korean Idol). It is the <strong>fi</strong>rst<br />
service which realizes the commercial video phone-call. [69]<br />
In Taiwan, 3G cell-phones have become the main stream <strong>and</strong> the system also has upgraded<br />
completely. However, because <strong>of</strong> Wi-Fi <strong>and</strong> WiMax, telecommunication industries are still<br />
seeking where the business <strong>and</strong> balance point are. It is a true struggle in the communication<br />
market. Varieties <strong>of</strong> websites <strong>and</strong> s<strong>of</strong>tware <strong>fi</strong>t users’ different dem<strong>and</strong>s on the Internet. But <strong>wi</strong>th<br />
cell-phones, internet service is only provided by telecommunication industries <strong>and</strong> is very<br />
limited <strong>and</strong> not universal. In addition, because the cell-phones’ speci<strong>fi</strong>cations are not uni<strong>fi</strong>ed,<br />
such as in the revolution <strong>of</strong> screen resolution <strong>and</strong> numbers <strong>of</strong> buttons, it is more dif<strong>fi</strong>cult to<br />
design web pages as well as to promote the service. In Japan, the cell-phones are more uni<strong>fi</strong>ed,<br />
so it is easier to popularize mobile Internet access service. [69][76] – [78]<br />
8
2.5. Conclusion<br />
WAP (Wireless Application Protocol) is the previous model <strong>of</strong> mobile Internet access<br />
service, but it did not become as popular as “i-mode”. Poor contents <strong>and</strong> costly usage rate are<br />
two major reasons. 3G may revive it again, but it is an important lesson about the relationship<br />
between people <strong>and</strong> mobile Internet access service. Do people really need to use cell-phones to<br />
access the Internet? This is one <strong>of</strong> the key points for 3G’s future. And then after the <strong>fi</strong>nal goal <strong>of</strong><br />
3G network is done, the All IP network, what <strong>wi</strong>ll be the impact <strong>of</strong> the tele-market <strong>wi</strong>ll be an<br />
important observation point.<br />
Video phone-call is the major selling point <strong>of</strong> 3G. However there is a problem: who wants<br />
to be seen on thea phone call? Who wants to be awakened when the boss calls in the morning<br />
<strong>and</strong> be seen on the phone? Privacy is very important issue for everyone, but video phone-call has<br />
potential risk to break it. Therefore, it may take a long time for people to get used to it. In<br />
Taiwan, it has taken <strong>fi</strong>ve years to get people used to the idea <strong>of</strong> pulling over to make a phone call<br />
<strong>and</strong> talking on the street. Currently, 99.9% population in Taiwan have a cell-phone. 3G still has a<br />
long way to go, because it takes time to change life styles <strong>and</strong> in most places in the world 3G has<br />
just arrived.<br />
9
3.1. The background <strong>of</strong> IEEE 802.11<br />
CHAPTER THREE<br />
3. IEEE 802.11, Wireless LAN<br />
When, IEEE published the st<strong>and</strong>ard 802.11Wireless Local Area Network protocol in 1997, it<br />
caused a revolution in methods <strong>of</strong> communication. People started to get rid <strong>of</strong> the constraint <strong>of</strong><br />
<strong>wi</strong>res <strong>and</strong> began to enjoy the freedom <strong>of</strong> unlimited space for getting information. It changed the<br />
way that people entertain themselves, get information, communicate <strong>and</strong> so on. IEEE 802.11 has<br />
many members in its family, <strong>and</strong> there are some <strong>of</strong> them that are <strong>wi</strong>dely used such as 802.11 a,<br />
802.11b, <strong>and</strong> 802.11g. The newest incoming st<strong>and</strong>ard is 802.11n. The other name for 802.11 is<br />
called Wi-Fi. [01] - [03][22]<br />
The <strong>fi</strong>rst practical st<strong>and</strong>ard in the 802.11 family is 802.11b <strong>and</strong> it came out in 1999. The<br />
earlier st<strong>and</strong>ard 802.11 was too slow. Due to its sluggish speed, users could not experience the<br />
advantages <strong>of</strong> <strong>wi</strong>reless communication. However, 802.11b was still very successful. Its speed<br />
may be only 5.5 Mbps <strong>and</strong> 11 Mbps [04]-[06], but it was fast enough to satisfy the basic<br />
requirement for browsing the Internet. In the past two years, this st<strong>and</strong>ard has become extremely<br />
popular. As a result, a PC which can support this protocol becomes a fundamental requirement.<br />
Approximately around the same time when 802.11b came out, IEEE published another<br />
st<strong>and</strong>ard, 802.11a. These two st<strong>and</strong>ards used different operation b<strong>and</strong>s <strong>and</strong> were not compatible.<br />
[07][08] 802.11a can reach the speed 54 Mbps <strong>and</strong> has more channels in its b<strong>and</strong> to improve the<br />
b<strong>and</strong><strong>wi</strong>dth capacity for users. However, because <strong>of</strong> higher cost <strong>and</strong> the shorter transmission<br />
distance, this st<strong>and</strong>ard was only used by certain groups. [09][15]<br />
The st<strong>and</strong>ard 802.11g was developed based on 802.11b <strong>and</strong> combined <strong>wi</strong>th OFDM<br />
(Orthogonal Frequency Division Multiplexing, used in 802.11a). Theoretically, its speed could<br />
reach 54 Mbps. This st<strong>and</strong>ard was published in the summer <strong>of</strong> 2003.. [10][20] Compared to the<br />
previous two st<strong>and</strong>ards, it was faster than 802.11b <strong>and</strong> had longer transmission distance <strong>and</strong><br />
lower cost than 802.11a. It had the advantages <strong>of</strong> 802.11a <strong>and</strong> had backward compatibility <strong>wi</strong>th<br />
802.11b. [09][11][15]<br />
In the business <strong>fi</strong>eld, rebuilding is always the last choice. 802.11b has existed in the market<br />
for a long time making it un<strong>wi</strong>se to replace 802.11b <strong>wi</strong>th 802.11g. Therefore, the best method is<br />
to produce a device which can support both st<strong>and</strong>ards. Because they are compatible <strong>and</strong> operate<br />
in the same b<strong>and</strong>, this is a more cost ef<strong>fi</strong>cient option. For example Intel’s “Centrino” <strong>and</strong><br />
“Sonoma” uses this type <strong>of</strong> production. [12] – [14] Meanwhile, the 802.11a has its unique<br />
advantages <strong>and</strong> was still used in certain areas. A device that supports a/b/g st<strong>and</strong>ards is also<br />
currently available. [08][09]<br />
10
IEEE 802.11n is the newest st<strong>and</strong>ard <strong>of</strong> WLAN (Wireless Local Area Network) next<br />
generation. In January 2006, Hawaii, IEEE passed a draft <strong>of</strong> the 802.11n st<strong>and</strong>ard. However the<br />
<strong>of</strong><strong>fi</strong>cial 802.11n universal st<strong>and</strong>ard is still in discussion. There are two main groups working on it,<br />
TGn Sync <strong>and</strong> WWiSE. In order to complete the st<strong>and</strong>ard earlier, these two groups composed a<br />
team called IPT (joint proposal team). [02]<br />
The follo<strong>wi</strong>ng section is going to introduce the capabilities <strong>of</strong> IEEE 802.11a/b/g theses three<br />
st<strong>and</strong>ards. Table 3-1 shows the IEEE 802.11 st<strong>and</strong>ard family members. [01][86]<br />
Table 3-1 Family <strong>of</strong> IEEE 802.11<br />
Protocol Release Date Op. Frequency<br />
11<br />
Throughput<br />
(Typ)<br />
Data Rate<br />
(Max)<br />
Legacy 1997 2.4 GHz 0.9 Mbps 2 Mbps<br />
802.11a 1999 5 GHz 23 Mbps 54 Mbps<br />
802.11b 1999 2.4 GHz 4.3 Mbps 11 Mbps<br />
802.11g 2003 2.4 GHz 19 Mbps 54 Mbps<br />
802.11j 2004 4.9 - 5 GHz 23 Mbps 54 Mbps<br />
802.11h 2004<br />
5,15 – 5,35 indoor<br />
5,47 – 5,725 indoor/outdoor<br />
23 Mbps 54 Mbps<br />
802.11n Sept, 2008 (est.) 2.4 GHz/5 GHz 74 Mbps 248 Mbps<br />
802.11y March, 2008 (est.) 3.7 GHz 23 Mbps 54 Mbps<br />
3.2. Capacity<br />
As shown in the Table 3-2 [16], although the operation b<strong>and</strong> <strong>of</strong> 802.11b is in 2.4 GHz, the<br />
FCC (Federal Communications Commission) is only allo<strong>wi</strong>ng it to carry a certain level <strong>of</strong><br />
frequency. Therefore for the U.S. the available WLAN channels are from 1 to11. This rule is also<br />
used on 802.11g. When building a WLAN, the interference is a very important factor. To avoid<br />
interference between channels in one area, the channels should not be overlapped <strong>and</strong> the<br />
interval <strong>of</strong> the frequency must be at least 25MHz. [04][05][16] That means, when selecting a<br />
channel, the number has to be <strong>fi</strong>ve numbers apart from each other, for example, 1, 6 <strong>and</strong> 11.<br />
Thus, for 802.11b, the maximum b<strong>and</strong><strong>wi</strong>dth capacity is 3*11 = 33Mbps <strong>and</strong> for 802.11g is 3*54<br />
= 162 Mbps. [11][14][17] - [20]<br />
The UNII is the initial for ‘Unlicensed National Information Infrastructure’. This b<strong>and</strong> is<br />
only free in certain countries, such as the U.S. <strong>and</strong> Taiwan. Table 3-3 [16] In the U.S., this b<strong>and</strong><br />
is divided into three sub-b<strong>and</strong>s <strong>and</strong> then each sub-b<strong>and</strong> is split up into four non-overlap channels.<br />
Therefore, the total available channels for 802.11a are twelve. Since the 5 GHz b<strong>and</strong> is not<br />
commonly used, it has a lower level <strong>of</strong> interference. When using 802.11a to build a WLAN, one
area can have a maximum <strong>of</strong> eight non-overlap channels to use, so the overall b<strong>and</strong><strong>wi</strong>dth<br />
capacity is 8*54 = 432 Mbps. [08][09]<br />
Term<br />
St<strong>and</strong>ard<br />
Table 3- 2 Capacities for 802.11a/b/g<br />
802.11a 802.11b 802.11g<br />
B<strong>and</strong> 5 GHz 2.4 GHz 2.4 GHz<br />
Available channels 12 11 11<br />
B<strong>and</strong><strong>wi</strong>dth capacity 432 Mbps 33 Mbps 162 Mbps<br />
Coverage 75 ft. 125 ft. 155 ft.<br />
Datarate 54 Mbps Max. 11Mbps 54 Mbps<br />
Modulation OFDM DSSS<br />
Channel Number<br />
Table 3-3 IEEE 802.11b/g Channel Used for Different Countries<br />
Frequency<br />
(GHz)<br />
Japan<br />
12<br />
North<br />
America<br />
Country Name<br />
ERP-OFDM<br />
DSSS-OFDM<br />
Europe France Spain<br />
1 2.412 X Y Y X X<br />
2 2.417 X Y Y X X<br />
3 2.422 X Y Y X X<br />
4 2.427 X Y Y X X<br />
5 2.432 X Y Y X X<br />
6 2.437 X Y Y X X<br />
7 2.442 X Y Y X X<br />
8 2.447 X Y Y X X<br />
9 2.452 X Y Y X X
Table 3-3 Cont.<br />
10 2.457 X Y Y Y Y<br />
11 2.462 X Y Y Y Y<br />
12 2.467 X X Y Y X<br />
13 2.472 X X Y Y X<br />
14 2.484 Y X X X X<br />
Table 3-4 IEEE 802.11a Channel Used for North America<br />
B<strong>and</strong> (GHz) Frequency (GHz) Channel Number<br />
5.15 – 5.25<br />
UNII Lower B<strong>and</strong><br />
5.25 – 5.35<br />
UNII Middle B<strong>and</strong><br />
5.725 – 5.825<br />
UNII Upper B<strong>and</strong><br />
5.180 36<br />
5.200 40<br />
5.220 44<br />
5.240 48<br />
5.260 52<br />
5.280 56<br />
5.300 60<br />
5.320 64<br />
5.745 149<br />
5.765 153<br />
5.785 157<br />
5.805 161<br />
802.11b/g is the most <strong>wi</strong>dely used st<strong>and</strong>ard for WLAN. Because <strong>of</strong> the different operation<br />
b<strong>and</strong>, 802.11a cannot cooperate <strong>wi</strong>th b/g st<strong>and</strong>ard. Also, there are some other problems, such as<br />
its high cost for equipments. The working b<strong>and</strong> is also not free for all countries, <strong>and</strong> has a lower<br />
transmission distance. However it is still used currently, because it is fast, stable, <strong>and</strong> has high<br />
capacity. Also, some people think that the lower transmission distance makes the network more<br />
13
dif<strong>fi</strong>cultt<br />
to be hhacked;<br />
theerefore,<br />
it is populaar<br />
for somme<br />
industriies.<br />
To immprove<br />
thee<br />
competitiveness<br />
<strong>of</strong>f<br />
802.11a, rresearchers<br />
invent a tripple<br />
frequenncies<br />
chip foor<br />
a/b/g. Someone<br />
whoo<br />
works iin<br />
the <strong>of</strong><strong>fi</strong>cee<br />
<strong>wi</strong>th 802.111a<br />
can then n walk out to a public place <strong>and</strong> gget<br />
on the Innternet<br />
<strong>wi</strong>thh<br />
802.11bb/g.<br />
The neew<br />
productss<br />
make cerrtain<br />
that thhese<br />
three sst<strong>and</strong>ards<br />
caan<br />
be opera ated in onee<br />
buildingg.<br />
[7] – [9] [14]<br />
3.3. TThe<br />
Physiccal<br />
Layerr<br />
<strong>and</strong> MA AC Layer<br />
3.3.1. The Phyysical<br />
Layyer<br />
3.3.1.11.<br />
Introduuction<br />
The e Physical llayer<br />
is the <strong>fi</strong>rst layer o<strong>of</strong><br />
the OSI ( (Open Systeem<br />
Interconnnection)<br />
mmodel,<br />
<strong>fi</strong>guree<br />
3-1. It is at the boottom<br />
<strong>of</strong> thhe<br />
model. TThis<br />
layer iis<br />
responsibble<br />
for deciding<br />
the tr ransmissionn<br />
methodd,<br />
b<strong>and</strong><strong>wi</strong>dthh,<br />
mediums,<br />
bit synchronization,<br />
mmodulation<br />
<strong>and</strong> so on. MMost<br />
physic cal set up iss<br />
completted<br />
in this layer. It is the <strong>fi</strong>rst layer<br />
<strong>of</strong> the nnetwork<br />
strructure.<br />
It pprovides<br />
a mechanical m ,<br />
electrical<br />
<strong>and</strong> alsoo<br />
proceduraal<br />
flattop be etween the transmissioon<br />
mediumm.<br />
The mosst<br />
importantt<br />
missionn<br />
<strong>of</strong> the phyysical<br />
layerr<br />
is the flueency<br />
<strong>of</strong> dataa<br />
streams. TThis<br />
sectionn<br />
is going to t introducee<br />
several technologiees<br />
used for 802.11 prottocols<br />
<strong>and</strong> w<strong>wi</strong>ll<br />
discuss how they wwork<br />
in this layer.<br />
FFigure<br />
3-1 OOSI<br />
Model<br />
14
3.3.1.2. PLCP <strong>and</strong> PMD<br />
The physical layer contains two sublayers, PLCP (Physical Layer Convergence Protocol)<br />
<strong>and</strong> PMD (Physical Medium Dependent), <strong>fi</strong>gure 3-2. These two layers communicate <strong>wi</strong>th each<br />
other by SAP (Service Access Point). Different transmission methods <strong>wi</strong>ll add different<br />
preambles <strong>and</strong> headers to their own PLCP <strong>and</strong> PMD. [04] – [07][09][21]<br />
PLCP<br />
The function <strong>of</strong> PLCP is to prepare MPDU’s (MAC Protocol Data Units), also called PSDU<br />
(PLCP Service Data Unit), for communicating <strong>wi</strong>th the MAC layer. It transfers the incoming<br />
frames from mediums to the MAC layer. The PLCP is located between the PMD sublayer <strong>and</strong><br />
the MAC layer so that it can help PMD transmit frames <strong>wi</strong>thout communicating <strong>wi</strong>th the MAC<br />
layer in advance. For this purpose, PLCP <strong>wi</strong>ll map the MPDUs into PMD frames before<br />
transmission. MPDU’s contain a unique preamble <strong>and</strong> header in the physical layer, which<br />
includes the information <strong>of</strong> PHY transmitters <strong>and</strong> receivers. These kind <strong>of</strong> composited frames are<br />
called PPDU (PLCP Protocol Data Unit).<br />
PMD<br />
This sublayer is right under the PLCP. It controls the transmission <strong>and</strong> reception <strong>of</strong> the<br />
physical layer data units from stations via mediums. PMD is the interface <strong>of</strong> a layer <strong>and</strong> a<br />
physical medium. It connects <strong>wi</strong>th <strong>wi</strong>reless mediums (RF, … etc.) directly. Frames are also<br />
modulated <strong>and</strong> demodulated in this sublayer.<br />
3.3.1.3. CS/CCA<br />
Figure 3-2 802.11 PLCP, PMD <strong>and</strong> MAC Structure<br />
No matter what kind <strong>of</strong> network it is, there is one problem in common. That is how to<br />
improve effective transmission. For solving this problem, 802.11 applied CS/CCA technologies<br />
during transmission process. CS/CCA is the initial <strong>of</strong> Carrier Sense/Clear Channel Assessment.<br />
15
CS/CCA can detect the state <strong>of</strong> a medium <strong>and</strong> report it to the transmitter. It is activated when<br />
the receiver <strong>and</strong> transmitter are on but no data streams are currently passing. It determines the<br />
channel state before transmitting. If the channel is busy, it <strong>wi</strong>ll wait for a period <strong>of</strong> time, <strong>and</strong> then<br />
detect it again. CS/CCA also can detect whether a signal can or cannot be received by a receiver.<br />
[04][05][21][23]<br />
3.3.1.4. IEEE 802.11b, DSSS <strong>and</strong> HR-DSSS<br />
3.3.1.4.1. Theory <strong>and</strong> Transmission method<br />
DSSS (Direct Sequence Spread Spectrum) was <strong>fi</strong>rst added to the 802.11 st<strong>and</strong>ard in 1997. At<br />
that time the speed was only 1 Mbps <strong>and</strong> 2 Mbps. But soon, it was found that DSSS has potential<br />
to run faster. The next st<strong>and</strong>ard 802.11b <strong>wi</strong>th new DSSS came out in 1999 <strong>and</strong> ran at 5.5 Mbps<br />
<strong>and</strong> 11 Mbps. Although these four speeds are <strong>of</strong>ten combined together as one st<strong>and</strong>ard, they<br />
actually belong to two different st<strong>and</strong>ards.<br />
The principle <strong>of</strong> DSSS is to transmit a signal over a <strong>wi</strong>de frequency b<strong>and</strong>, by spreading the<br />
RF energy across a <strong>wi</strong>de b<strong>and</strong> precisely. Then a receiver can get the transmitted signal by<br />
operating the correlation process.<br />
Figure 3-3 DSSS Transmission [17]<br />
For transmitting a signal, <strong>fi</strong>rst a spreader has to flatten the amplitude <strong>of</strong> the narrowb<strong>and</strong><br />
radio signal <strong>and</strong> spread its RF energy to a <strong>wi</strong>de b<strong>and</strong>. This step includes a lot <strong>of</strong> mathematical<br />
calculations. After this process is complete, the signal <strong>wi</strong>ll look like a RF low level noise. Then<br />
when the receivers monitor the <strong>wi</strong>de frequency b<strong>and</strong> <strong>and</strong> locate the noise-like signal, they can<br />
identify it as the transmitted signals/data. The received noises <strong>wi</strong>ll be recovered by a correlator<br />
which can invert the spreading process. Since the true noise can not affect the whole b<strong>and</strong>, the<br />
correlator can spread it out <strong>wi</strong>thout damage the original signal.<br />
When modulating the DSSS data streams, 11-chips <strong>wi</strong>ll be added to the transmitted signals.<br />
A chip is a binary number <strong>and</strong> it is just only a part <strong>of</strong> encoding <strong>and</strong> transmission process. Chips<br />
do not carry any data. The chipped streams have another name called PN Codes (Pseudor<strong>and</strong>om<br />
16
Noise Codes). The most powerful consumptions <strong>of</strong> the DSSS-PHY are to generate chipped data<br />
streams <strong>and</strong> recover data streams from chipped streams. [24] – [28][16]<br />
“Spreading ratio” is an important parameter used to decide how many chips are needed for<br />
one bit. The improper spreading ratio <strong>wi</strong>ll cause the waste <strong>of</strong> b<strong>and</strong><strong>wi</strong>dth. Although to increase<br />
the spreading ratio does help the ability <strong>of</strong> recovering data, it <strong>wi</strong>ll also require higher chipping<br />
rate <strong>and</strong> larger frequency b<strong>and</strong>. And there are prices to pay for increasing the chipping rate. First<br />
is the hardware, the costly high frequency RF components <strong>and</strong> second is the cost <strong>of</strong> enlarging<br />
frequency b<strong>and</strong><strong>wi</strong>dth.<br />
The modulation method used for DSSS are DBPSK (Differential Binary Phase shift Keying)<br />
for 1 Mbps <strong>and</strong> DQPSK (Differential Quadrature Phase shift Keying) for 2 Mbps. The encoding<br />
method is Barker code. [24] – [26][16]<br />
3.3.1.4.2. Against interference<br />
To avoid interference <strong>and</strong> guarantee the fluency <strong>of</strong> the data streams, the two channels,<br />
according to 802.11 rules, must be at least 25 MHz away. The overlapped channels <strong>wi</strong>ll cause<br />
more interference <strong>and</strong> damage the transmitted frames. By using DSSS transmission the<br />
interference problem have been improved to a certain extent. During transmission, because chips<br />
have been added to the data streams, they can get protection from chips. It is exactly like the<br />
function <strong>of</strong> armor. Even if the chips are damaged, the data is still safe. However, if the<br />
interference is really strong, it can still hurt the data very badly, <strong>and</strong> then nothing can be<br />
recovered. [27][28]<br />
3.3.1.4.3. PLCP <strong>and</strong> PMD <strong>of</strong> DSSS<br />
The DSSS-PLCP adds six parts in the DSSS-PPDU. The <strong>fi</strong>rst two parts are PLCP preamble<br />
<strong>and</strong> the other four are headers. The structure is showed in Figure 3-4[21]. The data rate <strong>of</strong> DSSS-<br />
PLCP is 1 Mbps <strong>and</strong> 2Mbps. This preamble is also called a long preamble. The function <strong>of</strong> the<br />
preamble is to help a receiver to synchronize to the incoming frame. The header contains the<br />
information <strong>of</strong> the frame.<br />
The DSSS-PMD is used to operate transmission <strong>and</strong> reception between stations. It is also in<br />
charge <strong>of</strong> modulating <strong>and</strong> de-modulating the PPDUs. The relationship between PLCP <strong>and</strong> PMD<br />
is like a brain <strong>and</strong> a body. PMD is response for action <strong>and</strong> PLCP gives an order. [04] –<br />
[06][16][21]<br />
17
3.3.1.4.4. HR-DSSS <strong>and</strong> CCK<br />
Figure 3-4 DSSS PLCP<br />
The original modulation method (Barker code) used in DSSS, for 802.11, only achieved the<br />
speeds <strong>of</strong> 1 <strong>and</strong> 2 Mbps. For commercial use, this is not an acceptable amount. In the data stream,<br />
each barker word carries one or two bits depending on the data rate. To improve the speed, it is<br />
necessary to increase the capacity <strong>of</strong> each symbol. That means more complicated phase angle<br />
changes. For example, the DQPSK receiver could at least detect four cycle phase differences.<br />
More cycle phase differences <strong>wi</strong>ll cause the smaller phase changes. It ends up <strong>wi</strong>th the need <strong>of</strong> a<br />
highly accurate <strong>and</strong> costly receiver.<br />
Therefore, the next st<strong>and</strong>ard 802.11b had a different modulation method known as<br />
Complementary Code Keying (CCK). This method splits the data stream into code symbols<br />
composed <strong>wi</strong>th 8 bits. By a complex mathematic procedure, the CCK can encode four or eight<br />
bits per code word <strong>wi</strong>th 8-bit code symbols. Also, this procedure can help receivers to identify<br />
different codes easily, even in interference or a multipath fading environment. By using the CCK<br />
process, the speed can reach 5.5 Mbps or 11 Mbps.<br />
The process <strong>of</strong> CCK is quite similar to the DS chipping process. Figure 3-5[17]. The<br />
difference between them is that CCK does not use the static repeating code word, as for example,<br />
Barker Code. The code word is converted from the data. These code words are used to transmit<br />
data <strong>and</strong> spread the signal. Phase angle also plays an important role here, but this time it <strong>wi</strong>ll not<br />
cost as much as DQPSK.<br />
18
Figure 3-5 CCK Modulation<br />
HR-DSSS PHY is de<strong>fi</strong>ned as the data rate equal to 5.5 or 11 Mbps. It also contains two<br />
parts, PLCP <strong>and</strong> PMD. PLCP is in charge <strong>of</strong> framing <strong>and</strong> PMD is response for transmission.<br />
3.3.1.4.5. PLCP <strong>and</strong> PMD <strong>of</strong> HR-DSSS<br />
The structure <strong>of</strong> HR-DSSS PLCP is show in Figure 3-6[17]. It is very similar to DSSS-<br />
PLCP, the only difference being in preamble. Its preamble is called short preamble. This kind <strong>of</strong><br />
preamble could improve the ef<strong>fi</strong>ciency <strong>of</strong> PLCP framing.<br />
For backward compatibility, the HR-DSSS PMD can support both low (1, 2 Mbps) <strong>and</strong> high<br />
(5.5, 11 Mbps) transmission. The only difference is low speed must uses long preamble while<br />
high speed uses short one. In addition, for high speed, the framed data <strong>wi</strong>ll be encoded by CCK<br />
modulation before transmitting. At 5.5 Mbps, each symbol has four data bits <strong>and</strong> at 11 Mbps,<br />
each symbol has eight data bits.<br />
Figure 3-6 HR/DSSS PLCP Framing<br />
19
3.3.1.5. IEEE 802.11a <strong>and</strong> OFDM<br />
3.3.1.5.1. Background<br />
Because there are lots <strong>of</strong> non-802.11 signals that also existed in the 2.4 GHz b<strong>and</strong>, this b<strong>and</strong><br />
is <strong>of</strong>ten very crowded. For achieving higher speed <strong>and</strong> capacity, 802.11 Task group A (TGa)<br />
came out <strong>wi</strong>th a new st<strong>and</strong>ard. It used a 5 GHz un-licensed b<strong>and</strong> <strong>and</strong> a different transmission<br />
method (OFDM). Although this st<strong>and</strong>ard was published in 1999, the practical hardware was not<br />
available until the end <strong>of</strong> 2001. At <strong>fi</strong>rst, 802.11a used the UNII b<strong>and</strong> <strong>and</strong> was speci<strong>fi</strong>ed for the<br />
U.S. only. Later, two similar st<strong>and</strong>ards were published. 802.11h is for Europe <strong>and</strong> 802.11j is for<br />
Japan. [08][30][31][43][44]<br />
OFDM (Orthogonal Frequency Division Multiplexing) was developed in the late 1960s. It is<br />
not a new theory however, because <strong>of</strong> the <strong>wi</strong>reless technology it revived again. OFDM has<br />
several features. First, it uses multiple subcarriers to do a single transmission. Second, for<br />
simplifying equalization at receiver, it transforms scattered channels into parallel narrowb<strong>and</strong><br />
subchannels. Third it is based on simple mathematics. OFDM is related <strong>wi</strong>th FDM (Frequency<br />
Division Multiplexing), that both divide b<strong>and</strong><strong>wi</strong>dth into divisions which is called carriers or<br />
subcarriers <strong>and</strong> use them for transmitting information. [08][17][29][33][36]<br />
3.3.1.5.2. Principles<br />
When transmitting data, OFDM chooses channels which overlap in frequency domain, but<br />
<strong>wi</strong>ll not disturb <strong>wi</strong>th each other. Figure 3-7[17] These overlapping subcarriers are de<strong>fi</strong>ned by<br />
mathematical calculation, therefore, they can travel individually, <strong>and</strong> this relationship is called<br />
orthogonal. With this feature, OFDM can increase capacity in the <strong>fi</strong>xed b<strong>and</strong><strong>wi</strong>dth. Thus the<br />
overall performance is improved. [08][17][29]<br />
Figure 3-7 FDM <strong>and</strong> OFDM<br />
Although OFDM has better performance, there is still a cost. Inter-symbol interference (ISI)<br />
is a common problem when transmitting data. It mainly occurs when the delay that happens in<br />
