18.07.2013 Views

A comparison of wi-fi and wimax with case studies - Florida State ...

A comparison of wi-fi and wimax with case studies - Florida State ...

A comparison of wi-fi and wimax with case studies - Florida State ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

THE FLORIDA STATE UNIVERSITY<br />

COLLEGE OF ENGINEERING<br />

A COMPARISON OF WI-FI AND WIMAX WITH CASE STUDIES<br />

By<br />

Ming-Chieh Wu<br />

A Thesis submitted to the<br />

Department <strong>of</strong> Electrical <strong>and</strong> Computer Engineering<br />

in partial ful<strong>fi</strong>llment <strong>of</strong> the<br />

requirements for the degree <strong>of</strong><br />

Master <strong>of</strong> Science<br />

Degree Awarded:<br />

Fall Semester, 2007


The members <strong>of</strong> the Committee approve the Thesis <strong>of</strong> Ming-Chieh Wu defended on October 30 th ,<br />

2007.<br />

Approved:<br />

Bruce A. Harvey<br />

Pr<strong>of</strong>essor Directing Thesis<br />

Ming Yu<br />

Committee Member<br />

Simon Y. Foo<br />

Committee Member<br />

Victor DeBrunner, Chair, Department <strong>of</strong> Electrical <strong>and</strong> Computer Engineering<br />

Ching-Jen Chen, Dean, FAMU-FSU College <strong>of</strong> Engineering<br />

The Of<strong>fi</strong>ce <strong>of</strong> Graduate Studies has veri<strong>fi</strong>ed <strong>and</strong> approved the above named committee members.<br />

ii


TABLE OF CONTENTS<br />

List <strong>of</strong> Tables…………………………..………….………………………………………..……vi<br />

List <strong>of</strong> Figures………………………………….…………………………………………….…vii<br />

List <strong>of</strong> Abbreviations……………………..………….………………………………………….ix<br />

ABSTRACT……………………………………………..……………………………………...xii<br />

CHAPTER ONE<br />

1. Introduction …………………………………………………………………………………....1<br />

CHAPTER TWO<br />

2. 3G…………………………………..…………………………………………………………..5<br />

2.1. Introduction………………………………………………………………………...…..5<br />

2.2. Technologies…………………………………………………………………………...5<br />

2.2.1. WCDMA……………………………….………………………………………..5<br />

2.2.2. CDMA2000………………………………………………………………….…..6<br />

2.2.3. TD-SCDMA……………………………………………………………….…….6<br />

2.3. Development…………………………………………………..……………………….7<br />

2.4. Cases………………………………………………………………..…………….…….8<br />

2.5. Conclusion……………………………………………………………………….……..9<br />

CHAPTER THREE<br />

3. IEEE 802.11, Wireless LAN…………………………………………………...……………..10<br />

3.1. The background <strong>of</strong> IEEE 802.11…………………………………………….………10<br />

3.2. Capacity……………………………………………………………………….….….11<br />

3.3. The Physical Layer <strong>and</strong> MAC Layer…………………………………………...……14<br />

3.3.1. The Physical Layer………………………………………………..……….….14<br />

3.3.1.1. Introduction……………………………………………………….……14<br />

3.3.1.2. PLCP <strong>and</strong> PMD…………………..………………………...……….……15<br />

3.3.1.3. CS/CCA………………………………………………………….……….15<br />

3.3.1.4. IEEE 802.11b, DSSS <strong>and</strong> HR-DSSS…………………………..…...…..16<br />

3.3.1.4.1. Theory <strong>and</strong> Transmission method…………………………………16<br />

3.3.1.4.2. Against interference……………………..…………………………17<br />

3.3.1.4.3. PLCP <strong>and</strong> PMD <strong>of</strong> DSSS…………………….......................……..17<br />

3.3.1.4.4. HR-DSSS <strong>and</strong> CCK…………………………………………..……18<br />

3.3.1.4.5. PLCP <strong>and</strong> PMD <strong>of</strong> HR-DSSS………..……………....……………19<br />

3.3.1.5. IEEE 802.11a <strong>and</strong> OFDM…………………………………………….…20<br />

3.3.1.5.1. Background…………………………………………………..…….20<br />

3.3.1.5.2. Principles…………………………………………………………..20<br />

3.3.1.5.3. The IEEE 802.11a’s OFDM <strong>and</strong> its PLCP <strong>and</strong> PMD……………..22<br />

3.3.1.6. IEEE 802.11g <strong>and</strong> the Physical Layer……………………………………24<br />

3.3.1.6.1. Background <strong>and</strong> Backward Compatibility………….……...……24<br />

3.3.1.6.2. ERP-OFDM <strong>and</strong> DSSS-OFDM………………………………..…..25<br />

3.3.2. MAC Layer………………………………………………………………..…….27<br />

3.3.2.1. Introduction……………………………………………...….……………27<br />

3.3.2.2. DCF <strong>and</strong> PCF…………………………….……………………………..27<br />

iii


3.3.2.3. Hidden node <strong>and</strong> CSMA/CA……………………………......……………28<br />

3.3.2.4. Fragmentation………………………………………………………….30<br />

3.3.2.5. Interframe spacing………………………………………………………..30<br />

3.3.2.6. Power saving………………………………..…………………………….31<br />

3.3.2.7. Security…………………………………….……………………………..32<br />

3.4. The next generation st<strong>and</strong>ard…………………………………………………………..34<br />

3.4.1. IEEE 802.11n…………………………………………..………………………..34<br />

3.4.2. MIMO (Multiple-Input/Multiple-Output)………………….………………...…35<br />

3.5. Limitation………………………………………………………..……………………..35<br />

CHAPTER FOUR<br />

4. IEEE 802.16, Wireless MAN………………………………………………………...……….37<br />

4.1. The background <strong>of</strong> IEEE 802.16……………………………………...….………….37<br />

4.2. Capacity <strong>of</strong> the IEEE 802.16 family………………………………………...…………39<br />

4.2.1. IEEE 802.16………………………………………………………………….….39<br />

4.2.2. IEEE 802.16a………………………………………………………………..…..39<br />

4.2.3. IEEE 802.16c…………………………………………………………..………..39<br />

4.2.4. IEEE 802.16-2004.……………………………………………...…...………….39<br />

4.2.5. IEEE 802.16e-2005…………………………………………………………..….40<br />

4.2.6. IEEE 802.16f, IEEE 802.16g <strong>and</strong> IEEE 802.16h……………….…………….40<br />

4.3. The Physical Layer <strong>and</strong> MAC Layer…………………………….......…...……………42<br />

4.3.1. IEEE 802.16-2004……………………………………………….………..…..42<br />

4.3.1.1. Physical Layer…………………………………………….…………....42<br />

4.3.1.1.1. Four transmission mode: SC, SCa, OFDM <strong>and</strong> OFDMA…………44<br />

4.3.1.1.2. AMC (Adaptive Modulation <strong>and</strong> Coding)….…………………...44<br />

4.3.1.1.3. Channel-quality Measurement……………………………………..45<br />

4.3.1.1.4. OFDM in WiMax……………………...………….……………….45<br />

4.3.1.2. MAC Layer……………………………………………………….…..…..46<br />

4.3.1.2.1. Three sublayers: CS, CPS <strong>and</strong> SS…………...…….………………46<br />

4.3.1.2.2. AAS (Advanced Antenna Systems)………………….…...……..47<br />

4.3.1.2.3. QoS……………………………………………………..………….47<br />

4.3.1.2.4. Security…………………………………………………………….49<br />

4.3.1.2.4.1. Overview……………………………………...……………49<br />

4.3.1.2.4.2. Overall Analysis………………….……………...………..52<br />

4.3.2. IEEE 802.16e-2005, the newest st<strong>and</strong>ard…………………………………….....53<br />

4.3.2.1. OFDMA-PHY………………………………...………………………..53<br />

4.3.2.1.1. Background…………………..…………………………………….53<br />

4.3.2.1.2. Frame structure…………………….………………………………53<br />

4.3.2.1.3. Various Subcarrier Allocation Modes……………………………..54<br />

4.3.2.2. MAC Layer…………..…………………………………………………..56<br />

4.3.2.2.1. QoS…………………….…………………………………………..56<br />

4.3.2.2.2. Power-saving………….………………………………………...…57<br />

4.3.2.2.2.1. Sleep Mode…………….……………………………………57<br />

4.3.2.2.2.2. Idle Mode……...…………………………………………….58<br />

4.4. The future <strong>of</strong> WiMax…………………………….……………..……………………58<br />

CHAPTER FIVE<br />

iv


5. Case study…………………………………………………………………………………….61<br />

5.1. FSU <strong>wi</strong>reless network………………………………………………………………….61<br />

5.1.1. Introduction………………………………………………………………...……61<br />

5.1.2. Implementation…………….……………………………………………………62<br />

5.1.3. Analysis…………………………………………………………….…………73<br />

5.1.4. Conclusion…………….……………………………………...…………………74<br />

5.2. WiFly in Taipei……………………………..………………………………………….74<br />

5.2.1. Introduction………………………..…………………………………………….74<br />

5.2.2. Implementation………………………………………………………………….75<br />

5.2.3. Analysis…………………………....………………………………………….83<br />

5.2.4. Conclusion……………………….…………………………………………....86<br />

5.3. Wibro in South Korea…………………………….……………………………………86<br />

5.3.1. Introduction…………………………….………………………………………..86<br />

5.3.2. History…………………………………………………………………….…..87<br />

5.3.3. Implementation……………………………………………….......................…..88<br />

5.3.4. Analysis……………………………………………………………………...….92<br />

5.3.5. Conclusion……………………………..…………………….……………….....93<br />

5.4 . Overall analysis………………………...………………………..……………..………94<br />

5.5. Other developing <strong>wi</strong>reless network………...……………………………….……….95<br />

CHAPTER SIX<br />

6. Conclusion…………………………………………………..…………………….………..98<br />

BIBLIOGRAPHY……………………………………...…………………………….………..101<br />

BIOGRAPHICAL SKETCH…………………………………………………………………110<br />

v


LIST OF TABLES<br />

Table 1-1 802.3 Family……………………………………………………..…………..……….2<br />

Table 3-1 Family <strong>of</strong> IEEE 802.11……………..……..……………………..…………………11<br />

Table 3-2 Capacities for 802.11a/b/g……………….……...…………….………………………12<br />

Table 3-3 IEEE 802.11b/g Channel Used for Different Countries……….……...………………12<br />

Table 3-4 IEEE 802.11a Channel Use for North America…………….……………............13<br />

Table 3-5 OFDM Modulation <strong>and</strong> Data Rate…………………...…………………..………..23<br />

Table 4-1 The Basic Data <strong>of</strong> IEEE 802.16………………………………………...….41<br />

Table 4-2 Modulation <strong>and</strong> Coding Supported in WiMax……………..…………..…..45<br />

Table 4-3 OFDM Parameters Used for WiMAX…………………..…………..…….46<br />

Table 4-4 Service Flows in WiMax……………………...……………………..…….48<br />

Table 4-5 DL Distributed Subcarrier Permutation (FUSC)………….………..………55<br />

Table 4-6 UL-DL Adjacent Subcarrier Permutation ………………………….………….……..56<br />

Table 5-1 The Basic Information <strong>of</strong> FSUWIN………………………………………...…66<br />

Table 5-2 Xirrus XS-3700 AP Technology Data………….……………………………....66<br />

Table 5-3 Foundry Networks IP250 Technology Data……………...……….…….......….66<br />

Table 5-4 Vivato 2.4 GHz Indoor & Outdoor Wi-Fi S<strong>wi</strong>tch Technology Data…...…..…68<br />

Table 5-5 Parameters <strong>of</strong> WLAN <strong>and</strong> Mesh Network……………………….....………..70<br />

Table 5-6 Features <strong>of</strong> Nortel Wireless Mesh Network………………..….…………..77<br />

Table 5-7 The Numbers <strong>of</strong> Subscribers………………...……………..…………………79<br />

Table 5-8 The Comparison <strong>of</strong> WiBro <strong>and</strong> WiMax……………………...….……………..92<br />

Table 5-9 The Basic Data <strong>of</strong> FSUWIN, WiFly <strong>and</strong> WiBro…………..…………………96<br />

Table 5-10 Current Internet Access Technologies……………….……..…………..……..97<br />

Table 6-1 3G, Wi-Fi <strong>and</strong> WiMax Overall Comparison………………………….………..98<br />

vi


LIST OF FIGURES<br />

Figure 2-1 The Evolution <strong>of</strong> 3G………………………………...………...…………..7<br />

Figure 3-1 OSI Model………………………………………..…………..…………..14<br />

Figure 3-2 802.11 PLCP, PMD <strong>and</strong> MAC Structure…………..………………..……15<br />

Figure 3-3 DSSS Transmission………………………………..…………………...…16<br />

Figure 3-4 DSSS PLCP………………………………………..………………..……18<br />

Figure 3-5 CCK Modulation…………………………………..……………………..19<br />

Figure 3-6 HR/DSSS PLCP Framing…………………………..…………………….19<br />

Figure 3-7 FDM <strong>and</strong> OFDM…………………………………..……………………..20<br />

Figure 3-8 CP <strong>and</strong> PP………………………………………..…….…………………21<br />

Figure 3-9 OFDM Modem……………………………………..….…………………22<br />

Figure 3-10 Constellations Diagram…………………………..……………………..23<br />

Figure 3-11 OFDM PLCP Structure………………………….………………………24<br />

Figure 3-12 DSSS-OFDM PSDU Format………………………..…..………………26<br />

Figure 3-13 DSSS-OFDM Long Preamble Structure……………..…………………..26<br />

Figure 3-14 DSSS-OFDM Short Preamble Structure……………………..…………..27<br />

Figure 3-15 The Hidden Node Problem………………………..………...……………28<br />

Figure 3-16 CDMA/CA………………………………………..…………….………29<br />

Figure 3-17 Virtual Channel Sensing…………………………..……………………..29<br />

Figure 3-18 A Fragment Burst…………………………………..…………………....30<br />

Figure 3-19 Frame Interval for IEEE 802.11…………...………..…………………..31<br />

Figure 3-20 WEP Frame <strong>and</strong> Operation…………………………..…………………..33<br />

Figure 3-21 The WEP Encryption Process………………………….………………..33<br />

Figure 4-1 The Layer Structure <strong>of</strong> IEEE802.16……………………..………...………43<br />

Figure 4-2 A Spatial Multiplexing MIMO System…………………....………………44<br />

Figure 4-3 PKM Authorization Process <strong>and</strong> Parameters………………..…………….50<br />

Figure 4-4 PKM Protocol Messages Exchange Process <strong>and</strong> Parameters…….....……………..51<br />

Figure 4-5 Encryption Frame Structure <strong>and</strong> Process……………………..…….……..52<br />

Figure 4-6 OFDMA Frame Structure……………………………………..…………..54<br />

Figure 4-7 Coverage <strong>and</strong> Capacity for Different Wireless Access Techniques…..….....59<br />

Figure 5-1 The Coverage <strong>of</strong> FSU Wireless Network………….…..……………………….62<br />

Figure 5-2 Fisher Lecture Hall………………………..………..…………………….64<br />

Figure 5-3 L<strong>and</strong>is Green………………………………………..…..………………..65<br />

Figure 5-4 Shores Library……………………………………..………………….….65<br />

Figure 5-5 Stadium……………………………………………..……………………66<br />

Figure 5-6 Xirrus XS-3700 AP…………………………………………………………..67<br />

Figure 5-7 Foundry Networks IP250……..………………………..………...…………..69<br />

Figure 5-8 Vivato 2.4 GHz Indoor & Outdoor Wi-Fi S<strong>wi</strong>tches………..……………..72<br />

Figure 5-9 FSUWIN Login System……………………………………..…………….74<br />

Figure 5-10 Wireless Mesh Network Structure I……………...………..…………….76<br />

Figure 5-11 Wireless Mesh Network Structure II………………….…..…………….76<br />

Figure 5-12 Wireless Access Point 7220………………………………..….………..77<br />

Figure 5-13 Nortel Wireless Mesh Network Solution Example…………..…………..80<br />

Figure 5-14 The Relationship Between WiMax <strong>and</strong> WiBro……...……..……………..87<br />

Figure 5-15 The Network Structure <strong>of</strong> WiBro……………………..……..……………87<br />

vii


Figure 5-16 The Operation B<strong>and</strong> <strong>of</strong> WiBro……………………………………..………...…….88<br />

Figure 5-17 WiBro Features………………………...…………………..…………..……89<br />

Figure 5-18 MAC Layer Model…………………………………………..……….……..90<br />

Figure 5-19 U-RAS Premium……………………………………………..…….………91<br />

Figure 5-20 ACR Basic Data……………………..……………………………………….91<br />

Figure 5-21 An Example Application <strong>of</strong> 3G, Wi-Fi <strong>and</strong> WiMax…………………..……..95<br />

Figure 6-1 Cooperation <strong>of</strong> WiMax <strong>and</strong> Wi-Fi………………………………………...…100<br />

viii


LIST OF ABBREVIATIONS<br />

Abbreviation Full Name Page<br />

3G Third generation <strong>of</strong> mobile phone st<strong>and</strong>ards <strong>and</strong> technologies 5<br />

3GPP 3 rd Generation Partnership Project 5<br />

AAS Advanced Antenna Systems 42<br />

ACK Acknowledgement 26<br />

AGC Automatic Gain Control 21<br />

AMC Adaptive Modulation <strong>and</strong> Coding 40<br />

AP Access Point 32<br />

APEC Asia Paci<strong>fi</strong>c Economic Cooperation 93<br />

ARPA Advanced Research Projects Agency 1<br />

BE Best-effort service 44<br />

BER Bit Error Rate 20<br />

BS Base Station 29<br />

BTC Block Turbo Codes 40<br />

BWA Broadb<strong>and</strong> Wireless Access 34<br />

CCK Complementary Code Keying 16<br />

CDMA/CA Carrier Sense Multiple Access/Collision Avoidance 25<br />

CDMA/CD Carrier Sense Multiple Access/Collision Detection 26<br />

CDMA2000 1X<br />

Evolution-Data Only 6<br />

EV-DO<br />

CID Connection Identi<strong>fi</strong>er 42<br />

COFDM Coded OFDM 20<br />

CP cyclic pre<strong>fi</strong>x 19<br />

CS/CCA Carrier Sense/Clear Channel Assessment 14<br />

CT Communication Technology ix<br />

CTC Convolution Turbo Codes 40<br />

CTS Clear To Send 23, 26<br />

DBPSK Differential Binary Phase shift Keying 15<br />

DCF Distributed Coordination Function 25<br />

DECT Digital-Enhanced Cordless Telephony 34<br />

DIFS DCF InterFrame Spacing 28<br />

DL Downlink 48<br />

DQPSK Differential Quadrature Phase shift Keying 15<br />

DSSS Direct Sequence Spread Spectrum 14<br />

EIFS Extended InterFrame Spacing 28<br />

ERP Extended Rate PHY 22<br />

ertPS Extended Real-Time Polling Service 51<br />

FCC Federal Communications Commission 11<br />

FDD Frequency Division Duplexing 35<br />

FDM Frequency Division Multiplexing 18<br />

FDMA Frequency Division Multiple Access 47<br />

FEC Forward Error Correction 40<br />

FFT Fast Fourier Transform 19<br />

ix


FOMA Freedom <strong>of</strong> Mobile Multimedia Access 8<br />

FSUWIN <strong>Florida</strong> <strong>State</strong> University Wireless Integrated Network 55<br />

FUSC Fully Used Subchannelization 48, 49<br />

GPRS General Packet Radio Service 5<br />

GSM<br />

Global System for Mobile Communications/Pan-European digital<br />

5<br />

cellular l<strong>and</strong> mobile telecommunication system<br />

ICI inter-carrier interference 19<br />

ICV Integrity Check Value 29<br />

IEEE Institute <strong>of</strong> Electrical <strong>and</strong> Electronic Engineers 1<br />

IFFT inverse Fast Fourier Transform 19<br />

IMT International Mobile Telecommunication 5<br />

ISI Inter-symbol interference 19<br />

ISP Internet Service Provider 33<br />

IT Information Technology ix<br />

ITU International Telecommunication Union 5<br />

IV Initialization Vector 29<br />

KT Korean Telecoms Industry 86<br />

LDPC Low Density Parity Check 40<br />

LMDS Local Multipoint Distribution Systems 34<br />

LOS Line <strong>of</strong> Sight 34<br />

MAC Media Access Control 25<br />

MIMO Multiple-Input/Multiple-Output 31<br />

MMDS Multichannel Multipoint Distribution Services 34<br />

MMS Multimedia Message Service) 5<br />

MPDUs MAC Protocol Data Units 13<br />

MS Mobile Station 28<br />

MSDUs MAC Service Data Units 41<br />

NAV Network Allocation Vector 23, 26<br />

NLOS Non-Line <strong>of</strong> Sight 35<br />

nrtPS Non-real-time polling service 43<br />

OFDM Orthogonal Frequency Division Multiplexing 9, 19<br />

OFDMA Orthogonal Frequency Division Multiple Access 47<br />

OSI Open System Interconnection 12<br />

OTC Of<strong>fi</strong>ce <strong>of</strong> Telecommunications <strong>and</strong> Networking 55<br />

PBCC Packet Binary Convolution Coding 22<br />

PCF Point Coordination Function 25<br />

PIFS PCF InterFrame Spacing 28<br />

PKM Privacy <strong>and</strong> Key Management 44<br />

PLCP Physical Layer Convergence Protocol 13<br />

PMD Physical Medium Dependent 13<br />

PN Codes Pseudor<strong>and</strong>om Noise Codes 15<br />

PP cyclic post<strong>fi</strong>x 19<br />

PPDU PLCP Protocol Data Unit 13<br />

PRNG Pseudor<strong>and</strong>om Number Generator 29<br />

PSDU PLCP Service Data Unit 13<br />

x


PSS Portable Subscriber Station 89<br />

PUSC Partially Used Subchannelization 48, 50<br />

QAM Quadrature Amplitude Modulation 20<br />

QoS Quality <strong>of</strong> Service 42<br />

RAS Radio Access Station 89<br />

RCF Request to Send 26<br />

RS-CC Reed Solomon – Convolution Code 40<br />

rtPS Real-time polling services 43<br />

SA Security Associations 44<br />

SDUs Service Data Units 51<br />

SIFS Short Inter-Frame Space 23, 28<br />

SKT South Korea Telecom 8<br />

SS Subscriber Station 44<br />

STBC Space-Time Block Coding 32<br />

TCP/IP Transmission Control protocol/Internet Protocol 3<br />

TDD Time Division Duplexing 35<br />

TDM Time Division Multiplexing 35<br />

TD-SCDMA Time Division - Synchronized Code Division Multiple Access 5<br />

UGS Unsolicited grant services 43<br />

UL Uplink 48<br />

UMTS Universal Mobile Telecommunications System 5<br />

VoIP Voice over IP 32<br />

WCDMA Wideb<strong>and</strong> Code Division Multiple Access 5<br />

WEP Wired Equivalent Privacy 29<br />

WiBro Wireless Broadb<strong>and</strong> Access Service 86<br />

Wi-Fi Wireless <strong>fi</strong>delity 31<br />

WiMax World Interoperability for Microwave Access 35<br />

WISP Wireless Internet Service Provider 34<br />

WLAN Wireless Local Area Network 9<br />

WLL Wireless Local-Loop 34<br />

WMAN Wireless Metropolitan Area Network 35<br />

WWW World Wide Web 3<br />

xi


ABSTRACT<br />

Currently over 50% <strong>of</strong> the world’s population check their e-mails everyday. Collecting<br />

information from the Internet is a routine. In the early 21 st century, <strong>wi</strong>reless communication has<br />

become a hot topic in IT (Information Technology) <strong>and</strong> CT (Communication Technology), as<br />

evidenced by the growth <strong>of</strong> <strong>wi</strong>reless technologies such as 3G, Wi-Fi <strong>and</strong> WiMax. 3G is a cellular<br />

technology developed in conjunction <strong>wi</strong>th the cellular phone network. Wi-Fi is a <strong>wi</strong>reless local<br />

area network technology. WiMax is designed for the <strong>wi</strong>reless metropolitan area network. Today,<br />

people not only want the <strong>fi</strong>xed <strong>wi</strong>reless access to the Internet, but also want the mobile <strong>wi</strong>reless<br />

access as well. They want a ubiquitous connection, even when in a train, a cab, or the subway.<br />