different paths is too large <strong>and</strong> causes a later copy to shift onto a previously arrived copy. The<br />
20
other problem is inter-carrier interference (ICI). When several subcarriers transmit in a channel<br />
<strong>and</strong> one <strong>of</strong> them shifts slightly then the interference between subcarriers would be occurred.<br />
To avoid these problems, scientists came out <strong>wi</strong>th several methods. The <strong>fi</strong>rst method was to<br />
add a “guard time” between each subcarrier. A guard time is a silent period between two<br />
subcarriers, however this method wastes b<strong>and</strong><strong>wi</strong>dth <strong>and</strong> once the delay is too large then the<br />
orthogonality would be destroyed. The other way to avoid interference is using “cyclic pre<strong>fi</strong>x<br />
(CP)” <strong>and</strong> “cyclic post<strong>fi</strong>x (PP)”. Figure 3-8[51] CP is a guard interval between the signal N <strong>and</strong><br />
the signal N-1. PP is an interval in signal N+1 <strong>and</strong> N. The idea <strong>of</strong> CP is to extend the time range<br />
<strong>of</strong> signal N longer, so that even if interference happened it <strong>wi</strong>ll not affect FFT block which is the<br />
information section <strong>of</strong> a signal carried. However, sometimes the problem not only comes from<br />
the previous signal, therefore, the guard interval <strong>wi</strong>ll have two parts “cyclic pre<strong>fi</strong>x” <strong>and</strong> “cyclic<br />
post<strong>fi</strong>x”. Here are some other <strong>studies</strong> about OFDM <strong>and</strong> interference: [30] – [40]<br />
Figure 3-8 CP <strong>and</strong> PP<br />
OFDM modem is based on block-by-block structure. The transmitter <strong>fi</strong>rst converts the signal<br />
into N subcarriers <strong>and</strong> then uses IFFT (inverse Fast Fourier Transform) to modulate them into<br />
orthogonal waveforms. The receiver reverses the process by using FFT (Fast Fourier Transform).<br />
It <strong>wi</strong>ll remove CP <strong>fi</strong>rst <strong>and</strong> <strong>fi</strong>nd the FFT block. Then it starts using FFT to demodulate the signal<br />
that has received. Finally, the information is recovered. Figure 3-9[51]<br />
OFDM has higher capacity <strong>and</strong> is more reliable than some <strong>of</strong> other methods. The<br />
mathematics <strong>of</strong> OFDM is FFT <strong>and</strong> IFFT; <strong>and</strong> they are not complicated. With FFT, the operation<br />
number in each signal is on the order <strong>of</strong> NlogN. This can be done easily by a program. That is<br />
the reason that OFDM is broadly used in <strong>wi</strong>reless technology. [34][36] - [39]<br />
21
Figure 3-9 OFDM Modem<br />
3.3.1.5.3. The IEEE 802.11a’s OFDM <strong>and</strong> its PLCP <strong>and</strong> PMD<br />
OFDM is a good transmission technology, but TGa did not use the full version. They<br />
modi<strong>fi</strong>ed their own one.<br />
When building an OFDM network, there are some important parameters which are<br />
b<strong>and</strong><strong>wi</strong>dth, delay <strong>and</strong> bit rate. The b<strong>and</strong><strong>wi</strong>dth is <strong>fi</strong>xed for 802.11a. When considering delay, it is<br />
necessary to have guard time. Usually the ratio <strong>of</strong> guard time <strong>and</strong> delay is two to four times as<br />
big. And the symbol time is <strong>fi</strong>ve times <strong>of</strong> the guard time. Thus TGa chose 800 ns as guard time<br />
<strong>and</strong> 4 µs as symbol time. The b<strong>and</strong><strong>wi</strong>dth <strong>of</strong> an operation b<strong>and</strong> is 20 MHz <strong>and</strong> the theoretical<br />
highest speed is 54 Mbps. Higher capacity could have higher throughput. However it <strong>wi</strong>ll<br />
decrease the number <strong>of</strong> operation channels. Therefore, how to achieve a reasonable balance is an<br />
important design issue. [17][29] - [31][39]<br />
The modulation technology for OFDM is shown in Table 3-4[17]. To reach a higher speed,<br />
TGa has not only changed the transmission method, but also used another modulation technology<br />
QAM (Quadrature Amplitude Modulation). Figure 3-10[55] For preventing the BER (Bit Error<br />
Rate) increase which caused by certain channel’s signal fading, the error correction code is<br />
added to the all sub-channels. The error correction code is called “Convolutional Code”, <strong>and</strong> this<br />
kind <strong>of</strong> OFDM sometimes is named COFDM (Coded OFDM). Here is the related research:<br />
[36][39][40] – [42]<br />
22
Tab ble 3-5 OFDDM<br />
Modulaation<br />
<strong>and</strong> Daata<br />
Rate<br />
Figure 3-10<br />
Constellaations<br />
Diagrram<br />
The e OFDM-PLLCP<br />
structuure<br />
is shownn<br />
in Figure 3-11[21]. TThe<br />
preamblle<br />
contains 12 symbolss<br />
<strong>and</strong> is uused<br />
to synnchronize<br />
<strong>wi</strong>th w a receivver.<br />
The duration<br />
time <strong>of</strong> an OFDDM<br />
preamb ble is 16 µs.<br />
There aare<br />
two parrts<br />
<strong>of</strong> the prreamble;<br />
shhort<br />
trainingg<br />
sequence (the <strong>fi</strong>rst tten<br />
symbols s) <strong>and</strong> longg<br />
trainingg<br />
sequence ( (the rest tw wo symbols) ). The short one is usedd<br />
to create AAGC<br />
(Auto omatic Gain n<br />
Controll),<br />
timing annd<br />
initial freequency<br />
<strong>of</strong>ffset<br />
estimatiion<br />
<strong>of</strong> the carrier<br />
signaal.<br />
The long one is used d<br />
23
for the channel, timing <strong>and</strong> <strong>fi</strong>ne frequency <strong>of</strong>fset estimation. The Head contains two parts, the<br />
signal <strong>and</strong> data’s service section. The head is 40 bits long (signal is 24 bits plus service 16 bits).<br />
The signal <strong>fi</strong>eld is always transmitted <strong>wi</strong>th BPSK at 6 Mbps.<br />
Figure 3-11 OFDM PLCP Structure<br />
In the OFDM-PMD sub-layer, to maintain the speed 6, 12 <strong>and</strong> 24 Mbps is required. An<br />
operation channel (20 MHz b<strong>and</strong><strong>wi</strong>dth) is divided into 52 sub-channels (sub-carriers). Four <strong>of</strong><br />
them are pilot carriers; the rest <strong>of</strong> the 48 sub-channels are used to transmit data. The data <strong>wi</strong>ll be<br />
divided <strong>and</strong> modulated into sub-channels, then transmitted parallel. [17][21][29]<br />
3.3.1.6. IEEE 802.11g <strong>and</strong> the Physical Layer<br />
3.3.1.6.1. Background <strong>and</strong> Backward Compatibility<br />
As 802.11b became more <strong>and</strong> more popular, people started to notice the convenience <strong>of</strong><br />
<strong>wi</strong>reless LAN. At that time, 802.11b could only provide a maximum 11Mbps. Compared to<br />
Ethernet, this was not a good performance – it was just barely acceptable. When 802.11a started<br />
to join the market, end users also wanted 802.11b to become faster. In fact, 54 Mbps really was<br />
not very fast <strong>and</strong> most <strong>of</strong> the time, in a wonderful environment, the performance could only<br />
achieve 50% <strong>of</strong> the possible speed. However WLAN has its own advantages <strong>and</strong> “<strong>wi</strong>reless” has<br />
become a trend gradually. Under these conditions, 802.11g is the answer. It has the same speed<br />
<strong>wi</strong>th 802.11a, but it has a longer area <strong>of</strong> coverage. Moreover, it operates in the 2.4 GHz b<strong>and</strong>.<br />
According to 802.11g clause, this st<strong>and</strong>ard is not a “new” st<strong>and</strong>ard. It is an integrated<br />
st<strong>and</strong>ard using many existing technologies. Its physical layer is called ERP (Extended Rate PHY)<br />
24
<strong>and</strong> contains DSSS, CCK, PBCC (Packet Binary Convolution Coding) <strong>and</strong> OFDM. It supports<br />
the speed:<br />
ERP-DSSS: 1, 2, 5.5 <strong>and</strong> 11 Mbps<br />
ERP-PBCC: 22 <strong>and</strong> 33Mbps<br />
ERP-OFDM: 6, 9, 12, 18, 24, 36, 48 <strong>and</strong> 54 Mbps (6, 12 <strong>and</strong> 24 Mbps are m<strong>and</strong>atory)<br />
For backward compatibility, these methods have some slight changes, but are pretty much the<br />
same original st<strong>and</strong>ard. An 802.11g stationary must have the ability to communicate <strong>wi</strong>th both<br />
old 802.11b stations <strong>and</strong> other 802.11 stations. For that reason, the ERP-DSSS <strong>and</strong> ERP-CCK<br />
were added.<br />
A problem <strong>of</strong> backward compatibility is that the 802.11g can receive <strong>and</strong> decode 802.11b<br />
signals, but the converse is not true. Therefore a protection has to be added to the 802.11g<br />
st<strong>and</strong>ard. The <strong>fi</strong>rst part <strong>of</strong> the protection is that when doing transmission <strong>wi</strong>th 802.11b stations,<br />
the Beacon frames cannot be transmitted higher than 11 Mbps. The second part is to avoid<br />
network interference between 802.11b <strong>and</strong> 802.11g. When 802.11g is transmitting data, in order<br />
to avoid disturbing 802.11b, it <strong>wi</strong>ll send CTS (Clear To Send) frames to notify the 802.11b<br />
stations <strong>and</strong> update the NAV (Network Allocation Vector).This process is called CTS-self<br />
Protection. To make sure every station in the network can receive <strong>and</strong> process the CTS frames,<br />
they have to be sent under 802.11b protocol. The protection is controlled by the ERP information<br />
element in Beacon frames <strong>and</strong> <strong>wi</strong>ll limit the data rate <strong>of</strong> 802.11g. [13][14][17][20][21][29]<br />
3.3.1.6.2. ERP-OFDM <strong>and</strong> DSSS-OFDM<br />
The ERP-OFDM is very similar to the OFDM used in 802.11a <strong>wi</strong>th only a slight difference.<br />
The PLCP is shown in Figure 3-12[21]. When comparing these two OFDM-PLCP, the difference<br />
is the “signal extension” <strong>fi</strong>eld. This 6µs extra time is used to prepare <strong>and</strong> decode the 802.11a<br />
frames. 802.11a uses 16 µs SIFS (Short Inter-Frame Space) which is different form 802.11b 10<br />
µs SIFS. 802.11g chooses 10 µs because <strong>of</strong> backward compatibility, therefore, it adds 6 µs after<br />
a frame to match timing <strong>and</strong> frame <strong>wi</strong>th 802.11a. Beside the PPDU structure, the transmission<br />
method is exactly the same <strong>wi</strong>th 802.11a.<br />
25
Figure 3-12 DSSS-OFDM PSDU Format<br />
DSSS-OFDM is a composite framing technology. Its PPDU structure is shown in Figure 3-<br />
13[21] <strong>and</strong> Figure 3-14[21]. The preamble <strong>and</strong> head are framed by HR-DSSS mode, <strong>and</strong> the<br />
PSDU is the ERP-OFDM PPDU. The preamble has long <strong>and</strong> short formats. With this method,<br />
the protection is not required. The data rate <strong>of</strong> DSSS-OFDM preamble <strong>and</strong> head is the same <strong>wi</strong>th<br />
DSSS. [13][14][17][20][21][29]<br />
Figure 3-13 DSSS-OFDM Long Preamble Structure<br />
26
3.3.2. MAC Layer<br />
3.3.2.1. Introduction<br />
Figure 3-14 DSSS-OFDM Short Preamble Structure<br />
In the human world, laws are the tools to avoid arguments <strong>and</strong> accidents <strong>and</strong> it is the same<br />
<strong>wi</strong>th networks. Wireless transmission has many problems such as interference, fading, collision,<br />
<strong>and</strong> security. In the MAC (Media Access Control) layer, the 802.11 working group, established a<br />
variety <strong>of</strong> rules <strong>and</strong> functions to improve system performance <strong>and</strong> solve these problems.<br />
3.3.2.2. DCF (Distributed Coordination Function) <strong>and</strong> PCF (Point<br />
Coordination Function)<br />
DCF is the core <strong>of</strong> CSMA/CA <strong>and</strong> most <strong>of</strong> the transmissions using 802.11 st<strong>and</strong>ards are<br />
based on it. With DCF, there is no central control. Stations have to compete for the use <strong>of</strong><br />
channels. Any transmissions using CSMA/CA (Carrier Sense Multiple Access/Collision<br />
Avoidance) belongs to DCF type transmission. The other mode, PCF, is a central control type.<br />
With PCF, a base station controls all transmission orders; therefore there is no competition <strong>and</strong><br />
collisions in this mode. The base station <strong>wi</strong>ll poll other stations to see if they have frames to send.<br />
The polling frequency <strong>and</strong> order are decided by a polling list, which is not equaled. Any station<br />
<strong>wi</strong>ll be added to the list after connecting to the base station. [17][55]<br />
27
3.3.2.3. Hidden node <strong>and</strong> CSMA/CA<br />
When a station is communicating <strong>wi</strong>th another station, there is an existing risk that the<br />
packets may collide. It is due to the hidden node problem. Each station has limited coverage, so<br />
stations may not be aware <strong>of</strong> the other nearby stations. Thus if there are more than two stations<br />
that try to transmit a signal to the same station at the same time, <strong>and</strong> then the collision <strong>wi</strong>ll<br />
happen. In Figure 3-15, station A <strong>and</strong> C are hidden nodes to each other. If station A is sending a<br />
signal, station C cannot be aware <strong>of</strong> it. Since most stations are half-duplex (cannot transmit <strong>and</strong><br />
listen at the same time), the collision is dif<strong>fi</strong>cult to be detected. In Figure 2-17, it shows that only<br />
station B knows collisions happened. [17][55]<br />
Figure 3-15 The Hidden Node Problem<br />
To deal <strong>wi</strong>th this problem, 802.11 WG uses a different method from Ethernet. With <strong>wi</strong>red<br />
transmission they use CSMA/CD (Carrier Sense Multiple Access/Collision Detection), but since<br />
the <strong>wi</strong>reless transmission has very limited resource <strong>and</strong> is not as reliable as Ethernet, 802.11 WG<br />
turns to use collision avoidance (CSMA/CA).<br />
There are two technologies used in CSMA/CA, physical channel sensing <strong>and</strong> virtual channel<br />
sensing. [17][55]<br />
Physical channel sensing<br />
When a station wants to send signals, for example, it senses the channel <strong>fi</strong>rst. If the channel<br />
is idle, it just sends. During the transmission, it <strong>wi</strong>ll not sense the channel at the time, but keeps<br />
sending signals. However if the channel is busy, it <strong>wi</strong>ll wait until the channel is idle <strong>and</strong> then<br />
start the transmission. Once a collision occurs, the stations <strong>wi</strong>ll wait for certain time, by using the<br />
Ethernet binary exponential back <strong>of</strong>f algorithm, <strong>and</strong> then try again later. [17][55]<br />
28
Virtual channel sensing<br />
he other method, virtual channel sensing, is shown in <strong>fi</strong>gure 3-16 [55] <strong>and</strong> <strong>fi</strong>gure 3-17[55].<br />
When station A wants to send signals to station B, it <strong>wi</strong>ll send a RTS (Request to Send) frame to<br />
the station to occupy a channel <strong>fi</strong>rst. If the channel is idle, station B <strong>wi</strong>ll send CTS (Clear to Send)<br />
frame back. When station A receives CTS, it <strong>wi</strong>ll start to transmit a signal. When the process is<br />
initiated, an important “timer” is including in RTS <strong>and</strong> CTS frame which called NAV (Network<br />
Allocation Vector). The information that is included in NAV is how long the channel <strong>wi</strong>ll be<br />
occupied. One operation contains RTS, CTS, data frames <strong>and</strong> ACK (Acknowledgement). NAV<br />
<strong>wi</strong>ll set how long it <strong>wi</strong>ll take including the last ACK frame. Therefore, since station D is <strong>wi</strong>thin<br />
the range <strong>of</strong> station A, it <strong>wi</strong>ll receive RTS <strong>and</strong> then stop completely from occupying the channel<br />
until NAV counter becomes zero. It is the same <strong>wi</strong>th station D. Station C <strong>wi</strong>ll receive CTS, so it<br />
<strong>wi</strong>ll also wait until the operation is completed. However, before the ACK is received by station<br />
A, the NAV is expired. Then the operation has to run again. [17][55]<br />
Figure 3-16 CDMA/CA<br />
Figure 3-17 Virtual Channel Sensing<br />
29
3.3.2.4. Fragmentation<br />
In most occasions, the frames from the upper layer maybe longer than the fragmentation<br />
threshold. In this situation, the frames have to be fragmented before transmitting. The advantages<br />
for using fragmentation are that it can improve throughput <strong>and</strong> reliability. By fragmenting frames,<br />
the interference only destroys small pieces <strong>of</strong> frames, but not the entire frames. Thus the overall<br />
effective transmission is improved. Also, only the destroyed pieces need to be retransmitted,<br />
therefore, the reliability is also improved.<br />
The transmission process <strong>of</strong> fragmented frames is called fragmentation burst. In the clause,<br />
there are no rules for fragmentation threshold. It depends on network designers. During the<br />
transmission, each fragment has the same frame sequence number <strong>and</strong> an increasing fragment<br />
number for recombination. To keep occupying the channel for completing fragmentation burst,<br />
each fragment <strong>wi</strong>ll reset the NAV for next fragment including ACK. Figure 3-18[55]. [17][55]<br />
3.3.2.5. Interframe spacing<br />
Figure 3-18 A Fragment Burst<br />
Interframe spacing is a very important protocol for coordinating medium access. There are<br />
four different intervals which are shown in <strong>fi</strong>gure 3-19[55]. To avoid collision, stations wait a<br />
certain period <strong>of</strong> time until channels are idle before transmission. These different intervals decide<br />
the priority for different types <strong>of</strong> transmission. High priority transmissions wait a shorter amount<br />
<strong>of</strong> time, so it can occupy the channel <strong>fi</strong>rst. [17][55]<br />
30
SIFS (Short InterFrame Spacing)<br />
Figure 3-19 Frame Interval for IEEE 802.11<br />
This is the shortest interval <strong>and</strong> mainly used for high priority transmission; including a<br />
receiver sends CTS back to a transmitter, a receiver sends an ACK for a fragment or a full frame<br />
<strong>and</strong> a transmitter <strong>of</strong> a fragmentation burst send the next fragment <strong>wi</strong>thout sending RTS again.<br />
PIFS (PCF InterFrame Spacing)<br />
This interval is used for competition-free transmission by PCF. If the SIFS interval passed<br />
<strong>and</strong> no stations occupy the channel, after PIFS, the base station <strong>wi</strong>ll send a poll frame or a<br />
beacon frame. Any stations which have data or fragment sequence waiting for transmitting can<br />
start to send after PIFS <strong>wi</strong>thout disturbance or competition.<br />
DIFS (DCF InterFrame Spacing)<br />
After DIFS, every station can start to compete for earning the channel usage <strong>and</strong> then the<br />
<strong>wi</strong>nner takes all. The all transmission rules <strong>and</strong> Ethernet binary exponential back <strong>of</strong>f algorithm<br />
are applied.<br />
EIFS (Extended InterFrame Spacing)<br />
This is only used when a mistake has happened during a transmission.<br />
3.3.2.6. Power saving<br />
To extend the battery’s life <strong>of</strong> the MS (Mobile Station), the 802.11 MAC layer provides a<br />
power management protocol. A base station can direct a MS to go into the sleep mode <strong>and</strong> buffer<br />
frames for it. Later the MS could be awakened by a base station which sends a beacon frame or a<br />
31
user. The awakened MS <strong>wi</strong>ll send a PS-Poll frame to the base station to get the buffered frames.<br />
The base station can choose either immediate response or deferred response to the MS. [17][55]<br />
The immediate response means the BS (Base Station) <strong>wi</strong>ll send the buffered frames to MS<br />
after SIFS interval. If the BS chooses a deferred response, it <strong>wi</strong>ll send an ACK frame back to MS<br />
<strong>fi</strong>rst, <strong>and</strong> then transmit data frames later. After sending the PS-Poll frame, the MS must stays<br />
awake until the whole process is over. The BS noti<strong>fi</strong>es the MS for buffered frames by sending a<br />
beacon frame. The buffered frames may be fragmented for transmission. [17][55]<br />
3.3.2.7. Security<br />
This is a very important part for the whole MAC layer design. So far the most <strong>wi</strong>dely used<br />
security procedure for <strong>wi</strong>reless communication is WEP (Wired Equivalent Privacy). WEP uses<br />
RC4 cipher to encrypt data. The RC4 cipher is a kind <strong>of</strong> symmetric stream cipher; it generates a<br />
keystream <strong>and</strong> then uses the XOR algorithm to mix <strong>wi</strong>th data to produce the ciphertext stream.<br />
The receiver <strong>wi</strong>ll use the same XOR algorithm to recover original data. To encrypt the data, the<br />
secret key has to be chosen <strong>fi</strong>rst <strong>and</strong> then extended to the same size <strong>of</strong> data by PRNG<br />
(Pseudor<strong>and</strong>om Number Generator). This extended secret key is called keystream. For<br />
recovering data, both transmitters <strong>and</strong> receivers must have the same secret key <strong>and</strong> PRNG, <strong>and</strong><br />
how to distribute the secret key is an important issue; sometimes it may be preloaded by system<br />
designers or manufacturers. The other issue is “key to keystream expansion” <strong>of</strong> RC4 stream<br />
cipher, because the safety is dependent upon on how r<strong>and</strong>om it is. [17][55]<br />
The communication security has three major properties: con<strong>fi</strong>dentiality, integrity <strong>and</strong><br />
authentication. Con<strong>fi</strong>dentiality is needed to protect data from being stolen by unauthorized<br />
people. Integrity is used to make sure the data has not been changed during transmission. This<br />
part is dependent on CRC code. Finally, authentication is the foundation <strong>of</strong> all security<br />
procedures. For transmitting data, the users must be trusted <strong>and</strong> the source must be reliable.<br />
Other<strong>wi</strong>se, authorization <strong>and</strong> access control <strong>wi</strong>ll not be allowed. [17][55]<br />
RC4 shared secret key is composed by 40-bit shared secret <strong>and</strong> 24-bit IV (Initialization<br />
Vector) usually called 64-bit WEP <strong>and</strong> the other one is 128-bit WEP. When framing a frame,<br />
WEP <strong>wi</strong>ll generate an ICV (Integrity Check Value) which is a hash value to combine <strong>wi</strong>th<br />
payload as an original data. This ICV can use to protect data from unauthorized changes. After<br />
entering the original payload, secret key <strong>and</strong> IV, WEP can generate an encrypted frame for<br />
transmission in either secure or not secure network. Figure 3-20[17] shows the frame structure<br />
<strong>and</strong> operation <strong>of</strong> WEP. Figure 3-21[55] shows the encryption process. [17][55]<br />
32
Figure 3-20 WEP Frame <strong>and</strong> Operation<br />
Figure 3-21 The WEP Encryption Process<br />
However there is no perfect encryption in the world. There are some problems that exist in<br />
WEP; key management, reusing the keystream, <strong>and</strong> IV. WEP has been thought <strong>of</strong> as a very<br />
secure way to protect <strong>wi</strong>reless communication. However, a study from University <strong>of</strong> California,<br />
Berkeley called ISAAC (Internet Security Applications, Authentication <strong>and</strong> Cryptography)<br />
showed the defects <strong>of</strong> WEP design [56]. Also a method for breaking WEP has already been<br />
published [57].<br />
33
The reason that WEP was safe was because the secret key was not easily broken. However<br />
in some <strong>case</strong>s, the network designers use the same shared key for all users. That means that<br />
people can read each other’s packets. That is not good for security. If it is a small network, trying<br />
to use the different keys for each user should not be a big problem, but if it is a big network, for<br />
security reasons, if a secret key changes once in a period <strong>of</strong> time, it is a huge job. How to<br />
distribute a secret key <strong>and</strong> how to assure it is not repeated are very important issues at this point.<br />
Moreover, IV is another potential risk. The WEP protocol recommends that the IV value should<br />
be different for every packet to avoid the keystream attack. If IV is not a r<strong>and</strong>om value, the<br />
encryption <strong>wi</strong>ll be broken easily. Unfortunately some <strong>wi</strong>reless network cards set the initial IV as<br />
0 <strong>and</strong> increase the number by one for each packet sent. With this kind <strong>of</strong> IVs, to break the<br />
encryption is way too easy. Unless the secret key is changed <strong>of</strong>ten or assuring the use <strong>of</strong> r<strong>and</strong>om<br />
<strong>and</strong> different IV for each packet, the risk <strong>wi</strong>ll remain high. If a hacker collects enough packets<br />
<strong>wi</strong>th repeated IV from the same user, the cipher <strong>wi</strong>ll be broken. [17][55]<br />
3.4. The next generation st<strong>and</strong>ard<br />
3.4.1. IEEE 802.11n<br />
IEEE 802.11n is the st<strong>and</strong>ard <strong>of</strong> WLAN for next generation which also called Wi-Fi<br />
(Wireless <strong>fi</strong>delity). This st<strong>and</strong>ard was initiated in 2004 by TGn. The goal <strong>of</strong> this st<strong>and</strong>ard was to<br />
improve the net transmission speed up to 100 Mbps. In the beginning, there were six proposals<br />
that had been posted. After many discussions, there were only two proposals left <strong>and</strong> they were<br />
from TGnSync <strong>and</strong> WWiSE. These two groups have their own support from chip makers.<br />
TGnSync has Athero, Agere, Marvell <strong>and</strong> Intel, while WWiSE has Airgo, Broadcom, Conexant<br />
<strong>and</strong> Texas Instruments. The <strong>fi</strong>rst draft was approved in March 2006 <strong>and</strong> draft 2.0 was approved<br />
in March 2007. Since the dem<strong>and</strong>s from the market are becoming higher, Wi-Fi Alliance decided<br />
to start to certifying IEEE 802.11n products based on the draft 2.0 in summer 2007. Now, these<br />
pre-n products are already in stores, such as routers <strong>and</strong> network cards for desktops or notebooks.<br />
The <strong>of</strong><strong>fi</strong>cial approval <strong>of</strong> IEEE 802.11n st<strong>and</strong>ard had been delayed many times because TGnSync<br />
<strong>and</strong> WWiSE kept <strong>fi</strong>ghting for their own proposal to become the <strong>of</strong><strong>fi</strong>cial st<strong>and</strong>ard. However, they<br />
<strong>fi</strong>nally agreed to propose a merged proposal to speed up the birth <strong>of</strong> <strong>of</strong><strong>fi</strong>cial IEEE 802.11n<br />
st<strong>and</strong>ard. Therefore, the IEEE 802.11n st<strong>and</strong>ard may be <strong>fi</strong>nally approved in early 2008. [17] [65]<br />
[66]<br />
Actually, the ideal <strong>of</strong> these two groups have may be different, but the technologies are the<br />
same. TGnSync emphasizes on improving the peak data rate <strong>and</strong> WWiSE wants to ameliorate<br />
the MAC-layer. Both <strong>of</strong> them can reach the goal, or even much better than that. The common<br />
points are they both use MIMO-OFDM as the transmission function <strong>and</strong> support the b<strong>and</strong><strong>wi</strong>dth<br />
for both 20 MHz <strong>and</strong> 40 MHz. IEEE 802.11n PHY-layer is extended from IEEE 802.11a PHYlayer.<br />
So it is also an OFDM-based PHY-layer <strong>and</strong> just introduced MIMO technology to increase<br />
the speed. [17] [61]-[66]<br />
34
3.4.2. MIMO (Multiple-Input/Multiple-Output)<br />
Usually, the IEEE 802.11 air-interface only transmits data <strong>wi</strong>th single antenna. Although<br />
some systems use two antennas, systems that only use the one have the best performance.<br />
Therefore, no matter how many antennas that systems has, there is only one used to transmit <strong>and</strong><br />
receive data, <strong>and</strong> there is only one input chain <strong>and</strong> one output chain.<br />
The basic operation <strong>of</strong> MIMO is to distribute the RF chain to every system antenna <strong>and</strong> each<br />
RF chain can do simultaneous transmission <strong>and</strong> reception. This can enormously increase<br />
throughput. Moreover simultaneous receiver processing can solve multipath interference <strong>and</strong><br />
improve the quality <strong>of</strong> the received signals. A frame can be split, multiplexed <strong>and</strong> then<br />
transmitted by more than one spatial stream. The antenna con<strong>fi</strong>guration <strong>of</strong> MIMO usually<br />
express as “YxZ “format. For example, in both TGnSync <strong>and</strong> WWiSE proposals require “2x2”<br />
operation, which means there are two transmit chains, two receiving chains <strong>and</strong> two spatial<br />
streams. That is m<strong>and</strong>atory mode in both proposals <strong>and</strong> there is optional mode included. [17]<br />
When setting up hardware, the BS <strong>and</strong> end users may have different numbers <strong>of</strong> antenna.<br />
For example, a BS has three <strong>and</strong> the end user has two. Usually BS has more antennas, because <strong>of</strong><br />
saving power <strong>and</strong> cost for the end users. In this situation, 2x3 is for uplink <strong>and</strong> 3x2 is for<br />
downlink. Two spatial streams are distributed to three antennas. One spatial stream is transmitted<br />
by multiple antennas; this is called STBC (Space-Time Block Coding). This method is also used<br />
in IEEE 802.16 PHY-layer. [17] [61]-[66]<br />
3.5. Limitation<br />
As the Internet goes into the <strong>wi</strong>reless stage, internet access seems become more <strong>and</strong> more<br />
convenient. Wired Internet access, such as ADSL, can provide at least 100 Mbps data rate, <strong>and</strong><br />
Wi-Fi, <strong>wi</strong>th the g st<strong>and</strong>ard, can achieve 54 Mbps, <strong>and</strong> it depends on the air-interface conditions<br />
however, if Wi-Fi wants to share the ADSL market, it still has a long way to go. Wi-Fi is strict to<br />
the operation environment <strong>and</strong> sensitive to channel fading, so reliability is a big issue. Since Wi-<br />
Fi is designed for small area not BWA, such as home or <strong>of</strong><strong>fi</strong>ce, VoIP (Voice over IP), video<br />
service <strong>and</strong> a large <strong>fi</strong>le download are heavy duty for it. If a business building wants to install a<br />
<strong>wi</strong>reless network for the whole building, every floor may need an individual AP (access point) or<br />
even more than one, depending on the location structure. This is because the signals suffer the<br />
short transmission range, channel fading <strong>and</strong> interference, therefore the installation cost <strong>and</strong><br />
complexity <strong>wi</strong>ll be high.<br />
The other problem <strong>of</strong> Wi-Fi is the market share. This is caused by fundamental<br />
infrastructure, completion rate users’ behavior patterns <strong>and</strong> technologies maturity. What is Wi-<br />
Fi’s market positioning? And who is the major customer group? The answers <strong>of</strong> these two<br />
questions are the key to the future <strong>of</strong> Wi-Fi. If Wi-Fi wants to take VoIP, for example, as the kill<br />
35
application, its biggest opponent <strong>wi</strong>ll be 3G. Or if Wi-Fi wants to take broad area <strong>wi</strong>reless<br />
network as the goal, the WiMax is blocking its way. Compared to 3G, Wi-Fi is faster, but the<br />
signal is not as stable. And compared to WiMax, Wi-Fi is slow, has small-coverage <strong>and</strong> is<br />
unreliable. In this dif<strong>fi</strong>cult situation, Wi-Fi should not keep thinking its killer application or try to<br />
occupy market share <strong>of</strong> other <strong>wi</strong>reless technologies. The future <strong>of</strong> Wi-Fi should be cooperation<br />
not competition.<br />
Since Intel integrates Wi-Fi <strong>wi</strong>th laptop computers, it speeds up the dem<strong>and</strong> <strong>of</strong> <strong>wi</strong>reless<br />
access. The laptop has come into the main stream in the IT industry. People can carry their PC<br />
<strong>wi</strong>th them, but they cannot carry the ADSL. Therefore, it is the reason why a <strong>wi</strong>reless network is<br />
desirable. Generally, most people believe that businessmen are the one who need <strong>wi</strong>reless access<br />
everywhere. However, the major Wi-Fi users or the potential users should be home workers <strong>and</strong><br />
students. Observing the behavior patterns, it is easy to <strong>fi</strong>nd out that people want to get rid <strong>of</strong><br />
annoying <strong>wi</strong>res <strong>and</strong> use the Internet access in different rooms at home, <strong>and</strong> students need to<br />
access the Internet for information, online games or entertainment in different indoor hotspots at<br />
any time. Another important fact from the behavior patterns is there is no killer application for<br />
Wi-Fi. People access the Internet for enjoying ubiquitous service not just for a single purpose.<br />
Thus, <strong>wi</strong>th the new coming st<strong>and</strong>ard IEEE 802.11n, Wi-Fi should focus on how to get involved<br />
to meet the dem<strong>and</strong>s <strong>of</strong> home users <strong>and</strong> students. That means to provide ubiquitous access.<br />
Therefore, the next problem is if the ISP (Internet Service Provider) wants to build the<br />
public Wi-Fi network. Is it possible <strong>and</strong> what are the issues behind it? This topic <strong>wi</strong>ll be<br />
discussed in chapter <strong>fi</strong>ve.<br />
36
4.1. The background <strong>of</strong> IEEE 802.16<br />
CHAPTER FOUR<br />
4. IEEE 802.16, Wireless MAN<br />
The IEEE 802.16 st<strong>and</strong>ard is the second generation <strong>of</strong> BWA (Broadb<strong>and</strong> Wireless Access).<br />
The st<strong>and</strong>ard group was formed in 1998 <strong>and</strong> its purpose was to develop an air- interface st<strong>and</strong>ard<br />
for BWA. At the beginning <strong>of</strong> the project, the group focused on a LOS-based (Line <strong>of</strong> Sight)<br />
point-to-multipoint <strong>wi</strong>reless broadb<strong>and</strong> system operated in the 10 GHz – 66 GHz b<strong>and</strong>. The<br />
complete st<strong>and</strong>ard was <strong>fi</strong>nished in December 2001. The evolution <strong>of</strong> IEEE 802.16 can be split<br />
into four stages: 1. Narrowb<strong>and</strong> <strong>wi</strong>reless local-loop systems, 2. First-generation line-<strong>of</strong>-sight<br />
broadb<strong>and</strong> systems, 3. Second-generation non-line-<strong>of</strong>-sight broadb<strong>and</strong> systems, <strong>and</strong> 4.<br />
St<strong>and</strong>ards-based broadb<strong>and</strong> <strong>wi</strong>reless systems. [50][60]<br />
Narrowb<strong>and</strong> <strong>wi</strong>reless local-loop systems<br />
The First system is related to the <strong>wi</strong>reless voice telephony. The WLL systems (Wireless<br />
Local-Loop) were successful in many developing countries such as China, India <strong>and</strong> Brazil.<br />
There are two major technologies used in these WLL systems digital-enhanced cordless<br />
telephony (DECT) <strong>and</strong> code division multiple access (CDMA). To stay competitive, WLL<br />
systems started to join the Internet service market in 1993. In February 1997 AT&T developed a<br />
<strong>wi</strong>reless access system for 1900 MHz PCS (Personal Communications Service) <strong>and</strong> ended the<br />
service in December 2001 due to high costs <strong>and</strong> poor take-rate. During the same time, some<br />
small companies focused on <strong>wi</strong>reless internet service. These WISP (Wireless Internet Service<br />
Provider) companies set up the system in license-exempt b<strong>and</strong>s, 900 MHz <strong>and</strong> 2.4 GHz <strong>and</strong><br />
needed customers’ permission to install antennas either on the ro<strong>of</strong>top or top <strong>of</strong> the building. At<br />
this time the range, capacity, <strong>and</strong> speed were limited. [50][87] – [90]<br />
First-generation line-<strong>of</strong>-sight broadb<strong>and</strong> systems<br />
Since <strong>wi</strong>red internet service can provide higher <strong>and</strong> more stable service, <strong>wi</strong>reless systems<br />
needed to evolve to be competitive. There are two major systems called local multipoint<br />
distribution systems (LMDS) <strong>and</strong> multichannel multipoint distribution services (MMDS). LMDS<br />
mainly supported SOHO (Small Of<strong>fi</strong>ce, Home Of<strong>fi</strong>ce), business centers, <strong>and</strong> small corporations.<br />
This system only had short success in the late 1990s. MMDS was once used to provide <strong>wi</strong>reless<br />
cable broadcast video service in rural areas where no cable TV service was available. When<br />
satellite TV came out, the <strong>wi</strong>reless cable business crashed. The operators sought an alternative<br />
way to use this b<strong>and</strong> (2.5 GHz). In September 1998 FCC relaxes rules for the MMDS b<strong>and</strong> to<br />
allow two-way communication. After these changes in regulations some companies such as MIC<br />
WorldCom <strong>and</strong> Sprint, bought licenses to use the MMDS spectrum <strong>and</strong> began to develop high<br />
37
speed <strong>fi</strong>xed <strong>wi</strong>reless broadb<strong>and</strong> service for this b<strong>and</strong>. These <strong>fi</strong>rst-generation broadb<strong>and</strong> systems<br />
used towers which were several hundred feet tall <strong>and</strong> had LOS coverage up to 35 miles <strong>wi</strong>th high<br />
power transmitters. The users had to install outdoor antennas high enough to receive a signal<br />
<strong>and</strong> pointed toward the tower for the clear LOS path. This LOS equipment was soon considered<br />
an impediment. And because towers were dif<strong>fi</strong>cult to set up, the service was quite limited.<br />
[50][91][92]<br />
Second-generation non-line-<strong>of</strong>-sight broadb<strong>and</strong> systems<br />
The second-generation broadb<strong>and</strong> systems had potential to solve the LOS problem <strong>and</strong> had<br />
the ability to provide more capacity <strong>and</strong> higher speed. This was because they used cellular<br />
architecture <strong>and</strong> advanced-signal processing technology. With these methods, the link <strong>and</strong><br />
system performance was improved under multipath conditions. These new second-generation<br />
systems also perform well in NOLS (Non-Line <strong>of</strong> Sight) environment by using OFDM, CDMA<br />
<strong>and</strong> multiantenna processing. Some <strong>of</strong> them can even be operated <strong>wi</strong>thout setting an antenna<br />
outside. [50]<br />
St<strong>and</strong>ards-based broadb<strong>and</strong> <strong>wi</strong>reless systems.<br />
IEEE 802.16 st<strong>and</strong>ard was approved <strong>of</strong><strong>fi</strong>cially on December 2001 <strong>and</strong> the formal name was<br />
<strong>wi</strong>reless metropolitan area network (WMAN). This <strong>fi</strong>rst st<strong>and</strong>ard only focused on the10 GHz –<br />
66 GHz b<strong>and</strong> <strong>and</strong> can only do LOS transmission. In PHY-layer, it used single-carrier modulation<br />
<strong>and</strong> in the MAC-layer, it had time division multiplexing (TDM) structure which supported FDD<br />
(Frequency Division Duplexing) <strong>and</strong> TDD (Time Division Duplexing). [50]<br />
In order to maintain a competitive advantage, the IEEE 802.16 st<strong>and</strong>ard group developed a<br />
series <strong>of</strong> extended st<strong>and</strong>ards to improve WMAN performance. The IEEE 802.16 family members<br />
include IEEE 802.16, IEEE 802.16a, IEEE 802.16c, IEEE 802.16-2004, IEEE 802.16e-2005,<br />
IEEE 802.16f, IEEE 802.16g <strong>and</strong> IEEE 802.16h. [60]<br />
WiMax Forum<br />
This is a Non-Pr<strong>of</strong>it Organization formed in April 2001. The initial members included Intel,<br />
Fujistu, <strong>and</strong> Nokia among others. The major mission <strong>of</strong> this forum is to assure the unity <strong>and</strong><br />
compatibility <strong>of</strong> BWA products produced by any manufacturer. In the beginning, the<br />
certi<strong>fi</strong>cation was only between IEEE 802.16 st<strong>and</strong>ard <strong>and</strong> ETSI HiperMAN st<strong>and</strong>ard (European<br />
Telecommunications St<strong>and</strong>ards Institute, High Performance Metropolitan Area Network). As the<br />
technologies <strong>of</strong> the 802.16 become more mature, many industries started to pay attention to it.<br />
Therefore, more companies around the world joined <strong>and</strong> established several working groups to<br />
promote the st<strong>and</strong>ard. Because <strong>of</strong> this forum, WiMax (World Interoperability for Microwave<br />
Access) became the second name <strong>of</strong> IEEE 802.16. [59]<br />
38
The working groups <strong>of</strong> WiMax Forum are CWG (Certi<strong>fi</strong>cation Working Group), TWG<br />
(Technical Working Group), RWG (Regulatory Working Group), MWG (Marketing Working<br />
Group), SPWG (Service Provider Working Group), NWG (Network Working Group) <strong>and</strong> AWG<br />
(Application Working Group) [59]<br />
4.2. Capacity <strong>of</strong> the IEEE 802.16 family<br />
4.2.1. IEEE 802.16<br />
This initial st<strong>and</strong>ard is <strong>fi</strong>xed air-interface BWA. Because it operated in a high frequency<br />
b<strong>and</strong>, it can only do LOS transmission. In addition, since IEEE established this uni<strong>fi</strong>ed clause,<br />
manufacturers can produce compatible equipment by follo<strong>wi</strong>ng the st<strong>and</strong>ard. This was a big step<br />
for realizing WMAN. [45][50] [60][93][96]<br />
4.2.2. IEEE 802.16a<br />
This st<strong>and</strong>ard was approved in January 2003. The NLOS transmission was added. The IEEE<br />
802.16 TGa extended the operation b<strong>and</strong> to 2 – 11 GHz licensed <strong>and</strong> licensed-exempt b<strong>and</strong>. This<br />
frequency had a longer wavelength, thus performs NLOS transmission very well. The maximum<br />
coverage was 30 miles <strong>and</strong> minimum was 6 miles. The other key technology called OFDM was<br />
also added in PHY-layer at this time. OFDM proved (in IEEE 802.11) that it was the solution for<br />
the multipath issue. These two were the major changes in PHY-layer. In the MAC-layer, the<br />
IEEE 802.16a provided QoS system the ability to support voice <strong>and</strong> video real time service.<br />
[46][50] [60]<br />
4.2.3. IEEE 802.16c<br />
This st<strong>and</strong>ard is just an improved st<strong>and</strong>ard <strong>of</strong> the initial IEEE 802.16 st<strong>and</strong>ard. This one<br />
established more detailed rules <strong>of</strong> how to run a system in 10 – 66 GHz b<strong>and</strong>. [47][50] [60]<br />
4.2.4. IEEE 802.16-2004<br />
This st<strong>and</strong>ard was the <strong>fi</strong>rst practical st<strong>and</strong>ard <strong>of</strong> the IEEE 802.16 family. It is also known as<br />
<strong>fi</strong>xed-WiMax. It integrated the previous st<strong>and</strong>ards <strong>and</strong> re-edited PHY <strong>and</strong> MAC-layer contents to<br />
improve the system performance <strong>and</strong> compatibility. Therefore it can support various business<br />
uses. IEEE 802.16-2004 was a <strong>fi</strong>xed air-interface <strong>of</strong> BWA, <strong>and</strong> it supported 2 – 11 GHz licensed<br />
<strong>and</strong> licensed-exempt b<strong>and</strong> <strong>and</strong> 10 – 66 GHz b<strong>and</strong>. That meant it can do both LOS <strong>and</strong> NLOS<br />
39
transmission. The complete edition <strong>of</strong> IEEE 802.16-2004 was approved in December 2004.<br />
[48][50] [60]<br />
4.2.5. IEEE 802.16e-2005<br />
In 2003, the 802.16 st<strong>and</strong>ard group started another mission. The TGe began to combine<br />
mobility <strong>and</strong> BWA together. The result was IEEE 802.16e <strong>and</strong> it was formally published in<br />
February 2006. This st<strong>and</strong>ard introduces scalable OFDMA in PHY-layer <strong>and</strong> modi<strong>fi</strong>es the MAClayer<br />
for supporting high speed mobility. The goal is to support end users moving in cars <strong>and</strong><br />
giving them the ability to access the BWA <strong>wi</strong>thout any problems. It has backward compatibility<br />
<strong>wi</strong>th IEEE 802.16-2004. Because <strong>of</strong> its mobility, it is also referred to as mobile-WiMax. [49][50]<br />
[60]<br />
4.2.6. IEEE 802.16f, IEEE 802.16g <strong>and</strong> IEEE 802.16h<br />
These st<strong>and</strong>ards are still under discussion. So far only drafts are available. [50][60] Table 4-<br />
1[50] is the basic information <strong>of</strong> IEEE 802.16 family.<br />
40
Table 4-1 Thee<br />
Basic Datta<br />
<strong>of</strong> IEEE 802.16<br />
41
4.3. The Physical Layer <strong>and</strong> MAC Layer<br />
In the follo<strong>wi</strong>ng section, the IEEE 802.16-2004 <strong>and</strong> IEEE 802.16e-2005 <strong>wi</strong>ll be discussed.<br />
IEEE 802.16e-2005 inherits the <strong>fi</strong>xed-BWA ability from IEEE 802.16-2004 <strong>and</strong> re-edits the<br />
PHY <strong>and</strong> MAC layer to combine <strong>fi</strong>xed-BWA <strong>wi</strong>th mobility. According to the WiMax forum,<br />
there are four usage scenarios: nomadic, portable, simple mobility <strong>and</strong> full mobility. The<br />
applications <strong>of</strong> IEEE 802.16-2004 are to provide an air-interface for <strong>fi</strong>xed <strong>and</strong> nomadic<br />
transmission, while IEEE 802.16e-2005 is to provide an air-interface for portable <strong>and</strong> mobile<br />
transmission. [50][59][94] – [96]<br />
Nomadic<br />
The user can use his/her devices <strong>wi</strong>th a local <strong>fi</strong>xed service <strong>and</strong> reconnect to a different <strong>fi</strong>xed<br />
service in another place.<br />
Portable<br />
Provide service for 3G-phones, PDA or notebook.<br />
Simple mobility<br />
Allowed the end users move in the speed up to 60 km/hr <strong>wi</strong>th less than 1 second<br />
interruptions.<br />
Full mobility<br />
Provide up to 120 km/hr mobility service <strong>wi</strong>th less than 50 ms latency <strong>and</strong> less than 1%<br />
packet loss.<br />
4.3.1. IEEE 802.16-2004<br />
4.3.1.1. Physical Layer<br />
There are several key technologies used in IEEE 802.16-2004 (<strong>fi</strong>xed-WiMax). The <strong>fi</strong>xed-<br />
WiMax is based on OFDM-PHY. It has a strong ability to protect against multipath fading <strong>and</strong><br />
support multipath <strong>and</strong> NLOS transmission. The blueprint <strong>of</strong> the operation theory is derived from<br />
the 802.11a. The 802.16 WG changed some parameters to <strong>fi</strong>t its own dem<strong>and</strong>s. The <strong>fi</strong>gure 4-1<br />
shows the fundamental structure <strong>of</strong> IEEE 802.16 bottom layers.<br />
42
Figure 4-1 The Layer Structure <strong>of</strong> IEEE802.16<br />
The other key technology used in WiMax is multiple-antenna techniques. This technology is<br />
also referred to as MIMO. Through OFDM, WiMax can achieve frequency diversity <strong>and</strong> by<br />
multiple –antenna techniques, WiMax can have spatial diversity. The term spatial diversity<br />
means using two or more antennas at the receiver <strong>and</strong>/or transmitter to do transmission. During<br />
the procedure the spatial multiplexing <strong>and</strong> the STBC is required. The idea <strong>of</strong> spatial multiplexing,<br />
<strong>fi</strong>gure 4-2[50], is to create multiple parallel channels to carry one data stream. The advantages <strong>of</strong><br />
MIMO are that it increases system reliability, data rate, system capacity, <strong>and</strong> coverage, <strong>and</strong><br />
decreases the required transmit power. The theory <strong>of</strong> MIMO was introduced in section 3.4.2.<br />
[50][95] – [101]<br />
43
Whhere<br />
y = H. .X + n<br />
Figuree<br />
4-2 A Spaatial<br />
Multipllexing<br />
MIMMO<br />
System<br />
4.3.1.11.1.<br />
Fouur<br />
transmmission<br />
mode:<br />
SC, SCa, OFDDM<br />
<strong>and</strong> OOFDMA<br />
In IIEEE<br />
802.16-2004<br />
PHYY-layer,<br />
SCC<br />
(Signal Laayer)<br />
is respponsible<br />
forr<br />
the 10 – 666<br />
GHz b<strong>and</strong> d<br />
<strong>and</strong> SCCa<br />
is used ffor<br />
the 2 – 11GHz ba<strong>and</strong>.<br />
The coore<br />
<strong>of</strong> this st<strong>and</strong>ard iss<br />
the OFDM M/OFDMAA<br />
modulaation<br />
<strong>and</strong> ussed<br />
in the 2 – 10 GHz b<strong>and</strong>. Thiss<br />
method haas<br />
many advvantages<br />
annd<br />
has beenn<br />
<strong>wi</strong>dely used for maany<br />
<strong>wi</strong>relesss<br />
technologies.<br />
[50]<br />
4.3.1.11.2.<br />
AMMC<br />
(Adapptive<br />
Mod dulation a<strong>and</strong><br />
Codinng)<br />
Wi ith AMC, WWiMax<br />
can support va arious kindss<br />
<strong>of</strong> modulaation<br />
<strong>and</strong> foorward<br />
error r correctionn<br />
(FEC) ccoding.<br />
This<br />
method allows<br />
modu ulation scheemes<br />
to be cchanged<br />
forr<br />
each persoon<br />
based onn<br />
channell<br />
conditionss.<br />
AMC is very effecttive<br />
on opttimizing<br />
ovverall<br />
channnel<br />
capacity y in a time-<br />
varyingg<br />
channel. TTherefore<br />
uusers<br />
can bee<br />
provided <strong>wi</strong>th the poossible<br />
highhest<br />
data raate<br />
which iss<br />
allowedd<br />
by the ISPP<br />
<strong>and</strong> link conditions.<br />
The T theory iis<br />
that whenn<br />
the channeel<br />
condition ns are good; ;<br />
then it transmits aas<br />
high dataa<br />
rate as poossible.<br />
Whhen<br />
the cha annel condiitions<br />
are poor,<br />
then itt<br />
transmiits<br />
at a lowwer<br />
data ratee<br />
to avoid eexcessive<br />
ppackets<br />
beco oming lost. Lower dat te rates <strong>and</strong> d<br />
higher date rates ccan<br />
be achi ieved by ussing<br />
differeent<br />
modulattion,<br />
such aas<br />
QPSK an nd low-ratee<br />
error-coorrection<br />
coodes<br />
for loww<br />
speed, a<strong>and</strong><br />
64-QAMM<br />
<strong>and</strong> lesss<br />
robust errror-correctioon<br />
for highh<br />
speed. [ [50]<br />
In both IEEE 802.16-20006<br />
<strong>and</strong> IEEEE<br />
802.16ee-2005<br />
PHYY,<br />
the RS- CC (Reed Solomon –<br />
Convoluution<br />
Code) ) is the requuired<br />
codingg<br />
mode <strong>and</strong>d<br />
block turbo<br />
codes (BTTC),<br />
convol lution turboo<br />
44
codes ( (CTC) <strong>and</strong> low densityy<br />
parity cheeck<br />
(LDPC) ) codes aree<br />
optional mmodes.<br />
Sincce<br />
the IEEEE<br />
802.16 clause did nnot<br />
set up thhe<br />
b<strong>and</strong><strong>wi</strong>ddth<br />
<strong>and</strong> moddulation<br />
method,<br />
differrent<br />
con<strong>fi</strong>guurations<br />
<strong>wi</strong>lll<br />
end up <strong>wi</strong>th different<br />
speeds. Thus <strong>wi</strong>th AMC, the system cann<br />
have the mmaximum<br />
uusage<br />
<strong>of</strong> thee<br />
channell.<br />
Table 4-2[50]<br />
shows the modulaation<br />
<strong>and</strong> cooding<br />
suppoorted<br />
in WiMMax.<br />
[50]<br />
4.3.1.11.3.<br />
Chhannel-quality<br />
Meaasurement<br />
The e channel-qquality<br />
meassurement<br />
sccheme<br />
is thee<br />
fundamenntal<br />
<strong>of</strong> downnlink<br />
<strong>and</strong> upplink<br />
powerr<br />
control processes a<strong>and</strong><br />
modulattion<br />
<strong>and</strong> code<br />
rate adapptation.<br />
A MMS<br />
is requirred<br />
to send the channell<br />
quality feedback (CCQI)<br />
includding<br />
RSSI ( (Received SSignal<br />
Stren ngth Indicattor)<br />
<strong>and</strong> SIN NR (Signal-<br />
to-Interrference-pluus-Noise<br />
Raatio)<br />
to BS for f evaluatinng<br />
channel conditions. With this innformation,<br />
BS can: : [50]<br />
<br />
<br />
Change moodulation<br />
annd/or<br />
coding g rate for thee<br />
transmissiion<br />
Change thee<br />
power leveel<br />
<strong>of</strong> the asssociated<br />
DLL<br />
or UL trannsmissions.<br />
4.3.1.11.4.<br />
OFFDM<br />
in WWiMax<br />
Table 4-22<br />
Modulatioon<br />
<strong>and</strong> Codiing<br />
Supportted<br />
in WiMaax<br />
In <strong>fi</strong>xed-WiMa f ax, the FFTT<br />
size is onlly<br />
256. Therre<br />
are 192 ssubcarriers<br />
used for ca arrying data; ;<br />
8 for pilot p subcarrriers<br />
<strong>and</strong> thhe<br />
rest are guard subccarriers.<br />
Be ecause the FFFT<br />
size is s <strong>fi</strong>xed, thee<br />
subcarrier<br />
intervall<br />
is related to the channnel<br />
b<strong>and</strong>w<strong>wi</strong>dth.<br />
With larger bannd<strong>wi</strong>dth,<br />
thee<br />
subcarrierr<br />
intervall<br />
increases, but the symmbol<br />
time ddecreases.<br />
TThat<br />
means a larger pieece<br />
<strong>of</strong> fram mes needs too<br />
be alloccated<br />
properrly<br />
to overccome<br />
delay spread. The<br />
table 4-3[ [50] shows the OFDM parameterss<br />
used fo or WiMAX. The OFDMM-PHY<br />
<strong>of</strong> WiMax has<br />
a <strong>wi</strong>de raange<br />
<strong>of</strong> guaard<br />
times, th herefore thee<br />
networkk<br />
designerss<br />
can make e <strong>fi</strong>tting traade-<strong>of</strong>fs<br />
bettween<br />
specctral<br />
ef<strong>fi</strong>ciency<br />
<strong>and</strong> de elay spreadd<br />
robustnness.<br />
When using a 255<br />
percent guuard<br />
time, iit<br />
can deal <strong>wi</strong>th the mmaximum<br />
delay d spread d<br />
45
obustnness<br />
which iis<br />
up to 16µ µs in a 3.5 MMHz<br />
channnel<br />
<strong>and</strong> 8µs in a 7 MHHz<br />
channel. [50][102] –<br />
[106]<br />
Tablee<br />
4-3 OFDMM<br />
Parameterrs<br />
Used for WiMAX<br />
4.3.1.22.<br />
MAC LLayer<br />
4.3.1.22.1.<br />
Three<br />
sublayers:<br />
CS, , CPS <strong>and</strong>d<br />
SS<br />
The e MAC layyer<br />
is an innterface<br />
bet tween the hhigher<br />
layerr<br />
<strong>and</strong> the PPHY.<br />
It also o processess<br />
packetss<br />
for the uppper<br />
layer called MSDDUs<br />
(MACC<br />
Service DData<br />
Units) ) <strong>and</strong> mapss<br />
them intoo<br />
MPDUss<br />
for transmmitting<br />
in PPHY.The<br />
IIEEE<br />
802.16<br />
st<strong>and</strong>ard splits the MAC-layer r into threee<br />
sublayeers,<br />
<strong>fi</strong>gure 22-22,<br />
conveergence<br />
subblayer<br />
(CS) , common part sublayyer<br />