This dem<strong>and</strong> is resulting in increasing competition between the leading <strong>wi</strong>reless technologies.<br />

3G, Wi-Fi <strong>and</strong> WiMax all appear to have the potential to feed the dem<strong>and</strong>, but still have issues<br />

that need to be addressed. The future direction <strong>of</strong> <strong>wi</strong>reless Internet access is uncertain, including<br />

whether these three technologies <strong>wi</strong>ll operate cooperatively or competitively. This thesis is<br />

going to predict the future direction by analysis <strong>of</strong> 3G, Wi-Fi <strong>and</strong> WiMax technologies <strong>and</strong> the<br />

evaluation <strong>of</strong> three <strong>wi</strong>reless access <strong>case</strong> <strong>studies</strong>.<br />

This thesis <strong>wi</strong>ll begin <strong>wi</strong>th an introduction to the history <strong>of</strong> Internet <strong>and</strong> <strong>wi</strong>ll then continue<br />

<strong>wi</strong>th a discussion <strong>of</strong> the technical aspects <strong>of</strong> 3G, Wi-Fi <strong>and</strong> WiMax. After the technology<br />

introduction, this thesis <strong>wi</strong>ll evaluate three current implementations <strong>of</strong> <strong>wi</strong>reless Internet access as<br />

<strong>case</strong> <strong>studies</strong> to verify the capabilities <strong>of</strong> Wi-Fi <strong>and</strong> WiMax, <strong>and</strong> to discuss the feasibility <strong>of</strong><br />

building a city-<strong>wi</strong>de <strong>wi</strong>reless network. Finally, a reasonable prediction <strong>of</strong> the future<br />

implementation <strong>of</strong> a city-<strong>wi</strong>de <strong>wi</strong>reless Internet structure <strong>wi</strong>ll be presented.<br />

xii


CHAPTER ONE<br />

1. Introduction<br />

The cellphone company Nokia uses the slogan <strong>of</strong> “connecting people” in its advertising<br />

campaign. That means that technologies should be based on dem<strong>and</strong> <strong>and</strong> humility. In the <strong>fi</strong>eld <strong>of</strong><br />

the Internet, the basis <strong>of</strong> all research <strong>and</strong> innovation is geared towards making transmission <strong>of</strong><br />

communication more ef<strong>fi</strong>cient. The network technology that would eventually evolve into “the<br />

Internet” was initially developed by the military requisition called ARPANET, during late 1960s.<br />

ARPA is the acronym for Advanced Research Projects Agency an agency <strong>of</strong> the Department <strong>of</strong><br />

Defense. This network was the pioneer <strong>of</strong> the “packet s<strong>wi</strong>tch” type network. Little did the<br />

originators <strong>of</strong> ARPANET realize that this network would eventually lead to a method that could<br />

connect every PC in the world for sharing <strong>and</strong> exchanging information. The two most signi<strong>fi</strong>cant<br />

features <strong>of</strong> ARPANET were the concept <strong>of</strong> network routing <strong>and</strong> the use <strong>of</strong> packet for data<br />

transfer. In ARPANET, each computer was a node <strong>and</strong> it received the data <strong>and</strong> then routed it to<br />

next node. ARPANET was also the <strong>fi</strong>rst network using packet s<strong>wi</strong>tching to transmit data. Each<br />

node could send each packet to its destination by different paths, so it could improve the<br />

transmission to become more ef<strong>fi</strong>cient <strong>and</strong> more reliable. In the beginning, this project only<br />

included four locations, Stanford Research institute, UCLA, UC Santa Barbara <strong>and</strong> Utah<br />

University. After it was initiated successfully in 1969, the locations extended to the east coast the<br />

follo<strong>wi</strong>ng year including MIT, Harvard, Beranek <strong>and</strong> Newman. This was the world’s <strong>fi</strong>rst WAN<br />

(Wide Area Network).<br />

In 1973, the Xerox Corporation, located in California, developed the LAN (Local Area<br />

Network) for connecting PCs <strong>wi</strong>thin a local area. Therefore, the Ethernet was formed. The DIX<br />

alliance (DEC, Intel <strong>and</strong> Xerox) was the <strong>fi</strong>rst pusher <strong>of</strong> Ethernet <strong>and</strong> then transferred the patent<br />

right to IEEE (Institute <strong>of</strong> Electrical <strong>and</strong> Electronic Engineers). This move made Ethernet<br />

become popular very quickly. In 1982, DIX published Ethernet Version 2 (EV2) <strong>and</strong> later on<br />

IEEE published IEEE 802.3 CDMA/CD st<strong>and</strong>ard which was based on EV2 in 1983. Today, the<br />

IEEE 802.3 series is the most well-known Ethernet st<strong>and</strong>ard. The IEEE 802.3 is a big family that<br />

is presented in table 1-1[67][86]. They can support speeds from 10 Mbps to 1 Gbps. The<br />

increased technology causes the Internet to continually speed up.<br />

Communication technology continues to develop <strong>and</strong> an increasing number <strong>of</strong><br />

communication technologies have been implemented. However these technologies may not be<br />

compatible <strong>wi</strong>th each other. The ARPANET researchers developed a set <strong>of</strong> protocols called<br />

TCP/IP (Transmission Control protocol/Internet Protocol) to integrate networks that may be<br />

based on differing communications technologies <strong>and</strong> protocols. Internet research was not only<br />

conducted in U.S., but also in other places such as Europe, Asia, Canada <strong>and</strong> so on. Competing<br />

1


protocols such as the X.25 protocol from Europe were developed, but eventually TCI/IP became<br />

accepted as a world-<strong>wi</strong>de st<strong>and</strong>ard <strong>and</strong> the world-<strong>wi</strong>de Internet was formed.<br />

Ethernet<br />

St<strong>and</strong>ard<br />

Experimental<br />

Ethernet<br />

Ethernet II<br />

(DIX v2.0)<br />

Table 1-1 802.3 Family<br />

Date Description<br />

1972 2.94 Mbit/s (367 kB/s) over coaxial cable (coax) cable bus<br />

1982<br />

10 Mbit/s (1.25 MB/s) over thin coax (thinnet) - Frames have a Type <strong>fi</strong>eld. This<br />

frame format is used on all forms <strong>of</strong> Ethernet by protocols in the Internet<br />

protocol suite.<br />

IEEE 802.3 1983<br />

10BASE5 10 Mbit/s (1.25MB/s) over thick coax - same as DIX except Type<br />

<strong>fi</strong>eld is replaced by Length, <strong>and</strong> an 802.2 LLC header follows the 802.3 header<br />

802.3a 1985 10BASE2 10 Mbit/s (1.25 MB/s) over thin Coax (thinnet or cheapernet)<br />

802.3b 1985 10BROAD36<br />

802.3c 1985 10 Mbit/s (1.25 MB/s) repeater specs<br />

802.3d 1987 FOIRL (Fiber-Optic Inter-Repeater Link)<br />

802.3e 1987 1BASE5 or StarLAN<br />

802.3i 1990 10BASE-T 10 Mbit/s (1.25 MB/s) over t<strong>wi</strong>sted pair<br />

802.3j 1993 10BASE-F 10 Mbit/s (1.25 MB/s) over Fiber-Optic<br />

802.3u 1995<br />

100BASE-TX, 100BASE-T4, 100BASE-FX Fast Ethernet at 100 Mbit/s (12.5<br />

MB/s) w/auto negotiation<br />

802.3x 1997<br />

Full Duplex <strong>and</strong> flow control; also incorporates DIX framing, so there's no<br />

longer a DIX/802.3 split<br />

802.3y 1998 100BASE-T2 100 Mbit/s (12.5 MB/s) over low quality t<strong>wi</strong>sted pair<br />

802.3z 1998 1000BASE-X Gbit/s Ethernet over Fiber-Optic at 1 Gbit/s (125 MB/s)<br />

802.3-1998 1998 A revision <strong>of</strong> base st<strong>and</strong>ard incorporating the above amendments <strong>and</strong> errata<br />

802.3ab 1999 1000BASE-T Gbit/s Ethernet over t<strong>wi</strong>sted pair at 1 Gbit/s (125 MB/s)<br />

802.3ac 1998<br />

Max frame size extended to 1522 bytes (to allow "Q-tag") The Q-tag includes<br />

802.1Q VLAN information <strong>and</strong> 802.1p priority information.<br />

802.3ad 2000 Link aggregation for parallel links<br />

802.3-2002 2002 A revision <strong>of</strong> base st<strong>and</strong>ard incorporating the three prior amendments <strong>and</strong> errata<br />

802.3ae 2003<br />

10 Gbit/s (1,250 MB/s) Ethernet over <strong>fi</strong>ber; 10GBASE-SR, 10GBASE-LR,<br />

10GBASE-ER, 10GBASE-SW, 10GBASE-LW, 10GBASE-EW<br />

802.3af 2003 Power over Ethernet<br />

802.3ah 2004 Ethernet in the First Mile<br />

802.3ak 2004 10GBASE-CX4 10 Gbit/s (1,250 MB/s) Ethernet over t<strong>wi</strong>n-axial cable<br />

802.3-2005 2005 A revision <strong>of</strong> base st<strong>and</strong>ard incorporating the four prior amendments <strong>and</strong> errata.<br />

2


Table 1-1 Cont.<br />

802.3an 2006 10GBASE-T 10 Gbit/s (1,250 MB/s) Ethernet over unshielded t<strong>wi</strong>sted pair(UTP)<br />

802.3ap 2007<br />

Backplane Ethernet (1 <strong>and</strong> 10 Gbit/s (125 <strong>and</strong> 1,250 MB/s) over printed circuit<br />

boards)<br />

802.3aq 2006 10GBASE-LRM 10 Gbit/s (1,250 MB/s) Ethernet over multimode <strong>fi</strong>ber<br />

802.3ar<br />

On<br />

Hold<br />

Congestion management<br />

802.3as 2006 Frame expansion<br />

802.3at<br />

exp.<br />

2008<br />

Power over Ethernet enhancements<br />

802.3au 2006 Isolation requirements for Power Over Ethernet (802.3-2005/Cor 1)<br />

802.3av<br />

exp.<br />

2009<br />

802.3aw 2007<br />

802.3ax<br />

802.3ay<br />

802.3ba<br />

exp<br />

2008<br />

exp<br />

2008<br />

exp.<br />

2009<br />

10 Gbit/s EPON<br />

Fixed an equation in the publication <strong>of</strong> 10GBASE-T (released as 802.3-2005/Cor<br />

2)<br />

Move Link aggregation out <strong>of</strong> 802.3 to IEEE 802.1<br />

Maintenance to base st<strong>and</strong>ard<br />

Higher Speed Study Group. 40 Gb/s over 1m backplane, 10m Cu cable assembly<br />

(several pairs) <strong>and</strong> 100m <strong>of</strong> MMF <strong>and</strong> 100 Gb/s up to 10m or Cu cable assembly,<br />

100 m <strong>of</strong> MMF or 40 km <strong>of</strong> SMF respectively<br />

For creating a common information sharing space to physicists, Tim Berners-Lee (1955- ,<br />

British) designed the World Wide Web (WWW). At that time he was in the European Laboratory<br />

for Particle Physics, CERN (Conseil Européen pour la Recherche Nucléaire, European Council<br />

for Nuclear Research), <strong>and</strong> wanted to create a simple way to share <strong>and</strong> cooperate <strong>wi</strong>th other<br />

physicists around the world. Now WWW becomes another name for the Internet.<br />

In the 1990s, data transmission went into the <strong>wi</strong>reless era. Wireless transmission includes<br />

Bluetooth, Infrared, RF, IEEE 802.11, IEEE 802.16 <strong>and</strong> 3G. Currently there are several<br />

competing communication technologies for providing <strong>wi</strong>reless Internet access. The primary<br />

competitors are 3G, Wi-Fi (IEEE 802.11) <strong>and</strong> WiMax (IEEE 802.16). 3G is a cellular technology<br />

<strong>and</strong> is currently evolving into all-IP network. Wi-Fi is a <strong>wi</strong>reless local area network technology<br />

designed for home <strong>and</strong> small area implementations. WiMax is a <strong>wi</strong>reless metropolitan area<br />

network technology which can cover larger area <strong>and</strong> support mobile Internet access at speeds up<br />

to 120km/hr. Each individual technology is designed for a particular application, but their<br />

capabilities at least partially overlap. WiMax is a newer technology that promises longer ranges<br />

<strong>and</strong> mobile access. Wi-Fi has been used for ten years, but has recently been implemented in<br />

campus-<strong>wi</strong>de <strong>and</strong> city-<strong>wi</strong>de networks. Moreover 3G is trying to increase its market share in<br />

3


Internet access using the <strong>wi</strong>de availability <strong>of</strong> the cellular telephone networks. These factors make<br />

it really dif<strong>fi</strong>cult to predict the future <strong>of</strong> <strong>wi</strong>reless Internet access.<br />

In this thesis, the focus is primarily implementations <strong>of</strong> IEEE 802.11 <strong>and</strong> IEEE 802.16. In<br />

chapter 2, 3G <strong>wi</strong>ll be discussed briefly, but the low data rate <strong>of</strong> current 3G implementations limit<br />

it’s applicability for general <strong>wi</strong>reless Internet access. And for clarifying the capabilities <strong>of</strong> Wi-Fi<br />

<strong>and</strong> WiMax, this thesis <strong>wi</strong>ll include three <strong>case</strong> <strong>studies</strong>. The <strong>case</strong> <strong>studies</strong> are the FSU (<strong>Florida</strong><br />

<strong>State</strong> Univ.) campus Wi-Fi network, the city-<strong>wi</strong>de Wi-Fi network in Taipei, Taiwan, <strong>and</strong> the<br />

city-<strong>wi</strong>de WiMax network in Seoul, Korea. By comparing these three <strong>case</strong>s, the design problems<br />

<strong>and</strong> operation dif<strong>fi</strong>culties can be identi<strong>fi</strong>ed. Taipei <strong>and</strong> Seoul are both the <strong>fi</strong>rst complete city<strong>wi</strong>de<br />

<strong>wi</strong>reless network in the world. The current statuses <strong>of</strong> their networks reflect the capabilities<br />

<strong>of</strong> WiMax <strong>and</strong> Wi-Fi. By study these <strong>case</strong> <strong>studies</strong>, this paper is going to evaluate the feasibility<br />

<strong>of</strong> building a Wireless Networked City using WiMax <strong>and</strong>/or Wi-Fi.<br />

4


2.1. Introduction<br />

CHAPTER TWO<br />

2. 3G<br />

3G st<strong>and</strong>s for “third generation <strong>of</strong> mobile phone st<strong>and</strong>ards <strong>and</strong> technologies”. It was<br />

developed under the IMT-2000 program (IMT, International Mobile Telecommunication) by the<br />

International Telecommunication Union (ITU). 3G has three st<strong>and</strong>ards, WCDMA (Wideb<strong>and</strong><br />

Code Division Multiple Access), CDMA2000 <strong>and</strong> TD-SCDMA (Time Division - Synchronized<br />

Code Division Multiple Access). Also, 3G’s network is a <strong>wi</strong>de area cellular telephone network.<br />

It can provide internet access <strong>and</strong> video telephone. Compared to 2G, the 3G has higher<br />

b<strong>and</strong><strong>wi</strong>dth <strong>and</strong> faster speed. With this advantage, 3G can provide varieties <strong>of</strong> service. 3G<br />

supports both <strong>fi</strong>xed <strong>and</strong> mobile environment <strong>and</strong> is also backward compatible <strong>wi</strong>th 2G.<br />

[68][69][136] – [138]<br />

When doing vocal transmission, 3G can use Circuit S<strong>wi</strong>tch Mode for voice <strong>and</strong> video phone;<br />

for internet access/data transmission, 3G uses Packet S<strong>wi</strong>tch Mode. In this mode, users pay for<br />

how much they used, for example 0.099 cents per packet. Multimedia Message Service (MMS)<br />

is an important application <strong>of</strong> 3G. Although MMS has been applied to General Packet Radio<br />

Service (GPRS) as the 2.5G major application, <strong>wi</strong>th 3G’s advantages, <strong>wi</strong>reless communication<br />

companies can provide more choices (video, audio, pictures <strong>and</strong> text) <strong>wi</strong>th MMS.<br />

2.2. Technologies<br />

2.2.1. WCDMA<br />

WCDMA was developed by an organization called 3GPP (3 rd Generation Partnership<br />

Project, December 1998) <strong>and</strong> also a part <strong>of</strong> IMT-2000 program. The WCDMA is based on GSM<br />

(Global System for Mobile Communications/Pan-European digital cellular l<strong>and</strong> mobile<br />

telecommunication system) <strong>and</strong> GPRS. GSM is based on Circuit S<strong>wi</strong>tch Mode <strong>and</strong> GPRS is<br />

based on Packet S<strong>wi</strong>tch Mode. In Europe, WCDMA is called Universal Mobile<br />

Telecommunications System (UMTS). This technology came from the early third generation<br />

<strong>wi</strong>reless network <strong>studies</strong> in Japan <strong>and</strong> Europe. Since the GSM was such a success, Europe began<br />

actively working on developing 3G. In 1995, Europe established Advanced Communications<br />

Technologies <strong>and</strong> Services (ACTS) for research <strong>and</strong> development <strong>of</strong> 3G. Also, in Japan the<br />

Association <strong>of</strong> Radio Industries <strong>and</strong> Businesses (ARIB) was established in 1993 as a committee<br />

for studying <strong>and</strong> developing Japan’s 3G technology. The WCDMA has several versions, R99, R4,<br />

R5 <strong>and</strong> the follo<strong>wi</strong>ng ones. [69][139] – [141]<br />

5


R99 was introduced in 1999 <strong>and</strong> could support 64 kbps circuit s<strong>wi</strong>tching payload <strong>and</strong> up to<br />

2Mbps packet s<strong>wi</strong>tching payload. It is also compatible <strong>wi</strong>th GSM <strong>and</strong> GPRS services. The core<br />

network structure has two layers, Circuit S<strong>wi</strong>tch Layer <strong>and</strong> Packet S<strong>wi</strong>tch Layer. Circuit S<strong>wi</strong>tch<br />

Layer used GSM network <strong>and</strong> Packet S<strong>wi</strong>tch Layer used GPRS network. R99 inherited services<br />

<strong>and</strong> features <strong>of</strong> GSM <strong>and</strong> GPRS. The commercialized WCDMA network in the world are all<br />

based on this WCDMA Release 99 version. [69]<br />

R4 was <strong>fi</strong>nalized in March 2001. Comparing <strong>wi</strong>th R99, the network structure did not change.<br />

The most different parts were in interface setup <strong>and</strong> functions improvements. One major change<br />

was in MSC (Mobile S<strong>wi</strong>tching Center). R4 split it into two parts MSC service <strong>and</strong> MGW<br />

(Media Gateway). The idea behind this was to separate control <strong>and</strong> payload. The other major<br />

change was introducing IP transmission to Circuit S<strong>wi</strong>tch Layer. R4 is an important step to All<br />

IP network. [69]<br />

R5 was stopped upgrading in September 2002. It is a starting point <strong>of</strong> all-IP network <strong>of</strong><br />

WCDMA network. R5 supports IP transmission <strong>and</strong> services. The most important component <strong>of</strong><br />

R5 was IMS (IP Multimedia Subsystem). This subsystem can provide multimedia service based<br />

on the Internet. It is the bridge to integrate cellular system <strong>and</strong> the Internet. [69]<br />

2.2.2. CDMA2000<br />

CDMA2000 is the trade mark <strong>of</strong> TIA-USA (Telecommunication Industry Association) <strong>and</strong><br />

which developed by 3GPP2. There were several versions <strong>of</strong> CDMA, CDMA2000 1X,<br />

CDMA2000 1X EV-DO. [69][142][143]<br />

The evolution direction was the same <strong>wi</strong>th WCDMA, All IP network. Therefore, in CDMA-<br />

LMSD (Legacy MS Domain), the separation <strong>of</strong> control <strong>and</strong> payload was introduced. There are<br />

four phases in the CDMA2000 evolution. In phase 0, the main issues were to improve the present<br />

system. In phase 1/2 were to upgrade the system to become the All IP network system. In phase<br />

3, the All IP network was formed <strong>and</strong> MMD (Multimedia Domain) started to show in the system.<br />

[69]<br />

2.2.3. TD-SCDMA<br />

This st<strong>and</strong>ard was individually developed by China <strong>and</strong> co-work <strong>wi</strong>th 3GPP. Future<br />

development is still ongoing. [69] [144]<br />

6


2.3. Development<br />

3G has been in development for couple years already. During this period <strong>of</strong> time, the<br />

telecommunication industry almost crashed in Europe. 3G is a promising technology, but the<br />

over-expectation made the European telecommunication industries spend too much money on<br />

the license <strong>of</strong> b<strong>and</strong> operation, set up infrastructures <strong>and</strong> marketing. The result was that many<br />

companies cannot recoup their pr<strong>of</strong>its, <strong>and</strong> many <strong>of</strong> them had to give up the license <strong>and</strong> projects<br />

in order to lower the debt or litigate <strong>wi</strong>th government. These facts caused the development <strong>of</strong> 3G<br />

slowed down greatly in Europe. The most successful <strong>case</strong> in Asia is Japan. There are two<br />

companies running the business, NTT DoCoMo <strong>and</strong> KDDI. The NTT DoCoMo uses WCDMA<br />

<strong>and</strong> KDDI uses CDMA2000. Taiwan initialed the 3G service in 2005. In North America 3G is in<br />

sprout stage. Around the world, there are total 29 countries has 3G network so far. Figure 2-1<br />

shows the evolution steps <strong>of</strong> 3G. [69][77]<br />

Figure 2-1 The Evolution <strong>of</strong> 3G<br />

The popularization <strong>of</strong> 3G has several factors, such as the user’s habits, market positioning,<br />

applications, <strong>and</strong> infrastructures. 3G has two opponents which are Wi-Fi <strong>and</strong> WiMax. They<br />

could be partners or enemies <strong>and</strong> it all depends on applications <strong>and</strong> market positioning. These<br />

<strong>wi</strong>reless st<strong>and</strong>ards have their own advantages. 3G has bigger coverage <strong>and</strong> support mobility, but<br />

has lower data rate, <strong>and</strong> Wi-Fi has higher data rate, but smaller coverage <strong>and</strong> does not support<br />

7


mobility. On the other h<strong>and</strong>, WiMax has the biggest coverage, highest data rate <strong>and</strong> also support<br />

mobility. [69][78]<br />

The applications <strong>of</strong> 3G partially overlap <strong>wi</strong>th Wi-Fi <strong>and</strong> WiMax. 3G is a mobile phone<br />

technology, so its main stage is in the cell-phone market; internet access is only an additional<br />

bene<strong>fi</strong>t. 3G’s signal <strong>wi</strong>ll fade out fast when there are too many people in the nearby area tring to<br />

access the Internet at the same time. 3G’s interface is mainly onthrough the cell-phone.<br />

Considering the operation convenience, it is tolerable for checking or sending e-mail, time tables,<br />

or MMS. However for high throughput applications, 3G appears to be not as good as the other<br />

two st<strong>and</strong>ards. The cell-phone’s inborn limitation, keyboard <strong>and</strong> screen size, makes it unsuitable<br />

for internet access. Moreover, 3G’s data rate <strong>and</strong> b<strong>and</strong><strong>wi</strong>dth are not fast enough for internet use.<br />

2.4. Cases<br />

Japan is a successful <strong>case</strong> for 3G development <strong>and</strong> mobile Internet access <strong>and</strong> there are<br />

some unique reasons for this. Japanese 3G service was started in late 2001 called FOMA<br />

(Freedom <strong>of</strong> Mobile Multimedia Access) by NTT DoCoMo. FOMA is the br<strong>and</strong> name <strong>of</strong> NTT<br />

DoCoMo’s 3G service. As the network coverage rate became higher <strong>and</strong> higher, most Japanese<br />

started to get used to checking <strong>and</strong> sending e-mail as well as getting daily information by phones.<br />

This phenomenon especially happens during rush hours in mass transit systems. Teenagers also<br />

like to share secrets, pictures <strong>and</strong> gossip by e-mail <strong>and</strong> MMS. Therefore, FOMA has become part<br />

<strong>of</strong> life <strong>and</strong> Multimedia service is the major applications <strong>of</strong> 3G. The most popular service in Japan<br />

now is called i-mode, it was in 2G <strong>and</strong> then upgrade to 3G. [69][76] – [78]<br />

The 3G service in Korea is called JUNE. It is pushed by SKT (South Korea Telecom) in<br />

November 2002 <strong>and</strong> based on CDMA2000 1X EV-DO. Similar to Japan, it is also focused on<br />

multimedia service. In August 2003, just 8 month later, the users already increased to one million.<br />

JUNE has a music channel, video channel, MMS service <strong>and</strong> NOUL (Korean Idol). It is the <strong>fi</strong>rst<br />

service which realizes the commercial video phone-call. [69]<br />

In Taiwan, 3G cell-phones have become the main stream <strong>and</strong> the system also has upgraded<br />

completely. However, because <strong>of</strong> Wi-Fi <strong>and</strong> WiMax, telecommunication industries are still<br />

seeking where the business <strong>and</strong> balance point are. It is a true struggle in the communication<br />

market. Varieties <strong>of</strong> websites <strong>and</strong> s<strong>of</strong>tware <strong>fi</strong>t users’ different dem<strong>and</strong>s on the Internet. But <strong>wi</strong>th<br />

cell-phones, internet service is only provided by telecommunication industries <strong>and</strong> is very<br />

limited <strong>and</strong> not universal. In addition, because the cell-phones’ speci<strong>fi</strong>cations are not uni<strong>fi</strong>ed,<br />

such as in the revolution <strong>of</strong> screen resolution <strong>and</strong> numbers <strong>of</strong> buttons, it is more dif<strong>fi</strong>cult to<br />

design web pages as well as to promote the service. In Japan, the cell-phones are more uni<strong>fi</strong>ed,<br />

so it is easier to popularize mobile Internet access service. [69][76] – [78]<br />

8


2.5. Conclusion<br />

WAP (Wireless Application Protocol) is the previous model <strong>of</strong> mobile Internet access<br />

service, but it did not become as popular as “i-mode”. Poor contents <strong>and</strong> costly usage rate are<br />

two major reasons. 3G may revive it again, but it is an important lesson about the relationship<br />

between people <strong>and</strong> mobile Internet access service. Do people really need to use cell-phones to<br />

access the Internet? This is one <strong>of</strong> the key points for 3G’s future. And then after the <strong>fi</strong>nal goal <strong>of</strong><br />

3G network is done, the All IP network, what <strong>wi</strong>ll be the impact <strong>of</strong> the tele-market <strong>wi</strong>ll be an<br />

important observation point.<br />

Video phone-call is the major selling point <strong>of</strong> 3G. However there is a problem: who wants<br />

to be seen on thea phone call? Who wants to be awakened when the boss calls in the morning<br />

<strong>and</strong> be seen on the phone? Privacy is very important issue for everyone, but video phone-call has<br />

potential risk to break it. Therefore, it may take a long time for people to get used to it. In<br />

Taiwan, it has taken <strong>fi</strong>ve years to get people used to the idea <strong>of</strong> pulling over to make a phone call<br />

<strong>and</strong> talking on the street. Currently, 99.9% population in Taiwan have a cell-phone. 3G still has a<br />

long way to go, because it takes time to change life styles <strong>and</strong> in most places in the world 3G has<br />

just arrived.<br />

9


3.1. The background <strong>of</strong> IEEE 802.11<br />

CHAPTER THREE<br />

3. IEEE 802.11, Wireless LAN<br />

When, IEEE published the st<strong>and</strong>ard 802.11Wireless Local Area Network protocol in 1997, it<br />

caused a revolution in methods <strong>of</strong> communication. People started to get rid <strong>of</strong> the constraint <strong>of</strong><br />

<strong>wi</strong>res <strong>and</strong> began to enjoy the freedom <strong>of</strong> unlimited space for getting information. It changed the<br />

way that people entertain themselves, get information, communicate <strong>and</strong> so on. IEEE 802.11 has<br />

many members in its family, <strong>and</strong> there are some <strong>of</strong> them that are <strong>wi</strong>dely used such as 802.11 a,<br />

802.11b, <strong>and</strong> 802.11g. The newest incoming st<strong>and</strong>ard is 802.11n. The other name for 802.11 is<br />

called Wi-Fi. [01] - [03][22]<br />

The <strong>fi</strong>rst practical st<strong>and</strong>ard in the 802.11 family is 802.11b <strong>and</strong> it came out in 1999. The<br />

earlier st<strong>and</strong>ard 802.11 was too slow. Due to its sluggish speed, users could not experience the<br />

advantages <strong>of</strong> <strong>wi</strong>reless communication. However, 802.11b was still very successful. Its speed<br />

may be only 5.5 Mbps <strong>and</strong> 11 Mbps [04]-[06], but it was fast enough to satisfy the basic<br />

requirement for browsing the Internet. In the past two years, this st<strong>and</strong>ard has become extremely<br />

popular. As a result, a PC which can support this protocol becomes a fundamental requirement.<br />

Approximately around the same time when 802.11b came out, IEEE published another<br />

st<strong>and</strong>ard, 802.11a. These two st<strong>and</strong>ards used different operation b<strong>and</strong>s <strong>and</strong> were not compatible.<br />

[07][08] 802.11a can reach the speed 54 Mbps <strong>and</strong> has more channels in its b<strong>and</strong> to improve the<br />

b<strong>and</strong><strong>wi</strong>dth capacity for users. However, because <strong>of</strong> higher cost <strong>and</strong> the shorter transmission<br />

distance, this st<strong>and</strong>ard was only used by certain groups. [09][15]<br />

The st<strong>and</strong>ard 802.11g was developed based on 802.11b <strong>and</strong> combined <strong>wi</strong>th OFDM<br />

(Orthogonal Frequency Division Multiplexing, used in 802.11a). Theoretically, its speed could<br />

reach 54 Mbps. This st<strong>and</strong>ard was published in the summer <strong>of</strong> 2003.. [10][20] Compared to the<br />

previous two st<strong>and</strong>ards, it was faster than 802.11b <strong>and</strong> had longer transmission distance <strong>and</strong><br />

lower cost than 802.11a. It had the advantages <strong>of</strong> 802.11a <strong>and</strong> had backward compatibility <strong>wi</strong>th<br />

802.11b. [09][11][15]<br />

In the business <strong>fi</strong>eld, rebuilding is always the last choice. 802.11b has existed in the market<br />

for a long time making it un<strong>wi</strong>se to replace 802.11b <strong>wi</strong>th 802.11g. Therefore, the best method is<br />

to produce a device which can support both st<strong>and</strong>ards. Because they are compatible <strong>and</strong> operate<br />

in the same b<strong>and</strong>, this is a more cost ef<strong>fi</strong>cient option. For example Intel’s “Centrino” <strong>and</strong><br />

“Sonoma” uses this type <strong>of</strong> production. [12] – [14] Meanwhile, the 802.11a has its unique<br />

advantages <strong>and</strong> was still used in certain areas. A device that supports a/b/g st<strong>and</strong>ards is also<br />

currently available. [08][09]<br />

10


IEEE 802.11n is the newest st<strong>and</strong>ard <strong>of</strong> WLAN (Wireless Local Area Network) next<br />

generation. In January 2006, Hawaii, IEEE passed a draft <strong>of</strong> the 802.11n st<strong>and</strong>ard. However the<br />

<strong>of</strong><strong>fi</strong>cial 802.11n universal st<strong>and</strong>ard is still in discussion. There are two main groups working on it,<br />

TGn Sync <strong>and</strong> WWiSE. In order to complete the st<strong>and</strong>ard earlier, these two groups composed a<br />

team called IPT (joint proposal team). [02]<br />

The follo<strong>wi</strong>ng section is going to introduce the capabilities <strong>of</strong> IEEE 802.11a/b/g theses three<br />

st<strong>and</strong>ards. Table 3-1 shows the IEEE 802.11 st<strong>and</strong>ard family members. [01][86]<br />

Table 3-1 Family <strong>of</strong> IEEE 802.11<br />

Protocol Release Date Op. Frequency<br />

11<br />

Throughput<br />

(Typ)<br />

Data Rate<br />

(Max)<br />

Legacy 1997 2.4 GHz 0.9 Mbps 2 Mbps<br />

802.11a 1999 5 GHz 23 Mbps 54 Mbps<br />

802.11b 1999 2.4 GHz 4.3 Mbps 11 Mbps<br />

802.11g 2003 2.4 GHz 19 Mbps 54 Mbps<br />

802.11j 2004 4.9 - 5 GHz 23 Mbps 54 Mbps<br />

802.11h 2004<br />

5,15 – 5,35 indoor<br />

5,47 – 5,725 indoor/outdoor<br />

23 Mbps 54 Mbps<br />

802.11n Sept, 2008 (est.) 2.4 GHz/5 GHz 74 Mbps 248 Mbps<br />

802.11y March, 2008 (est.) 3.7 GHz 23 Mbps 54 Mbps<br />

3.2. Capacity<br />

As shown in the Table 3-2 [16], although the operation b<strong>and</strong> <strong>of</strong> 802.11b is in 2.4 GHz, the<br />

FCC (Federal Communications Commission) is only allo<strong>wi</strong>ng it to carry a certain level <strong>of</strong><br />

frequency. Therefore for the U.S. the available WLAN channels are from 1 to11. This rule is also<br />

used on 802.11g. When building a WLAN, the interference is a very important factor. To avoid<br />

interference between channels in one area, the channels should not be overlapped <strong>and</strong> the<br />

interval <strong>of</strong> the frequency must be at least 25MHz. [04][05][16] That means, when selecting a<br />

channel, the number has to be <strong>fi</strong>ve numbers apart from each other, for example, 1, 6 <strong>and</strong> 11.<br />

Thus, for 802.11b, the maximum b<strong>and</strong><strong>wi</strong>dth capacity is 3*11 = 33Mbps <strong>and</strong> for 802.11g is 3*54<br />

= 162 Mbps. [11][14][17] - [20]<br />

The UNII is the initial for ‘Unlicensed National Information Infrastructure’. This b<strong>and</strong> is<br />

only free in certain countries, such as the U.S. <strong>and</strong> Taiwan. Table 3-3 [16] In the U.S., this b<strong>and</strong><br />

is divided into three sub-b<strong>and</strong>s <strong>and</strong> then each sub-b<strong>and</strong> is split up into four non-overlap channels.<br />

Therefore, the total available channels for 802.11a are twelve. Since the 5 GHz b<strong>and</strong> is not<br />

commonly used, it has a lower level <strong>of</strong> interference. When using 802.11a to build a WLAN, one


area can have a maximum <strong>of</strong> eight non-overlap channels to use, so the overall b<strong>and</strong><strong>wi</strong>dth<br />

capacity is 8*54 = 432 Mbps. [08][09]<br />

Term<br />

St<strong>and</strong>ard<br />

Table 3- 2 Capacities for 802.11a/b/g<br />

802.11a 802.11b 802.11g<br />

B<strong>and</strong> 5 GHz 2.4 GHz 2.4 GHz<br />

Available channels 12 11 11<br />

B<strong>and</strong><strong>wi</strong>dth capacity 432 Mbps 33 Mbps 162 Mbps<br />

Coverage 75 ft. 125 ft. 155 ft.<br />

Datarate 54 Mbps Max. 11Mbps 54 Mbps<br />

Modulation OFDM DSSS<br />

Channel Number<br />

Table 3-3 IEEE 802.11b/g Channel Used for Different Countries<br />

Frequency<br />

(GHz)<br />

Japan<br />

12<br />

North<br />

America<br />

Country Name<br />

ERP-OFDM<br />

DSSS-OFDM<br />

Europe France Spain<br />

1 2.412 X Y Y X X<br />

2 2.417 X Y Y X X<br />

3 2.422 X Y Y X X<br />

4 2.427 X Y Y X X<br />

5 2.432 X Y Y X X<br />

6 2.437 X Y Y X X<br />

7 2.442 X Y Y X X<br />

8 2.447 X Y Y X X<br />

9 2.452 X Y Y X X


Table 3-3 Cont.<br />

10 2.457 X Y Y Y Y<br />

11 2.462 X Y Y Y Y<br />

12 2.467 X X Y Y X<br />

13 2.472 X X Y Y X<br />

14 2.484 Y X X X X<br />

Table 3-4 IEEE 802.11a Channel Used for North America<br />

B<strong>and</strong> (GHz) Frequency (GHz) Channel Number<br />

5.15 – 5.25<br />

UNII Lower B<strong>and</strong><br />

5.25 – 5.35<br />

UNII Middle B<strong>and</strong><br />

5.725 – 5.825<br />

UNII Upper B<strong>and</strong><br />

5.180 36<br />

5.200 40<br />

5.220 44<br />

5.240 48<br />

5.260 52<br />

5.280 56<br />

5.300 60<br />

5.320 64<br />

5.745 149<br />

5.765 153<br />

5.785 157<br />

5.805 161<br />

802.11b/g is the most <strong>wi</strong>dely used st<strong>and</strong>ard for WLAN. Because <strong>of</strong> the different operation<br />

b<strong>and</strong>, 802.11a cannot cooperate <strong>wi</strong>th b/g st<strong>and</strong>ard. Also, there are some other problems, such as<br />

its high cost for equipments. The working b<strong>and</strong> is also not free for all countries, <strong>and</strong> has a lower<br />

transmission distance. However it is still used currently, because it is fast, stable, <strong>and</strong> has high<br />

capacity. Also, some people think that the lower transmission distance makes the network more<br />

13


dif<strong>fi</strong>cultt<br />

to be hhacked;<br />

theerefore,<br />

it is populaar<br />

for somme<br />

industriies.<br />

To immprove<br />

thee<br />

competitiveness<br />

<strong>of</strong>f<br />

802.11a, rresearchers<br />

invent a tripple<br />

frequenncies<br />

chip foor<br />

a/b/g. Someone<br />

whoo<br />

works iin<br />

the <strong>of</strong><strong>fi</strong>cee<br />

<strong>wi</strong>th 802.111a<br />

can then n walk out to a public place <strong>and</strong> gget<br />

on the Innternet<br />

<strong>wi</strong>thh<br />

802.11bb/g.<br />

The neew<br />

productss<br />

make cerrtain<br />

that thhese<br />

three sst<strong>and</strong>ards<br />

caan<br />

be opera ated in onee<br />

buildingg.<br />

[7] – [9] [14]<br />

3.3. TThe<br />

Physiccal<br />

Layerr<br />

<strong>and</strong> MA AC Layer<br />

3.3.1. The Phyysical<br />

Layyer<br />

3.3.1.11.<br />

Introduuction<br />

The e Physical llayer<br />

is the <strong>fi</strong>rst layer o<strong>of</strong><br />

the OSI ( (Open Systeem<br />

Interconnnection)<br />

mmodel,<br />

<strong>fi</strong>guree<br />

3-1. It is at the boottom<br />

<strong>of</strong> thhe<br />

model. TThis<br />

layer iis<br />

responsibble<br />

for deciding<br />

the tr ransmissionn<br />

methodd,<br />

b<strong>and</strong><strong>wi</strong>dthh,<br />

mediums,<br />

bit synchronization,<br />

mmodulation<br />

<strong>and</strong> so on. MMost<br />

physic cal set up iss<br />

completted<br />

in this layer. It is the <strong>fi</strong>rst layer<br />

<strong>of</strong> the nnetwork<br />

strructure.<br />

It pprovides<br />

a mechanical m ,<br />

electrical<br />

<strong>and</strong> alsoo<br />

proceduraal<br />

flattop be etween the transmissioon<br />

mediumm.<br />

The mosst<br />

importantt<br />

missionn<br />

<strong>of</strong> the phyysical<br />

layerr<br />

is the flueency<br />

<strong>of</strong> dataa<br />

streams. TThis<br />

sectionn<br />

is going to t introducee<br />

several technologiees<br />

used for 802.11 prottocols<br />

<strong>and</strong> w<strong>wi</strong>ll<br />

discuss how they wwork<br />

in this layer.<br />

FFigure<br />

3-1 OOSI<br />

Model<br />

14


3.3.1.2. PLCP <strong>and</strong> PMD<br />

The physical layer contains two sublayers, PLCP (Physical Layer Convergence Protocol)<br />

<strong>and</strong> PMD (Physical Medium Dependent), <strong>fi</strong>gure 3-2. These two layers communicate <strong>wi</strong>th each<br />

other by SAP (Service Access Point). Different transmission methods <strong>wi</strong>ll add different<br />

preambles <strong>and</strong> headers to their own PLCP <strong>and</strong> PMD. [04] – [07][09][21]<br />

PLCP<br />

The function <strong>of</strong> PLCP is to prepare MPDU’s (MAC Protocol Data Units), also called PSDU<br />

(PLCP Service Data Unit), for communicating <strong>wi</strong>th the MAC layer. It transfers the incoming<br />

frames from mediums to the MAC layer. The PLCP is located between the PMD sublayer <strong>and</strong><br />

the MAC layer so that it can help PMD transmit frames <strong>wi</strong>thout communicating <strong>wi</strong>th the MAC<br />

layer in advance. For this purpose, PLCP <strong>wi</strong>ll map the MPDUs into PMD frames before<br />

transmission. MPDU’s contain a unique preamble <strong>and</strong> header in the physical layer, which<br />

includes the information <strong>of</strong> PHY transmitters <strong>and</strong> receivers. These kind <strong>of</strong> composited frames are<br />

called PPDU (PLCP Protocol Data Unit).<br />

PMD<br />

This sublayer is right under the PLCP. It controls the transmission <strong>and</strong> reception <strong>of</strong> the<br />

physical layer data units from stations via mediums. PMD is the interface <strong>of</strong> a layer <strong>and</strong> a<br />

physical medium. It connects <strong>wi</strong>th <strong>wi</strong>reless mediums (RF, … etc.) directly. Frames are also<br />

modulated <strong>and</strong> demodulated in this sublayer.<br />

3.3.1.3. CS/CCA<br />

Figure 3-2 802.11 PLCP, PMD <strong>and</strong> MAC Structure<br />

No matter what kind <strong>of</strong> network it is, there is one problem in common. That is how to<br />

improve effective transmission. For solving this problem, 802.11 applied CS/CCA technologies<br />

during transmission process. CS/CCA is the initial <strong>of</strong> Carrier Sense/Clear Channel Assessment.<br />

15


CS/CCA can detect the state <strong>of</strong> a medium <strong>and</strong> report it to the transmitter. It is activated when<br />

the receiver <strong>and</strong> transmitter are on but no data streams are currently passing. It determines the<br />

channel state before transmitting. If the channel is busy, it <strong>wi</strong>ll wait for a period <strong>of</strong> time, <strong>and</strong> then<br />

detect it again. CS/CCA also can detect whether a signal can or cannot be received by a receiver.<br />

[04][05][21][23]<br />

3.3.1.4. IEEE 802.11b, DSSS <strong>and</strong> HR-DSSS<br />

3.3.1.4.1. Theory <strong>and</strong> Transmission method<br />

DSSS (Direct Sequence Spread Spectrum) was <strong>fi</strong>rst added to the 802.11 st<strong>and</strong>ard in 1997. At<br />

that time the speed was only 1 Mbps <strong>and</strong> 2 Mbps. But soon, it was found that DSSS has potential<br />

to run faster. The next st<strong>and</strong>ard 802.11b <strong>wi</strong>th new DSSS came out in 1999 <strong>and</strong> ran at 5.5 Mbps<br />

<strong>and</strong> 11 Mbps. Although these four speeds are <strong>of</strong>ten combined together as one st<strong>and</strong>ard, they<br />

actually belong to two different st<strong>and</strong>ards.<br />

The principle <strong>of</strong> DSSS is to transmit a signal over a <strong>wi</strong>de frequency b<strong>and</strong>, by spreading the<br />

RF energy across a <strong>wi</strong>de b<strong>and</strong> precisely. Then a receiver can get the transmitted signal by<br />

operating the correlation process.<br />

Figure 3-3 DSSS Transmission [17]<br />

For transmitting a signal, <strong>fi</strong>rst a spreader has to flatten the amplitude <strong>of</strong> the narrowb<strong>and</strong><br />

radio signal <strong>and</strong> spread its RF energy to a <strong>wi</strong>de b<strong>and</strong>. This step includes a lot <strong>of</strong> mathematical<br />

calculations. After this process is complete, the signal <strong>wi</strong>ll look like a RF low level noise. Then<br />

when the receivers monitor the <strong>wi</strong>de frequency b<strong>and</strong> <strong>and</strong> locate the noise-like signal, they can<br />

identify it as the transmitted signals/data. The received noises <strong>wi</strong>ll be recovered by a correlator<br />

which can invert the spreading process. Since the true noise can not affect the whole b<strong>and</strong>, the<br />

correlator can spread it out <strong>wi</strong>thout damage the original signal.<br />

When modulating the DSSS data streams, 11-chips <strong>wi</strong>ll be added to the transmitted signals.<br />

A chip is a binary number <strong>and</strong> it is just only a part <strong>of</strong> encoding <strong>and</strong> transmission process. Chips<br />

do not carry any data. The chipped streams have another name called PN Codes (Pseudor<strong>and</strong>om<br />

16


Noise Codes). The most powerful consumptions <strong>of</strong> the DSSS-PHY are to generate chipped data<br />

streams <strong>and</strong> recover data streams from chipped streams. [24] – [28][16]<br />