(CPS) a<strong>and</strong><br />
securityy<br />
sublayeer<br />
(SS). CS is an interfaace<br />
betweenn<br />
MAC-layeer<br />
<strong>and</strong> higheer<br />
layer prootocol<br />
such as a ATM, IPP<br />
<strong>and</strong> so on. CPS prrovides<br />
MA AC manageement,<br />
ARQQ<br />
(Automattic<br />
Repeat QQuest)<br />
scheeduling<br />
<strong>and</strong>d<br />
assembly<br />
<strong>of</strong> MAC PDUs. SS iis<br />
in chargee<br />
<strong>of</strong> encryptiion.<br />
[50][1007]<br />
46
4.3.1.2.2. AAS (Advanced Antenna Systems)<br />
Multiantena is a good way to improve system performance. However it includes some<br />
problems such as transmit diversity, beamforming, <strong>and</strong> spatial multiplexing.. The AAS is a<br />
solution for them. [50][113][114]<br />
Transmit diversity<br />
Transmit diversity requires at least two transmitting antennas <strong>and</strong> one receiving antenna. For<br />
this type <strong>of</strong> transmission, WiMax de<strong>fi</strong>ned STBC scheme, for example the 2x1 antenna system<br />
<strong>wi</strong>th Alamouti codes. The advantage <strong>of</strong> it is the same as <strong>wi</strong>th MIMO. The MS or end users <strong>wi</strong>ll<br />
not have a complex set up <strong>and</strong> the cost is lower.<br />
Beamforming<br />
Beamforming has great ability to quard against interference <strong>and</strong> improve the coverage range,<br />
capacity, reliability, <strong>and</strong> received SINR. The idea is to use multiple antennas to transmit the same<br />
signal in the direction <strong>of</strong> the receiver. To operate using this method, the signal must be weighted<br />
properly for each antenna <strong>and</strong> the transmitter has to have accurate knowledge <strong>of</strong> the channel.<br />
WiMax supports beamforming for both uplink <strong>and</strong> downlink.<br />
Spatial multiplexing<br />
Spatial multiplexing means using multiple antennas to transmit multiple independent<br />
streams. When both receiver <strong>and</strong> transmitter have more than one antenna, by performing the<br />
STBC scheme, the streams can be split. The purpose <strong>of</strong> this method is to improve the data rate or<br />
capacity <strong>of</strong> the system. The increasing ratio is linear <strong>wi</strong>th the number <strong>of</strong> antennas. For example, a<br />
2x2 MIMO system <strong>wi</strong>ll double the capacity. If the MS only has one antenna, the spatial<br />
multiplexing is still supported. However, spatial multiplexing only works under good SINR<br />
conditions.<br />
4.3.1.2.3. QoS<br />
QoS (Quality <strong>of</strong> Service) is a basic function <strong>of</strong> the WiMax MAC-layer. By using<br />
connection-oriented MAC structure, the QoS control is robust. All the uplink <strong>and</strong> downlink<br />
connections are controlled by the BS. Before transmission, a BS <strong>and</strong> a MS set up a unidirectional<br />
logical link called “connection”. This link is between two MAC layers <strong>and</strong> every connection is<br />
veri<strong>fi</strong>ed by a 16-bit connection identi<strong>fi</strong>er (CID). [50]<br />
To ensure the QoS, WiMax de<strong>fi</strong>nes a scheme named “service flow”. It is a one way flow <strong>of</strong><br />
packets that includes a special set <strong>of</strong> QoS parameters <strong>and</strong> is veri<strong>fi</strong>ed by a 32-bit service flow<br />
identi<strong>fi</strong>er (SFID). These parameters are used to support different kind <strong>of</strong> QoS <strong>of</strong> different tasks.<br />
47
There aare<br />
varies <strong>of</strong><br />
parameterrs.<br />
[50] The e SFID is isssued<br />
<strong>and</strong> mmapped<br />
to CCIDs<br />
by the e BS. Theree<br />
are fouur<br />
types <strong>of</strong> scheduling g services ffor<br />
providinng<br />
the best performannce<br />
<strong>of</strong> data transfer <strong>of</strong>f<br />
various applicationns.<br />
[50] Tabble<br />
4-4[50][ 108] – [1122]<br />
<br />
UGGS<br />
is designned<br />
to suppoort<br />
real-timee<br />
<strong>fi</strong>xed-sizee<br />
packets peeriodic<br />
transsmission<br />
at constant bitt<br />
rate (CBBR),<br />
for exaample<br />
T1.<br />
<br />
Thi is scheme iss<br />
designed tto<br />
support rreal-time<br />
unn<strong>fi</strong>xed-size<br />
ppackets<br />
perriodic<br />
transmmission.<br />
Ann<br />
example<br />
is MPEG video. Thiss<br />
service allows<br />
BS to provide unnicast<br />
pollinng<br />
opportun nities for thee<br />
MS to rrequest<br />
b<strong>and</strong>d<strong>wi</strong>dth.<br />
<br />
Unsolicitedd<br />
grant servi ices (UGS)<br />
Real-time ppolling<br />
services<br />
(rtPS)<br />
Non-real-timme<br />
polling service (nrttPS)<br />
Table 4-4 Service Floows<br />
in WiMMax<br />
Thi is one suppoorts<br />
delay-ttolerant<br />
dataa<br />
streams w<strong>wi</strong>th<br />
un<strong>fi</strong>xed-size<br />
packetts,<br />
like FTP P. The nrtPSS<br />
<strong>and</strong> rtPPs<br />
are similar.<br />
The diffference<br />
is tthat<br />
a MS can use coontention-baased<br />
polling g or unicastt<br />
polling opportunitiies<br />
in the upplink<br />
to requuest<br />
b<strong>and</strong><strong>wi</strong>idth<br />
in nrtPSS<br />
service.<br />
48
Best-effort service (BE)<br />
This scheme is used only for service that does not require strict QoS, such as web browsing.<br />
The MS uses merely contention-based polling opportunities to request b<strong>and</strong><strong>wi</strong>dth <strong>and</strong> sends data<br />
whenever channels are available.<br />
4.3.1.2.4. Security<br />
4.3.1.2.4.1. Overview<br />
The security <strong>of</strong> IEEE 802.16 is called the privacy sublayer at the bottom <strong>of</strong> the MAC layer.<br />
It is mainly used to provide access control <strong>and</strong> con<strong>fi</strong>dentiality <strong>of</strong> the data link. The con<strong>fi</strong>guration<br />
<strong>of</strong> the IEEE 802.16 security has <strong>fi</strong>ve components <strong>and</strong> <strong>wi</strong>ll be introduced in the follo<strong>wi</strong>ng.<br />
[50][52][115] – [119]<br />
Security Associations (SA)<br />
This component is mainly concerned about connection. IEEE 802.16 has two types <strong>of</strong> SA;<br />
data SA <strong>and</strong> authorization SA. Only data SA has a clear de<strong>fi</strong>nition. The data SA is used to<br />
protect transmit connections between SS (Subscriber Station) <strong>and</strong> BS (Base Station).<br />
The authorization SA is a state which is shared between two particular SS <strong>and</strong> BS. The BS<br />
uses authorization SAs to con<strong>fi</strong>gure data SAs on the SS.[52]<br />
For securing a transmit connection, a SS <strong>fi</strong>rst uses a “create-connection” request to initiate a<br />
data SA. The st<strong>and</strong>ard <strong>wi</strong>ll let several connection IPs share a SA to support multicast. On<br />
network entry, the st<strong>and</strong>ard automatically establishes a SA for the secondary management<br />
channel. Thus, a SS may have two or three SAs, one for the secondary management channel,<br />
others for uplink <strong>and</strong> downlink connections. Each multicast group requires a SA to share <strong>wi</strong>th<br />
group members.<br />
X.509 certi<strong>fi</strong>cate pr<strong>of</strong>ile<br />
This is used to identify communication parities <strong>and</strong> 802.16 does not de<strong>fi</strong>ne its extensions.<br />
This st<strong>and</strong>ard de<strong>fi</strong>nes two types: manufacturer certi<strong>fi</strong>cates <strong>and</strong> SS certi<strong>fi</strong>cates. There are no<br />
certi<strong>fi</strong>cates <strong>of</strong> BS. A manufacturer certi<strong>fi</strong>cate is used to identify the manufacturer <strong>of</strong> an IEEE<br />
802.16 device. It can be self-signed or issued by a third party. An SS certi<strong>fi</strong>cate can identify a<br />
particular SS <strong>and</strong> also its MAC address. The SS certi<strong>fi</strong>cates are created <strong>and</strong> signed by<br />
manufacturers.<br />
The BS uses the manufacturer certi<strong>fi</strong>cate’s public key to con<strong>fi</strong>rm the SS certi<strong>fi</strong>cate <strong>and</strong> also<br />
verify the device. The SS must take care <strong>of</strong> the private key corresponding to its public key to<br />
prevent intrusion from attackers.<br />
49
PKM (Privacy <strong>and</strong> Key Management) authorization<br />
This protocol is used to send an authorization token to an authorized SS. And it contains<br />
three communication steps between SS <strong>and</strong> BS. Figure 4-3[52] The <strong>fi</strong>rst two steps are sent by SS<br />
for verifying itself <strong>wi</strong>th BS <strong>and</strong> the third one is used for response from BS to SS.<br />
Privacy <strong>and</strong> Key Management<br />
Figure 4-3 PKM Authorization Process <strong>and</strong> Parameters<br />
PKM is used to establish data SAs between SS <strong>and</strong> BS. This protocol can have two or three<br />
steps <strong>of</strong> message exchange between SS <strong>and</strong> BS. Figure 4-4[52] The <strong>fi</strong>rst step is optional. It<br />
depends on whether that BS requests rekeying or not. The second one, SS uses it to initiate the<br />
protocol <strong>and</strong> BS reply <strong>wi</strong>th the third one.<br />
50
Encryption<br />
Figure 4-4 PKM Protocol Messages Exchange Process <strong>and</strong> Parameters<br />
The DES-CBC (Data Encryption St<strong>and</strong>ard-Cipher Block Chaining) encryption enciphers a<br />
plaintext MPDU, but not the MPDU GMH or CRC. Figure 4-5[52]<br />
51
4.3.1.2.4.2. Overall Analysis<br />
Figure 4-5 Encryption Frame Structure <strong>and</strong> Process<br />
Learning from the experience from IEEE 802.11, the IEEE 802.16 working group faces<br />
security threats both in the MAC <strong>and</strong> PHY levels. 802.11 only has protections in the MAC level<br />
cannot present against attacks from PHY-Level. 802.16 progression has many good functions,<br />
however it also brings <strong>wi</strong>th it an increase <strong>of</strong> threats to users<br />
The initial st<strong>and</strong>ard IEEE 802.16-2001 requires an attacker to put real equipment between<br />
SS <strong>and</strong> BS <strong>and</strong> also operate at a frequency <strong>of</strong> 10 to 66 GHz. The IEEE 802.16e adds mobility to<br />
the st<strong>and</strong>ard; however it creates a security risk. Now, an attacker’s physical position is not really<br />
constrained <strong>and</strong> the management messages are much weaker than IEEE 802.11.<br />
With radio transmission, there is a great risk. Anyone who has a proper well located receiver<br />
can intercept the channel. So the designers have to establish a safety mechanism. The other threat<br />
is that anybody who has a correctly con<strong>fi</strong>gured radio transmitter can access the <strong>wi</strong>reless network.<br />
Through this weakness, an attacker can make up or modify frames from authorized organizations.<br />
Therefore there must be a procedure to protect the transmitting data. Furthermore, the<br />
interference <strong>and</strong> distance may also give attackers a chance to intrude the system or two systems<br />
which cannot connect to each other directly. Thus, how to protect a system <strong>and</strong> examine the<br />
received data are also very important to designers.<br />
52
4.3.2. IEEE 802.16e-2005, the newest st<strong>and</strong>ard<br />
4.3.2.1. OFDMA-PHY<br />
4.3.2.1.1. Background<br />
OFDMA (Orthogonal Frequency Division Multiple Access) is the main difference <strong>of</strong><br />
802.16e from other 802.16 st<strong>and</strong>ards. Most <strong>of</strong> new improvements <strong>and</strong> design are based on it.<br />
This method is deeply related <strong>wi</strong>th FDMA (Frequency Division Multiple Access). By using<br />
FFT/IFFT, FDMA can divide <strong>and</strong> combine the baseb<strong>and</strong> in an orthogonal way. In OFDMA-PHY,<br />
the subchannels are a minimum frequency resource-unit assigned by a base station. Thus<br />
different subchannels can be allocated to different users as a multiple-access mechanism. The<br />
IEEE TGe introduces scalability to OFDMA which can help provide best performance in a<br />
channel <strong>wi</strong>th b<strong>and</strong><strong>wi</strong>dth between 1.25MHz to 20MHz. for both <strong>fi</strong>xed <strong>and</strong> mobile service. Also it<br />
can lower the cost <strong>of</strong> system. [50][53]<br />
The FFT size in OFDMA-PHY is scalable from 128 to 2048. When the b<strong>and</strong><strong>wi</strong>dth increases,<br />
the FFT size is increased too, but the subcarrier interval is <strong>fi</strong>xed as 10.94 kHz. This also keeps<br />
the OFDM symbol duration <strong>fi</strong>xed. The 10.94 kHz interval is the best choice for balancing<br />
between the delay-spread <strong>and</strong> Doppler spread requirements for operating in <strong>fi</strong>xed <strong>and</strong> mobile<br />
environments. This interval allows the delay-spread up to 20µs <strong>and</strong> mobility speed up to 125<br />
kmph in 3.5 GHz b<strong>and</strong>. The FFT size 128, 512, 1024 <strong>and</strong> 2068 are used when the channel<br />
b<strong>and</strong><strong>wi</strong>dth are 1.25, 5, 10 <strong>and</strong> 20 MHz, respectively. The 256 bits OFDM is included in the<br />
OFDMA-PHY, so the mobile-WiMax is backward compatible <strong>wi</strong>th <strong>fi</strong>xed-WiMax, when the FFT<br />
size is 256. [50][53][106][120] – [123]<br />
Table 4-3 is the recommended scalability parameters for system.<br />
4.3.2.1.2. Frame structure<br />
OFDMA supports many different frame sizes to <strong>fi</strong>t the need <strong>of</strong> various applications <strong>and</strong><br />
models. There are three types <strong>of</strong> OFDMA subcarriers: [53][102][103][124] – [126]<br />
1. Data subcarriers for data transmission.<br />
2. Pilot subcarriers for various estimation <strong>and</strong> synchronization purposes.<br />
3. Null subcarriers for no transmission at all, used for guard b<strong>and</strong>s <strong>and</strong> DC carriers.<br />
In different subcarrier allocation modes, the pilot allocation is performed differently. For DL<br />
(Downlink) Partially Used Subchannelization (PUSC) <strong>and</strong> all UL (Uplink) modes, the set <strong>of</strong><br />
subcarriers <strong>of</strong> data <strong>and</strong> pilot is <strong>fi</strong>rst sliced into subchannels, <strong>and</strong> then the pilot subcarriers are<br />
allocated by each subchannel. For DL Fully Used Subchannelization (FUSC), the pilot<br />
53
subcarriers <strong>wi</strong>ll be assigned <strong>fi</strong>rst <strong>and</strong> then the rest <strong>of</strong> subcarriers are partitioned into data<br />
subchannels. FUSC has one set for pilot subcarriers, but each subchannel in PUSC has its own<br />
set for pilot subcarriers.<br />
Figure 4-6[53] is the frame structure <strong>of</strong> OFDMA-TDD. This kind <strong>of</strong> frame is sliced into DL<br />
<strong>and</strong> UL two subframes. The DL <strong>and</strong> UL subframes are separated by Transmit/Receive Gap <strong>and</strong><br />
Receive/Transmit Gap (TRG <strong>and</strong> RTG).The DL subframe starts <strong>wi</strong>th FCH (Frame Control<br />
Header) <strong>and</strong> then a DL-MAP <strong>and</strong> a UL-MAP. In DL-MAP BS <strong>wi</strong>ll tell MS which subcarriers are<br />
going to assign for it. The UL-MAP includes which subcarriers that MS can use to transmit on.<br />
Figure 4-6 OFDMA Frame Structure<br />
4.3.2.1.3. Various Subcarrier Allocation Modes<br />
OFDMA supports subchannelization to effectively allocate subchannels for both DL <strong>and</strong> UL.<br />
In WiMax, each user is allocated blocks <strong>of</strong> subcarriers, not individual subcarriers. This method<br />
can decrease the complexity <strong>of</strong> the subcarrier-allocation algorithm <strong>and</strong> make the mapping<br />
message easier. There are two main types <strong>of</strong> subcarrier permutations; distributed <strong>and</strong><br />
adjacent.[50][53] Generally speaking, the distributed subcarrier permutation has very good<br />
performance in mobile applications <strong>and</strong> improves frequency diversity <strong>and</strong> robustness. Adjacent<br />
subcarrier permutation is good at <strong>fi</strong>xed, portable or less mobility surroundings <strong>and</strong> increases<br />
multiuser diversity.<br />
DL Distributed Subcarrier Permutations: Fully Used Subchannelization (FUSC)<br />
All subchannels <strong>and</strong> full channel diversity are well utilized in this method by dispensing the<br />
allocated subcarriers to subchannels <strong>and</strong> a permutation mechanism is used here. During<br />
54
transmiission,<br />
the aadjacent<br />
cellls/sectors<br />
mmay<br />
hit each other by ceertain<br />
possibbility,<br />
becauuse<br />
<strong>of</strong> usingg<br />
the samme<br />
subcarrieers.<br />
This meechanism<br />
reeuses<br />
subcaarriers<br />
to minimize<br />
thee<br />
probabilityy<br />
<strong>of</strong> hits. In n<br />
additionn,<br />
fast fadinng<br />
<strong>of</strong> mobilee<br />
surroundinngs<br />
would llower<br />
the sy ystem performance.<br />
Buut<br />
frequencyy<br />
diversitty<br />
can minimmize<br />
it.<br />
Tabble<br />
4-5[53] is the summmary<br />
<strong>of</strong> subbcarrier<br />
alloocation<br />
struucture.<br />
In DDL-FUSC<br />
th here are twoo<br />
kinds <strong>of</strong><br />
sets <strong>of</strong> piloot;<br />
variable <strong>and</strong> <strong>fi</strong>xed ssets.<br />
The <strong>fi</strong>xxed<br />
one is uused<br />
in all OOFDM<br />
symbbols<br />
<strong>and</strong> thee<br />
variablee<br />
one is divvided<br />
into subsets s useed<br />
in odd annd<br />
even syymbols<br />
alterrnatively.<br />
Itt<br />
makes thee<br />
trade<strong>of</strong>ff<br />
<strong>of</strong> channell<br />
estimationn<br />
appropriate<br />
between aassigned<br />
powwer<br />
<strong>and</strong> freequency<br />
diversity.<br />
<br />
In OOFDMA<br />
sppeci<strong>fi</strong>cationn,<br />
the OFDMMA<br />
DL <strong>and</strong>d<br />
UL subfraames<br />
must bbegin<br />
<strong>wi</strong>th DL D <strong>and</strong> ULL<br />
mode. IIn<br />
DL PUSCC,<br />
all subchhannels<br />
<strong>wi</strong>lll<br />
be sliced a<strong>and</strong><br />
assigneed<br />
to three ssegments,<br />
an nd it can be e<br />
allocateed<br />
to sectoors<br />
<strong>of</strong> the same cell. [53] Thiss<br />
method utilizes u fulll-channel<br />
ddiversity<br />
byy<br />
dispenssing<br />
the alloocated<br />
subcaarriers<br />
to suubchannels.<br />
. [53] A perrmutation<br />
mmechanism<br />
is i also usedd<br />
here too<br />
minimizee<br />
the probaability<br />
<strong>of</strong> hhits<br />
<strong>and</strong> uusing<br />
frequuency<br />
diverrsity<br />
to miinimize<br />
thee<br />
performmance<br />
degraadation.<br />
<br />
Table 4-5 DL Distribuuted<br />
Subcarrrier<br />
Permuutation<br />
(FUSSC)<br />
DL <strong>and</strong> ULL<br />
Distributed<br />
Subcarrieer<br />
Permutatiion:<br />
Partiallly<br />
Used Subbchanneliza<br />
ation (PUSC C)<br />
Optional DDL<br />
<strong>and</strong> ULL<br />
Adjacentt<br />
Subcarrieer<br />
Permutattion:<br />
Advannced<br />
Moduulation<br />
<strong>and</strong>d<br />
Coding (AMMC)<br />
55
Adj djacent subccarriers<br />
are used u by thiss<br />
method too<br />
form subchhannels.<br />
AMMC<br />
can quiickly<br />
elect a<br />
modulaation<br />
<strong>and</strong> cooding<br />
combiination<br />
per subchannell,<br />
when it iss<br />
used <strong>wi</strong>th fast feedbaack<br />
channel.<br />
The subbchannels<br />
<strong>of</strong> AMC ccan<br />
use thee<br />
“water-poouring”<br />
typpes<br />
<strong>of</strong> algorrithms,<br />
<strong>and</strong> d it can bee<br />
combinned<br />
<strong>wi</strong>th an AAAS<br />
optionn.<br />
Tabble<br />
4-6[53] is the summmary<br />
<strong>of</strong> the AMC subcaarrier<br />
allocaation<br />
parammeters.<br />
4.3.2.22.<br />
MAC LLayer<br />
4.3.2.22.1.<br />
QooS<br />
Table<br />
4-6 UL-DDL<br />
Adjacennt<br />
Subcarrieer<br />
Permutatiion<br />
(optionaal<br />
AMC)<br />
The e functions <strong>of</strong> the QoSS<br />
<strong>of</strong> the IEE EE 802.16-22005<br />
includde<br />
the old foour<br />
schemess<br />
<strong>and</strong> a neww<br />
one schheme,<br />
extennded<br />
real-timme<br />
polling service (errtPS).<br />
This scheme is only de<strong>fi</strong>ned<br />
in IEEEE<br />
802.16ee-2005<br />
MAAC-layer.<br />
It combines tthe<br />
advantagges<br />
<strong>of</strong> UGSS<br />
<strong>and</strong> rtPS. This methood<br />
allocatess<br />
56
the uplink b<strong>and</strong><strong>wi</strong>dth periodically for MS <strong>and</strong> <strong>wi</strong>th this feature ertPS can coordinate data services<br />
which the b<strong>and</strong><strong>wi</strong>dth requirements change <strong>wi</strong>th time. [50][121][127][128]<br />
4.3.2.2.2. Power-saving<br />
How to extend the battery life is a very important issue <strong>of</strong> mobility. Therefore power<br />
management is a fundamental requirement <strong>of</strong> a mobile <strong>wi</strong>reless network. The IEEE 802.16e-<br />
2005 de<strong>fi</strong>nes two modes to operate power saving. [50][129] – [132]<br />
4.3.2.2.2.1. Sleep Mode<br />
This mode is an optional mode <strong>of</strong> WiMax power management. The MS is de<strong>fi</strong>ned by two<br />
statuses, sleep <strong>wi</strong>ndow <strong>and</strong> listen <strong>wi</strong>ndow. The sleep <strong>wi</strong>ndow is de<strong>fi</strong>ned as when a MS<br />
temporarily disconnects to the BS for a predetermined period <strong>of</strong> time. The listen <strong>wi</strong>ndow is<br />
follo<strong>wi</strong>ng the sleep <strong>wi</strong>ndow, during which the MS reconnects to the BS. The lengths <strong>of</strong> each<br />
sleep <strong>and</strong> listen <strong>wi</strong>ndow depend on the power-saving classes <strong>and</strong> is negotiated between the MS<br />
<strong>and</strong> BS. When the MS is in sleep <strong>wi</strong>ndow, this period is called unavailability interval. During the<br />
unavailability interval, the MS cannot receive any DL transmission <strong>and</strong> send any UL<br />
transmission. During the availability interval when the MS is in listen <strong>wi</strong>ndow, the MS can<br />
receive DL transmission <strong>and</strong> send UL transmission as normal. BS <strong>wi</strong>ll not send any DL<br />
transmission to MS when it is in sleep <strong>wi</strong>ndow, therefore the MS can turn <strong>of</strong>f one or more<br />
physical components for saving power. The BS buffers the SDUs (Service Data Units) for MS<br />
<strong>and</strong> transmits them later to the MS during availability interval.<br />
For different services, there are three power-saving classes:<br />
1. Power-saving class type 1<br />
Class type 1 is used for BE or nrtPS connections. In this class, the listen <strong>wi</strong>ndow size is<br />
<strong>fi</strong>xed <strong>and</strong> followed by a sleep <strong>wi</strong>ndow. Each sleep <strong>wi</strong>ndow size is t<strong>wi</strong>ce the size <strong>of</strong> the previous<br />
sleep <strong>wi</strong>ndow, but not bigger than the <strong>fi</strong>nal sleep <strong>wi</strong>ndow size. The size <strong>of</strong> the initial sleep<br />
<strong>wi</strong>ndow <strong>and</strong> the <strong>fi</strong>nal sleep <strong>wi</strong>ndow are noti<strong>fi</strong>ed to the MS by the BS before the power-saving<br />
class type 1 begins. During the sleep mode, the BS can reset the <strong>wi</strong>ndow size to the initial sleep<br />
<strong>wi</strong>ndow size at any time. For UL allocations, the reset process happens under the request from<br />
the MS. And for DL allocations, it happens when the BS <strong>fi</strong>nds out that the number <strong>of</strong> listen<br />
<strong>wi</strong>ndow is not enough for the traf<strong>fi</strong>c.<br />
2. Power-saving class type 2<br />
57
This class is used for UGS or rtPS connections. The sleep <strong>wi</strong>ndows <strong>and</strong> listen <strong>wi</strong>ndows are<br />
all <strong>fi</strong>xed-length <strong>and</strong> cross each other one by one in order. The BS tells the MS the <strong>wi</strong>ndow size<br />
before entering this power-saving mode.<br />
3. Power-saving class type 3<br />
This mode is used for multicast traf<strong>fi</strong>c or MAC management traf<strong>fi</strong>c. Different from other<br />
classes, it has only a single sleep <strong>wi</strong>ndow. Before entering this mode the BS decides the <strong>wi</strong>ndow<br />
size <strong>and</strong> the start time; then noti<strong>fi</strong>es the MS. The power-saving operation is inactive, after the<br />
sleep <strong>wi</strong>ndow has passed.<br />
4.3.2.2.2.2. Idle Mode<br />
Idle mode is also an optional scheme <strong>of</strong> WiMax power management, <strong>and</strong> it can save more<br />
power than sleep mode. With this scheme, several BS’s are assigned to a paging group <strong>and</strong> a MS<br />
can move <strong>wi</strong>thin this area <strong>and</strong> receive broadcast DL transmission from a BS <strong>wi</strong>thout s<strong>wi</strong>tching or<br />
registering to the network. When a MS is in idle mode, it listens to the network periodically for<br />
determining in which paging group it is <strong>and</strong> running the paging group update. MS also noti<strong>fi</strong>es<br />
the network <strong>of</strong> its appearance while running the paging group update. When a BS needs to<br />
connect <strong>wi</strong>th the MS in idle mode, all the BSs in the paging group, where the MS is, have to join<br />
the paging process. Once the MS receives the paging message, it <strong>wi</strong>ll end the idle mode <strong>and</strong> start<br />
to connect to the network.<br />
In idle mode, a MS has two statuses;, MS paging-unavailable interval <strong>and</strong> MS paging-listen<br />
interval. When a MS is in MS paging-unavailable interval, it cannot be paged but can power<br />
down or run other operations not related <strong>wi</strong>th connection <strong>wi</strong>th BS, such as scanning. In the MS<br />
paging-listen interval, the MS listens to the serving BS for broadcast paging message to see<br />
whether it is paged or not. If it is paged, it ends the idle mode <strong>and</strong> if not, it goes into next MS<br />
paging-unavailable interval.<br />
4.4. The future <strong>of</strong> WiMax<br />
The new member <strong>of</strong> 802.11, 802.11n, is on the way. 3G is also becoming more popular.<br />
Therefore, WiMax de<strong>fi</strong>nitely has to cooperate <strong>wi</strong>th them on a some certain level. WiMax is a<br />
<strong>wi</strong>de range <strong>wi</strong>reless communication; Wi-Fi is short range <strong>and</strong> 3G is also <strong>wi</strong>de range but <strong>wi</strong>th<br />
narrower b<strong>and</strong><strong>wi</strong>dth. Figure 4-7[54] Since they are all <strong>wi</strong>reless communication type systems, the<br />
market <strong>wi</strong>ll be overlapped partially. The services dem<strong>and</strong>ed most from end users are e-mail,<br />
sharing <strong>fi</strong>les, video <strong>and</strong>/or audio transmission <strong>and</strong> etc…. [54]<br />
58
Figure 4-7<br />
Coverage<br />
<strong>and</strong> Capacity<br />
for Diffferent<br />
Wireeless<br />
Accesss<br />
Technique es<br />
Bas sically, thee<br />
applications<br />
<strong>of</strong> themm<br />
are different,<br />
althouugh<br />
they hhave<br />
some features in n<br />
commoon.<br />
WiMax is develooped<br />