“Spreading ratio” is an important parameter used to decide how many chips are needed for<br />

one bit. The improper spreading ratio <strong>wi</strong>ll cause the waste <strong>of</strong> b<strong>and</strong><strong>wi</strong>dth. Although to increase<br />

the spreading ratio does help the ability <strong>of</strong> recovering data, it <strong>wi</strong>ll also require higher chipping<br />

rate <strong>and</strong> larger frequency b<strong>and</strong>. And there are prices to pay for increasing the chipping rate. First<br />

is the hardware, the costly high frequency RF components <strong>and</strong> second is the cost <strong>of</strong> enlarging<br />

frequency b<strong>and</strong><strong>wi</strong>dth.<br />

The modulation method used for DSSS are DBPSK (Differential Binary Phase shift Keying)<br />

for 1 Mbps <strong>and</strong> DQPSK (Differential Quadrature Phase shift Keying) for 2 Mbps. The encoding<br />

method is Barker code. [24] – [26][16]<br />

3.3.1.4.2. Against interference<br />

To avoid interference <strong>and</strong> guarantee the fluency <strong>of</strong> the data streams, the two channels,<br />

according to 802.11 rules, must be at least 25 MHz away. The overlapped channels <strong>wi</strong>ll cause<br />

more interference <strong>and</strong> damage the transmitted frames. By using DSSS transmission the<br />

interference problem have been improved to a certain extent. During transmission, because chips<br />

have been added to the data streams, they can get protection from chips. It is exactly like the<br />

function <strong>of</strong> armor. Even if the chips are damaged, the data is still safe. However, if the<br />

interference is really strong, it can still hurt the data very badly, <strong>and</strong> then nothing can be<br />

recovered. [27][28]<br />

3.3.1.4.3. PLCP <strong>and</strong> PMD <strong>of</strong> DSSS<br />

The DSSS-PLCP adds six parts in the DSSS-PPDU. The <strong>fi</strong>rst two parts are PLCP preamble<br />

<strong>and</strong> the other four are headers. The structure is showed in Figure 3-4[21]. The data rate <strong>of</strong> DSSS-<br />

PLCP is 1 Mbps <strong>and</strong> 2Mbps. This preamble is also called a long preamble. The function <strong>of</strong> the<br />

preamble is to help a receiver to synchronize to the incoming frame. The header contains the<br />

information <strong>of</strong> the frame.<br />

The DSSS-PMD is used to operate transmission <strong>and</strong> reception between stations. It is also in<br />

charge <strong>of</strong> modulating <strong>and</strong> de-modulating the PPDUs. The relationship between PLCP <strong>and</strong> PMD<br />

is like a brain <strong>and</strong> a body. PMD is response for action <strong>and</strong> PLCP gives an order. [04] –<br />

[06][16][21]<br />

17


3.3.1.4.4. HR-DSSS <strong>and</strong> CCK<br />

Figure 3-4 DSSS PLCP<br />

The original modulation method (Barker code) used in DSSS, for 802.11, only achieved the<br />

speeds <strong>of</strong> 1 <strong>and</strong> 2 Mbps. For commercial use, this is not an acceptable amount. In the data stream,<br />

each barker word carries one or two bits depending on the data rate. To improve the speed, it is<br />

necessary to increase the capacity <strong>of</strong> each symbol. That means more complicated phase angle<br />

changes. For example, the DQPSK receiver could at least detect four cycle phase differences.<br />

More cycle phase differences <strong>wi</strong>ll cause the smaller phase changes. It ends up <strong>wi</strong>th the need <strong>of</strong> a<br />

highly accurate <strong>and</strong> costly receiver.<br />

Therefore, the next st<strong>and</strong>ard 802.11b had a different modulation method known as<br />

Complementary Code Keying (CCK). This method splits the data stream into code symbols<br />

composed <strong>wi</strong>th 8 bits. By a complex mathematic procedure, the CCK can encode four or eight<br />

bits per code word <strong>wi</strong>th 8-bit code symbols. Also, this procedure can help receivers to identify<br />

different codes easily, even in interference or a multipath fading environment. By using the CCK<br />

process, the speed can reach 5.5 Mbps or 11 Mbps.<br />

The process <strong>of</strong> CCK is quite similar to the DS chipping process. Figure 3-5[17]. The<br />

difference between them is that CCK does not use the static repeating code word, as for example,<br />

Barker Code. The code word is converted from the data. These code words are used to transmit<br />

data <strong>and</strong> spread the signal. Phase angle also plays an important role here, but this time it <strong>wi</strong>ll not<br />

cost as much as DQPSK.<br />

18


Figure 3-5 CCK Modulation<br />

HR-DSSS PHY is de<strong>fi</strong>ned as the data rate equal to 5.5 or 11 Mbps. It also contains two<br />

parts, PLCP <strong>and</strong> PMD. PLCP is in charge <strong>of</strong> framing <strong>and</strong> PMD is response for transmission.<br />

3.3.1.4.5. PLCP <strong>and</strong> PMD <strong>of</strong> HR-DSSS<br />

The structure <strong>of</strong> HR-DSSS PLCP is show in Figure 3-6[17]. It is very similar to DSSS-<br />

PLCP, the only difference being in preamble. Its preamble is called short preamble. This kind <strong>of</strong><br />

preamble could improve the ef<strong>fi</strong>ciency <strong>of</strong> PLCP framing.<br />

For backward compatibility, the HR-DSSS PMD can support both low (1, 2 Mbps) <strong>and</strong> high<br />

(5.5, 11 Mbps) transmission. The only difference is low speed must uses long preamble while<br />

high speed uses short one. In addition, for high speed, the framed data <strong>wi</strong>ll be encoded by CCK<br />

modulation before transmitting. At 5.5 Mbps, each symbol has four data bits <strong>and</strong> at 11 Mbps,<br />

each symbol has eight data bits.<br />

Figure 3-6 HR/DSSS PLCP Framing<br />

19


3.3.1.5. IEEE 802.11a <strong>and</strong> OFDM<br />

3.3.1.5.1. Background<br />

Because there are lots <strong>of</strong> non-802.11 signals that also existed in the 2.4 GHz b<strong>and</strong>, this b<strong>and</strong><br />

is <strong>of</strong>ten very crowded. For achieving higher speed <strong>and</strong> capacity, 802.11 Task group A (TGa)<br />

came out <strong>wi</strong>th a new st<strong>and</strong>ard. It used a 5 GHz un-licensed b<strong>and</strong> <strong>and</strong> a different transmission<br />

method (OFDM). Although this st<strong>and</strong>ard was published in 1999, the practical hardware was not<br />

available until the end <strong>of</strong> 2001. At <strong>fi</strong>rst, 802.11a used the UNII b<strong>and</strong> <strong>and</strong> was speci<strong>fi</strong>ed for the<br />

U.S. only. Later, two similar st<strong>and</strong>ards were published. 802.11h is for Europe <strong>and</strong> 802.11j is for<br />

Japan. [08][30][31][43][44]<br />

OFDM (Orthogonal Frequency Division Multiplexing) was developed in the late 1960s. It is<br />

not a new theory however, because <strong>of</strong> the <strong>wi</strong>reless technology it revived again. OFDM has<br />

several features. First, it uses multiple subcarriers to do a single transmission. Second, for<br />

simplifying equalization at receiver, it transforms scattered channels into parallel narrowb<strong>and</strong><br />

subchannels. Third it is based on simple mathematics. OFDM is related <strong>wi</strong>th FDM (Frequency<br />

Division Multiplexing), that both divide b<strong>and</strong><strong>wi</strong>dth into divisions which is called carriers or<br />

subcarriers <strong>and</strong> use them for transmitting information. [08][17][29][33][36]<br />

3.3.1.5.2. Principles<br />

When transmitting data, OFDM chooses channels which overlap in frequency domain, but<br />

<strong>wi</strong>ll not disturb <strong>wi</strong>th each other. Figure 3-7[17] These overlapping subcarriers are de<strong>fi</strong>ned by<br />

mathematical calculation, therefore, they can travel individually, <strong>and</strong> this relationship is called<br />

orthogonal. With this feature, OFDM can increase capacity in the <strong>fi</strong>xed b<strong>and</strong><strong>wi</strong>dth. Thus the<br />

overall performance is improved. [08][17][29]<br />

Figure 3-7 FDM <strong>and</strong> OFDM<br />

Although OFDM has better performance, there is still a cost. Inter-symbol interference (ISI)<br />

is a common problem when transmitting data. It mainly occurs when the delay that happens in<br />

different paths is too large <strong>and</strong> causes a later copy to shift onto a previously arrived copy. The<br />

20


other problem is inter-carrier interference (ICI). When several subcarriers transmit in a channel<br />

<strong>and</strong> one <strong>of</strong> them shifts slightly then the interference between subcarriers would be occurred.<br />

To avoid these problems, scientists came out <strong>wi</strong>th several methods. The <strong>fi</strong>rst method was to<br />

add a “guard time” between each subcarrier. A guard time is a silent period between two<br />

subcarriers, however this method wastes b<strong>and</strong><strong>wi</strong>dth <strong>and</strong> once the delay is too large then the<br />

orthogonality would be destroyed. The other way to avoid interference is using “cyclic pre<strong>fi</strong>x<br />

(CP)” <strong>and</strong> “cyclic post<strong>fi</strong>x (PP)”. Figure 3-8[51] CP is a guard interval between the signal N <strong>and</strong><br />

the signal N-1. PP is an interval in signal N+1 <strong>and</strong> N. The idea <strong>of</strong> CP is to extend the time range<br />

<strong>of</strong> signal N longer, so that even if interference happened it <strong>wi</strong>ll not affect FFT block which is the<br />

information section <strong>of</strong> a signal carried. However, sometimes the problem not only comes from<br />

the previous signal, therefore, the guard interval <strong>wi</strong>ll have two parts “cyclic pre<strong>fi</strong>x” <strong>and</strong> “cyclic<br />

post<strong>fi</strong>x”. Here are some other <strong>studies</strong> about OFDM <strong>and</strong> interference: [30] – [40]<br />

Figure 3-8 CP <strong>and</strong> PP<br />

OFDM modem is based on block-by-block structure. The transmitter <strong>fi</strong>rst converts the signal<br />

into N subcarriers <strong>and</strong> then uses IFFT (inverse Fast Fourier Transform) to modulate them into<br />

orthogonal waveforms. The receiver reverses the process by using FFT (Fast Fourier Transform).<br />

It <strong>wi</strong>ll remove CP <strong>fi</strong>rst <strong>and</strong> <strong>fi</strong>nd the FFT block. Then it starts using FFT to demodulate the signal<br />

that has received. Finally, the information is recovered. Figure 3-9[51]<br />

OFDM has higher capacity <strong>and</strong> is more reliable than some <strong>of</strong> other methods. The<br />

mathematics <strong>of</strong> OFDM is FFT <strong>and</strong> IFFT; <strong>and</strong> they are not complicated. With FFT, the operation<br />

number in each signal is on the order <strong>of</strong> NlogN. This can be done easily by a program. That is<br />

the reason that OFDM is broadly used in <strong>wi</strong>reless technology. [34][36] - [39]<br />

21


Figure 3-9 OFDM Modem<br />

3.3.1.5.3. The IEEE 802.11a’s OFDM <strong>and</strong> its PLCP <strong>and</strong> PMD<br />

OFDM is a good transmission technology, but TGa did not use the full version. They<br />

modi<strong>fi</strong>ed their own one.<br />

When building an OFDM network, there are some important parameters which are<br />

b<strong>and</strong><strong>wi</strong>dth, delay <strong>and</strong> bit rate. The b<strong>and</strong><strong>wi</strong>dth is <strong>fi</strong>xed for 802.11a. When considering delay, it is<br />

necessary to have guard time. Usually the ratio <strong>of</strong> guard time <strong>and</strong> delay is two to four times as<br />

big. And the symbol time is <strong>fi</strong>ve times <strong>of</strong> the guard time. Thus TGa chose 800 ns as guard time<br />

<strong>and</strong> 4 µs as symbol time. The b<strong>and</strong><strong>wi</strong>dth <strong>of</strong> an operation b<strong>and</strong> is 20 MHz <strong>and</strong> the theoretical<br />

highest speed is 54 Mbps. Higher capacity could have higher throughput. However it <strong>wi</strong>ll<br />

decrease the number <strong>of</strong> operation channels. Therefore, how to achieve a reasonable balance is an<br />

important design issue. [17][29] - [31][39]<br />

The modulation technology for OFDM is shown in Table 3-4[17]. To reach a higher speed,<br />

TGa has not only changed the transmission method, but also used another modulation technology<br />

QAM (Quadrature Amplitude Modulation). Figure 3-10[55] For preventing the BER (Bit Error<br />

Rate) increase which caused by certain channel’s signal fading, the error correction code is<br />

added to the all sub-channels. The error correction code is called “Convolutional Code”, <strong>and</strong> this<br />

kind <strong>of</strong> OFDM sometimes is named COFDM (Coded OFDM). Here is the related research:<br />

[36][39][40] – [42]<br />

22


Tab ble 3-5 OFDDM<br />

Modulaation<br />

<strong>and</strong> Daata<br />

Rate<br />

Figure 3-10<br />

Constellaations<br />

Diagrram<br />

The e OFDM-PLLCP<br />

structuure<br />

is shownn<br />

in Figure 3-11[21]. TThe<br />

preamblle<br />

contains 12 symbolss<br />

<strong>and</strong> is uused<br />

to synnchronize<br />

<strong>wi</strong>th w a receivver.<br />

The duration<br />

time <strong>of</strong> an OFDDM<br />

preamb ble is 16 µs.<br />

There aare<br />

two parrts<br />

<strong>of</strong> the prreamble;<br />

shhort<br />

trainingg<br />

sequence (the <strong>fi</strong>rst tten<br />

symbols s) <strong>and</strong> longg<br />

trainingg<br />

sequence ( (the rest tw wo symbols) ). The short one is usedd<br />

to create AAGC<br />

(Auto omatic Gain n<br />

Controll),<br />

timing annd<br />

initial freequency<br />

<strong>of</strong>ffset<br />

estimatiion<br />

<strong>of</strong> the carrier<br />

signaal.<br />

The long one is used d<br />

23


for the channel, timing <strong>and</strong> <strong>fi</strong>ne frequency <strong>of</strong>fset estimation. The Head contains two parts, the<br />

signal <strong>and</strong> data’s service section. The head is 40 bits long (signal is 24 bits plus service 16 bits).<br />

The signal <strong>fi</strong>eld is always transmitted <strong>wi</strong>th BPSK at 6 Mbps.<br />

Figure 3-11 OFDM PLCP Structure<br />

In the OFDM-PMD sub-layer, to maintain the speed 6, 12 <strong>and</strong> 24 Mbps is required. An<br />

operation channel (20 MHz b<strong>and</strong><strong>wi</strong>dth) is divided into 52 sub-channels (sub-carriers). Four <strong>of</strong><br />

them are pilot carriers; the rest <strong>of</strong> the 48 sub-channels are used to transmit data. The data <strong>wi</strong>ll be<br />

divided <strong>and</strong> modulated into sub-channels, then transmitted parallel. [17][21][29]<br />

3.3.1.6. IEEE 802.11g <strong>and</strong> the Physical Layer<br />

3.3.1.6.1. Background <strong>and</strong> Backward Compatibility<br />

As 802.11b became more <strong>and</strong> more popular, people started to notice the convenience <strong>of</strong><br />

<strong>wi</strong>reless LAN. At that time, 802.11b could only provide a maximum 11Mbps. Compared to<br />

Ethernet, this was not a good performance – it was just barely acceptable. When 802.11a started<br />

to join the market, end users also wanted 802.11b to become faster. In fact, 54 Mbps really was<br />

not very fast <strong>and</strong> most <strong>of</strong> the time, in a wonderful environment, the performance could only<br />

achieve 50% <strong>of</strong> the possible speed. However WLAN has its own advantages <strong>and</strong> “<strong>wi</strong>reless” has<br />

become a trend gradually. Under these conditions, 802.11g is the answer. It has the same speed<br />

<strong>wi</strong>th 802.11a, but it has a longer area <strong>of</strong> coverage. Moreover, it operates in the 2.4 GHz b<strong>and</strong>.<br />

According to 802.11g clause, this st<strong>and</strong>ard is not a “new” st<strong>and</strong>ard. It is an integrated<br />

st<strong>and</strong>ard using many existing technologies. Its physical layer is called ERP (Extended Rate PHY)<br />

24


<strong>and</strong> contains DSSS, CCK, PBCC (Packet Binary Convolution Coding) <strong>and</strong> OFDM. It supports<br />

the speed:<br />

ERP-DSSS: 1, 2, 5.5 <strong>and</strong> 11 Mbps<br />

ERP-PBCC: 22 <strong>and</strong> 33Mbps<br />

ERP-OFDM: 6, 9, 12, 18, 24, 36, 48 <strong>and</strong> 54 Mbps (6, 12 <strong>and</strong> 24 Mbps are m<strong>and</strong>atory)<br />

For backward compatibility, these methods have some slight changes, but are pretty much the<br />

same original st<strong>and</strong>ard. An 802.11g stationary must have the ability to communicate <strong>wi</strong>th both<br />

old 802.11b stations <strong>and</strong> other 802.11 stations. For that reason, the ERP-DSSS <strong>and</strong> ERP-CCK<br />

were added.<br />

A problem <strong>of</strong> backward compatibility is that the 802.11g can receive <strong>and</strong> decode 802.11b<br />

signals, but the converse is not true. Therefore a protection has to be added to the 802.11g<br />

st<strong>and</strong>ard. The <strong>fi</strong>rst part <strong>of</strong> the protection is that when doing transmission <strong>wi</strong>th 802.11b stations,<br />

the Beacon frames cannot be transmitted higher than 11 Mbps. The second part is to avoid<br />

network interference between 802.11b <strong>and</strong> 802.11g. When 802.11g is transmitting data, in order<br />

to avoid disturbing 802.11b, it <strong>wi</strong>ll send CTS (Clear To Send) frames to notify the 802.11b<br />

stations <strong>and</strong> update the NAV (Network Allocation Vector).This process is called CTS-self<br />

Protection. To make sure every station in the network can receive <strong>and</strong> process the CTS frames,<br />

they have to be sent under 802.11b protocol. The protection is controlled by the ERP information<br />

element in Beacon frames <strong>and</strong> <strong>wi</strong>ll limit the data rate <strong>of</strong> 802.11g. [13][14][17][20][21][29]<br />

3.3.1.6.2. ERP-OFDM <strong>and</strong> DSSS-OFDM<br />

The ERP-OFDM is very similar to the OFDM used in 802.11a <strong>wi</strong>th only a slight difference.<br />

The PLCP is shown in Figure 3-12[21]. When comparing these two OFDM-PLCP, the difference<br />

is the “signal extension” <strong>fi</strong>eld. This 6µs extra time is used to prepare <strong>and</strong> decode the 802.11a<br />

frames. 802.11a uses 16 µs SIFS (Short Inter-Frame Space) which is different form 802.11b 10<br />

µs SIFS. 802.11g chooses 10 µs because <strong>of</strong> backward compatibility, therefore, it adds 6 µs after<br />

a frame to match timing <strong>and</strong> frame <strong>wi</strong>th 802.11a. Beside the PPDU structure, the transmission<br />

method is exactly the same <strong>wi</strong>th 802.11a.<br />

25


Figure 3-12 DSSS-OFDM PSDU Format<br />

DSSS-OFDM is a composite framing technology. Its PPDU structure is shown in Figure 3-<br />

13[21] <strong>and</strong> Figure 3-14[21]. The preamble <strong>and</strong> head are framed by HR-DSSS mode, <strong>and</strong> the<br />

PSDU is the ERP-OFDM PPDU. The preamble has long <strong>and</strong> short formats. With this method,<br />

the protection is not required. The data rate <strong>of</strong> DSSS-OFDM preamble <strong>and</strong> head is the same <strong>wi</strong>th<br />

DSSS. [13][14][17][20][21][29]<br />

Figure 3-13 DSSS-OFDM Long Preamble Structure<br />

26


3.3.2. MAC Layer<br />

3.3.2.1. Introduction<br />

Figure 3-14 DSSS-OFDM Short Preamble Structure<br />

In the human world, laws are the tools to avoid arguments <strong>and</strong> accidents <strong>and</strong> it is the same<br />

<strong>wi</strong>th networks. Wireless transmission has many problems such as interference, fading, collision,<br />

<strong>and</strong> security. In the MAC (Media Access Control) layer, the 802.11 working group, established a<br />

variety <strong>of</strong> rules <strong>and</strong> functions to improve system performance <strong>and</strong> solve these problems.<br />

3.3.2.2. DCF (Distributed Coordination Function) <strong>and</strong> PCF (Point<br />

Coordination Function)<br />

DCF is the core <strong>of</strong> CSMA/CA <strong>and</strong> most <strong>of</strong> the transmissions using 802.11 st<strong>and</strong>ards are<br />

based on it. With DCF, there is no central control. Stations have to compete for the use <strong>of</strong><br />

channels. Any transmissions using CSMA/CA (Carrier Sense Multiple Access/Collision<br />

Avoidance) belongs to DCF type transmission. The other mode, PCF, is a central control type.<br />

With PCF, a base station controls all transmission orders; therefore there is no competition <strong>and</strong><br />

collisions in this mode. The base station <strong>wi</strong>ll poll other stations to see if they have frames to send.<br />

The polling frequency <strong>and</strong> order are decided by a polling list, which is not equaled. Any station<br />

<strong>wi</strong>ll be added to the list after connecting to the base station. [17][55]<br />

27


3.3.2.3. Hidden node <strong>and</strong> CSMA/CA<br />

When a station is communicating <strong>wi</strong>th another station, there is an existing risk that the<br />

packets may collide. It is due to the hidden node problem. Each station has limited coverage, so<br />

stations may not be aware <strong>of</strong> the other nearby stations. Thus if there are more than two stations<br />

that try to transmit a signal to the same station at the same time, <strong>and</strong> then the collision <strong>wi</strong>ll<br />

happen. In Figure 3-15, station A <strong>and</strong> C are hidden nodes to each other. If station A is sending a<br />

signal, station C cannot be aware <strong>of</strong> it. Since most stations are half-duplex (cannot transmit <strong>and</strong><br />

listen at the same time), the collision is dif<strong>fi</strong>cult to be detected. In Figure 2-17, it shows that only<br />

station B knows collisions happened. [17][55]<br />

Figure 3-15 The Hidden Node Problem<br />

To deal <strong>wi</strong>th this problem, 802.11 WG uses a different method from Ethernet. With <strong>wi</strong>red<br />

transmission they use CSMA/CD (Carrier Sense Multiple Access/Collision Detection), but since<br />

the <strong>wi</strong>reless transmission has very limited resource <strong>and</strong> is not as reliable as Ethernet, 802.11 WG<br />

turns to use collision avoidance (CSMA/CA).<br />

There are two technologies used in CSMA/CA, physical channel sensing <strong>and</strong> virtual channel<br />

sensing. [17][55]<br />

Physical channel sensing<br />

When a station wants to send signals, for example, it senses the channel <strong>fi</strong>rst. If the channel<br />

is idle, it just sends. During the transmission, it <strong>wi</strong>ll not sense the channel at the time, but keeps<br />

sending signals. However if the channel is busy, it <strong>wi</strong>ll wait until the channel is idle <strong>and</strong> then<br />

start the transmission. Once a collision occurs, the stations <strong>wi</strong>ll wait for certain time, by using the<br />

Ethernet binary exponential back <strong>of</strong>f algorithm, <strong>and</strong> then try again later. [17][55]<br />

28


Virtual channel sensing<br />

he other method, virtual channel sensing, is shown in <strong>fi</strong>gure 3-16 [55] <strong>and</strong> <strong>fi</strong>gure 3-17[55].<br />

When station A wants to send signals to station B, it <strong>wi</strong>ll send a RTS (Request to Send) frame to<br />

the station to occupy a channel <strong>fi</strong>rst. If the channel is idle, station B <strong>wi</strong>ll send CTS (Clear to Send)<br />

frame back. When station A receives CTS, it <strong>wi</strong>ll start to transmit a signal. When the process is<br />

initiated, an important “timer” is including in RTS <strong>and</strong> CTS frame which called NAV (Network<br />

Allocation Vector). The information that is included in NAV is how long the channel <strong>wi</strong>ll be<br />

occupied. One operation contains RTS, CTS, data frames <strong>and</strong> ACK (Acknowledgement). NAV<br />

<strong>wi</strong>ll set how long it <strong>wi</strong>ll take including the last ACK frame. Therefore, since station D is <strong>wi</strong>thin<br />

the range <strong>of</strong> station A, it <strong>wi</strong>ll receive RTS <strong>and</strong> then stop completely from occupying the channel<br />

until NAV counter becomes zero. It is the same <strong>wi</strong>th station D. Station C <strong>wi</strong>ll receive CTS, so it<br />

<strong>wi</strong>ll also wait until the operation is completed. However, before the ACK is received by station<br />

A, the NAV is expired. Then the operation has to run again. [17][55]<br />

Figure 3-16 CDMA/CA<br />

Figure 3-17 Virtual Channel Sensing<br />

29


3.3.2.4. Fragmentation<br />

In most occasions, the frames from the upper layer maybe longer than the fragmentation<br />

threshold. In this situation, the frames have to be fragmented before transmitting. The advantages<br />

for using fragmentation are that it can improve throughput <strong>and</strong> reliability. By fragmenting frames,<br />

the interference only destroys small pieces <strong>of</strong> frames, but not the entire frames. Thus the overall<br />

effective transmission is improved. Also, only the destroyed pieces need to be retransmitted,<br />

therefore, the reliability is also improved.<br />

The transmission process <strong>of</strong> fragmented frames is called fragmentation burst. In the clause,<br />

there are no rules for fragmentation threshold. It depends on network designers. During the<br />

transmission, each fragment has the same frame sequence number <strong>and</strong> an increasing fragment<br />

number for recombination. To keep occupying the channel for completing fragmentation burst,<br />

each fragment <strong>wi</strong>ll reset the NAV for next fragment including ACK. Figure 3-18[55]. [17][55]<br />

3.3.2.5. Interframe spacing<br />

Figure 3-18 A Fragment Burst<br />

Interframe spacing is a very important protocol for coordinating medium access. There are<br />

four different intervals which are shown in <strong>fi</strong>gure 3-19[55]. To avoid collision, stations wait a<br />

certain period <strong>of</strong> time until channels are idle before transmission. These different intervals decide<br />

the priority for different types <strong>of</strong> transmission. High priority transmissions wait a shorter amount<br />

<strong>of</strong> time, so it can occupy the channel <strong>fi</strong>rst. [17][55]<br />

30


SIFS (Short InterFrame Spacing)<br />

Figure 3-19 Frame Interval for IEEE 802.11<br />

This is the shortest interval <strong>and</strong> mainly used for high priority transmission; including a<br />

receiver sends CTS back to a transmitter, a receiver sends an ACK for a fragment or a full frame<br />

<strong>and</strong> a transmitter <strong>of</strong> a fragmentation burst send the next fragment <strong>wi</strong>thout sending RTS again.<br />

PIFS (PCF InterFrame Spacing)<br />

This interval is used for competition-free transmission by PCF. If the SIFS interval passed<br />

<strong>and</strong> no stations occupy the channel, after PIFS, the base station <strong>wi</strong>ll send a poll frame or a<br />

beacon frame. Any stations which have data or fragment sequence waiting for transmitting can<br />

start to send after PIFS <strong>wi</strong>thout disturbance or competition.<br />

DIFS (DCF InterFrame Spacing)<br />

After DIFS, every station can start to compete for earning the channel usage <strong>and</strong> then the<br />

<strong>wi</strong>nner takes all. The all transmission rules <strong>and</strong> Ethernet binary exponential back <strong>of</strong>f algorithm<br />

are applied.<br />

EIFS (Extended InterFrame Spacing)<br />

This is only used when a mistake has happened during a transmission.<br />

3.3.2.6. Power saving<br />

To extend the battery’s life <strong>of</strong> the MS (Mobile Station), the 802.11 MAC layer provides a<br />

power management protocol. A base station can direct a MS to go into the sleep mode <strong>and</strong> buffer<br />

frames for it. Later the MS could be awakened by a base station which sends a beacon frame or a<br />

31


user. The awakened MS <strong>wi</strong>ll send a PS-Poll frame to the base station to get the buffered frames.<br />

The base station can choose either immediate response or deferred response to the MS. [17][55]<br />

The immediate response means the BS (Base Station) <strong>wi</strong>ll send the buffered frames to MS<br />

after SIFS interval. If the BS chooses a deferred response, it <strong>wi</strong>ll send an ACK frame back to MS<br />

<strong>fi</strong>rst, <strong>and</strong> then transmit data frames later. After sending the PS-Poll frame, the MS must stays<br />

awake until the whole process is over. The BS noti<strong>fi</strong>es the MS for buffered frames by sending a<br />

beacon frame. The buffered frames may be fragmented for transmission. [17][55]<br />

3.3.2.7. Security<br />

This is a very important part for the whole MAC layer design. So far the most <strong>wi</strong>dely used<br />

security procedure for <strong>wi</strong>reless communication is WEP (Wired Equivalent Privacy). WEP uses<br />

RC4 cipher to encrypt data. The RC4 cipher is a kind <strong>of</strong> symmetric stream cipher; it generates a<br />

keystream <strong>and</strong> then uses the XOR algorithm to mix <strong>wi</strong>th data to produce the ciphertext stream.<br />

The receiver <strong>wi</strong>ll use the same XOR algorithm to recover original data. To encrypt the data, the<br />

secret key has to be chosen <strong>fi</strong>rst <strong>and</strong> then extended to the same size <strong>of</strong> data by PRNG<br />

(Pseudor<strong>and</strong>om Number Generator). This extended secret key is called keystream. For<br />

recovering data, both transmitters <strong>and</strong> receivers must have the same secret key <strong>and</strong> PRNG, <strong>and</strong><br />

how to distribute the secret key is an important issue; sometimes it may be preloaded by system<br />

designers or manufacturers. The other issue is “key to keystream expansion” <strong>of</strong> RC4 stream<br />

cipher, because the safety is dependent upon on how r<strong>and</strong>om it is. [17][55]<br />

The communication security has three major properties: con<strong>fi</strong>dentiality, integrity <strong>and</strong><br />

authentication. Con<strong>fi</strong>dentiality is needed to protect data from being stolen by unauthorized<br />

people. Integrity is used to make sure the data has not been changed during transmission. This<br />

part is dependent on CRC code. Finally, authentication is the foundation <strong>of</strong> all security<br />

procedures. For transmitting data, the users must be trusted <strong>and</strong> the source must be reliable.<br />

Other<strong>wi</strong>se, authorization <strong>and</strong> access control <strong>wi</strong>ll not be allowed. [17][55]<br />

RC4 shared secret key is composed by 40-bit shared secret <strong>and</strong> 24-bit IV (Initialization<br />

Vector) usually called 64-bit WEP <strong>and</strong> the other one is 128-bit WEP. When framing a frame,<br />

WEP <strong>wi</strong>ll generate an ICV (Integrity Check Value) which is a hash value to combine <strong>wi</strong>th<br />

payload as an original data. This ICV can use to protect data from unauthorized changes. After<br />

entering the original payload, secret key <strong>and</strong> IV, WEP can generate an encrypted frame for<br />

transmission in either secure or not secure network. Figure 3-20[17] shows the frame structure<br />

<strong>and</strong> operation <strong>of</strong> WEP. Figure 3-21[55] shows the encryption process. [17][55]<br />

32


Figure 3-20 WEP Frame <strong>and</strong> Operation<br />

Figure 3-21 The WEP Encryption Process<br />

However there is no perfect encryption in the world. There are some problems that exist in<br />

WEP; key management, reusing the keystream, <strong>and</strong> IV. WEP has been thought <strong>of</strong> as a very<br />

secure way to protect <strong>wi</strong>reless communication. However, a study from University <strong>of</strong> California,<br />

Berkeley called ISAAC (Internet Security Applications, Authentication <strong>and</strong> Cryptography)<br />

showed the defects <strong>of</strong> WEP design [56]. Also a method for breaking WEP has already been<br />

published [57].<br />

33


The reason that WEP was safe was because the secret key was not easily broken. However<br />

in some <strong>case</strong>s, the network designers use the same shared key for all users. That means that<br />

people can read each other’s packets. That is not good for security. If it is a small network, trying<br />

to use the different keys for each user should not be a big problem, but if it is a big network, for<br />

security reasons, if a secret key changes once in a period <strong>of</strong> time, it is a huge job. How to<br />

distribute a secret key <strong>and</strong> how to assure it is not repeated are very important issues at this point.<br />

Moreover, IV is another potential risk. The WEP protocol recommends that the IV value should<br />

be different for every packet to avoid the keystream attack. If IV is not a r<strong>and</strong>om value, the<br />

encryption <strong>wi</strong>ll be broken easily. Unfortunately some <strong>wi</strong>reless network cards set the initial IV as<br />

0 <strong>and</strong> increase the number by one for each packet sent. With this kind <strong>of</strong> IVs, to break the<br />

encryption is way too easy. Unless the secret key is changed <strong>of</strong>ten or assuring the use <strong>of</strong> r<strong>and</strong>om<br />

<strong>and</strong> different IV for each packet, the risk <strong>wi</strong>ll remain high. If a hacker collects enough packets<br />

<strong>wi</strong>th repeated IV from the same user, the cipher <strong>wi</strong>ll be broken. [17][55]<br />

3.4. The next generation st<strong>and</strong>ard<br />

3.4.1. IEEE 802.11n<br />

IEEE 802.11n is the st<strong>and</strong>ard <strong>of</strong> WLAN for next generation which also called Wi-Fi<br />

(Wireless <strong>fi</strong>delity). This st<strong>and</strong>ard was initiated in 2004 by TGn. The goal <strong>of</strong> this st<strong>and</strong>ard was to<br />

improve the net transmission speed up to 100 Mbps. In the beginning, there were six proposals<br />

that had been posted. After many discussions, there were only two proposals left <strong>and</strong> they were<br />

from TGnSync <strong>and</strong> WWiSE. These two groups have their own support from chip makers.<br />

TGnSync has Athero, Agere, Marvell <strong>and</strong> Intel, while WWiSE has Airgo, Broadcom, Conexant<br />

<strong>and</strong> Texas Instruments. The <strong>fi</strong>rst draft was approved in March 2006 <strong>and</strong> draft 2.0 was approved<br />

in March 2007. Since the dem<strong>and</strong>s from the market are becoming higher, Wi-Fi Alliance decided<br />

to start to certifying IEEE 802.11n products based on the draft 2.0 in summer 2007. Now, these<br />

pre-n products are already in stores, such as routers <strong>and</strong> network cards for desktops or notebooks.<br />

The <strong>of</strong><strong>fi</strong>cial approval <strong>of</strong> IEEE 802.11n st<strong>and</strong>ard had been delayed many times because TGnSync<br />

<strong>and</strong> WWiSE kept <strong>fi</strong>ghting for their own proposal to become the <strong>of</strong><strong>fi</strong>cial st<strong>and</strong>ard. However, they<br />

<strong>fi</strong>nally agreed to propose a merged proposal to speed up the birth <strong>of</strong> <strong>of</strong><strong>fi</strong>cial IEEE 802.11n<br />

st<strong>and</strong>ard. Therefore, the IEEE 802.11n st<strong>and</strong>ard may be <strong>fi</strong>nally approved in early 2008. [17] [65]<br />

[66]<br />

Actually, the ideal <strong>of</strong> these two groups have may be different, but the technologies are the<br />

same. TGnSync emphasizes on improving the peak data rate <strong>and</strong> WWiSE wants to ameliorate<br />

the MAC-layer. Both <strong>of</strong> them can reach the goal, or even much better than that. The common<br />

points are they both use MIMO-OFDM as the transmission function <strong>and</strong> support the b<strong>and</strong><strong>wi</strong>dth<br />

for both 20 MHz <strong>and</strong> 40 MHz. IEEE 802.11n PHY-layer is extended from IEEE 802.11a PHYlayer.<br />

So it is also an OFDM-based PHY-layer <strong>and</strong> just introduced MIMO technology to increase<br />

the speed. [17] [61]-[66]<br />

34


3.4.2. MIMO (Multiple-Input/Multiple-Output)<br />

Usually, the IEEE 802.11 air-interface only transmits data <strong>wi</strong>th single antenna. Although<br />

some systems use two antennas, systems that only use the one have the best performance.<br />

Therefore, no matter how many antennas that systems has, there is only one used to transmit <strong>and</strong><br />

receive data, <strong>and</strong> there is only one input chain <strong>and</strong> one output chain.<br />

The basic operation <strong>of</strong> MIMO is to distribute the RF chain to every system antenna <strong>and</strong> each<br />

RF chain can do simultaneous transmission <strong>and</strong> reception. This can enormously increase<br />

throughput. Moreover simultaneous receiver processing can solve multipath interference <strong>and</strong><br />

improve the quality <strong>of</strong> the received signals. A frame can be split, multiplexed <strong>and</strong> then<br />

transmitted by more than one spatial stream. The antenna con<strong>fi</strong>guration <strong>of</strong> MIMO usually<br />

express as “YxZ “format. For example, in both TGnSync <strong>and</strong> WWiSE proposals require “2x2”<br />

operation, which means there are two transmit chains, two receiving chains <strong>and</strong> two spatial<br />

streams. That is m<strong>and</strong>atory mode in both proposals <strong>and</strong> there is optional mode included. [17]<br />

When setting up hardware, the BS <strong>and</strong> end users may have different numbers <strong>of</strong> antenna.<br />

For example, a BS has three <strong>and</strong> the end user has two. Usually BS has more antennas, because <strong>of</strong><br />

saving power <strong>and</strong> cost for the end users. In this situation, 2x3 is for uplink <strong>and</strong> 3x2 is for<br />

downlink. Two spatial streams are distributed to three antennas. One spatial stream is transmitted<br />

by multiple antennas; this is called STBC (Space-Time Block Coding). This method is also used<br />

in IEEE 802.16 PHY-layer. [17] [61]-[66]<br />

3.5. Limitation<br />

As the Internet goes into the <strong>wi</strong>reless stage, internet access seems become more <strong>and</strong> more<br />

convenient. Wired Internet access, such as ADSL, can provide at least 100 Mbps data rate, <strong>and</strong><br />

Wi-Fi, <strong>wi</strong>th the g st<strong>and</strong>ard, can achieve 54 Mbps, <strong>and</strong> it depends on the air-interface conditions<br />

however, if Wi-Fi wants to share the ADSL market, it still has a long way to go. Wi-Fi is strict to<br />

the operation environment <strong>and</strong> sensitive to channel fading, so reliability is a big issue. Since Wi-<br />

Fi is designed for small area not BWA, such as home or <strong>of</strong><strong>fi</strong>ce, VoIP (Voice over IP), video<br />

service <strong>and</strong> a large <strong>fi</strong>le download are heavy duty for it. If a business building wants to install a<br />

<strong>wi</strong>reless network for the whole building, every floor may need an individual AP (access point) or<br />

even more than one, depending on the location structure. This is because the signals suffer the<br />

short transmission range, channel fading <strong>and</strong> interference, therefore the installation cost <strong>and</strong><br />

complexity <strong>wi</strong>ll be high.<br />

The other problem <strong>of</strong> Wi-Fi is the market share. This is caused by fundamental<br />

infrastructure, completion rate users’ behavior patterns <strong>and</strong> technologies maturity. What is Wi-<br />

Fi’s market positioning? And who is the major customer group? The answers <strong>of</strong> these two<br />

questions are the key to the future <strong>of</strong> Wi-Fi. If Wi-Fi wants to take VoIP, for example, as the kill<br />

35


application, its biggest opponent <strong>wi</strong>ll be 3G. Or if Wi-Fi wants to take broad area <strong>wi</strong>reless<br />

network as the goal, the WiMax is blocking its way. Compared to 3G, Wi-Fi is faster, but the<br />

signal is not as stable. And compared to WiMax, Wi-Fi is slow, has small-coverage <strong>and</strong> is<br />

unreliable. In this dif<strong>fi</strong>cult situation, Wi-Fi should not keep thinking its killer application or try to<br />

occupy market share <strong>of</strong> other <strong>wi</strong>reless technologies. The future <strong>of</strong> Wi-Fi should be cooperation<br />

not competition.<br />

Since Intel integrates Wi-Fi <strong>wi</strong>th laptop computers, it speeds up the dem<strong>and</strong> <strong>of</strong> <strong>wi</strong>reless<br />

access. The laptop has come into the main stream in the IT industry. People can carry their PC<br />

<strong>wi</strong>th them, but they cannot carry the ADSL. Therefore, it is the reason why a <strong>wi</strong>reless network is<br />

desirable. Generally, most people believe that businessmen are the one who need <strong>wi</strong>reless access<br />

everywhere. However, the major Wi-Fi users or the potential users should be home workers <strong>and</strong><br />

students. Observing the behavior patterns, it is easy to <strong>fi</strong>nd out that people want to get rid <strong>of</strong><br />

annoying <strong>wi</strong>res <strong>and</strong> use the Internet access in different rooms at home, <strong>and</strong> students need to<br />

access the Internet for information, online games or entertainment in different indoor hotspots at<br />

any time. Another important fact from the behavior patterns is there is no killer application for<br />

Wi-Fi. People access the Internet for enjoying ubiquitous service not just for a single purpose.<br />

Thus, <strong>wi</strong>th the new coming st<strong>and</strong>ard IEEE 802.11n, Wi-Fi should focus on how to get involved<br />

to meet the dem<strong>and</strong>s <strong>of</strong> home users <strong>and</strong> students. That means to provide ubiquitous access.<br />

Therefore, the next problem is if the ISP (Internet Service Provider) wants to build the<br />

public Wi-Fi network. Is it possible <strong>and</strong> what are the issues behind it? This topic <strong>wi</strong>ll be<br />

discussed in chapter <strong>fi</strong>ve.<br />

36


4.1. The background <strong>of</strong> IEEE 802.16<br />

CHAPTER FOUR<br />

4. IEEE 802.16, Wireless MAN<br />

The IEEE 802.16 st<strong>and</strong>ard is the second generation <strong>of</strong> BWA (Broadb<strong>and</strong> Wireless Access).<br />

The st<strong>and</strong>ard group was formed in 1998 <strong>and</strong> its purpose was to develop an air- interface st<strong>and</strong>ard<br />

for BWA. At the beginning <strong>of</strong> the project, the group focused on a LOS-based (Line <strong>of</strong> Sight)<br />

point-to-multipoint <strong>wi</strong>reless broadb<strong>and</strong> system operated in the 10 GHz – 66 GHz b<strong>and</strong>. The<br />

complete st<strong>and</strong>ard was <strong>fi</strong>nished in December 2001. The evolution <strong>of</strong> IEEE 802.16 can be split<br />

into four stages: 1. Narrowb<strong>and</strong> <strong>wi</strong>reless local-loop systems, 2. First-generation line-<strong>of</strong>-sight<br />

broadb<strong>and</strong> systems, 3. Second-generation non-line-<strong>of</strong>-sight broadb<strong>and</strong> systems, <strong>and</strong> 4.<br />

St<strong>and</strong>ards-based broadb<strong>and</strong> <strong>wi</strong>reless systems. [50][60]<br />

Narrowb<strong>and</strong> <strong>wi</strong>reless local-loop systems<br />

The First system is related to the <strong>wi</strong>reless voice telephony. The WLL systems (Wireless<br />

Local-Loop) were successful in many developing countries such as China, India <strong>and</strong> Brazil.<br />

There are two major technologies used in these WLL systems digital-enhanced cordless<br />

telephony (DECT) <strong>and</strong> code division multiple access (CDMA). To stay competitive, WLL<br />

systems started to join the Internet service market in 1993. In February 1997 AT&T developed a<br />

<strong>wi</strong>reless access system for 1900 MHz PCS (Personal Communications Service) <strong>and</strong> ended the<br />

service in December 2001 due to high costs <strong>and</strong> poor take-rate. During the same time, some<br />

small companies focused on <strong>wi</strong>reless internet service. These WISP (Wireless Internet Service<br />

Provider) companies set up the system in license-exempt b<strong>and</strong>s, 900 MHz <strong>and</strong> 2.4 GHz <strong>and</strong><br />

needed customers’ permission to install antennas either on the ro<strong>of</strong>top or top <strong>of</strong> the building. At<br />

this time the range, capacity, <strong>and</strong> speed were limited. [50][87] – [90]<br />

First-generation line-<strong>of</strong>-sight broadb<strong>and</strong> systems<br />

Since <strong>wi</strong>red internet service can provide higher <strong>and</strong> more stable service, <strong>wi</strong>reless systems<br />

needed to evolve to be competitive. There are two major systems called local multipoint<br />

distribution systems (LMDS) <strong>and</strong> multichannel multipoint distribution services (MMDS). LMDS<br />

mainly supported SOHO (Small Of<strong>fi</strong>ce, Home Of<strong>fi</strong>ce), business centers, <strong>and</strong> small corporations.<br />

This system only had short success in the late 1990s. MMDS was once used to provide <strong>wi</strong>reless<br />

cable broadcast video service in rural areas where no cable TV service was available. When<br />

satellite TV came out, the <strong>wi</strong>reless cable business crashed. The operators sought an alternative<br />

way to use this b<strong>and</strong> (2.5 GHz). In September 1998 FCC relaxes rules for the MMDS b<strong>and</strong> to<br />

allow two-way communication. After these changes in regulations some companies such as MIC<br />

WorldCom <strong>and</strong> Sprint, bought licenses to use the MMDS spectrum <strong>and</strong> began to develop high<br />

37


speed <strong>fi</strong>xed <strong>wi</strong>reless broadb<strong>and</strong> service for this b<strong>and</strong>. These <strong>fi</strong>rst-generation broadb<strong>and</strong> systems<br />

used towers which were several hundred feet tall <strong>and</strong> had LOS coverage up to 35 miles <strong>wi</strong>th high<br />

power transmitters. The users had to install outdoor antennas high enough to receive a signal<br />

<strong>and</strong> pointed toward the tower for the clear LOS path. This LOS equipment was soon considered<br />

an impediment. And because towers were dif<strong>fi</strong>cult to set up, the service was quite limited.<br />

[50][91][92]<br />

Second-generation non-line-<strong>of</strong>-sight broadb<strong>and</strong> systems<br />

The second-generation broadb<strong>and</strong> systems had potential to solve the LOS problem <strong>and</strong> had<br />

the ability to provide more capacity <strong>and</strong> higher speed. This was because they used cellular<br />

architecture <strong>and</strong> advanced-signal processing technology. With these methods, the link <strong>and</strong><br />

system performance was improved under multipath conditions. These new second-generation<br />

systems also perform well in NOLS (Non-Line <strong>of</strong> Sight) environment by using OFDM, CDMA<br />

<strong>and</strong> multiantenna processing. Some <strong>of</strong> them can even be operated <strong>wi</strong>thout setting an antenna<br />

outside. [50]<br />

St<strong>and</strong>ards-based broadb<strong>and</strong> <strong>wi</strong>reless systems.<br />