for MANs; M Wi-Fi<br />
is for LANs <strong>and</strong>d<br />
3G is tthe<br />
cellularr<br />
commuunication<br />
sta<strong>and</strong>ard.<br />
Thuus,<br />
the relaationships<br />
aamong<br />
themm<br />
should bbe<br />
<strong>of</strong> coope eration, nott<br />
competition.<br />
The sservices<br />
<strong>of</strong> 33G<br />
are phon ne service a<strong>and</strong><br />
limited internet serrvice<br />
in a lo ow mobility y<br />
environnment.<br />
Wi-FFi<br />
providess<br />
broadb<strong>and</strong> d <strong>wi</strong>reless sservice<br />
in a <strong>fi</strong>xed envvironment,<br />
most likelyy<br />
indoorss.<br />
WiMax iis<br />
going to provide a large rangge<br />
broadbannd<br />
<strong>wi</strong>reless service in a <strong>fi</strong>xed orr<br />
mobility y environmment.<br />
They can<br />
cover eaach<br />
other’s ddrawbacks.<br />
[54][133]<br />
In an urban arrea,<br />
IEEE 8802.16<br />
has sseveral<br />
commpetitors<br />
suuch<br />
as DSL, , cable, or f<strong>fi</strong>ber.<br />
Thesee<br />
<strong>wi</strong>red cconnectionss<br />
have highher<br />
speed a<strong>and</strong><br />
are moore<br />
stable. MMost<br />
<strong>of</strong> timme,<br />
they ha ave alreadyy<br />
existed when a buuilding<br />
was built. Evenn<br />
through w<strong>wi</strong>reless<br />
commmunicationn<br />
has been improved a<br />
lot; <strong>wi</strong>rred<br />
communnication<br />
is sstill<br />
more reeliable<br />
<strong>and</strong> safer. The maximum speed that WiMax W cann<br />
reach iss<br />
about 70 Mbps, but <strong>wi</strong>th <strong>fi</strong>ber, it can achieve<br />
at least t 1 Gbps! TTherefore,<br />
users u wouldd<br />
choose <strong>wi</strong>red ratheer<br />
than <strong>wi</strong>relless.<br />
[58]<br />
Annother<br />
probllem<br />
is the ttopography.<br />
. In a highlly<br />
developeed<br />
city, thesse<br />
tall builddings<br />
wouldd<br />
interfere<br />
<strong>wi</strong>th the ttransmissionn<br />
<strong>of</strong> radio. For high frequency<br />
miicrowaves,<br />
it requires a clear pathh<br />
to reachh<br />
the terminnal;<br />
other<strong>wi</strong>se<br />
the base station musst<br />
set on a bbuilding<br />
thaat<br />
is higher tthan<br />
others.<br />
On the other h<strong>and</strong>, , lower-freqquency<br />
micrrowave<br />
usinng<br />
non-linee-<strong>of</strong>-sight<br />
(NNLOS)<br />
tech hnology still l<br />
has a pr roblem; a signal<br />
is diff <strong>fi</strong>cult to locck<br />
on becauuse<br />
<strong>of</strong> manyy<br />
reflectionss<br />
<strong>of</strong>f mason nry walls. Inn<br />
59
an urban area, there are still several problems remaining to be solved for <strong>wi</strong>reless communication.<br />
That is the task <strong>of</strong> WiMax. [58]<br />
In smaller cities <strong>and</strong> suburban areas, <strong>wi</strong>reless communication has better performance. This is<br />
because the competition between <strong>wi</strong>reless <strong>and</strong> <strong>wi</strong>red is less <strong>and</strong> the topography is more favorable.<br />
It is not worth installing <strong>fi</strong>ber or DSL in this kind <strong>of</strong> area. Population distribution <strong>of</strong> these areas<br />
is usually scattered, so it <strong>wi</strong>ll cost more to <strong>wi</strong>re the whole network in this situation. And the<br />
numbers <strong>of</strong> users may be a problem too, thus <strong>wi</strong>reless could be a better choice. Especially when<br />
lower-frequency microwave <strong>wi</strong>th (NLOS) is more suitable. [58]<br />
Wireless communication has the best performance in rural areas. Not only because <strong>of</strong> the<br />
lack <strong>of</strong> competition, but also the more friendly geography. It however still has challenges. How<br />
to <strong>and</strong> where to set up stations are two major problems. Distance <strong>and</strong> population distribution<br />
must be considered as well. [58]<br />
When moving in a vehicle, mobile-WiMax can support <strong>wi</strong>reless access. Unlike 3G, mobile-<br />
WiMax can provide not only mobility but also BWA. For example, when taking a train for long<br />
distance trip, people can use mobile-WiMax to access the Internet for news, video entertainment,<br />
or online-game to entertain themselves. However, since the mobile-WiMax is still not<br />
commercialized, besides in Korea, the practical operation <strong>wi</strong>ll continue to be on hold..<br />
60
CHAPTER FIVE<br />
5. Case study<br />
This chapter <strong>wi</strong>ll discuss <strong>and</strong> compare three individual <strong>case</strong>s using Wi-Fi or WiMax to build<br />
up the public <strong>wi</strong>reless network. These <strong>case</strong>s are located in the cities <strong>of</strong> Tallahassee, Fl, USA,<br />
Taipei, Taiwan <strong>and</strong> Seoul, South Korea. The network located at <strong>Florida</strong> <strong>State</strong> University in<br />
Tallahassee, Fl, USA uses 802.11b/g to build an indoor <strong>and</strong> partial outdoor <strong>wi</strong>reless network.<br />
That allows students <strong>and</strong> faculties to use <strong>wi</strong>reless access in any building. Taipei initiated their<br />
public <strong>wi</strong>reless network project in September 2004. This project is contracted by Q-ware<br />
communications, Inc. The operation was <strong>of</strong><strong>fi</strong>cially started in December 2005. The service area<br />
covers 90% <strong>of</strong> the population <strong>of</strong> Taipei City. Installation was <strong>of</strong><strong>fi</strong>cially <strong>fi</strong>nished in September<br />
2006 <strong>and</strong> was named WiFly. South Korea is the <strong>fi</strong>rst country operating the commercial WiMax<br />
network. It is not the only country that uses the <strong>fi</strong>xed-WiMax technology. They are the only<br />
country that also combines it <strong>wi</strong>th mobile-WiMax. This project is developed by the Korean<br />
telecoms industry. The main coverage area is located in its capital, Seoul. The network was<br />
launched in June 2006.<br />
<strong>Florida</strong> <strong>State</strong> University located in Tallahassee, <strong>Florida</strong> is the easiest one to gather data,<br />
because it is nearby. And by intervie<strong>wi</strong>ng the related staff [147], more precise <strong>and</strong> detailed<br />
information could be collected. Because the information <strong>and</strong> business news concerning WiFly<br />
are written in English <strong>and</strong> Chinese, they are easy to read <strong>and</strong> collect. However because <strong>of</strong> the<br />
time factor, only one interview was conducted concerning WiFly. Most <strong>of</strong> the data was gathered<br />
from the Internet <strong>and</strong> books. Although it is easy to <strong>fi</strong>nd the newest information on the Internet, it<br />
require cross validation to ensure its validity. This is the most important issue when doing a <strong>case</strong><br />
study <strong>of</strong> Wifly. WiBro is the most dif<strong>fi</strong>cult one <strong>of</strong> data collection <strong>and</strong> analysis in <strong>case</strong> <strong>studies</strong>. it<br />
is because <strong>of</strong> language barrier. The WiBro <strong>of</strong><strong>fi</strong>cial website has an English version, but not for all<br />
documents. Most <strong>of</strong> them are written in Korean. Thus the information is limited <strong>and</strong> makes the<br />
analysis more dif<strong>fi</strong>cult.<br />
The follo<strong>wi</strong>ng sections <strong>wi</strong>ll introduce these three <strong>case</strong>s <strong>and</strong> their implementation. Each<br />
section contains analysis <strong>and</strong> small conclusion. The last section is the overall analysis.<br />
5.1. FSU <strong>wi</strong>reless network<br />
5.1.1. Introduction<br />
The <strong>wi</strong>reless network solution <strong>of</strong> FSU (<strong>Florida</strong> <strong>State</strong> University) is called FSUWIN. WIN<br />
means Wireless Integrated Network. This network is based on the existed <strong>wi</strong>red network <strong>and</strong><br />
provides a more flexible <strong>and</strong> convenient internet service on campus. With FSUWIN, students<br />
61
<strong>and</strong> faculties can use their NB’s to access the Internet everywhere on campus. This <strong>wi</strong>reless<br />
network follows the IEEE 802.11 st<strong>and</strong>ard <strong>and</strong> covers major buildings <strong>and</strong> most public areas.<br />
Figure 5-1[70]. The department which is in charge <strong>of</strong> FSUWIN is OTC (Of<strong>fi</strong>ce <strong>of</strong><br />
Telecommunications <strong>and</strong> Networking). It is also responsible for maintenance <strong>and</strong> network<br />
security. The <strong>fi</strong>rst <strong>wi</strong>reless network at FSU was started in 1999, <strong>and</strong> at that time it was only an<br />
experimental network. There was no plan for building a campus-<strong>wi</strong>de network. In 2002, OTC<br />
got the funding they needed to install the <strong>wi</strong>reless network at FSU. The goal is to provide an<br />
indoor/outdoor <strong>wi</strong>reless public network for all students <strong>and</strong> faculty. [147]<br />
5.1.2. Implementation<br />
Figure 5-1 The Coverage <strong>of</strong> FSU Wireless Network<br />
The reason why FSU used WLAN to extend the campus network instead <strong>of</strong> <strong>wi</strong>red LANs is<br />
because it is cheaper <strong>and</strong> more flexible. The implementation was started from upgrading the<br />
existing <strong>wi</strong>red network. The construction <strong>and</strong> installation were conducted in two parts. First part<br />
was Building-to-Building Connectivity (Bridges), <strong>and</strong> second part was Intra-Building<br />
Connectivity (AP). [70] Table 5-1 shows the basic information <strong>of</strong> FSUWIN.<br />
Part I contains three phases. In phase I, the goal was to install <strong>wi</strong>reless network equipment in<br />
6 buildings <strong>and</strong> support 89 users. The operators took 4 buildings <strong>and</strong> created two domains in two<br />
connectivity points <strong>of</strong> the FSU network. After creating these two domains, the network could<br />
simply be enlarged by adding additional buildings into each domain. The operators also<br />
62
increased b<strong>and</strong><strong>wi</strong>dth, <strong>fi</strong>xed connectivity issues, <strong>and</strong> hid antennas through upgrading in this phase.<br />
The total cost was <strong>wi</strong>thin $6,000 but if using <strong>fi</strong>ber, it would cost at least $10,000. [70]<br />
In phase II, the operators tracked the outside campus usage <strong>and</strong> wanted to install <strong>wi</strong>reless<br />
network to these small groups or departments. They located the outside campus connections. The<br />
goal was to renovate these networks in the FSU extended campus. After evaluating these<br />
connections, the operators found out that they could establish connections to these places<br />
<strong>wi</strong>relessly <strong>and</strong> retrieved many modem lines. Eventually, the operators removed 37 dial-up<br />
connections in 5 buildings <strong>and</strong> then they had more dial-up resources for other users. These<br />
buildings used hubs to connect each PC <strong>and</strong> then used <strong>wi</strong>reless bridges/gateway to connect back<br />
to main campus network. In the middle, there is no <strong>wi</strong>red network; it is totally <strong>wi</strong>reless. [70]<br />
In this last phase, operators added 8 additional buildings into the FSU <strong>wi</strong>reless network. The<br />
problems <strong>of</strong> these buildings were that they were either too far away from campus (1.5 miles<br />
away) or too expensive to install <strong>fi</strong>ber for each user (spanned city street). By applying the<br />
<strong>wi</strong>reless solution, the operators spent around 15,000 dollars <strong>wi</strong>thout recurring costs or permits.<br />
[70]<br />
The Building-to-Building Connections covered 19 buildings <strong>wi</strong>th 207 users <strong>and</strong> 22 bridges.<br />
(Document in 09/2006) [70]<br />
Part II contained two phases <strong>and</strong> mainly focused on the inner connections <strong>of</strong> a building. In<br />
phase I, the operators estimate the areas on the campus where the WLAN was highly needed.<br />
These places included three libraries <strong>and</strong> Student Union. The Student Union is a place where<br />
vendors are <strong>and</strong> students <strong>and</strong> employees h<strong>and</strong>-out together. [70]<br />
Phase II was to help the departments which requested an intra-building network to install<br />
<strong>and</strong> setup the FSUWIN network. The process included implementation, integration, optimization<br />
<strong>and</strong> installation. They would make sure the departments did not have any problems when using<br />
the WLAN. For achieving maximum ef<strong>fi</strong>ciency, the operators not only installed <strong>and</strong> maintained<br />
the network, but also evaluated future extensions for the departments. The installation process is<br />
documented for future improvement. The departments which have FSUWIN service are the<br />
College <strong>of</strong> Law, Registrar’s Of<strong>fi</strong>ce, College <strong>of</strong> Business, School <strong>of</strong> Social-Work, <strong>and</strong><br />
Mathematics. (Document in 09/2006)[70]<br />
The APs <strong>and</strong> s<strong>wi</strong>tches used by FSUWIN are produced by many different companies, such as<br />
Vivato Networks, Xirrus <strong>and</strong> Foundry Networks. The technology details are shown in <strong>fi</strong>gure 5-<br />
6[145], <strong>fi</strong>gure 5-7[146] And <strong>fi</strong>gure 5-8[71]; table 5-2[145], table 5-3[146] <strong>and</strong> table 5-4[71].<br />
Comparing the Vivato solution to regular AP, it is easy to <strong>fi</strong>nd that Vivato has longer coverage<br />
<strong>and</strong> could support more users. In the survey “Vivato S<strong>wi</strong>tch Evaluation”[70], there are <strong>fi</strong>ve<br />
scenarios had been de<strong>fi</strong>ned: Fisher, L<strong>and</strong>is, Shores, Sliger <strong>and</strong> Stadium. This survey shows that<br />
only 1 or 2 pieces <strong>of</strong> Vivato equipment are needed to cover an area. In the scenario one, Fisher<br />
Lecture Hall takes 6 regular APs, three at each side, to cover the whole area, but the Vivato<br />
63
solution needs only one. Figure 5-2[70]. In scenario two, L<strong>and</strong>is Green needs 3 regular APs, but<br />
just one Vivato s<strong>wi</strong>tch is enough for this area. Figure 5-3[70]. In scenario three, Shores Library<br />
total needs <strong>fi</strong>ve regular APs to cover the whole floors. There are two in the basements, one in the<br />
<strong>fi</strong>rst floor <strong>and</strong> two in the second floor. In this <strong>case</strong> Vivato solution needs two s<strong>wi</strong>tches to cover<br />
this area, one in the basement <strong>and</strong> the other on second floor. Figure 5-4[70]. Scenario four is not<br />
available in the survey. The last scenario is Stadium. In this <strong>case</strong> it takes at least nine regular APs<br />
to cover the area <strong>and</strong> the complex is also high. For Vivato solution, it simply needs only one in<br />
the indoor place where there was already power. The Vivato s<strong>wi</strong>tches are mainly used in the<br />
outdoor scenario, <strong>and</strong> for indoor scenarios, the other types <strong>of</strong> APs, Xirrus <strong>and</strong> Foundry Networks,<br />
are used.<br />
For ensure the quality <strong>of</strong> signal strength <strong>and</strong> maximum capacity, each AP is directly<br />
connected to the backbone network; <strong>and</strong> no more than 20 users for a single AP. If there is a high<br />
usage in a certain area, the operators would install more APs to share the throughput. The critical<br />
locations <strong>of</strong> FSUWIN installation were libraries, Student Union <strong>and</strong> other common public places,<br />
because FSUWIN is a public campus network. [147]<br />
Figure 5-2 Fisher Lecture Hall<br />
64
Figure 5-3 L<strong>and</strong>is Green<br />
Figure 5-4 Shores Library<br />
65
Figure 5-5 Stadium<br />
Table 5-1 The Basic Information <strong>of</strong> FSUWIN<br />
Terms Parameters<br />
St<strong>and</strong>ard IEEE 802.11 a/b/g<br />
Of<strong>fi</strong>cial Initial date 2002<br />
Coverage<br />
66<br />
Outdoor 70 ~ 75%<br />
Indoor 10%<br />
Maximum Users per AP 20 (Design Issue)<br />
Average User per Month 2500 ~ 3000<br />
AP model Vivato, Xirrus, Foundry Networks<br />
Data Rate 1 ~ 26 Mbps (actually speed)<br />
Network Type Direct to Backbone network
Table 5-2 Xirrus XS-3700 AP Technology Data<br />
802.11a/b/g Radios 4<br />
802.11a Radios 4<br />
Total Number <strong>of</strong> Radios 8<br />
Number <strong>of</strong> Integrated S<strong>wi</strong>tch Ports 8<br />
Uplink Ethernet Ports 2 Gigabit<br />
Maximum Wi-Fi B<strong>and</strong><strong>wi</strong>dth 432 Mbps<br />
Integrated Wi-Fi Threat Sensor Yes<br />
Maximum Number <strong>of</strong> Users per Radio 64<br />
Maximum Number <strong>of</strong> Users per Array 512<br />
Number <strong>of</strong> Voice Calls per Array 84<br />
Number <strong>of</strong> Video Streams per Array 21<br />
Figure 5-6 Xirrus XS-3700 AP<br />
67
Table 5-3 Foundry Networks IP250 Technology Data<br />
AP And Network Features • Fragmentation Threshold Setting<br />
• Multi-Country Support • Idle Timeout (set at 30 minutes)<br />
• Mounting Bracket for Wall, Ceiling, <strong>and</strong><br />
Tabletop<br />
68<br />
• Layer 2 Roaming-802.11f IAPP<br />
• Integrated AP Locking Mechanism Wireless Data Encryption<br />
• LEDs For Status, Link, Radio a, Radio<br />
b/g<br />
• RC4 64-bit/128-bit/152-bit Wired<br />
Equivalent Privacy (WEP)<br />
• Auto-sensing 10/100BASE-T PoE Port • Temporal Key Integrity Protocol<br />
(TKIP)<br />
• Power Over Ethernet (PoE) Support-<br />
802.3af<br />
• Advanced Encryption St<strong>and</strong>ard (AES)<br />
• 802.11a, 802.11b, 802.11g St<strong>and</strong>ards • Pair<strong>wi</strong>se Master Key Security<br />
Association (PMKSA)<br />
• 802.11a Turbo Mode • WPA2 mixed-mode AES/TKIP<br />
• Simultaneous Dual Radio Support 2.4-<br />
GHz <strong>and</strong> 5-GHz<br />
• Integrated Antenna Support For<br />
802.11a/b/g<br />
• External Antenna Support for<br />
802.11a/b/g<br />
Wireless Quality Of Service<br />
• 802.1p tag mapping to priority queue<br />
• Source/Destination MAC-address<br />
mapping to priority queue<br />
• Plenum Rated UL 2043 AP Housing • Ethertype mapping to priority queue<br />
• Automatic Channel Assignment • Spectralink voice prioritization<br />
• Adjustable Power Levels • AP Load Balancing<br />
• AP Load Balancing Radio Support<br />
• Maximum Speed Setting • Simultaneous Dual Radio Support<br />
2.4GHz <strong>and</strong> 5GHz<br />
• Broadcast/Multicast Rate Limiting • 802.11g protected mode<br />
• VLAN Support-64 VLANs • Automatic channel select
• Automatic Tx power selection<br />
• Maximum station data rate<br />
• Multicast data rate<br />
• Antenna type<br />
• Antenna diversity<br />
• Fragmentation length<br />
Table 5-3 Cont.<br />
Figure 5-7 Foundry Networks IP250<br />
69
Table 5-4 Vivato 2.4 GHz Indoor & Outdoor Wi-Fi S<strong>wi</strong>tch Technology Data<br />
70
Table 5-4 Cont.<br />
71
Table 5-4 Cont.<br />
Figure 5-8 Vivato 2.4 GHz Indoor & Outdoor Wi-Fi S<strong>wi</strong>tches<br />
72
5.1.3. Analysis<br />
The FSU <strong>wi</strong>reless network is a very convenient system. It allows all students <strong>and</strong> faculty to<br />
have more freedom to access the Internet <strong>wi</strong>thout a strict location limitation. The connection is<br />
robust <strong>and</strong> the signal is stable. However there are still complaints <strong>and</strong> technical problems that<br />
exist. Mr. Clint Ringgold, Network Administrator <strong>of</strong> OTC, said that the primary complaint is<br />
about the coverage <strong>of</strong> the indoor area. At the beginning <strong>of</strong> the project, the FSUWIN installation<br />
was focused on the outdoors, especially for public areas, <strong>and</strong> had very limited budget. Therefore,<br />
if it is not a public area, the installation would be only under the request <strong>of</strong> the departments.<br />
Hence sometimes the coverage is only a half <strong>of</strong> the building or very small area <strong>of</strong> the building.<br />
That is why users may get a signal on one side <strong>of</strong> the building, but no signal on the other side <strong>of</strong><br />
the building. [147]<br />
Concerning this technical problem, Mr. Clint Ringgold mentioned two future goals. One is<br />
h<strong>and</strong><strong>of</strong>f <strong>and</strong> the other is the central controller. Mr. Phillip M. Callahan, Assistant Director <strong>of</strong><br />
OTC, said that installing a central controller is their future direction <strong>and</strong> it should be the<br />
university issue. It is very expensive equipment <strong>and</strong> the OTC is still waiting for funding.<br />
Meanwhile the other issue is to shift the current technology to <strong>fi</strong>t the controller. The function <strong>of</strong><br />
this controller is to connect to the APs around the campus <strong>and</strong> monitor the status <strong>of</strong> each AP, so<br />
that the OTC can control the network ef<strong>fi</strong>ciently. A single controller can connect at least 500<br />
APs. Concerning the other goal, Mr. Clint Ringgold indicated that the current FSUWIN does not<br />
support roaming, so users cannot move between two hotspots <strong>and</strong> maintain a connection. This<br />
can be done either by s<strong>wi</strong>tching to another technology or gro<strong>wi</strong>ng the network. Mr. Ringold<br />
described it as a design issue.<br />
The network security is guarded by the FSUWIN login system. Figure 5-9[70]. Every user<br />
needs to register a FSUID in order to login to the system to establish a connection. To maintain<br />
network reliability, OTC has the right to control the traf<strong>fi</strong>c load <strong>and</strong> RF devices are used for<br />
avoiding congestion <strong>and</strong> interference to <strong>wi</strong>reless signals. The terrain <strong>of</strong> the FSU campus is<br />
favorable to signal transmission, because it does not have high buildings <strong>and</strong> the density <strong>of</strong><br />
buildings is low. Therefore multipath fading is not serious to the signal.<br />
Mr. Phillip M. Callahan said that OTC faces several dif<strong>fi</strong>culties while installing the network<br />
concerning policy <strong>and</strong> technology issues. Addressing policy, he mentioned ownership <strong>and</strong><br />
funding. The OTC has skill <strong>and</strong> management duty, but does not always own the equipment. For<br />
example, if a department asks the OTC to install FSUWIN for them <strong>and</strong> they buy the equipment<br />
themselves, then the problem is who is responsible for the cost <strong>of</strong> maintenance, upgrade <strong>and</strong><br />
replacement in the future. They need FSU to set a policy for this issue. For technical dif<strong>fi</strong>culties,<br />
Mr. Clint Ringgold indicated that most <strong>of</strong> the time there is no data-<strong>wi</strong>res in the location where<br />
they want to install an AP, so they need to <strong>wi</strong>re it by themselves or change the planned location.<br />
Users complain about the speed <strong>and</strong> service quality, but it depends on the radio interference,<br />
such as distance from the AP, microwave <strong>and</strong> cell-phone. There is another technical problem that<br />
73
Mr. Phillip M. Callahan mentioned. He said that sometimes people buy their own devices <strong>and</strong><br />
just plug them in <strong>wi</strong>thout reporting them to the OTC. They can cause interference <strong>and</strong> security<br />
problems. He said it may be cheaper to buy an AP in local store, but this would cause security<br />
vulnerability in the end.<br />
5.1.4. Conclusion<br />
Figure 5-9 FSUWIN Login System<br />
FSU campus is a relatively small area, so it is suitable for Wi-Fi. The network structure is<br />
also designed very well. It is a successful <strong>wi</strong>reless network model. The next step <strong>of</strong> FSUWIN is<br />
to install a central controller, upgrade the network for roaming <strong>and</strong> extend coverage for more<br />
indoor environments. So far, the OTC does not have any plans to upgrade the system to IEEE<br />
802.11n or IEEE 802.16, said Mr. Phillip M. Callahan. FSUWIN does not have many serious<br />
problems. The technical problems can be solved by new technologies <strong>and</strong> the policy issues are<br />
dependent on FSU. Beside these issues, FSUWIN is a stable <strong>and</strong> convenient <strong>wi</strong>reless public<br />
network. In the future, if a small town, a village or other smaller areas want to upgrade its existed<br />
<strong>wi</strong>red network to <strong>wi</strong>reless public network, FSU is a good example to follow.<br />
5.2. WiFly in Taipei<br />
5.2.1. Introduction<br />
WiFly is part <strong>of</strong> the Mobile Taiwan Applications Promotion Project. This project started in<br />
2004 <strong>and</strong> its goal is “to bring out communication industries growth <strong>and</strong> stronger <strong>of</strong> national<br />
competitiveness based on complete broadb<strong>and</strong> network infrastructure.” [74] WiFly is based on<br />
Wi-Fi st<strong>and</strong>ard (IEEE 802.11 a/b/g). The WiFly has <strong>of</strong><strong>fi</strong>cially operated for one <strong>and</strong> a half years<br />
74
since the January 2006. The population coverage is more than 90%, but the geographic coverage<br />
is only about 50%. The total number <strong>of</strong> APs are about 4200.<br />
5.2.2. Implementation<br />
The WiFly infrastructure installation was split in three stages. The <strong>fi</strong>rst stage was to cover<br />
the 30 MRT (Mass Rapid Transit) stations <strong>and</strong> the surrounding areas, including the underground<br />
shopping streets. This stage was <strong>fi</strong>nished in May 2005. The second stage included 42 main city<br />
arteries, shopping districts, c<strong>of</strong>fee shops, <strong>and</strong> the rest <strong>of</strong> MRT stations <strong>and</strong> so on. There were<br />
about 2000 APs that were installed in this stage. In the third stage, there were 9 city hospitals, 53<br />
libraries, 12 Taipei administrative buildings <strong>and</strong> 600 7-11s (chained convenient stores) included.<br />
The <strong>fi</strong>nal stage was <strong>fi</strong>nished in July 2006. More than 4200 APs were used, <strong>and</strong> up to 90% <strong>of</strong> the<br />
population was covered. This was a br<strong>and</strong> new world record. [72]<br />
The WiFly uses Nortel Wireless Mesh Network as its fundamental model. Two components,<br />
Wireless Gateway 7250 <strong>and</strong> Wireless Access Point 7220, were used for this model. In this<br />
network, the connection between APs is 802.11a <strong>and</strong> the connection between AP <strong>and</strong> end users<br />
is 802.11b/g. Since there is no need to <strong>wi</strong>re every AP in the network, the cost <strong>of</strong> installing <strong>wi</strong>red<br />
network from gateway to AP <strong>and</strong> AP to AP can be eliminated. [72]<br />
The Nortel Wireless Mesh Network is a solution <strong>of</strong> installing the outdoor <strong>and</strong> indoor Wi-Fi<br />
network. It is scalable <strong>and</strong> secure. An ISP can use it to provide <strong>wi</strong>reless internet service <strong>and</strong><br />
companies can use it to build inner private networks. The network contains three components; a<br />
<strong>wi</strong>reless access point, <strong>wi</strong>reless a gateway <strong>and</strong> a <strong>wi</strong>reless mesh management platform. Figure 5-<br />
10[75], Figure 5-11[75], Table 5-5[75]<br />
There are two models <strong>of</strong> APs, Wireless AP 7220 <strong>and</strong> Wireless AP 7215. The WAP 7220 is<br />
an outdoor <strong>and</strong> indoor-type AP <strong>and</strong> the WAP 7215 is an indoor-type AP. Figure 5-12[75]. The<br />
WAP 7220s can be connected together to cooperate for improving system performance. WAP<br />
7215 only works in indoor locations. It can connect to either <strong>wi</strong>red or <strong>wi</strong>reless networks. WAP<br />
7220 <strong>and</strong> WAP 7215 also can cooperate together to form the <strong>wi</strong>reless mesh network. The<br />
<strong>wi</strong>reless gateway has two models as well; Wireless Gateway 7250 <strong>and</strong> Wireless Gateway 7240.<br />
The WG 7250 can support 10/100 Ethernet interface <strong>and</strong> 120 WAPs. The WG 7240 also has<br />
10/100 Ethernet interface but only supports 10 WAPs. The Wireless Mesh Management System<br />
provides a communication interface for Nortel’s <strong>wi</strong>red <strong>and</strong> <strong>wi</strong>reless network products. [75]<br />
75
Figure 5-10 Wireless Mesh Network Structure I<br />
Figure 5-11 Wireless Mesh Network Structure II<br />
76
Table 5-5 Parameters <strong>of</strong> WLAN <strong>and</strong> Mesh Network<br />
Figure 5-12 Wireless Access Point 7220<br />
The advantage <strong>of</strong> the mesh network is that all APs can share the connections among the<br />
network. Therefore the reliability <strong>and</strong> stability <strong>of</strong> the network can be improved. If any AP in the<br />
network is malfunctioning, the transmission route is not going to fail. Other APs <strong>wi</strong>ll form an<br />
alternative path to keep the network functional. The other advantage is that for places that <strong>wi</strong>red<br />
network is dif<strong>fi</strong>cult to install or cannot be installed; this type <strong>of</strong> network is a nice alternative<br />
solution. [75]<br />
77
In the AP operation system, Nortel developed a critical scheme called Nortel’s Adaptive<br />
Mesh Management Protocol. This protocol can simplify the deployments <strong>and</strong> optimize the<br />
overall performance <strong>of</strong> the mesh network. There are several important functions in this protocol:<br />
auto-discover the neighbor APs, auto-con<strong>fi</strong>guration <strong>and</strong> system synchronization, radio resource<br />
management, smart antenna management, dynamic mesh routing, <strong>and</strong> fast fault recovery. With<br />
these technologies, the Nortel Wireless Mesh Network can solve many technical problems such<br />
as interference, security, system scalability <strong>and</strong> reliability, QoS, simplifying installation <strong>and</strong><br />
lower the cost. [75] Table 5-6[75] is the features <strong>of</strong> Nortel Wireless Mesh Network.<br />
While dealing <strong>wi</strong>th interference, Nortel uses three schemes, Nortel’s Adaptive Mesh<br />
Management Protocol, smart antenna mechanism, <strong>and</strong> dual radio design. The dual radio design<br />
uses different spectrums for transmission <strong>and</strong> reception to avoid self-interference. Nortel’s<br />
Adaptive Mesh Management Protocol can sense the status <strong>of</strong> nearby channels to achieve the<br />
maximum usage <strong>of</strong> channels. With the smart antenna mechanism, data is transmitted in a<br />
beamform <strong>and</strong> directional way, so the data streams do not affect or be affected by other beams.<br />
[75]<br />
In the security <strong>fi</strong>eld, because the <strong>wi</strong>reless network is easier to be attacked by hackers than<br />
<strong>wi</strong>red network, to enhance this defect, Nortel’s mesh network adopts WEP/WAP/WAP2 <strong>and</strong><br />
IPSec (IP Security Protocol). IPSec is derived from VPN (Virtual Private Network) technology.<br />
It uses a <strong>fi</strong>rewall to <strong>fi</strong>lter the incoming data stream before entering the <strong>wi</strong>red network. For<br />
extending the network capacity, the mesh network allows the network designers to add new<br />
WAPs into the network at any locations in the covered area. This is the scalability <strong>of</strong> the Nortel<br />
Wireless Mesh Network. With the Nortel’s Adaptive Mesh Management Protocol, a new WAP<br />
can auto-discover the surrounding WAPs <strong>and</strong> establish the new optimized transmission path.<br />
Similarly, when an AP or more APs are malfunctioning, the Nortel’s Adaptive Mesh<br />
Management Protocol can re-route a substitute path to keep the network functional. [75]<br />
Nortel’s Wireless Mesh Network solution can be integrated <strong>wi</strong>th WiMax BS. With the<br />
indoor/outdoor APs <strong>and</strong> the mesh network features, this solution gives network designers a lot <strong>of</strong><br />
freedom to build up a low-cost <strong>and</strong> network that is also fairly simple. [75]<br />
78
Table 5-6 Features <strong>of</strong> Nortel Wireless Mesh Network<br />
79
Figure 5-13 Nortel Wireless Mesh Network Solution Example [75]<br />
The follo<strong>wi</strong>ng section is the data <strong>of</strong> AP <strong>and</strong> gateway. [73]<br />
Wireless Access Point 7220<br />
Technical Speci<strong>fi</strong>cations<br />
Wireless AP 7220 Access Link 802.11b/g (2.4 GHz) Radio System<br />
Center frequency<br />
• 2417 MHz to 2457 MHz (i.e., North America)<br />
Data rate: 54 Mbps max<br />
• Supports 1, 2, 5.5, 11 Mbps (IEEE 802.11b)<br />
• Supports 6, 9, 12, 18, 24, 36, 48 <strong>and</strong> 54 Mbps (IEEE 802.11g)<br />
• IEEE 802.11b/g st<strong>and</strong>ard rates<br />
Access antenna options<br />
• Co-linear whip, 5 dBi nominal antenna, SMA connectors<br />
• PIFA integrated antenna, 0 dBi nominal SMA connectors<br />
Radiated EIRP<br />
• +26 dBm typical<br />
Receive Sensitivity 802.11b (11Mbps)<br />
• -95 dBm typical @ 11 Mbps<br />
• -96 dBm typical @ 5.5 Mbps<br />
• -98 dBm typical @ 2 Mbps<br />
80
• -101 dBm typical @ 1 Mbps<br />
Receive Sensitivity 802.11g (54 Mbps)<br />
• -80 dBm typical @ 54 Mbps<br />
• -82 dBm typical @ 48 Mbps<br />
• -86 dBm typical @ 36 Mbps<br />
• -90 dBm typical @ 24 Mbps<br />
• -92 dBm typical @ 18 Mbps<br />
• -95 dBm typical @ 12 Mbps<br />
• -95 dBm typical @ 9 Mbps<br />
• -96 dBm typical @ 6 Mbps<br />
Wireless AP 7220 Transit Link 802.11a (5 GHz) radio system<br />
Center frequency<br />
• 5740 MHz to 5840 MHz<br />
Data rate: 54 Mbps max<br />
• Supports 6, 9, 12, 18, 24, 36, 48 <strong>and</strong> 54 Mbps<br />
• IEEE 802.11a st<strong>and</strong>ard rates<br />
Antenna system gain from radio module card inside the unit<br />
• 8.4 dBi nominal<br />
Radiated EIRP<br />
• +28 dBm typical @ 54 Mbps<br />
• +30 dBm typical @ 48 Mbps<br />
• +32 dBm typical @ 6-36 Mbps<br />
Receive Sensitivity (
• Wired network interface: Auto sensing 10/100BaseT Ethernet, 1.5kV surge<br />
protection per IEC60950<br />
• Power input nominal: 100V - 240V AC (45Hz – 65Hz)<br />
Power consumption<br />
• Operating: Indoor or outdoor > 0°C = 8W typical Outdoor < 0°C = 8W – 14W (-<br />
40°C)<br />
• Startup: Indoor or outdoor > 0°C = 8W typical Outdoor < 0°C = 24W (short<br />
duration) 8W– 14W (- 40°C)<br />
Dimensions (<strong>wi</strong>thout mounting brackets or antennas)<br />
• 265mm (10.5 inches) tall x 200mm (8 inches) diameter<br />
• Weight: 2.4 kg (5.3 lbs)<br />
• Color: Gray<br />
Optional accessories<br />
• Mounting brackets (right-angle or straight horizontal attachment)<br />
• 5m, CAT5 Ethernet indoor/outdoor rated cable for network access point (NAP)<br />
operation<br />
• Street light photo-electric control power tap 'luminaire' 120/208/240 V<br />
• 13dBi, 18dBi <strong>and</strong> 23dBi TL external antennae<br />
Wireless Gateway 7250<br />
Technical Speci<strong>fi</strong>cations<br />
St<strong>and</strong>ard:<br />
• 128 MB memory<br />
• Processor - 850 MHz<br />
• PCI expansion slot - one (available for additional Ethernet interface or hardware<br />
accelerator card)<br />
• LAN/WAN interfaces<br />
Two 10/100 BaseT Ethernet<br />
Management/console (DB9)<br />
Optional:<br />
• One additional 10/100 BaseT Ethernet interface (provides additional LAN/WAN<br />
connectivity, if required by network design)<br />
• 128 MB RAM upgrade<br />
• Hardware encryption accelerator card<br />
Physical speci<strong>fi</strong>cations:<br />
• Length: 21 in. (53.3 cm)<br />
• Width: 17.25 in. (43.8 cm)<br />
• Height: 3.5 in. (8.9 cm)<br />
• Weight: 10.0 lb. (4.5 kg)<br />
82
Operating environment speci<strong>fi</strong>cations:<br />
• Electrical: 90-264 VAC, 2.0 @ 90 VAC, 47-63 Hz<br />
• Temperature: 32°-104° F (0°-40° C)<br />
• Relative humidity: 10-90% non-condensing<br />
5.2.3. Analysis<br />
The WiFly has been in operation for about 21 months. As <strong>of</strong> the end <strong>of</strong> August 2007, there<br />
were one hundred <strong>and</strong> <strong>fi</strong>fty thous<strong>and</strong> registered customers <strong>wi</strong>th an average <strong>of</strong> six thous<strong>and</strong> users<br />
per month. The population coverage is 96% (two million six hundred thous<strong>and</strong> people) <strong>and</strong> the<br />
number <strong>of</strong> APs are 4600. [72] This is the biggest <strong>wi</strong>reless network construction in the world.<br />
However, there were many complaints since the <strong>fi</strong>rst day <strong>of</strong> service. There are several reasons.<br />
First, the signal is unstable <strong>wi</strong>th too many dead spots. Second, coverage is concentrated in<br />
metropolitan areas; the geographic coverage is only 50%. Third, the signal path is too<br />
unpredictable. This is because <strong>of</strong> the multipath fading <strong>and</strong> signal reflection. Forth, the price is too<br />
high <strong>and</strong> lacks service applications. These problems can be classi<strong>fi</strong>ed as two parts, mechanical<br />
<strong>and</strong> marketing. The mechanical part includes signal stabilization, AP coverage <strong>and</strong> security; the<br />
marketing part contains service applications <strong>and</strong> pricing rate. [76] – [78][85]<br />
Compared <strong>wi</strong>th the population coverage, the numbers <strong>of</strong> user is very low. Table 5-7. This<br />
project spent a total <strong>of</strong> approximately thirty million dollars, but ended up facing a low usage<br />
situation. Taiwan has a strong manufacturing background <strong>and</strong> in the 1980s <strong>and</strong> 1990s, MIT<br />
(Made in Taiwan) became a well known mark around the world. With this ability, the<br />
infrastructure installation is not a dif<strong>fi</strong>cult job at all. WiFly is a <strong>fi</strong>rst city-<strong>wi</strong>de <strong>wi</strong>reless network<br />
project; therefore since there is no precedent to learn from, WiFly has to learn through trial <strong>and</strong><br />
error. [76] – [78][85]<br />
Date<br />
Terms<br />
Table 5-7 The Numbers <strong>of</strong> Subscribers<br />
Registered Users Active Users Industry Customer<br />
2006/6 45,000 20,000 N/A<br />
2007/1 110,000 35,000 70<br />
2007/8 150,000 6,000 (monthly) N/A<br />
In the mechanical problem part, the signal is the <strong>fi</strong>rst problem. It is what most customers<br />
complain about. This problem is caused by many factors, such as the number <strong>of</strong> users, weather,<br />
environment, AP locations, <strong>and</strong> RF interference. This is a common dif<strong>fi</strong>culty <strong>of</strong> all <strong>wi</strong>reless<br />
83
communications. Taipei is a busy city <strong>wi</strong>th many <strong>of</strong><strong>fi</strong>ce buildings. It is a “concrete jungle”,<br />
especially in the metropolitan area. This kind <strong>of</strong> area is very unfavorable to signal transmission<br />
<strong>and</strong> it <strong>wi</strong>ll cause serious multipath fading. Thus, the end users may scan the signal, but cannot<br />
establish a connection, or even have no signal at all. The other problem is AP. It includes<br />
numbers <strong>of</strong> user <strong>and</strong> locations. Most <strong>of</strong> APs are located outdoor, such as <strong>wi</strong>re poles <strong>and</strong> street<br />
lights. Because APs are exposed outside <strong>and</strong> Taiwan is hot <strong>and</strong> humid, the failure rate <strong>wi</strong>ll be<br />
high. Moreover these kinds <strong>of</strong> AP locations also have big security issues. There are 4600 APs in<br />
Taipei, management <strong>and</strong> maintenance is a big challenge. And since the AP installation is focus<br />
on population coverage, most suburb residents do not have WiFly signal.<br />
The Q-ware does not limit the numbers <strong>of</strong> user on an AP. Therefore it may cause congestion<br />
<strong>and</strong> channel overlapping problems. For channel allocation <strong>and</strong> reallocation, Linda Yeh, the<br />
Account Manager in Sales & Customer Service Dep. <strong>of</strong> Q-ware Systems & Services Corp. [148],<br />
said the company has a control platform to manage each AP’s operation channel. In a high<br />
density area, if there is congestion or channel overlapping the network engineers can use this<br />
platform to s<strong>wi</strong>tch the operation channel for each AP to release the situation. However, the<br />
platform cannot solve the problem completely. In most high usage areas <strong>of</strong> WiFly, after<br />
s<strong>wi</strong>tching channels, the problem still exists. She said this is because there are only three channels<br />
that can be used in one area. It is Wi-Fi’s inherent limitation. [148]<br />
The maximum data rate for each user was 512 kbps for both Uplink <strong>and</strong> Downlink. In<br />
January 2007, Q-ware upgraded to 1Mbps for Downlink <strong>and</strong> 512 kbps for Uplink. This speed is<br />
not a shearing speed, which means it <strong>wi</strong>ll not be changed even if the users increased. [148] To<br />
avoid heavy traf<strong>fi</strong>c, Linda indicated that they have a flow control scheme to monitor the traf<strong>fi</strong>c<br />
flow for APs. The detail <strong>of</strong> flow control scheme is trade secret, thus she cannot provide more<br />
information for it. Channel overlapping <strong>and</strong> congestion are two major problems <strong>of</strong> signal<br />
transmission. There are several methods to solve the congestion issue, such as, hop-by-hop<br />
congestion control <strong>and</strong> multihop congestion control. [149][150] The main idea <strong>of</strong> these methods<br />
is to send a congestion feedback packet to slow down the source speed to release the congestion.<br />
The congestion control has been studied for years. Here is some related researche. [151] – [153]<br />
For improving signal stability, end users can install bridge or high power <strong>wi</strong>reless network<br />
cards. These two methods can solve most signal instability. Q-ware also has to install more APs<br />
or use high power APs in high usage areas. Since WiMax licenses have been issued in Taiwan. It<br />
can also be a solution for signal stability <strong>and</strong> extending geographical coverage. About security<br />
vulnerability, Q-ware said that the <strong>wi</strong>reless connection must be authorized before established <strong>and</strong><br />
the user account needs two identi<strong>fi</strong>cations to apply. However there is no one hundred percent<br />
security scheme. Users still have to protect their account information <strong>and</strong> PC from spy-programs.<br />
The responsibility is upon both WISP <strong>and</strong> the users.<br />
The Nortel Wireless Mesh Network solution is a suitable model for WiFly. However, no<br />
matter how perfect the model is, Taipei still has its intrinsic limitations, such as high <strong>of</strong><strong>fi</strong>ce<br />
84
uilding density, high population density, humid <strong>and</strong> hot weather, <strong>and</strong> unfavorable <strong>wi</strong>red<br />
network infrastructure. Because the Nortel Wireless Mesh Network solution adopts mesh<br />
structure (APs <strong>and</strong> Ethernet communicate through Gateways), it decreases the dif<strong>fi</strong>culty while<br />
installing APs. Nevertheless, the APs’ power supply is still a big issue. And even through APs<br />
are not necessary to connect to Ethernet, the Gateways have to. One Gateway can support 120<br />
APs, so 4600 APs need at least 39 Gateways. Considering the connection status, usage <strong>and</strong> AP<br />
locations, it is impossible to use just 39 Gateways to h<strong>and</strong>le the whole network <strong>and</strong> it <strong>wi</strong>ll cause<br />
serious congestion problem. Therefore, where to install the Gateways <strong>and</strong> how to <strong>wi</strong>re the<br />
Gateways are other important issues. According to Linda Yeh, so far the company does not have<br />
an ef<strong>fi</strong>cient way to solve channel overlapping <strong>and</strong> congestion problems completely. To install a<br />
booster to increase the signal power can be a good solution for these problems, but the National<br />
Communications Commission (NCC) has strict rules for signal power. Therefore, Q-ware does<br />
not have plans to install it. These problems are still pending. [148]<br />
The marketing problem is another big issue waiting to be solved. When WiFly <strong>fi</strong>rst came out,<br />
it guarantees to provide ubiquitous connection to every citizen. However it was plagued <strong>wi</strong>th<br />
serious mechanical problems <strong>and</strong> that is not the only reason for low numbers <strong>of</strong> users. The WiFly<br />
did not meet the needs <strong>of</strong> end users.<br />
Before WiFly, Wi-Fi had been available in stores for years, such as McDonald’s <strong>and</strong> some<br />
c<strong>of</strong>fee shops. This company was called Yaw Jenq Technology <strong>and</strong> the service was called “Easy-<br />
Up”. At that time the project was cooperated <strong>wi</strong>th Intel. It was the <strong>fi</strong>rst WISP in Taiwan, but<br />
ended up in.bankruptcy in May 2005. Easy-Up brought new Internet access to people. This<br />
project <strong>of</strong><strong>fi</strong>cially began in May 2003. At that time the <strong>wi</strong>reless interface is NB <strong>wi</strong>th built-in<br />
centrino platform. With Easy-Up, access internet in McDonald’s or other chain stores was slowly<br />
becoming a trend. Currently, sitting in a Starbucks, having a cup <strong>of</strong> c<strong>of</strong>fee <strong>and</strong> browsing the<br />
Internet has become a very common activity.<br />
With regards to the service policy, Linda Yeh said that the indoor APs are used for mobile<br />
devices users <strong>and</strong> the outdoor APs are mainly for <strong>fi</strong>xed users. The indoor APs are most installed<br />
in c<strong>of</strong>fee shops, chain restaurants <strong>and</strong> other public areas, such as airports. In these places, the<br />
signal is more stable <strong>and</strong> the connection quality is better than outdoor. The outdoor APs are used<br />
to provide service to <strong>fi</strong>xed users such as home <strong>and</strong> industries. These users can use bridges or<br />
antennas to receive WiFly signal. However because <strong>of</strong> many external factors, such as RF<br />
interference, weather <strong>and</strong> transmission path, the signal quality is not as good as the indoor APs.<br />
[148] In WiFly’s <strong>of</strong><strong>fi</strong>cial website, there is a search engine for WiFly hotspot, but they do not<br />
provide AP location search. If a customer wants to know if are there any APs nearby, they need<br />
call Q-ware directly. [148]<br />
Wireless Internet access is de<strong>fi</strong>nitely a business point. WiFly also has the ability to occupy a<br />
high market share. But the wrong market positioning <strong>and</strong> unfriendly pricing rate makes the usage<br />
much lower than the prediction. WiFly can never replace the ADSL at home. Therefore it is an<br />
85
auxiliary <strong>of</strong> extending the ADSL to end users in short range. Unless there is a unique application<br />
that only WiFly can do; other<strong>wi</strong>se keep seeking new service to increase users is still no help.<br />
ADSL <strong>and</strong> WiFly are like roads <strong>and</strong> bridges, but if WISP tries to use bridges to replace roads;<br />
then there is no future for WiFly. Taipei’s city government <strong>and</strong> Q-ware now are trying to use<br />
new VoIP service (Taipei easy call) <strong>and</strong> WiFly cube to attract more users. [76] – [78][85]<br />
However the fundamental problem is why WiFly. There are other choices for indoor <strong>wi</strong>reless<br />
internet service, such as Hinet-WLAN <strong>and</strong> 3G <strong>wi</strong>reless.<br />
It is like selling a game station <strong>wi</strong>thout games <strong>and</strong> the price is also way too high. For<br />
temporary users, $3.20 for one day access is too expensive; not to mention carrying the NB <strong>and</strong><br />
looking for signal. WiFly’s unique feature is its ubiquitous connection, but if the feature cannot<br />
be used stably <strong>and</strong> conveniently; then it is still useless.<br />
5.2.4. Conclusion<br />
WiFly tries to provide make people’s lives more convenient. However, it still has<br />
fundamental problems to be conquered. How to provide end users more stable connection <strong>and</strong><br />
higher speed should be the current mission <strong>of</strong> WiFly. And the customers have to <strong>fi</strong>nd out<br />
whether they need WiFly or not. Taiwanese network market is already saturated <strong>and</strong> has many<br />
competitors, so if WiFly wants to take the market share it <strong>wi</strong>ll be not easy. Since Wi-Fi has some<br />
limitations <strong>and</strong> the original design is for home use; thus it is dif<strong>fi</strong>cult to use as the last mile <strong>of</strong> the<br />
network <strong>and</strong> the city-<strong>wi</strong>de coverage. Since the mother company <strong>of</strong> WiFly, FAREASTONE, has<br />
gotten the operation license <strong>of</strong> WiMax; the next step <strong>of</strong> WiFly should be the WiMax<br />
infrastructure installation. By adopting WiMax, WiFly may be able to have much better<br />
performance <strong>and</strong> show its real value.<br />
5.3. Wibro in South Korea<br />
5.3.1. Introduction<br />
WiBro (Wireless Broadb<strong>and</strong> Access Service) is a WBA technology. It is a st<strong>and</strong>ard extended<br />
from 802.16-2004 <strong>and</strong> 802.16 2005 <strong>and</strong> uses many techniques the same <strong>wi</strong>th them. Figure 5-<br />
14[79]. It has better coverage <strong>and</strong> stronger mobility than WLAN <strong>and</strong> higher data rate than 3G.<br />
However, 3G has better coverage than WiBro <strong>and</strong> WLAN has higher data rate than 3G.<br />
Therefore WiBro’s position is just in the middle. It can <strong>fi</strong>x their weaknesses, but cannot replace<br />
them. This st<strong>and</strong>ard was developed by KT (Korean Telecoms Industry) <strong>and</strong> st<strong>and</strong>ardized by TTA<br />
(Telecommunications Technology Association) later on.<br />
The manufacturers who are contracted to produce WiBro devices are Samsung, LG,<br />
POSDATA <strong>and</strong> so on. For extending transmission range <strong>and</strong> decreasing dead spot, the TDD<br />
86
epeater r is developping<br />
<strong>and</strong> it <strong>wi</strong>ll have two<br />
versionn,<br />
optical reppeater<br />
<strong>and</strong> RF repeaterr.<br />
Figure 5-<br />
15[79] shows the nnetwork<br />
struucture<br />
<strong>of</strong> WWiBro.<br />
The related<br />
workks<br />
: [134][1335]<br />
5.3.2.<br />
History<br />
Figure 5-14<br />
The Relat tionship Beetween<br />
WiMMax<br />
<strong>and</strong> WiBBro<br />
Figuure<br />
5-15 Thhe<br />
Network Structure <strong>of</strong>f<br />
WiBro<br />
Thi is project wwas<br />
initiateed<br />
by manu ufacturers ( (Samsung a<strong>and</strong><br />
LG) a<strong>and</strong><br />
telecom mmunicationn<br />
industriies<br />
(KT <strong>and</strong>d<br />
SKT). It sstarted<br />
fromm<br />
2003 to 20005.<br />
They tootal<br />
investeed<br />
approximmately<br />
thirtyy<br />
six milllion<br />
dollars in this projject.<br />
The <strong>fi</strong>rst<br />
stage sta<strong>and</strong>ardizatioon<br />
was commpleted<br />
by TTA T in latee<br />
87
2004. It was a very big delay since WiMax was well developing at that time. November 2004<br />
was the critical timing for WiBro. Intel started to get involved in WiBro’s development. It<br />
cooperated <strong>wi</strong>th LG <strong>and</strong> KT to help develop WiBro’s equipments <strong>and</strong> ensure that WiBro can be<br />
compatible <strong>wi</strong>th WiMax. In April 2005, Samsung was elected as a member <strong>of</strong> WiMax Forum<br />
board, so the integration <strong>of</strong> WiMax <strong>and</strong> WiBro was speeded up. Therefore, WiBro became a<br />
world<strong>wi</strong>de st<strong>and</strong>ard, little by little. U.S. <strong>and</strong> Japan both had plans to use WiBro to build their<br />
WiMax network. In January 2005, three companies got the operation license, KT, HTI (Hanaro<br />
Telecom, Inc.), <strong>and</strong> SKT. And KT <strong>and</strong> SKT were selected to run the WiBro business. The<br />
system installation was initiated in early 2006. The project has three stages. First stage is to<br />
<strong>fi</strong>nish installation in 20 major cities at the end <strong>of</strong> 2006. Second is to <strong>fi</strong>nish 18 medium scale<br />
cities installation in 2007. And <strong>fi</strong>nally <strong>fi</strong>nish the 46 remote areas’ installation in 2008. [76] –<br />
[78][84][85]<br />
5.3.3. Implementation<br />
The operation b<strong>and</strong> <strong>of</strong> WiBro is between 2.3 GHz to 2.4 GHz. This b<strong>and</strong> is divided into 9<br />
channels. These channels are not overlapped but adjacent <strong>and</strong> every 3 channels have one guard<br />
b<strong>and</strong>, <strong>fi</strong>gure 5-16[79] – [82]. WiBro PHY-layer is based on OFDMA for against multipath fading<br />
<strong>and</strong> interference. WiMax supports both TDD <strong>and</strong> FDD scheme, but WiBro only supports TDD.<br />
This is for having biggest spectrum usage. In modulation <strong>fi</strong>eld, WiBro supports QPSK, 16QAM<br />
<strong>and</strong> 64QAM. And for coding, WiBro uses CTC <strong>and</strong> other optional method, such as BTC, RS-CC<br />
<strong>and</strong> FEC. Figure 5-17[79] – [82] shows the goal <strong>and</strong> features <strong>of</strong> WiBro.<br />
Figure 5-16 The Operation B<strong>and</strong><br />
88
Figure 5-17 WiBro Features<br />
The data rate <strong>of</strong> Wibro is asymmetric, for a RAS (Radio Access Station) the maximum<br />
downlink speed is 18 Mbps <strong>and</strong> uplink speed is 6 Mbps; for a PSS (Portable Subscriber Station)<br />
the maximum downlink speed is 3 Mbps <strong>and</strong> uplink speed is 1 Mbps. Under mobile conditions,<br />
WiBro can only support under 60 kmph movement. It is lower than 3G which is support at least<br />
120 kmph, but much better than Wi-Fi. The coverage <strong>of</strong> a RAS is de<strong>fi</strong>ned in three levels, Pico,<br />