IEEE 802.16 st<strong>and</strong>ard was approved <strong>of</strong><strong>fi</strong>cially on December 2001 <strong>and</strong> the formal name was<br />

<strong>wi</strong>reless metropolitan area network (WMAN). This <strong>fi</strong>rst st<strong>and</strong>ard only focused on the10 GHz –<br />

66 GHz b<strong>and</strong> <strong>and</strong> can only do LOS transmission. In PHY-layer, it used single-carrier modulation<br />

<strong>and</strong> in the MAC-layer, it had time division multiplexing (TDM) structure which supported FDD<br />

(Frequency Division Duplexing) <strong>and</strong> TDD (Time Division Duplexing). [50]<br />

In order to maintain a competitive advantage, the IEEE 802.16 st<strong>and</strong>ard group developed a<br />

series <strong>of</strong> extended st<strong>and</strong>ards to improve WMAN performance. The IEEE 802.16 family members<br />

include IEEE 802.16, IEEE 802.16a, IEEE 802.16c, IEEE 802.16-2004, IEEE 802.16e-2005,<br />

IEEE 802.16f, IEEE 802.16g <strong>and</strong> IEEE 802.16h. [60]<br />

WiMax Forum<br />

This is a Non-Pr<strong>of</strong>it Organization formed in April 2001. The initial members included Intel,<br />

Fujistu, <strong>and</strong> Nokia among others. The major mission <strong>of</strong> this forum is to assure the unity <strong>and</strong><br />

compatibility <strong>of</strong> BWA products produced by any manufacturer. In the beginning, the<br />

certi<strong>fi</strong>cation was only between IEEE 802.16 st<strong>and</strong>ard <strong>and</strong> ETSI HiperMAN st<strong>and</strong>ard (European<br />

Telecommunications St<strong>and</strong>ards Institute, High Performance Metropolitan Area Network). As the<br />

technologies <strong>of</strong> the 802.16 become more mature, many industries started to pay attention to it.<br />

Therefore, more companies around the world joined <strong>and</strong> established several working groups to<br />

promote the st<strong>and</strong>ard. Because <strong>of</strong> this forum, WiMax (World Interoperability for Microwave<br />

Access) became the second name <strong>of</strong> IEEE 802.16. [59]<br />

38


The working groups <strong>of</strong> WiMax Forum are CWG (Certi<strong>fi</strong>cation Working Group), TWG<br />

(Technical Working Group), RWG (Regulatory Working Group), MWG (Marketing Working<br />

Group), SPWG (Service Provider Working Group), NWG (Network Working Group) <strong>and</strong> AWG<br />

(Application Working Group) [59]<br />

4.2. Capacity <strong>of</strong> the IEEE 802.16 family<br />

4.2.1. IEEE 802.16<br />

This initial st<strong>and</strong>ard is <strong>fi</strong>xed air-interface BWA. Because it operated in a high frequency<br />

b<strong>and</strong>, it can only do LOS transmission. In addition, since IEEE established this uni<strong>fi</strong>ed clause,<br />

manufacturers can produce compatible equipment by follo<strong>wi</strong>ng the st<strong>and</strong>ard. This was a big step<br />

for realizing WMAN. [45][50] [60][93][96]<br />

4.2.2. IEEE 802.16a<br />

This st<strong>and</strong>ard was approved in January 2003. The NLOS transmission was added. The IEEE<br />

802.16 TGa extended the operation b<strong>and</strong> to 2 – 11 GHz licensed <strong>and</strong> licensed-exempt b<strong>and</strong>. This<br />

frequency had a longer wavelength, thus performs NLOS transmission very well. The maximum<br />

coverage was 30 miles <strong>and</strong> minimum was 6 miles. The other key technology called OFDM was<br />

also added in PHY-layer at this time. OFDM proved (in IEEE 802.11) that it was the solution for<br />

the multipath issue. These two were the major changes in PHY-layer. In the MAC-layer, the<br />

IEEE 802.16a provided QoS system the ability to support voice <strong>and</strong> video real time service.<br />

[46][50] [60]<br />

4.2.3. IEEE 802.16c<br />

This st<strong>and</strong>ard is just an improved st<strong>and</strong>ard <strong>of</strong> the initial IEEE 802.16 st<strong>and</strong>ard. This one<br />

established more detailed rules <strong>of</strong> how to run a system in 10 – 66 GHz b<strong>and</strong>. [47][50] [60]<br />

4.2.4. IEEE 802.16-2004<br />

This st<strong>and</strong>ard was the <strong>fi</strong>rst practical st<strong>and</strong>ard <strong>of</strong> the IEEE 802.16 family. It is also known as<br />

<strong>fi</strong>xed-WiMax. It integrated the previous st<strong>and</strong>ards <strong>and</strong> re-edited PHY <strong>and</strong> MAC-layer contents to<br />

improve the system performance <strong>and</strong> compatibility. Therefore it can support various business<br />

uses. IEEE 802.16-2004 was a <strong>fi</strong>xed air-interface <strong>of</strong> BWA, <strong>and</strong> it supported 2 – 11 GHz licensed<br />

<strong>and</strong> licensed-exempt b<strong>and</strong> <strong>and</strong> 10 – 66 GHz b<strong>and</strong>. That meant it can do both LOS <strong>and</strong> NLOS<br />

39


transmission. The complete edition <strong>of</strong> IEEE 802.16-2004 was approved in December 2004.<br />

[48][50] [60]<br />

4.2.5. IEEE 802.16e-2005<br />

In 2003, the 802.16 st<strong>and</strong>ard group started another mission. The TGe began to combine<br />

mobility <strong>and</strong> BWA together. The result was IEEE 802.16e <strong>and</strong> it was formally published in<br />

February 2006. This st<strong>and</strong>ard introduces scalable OFDMA in PHY-layer <strong>and</strong> modi<strong>fi</strong>es the MAClayer<br />

for supporting high speed mobility. The goal is to support end users moving in cars <strong>and</strong><br />

giving them the ability to access the BWA <strong>wi</strong>thout any problems. It has backward compatibility<br />

<strong>wi</strong>th IEEE 802.16-2004. Because <strong>of</strong> its mobility, it is also referred to as mobile-WiMax. [49][50]<br />

[60]<br />

4.2.6. IEEE 802.16f, IEEE 802.16g <strong>and</strong> IEEE 802.16h<br />

These st<strong>and</strong>ards are still under discussion. So far only drafts are available. [50][60] Table 4-<br />

1[50] is the basic information <strong>of</strong> IEEE 802.16 family.<br />

40


Table 4-1 Thee<br />

Basic Datta<br />

<strong>of</strong> IEEE 802.16<br />

41


4.3. The Physical Layer <strong>and</strong> MAC Layer<br />

In the follo<strong>wi</strong>ng section, the IEEE 802.16-2004 <strong>and</strong> IEEE 802.16e-2005 <strong>wi</strong>ll be discussed.<br />

IEEE 802.16e-2005 inherits the <strong>fi</strong>xed-BWA ability from IEEE 802.16-2004 <strong>and</strong> re-edits the<br />

PHY <strong>and</strong> MAC layer to combine <strong>fi</strong>xed-BWA <strong>wi</strong>th mobility. According to the WiMax forum,<br />

there are four usage scenarios: nomadic, portable, simple mobility <strong>and</strong> full mobility. The<br />

applications <strong>of</strong> IEEE 802.16-2004 are to provide an air-interface for <strong>fi</strong>xed <strong>and</strong> nomadic<br />

transmission, while IEEE 802.16e-2005 is to provide an air-interface for portable <strong>and</strong> mobile<br />

transmission. [50][59][94] – [96]<br />

Nomadic<br />

The user can use his/her devices <strong>wi</strong>th a local <strong>fi</strong>xed service <strong>and</strong> reconnect to a different <strong>fi</strong>xed<br />

service in another place.<br />

Portable<br />

Provide service for 3G-phones, PDA or notebook.<br />

Simple mobility<br />

Allowed the end users move in the speed up to 60 km/hr <strong>wi</strong>th less than 1 second<br />

interruptions.<br />

Full mobility<br />

Provide up to 120 km/hr mobility service <strong>wi</strong>th less than 50 ms latency <strong>and</strong> less than 1%<br />

packet loss.<br />

4.3.1. IEEE 802.16-2004<br />

4.3.1.1. Physical Layer<br />

There are several key technologies used in IEEE 802.16-2004 (<strong>fi</strong>xed-WiMax). The <strong>fi</strong>xed-<br />

WiMax is based on OFDM-PHY. It has a strong ability to protect against multipath fading <strong>and</strong><br />

support multipath <strong>and</strong> NLOS transmission. The blueprint <strong>of</strong> the operation theory is derived from<br />

the 802.11a. The 802.16 WG changed some parameters to <strong>fi</strong>t its own dem<strong>and</strong>s. The <strong>fi</strong>gure 4-1<br />

shows the fundamental structure <strong>of</strong> IEEE 802.16 bottom layers.<br />

42


Figure 4-1 The Layer Structure <strong>of</strong> IEEE802.16<br />

The other key technology used in WiMax is multiple-antenna techniques. This technology is<br />

also referred to as MIMO. Through OFDM, WiMax can achieve frequency diversity <strong>and</strong> by<br />

multiple –antenna techniques, WiMax can have spatial diversity. The term spatial diversity<br />

means using two or more antennas at the receiver <strong>and</strong>/or transmitter to do transmission. During<br />

the procedure the spatial multiplexing <strong>and</strong> the STBC is required. The idea <strong>of</strong> spatial multiplexing,<br />

<strong>fi</strong>gure 4-2[50], is to create multiple parallel channels to carry one data stream. The advantages <strong>of</strong><br />

MIMO are that it increases system reliability, data rate, system capacity, <strong>and</strong> coverage, <strong>and</strong><br />

decreases the required transmit power. The theory <strong>of</strong> MIMO was introduced in section 3.4.2.<br />

[50][95] – [101]<br />

43


Whhere<br />

y = H. .X + n<br />

Figuree<br />

4-2 A Spaatial<br />

Multipllexing<br />

MIMMO<br />

System<br />

4.3.1.11.1.<br />

Fouur<br />

transmmission<br />

mode:<br />

SC, SCa, OFDDM<br />

<strong>and</strong> OOFDMA<br />

In IIEEE<br />

802.16-2004<br />

PHYY-layer,<br />

SCC<br />

(Signal Laayer)<br />

is respponsible<br />

forr<br />

the 10 – 666<br />

GHz b<strong>and</strong> d<br />

<strong>and</strong> SCCa<br />

is used ffor<br />

the 2 – 11GHz ba<strong>and</strong>.<br />

The coore<br />

<strong>of</strong> this st<strong>and</strong>ard iss<br />

the OFDM M/OFDMAA<br />

modulaation<br />

<strong>and</strong> ussed<br />

in the 2 – 10 GHz b<strong>and</strong>. Thiss<br />

method haas<br />

many advvantages<br />

annd<br />

has beenn<br />

<strong>wi</strong>dely used for maany<br />

<strong>wi</strong>relesss<br />

technologies.<br />

[50]<br />

4.3.1.11.2.<br />

AMMC<br />

(Adapptive<br />

Mod dulation a<strong>and</strong><br />

Codinng)<br />

Wi ith AMC, WWiMax<br />

can support va arious kindss<br />

<strong>of</strong> modulaation<br />

<strong>and</strong> foorward<br />

error r correctionn<br />

(FEC) ccoding.<br />

This<br />

method allows<br />

modu ulation scheemes<br />

to be cchanged<br />

forr<br />

each persoon<br />

based onn<br />

channell<br />

conditionss.<br />

AMC is very effecttive<br />

on opttimizing<br />

ovverall<br />

channnel<br />

capacity y in a time-<br />

varyingg<br />

channel. TTherefore<br />

uusers<br />

can bee<br />

provided <strong>wi</strong>th the poossible<br />

highhest<br />

data raate<br />

which iss<br />

allowedd<br />

by the ISPP<br />

<strong>and</strong> link conditions.<br />

The T theory iis<br />

that whenn<br />

the channeel<br />

condition ns are good; ;<br />

then it transmits aas<br />

high dataa<br />

rate as poossible.<br />

Whhen<br />

the cha annel condiitions<br />

are poor,<br />

then itt<br />

transmiits<br />

at a lowwer<br />

data ratee<br />

to avoid eexcessive<br />

ppackets<br />

beco oming lost. Lower dat te rates <strong>and</strong> d<br />

higher date rates ccan<br />

be achi ieved by ussing<br />

differeent<br />

modulattion,<br />

such aas<br />

QPSK an nd low-ratee<br />

error-coorrection<br />

coodes<br />

for loww<br />

speed, a<strong>and</strong><br />

64-QAMM<br />

<strong>and</strong> lesss<br />

robust errror-correctioon<br />

for highh<br />

speed. [ [50]<br />

In both IEEE 802.16-20006<br />

<strong>and</strong> IEEEE<br />

802.16ee-2005<br />

PHYY,<br />

the RS- CC (Reed Solomon –<br />

Convoluution<br />

Code) ) is the requuired<br />

codingg<br />

mode <strong>and</strong>d<br />

block turbo<br />

codes (BTTC),<br />

convol lution turboo<br />

44


codes ( (CTC) <strong>and</strong> low densityy<br />

parity cheeck<br />

(LDPC) ) codes aree<br />

optional mmodes.<br />

Sincce<br />

the IEEEE<br />

802.16 clause did nnot<br />

set up thhe<br />

b<strong>and</strong><strong>wi</strong>ddth<br />

<strong>and</strong> moddulation<br />

method,<br />

differrent<br />

con<strong>fi</strong>guurations<br />

<strong>wi</strong>lll<br />

end up <strong>wi</strong>th different<br />

speeds. Thus <strong>wi</strong>th AMC, the system cann<br />

have the mmaximum<br />

uusage<br />

<strong>of</strong> thee<br />

channell.<br />

Table 4-2[50]<br />

shows the modulaation<br />

<strong>and</strong> cooding<br />

suppoorted<br />

in WiMMax.<br />

[50]<br />

4.3.1.11.3.<br />

Chhannel-quality<br />

Meaasurement<br />

The e channel-qquality<br />

meassurement<br />

sccheme<br />

is thee<br />

fundamenntal<br />

<strong>of</strong> downnlink<br />

<strong>and</strong> upplink<br />

powerr<br />

control processes a<strong>and</strong><br />

modulattion<br />

<strong>and</strong> code<br />

rate adapptation.<br />

A MMS<br />

is requirred<br />

to send the channell<br />

quality feedback (CCQI)<br />

includding<br />

RSSI ( (Received SSignal<br />

Stren ngth Indicattor)<br />

<strong>and</strong> SIN NR (Signal-<br />

to-Interrference-pluus-Noise<br />

Raatio)<br />

to BS for f evaluatinng<br />

channel conditions. With this innformation,<br />

BS can: : [50]<br />

<br />

<br />

Change moodulation<br />

annd/or<br />

coding g rate for thee<br />

transmissiion<br />

Change thee<br />

power leveel<br />

<strong>of</strong> the asssociated<br />

DLL<br />

or UL trannsmissions.<br />

4.3.1.11.4.<br />

OFFDM<br />

in WWiMax<br />

Table 4-22<br />

Modulatioon<br />

<strong>and</strong> Codiing<br />

Supportted<br />

in WiMaax<br />

In <strong>fi</strong>xed-WiMa f ax, the FFTT<br />

size is onlly<br />

256. Therre<br />

are 192 ssubcarriers<br />

used for ca arrying data; ;<br />

8 for pilot p subcarrriers<br />

<strong>and</strong> thhe<br />

rest are guard subccarriers.<br />

Be ecause the FFFT<br />

size is s <strong>fi</strong>xed, thee<br />

subcarrier<br />

intervall<br />

is related to the channnel<br />

b<strong>and</strong>w<strong>wi</strong>dth.<br />

With larger bannd<strong>wi</strong>dth,<br />

thee<br />

subcarrierr<br />

intervall<br />

increases, but the symmbol<br />

time ddecreases.<br />

TThat<br />

means a larger pieece<br />

<strong>of</strong> fram mes needs too<br />

be alloccated<br />

properrly<br />

to overccome<br />

delay spread. The<br />

table 4-3[ [50] shows the OFDM parameterss<br />

used fo or WiMAX. The OFDMM-PHY<br />

<strong>of</strong> WiMax has<br />

a <strong>wi</strong>de raange<br />

<strong>of</strong> guaard<br />

times, th herefore thee<br />

networkk<br />

designerss<br />

can make e <strong>fi</strong>tting traade-<strong>of</strong>fs<br />

bettween<br />

specctral<br />

ef<strong>fi</strong>ciency<br />

<strong>and</strong> de elay spreadd<br />

robustnness.<br />

When using a 255<br />

percent guuard<br />

time, iit<br />

can deal <strong>wi</strong>th the mmaximum<br />

delay d spread d<br />

45


obustnness<br />

which iis<br />

up to 16µ µs in a 3.5 MMHz<br />

channnel<br />

<strong>and</strong> 8µs in a 7 MHHz<br />

channel. [50][102] –<br />

[106]<br />

Tablee<br />

4-3 OFDMM<br />

Parameterrs<br />

Used for WiMAX<br />

4.3.1.22.<br />

MAC LLayer<br />

4.3.1.22.1.<br />

Three<br />

sublayers:<br />

CS, , CPS <strong>and</strong>d<br />

SS<br />

The e MAC layyer<br />

is an innterface<br />

bet tween the hhigher<br />

layerr<br />

<strong>and</strong> the PPHY.<br />

It also o processess<br />

packetss<br />

for the uppper<br />

layer called MSDDUs<br />

(MACC<br />

Service DData<br />

Units) ) <strong>and</strong> mapss<br />

them intoo<br />

MPDUss<br />

for transmmitting<br />

in PPHY.The<br />

IIEEE<br />

802.16<br />

st<strong>and</strong>ard splits the MAC-layer r into threee<br />

sublayeers,<br />

<strong>fi</strong>gure 22-22,<br />

conveergence<br />

subblayer<br />

(CS) , common part sublayyer<br />

(CPS) a<strong>and</strong><br />

securityy<br />

sublayeer<br />

(SS). CS is an interfaace<br />

betweenn<br />

MAC-layeer<br />

<strong>and</strong> higheer<br />

layer prootocol<br />

such as a ATM, IPP<br />

<strong>and</strong> so on. CPS prrovides<br />

MA AC manageement,<br />

ARQQ<br />

(Automattic<br />

Repeat QQuest)<br />

scheeduling<br />

<strong>and</strong>d<br />

assembly<br />

<strong>of</strong> MAC PDUs. SS iis<br />

in chargee<br />

<strong>of</strong> encryptiion.<br />

[50][1007]<br />

46


4.3.1.2.2. AAS (Advanced Antenna Systems)<br />

Multiantena is a good way to improve system performance. However it includes some<br />

problems such as transmit diversity, beamforming, <strong>and</strong> spatial multiplexing.. The AAS is a<br />

solution for them. [50][113][114]<br />

Transmit diversity<br />

Transmit diversity requires at least two transmitting antennas <strong>and</strong> one receiving antenna. For<br />

this type <strong>of</strong> transmission, WiMax de<strong>fi</strong>ned STBC scheme, for example the 2x1 antenna system<br />

<strong>wi</strong>th Alamouti codes. The advantage <strong>of</strong> it is the same as <strong>wi</strong>th MIMO. The MS or end users <strong>wi</strong>ll<br />

not have a complex set up <strong>and</strong> the cost is lower.<br />

Beamforming<br />

Beamforming has great ability to quard against interference <strong>and</strong> improve the coverage range,<br />

capacity, reliability, <strong>and</strong> received SINR. The idea is to use multiple antennas to transmit the same<br />

signal in the direction <strong>of</strong> the receiver. To operate using this method, the signal must be weighted<br />

properly for each antenna <strong>and</strong> the transmitter has to have accurate knowledge <strong>of</strong> the channel.<br />

WiMax supports beamforming for both uplink <strong>and</strong> downlink.<br />

Spatial multiplexing<br />

Spatial multiplexing means using multiple antennas to transmit multiple independent<br />

streams. When both receiver <strong>and</strong> transmitter have more than one antenna, by performing the<br />

STBC scheme, the streams can be split. The purpose <strong>of</strong> this method is to improve the data rate or<br />

capacity <strong>of</strong> the system. The increasing ratio is linear <strong>wi</strong>th the number <strong>of</strong> antennas. For example, a<br />

2x2 MIMO system <strong>wi</strong>ll double the capacity. If the MS only has one antenna, the spatial<br />

multiplexing is still supported. However, spatial multiplexing only works under good SINR<br />

conditions.<br />

4.3.1.2.3. QoS<br />

QoS (Quality <strong>of</strong> Service) is a basic function <strong>of</strong> the WiMax MAC-layer. By using<br />

connection-oriented MAC structure, the QoS control is robust. All the uplink <strong>and</strong> downlink<br />

connections are controlled by the BS. Before transmission, a BS <strong>and</strong> a MS set up a unidirectional<br />

logical link called “connection”. This link is between two MAC layers <strong>and</strong> every connection is<br />

veri<strong>fi</strong>ed by a 16-bit connection identi<strong>fi</strong>er (CID). [50]<br />

To ensure the QoS, WiMax de<strong>fi</strong>nes a scheme named “service flow”. It is a one way flow <strong>of</strong><br />

packets that includes a special set <strong>of</strong> QoS parameters <strong>and</strong> is veri<strong>fi</strong>ed by a 32-bit service flow<br />

identi<strong>fi</strong>er (SFID). These parameters are used to support different kind <strong>of</strong> QoS <strong>of</strong> different tasks.<br />

47


There aare<br />

varies <strong>of</strong><br />

parameterrs.<br />

[50] The e SFID is isssued<br />

<strong>and</strong> mmapped<br />

to CCIDs<br />

by the e BS. Theree<br />

are fouur<br />

types <strong>of</strong> scheduling g services ffor<br />

providinng<br />

the best performannce<br />

<strong>of</strong> data transfer <strong>of</strong>f<br />

various applicationns.<br />

[50] Tabble<br />

4-4[50][ 108] – [1122]<br />

<br />

UGGS<br />

is designned<br />

to suppoort<br />

real-timee<br />

<strong>fi</strong>xed-sizee<br />

packets peeriodic<br />

transsmission<br />

at constant bitt<br />

rate (CBBR),<br />

for exaample<br />

T1.<br />

<br />

Thi is scheme iss<br />

designed tto<br />

support rreal-time<br />

unn<strong>fi</strong>xed-size<br />

ppackets<br />

perriodic<br />

transmmission.<br />

Ann<br />

example<br />

is MPEG video. Thiss<br />

service allows<br />

BS to provide unnicast<br />

pollinng<br />

opportun nities for thee<br />

MS to rrequest<br />

b<strong>and</strong>d<strong>wi</strong>dth.<br />

<br />

Unsolicitedd<br />

grant servi ices (UGS)<br />

Real-time ppolling<br />

services<br />

(rtPS)<br />

Non-real-timme<br />

polling service (nrttPS)<br />

Table 4-4 Service Floows<br />

in WiMMax<br />

Thi is one suppoorts<br />

delay-ttolerant<br />

dataa<br />

streams w<strong>wi</strong>th<br />

un<strong>fi</strong>xed-size<br />

packetts,<br />

like FTP P. The nrtPSS<br />

<strong>and</strong> rtPPs<br />

are similar.<br />

The diffference<br />

is tthat<br />

a MS can use coontention-baased<br />

polling g or unicastt<br />

polling opportunitiies<br />

in the upplink<br />

to requuest<br />

b<strong>and</strong><strong>wi</strong>idth<br />

in nrtPSS<br />

service.<br />

48


Best-effort service (BE)<br />

This scheme is used only for service that does not require strict QoS, such as web browsing.<br />