Micro <strong>and</strong> Macro. Pico can cover a radius <strong>of</strong>100 meters area. Coverage <strong>of</strong> Micro is 400 meters<br />
<strong>and</strong> Macro is 100 meters. This design would make installation <strong>of</strong> RAS more flexible. [79] – [82]<br />
WiBro also has QoS. It contains three schemes, rtPS, nrtPS <strong>and</strong> BS; not including UGS. For<br />
saving power, WiBro provides sleep mode for end users to extend the battery life. In order to<br />
improve the system performance, WiBro introduces scheduling algorithm for transmission<br />
service <strong>and</strong> AMC for coding <strong>and</strong> modulation. WiBro also supports ARQ/H-ARQ (Hybrid<br />
Automatic Request) as well as WiMax. This scheme can effectively re-send the packet, if it is<br />
damaged by interference or channel fading. The h<strong>and</strong><strong>of</strong>f break time between two RASs is less<br />
than 150 ms, it is a very good performance comparing <strong>wi</strong>th other <strong>wi</strong>reless algorithm, such as<br />
PHS. [79] – [82]<br />
There are still other optional technologies used in WiBro, for example MIMO, AAS <strong>and</strong><br />
SDCA(Space Time Coding Adoption). The purpose is to extend the coverage <strong>and</strong> against<br />
interference. Table 5-8[79] – [82] contains the PHY speci<strong>fi</strong>cation <strong>of</strong> WiBro. Figure 5-18[79] –<br />
[82] shows the MAC-layer structure.<br />
89
- Transformation <strong>of</strong><br />
external network data<br />
into MAC SDUs;<br />
- Payload header suppression<br />
- System Access<br />
- B<strong>and</strong><strong>wi</strong>dth Allocation<br />
- Connection set-up<br />
- Connection maintenance<br />
-QoS<br />
- Authentication<br />
- Secure key exchange<br />
-Encryption<br />
Figure 5-18 MAC Layer Model<br />
Samsung is the major manufacturer producing the ACRs <strong>and</strong> RASs. In June 2007, Samsung<br />
won the WiMAX World Europe 2007 Award by U-RAS Premium Base Station in System<br />
Design. Figure 5-19[83] is the technology data <strong>and</strong> the picture for U-RAS Premium Base Station.<br />
Figure 5-20[83] is the information for ACRs. Table 5-8 is the <strong>comparison</strong> <strong>of</strong> WiBro <strong>and</strong> WiMax.<br />
90
Figure 5-19 U-RAS Premium<br />
Figure 5-20 ACR Basic Data<br />
91
Terms<br />
Table 5-8 The Comparison <strong>of</strong> WiBro <strong>and</strong> WiMax.<br />
St<strong>and</strong>ards<br />
Operation B<strong>and</strong><br />
B<strong>and</strong><strong>wi</strong>dth<br />
WiMax<br />
(IEEE 802.16-2005)<br />
2 – 11 GHz for <strong>fi</strong>xed<br />
10 – 66 GHz for mobile<br />
1.75 MHz, 3.5 MHz, 7 MHz,<br />
14 MHz, 1.25 MHz, 5 MHz,<br />
10 MHz, 15 MHz, 8.75 MHz<br />
92<br />
WiBro<br />
2.3 – 2.4 GHz<br />
10 MHz<br />
Multiplexing Burst TDM/TDMA/OFDMA OFDMA<br />
Duplexing TDD <strong>and</strong> FDD TDD<br />
Modulation QPSK, 16-QAM, 64-QAM<br />
QPSK, 16-QAM, 64-<br />
QAM<br />
Channel Coding CC, CTC, RS, LDPC CTC<br />
Data Rate 1 – 75 Mbps<br />
QoS mode<br />
5.3.4. Analysis<br />
UGS, rtPS, nrtPS, BS;<br />
ARQ/H-ARQ<br />
UL: 6.1 Mbps<br />
DL: 18.4 Mbps<br />
rtPS, nrtPS, BS;<br />
ARQ/H-ARQ<br />
Power Saving Sleep Mode, Idle Mode Sleep Mode<br />
Coverage Maximum 10 km Urban 1 km<br />
Mobility 120 km/hr 60 km/hr<br />
Other Techs AAS, AMC, MIMO AAS, AMC, MIMO<br />
WiBro has been in use for one year. However the number <strong>of</strong> users is not as high as predicted.<br />
At the end <strong>of</strong> June 2007, there were twenty thous<strong>and</strong> registered users <strong>and</strong> the goal is two hundred<br />
thous<strong>and</strong> by the end <strong>of</strong> 2007. If WiBro wants to reach this goal, it has to increase by 170,000<br />
users in half year! According to a recent study from IDC Korea, the subscribers <strong>wi</strong>ll reach<br />
130,000 at the end <strong>of</strong> 2007, 600,000 in 2008, 1.4 million in 2009 <strong>and</strong> 3.9 million in 2011. If there<br />
are various supplemental applications <strong>and</strong> devices available in the market, the number <strong>wi</strong>ll grow<br />
to 800,000 in 2008 <strong>and</strong> 5 million in 2011. This prediction may be too optimistic compared to the<br />
current situation. [84][85]
In KT’s recent report, 60% <strong>of</strong> subscribers are between 30 <strong>and</strong> 40 <strong>and</strong> 20% are college<br />
students in their 20s. They also <strong>fi</strong>nd that these customers are satis<strong>fi</strong>ed <strong>wi</strong>th service <strong>and</strong> price but<br />
upset about the prices <strong>and</strong> availability <strong>of</strong> devices. KT has to pay subsidization to laptops, WiBrophone<br />
<strong>and</strong> USB-modem buyers about one hundred to two hundred <strong>and</strong> sixty dollars. However,<br />
after subsidizing, the NB (model # NT-Q35) still costs $1750 to $2400, not including accessories.<br />
Until June 2007, the WiBro-related products include two pc-cards, two cell-phones, two mobile-<br />
PCs <strong>and</strong> one notebook. The choices are very limited. [76] – [78][84][85]<br />
The coverage <strong>of</strong> WiBro so far is still restricted in Seoul <strong>and</strong> certain nearby areas. The speed<br />
is fast but the signal is not stable. Although the mobility is available in a bus or subway, the<br />
operation environment is not friendly to use a mobile-PC or NB, not to mention the connection is<br />
not stable. People need a seat to operate them. Since 3G also can provide mobile internet service<br />
<strong>and</strong> is more reliable, WiBro really faces a very dif<strong>fi</strong>cult situation in South Korea. Mobility is the<br />
most important feature <strong>of</strong> WiBro. If subscribers cannot feel the advantages, it would be dif<strong>fi</strong>cult<br />
to increase numbers. Therefore in technical <strong>fi</strong>eld, WiBro has to not only improve signal quality<br />
<strong>and</strong> coverage, but also the mobility. The device problem, sooner or later, <strong>wi</strong>ll be solved. It is just<br />
a matter <strong>of</strong> time. When mechanism becomes mature, the price <strong>wi</strong>ll goes down <strong>and</strong> products <strong>wi</strong>ll<br />
be more varied.<br />
In marketing <strong>fi</strong>eld, KT WiBro proposed six applications: Wonder-Eye (Personal Multimedia<br />
service, Push-Pull on Dem<strong>and</strong>), Wonder-Media (Video Streaming), Wonder-Media (MMS),<br />
Wonder-Phone (Video-Phone), Wonder-Net (Wireless Internet Service), Wonder-Tour (3-D tour<br />
<strong>of</strong> APEC). These applications contain multimedia <strong>and</strong> internet service. WiBro is an interface<br />
between users <strong>and</strong> network. And it can be found out that these applications are overlapped <strong>wi</strong>th<br />
3G <strong>and</strong> Wi-Fi. Thus WiBro has to provide better system performance; other<strong>wi</strong>se it is dif<strong>fi</strong>cult to<br />
take marketing share from other two st<strong>and</strong>ards. After all, they are not kill applications. For<br />
WiBro’s long term development, KT <strong>and</strong> SKT should put more effort on technical problems.<br />
5.3.5. Conclusion<br />
KT, SKT <strong>and</strong> Samsung still believe in the future <strong>of</strong> WiBro. With the extension <strong>of</strong> coverage<br />
<strong>and</strong> new available devices, the subscribers are going to increase. But prices <strong>and</strong> service contents<br />
are the real problems waiting to be solved. If WiBro is not the essential requirement <strong>and</strong> there are<br />
alternative choices available <strong>and</strong> better for internet access, WiBro is dif<strong>fi</strong>cult to increase the<br />
market share. Therefore considering the occasions which WiBro is used, mobility <strong>and</strong> stable<br />
signal are the only way for it to keep going.<br />
93
5.4. Overall analysis<br />
Table 5-9 is the basic information <strong>of</strong> FSUWIN, WiFly <strong>and</strong> WiBro. FSU <strong>and</strong> Taipei use the<br />
same st<strong>and</strong>ard; Taipei <strong>and</strong> Seoul belong to the same area. In technical <strong>fi</strong>eld, Taipei should use<br />
WiMax not Wi-Fi, because it is not designed for metropolitan area. Even if WiFly upgrades to<br />
the IEEE 802.11n in the future, the overall performance is not going to improve too much. It is<br />
like carrying seven people in car <strong>wi</strong>th four seats; it can work, but not very well. So the best way<br />
is to replace the system to WiMax or combine <strong>wi</strong>th WiMax. In Seoul, WiBro’s major problem is<br />
mobility <strong>and</strong> it is also the selling point. Using WiMax to cover a city is a suitable way. It is what<br />
WiMax designed for. Even though WiBro’s overall performance is not as good as expected so<br />
far, the technical issues are solvable by new devices <strong>and</strong> technologies. As for cost <strong>and</strong> service<br />
problems, it is the same road <strong>and</strong> bridge issues <strong>wi</strong>th WiFly. Both WiFly <strong>and</strong> WiBro are WISPs<br />
<strong>and</strong> the best way for them to survive in future Internet market is to integrate <strong>wi</strong>th ISPs.<br />
FSUWIN is the most successful <strong>case</strong> <strong>wi</strong>thin these three <strong>case</strong>s. In the future, after installing<br />
the central controller, OTC can easily monitor the network status <strong>and</strong> provide more reliable<br />
service. FSUWIN reached its goal <strong>and</strong> does a good job. One more factor <strong>of</strong> FSUWIN’s success<br />
is no <strong>fi</strong>nancial burden. It is not a commercial network <strong>and</strong> is supported mainly by tuition. Thus it<br />
does not have to worry about users <strong>and</strong> application issues. This feature makes its operation<br />
simpler than other two systems. In short, it is a good solution for smaller <strong>and</strong> local area.<br />
So far WiFly <strong>and</strong> WiBro are still seeking their marketing positioning. 3G, Wi-Fi, WiMax<br />
<strong>and</strong> <strong>wi</strong>red internet service where the balance point for these technologies is an important issue to<br />
industries, manufactures <strong>and</strong> researchers. Table 5-10 is the basic information for internet access<br />
methods. The service providers <strong>and</strong> WISP should not only focus on providing content but also<br />
have to think about the dem<strong>and</strong> <strong>of</strong> <strong>wi</strong>reless network users.<br />
Based on the patterns <strong>of</strong> people’s behaviors accessing the Internet, these technologies should<br />
be coexisted. Figure 5-21 is an example for using these technologies. When a man wants to go to<br />
a state park <strong>and</strong> has the Internet access all the way, he has to bring his phone <strong>and</strong> NB. At home<br />
he can use Wi-Fi to collect the information <strong>of</strong> the state park. During transportation, he can access<br />
the Internet by mobile-WiMax. And then, when he arrives the state park, he can still check his email<br />
by <strong>fi</strong>xed-WiMax service. If he wants to take a rest, he can stay in the state park service<br />
center where Wi-Fi is available. Moreover, all the way, he can make a video phone call<br />
anywhere at any time. It is one possibility for future development.<br />
WiFly <strong>and</strong> WiBro were just commercialized. They have to learn from mistakes, because<br />
they are the pioneers <strong>of</strong> public <strong>wi</strong>reless network. The technical issues they have right now are all<br />
solvable. WiBro can showed its real capacity only after the mobility is truly functional <strong>and</strong><br />
devices price is acceptable. WiFly can adopt WiBro’s technologies to improve its signal <strong>and</strong><br />
coverage issues. The <strong>wi</strong>reless city story has not <strong>fi</strong>nished yet, <strong>and</strong> WiFly <strong>and</strong> WiBro still have a<br />
chance for success.<br />
94
Figure 5-21 An Example Application <strong>of</strong> 3G, Wi-Fi <strong>and</strong> WiMax<br />
5.5. Other developing <strong>wi</strong>reless network<br />
In U.S., Sprint Nextel has announced to cooperate <strong>wi</strong>th Samsung, Motorola <strong>and</strong> Intel <strong>wi</strong>ll<br />
build a national-<strong>wi</strong>de 4G broadb<strong>and</strong> mobile network. They are going to invest $1 billion in 2007<br />
<strong>and</strong> between $1.5 billion <strong>and</strong> $2 billion in 2008. In China, they are developing their own 4G<br />
st<strong>and</strong>ard, McWill. It is not an international st<strong>and</strong>ard <strong>and</strong> has a worse performance than WiMax.<br />
The Chinese government set many restrictions on WiMax <strong>and</strong> wants to develop their own<br />
st<strong>and</strong>ard, so in short term, WiMax is not going to develop in China. In Europe, Engl<strong>and</strong> started<br />
to install <strong>fi</strong>xed-WiMax since 2005. There are two companies in the projects, Telebria <strong>and</strong><br />
Community Internet (CI). Japan issued three WiMax licenses at the end <strong>of</strong> 2006. They are KDDI,<br />
NTT DoCoMo <strong>and</strong> Yozan. Taiwan issued six WiMax licenses <strong>and</strong> split into two area, North<br />
district <strong>and</strong> South district. The test service <strong>wi</strong>ll be launched in 2008.<br />
95
Service Name<br />
Parameters<br />
Table 5-9 The Basic Data <strong>of</strong> FSUWIN, WiFly <strong>and</strong> WiBro<br />
FSUWIN WiFly WiBro<br />
St<strong>and</strong>ard IEEE 802.11 b/g IEEE 802.11 a/b/g IEEE 802.16e<br />
Location<br />
FSU, Tallahassee,<br />
FL, USA<br />
96<br />
Taipei<br />
Taiwan<br />
Seoul<br />
South Korea<br />
Operator FSU, OTC Q-ware KT, SKT, Samsung<br />
Launch date 2003 ~ 2004 January 2006 July 2006<br />
B<strong>and</strong> 2.4 GHz ISM 2.4 GHz ISM 2.3 ~ 2.4 GHz<br />
Data rate ~ 25 Mbp UL/DL:512 kbps<br />
Coverage<br />
Indoor: 600 m<br />
Outdoor: 7200 m<br />
UL:6.1 Mbps<br />
DL:18.4 Mbps<br />
N/A Urban ~ 1 km<br />
Overall Coverage 75% <strong>of</strong> campus 90% <strong>of</strong> population N/A<br />
Mobility X X 60 km/hr<br />
H<strong>and</strong>-Off Ability X X Low<br />
Subscribers<br />
All students <strong>and</strong><br />
faculty<br />
150,000 (6/2007) 24,000(7/2007)<br />
Users per device 100 N/A N/A<br />
AP model<br />
Operation<br />
environment<br />
Applications<br />
Vivato, Xirrus,<br />
Foundry<br />
Networks<br />
Nortel AP 7220 Samsung RAS<br />
Campus Metropolitan area Metropolitan area<br />
Internet access<br />
FSU campus life<br />
WiFly cube<br />
Taipei easy call<br />
N/A<br />
(VoIP <strong>wi</strong>ll not be<br />
supported)
Name<br />
Parameters<br />
St<strong>and</strong>ard<br />
Table 5-10 Current Internet Access Technologies<br />
3G Wi-Fi WiMax<br />
WCDMA<br />
CDMA2000<br />
IEEE 802.11<br />
a/b/g/n<br />
Supporter ITU Wi-Fi Alliance<br />
B<strong>and</strong><br />
2100MHz ~<br />
2200MHz<br />
2.4 GHz<br />
Coverage 1 ~ 5 km 100m ~1000m<br />
H<strong>and</strong>-Off<br />
Ability<br />
Data rate 384 kbps<br />
97<br />
IEEE 802.16<br />
d/e<br />
WiMax<br />
Forum<br />
2 – 11 GHz<br />
for <strong>fi</strong>xed<br />
10 – 66 GHz<br />
for mobile<br />
Maximum<br />
10 ~ 50 km<br />
Wired<br />
Internet<br />
Ethernet<br />
N/A<br />
N/A<br />
Largest<br />
Highest Low Low N/A<br />
54 Mbps (a/g)<br />
200Mbps (n)<br />
70 Mbps<br />
100 Mbps ~<br />
1Gbps<br />
Mobility 100 km/hr < 20 km/hr 120 km/hr N/A<br />
Devices Cell-phone<br />
Current<br />
application<br />
FOMA (Japan),<br />
JUNE (Korea),<br />
i-mode (Taiwan)<br />
Cell-phone/<br />
PC/NB<br />
WiFly (Taipei,<br />
Taiwan)<br />
PC/NB PC/NB<br />
WiBro<br />
(Seoul,<br />
Korea)<br />
ADSL/Cable
CHAPTER SIX<br />
6. Conclusion<br />
Wireless communications have been available for more than ten years. Today, 3G, Wi-Fi<br />
<strong>and</strong> WiMax are the most popular <strong>and</strong> <strong>wi</strong>dely discussed st<strong>and</strong>ards. Telecommunication industries<br />
hope that 3G can bring them new fortune, because 3G has improved enough to support e-mail<br />
<strong>and</strong> small data download. Therefore telecommunication industries want to occupy more <strong>of</strong> the<br />
market share <strong>of</strong> <strong>wi</strong>reless Internet access by using 3G technology. But compared to Wi-Fi <strong>and</strong><br />
WiMax, it is still too slow. Moreover, <strong>wi</strong>th the new coming Wi-Fi st<strong>and</strong>ard, IEEE 802.11n,<br />
WLAN becomes more powerful than before <strong>and</strong> can overcome many past limitations, such as<br />
coverage, stability <strong>and</strong> speed. It is slowly catching up <strong>wi</strong>th the capacities <strong>of</strong> <strong>wi</strong>red networks. A<br />
Wired network’s advantage is its reliability, but its biggest disadvantage is path design. In a city,<br />
to <strong>wi</strong>re a line to a house or a building is easy; however in remote or rural areas it is a huge issue.<br />
Thus WiMax is emerging as a possible solution.<br />
Parameters<br />
Table 6-1 3G, Wi-Fi <strong>and</strong> WiMax Overall Comparison<br />
St<strong>and</strong>ard<br />
3G Wi-Fi WiMax<br />
Coverage (a single tower) 2 (< 1 km) 3 1 (1 ~ 5 km)<br />
Data Rate 3 (< 300 kbps) 1 (~ 25Mbps) 2<br />
Throughput 3 2 1<br />
Mobility <strong>and</strong> h<strong>and</strong>-<strong>of</strong>f 1 3 (WiFly) 2 (WiBro)<br />
1: Very good, 2: Good, 3: Bad<br />
Table 6-1 is a comprehensive result <strong>of</strong> Table 5-11 <strong>and</strong> 5-12. 3G, Wi-Fi <strong>and</strong> WiMax. They<br />
have individual <strong>and</strong> unique fundamental technologies, but their capacities are partially<br />
overlapped. 3G can be a way to access the Internet <strong>and</strong> Wi-Fi <strong>and</strong> WiMax can provide VoIP<br />
service as an alternative for the traditional phone-call. However in Table 6-1, it can be found that<br />
for Internet service, 3G is too slow for real-time service, such as downloading larger <strong>fi</strong>les or<br />
watching online-TV. For phone-call service, VoIP’s quality is not as good as 3G; it is because <strong>of</strong><br />
the design issue. 3G is telecommunication technology <strong>and</strong> Wi-Fi <strong>and</strong> WiMax are Internet<br />
technologies. They were designed for different purposes. Even though these technologies are<br />
overlapped in the application <strong>fi</strong>eld, it is impossible for them to replace each other at this point.<br />
The overlap can be treated simply as a backup. It is better to let a cell-phone just be a cell-phone.<br />
98
WiFly used Wi-Fi to cover 60% <strong>of</strong> the city including all metropolitan areas. It takes 4200<br />
APs to do it. If it is replaced by WiMax, it <strong>wi</strong>ll not take that much. And for FSU campus, if<br />
WiMax is applied, just one or two base stations are enough to cover the whole campus. However,<br />
two towers are not enough to take care <strong>of</strong> the daily usage. Moreover, it is always dif<strong>fi</strong>cult to<br />
receive a signal from the outside in a concrete building. Therefore it needs a bridge or a gateway<br />
to direct a signal into a building. Wi-Fi may have low coverage, but it can be <strong>fi</strong>xed by using<br />
more APs in a hotspot. The advantage is that it can not only extend the coverage but also reduce<br />
the flow rate for each AP.<br />
To build a city-<strong>wi</strong>de <strong>wi</strong>reless network is going to be a trend <strong>and</strong> it is feasible, but if a<br />
network only uses Wi-Fi or WiMax, it would suffer cost, coverage, signal <strong>and</strong> mobility issues.<br />
The best way would be for them to be used in combination <strong>wi</strong>th each other. So far there is no<br />
single technology can feed all different needs. In local area Wi-Fi has strong capability <strong>and</strong><br />
WiMax is designed as the extension <strong>of</strong> ADSL or cable. The combination <strong>of</strong> these two st<strong>and</strong>ards<br />
can form a most ef<strong>fi</strong>cient <strong>wi</strong>reless network. Therefore the future <strong>of</strong> the <strong>wi</strong>reless technologies<br />
should be created <strong>wi</strong>th the cooperation <strong>and</strong> integration <strong>of</strong> these technologies.<br />
There is a new st<strong>and</strong>ard IEEE 802.11u is based on this idea. It tries to make Wi-Fi interwork<br />
<strong>wi</strong>th other different types <strong>of</strong> networks. [154] The IEEE 802.11u allows devices to interwork <strong>wi</strong>th<br />
external networks. For this purpose, interworking refers to MAC layer enhancements. It allows<br />
the higher layer functionality to provide the overall end to end solution. Instead <strong>of</strong> telling it what<br />
to do, the IEEE 802.11u only helps upper layers to establish an end to end connection <strong>wi</strong>th<br />
external networks. It provides a “virtual point <strong>of</strong> presence” for many different networks via a<br />
single AP. IEEE 802.11u assists the advertising <strong>and</strong> connection to remote service beyond the DS<br />
<strong>and</strong> provides information to the STA about the external network prior to association. In fact, the<br />
IEEE 802.11u is an amendment to the IEEE 802.11 st<strong>and</strong>ard. The <strong>fi</strong>nal approval <strong>of</strong> IEEE<br />
802.11u is expected to be September 2009. [154] the Figure 6-1 shows the possible<br />
implementation <strong>of</strong> the future network.<br />
99
Figure 6-1 Integration <strong>of</strong> WiMax <strong>and</strong> Wi-Fi<br />
100
BIBLIOGRAPHY<br />
[01]. IEEE 802.11 <strong>of</strong><strong>fi</strong>cial website (http://www.ieee802.org/11/)<br />
[02]. Vaughan-Nichols, S.J, "Will the New Wi-Fi Fly?", Computer, Volume 39 , Issue 10,<br />
page(s): 16 - 18, Oct. 2006<br />
[03]. Reinw<strong>and</strong>, Cole C.; "Municipal Broadb<strong>and</strong> - The Evolution <strong>of</strong> Next Generation Wireless<br />
Networks", Radio <strong>and</strong> Wireless Symposium, 2007 IEEE, Pages: 273 - 276, Jan. 2007<br />
[04]. IEEE Std 802.11-1997 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />
[05]. IEEE Std 802.11-1999 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />
[06]. IEEE 802.11b-1999 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />
[07]. IEEE 802.11a-1999 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />
[08]. Kapp, S.; "802.11a. More b<strong>and</strong><strong>wi</strong>dth <strong>wi</strong>thout the <strong>wi</strong>res", Internet Computing IEEE,<br />
Volume 6 , Issue 4, page(s): 75 - 79, July-Aug. 2002<br />
[09]. Doefexi, A.; Armour, S.; Beng-Sin Lee; Nix, A.; Bull, D.; "An evaluation <strong>of</strong> the<br />
performance <strong>of</strong> IEEE 802.11a <strong>and</strong> 802.11g <strong>wi</strong>reless local area networks in a corporate<br />
<strong>of</strong><strong>fi</strong>ce environment", Communications, 2003. ICC '03. IEEE International Conference on,<br />
Volume 2, page(s): 1196 - 1200, May 2003<br />
[10]. IEEE 802.11g-2003 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />
[11]. Clincy, V.; Sitaram, A.; Odaibo, D.; Sogarwal, G,; "A Real-Time Study <strong>of</strong> 802.11b <strong>and</strong><br />
802.11g", Systems <strong>and</strong> Networks Communication, 2006. ICSNC '06. International<br />
Conference on, page(s): 69 - 69, Oct. 2006<br />
[12]. Intel Corporation (http://www.intel.com/)<br />
[13]. Sunghyun Choi; del Prado Pavon, J.; "802.11g CP: a solution for IEEE 802.11g <strong>and</strong><br />
802.11b inter-working", Vehicular Technology Conference, 2003. VTC 2003-Spring.<br />
The 57th IEEE Semiannual, Volume 1, page(s): 609 - 694, April 2003<br />
[14]. Wang, S.-C.; Chen, Y.-M.; Tsern-Huei Lee; Helmy, A; "Performance evaluations for<br />
hybrid IEEE 802.11b <strong>and</strong> 802.11g <strong>wi</strong>reless networks", Performance, Computing, <strong>and</strong><br />
Communications Conference, 2005. IPCCC 2005. 24th IEEE International, page(s): 111 -<br />
118, April 2005<br />
[15]. Mahasukhon, P.; Hempel, M.; Ci, S.; Sharif, H.; “Comparison <strong>of</strong> Throughput<br />
Performance for the IEEE 802.11a <strong>and</strong> 802.11g Networks”, AINA, pp. 792-799, 21st<br />
International Conference on Advanced Networking <strong>and</strong> Applications (AINA '07), 2007<br />
[16]. Wei-Min S. Studio, Book, "Networking Essentials", 2006, In Chinese.<br />
[17]. Gast S. M., Book, “802.11 Wireless Networks: The De<strong>fi</strong>nitive Guide”, Second Edition,<br />
2005<br />
[18]. Heusse, M.; Rousseau, F.; Berger-Sabbatel, G.; Duda, A.; "Performance anomaly <strong>of</strong><br />
802.11b", INFOCOM 2003. Twenty-Second Annual Joint Conference <strong>of</strong> the IEEE<br />
Computer <strong>and</strong> Communications Societies. IEEE, Volume 2, page(s): 836- 843, April<br />
2003<br />
[19]. Paruchuri, R.C.; Agrawal, P.; "Interference Study <strong>of</strong> 802.11b Networks for Proactive<br />
Performance Management", Network Operations <strong>and</strong> Management Symposium, 2006.<br />
NOMS 2006. 10th IEEE/IFIP, 2006<br />
[20]. Vassis, D.; Kormentzas, G.; Rouskas, A.; Maglogiannis, I.; "The IEEE 802.11g st<strong>and</strong>ard<br />
for high data rate WLANs", Network, IEEE, Volume 19, Issue 3, June 2005<br />
[21]. 802.11 PHY Layers<br />
101
(http://searchmobilecomputing.techtarget.com/searchMobileComputing/downloads/CWA<br />
P_ch8.pdf)<br />
[22]. Crow, B.P.; Widjaja, I.; Kim, L.G.; Sakai, P.T.; "IEEE 802.11 Wireless Local Area<br />
Networks", Communications Magazine, IEEE, Volume 35, Issue 9, Sept. 1997<br />
[23]. Qi, Y.; Li, H.; Hara, S.; Kohno, R.; "Clear Channel Assessment (CCA) <strong>wi</strong>th multiplexed<br />
preamble symbols for impulse Ultra-<strong>wi</strong>deb<strong>and</strong> (UWB) communications", Ultra-<br />
Wideb<strong>and</strong>, The 2006 IEEE 2006 International Conference on, Sept. 2006<br />
[24]. Vermeer, V.; "Wireless LANs; why IEEE 802.11 DSSS?", WESCON/97. Conference<br />
Proceedings, Nov. 1997<br />
[25]. Spasojevic, Z.; Burns, J.; "Performance <strong>comparison</strong> <strong>of</strong> frequency flopping <strong>and</strong> direct<br />
sequence spread spectrum systems in the 2.4 GHz range", Personal, Indoor <strong>and</strong> Mobile<br />
Radio Communications, 2000. PIMRC 2000. The 11th IEEE International Symposium on,<br />
Volume 1, Sept. 2000<br />
[26]. Wieg<strong>and</strong>t, D.A.; Zhiqiang Wu; Nassar, C.R.; "High-performance, high-throughput IEEE<br />
802.11 DSSS WLAN via carrier-interferometry chip-shaping", Broadb<strong>and</strong><br />
Communications for the Internet Era Symposium digest, 2001 IEEE Emerging<br />
Technologies Symposium on, Sept. 2001<br />
[27]. Barman, K.; Malipatil, A.V.; "ICI equalizer in a CCK based DSSS communication<br />
system", TENCON 2003. Conference on Convergent Technologies for Asia-Paci<strong>fi</strong>c<br />
Region, Volume 4, Oct. 2003<br />
[28]. Chang-Joo Kim; Hyuck-Jae Lee; Hwang-Soo Lee; "Adaptive acquisition <strong>of</strong> PN<br />
sequences for DSSS communications", Communications, IEEE Transactions on, Volume<br />
46 , Issue 8, Aug. 1998<br />
[29]. Roshan, Pejman., Book, “802.11 Wireless LAN fundamentals”, 2004<br />
[30]. Singh, G.; Alphones, A.; "OFDM modulation study for a radio-over-<strong>fi</strong>ber system for<br />
<strong>wi</strong>reless LAN (IEEE 802.11a)", Information, Communications <strong>and</strong> Signal Processing,<br />
2003 <strong>and</strong> the Fourth Paci<strong>fi</strong>c Rim Conference on Multimedia. Proceedings <strong>of</strong> the 2003<br />
Joint Conference <strong>of</strong> the Fourth International Conference on, Volume 3, Dec. 2003<br />
[31]. Shenghao Yang; Yuping Zhao; "Channel estimation method for 802.11a WLAN <strong>wi</strong>th<br />
multiple-antenna", Communications, 2004 <strong>and</strong> the 5th International Symposium on<br />
Multi-Dimensional Mobile Communications Proceedings. The 2004 Joint Conference <strong>of</strong><br />
the 10th Asia-Paci<strong>fi</strong>c Conference on, Volume 1, 29 Aug.-1 Sept. 2004<br />
[32]. Wieg<strong>and</strong>t, D.A.; Nassar, C.R.; "High-performance 802.11a <strong>wi</strong>reless LAN via carrierinterferometry<br />
orthogonal frequency division multiplexing at 5 GHz", Global<br />
Telecommunications Conference, 2001. GLOBECOM '01. IEEE, Volume 6, 25-29 Nov.<br />
2001<br />
[33]. Hongwei Yang; "A road to future broadb<strong>and</strong> <strong>wi</strong>reless access: MIMO-OFDM-Based air<br />
interface", Communications Magazine, IEEE, Volume 43, Issue 1, Jan. 2005<br />
[34]. Xianbin Wang; Wu, Y.; Chouinard, J.-Y.; Hsiao-Chun Wu; "On the design <strong>and</strong><br />
performance analysis <strong>of</strong> multisymbol encapsulated OFDM systems", Vehicular<br />
Technology, IEEE Transactions on, Volume 55, Issue 3, May 2006<br />
[35]. Gerakoulis, D.; Salmi, P.; "An interference suppressing OFDM system for ultra <strong>wi</strong>de<br />
b<strong>and</strong><strong>wi</strong>dth radio channels", Ultra Wideb<strong>and</strong> Systems <strong>and</strong> Technologies, 2002. Digest <strong>of</strong><br />
Papers. 2002 IEEE Conference on, 21-23 May 2002<br />
[36]. Zou, W.Y.; Yiyan Wu; "COFDM: an overview", Broadcasting, IEEE Transactions on,<br />
Volume 41, Issue 1, March 1995<br />
102
[37]. Sun, Y.; "B<strong>and</strong><strong>wi</strong>dth-ef<strong>fi</strong>cient <strong>wi</strong>reless OFDM", Selected Areas in Communications,<br />
IEEE Journal on, Volume 19, Issue 11, Nov. 2001<br />
[38]. Maharatna, K.; Grass, E.; Jagdhold, U.; "A 64-point Fourier transform chip for highspeed<br />
<strong>wi</strong>reless LAN application using OFDM", Solid-<strong>State</strong> Circuits, IEEE Journal <strong>of</strong>,<br />
Volume 39, Issue 3, March 2004<br />
[39]. Ye Li; Chuang, J.C.; Sollenberger, N.R.; "Transmitter diversity for OFDM systems <strong>and</strong><br />
its impact on high-rate data <strong>wi</strong>reless networks", Selected Areas in Communications, IEEE<br />
Journal on, Volume 17, Issue 7, July 1999<br />
[40]. Zhengdao Wang; Giannakis, G.B.; "Complex-<strong>fi</strong>eld coding for OFDM over fading<br />
<strong>wi</strong>reless channels", Information Theory, IEEE Transactions on, Volume 49, Issue 3,<br />
March 2003<br />
[41]. Agrawal, D.; Tarokh, V.; Naguib, A.; Seshadri, N.; "Space-time coded OFDM for high<br />
data-rate <strong>wi</strong>reless communication over <strong>wi</strong>deb<strong>and</strong> channels", Vehicular Technology<br />
Conference, 1998. VTC 98. 48th IEEE, Volume 3, 18-21 May 1998<br />
[42]. Zhiqiang Liu; Yan Xin; Giannakis, G.B.; "Space-time-frequency coded OFDM over<br />
frequency-selective fading channels", Signal Processing, IEEE Transactions on [see also<br />
Acoustics, Speech, <strong>and</strong> Signal Processing, IEEE Transactions on], Volume 50, Issue 10,<br />
Oct. 2002<br />
[43]. IEEE 802.11h-2003 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />
[44]. IEEE 802.11j-2004 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />
[45]. IEEE 802.16 (http://www.ieee802.org/16/)<br />
[46]. IEEE 802.16a (http://www.ieee802.org/16/)<br />
[47]. IEEE 802.16c (http://www.ieee802.org/16/)<br />
[48]. IEEE 802.16-2004 (http://www.ieee802.org/16/)<br />
[49]. IEEE 802.16e-2005 (http://www.ieee802.org/16/)<br />
[50]. Andrews. J. G., Ghosh A., Muhamed R., Book, “Fundamentals <strong>of</strong> WiMax”, 2007<br />
[51]. Liu H., Li G., Book “OFDM-Based Broadb<strong>and</strong> Wireless Networks ”, 2005<br />
[52]. Johnston D., Walker, J., “Overview <strong>of</strong> IEEE 802.16 security”, Security & Privacy<br />
Magazine, IEEE, Vol. 02, Issue 3, May-June 2004<br />
[53]. Yaghoobi H., "Scalable OFDMA Physical Layer in IEEE 802.16 WirelessMAN.", Intel<br />
Technology Journal. Vol. 8, issue 3, 2004<br />
[54]. Liangshan Ma, Dongyan Jia, “The Competition <strong>and</strong> Cooperation <strong>of</strong> WiMAX, WLAN <strong>and</strong><br />
3G”, Mobile Technology, Applications <strong>and</strong> Systems, 2005 2nd International Conference<br />
on 15-17 Nov. 2005 Page(s):1 – 5<br />
[55]. Tanenbaum A. S., Book “Computer Network”, 4 th edition, 2002<br />
[56]. Borisov N., Goldberg I., Wagner D., "Intercepting Mobile Communications: The<br />
Insecurity <strong>of</strong> 802.11" , http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html<br />
[57]. Borisov N., Goldberg I., Wagner D., "Intercepting mobile communications: the insecurity<br />
<strong>of</strong> 802.11." MOBICOM 2001, pp180–189.<br />
[58]. Sweeney D., Book “WiMax operator's manual : building 802.16 <strong>wi</strong>reless networks ”,<br />
2006<br />
[59]. WiMAX Forum - WiMAX Home < http://www.<strong>wi</strong>maxforum.org/home/><br />
[60]. IEEE 802.16 http://www.ieee802.org/16/<br />
[61]. Xiao Y., “IEEE 802.11n: enhancements for higher throughput in <strong>wi</strong>reless LANs”,<br />
Wireless Communications, IEEE [see also IEEE Personal Communications], Volume<br />
12, Issue 6 ,Dec. 2005<br />
103
[62]. Lorincz, J. Begusic, D., “Physical layer analysis <strong>of</strong> emerging IEEE 802.11n WLAN<br />
st<strong>and</strong>ard”, Advanced Communication Technology, 2006. ICACT 2006. The 8th<br />
International Conference, Volume 1, 20-22 Feb. 2006<br />
[63]. Abraham, S. Meylan, A. N<strong>and</strong>a, S., “802.11n MAC design <strong>and</strong> system performance”,<br />
Communications, 2005. ICC 2005. 2005 IEEE International Conference on, Volume 5,<br />
16-20 May 2005<br />
[64]. Cai, L.X. Xinhua Ling Xuemin Shen Mark, J.W. Hua Long, “Capacity Analysis <strong>of</strong><br />
Enhanced MAC in IEEE 802.11n”, Communications <strong>and</strong> Networking in China, 2006.<br />
ChinaCom '06. First International Conference on, 25-27 Oct. 2006<br />
[65]. 簡永懿(Yung Yih Jian) , “IEEE 802.11n 技術提案摘之研究-PHY Layer Frame<br />
Format”, May 3 2005, Information <strong>and</strong> Communications Research Labs, Industrial<br />
Technology Research Institute, in Chinese.<br />
[66]. 郭俊均(Chun Chun Guo), “IEEE 802.11n 合併提案之研究-目前合併提案中 PHY 的<br />
內容與分析 (IEEE 802.11n merge study-PHY study <strong>and</strong> analysis)”, December 15 2005,<br />
Information <strong>and</strong> Communications Research Labs, Industrial Technology Research<br />
Institute, in Chinese.<br />
[67]. IEEE 802.3 (http://www.ieee802.org/3/)<br />
[68]. ITU (http://www.itu.int/net/home/index.aspx<br />
[69]. Jhih-Jiang J., Book, “3 rd Generation Mobile Telecommunication Technology”, 2006, In<br />
Chinese.<br />
[70]. FSU - OTC (http://otc.fsu.edu/Networking/NetMenu.html)<br />
[71]. Vivato Networks Inc. (http://www.vivato.net/)<br />
[72]. WiFly (http://www.<strong>wi</strong>fly.com.tw/Wifly6/tw)<br />
[73]. Nortel Networks (http://www.nortel.com/)<br />
[74]. M-Taiwan (http://www.mtaiwan.org.tw/mp.asp?mp=3)<br />
[75]. Nortel Networks, “Solution Brief Wireless Mesh Network”,<br />
(http://media.govtech.net/Digital_Communities/Nortel/WirelessMesh_SolutionBrief.pdf)<br />
[76]. CNET, Business News, In Chinese, (http://taiwan.cnet.com/)<br />
[77]. DIGITALWALL, Business News, In Chinese, (http://www.digitalwall.com/)<br />
[78]. DIGITIMES, Business News, In Chinese, (http://www.digitimes.com.tw/)<br />
[79]. WiBro (http://www.<strong>wi</strong>bro.or.kr/)<br />
[80]. Soon-Young Y., “Introduction to Wibro Technology”, Telecom R&D Center Samsung<br />
Electronics Co, Ltd., September 2004,<br />
(http://www.itu.int/ITU-D/imt-2000/documents/Busan/Session3_Yoon.pdf)<br />
[81]. Balaji S. H., Manoj C., Taewon K, “South Korea Plans for ‘WiBro’”, Samsung<br />
Electronics Co., December 2004<br />
(http://www.ce<strong>wi</strong>t.org.in/docms/ws3/Wimaxwsbalajih.pdf)<br />
[82]. MIC, “Wireless Internet Access : WiBro”, Korea, July 2005<br />
(http://www.telecomnetworks.ru/datadocs/doc_350tu.pdf)<br />
[83]. Samsung Electronics Co. (http://www.samsung.com/us/)<br />
[84]. WiMax.com, Business News (http://www.<strong>wi</strong>max.com/)<br />
[85]. AsiaMedia, Business News (http://www.asiamedia.ucla.edu/)<br />
[86]. Wikipedia (http://www.<strong>wi</strong>kipedia.org/)<br />
[87]. Sung Ki P.; Pyeong-Jung S.; Geun Sik B.; “Joint optimization <strong>of</strong> radio repeater location<br />
<strong>and</strong> linking in WLL systems <strong>wi</strong>th 2.3 GHz frequency b<strong>and</strong>”, Communications, 1999. ICC<br />
'99. 1999 IEEE International Conference on, Volume 3, page(s): 1617 – 1621, June 1999<br />
104
[88]. Mineno T.; Babji T.,"Issues <strong>and</strong> challenges <strong>of</strong> implementing a <strong>wi</strong>reless local loop (WLL)<br />
based telephone access network", Personal Wireless Communications, 1997 IEEE<br />
International Conference on, page(s): 366 - 370, Dec. 1997<br />
[89]. Noerpel A.R.; Yi-Bing L., "Wireless local loop: architecture, technologies <strong>and</strong> services",<br />
Personal Communications, IEEE [see also IEEE Wireless Communications], Volume 5,<br />
Issue 3, page(s): 74 - 80, June 1998<br />
[90]. Haiying Z.;Boucher L.M.; Wachira M., "Technology <strong>comparison</strong>s in <strong>wi</strong>reless local loop",<br />
Personal, Indoor <strong>and</strong> Mobile Radio Communications, 2001 12th IEEE International<br />
Symposium on, Volume 1, page(s): A-46 - A-50, Oct 2001<br />
[91]. Seidel S.Y., "Radio propagation <strong>and</strong> planning at 28 GHz for local multipoint distribution<br />
service (LMDS)", Antennas <strong>and</strong> Propagation Society International Symposium, 1998.<br />
IEEE, Volume 2, page(s): 622 - 625, June 1998<br />
[92]. Schellenberg J., "Designing the digital MMDS network for maximum bene<strong>fi</strong>t:<br />
technological considerations in service, coverage <strong>and</strong> subscriber issues", Broadcasting<br />
Convention, 1997. IBS 97., International (Conf. Publ. 447), page(s): LP1 - LP5, Sept.<br />
1997<br />
[93]. Ghosh A.; Wolter D.R.; Andrews J.G.; Chen R., "Broadb<strong>and</strong> <strong>wi</strong>reless access <strong>wi</strong>th<br />
WiMax/802.16: current performance benchmarks <strong>and</strong> future potential", Communications<br />
Magazine, IEEE, Volume 43, Issue 2 page(s): 129- 136, Feb. 2005<br />
[94]. Eklund C.; Marks R.B.; Stanwood K.L.; Wang, S., "IEEE st<strong>and</strong>ard 802.16: a technical<br />
overview <strong>of</strong> theWirelessMANTM air interface for broadb<strong>and</strong> <strong>wi</strong>relessaccess",<br />
Communications Magazine, IEEE, Volume 40, Issue 6, page(s): 98-107, Jun 2002<br />
[95]. Dong-Hoon C.; Jung-Hoon S. ;Min-Su K.; Ki-Jun H., "Performance analysis <strong>of</strong> the IEEE<br />
802.16 <strong>wi</strong>reless metropolitan area network", Distributed Frameworks for Multimedia<br />
Applications, 2005. DFMA '05. First International Conference on, page(s): 130- 136, Feb.<br />
2005<br />
[96]. Carl E., "The IEEE 802.16 St<strong>and</strong>ard for Broadb<strong>and</strong> Wireless Access"<br />
(http://www2.ing.unipi.it/ew2002/proceedings/pmp002.pdf)<br />
[97]. Sch<strong>wi</strong>ngenschlogl C.; Dastis V.; Mogre P.S.; Hollick M.; Steinmetz R., "Performance<br />
Analysis <strong>of</strong> the Real-time Capabilities <strong>of</strong> Coordinated Centralized Scheduling in 802.16<br />
Mesh Mode", Vehicular Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd,<br />
Volume 3, page(s): 1241 - 1245, 2006<br />
[98]. Nuaymi L.; Noun Z., "Simple Capacity Estimations in WIMAX/802.16 System",<br />
Personal, Indoor <strong>and</strong> Mobile Radio Communications, 2006 IEEE 17th International<br />
Symposium on, page(s): 1 - 5, Sept. 2006<br />
[99]. Juan L.; Haggman S. G., "Performance <strong>of</strong> IEEE802.16-2004 Based System in Jamming<br />
Environment <strong>and</strong> its Improvement <strong>wi</strong>th Link Adaptation", Personal, Indoor <strong>and</strong> Mobile<br />
Radio Communications, 2006 IEEE 17th International Symposium on, page(s): 1 - 5,<br />
Sept. 2006<br />
[100]. Christian H., "Analysis <strong>and</strong> performance evaluation <strong>of</strong> the OFDM-based metropolitan<br />
area network IEEE 802.16", European Wireless 2004 Conference, Volume 49, Issue 3,<br />
Pages 341-363, 19 October 2005<br />
[101]. Bo H.; Weijia J.; Lidong L., "Performance evaluation <strong>of</strong> scheduling in IEEE 802.16<br />
based <strong>wi</strong>reless mesh networks", Computer Communications, Volume 30, Issue 4, Pages<br />
782-792, 26 February 2007<br />
105
[102]. K<strong>of</strong>fman I.; Roman V., "Broadb<strong>and</strong> <strong>wi</strong>reless access solutions based on OFDM access in<br />
IEEE802.16", Communications Magazine, IEEE, Volume 40, Issue 4, page(s): 96-103,<br />
Apr 2002<br />
[103]. Baxley R.J.; Kleider J.E.; Zhou G.T., "Pilot Design for IEEE 802.16 OFDM <strong>and</strong><br />
OFDMA", Acoustics, Speech <strong>and</strong> Signal Processing, 2007. ICASSP 2007. IEEE<br />
International Conference on, Volume 2, page(s): II-321 - II-324, April 2007<br />
[104]. Yanxin Y.; Tomisawa M.; Yi G.; Yong Liang G.; Gang W.; Choi Look L., "Joint timing<br />
<strong>and</strong> frequency synchronization for IEEE 802.16 OFDM systems", Mobile WiMAX<br />
Symposium, 2007. IEEE, page(s): 17 - 21, March 2007<br />
[105]. Al-Gharabally M.; Das P., "Performance analysis <strong>of</strong> OFDM in frequency selective timevariant<br />
channels <strong>wi</strong>th application to IEEE 802.16 broadb<strong>and</strong> <strong>wi</strong>reless access", Volume 1,<br />
page(s): 351 - 356, Oct. 2005<br />
[106]. Jisang Y.; Kanghee K.; Kiseon K., "Capacity evaluation <strong>of</strong> the OFDMA-CDMA ranging<br />
subsystem in IEEE 802.16-2004", Wireless And Mobile Computing, Networking And<br />
Communications, 2005. (WiMob'2005), IEEE International Conference on, Volume 1,<br />
Page(s):217 - 223, 2005<br />
[107]. de Moraes L.F.M.; Maciel P.D.Jr.; "Analysis <strong>and</strong> evaluation <strong>of</strong> a new MAC protocol for<br />
broadb<strong>and</strong> <strong>wi</strong>reless access", Wireless Networks, Communications <strong>and</strong> Mobile Computing,<br />
2005 International Conference on, Volume 1, page(s): 107- 112, June 2005<br />
[108]. GuoSong C.; Deng W.; Shunliang M., "A QoS architecture for the MAC protocol <strong>of</strong><br />
IEEE 802.16 BWA system", Communications, Circuits <strong>and</strong> Systems <strong>and</strong> West Sino<br />
Expositions, IEEE 2002 International Conference on, Volume 1, Page(s):435 - 439, 29<br />
June-1 July 2002<br />
[109]. Haitang W.; Bing H.; Agrawal, D.P., "Admission Control <strong>and</strong> B<strong>and</strong><strong>wi</strong>dth Allocation<br />
above Packet Level for IEEE 802.16 Wireless MAN", Parallel <strong>and</strong> Distributed Systems,<br />
2006. ICPADS 2006. 12th International Conference on, Volume 1, 12-15 July 2006<br />
[110]. Cicconetti C.; Erta A.; Lenzini L.; Mingozzi E., "Performance Evaluation <strong>of</strong> the IEEE<br />
802.16 MAC for QoS Support", Mobile Computing, IEEE Transactions on, Volume 6,<br />
Issue 1, Page(s):26 - 38, Jan. 2007<br />
[111]. Lin J.; Sirisena H.; "Quality <strong>of</strong> Service Scheduling in IEEE 802.16 Broadb<strong>and</strong> Wireless<br />
Networks", Industrial <strong>and</strong> Information Systems, First International Conference on,<br />
Page(s):396 - 401, 8-11 Aug. 2006<br />
[112]. Sun J.; Yanling Y.; Hongfei Z.; "Quality <strong>of</strong> Service Scheduling for 802.16 Broadb<strong>and</strong><br />
Wireless Access Systems", Vehicular Technology Conference, 2006. VTC 2006-Spring.<br />
IEEE 63rd, Volume 3, Page(s):1221 - 1225, 2006<br />
[113]. Soong A.C.K., "Technological enablers <strong>of</strong> the IEEE <strong>wi</strong>reless metropolitan area network<br />
(IEEE 802.16)", Quality <strong>of</strong> Service in Heterogeneous Wired/Wireless Networks, 2005.<br />
Second International Conference on, 22-24 Aug. 2005<br />
[114]. Piechoclri, R.J.; Tsoulos, G.V., "A macrocellular radio channel model for smart antenna<br />
tracking algorithms", Vehicular Technology Conference, 1999 IEEE 49th, Volume 3,<br />
Page(s):1754 - 1758, 16-20 May 1999<br />
[115]. Hamid Z.; Khan Shoab A., "An Augmented Security Protocol for WirelessMAN Mesh<br />
Networks", Communications <strong>and</strong> Information Technologies, 2006. ISCIT '06.<br />
International Symposium on, Page(s):861 - 865, Oct. 18 2006-Sept. 20 2006<br />
[116]. Sen X.; Manton M.; Chin-Tser H., "Security issues in privacy <strong>and</strong> key management<br />
protocols <strong>of</strong> IEEE 802.16", ACM Southeast Regional Conference, Pages: 113 - 118, 2006<br />
106
[117]. Yun Z.; Yuguang F., "Security <strong>of</strong> IEEE 802.16 in Mesh Mode", Military<br />
Communications Conference, 2006. MILCOM 2006, Page(s):1 - 6, 23-25 Oct. 2006<br />
[118]. Sen X.; Chin-Tser H.; Matthews M., "Secure multicast in various scenarios <strong>of</strong><br />
WirelessMAN", SoutheastCon, 2007. Proceedings. IEEE, Page(s):709 - 714, March 2007<br />
[119]. Ginley M.; Sen X.; Chin-Tser H.; Matthews M., "Ef<strong>fi</strong>cient <strong>and</strong> Secure Multicast in<br />
WirelessMAN", Wireless Pervasive Computing, 2007. ISWPC '07. 2nd International<br />
Symposium on, 5-7 Feb. 2007<br />
[120]. Moiseev S.N.; Sergey N. M.; Filin S.A.; Kondakov M.S.; Alex<strong>and</strong>re V. G.; Garmonov<br />
A.V.; Andrew Y. S.; Savinkov A.Y.; Yun Sang P.; Seok Ho C., "Optimal Average<br />
Number <strong>of</strong> Data Block Transmissions for the ARQ Mechanism in the IEEE 802.16<br />
OFDMA System", Personal, Indoor <strong>and</strong> Mobile Radio Communications, 2006 IEEE 17th<br />
International Symposium on, Page(s):1 - 5, Sept. 2006<br />
[121]. Gowda H.; Lakshmaiah R.; Kaur M.; Mohanram C.; Singh M.; Dongre S., "A slot<br />
allocation mechanism for diverse QoS types in OFDMA based IEEE 802.16e systems",<br />
Advanced Communication Technology, The 9th International Conference on, Volume 1,<br />
Page(s):13 - 17, 12-14 Feb. 2007<br />
[122]. Wang F.; Ghosh A.; Love R.; Stewart K.; Ratasuk R.; Bachu R.; Sun Y.; Zhao Q., "IEEE<br />
802.16e system performance: analysis <strong>and</strong> simulations", Personal, Indoor <strong>and</strong> Mobile<br />
Radio Communications, 2005. PIMRC 2005. IEEE 16th International Symposium on,<br />
Volume 2, page(s): 900- 904, 11-14 Sept. 2005<br />
[123]. Sen I.; Wang B.; Matolak David W., "Performance <strong>of</strong> IEEE 802.16 OFDMA St<strong>and</strong>ard<br />
Systems in Airport Surface Area Channels", Integrated Communications, Navigation <strong>and</strong><br />
Surveillance Conference, 2007. ICNS '07, Page(s):1 - 12, April 30 2007-May 3 2007<br />
[124]. Hongxiang L.; Hui L., "An Analysis on Uplink OFDMA Optimality", Vehicular<br />
Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd, Volume 3, Page(s):1339 -<br />
1343, 2006<br />
[125]. Esli C.; Delic H., "Performance Analysis for OFDMA in the Presence <strong>of</strong> Tone<br />
Interference", Communications, IEEE Transactions on, Volume 55, Issue 5, Page(s):845<br />
- 849, May 2007<br />
[126]. Kivanc D.; Hui L., "Subcarrier allocation <strong>and</strong> power control for OFDMA", Signals,<br />
Systems <strong>and</strong> Computers, 2000. Conference Record <strong>of</strong> the Thirty-Fourth Asilomar<br />
Conference on, Volume 1, Page(s):147 - 151, 29 Oct.-1 Nov. 2000<br />
[127]. Hui-Juan Y.; Geng-Sheng K., "An Integrated QoS-Aware Mobility Architecture for<br />
Seamless H<strong>and</strong>over in IEEE 802.16e Mobile BWA Networks", Military Communications<br />
Conference, 2006. MILCOM 2006, Page(s):1 - 7, 23-25 Oct. 2006<br />
[128]. Kuo G. S.; Yao H. J., "A QoS-Adaptive Admission Control for IEEE 802.16e-based<br />
Mobile BWA Networks", Consumer Communications <strong>and</strong> Networking Conference, 2007.<br />
CCNC 2007. 2007 4th IEEE, Page(s):833 - 837, Jan. 2007<br />
[129]. Vatsa Oman<strong>and</strong> J.; Raj M.; K Ritesh K.; Panigrahy D.; Das D., "Adaptive Power Saving<br />
Algorithm for Mobile Subscriber Station in 802.16e", Communication Systems S<strong>of</strong>tware<br />
<strong>and</strong> Middleware, 2007. COMSWARE 2007. 2nd International Conference on, Page(s):1 -<br />
7, 7-12 Jan. 2007<br />
[130]. Zhang Y.; Fujise M., "Energy management in the IEEE 802.16e MAC", Communications<br />
Letters, IEEE, Volume 10, Issue 4, Page(s):311 - 313, Apr 2006<br />
[131]. Xiao Y., "Energy saving mechanism in the IEEE 802.16e <strong>wi</strong>reless MAN",<br />
Communications Letters, IEEE, Volume 9, Issue 7, Page(s):595 - 597, July 2005<br />
107
[132]. Mukherjee S.; Leung K.K.; Rittenhouse G.E., "Protocol <strong>and</strong> control mechanisms to save<br />
terminal energy in IEEE 802.16 networks", Communications, Computers <strong>and</strong> signal<br />
Processing, 2005. PACRIM. 2005 IEEE Paci<strong>fi</strong>c Rim Conference on, Page(s):5 - 8, 24-26<br />
Aug. 2005<br />
[133]. Jee-young S.; Hyun-ho C.; Hyun-dae K.; Sang-wook K.; Dong-ho C.; Hong-sung C.;<br />
Geunwhi L.; Jun-hyung K., "Performance <strong>comparison</strong> <strong>of</strong> 802.16d OFDMA, TD-CDMA,<br />
cdma2000 1xEV-D0 <strong>and</strong> 802.11a WLAN on voice over IP service", Vehicular<br />
Technology Conference, 2005. VTC 2005-Spring. 2005 IEEE 61st, Volume 3,<br />
Page(s):1965 - 1969, 30 May-1 June 2005<br />
[134]. Yuexing P.; Hongzhong Y.; Young il K.; Yong Su L.; Wenbo W., "Performance <strong>of</strong><br />
Convolutional Turbo Coded High-speed Portable Internet (WiBro) System", Vehicular<br />
Technology Conference, 2007. VTC2007-Spring. IEEE 65th, Page(s):730 - 734, 22-25<br />
April 2007<br />
[135]. Taesoo K.; Howon L.; Sik C.; Juyeop K.; Dong-Ho C.; Sunghyun C.; Sangboh Y.; Won-<br />
Hyoung P.; Kiho K., "Design <strong>and</strong> implementation <strong>of</strong> a simulator based on a cross-layer<br />
protocol between MAC <strong>and</strong> PHY layers in a WiBro Compatible.IEEE 802.16e OFDMA<br />
system", Communications Magazine, IEEE, Volume 43, Issue 12, Page(s):136 - 146, Dec.<br />
2005<br />
[136]. Xiao Y.; Pan Y.; Li J., "Design <strong>and</strong> analysis <strong>of</strong> location management for 3G cellular<br />
networks", Parallel <strong>and</strong> Distributed Systems, IEEE Transactions on, Volume 15, Issue 4,<br />
Page(s):339 - 349, April 2004<br />
[137]. Derryberry R.T.; Gray S.D.; Ionescu D.M.; M<strong>and</strong>yam G.; Raghothaman B., "Transmit<br />
diversity in 3G CDMA systems", Communications Magazine, IEEE, Volume 40, Issue 4,<br />
page(s): 68-75, Apr 2002<br />
[138]. Proctor T.K., "Evolution to 3G services: provision <strong>of</strong> 3G services over GERAN<br />
(GSM/EDGE radio access network)", 3G Mobile Communication Technologies, 2003.<br />
3G 2003. 4th International Conference on (Conf. Publ. No. 494), Page(s):78 - 82, 25-27<br />
June 2003<br />
[139]. Rikkinen K.; Wildey C., "WCDMA scenarios for the 2.5 GHz IMT-2000 extension b<strong>and</strong><br />
supporting asymmetric frequency allocations", 3G Mobile Communication Technologies,<br />
2003. 3G 2003. 4th International Conference on (Conf. Publ. No. 494), Page(s):294 - 298,<br />
25-27 June 2003<br />
[140]. Goransson B.; Hagerman B.; Petersson S.; Sorelius J., "Advanced antenna systems for<br />
WCDMA: link <strong>and</strong> system level results", Personal, Indoor <strong>and</strong> Mobile Radio<br />
Communications, 2000. PIMRC 2000. The 11th IEEE International Symposium on,<br />
Volume 1, Page(s):62 - 66, 18-21 Sept. 2000<br />
[141]. Suryanegara M.; Hutabarat E.R.; Gunawan D., "The Interference on WCDMA System in<br />
3G Coexistence Network", Personal, Indoor <strong>and</strong> Mobile Radio Communications, 2006<br />
IEEE 17th International Symposium on, Page(s):1 - 5, Sept. 2006<br />
[142]. Liangchi H.; Cheng M.W.; Niva I., "Evolution towards simultaneous high-speed packet<br />
data <strong>and</strong> voice services: an overview <strong>of</strong> cdma2000 1/spl times/EV-DV",<br />
Telecommunications, 2003. ICT 2003. 10th International Conference on, Volume 2,<br />
Page(s):1313 - 1317, 23 Feb.-1 March 2003<br />
[143]. Becker G.E.; Rudrapatna R.; Sowlay S.; Wong K.N.; Wu J.R., "Integrated Network <strong>and</strong><br />
Element Management System for the 3rd generation CDMA2000 <strong>wi</strong>reless network",<br />
108
Network Operations <strong>and</strong> Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP,<br />
Page(s):953 - 954, 10-14 April 2000<br />
[144]. Chen H. H.; Fan C. X.; Lu W. W., "China's perspectives on 3G mobile commuunications<br />
<strong>and</strong> beyond: TD-SCDMA technology", Wireless Communications, IEEE [see also IEEE<br />
Personal Communications], Volume 9, Issue 2, Page(s):48 - 59, April 2002<br />
[145]. Xirrus High Performance Wi-Fi (http://www.xirrus.com/)<br />
[146]. Foundry Networks (http://www.foundrynet.com/)<br />
[147]. Interview From FSU-OTC, 10/08/2007, Mr. Clint Ringgold, Network Administrator <strong>of</strong><br />
OTC <strong>and</strong> Mr. Phillip M. Callahan, Assistant Director <strong>of</strong> OTC.<br />
[148]. Interview From Q-WARE SYSTEMS & SERVICES CORP., 11/06/2007, Ms. Linda Yeh,<br />
Account Manager <strong>of</strong> Sales & Customer Service Dep.<br />
[149]. Tan K.; Feng J.; Qian Z.; Xuemin S., "Congestion Control in Multihop Wireless<br />
Networks", Vehicular Technology, IEEE Transactions on, Volume 56, Issue 2, March<br />
2007<br />
[150]. Yung Y.; Shakkottai, S., "Hop-by-hop Congestion Control over a Wireless Multi-hop<br />
Network", Networking, IEEE/ACM Transactions on, Volume 15, Issue 1, Feb. 2007<br />
[151]. Zhou, H.; Hoang, D.; Nhan, P.; Mirch<strong>and</strong>ani, V., "Introducing feedback congestion<br />
control to a network <strong>wi</strong>th IEEE 802.11 <strong>wi</strong>reless LAN", Wireless Telecommunications<br />
Symposium, 2004, 14-15 May 2004<br />
[152]. Weirong L.; Jianqiang Y.; Dongbin Z.; Wen, J.T., "A Smooth Control to Avoid<br />
Congestion for Wireless Network", Networking, Sensing <strong>and</strong> Control, 2006. ICNSC '06.<br />
Proceedings <strong>of</strong> the 2006 IEEE International Conference on, 23-25 April 2006<br />
[153]. Seungcheon K.; Jamalipour, A., "Congestion control for best-effort services in <strong>wi</strong>reless<br />
access network", ATM (ICATM 2001) <strong>and</strong> High Speed Intelligent Internet Symposium,<br />
2001. Joint 4th IEEE International Conference on, 22-25 April 2001<br />
[154]. IEEE 802.11u ( http://www.ieee802.org/11/Reports/tgu_update.htm)<br />
109
BIOGRAPHICAL SKETCH<br />
Ming-Chieh Wu was born in Tainan, Taiwan, in 1978. He entered Tang Kong University in<br />
Taiwan, in 1998 majoring in Aerospace Engineering.. His interest at that time was navigation. In<br />
senior year, he joined a project called “Regional Aircraft Design” <strong>wi</strong>th another classmate. In this<br />
project, the group did not need to build a real airplane, but they had to run a simulation that had a<br />
reasonable solution to make sure this aircraft could fly. At the end <strong>of</strong> the project, the group<br />
received an “A.” Mr. Wu graduated in 2002 <strong>and</strong> joined the Air Force for two years. After his<br />
military service, he started to apply to graduate school in the U.S. <strong>and</strong> was accepted by <strong>Florida</strong><br />
<strong>State</strong> University. In graduate school, he changed his major to Electrical Engineering. After his<br />
<strong>fi</strong>rst semester, he found that his true interest was in <strong>wi</strong>reless communication. After that, he<br />
started to take communication related classes. After graduating from FSU, Mr. Wu would like to<br />
design <strong>wi</strong>reless communication networks because he believes that it <strong>wi</strong>ll be the future trend.<br />
110