The MS uses merely contention-based polling opportunities to request b<strong>and</strong><strong>wi</strong>dth <strong>and</strong> sends data<br />

whenever channels are available.<br />

4.3.1.2.4. Security<br />

4.3.1.2.4.1. Overview<br />

The security <strong>of</strong> IEEE 802.16 is called the privacy sublayer at the bottom <strong>of</strong> the MAC layer.<br />

It is mainly used to provide access control <strong>and</strong> con<strong>fi</strong>dentiality <strong>of</strong> the data link. The con<strong>fi</strong>guration<br />

<strong>of</strong> the IEEE 802.16 security has <strong>fi</strong>ve components <strong>and</strong> <strong>wi</strong>ll be introduced in the follo<strong>wi</strong>ng.<br />

[50][52][115] – [119]<br />

Security Associations (SA)<br />

This component is mainly concerned about connection. IEEE 802.16 has two types <strong>of</strong> SA;<br />

data SA <strong>and</strong> authorization SA. Only data SA has a clear de<strong>fi</strong>nition. The data SA is used to<br />

protect transmit connections between SS (Subscriber Station) <strong>and</strong> BS (Base Station).<br />

The authorization SA is a state which is shared between two particular SS <strong>and</strong> BS. The BS<br />

uses authorization SAs to con<strong>fi</strong>gure data SAs on the SS.[52]<br />

For securing a transmit connection, a SS <strong>fi</strong>rst uses a “create-connection” request to initiate a<br />

data SA. The st<strong>and</strong>ard <strong>wi</strong>ll let several connection IPs share a SA to support multicast. On<br />

network entry, the st<strong>and</strong>ard automatically establishes a SA for the secondary management<br />

channel. Thus, a SS may have two or three SAs, one for the secondary management channel,<br />

others for uplink <strong>and</strong> downlink connections. Each multicast group requires a SA to share <strong>wi</strong>th<br />

group members.<br />

X.509 certi<strong>fi</strong>cate pr<strong>of</strong>ile<br />

This is used to identify communication parities <strong>and</strong> 802.16 does not de<strong>fi</strong>ne its extensions.<br />

This st<strong>and</strong>ard de<strong>fi</strong>nes two types: manufacturer certi<strong>fi</strong>cates <strong>and</strong> SS certi<strong>fi</strong>cates. There are no<br />

certi<strong>fi</strong>cates <strong>of</strong> BS. A manufacturer certi<strong>fi</strong>cate is used to identify the manufacturer <strong>of</strong> an IEEE<br />

802.16 device. It can be self-signed or issued by a third party. An SS certi<strong>fi</strong>cate can identify a<br />

particular SS <strong>and</strong> also its MAC address. The SS certi<strong>fi</strong>cates are created <strong>and</strong> signed by<br />

manufacturers.<br />

The BS uses the manufacturer certi<strong>fi</strong>cate’s public key to con<strong>fi</strong>rm the SS certi<strong>fi</strong>cate <strong>and</strong> also<br />

verify the device. The SS must take care <strong>of</strong> the private key corresponding to its public key to<br />

prevent intrusion from attackers.<br />

49


PKM (Privacy <strong>and</strong> Key Management) authorization<br />

This protocol is used to send an authorization token to an authorized SS. And it contains<br />

three communication steps between SS <strong>and</strong> BS. Figure 4-3[52] The <strong>fi</strong>rst two steps are sent by SS<br />

for verifying itself <strong>wi</strong>th BS <strong>and</strong> the third one is used for response from BS to SS.<br />

Privacy <strong>and</strong> Key Management<br />

Figure 4-3 PKM Authorization Process <strong>and</strong> Parameters<br />

PKM is used to establish data SAs between SS <strong>and</strong> BS. This protocol can have two or three<br />

steps <strong>of</strong> message exchange between SS <strong>and</strong> BS. Figure 4-4[52] The <strong>fi</strong>rst step is optional. It<br />

depends on whether that BS requests rekeying or not. The second one, SS uses it to initiate the<br />

protocol <strong>and</strong> BS reply <strong>wi</strong>th the third one.<br />

50


Encryption<br />

Figure 4-4 PKM Protocol Messages Exchange Process <strong>and</strong> Parameters<br />

The DES-CBC (Data Encryption St<strong>and</strong>ard-Cipher Block Chaining) encryption enciphers a<br />

plaintext MPDU, but not the MPDU GMH or CRC. Figure 4-5[52]<br />

51


4.3.1.2.4.2. Overall Analysis<br />

Figure 4-5 Encryption Frame Structure <strong>and</strong> Process<br />

Learning from the experience from IEEE 802.11, the IEEE 802.16 working group faces<br />

security threats both in the MAC <strong>and</strong> PHY levels. 802.11 only has protections in the MAC level<br />

cannot present against attacks from PHY-Level. 802.16 progression has many good functions,<br />

however it also brings <strong>wi</strong>th it an increase <strong>of</strong> threats to users<br />

The initial st<strong>and</strong>ard IEEE 802.16-2001 requires an attacker to put real equipment between<br />

SS <strong>and</strong> BS <strong>and</strong> also operate at a frequency <strong>of</strong> 10 to 66 GHz. The IEEE 802.16e adds mobility to<br />

the st<strong>and</strong>ard; however it creates a security risk. Now, an attacker’s physical position is not really<br />

constrained <strong>and</strong> the management messages are much weaker than IEEE 802.11.<br />

With radio transmission, there is a great risk. Anyone who has a proper well located receiver<br />

can intercept the channel. So the designers have to establish a safety mechanism. The other threat<br />

is that anybody who has a correctly con<strong>fi</strong>gured radio transmitter can access the <strong>wi</strong>reless network.<br />

Through this weakness, an attacker can make up or modify frames from authorized organizations.<br />

Therefore there must be a procedure to protect the transmitting data. Furthermore, the<br />

interference <strong>and</strong> distance may also give attackers a chance to intrude the system or two systems<br />

which cannot connect to each other directly. Thus, how to protect a system <strong>and</strong> examine the<br />

received data are also very important to designers.<br />

52


4.3.2. IEEE 802.16e-2005, the newest st<strong>and</strong>ard<br />

4.3.2.1. OFDMA-PHY<br />

4.3.2.1.1. Background<br />

OFDMA (Orthogonal Frequency Division Multiple Access) is the main difference <strong>of</strong><br />

802.16e from other 802.16 st<strong>and</strong>ards. Most <strong>of</strong> new improvements <strong>and</strong> design are based on it.<br />

This method is deeply related <strong>wi</strong>th FDMA (Frequency Division Multiple Access). By using<br />

FFT/IFFT, FDMA can divide <strong>and</strong> combine the baseb<strong>and</strong> in an orthogonal way. In OFDMA-PHY,<br />

the subchannels are a minimum frequency resource-unit assigned by a base station. Thus<br />

different subchannels can be allocated to different users as a multiple-access mechanism. The<br />

IEEE TGe introduces scalability to OFDMA which can help provide best performance in a<br />

channel <strong>wi</strong>th b<strong>and</strong><strong>wi</strong>dth between 1.25MHz to 20MHz. for both <strong>fi</strong>xed <strong>and</strong> mobile service. Also it<br />

can lower the cost <strong>of</strong> system. [50][53]<br />

The FFT size in OFDMA-PHY is scalable from 128 to 2048. When the b<strong>and</strong><strong>wi</strong>dth increases,<br />

the FFT size is increased too, but the subcarrier interval is <strong>fi</strong>xed as 10.94 kHz. This also keeps<br />

the OFDM symbol duration <strong>fi</strong>xed. The 10.94 kHz interval is the best choice for balancing<br />

between the delay-spread <strong>and</strong> Doppler spread requirements for operating in <strong>fi</strong>xed <strong>and</strong> mobile<br />

environments. This interval allows the delay-spread up to 20µs <strong>and</strong> mobility speed up to 125<br />

kmph in 3.5 GHz b<strong>and</strong>. The FFT size 128, 512, 1024 <strong>and</strong> 2068 are used when the channel<br />

b<strong>and</strong><strong>wi</strong>dth are 1.25, 5, 10 <strong>and</strong> 20 MHz, respectively. The 256 bits OFDM is included in the<br />

OFDMA-PHY, so the mobile-WiMax is backward compatible <strong>wi</strong>th <strong>fi</strong>xed-WiMax, when the FFT<br />

size is 256. [50][53][106][120] – [123]<br />

Table 4-3 is the recommended scalability parameters for system.<br />

4.3.2.1.2. Frame structure<br />

OFDMA supports many different frame sizes to <strong>fi</strong>t the need <strong>of</strong> various applications <strong>and</strong><br />

models. There are three types <strong>of</strong> OFDMA subcarriers: [53][102][103][124] – [126]<br />

1. Data subcarriers for data transmission.<br />

2. Pilot subcarriers for various estimation <strong>and</strong> synchronization purposes.<br />

3. Null subcarriers for no transmission at all, used for guard b<strong>and</strong>s <strong>and</strong> DC carriers.<br />

In different subcarrier allocation modes, the pilot allocation is performed differently. For DL<br />

(Downlink) Partially Used Subchannelization (PUSC) <strong>and</strong> all UL (Uplink) modes, the set <strong>of</strong><br />

subcarriers <strong>of</strong> data <strong>and</strong> pilot is <strong>fi</strong>rst sliced into subchannels, <strong>and</strong> then the pilot subcarriers are<br />

allocated by each subchannel. For DL Fully Used Subchannelization (FUSC), the pilot<br />

53


subcarriers <strong>wi</strong>ll be assigned <strong>fi</strong>rst <strong>and</strong> then the rest <strong>of</strong> subcarriers are partitioned into data<br />

subchannels. FUSC has one set for pilot subcarriers, but each subchannel in PUSC has its own<br />

set for pilot subcarriers.<br />

Figure 4-6[53] is the frame structure <strong>of</strong> OFDMA-TDD. This kind <strong>of</strong> frame is sliced into DL<br />

<strong>and</strong> UL two subframes. The DL <strong>and</strong> UL subframes are separated by Transmit/Receive Gap <strong>and</strong><br />

Receive/Transmit Gap (TRG <strong>and</strong> RTG).The DL subframe starts <strong>wi</strong>th FCH (Frame Control<br />

Header) <strong>and</strong> then a DL-MAP <strong>and</strong> a UL-MAP. In DL-MAP BS <strong>wi</strong>ll tell MS which subcarriers are<br />

going to assign for it. The UL-MAP includes which subcarriers that MS can use to transmit on.<br />

Figure 4-6 OFDMA Frame Structure<br />

4.3.2.1.3. Various Subcarrier Allocation Modes<br />

OFDMA supports subchannelization to effectively allocate subchannels for both DL <strong>and</strong> UL.<br />

In WiMax, each user is allocated blocks <strong>of</strong> subcarriers, not individual subcarriers. This method<br />

can decrease the complexity <strong>of</strong> the subcarrier-allocation algorithm <strong>and</strong> make the mapping<br />

message easier. There are two main types <strong>of</strong> subcarrier permutations; distributed <strong>and</strong><br />

adjacent.[50][53] Generally speaking, the distributed subcarrier permutation has very good<br />

performance in mobile applications <strong>and</strong> improves frequency diversity <strong>and</strong> robustness. Adjacent<br />

subcarrier permutation is good at <strong>fi</strong>xed, portable or less mobility surroundings <strong>and</strong> increases<br />

multiuser diversity.<br />

DL Distributed Subcarrier Permutations: Fully Used Subchannelization (FUSC)<br />

All subchannels <strong>and</strong> full channel diversity are well utilized in this method by dispensing the<br />

allocated subcarriers to subchannels <strong>and</strong> a permutation mechanism is used here. During<br />

54


transmiission,<br />

the aadjacent<br />

cellls/sectors<br />

mmay<br />

hit each other by ceertain<br />

possibbility,<br />

becauuse<br />

<strong>of</strong> usingg<br />

the samme<br />

subcarrieers.<br />

This meechanism<br />

reeuses<br />

subcaarriers<br />

to minimize<br />

thee<br />

probabilityy<br />

<strong>of</strong> hits. In n<br />

additionn,<br />

fast fadinng<br />

<strong>of</strong> mobilee<br />

surroundinngs<br />

would llower<br />

the sy ystem performance.<br />

Buut<br />

frequencyy<br />

diversitty<br />

can minimmize<br />

it.<br />

Tabble<br />

4-5[53] is the summmary<br />

<strong>of</strong> subbcarrier<br />

alloocation<br />

struucture.<br />

In DDL-FUSC<br />

th here are twoo<br />

kinds <strong>of</strong><br />

sets <strong>of</strong> piloot;<br />

variable <strong>and</strong> <strong>fi</strong>xed ssets.<br />

The <strong>fi</strong>xxed<br />

one is uused<br />

in all OOFDM<br />

symbbols<br />

<strong>and</strong> thee<br />

variablee<br />

one is divvided<br />

into subsets s useed<br />

in odd annd<br />

even syymbols<br />

alterrnatively.<br />

Itt<br />

makes thee<br />

trade<strong>of</strong>ff<br />

<strong>of</strong> channell<br />

estimationn<br />

appropriate<br />

between aassigned<br />

powwer<br />

<strong>and</strong> freequency<br />

diversity.<br />

<br />

In OOFDMA<br />

sppeci<strong>fi</strong>cationn,<br />

the OFDMMA<br />

DL <strong>and</strong>d<br />

UL subfraames<br />

must bbegin<br />

<strong>wi</strong>th DL D <strong>and</strong> ULL<br />

mode. IIn<br />

DL PUSCC,<br />

all subchhannels<br />

<strong>wi</strong>lll<br />

be sliced a<strong>and</strong><br />

assigneed<br />

to three ssegments,<br />

an nd it can be e<br />

allocateed<br />

to sectoors<br />

<strong>of</strong> the same cell. [53] Thiss<br />

method utilizes u fulll-channel<br />

ddiversity<br />

byy<br />

dispenssing<br />

the alloocated<br />

subcaarriers<br />

to suubchannels.<br />

. [53] A perrmutation<br />

mmechanism<br />

is i also usedd<br />

here too<br />

minimizee<br />

the probaability<br />

<strong>of</strong> hhits<br />

<strong>and</strong> uusing<br />

frequuency<br />

diverrsity<br />

to miinimize<br />

thee<br />

performmance<br />

degraadation.<br />

<br />

Table 4-5 DL Distribuuted<br />

Subcarrrier<br />

Permuutation<br />

(FUSSC)<br />

DL <strong>and</strong> ULL<br />

Distributed<br />

Subcarrieer<br />

Permutatiion:<br />

Partiallly<br />

Used Subbchanneliza<br />

ation (PUSC C)<br />

Optional DDL<br />

<strong>and</strong> ULL<br />

Adjacentt<br />

Subcarrieer<br />

Permutattion:<br />

Advannced<br />

Moduulation<br />

<strong>and</strong>d<br />

Coding (AMMC)<br />

55


Adj djacent subccarriers<br />

are used u by thiss<br />

method too<br />

form subchhannels.<br />

AMMC<br />

can quiickly<br />

elect a<br />

modulaation<br />

<strong>and</strong> cooding<br />

combiination<br />

per subchannell,<br />

when it iss<br />

used <strong>wi</strong>th fast feedbaack<br />

channel.<br />

The subbchannels<br />

<strong>of</strong> AMC ccan<br />

use thee<br />

“water-poouring”<br />

typpes<br />

<strong>of</strong> algorrithms,<br />

<strong>and</strong> d it can bee<br />

combinned<br />

<strong>wi</strong>th an AAAS<br />

optionn.<br />

Tabble<br />

4-6[53] is the summmary<br />

<strong>of</strong> the AMC subcaarrier<br />

allocaation<br />

parammeters.<br />

4.3.2.22.<br />

MAC LLayer<br />

4.3.2.22.1.<br />

QooS<br />

Table<br />

4-6 UL-DDL<br />

Adjacennt<br />

Subcarrieer<br />

Permutatiion<br />

(optionaal<br />

AMC)<br />

The e functions <strong>of</strong> the QoSS<br />

<strong>of</strong> the IEE EE 802.16-22005<br />

includde<br />

the old foour<br />

schemess<br />

<strong>and</strong> a neww<br />

one schheme,<br />

extennded<br />

real-timme<br />

polling service (errtPS).<br />

This scheme is only de<strong>fi</strong>ned<br />

in IEEEE<br />

802.16ee-2005<br />

MAAC-layer.<br />

It combines tthe<br />

advantagges<br />

<strong>of</strong> UGSS<br />

<strong>and</strong> rtPS. This methood<br />

allocatess<br />

56


the uplink b<strong>and</strong><strong>wi</strong>dth periodically for MS <strong>and</strong> <strong>wi</strong>th this feature ertPS can coordinate data services<br />

which the b<strong>and</strong><strong>wi</strong>dth requirements change <strong>wi</strong>th time. [50][121][127][128]<br />

4.3.2.2.2. Power-saving<br />

How to extend the battery life is a very important issue <strong>of</strong> mobility. Therefore power<br />

management is a fundamental requirement <strong>of</strong> a mobile <strong>wi</strong>reless network. The IEEE 802.16e-<br />

2005 de<strong>fi</strong>nes two modes to operate power saving. [50][129] – [132]<br />

4.3.2.2.2.1. Sleep Mode<br />

This mode is an optional mode <strong>of</strong> WiMax power management. The MS is de<strong>fi</strong>ned by two<br />

statuses, sleep <strong>wi</strong>ndow <strong>and</strong> listen <strong>wi</strong>ndow. The sleep <strong>wi</strong>ndow is de<strong>fi</strong>ned as when a MS<br />

temporarily disconnects to the BS for a predetermined period <strong>of</strong> time. The listen <strong>wi</strong>ndow is<br />

follo<strong>wi</strong>ng the sleep <strong>wi</strong>ndow, during which the MS reconnects to the BS. The lengths <strong>of</strong> each<br />

sleep <strong>and</strong> listen <strong>wi</strong>ndow depend on the power-saving classes <strong>and</strong> is negotiated between the MS<br />

<strong>and</strong> BS. When the MS is in sleep <strong>wi</strong>ndow, this period is called unavailability interval. During the<br />

unavailability interval, the MS cannot receive any DL transmission <strong>and</strong> send any UL<br />

transmission. During the availability interval when the MS is in listen <strong>wi</strong>ndow, the MS can<br />

receive DL transmission <strong>and</strong> send UL transmission as normal. BS <strong>wi</strong>ll not send any DL<br />

transmission to MS when it is in sleep <strong>wi</strong>ndow, therefore the MS can turn <strong>of</strong>f one or more<br />

physical components for saving power. The BS buffers the SDUs (Service Data Units) for MS<br />

<strong>and</strong> transmits them later to the MS during availability interval.<br />

For different services, there are three power-saving classes:<br />

1. Power-saving class type 1<br />

Class type 1 is used for BE or nrtPS connections. In this class, the listen <strong>wi</strong>ndow size is<br />

<strong>fi</strong>xed <strong>and</strong> followed by a sleep <strong>wi</strong>ndow. Each sleep <strong>wi</strong>ndow size is t<strong>wi</strong>ce the size <strong>of</strong> the previous<br />

sleep <strong>wi</strong>ndow, but not bigger than the <strong>fi</strong>nal sleep <strong>wi</strong>ndow size. The size <strong>of</strong> the initial sleep<br />

<strong>wi</strong>ndow <strong>and</strong> the <strong>fi</strong>nal sleep <strong>wi</strong>ndow are noti<strong>fi</strong>ed to the MS by the BS before the power-saving<br />

class type 1 begins. During the sleep mode, the BS can reset the <strong>wi</strong>ndow size to the initial sleep<br />

<strong>wi</strong>ndow size at any time. For UL allocations, the reset process happens under the request from<br />

the MS. And for DL allocations, it happens when the BS <strong>fi</strong>nds out that the number <strong>of</strong> listen<br />

<strong>wi</strong>ndow is not enough for the traf<strong>fi</strong>c.<br />

2. Power-saving class type 2<br />

57


This class is used for UGS or rtPS connections. The sleep <strong>wi</strong>ndows <strong>and</strong> listen <strong>wi</strong>ndows are<br />

all <strong>fi</strong>xed-length <strong>and</strong> cross each other one by one in order. The BS tells the MS the <strong>wi</strong>ndow size<br />

before entering this power-saving mode.<br />

3. Power-saving class type 3<br />

This mode is used for multicast traf<strong>fi</strong>c or MAC management traf<strong>fi</strong>c. Different from other<br />

classes, it has only a single sleep <strong>wi</strong>ndow. Before entering this mode the BS decides the <strong>wi</strong>ndow<br />

size <strong>and</strong> the start time; then noti<strong>fi</strong>es the MS. The power-saving operation is inactive, after the<br />

sleep <strong>wi</strong>ndow has passed.<br />

4.3.2.2.2.2. Idle Mode<br />

Idle mode is also an optional scheme <strong>of</strong> WiMax power management, <strong>and</strong> it can save more<br />

power than sleep mode. With this scheme, several BS’s are assigned to a paging group <strong>and</strong> a MS<br />

can move <strong>wi</strong>thin this area <strong>and</strong> receive broadcast DL transmission from a BS <strong>wi</strong>thout s<strong>wi</strong>tching or<br />

registering to the network. When a MS is in idle mode, it listens to the network periodically for<br />

determining in which paging group it is <strong>and</strong> running the paging group update. MS also noti<strong>fi</strong>es<br />

the network <strong>of</strong> its appearance while running the paging group update. When a BS needs to<br />

connect <strong>wi</strong>th the MS in idle mode, all the BSs in the paging group, where the MS is, have to join<br />

the paging process. Once the MS receives the paging message, it <strong>wi</strong>ll end the idle mode <strong>and</strong> start<br />

to connect to the network.<br />

In idle mode, a MS has two statuses;, MS paging-unavailable interval <strong>and</strong> MS paging-listen<br />

interval. When a MS is in MS paging-unavailable interval, it cannot be paged but can power<br />

down or run other operations not related <strong>wi</strong>th connection <strong>wi</strong>th BS, such as scanning. In the MS<br />

paging-listen interval, the MS listens to the serving BS for broadcast paging message to see<br />

whether it is paged or not. If it is paged, it ends the idle mode <strong>and</strong> if not, it goes into next MS<br />

paging-unavailable interval.<br />

4.4. The future <strong>of</strong> WiMax<br />

The new member <strong>of</strong> 802.11, 802.11n, is on the way. 3G is also becoming more popular.<br />

Therefore, WiMax de<strong>fi</strong>nitely has to cooperate <strong>wi</strong>th them on a some certain level. WiMax is a<br />

<strong>wi</strong>de range <strong>wi</strong>reless communication; Wi-Fi is short range <strong>and</strong> 3G is also <strong>wi</strong>de range but <strong>wi</strong>th<br />

narrower b<strong>and</strong><strong>wi</strong>dth. Figure 4-7[54] Since they are all <strong>wi</strong>reless communication type systems, the<br />

market <strong>wi</strong>ll be overlapped partially. The services dem<strong>and</strong>ed most from end users are e-mail,<br />

sharing <strong>fi</strong>les, video <strong>and</strong>/or audio transmission <strong>and</strong> etc…. [54]<br />

58


Figure 4-7<br />

Coverage<br />

<strong>and</strong> Capacity<br />

for Diffferent<br />

Wireeless<br />

Accesss<br />

Technique es<br />

Bas sically, thee<br />

applications<br />

<strong>of</strong> themm<br />

are different,<br />

althouugh<br />

they hhave<br />

some features in n<br />

commoon.<br />

WiMax is develooped<br />

for MANs; M Wi-Fi<br />

is for LANs <strong>and</strong>d<br />

3G is tthe<br />

cellularr<br />

commuunication<br />

sta<strong>and</strong>ard.<br />

Thuus,<br />

the relaationships<br />

aamong<br />

themm<br />

should bbe<br />

<strong>of</strong> coope eration, nott<br />

competition.<br />

The sservices<br />

<strong>of</strong> 33G<br />

are phon ne service a<strong>and</strong><br />

limited internet serrvice<br />

in a lo ow mobility y<br />

environnment.<br />

Wi-FFi<br />

providess<br />

broadb<strong>and</strong> d <strong>wi</strong>reless sservice<br />

in a <strong>fi</strong>xed envvironment,<br />

most likelyy<br />

indoorss.<br />

WiMax iis<br />

going to provide a large rangge<br />

broadbannd<br />

<strong>wi</strong>reless service in a <strong>fi</strong>xed orr<br />

mobility y environmment.<br />

They can<br />

cover eaach<br />

other’s ddrawbacks.<br />

[54][133]<br />

In an urban arrea,<br />

IEEE 8802.16<br />

has sseveral<br />

commpetitors<br />

suuch<br />

as DSL, , cable, or f<strong>fi</strong>ber.<br />

Thesee<br />

<strong>wi</strong>red cconnectionss<br />

have highher<br />

speed a<strong>and</strong><br />

are moore<br />

stable. MMost<br />

<strong>of</strong> timme,<br />

they ha ave alreadyy<br />

existed when a buuilding<br />

was built. Evenn<br />

through w<strong>wi</strong>reless<br />

commmunicationn<br />

has been improved a<br />

lot; <strong>wi</strong>rred<br />

communnication<br />

is sstill<br />

more reeliable<br />

<strong>and</strong> safer. The maximum speed that WiMax W cann<br />

reach iss<br />

about 70 Mbps, but <strong>wi</strong>th <strong>fi</strong>ber, it can achieve<br />

at least t 1 Gbps! TTherefore,<br />

users u wouldd<br />

choose <strong>wi</strong>red ratheer<br />

than <strong>wi</strong>relless.<br />

[58]<br />

Annother<br />

probllem<br />

is the ttopography.<br />

. In a highlly<br />

developeed<br />

city, thesse<br />

tall builddings<br />

wouldd<br />

interfere<br />

<strong>wi</strong>th the ttransmissionn<br />

<strong>of</strong> radio. For high frequency<br />

miicrowaves,<br />

it requires a clear pathh<br />

to reachh<br />

the terminnal;<br />

other<strong>wi</strong>se<br />

the base station musst<br />

set on a bbuilding<br />

thaat<br />

is higher tthan<br />

others.<br />

On the other h<strong>and</strong>, , lower-freqquency<br />

micrrowave<br />

usinng<br />

non-linee-<strong>of</strong>-sight<br />

(NNLOS)<br />

tech hnology still l<br />

has a pr roblem; a signal<br />

is diff <strong>fi</strong>cult to locck<br />

on becauuse<br />

<strong>of</strong> manyy<br />

reflectionss<br />

<strong>of</strong>f mason nry walls. Inn<br />

59


an urban area, there are still several problems remaining to be solved for <strong>wi</strong>reless communication.<br />

That is the task <strong>of</strong> WiMax. [58]<br />

In smaller cities <strong>and</strong> suburban areas, <strong>wi</strong>reless communication has better performance. This is<br />

because the competition between <strong>wi</strong>reless <strong>and</strong> <strong>wi</strong>red is less <strong>and</strong> the topography is more favorable.<br />

It is not worth installing <strong>fi</strong>ber or DSL in this kind <strong>of</strong> area. Population distribution <strong>of</strong> these areas<br />

is usually scattered, so it <strong>wi</strong>ll cost more to <strong>wi</strong>re the whole network in this situation. And the<br />

numbers <strong>of</strong> users may be a problem too, thus <strong>wi</strong>reless could be a better choice. Especially when<br />

lower-frequency microwave <strong>wi</strong>th (NLOS) is more suitable. [58]<br />

Wireless communication has the best performance in rural areas. Not only because <strong>of</strong> the<br />

lack <strong>of</strong> competition, but also the more friendly geography. It however still has challenges. How<br />

to <strong>and</strong> where to set up stations are two major problems. Distance <strong>and</strong> population distribution<br />

must be considered as well. [58]<br />

When moving in a vehicle, mobile-WiMax can support <strong>wi</strong>reless access. Unlike 3G, mobile-<br />

WiMax can provide not only mobility but also BWA. For example, when taking a train for long<br />

distance trip, people can use mobile-WiMax to access the Internet for news, video entertainment,<br />

or online-game to entertain themselves. However, since the mobile-WiMax is still not<br />

commercialized, besides in Korea, the practical operation <strong>wi</strong>ll continue to be on hold..<br />

60


CHAPTER FIVE<br />

5. Case study<br />

This chapter <strong>wi</strong>ll discuss <strong>and</strong> compare three individual <strong>case</strong>s using Wi-Fi or WiMax to build<br />

up the public <strong>wi</strong>reless network. These <strong>case</strong>s are located in the cities <strong>of</strong> Tallahassee, Fl, USA,<br />

Taipei, Taiwan <strong>and</strong> Seoul, South Korea. The network located at <strong>Florida</strong> <strong>State</strong> University in<br />

Tallahassee, Fl, USA uses 802.11b/g to build an indoor <strong>and</strong> partial outdoor <strong>wi</strong>reless network.<br />

That allows students <strong>and</strong> faculties to use <strong>wi</strong>reless access in any building. Taipei initiated their<br />

public <strong>wi</strong>reless network project in September 2004. This project is contracted by Q-ware<br />

communications, Inc. The operation was <strong>of</strong><strong>fi</strong>cially started in December 2005. The service area<br />

covers 90% <strong>of</strong> the population <strong>of</strong> Taipei City. Installation was <strong>of</strong><strong>fi</strong>cially <strong>fi</strong>nished in September<br />

2006 <strong>and</strong> was named WiFly. South Korea is the <strong>fi</strong>rst country operating the commercial WiMax<br />

network. It is not the only country that uses the <strong>fi</strong>xed-WiMax technology. They are the only<br />

country that also combines it <strong>wi</strong>th mobile-WiMax. This project is developed by the Korean<br />

telecoms industry. The main coverage area is located in its capital, Seoul. The network was<br />

launched in June 2006.<br />

<strong>Florida</strong> <strong>State</strong> University located in Tallahassee, <strong>Florida</strong> is the easiest one to gather data,<br />

because it is nearby. And by intervie<strong>wi</strong>ng the related staff [147], more precise <strong>and</strong> detailed<br />

information could be collected. Because the information <strong>and</strong> business news concerning WiFly<br />

are written in English <strong>and</strong> Chinese, they are easy to read <strong>and</strong> collect. However because <strong>of</strong> the<br />

time factor, only one interview was conducted concerning WiFly. Most <strong>of</strong> the data was gathered<br />

from the Internet <strong>and</strong> books. Although it is easy to <strong>fi</strong>nd the newest information on the Internet, it<br />

require cross validation to ensure its validity. This is the most important issue when doing a <strong>case</strong><br />

study <strong>of</strong> Wifly. WiBro is the most dif<strong>fi</strong>cult one <strong>of</strong> data collection <strong>and</strong> analysis in <strong>case</strong> <strong>studies</strong>. it<br />

is because <strong>of</strong> language barrier. The WiBro <strong>of</strong><strong>fi</strong>cial website has an English version, but not for all<br />

documents. Most <strong>of</strong> them are written in Korean. Thus the information is limited <strong>and</strong> makes the<br />

analysis more dif<strong>fi</strong>cult.<br />

The follo<strong>wi</strong>ng sections <strong>wi</strong>ll introduce these three <strong>case</strong>s <strong>and</strong> their implementation. Each<br />

section contains analysis <strong>and</strong> small conclusion. The last section is the overall analysis.<br />

5.1. FSU <strong>wi</strong>reless network<br />

5.1.1. Introduction<br />

The <strong>wi</strong>reless network solution <strong>of</strong> FSU (<strong>Florida</strong> <strong>State</strong> University) is called FSUWIN. WIN<br />

means Wireless Integrated Network. This network is based on the existed <strong>wi</strong>red network <strong>and</strong><br />

provides a more flexible <strong>and</strong> convenient internet service on campus. With FSUWIN, students<br />

61


<strong>and</strong> faculties can use their NB’s to access the Internet everywhere on campus. This <strong>wi</strong>reless<br />

network follows the IEEE 802.11 st<strong>and</strong>ard <strong>and</strong> covers major buildings <strong>and</strong> most public areas.<br />

Figure 5-1[70]. The department which is in charge <strong>of</strong> FSUWIN is OTC (Of<strong>fi</strong>ce <strong>of</strong><br />

Telecommunications <strong>and</strong> Networking). It is also responsible for maintenance <strong>and</strong> network<br />

security. The <strong>fi</strong>rst <strong>wi</strong>reless network at FSU was started in 1999, <strong>and</strong> at that time it was only an<br />

experimental network. There was no plan for building a campus-<strong>wi</strong>de network. In 2002, OTC<br />

got the funding they needed to install the <strong>wi</strong>reless network at FSU. The goal is to provide an<br />

indoor/outdoor <strong>wi</strong>reless public network for all students <strong>and</strong> faculty. [147]<br />

5.1.2. Implementation<br />

Figure 5-1 The Coverage <strong>of</strong> FSU Wireless Network<br />

The reason why FSU used WLAN to extend the campus network instead <strong>of</strong> <strong>wi</strong>red LANs is<br />

because it is cheaper <strong>and</strong> more flexible. The implementation was started from upgrading the<br />

existing <strong>wi</strong>red network. The construction <strong>and</strong> installation were conducted in two parts. First part<br />

was Building-to-Building Connectivity (Bridges), <strong>and</strong> second part was Intra-Building<br />

Connectivity (AP). [70] Table 5-1 shows the basic information <strong>of</strong> FSUWIN.<br />

Part I contains three phases. In phase I, the goal was to install <strong>wi</strong>reless network equipment in<br />

6 buildings <strong>and</strong> support 89 users. The operators took 4 buildings <strong>and</strong> created two domains in two<br />

connectivity points <strong>of</strong> the FSU network. After creating these two domains, the network could<br />

simply be enlarged by adding additional buildings into each domain. The operators also<br />

62


increased b<strong>and</strong><strong>wi</strong>dth, <strong>fi</strong>xed connectivity issues, <strong>and</strong> hid antennas through upgrading in this phase.<br />

The total cost was <strong>wi</strong>thin $6,000 but if using <strong>fi</strong>ber, it would cost at least $10,000. [70]<br />

In phase II, the operators tracked the outside campus usage <strong>and</strong> wanted to install <strong>wi</strong>reless<br />

network to these small groups or departments. They located the outside campus connections. The<br />

goal was to renovate these networks in the FSU extended campus. After evaluating these<br />

connections, the operators found out that they could establish connections to these places<br />

<strong>wi</strong>relessly <strong>and</strong> retrieved many modem lines. Eventually, the operators removed 37 dial-up<br />

connections in 5 buildings <strong>and</strong> then they had more dial-up resources for other users. These<br />

buildings used hubs to connect each PC <strong>and</strong> then used <strong>wi</strong>reless bridges/gateway to connect back<br />

to main campus network. In the middle, there is no <strong>wi</strong>red network; it is totally <strong>wi</strong>reless. [70]<br />

In this last phase, operators added 8 additional buildings into the FSU <strong>wi</strong>reless network. The<br />

problems <strong>of</strong> these buildings were that they were either too far away from campus (1.5 miles<br />

away) or too expensive to install <strong>fi</strong>ber for each user (spanned city street). By applying the<br />

<strong>wi</strong>reless solution, the operators spent around 15,000 dollars <strong>wi</strong>thout recurring costs or permits.<br />

[70]<br />

The Building-to-Building Connections covered 19 buildings <strong>wi</strong>th 207 users <strong>and</strong> 22 bridges.<br />

(Document in 09/2006) [70]<br />

Part II contained two phases <strong>and</strong> mainly focused on the inner connections <strong>of</strong> a building. In<br />

phase I, the operators estimate the areas on the campus where the WLAN was highly needed.<br />

These places included three libraries <strong>and</strong> Student Union. The Student Union is a place where<br />

vendors are <strong>and</strong> students <strong>and</strong> employees h<strong>and</strong>-out together. [70]<br />

Phase II was to help the departments which requested an intra-building network to install<br />

<strong>and</strong> setup the FSUWIN network. The process included implementation, integration, optimization<br />

<strong>and</strong> installation. They would make sure the departments did not have any problems when using<br />

the WLAN. For achieving maximum ef<strong>fi</strong>ciency, the operators not only installed <strong>and</strong> maintained<br />

the network, but also evaluated future extensions for the departments. The installation process is<br />

documented for future improvement. The departments which have FSUWIN service are the<br />

College <strong>of</strong> Law, Registrar’s Of<strong>fi</strong>ce, College <strong>of</strong> Business, School <strong>of</strong> Social-Work, <strong>and</strong><br />

Mathematics. (Document in 09/2006)[70]<br />

The APs <strong>and</strong> s<strong>wi</strong>tches used by FSUWIN are produced by many different companies, such as<br />

Vivato Networks, Xirrus <strong>and</strong> Foundry Networks. The technology details are shown in <strong>fi</strong>gure 5-<br />

6[145], <strong>fi</strong>gure 5-7[146] And <strong>fi</strong>gure 5-8[71]; table 5-2[145], table 5-3[146] <strong>and</strong> table 5-4[71].<br />

Comparing the Vivato solution to regular AP, it is easy to <strong>fi</strong>nd that Vivato has longer coverage<br />

<strong>and</strong> could support more users. In the survey “Vivato S<strong>wi</strong>tch Evaluation”[70], there are <strong>fi</strong>ve<br />

scenarios had been de<strong>fi</strong>ned: Fisher, L<strong>and</strong>is, Shores, Sliger <strong>and</strong> Stadium. This survey shows that<br />

only 1 or 2 pieces <strong>of</strong> Vivato equipment are needed to cover an area. In the scenario one, Fisher<br />

Lecture Hall takes 6 regular APs, three at each side, to cover the whole area, but the Vivato<br />

63


solution needs only one. Figure 5-2[70]. In scenario two, L<strong>and</strong>is Green needs 3 regular APs, but<br />

just one Vivato s<strong>wi</strong>tch is enough for this area. Figure 5-3[70]. In scenario three, Shores Library<br />

total needs <strong>fi</strong>ve regular APs to cover the whole floors. There are two in the basements, one in the<br />

<strong>fi</strong>rst floor <strong>and</strong> two in the second floor. In this <strong>case</strong> Vivato solution needs two s<strong>wi</strong>tches to cover<br />

this area, one in the basement <strong>and</strong> the other on second floor. Figure 5-4[70]. Scenario four is not<br />

available in the survey. The last scenario is Stadium. In this <strong>case</strong> it takes at least nine regular APs<br />

to cover the area <strong>and</strong> the complex is also high. For Vivato solution, it simply needs only one in<br />

the indoor place where there was already power. The Vivato s<strong>wi</strong>tches are mainly used in the<br />

outdoor scenario, <strong>and</strong> for indoor scenarios, the other types <strong>of</strong> APs, Xirrus <strong>and</strong> Foundry Networks,<br />

are used.<br />

For ensure the quality <strong>of</strong> signal strength <strong>and</strong> maximum capacity, each AP is directly<br />

connected to the backbone network; <strong>and</strong> no more than 20 users for a single AP. If there is a high<br />

usage in a certain area, the operators would install more APs to share the throughput. The critical<br />

locations <strong>of</strong> FSUWIN installation were libraries, Student Union <strong>and</strong> other common public places,<br />

because FSUWIN is a public campus network. [147]<br />

Figure 5-2 Fisher Lecture Hall<br />

64


Figure 5-3 L<strong>and</strong>is Green<br />

Figure 5-4 Shores Library<br />

65


Figure 5-5 Stadium<br />

Table 5-1 The Basic Information <strong>of</strong> FSUWIN<br />

Terms Parameters<br />

St<strong>and</strong>ard IEEE 802.11 a/b/g<br />

Of<strong>fi</strong>cial Initial date 2002<br />

Coverage<br />

66<br />

Outdoor 70 ~ 75%<br />

Indoor 10%<br />

Maximum Users per AP 20 (Design Issue)<br />

Average User per Month 2500 ~ 3000<br />

AP model Vivato, Xirrus, Foundry Networks<br />

Data Rate 1 ~ 26 Mbps (actually speed)<br />

Network Type Direct to Backbone network


Table 5-2 Xirrus XS-3700 AP Technology Data<br />

802.11a/b/g Radios 4<br />

802.11a Radios 4<br />

Total Number <strong>of</strong> Radios 8<br />

Number <strong>of</strong> Integrated S<strong>wi</strong>tch Ports 8<br />

Uplink Ethernet Ports 2 Gigabit<br />

Maximum Wi-Fi B<strong>and</strong><strong>wi</strong>dth 432 Mbps<br />

Integrated Wi-Fi Threat Sensor Yes<br />

Maximum Number <strong>of</strong> Users per Radio 64<br />

Maximum Number <strong>of</strong> Users per Array 512<br />

Number <strong>of</strong> Voice Calls per Array 84<br />

Number <strong>of</strong> Video Streams per Array 21<br />

Figure 5-6 Xirrus XS-3700 AP<br />

67


Table 5-3 Foundry Networks IP250 Technology Data<br />

AP And Network Features • Fragmentation Threshold Setting<br />

• Multi-Country Support • Idle Timeout (set at 30 minutes)<br />

• Mounting Bracket for Wall, Ceiling, <strong>and</strong><br />

Tabletop<br />

68<br />

• Layer 2 Roaming-802.11f IAPP<br />

• Integrated AP Locking Mechanism Wireless Data Encryption<br />

• LEDs For Status, Link, Radio a, Radio<br />

b/g<br />

• RC4 64-bit/128-bit/152-bit Wired<br />

Equivalent Privacy (WEP)<br />

• Auto-sensing 10/100BASE-T PoE Port • Temporal Key Integrity Protocol<br />

(TKIP)<br />

• Power Over Ethernet (PoE) Support-<br />

802.3af<br />

• Advanced Encryption St<strong>and</strong>ard (AES)<br />

• 802.11a, 802.11b, 802.11g St<strong>and</strong>ards • Pair<strong>wi</strong>se Master Key Security<br />

Association (PMKSA)<br />

• 802.11a Turbo Mode • WPA2 mixed-mode AES/TKIP<br />

• Simultaneous Dual Radio Support 2.4-<br />

GHz <strong>and</strong> 5-GHz<br />

• Integrated Antenna Support For<br />

802.11a/b/g<br />

• External Antenna Support for<br />

802.11a/b/g<br />

Wireless Quality Of Service<br />

• 802.1p tag mapping to priority queue<br />

• Source/Destination MAC-address<br />

mapping to priority queue<br />

• Plenum Rated UL 2043 AP Housing • Ethertype mapping to priority queue<br />

• Automatic Channel Assignment • Spectralink voice prioritization<br />

• Adjustable Power Levels • AP Load Balancing<br />

• AP Load Balancing Radio Support<br />

• Maximum Speed Setting • Simultaneous Dual Radio Support<br />

2.4GHz <strong>and</strong> 5GHz<br />

• Broadcast/Multicast Rate Limiting • 802.11g protected mode<br />

• VLAN Support-64 VLANs • Automatic channel select


• Automatic Tx power selection<br />

• Maximum station data rate<br />

• Multicast data rate<br />

• Antenna type<br />

• Antenna diversity<br />

• Fragmentation length<br />

Table 5-3 Cont.<br />

Figure 5-7 Foundry Networks IP250<br />

69


Table 5-4 Vivato 2.4 GHz Indoor & Outdoor Wi-Fi S<strong>wi</strong>tch Technology Data<br />

70


Table 5-4 Cont.<br />

71


Table 5-4 Cont.<br />

Figure 5-8 Vivato 2.4 GHz Indoor & Outdoor Wi-Fi S<strong>wi</strong>tches<br />

72


5.1.3. Analysis<br />

The FSU <strong>wi</strong>reless network is a very convenient system. It allows all students <strong>and</strong> faculty to<br />

have more freedom to access the Internet <strong>wi</strong>thout a strict location limitation. The connection is<br />

robust <strong>and</strong> the signal is stable. However there are still complaints <strong>and</strong> technical problems that<br />

exist. Mr. Clint Ringgold, Network Administrator <strong>of</strong> OTC, said that the primary complaint is<br />

about the coverage <strong>of</strong> the indoor area. At the beginning <strong>of</strong> the project, the FSUWIN installation<br />

was focused on the outdoors, especially for public areas, <strong>and</strong> had very limited budget. Therefore,<br />

if it is not a public area, the installation would be only under the request <strong>of</strong> the departments.<br />

Hence sometimes the coverage is only a half <strong>of</strong> the building or very small area <strong>of</strong> the building.<br />

That is why users may get a signal on one side <strong>of</strong> the building, but no signal on the other side <strong>of</strong><br />

the building. [147]<br />

Concerning this technical problem, Mr. Clint Ringgold mentioned two future goals. One is<br />

h<strong>and</strong><strong>of</strong>f <strong>and</strong> the other is the central controller. Mr. Phillip M. Callahan, Assistant Director <strong>of</strong><br />

OTC, said that installing a central controller is their future direction <strong>and</strong> it should be the<br />

university issue. It is very expensive equipment <strong>and</strong> the OTC is still waiting for funding.<br />

Meanwhile the other issue is to shift the current technology to <strong>fi</strong>t the controller. The function <strong>of</strong><br />

this controller is to connect to the APs around the campus <strong>and</strong> monitor the status <strong>of</strong> each AP, so<br />

that the OTC can control the network ef<strong>fi</strong>ciently. A single controller can connect at least 500<br />

APs. Concerning the other goal, Mr. Clint Ringgold indicated that the current FSUWIN does not<br />

support roaming, so users cannot move between two hotspots <strong>and</strong> maintain a connection. This<br />

can be done either by s<strong>wi</strong>tching to another technology or gro<strong>wi</strong>ng the network. Mr. Ringold<br />

described it as a design issue.<br />

The network security is guarded by the FSUWIN login system. Figure 5-9[70]. Every user<br />

needs to register a FSUID in order to login to the system to establish a connection. To maintain<br />

network reliability, OTC has the right to control the traf<strong>fi</strong>c load <strong>and</strong> RF devices are used for<br />

avoiding congestion <strong>and</strong> interference to <strong>wi</strong>reless signals. The terrain <strong>of</strong> the FSU campus is<br />

favorable to signal transmission, because it does not have high buildings <strong>and</strong> the density <strong>of</strong><br />

buildings is low. Therefore multipath fading is not serious to the signal.<br />

Mr. Phillip M. Callahan said that OTC faces several dif<strong>fi</strong>culties while installing the network<br />

concerning policy <strong>and</strong> technology issues. Addressing policy, he mentioned ownership <strong>and</strong><br />

funding. The OTC has skill <strong>and</strong> management duty, but does not always own the equipment. For<br />

example, if a department asks the OTC to install FSUWIN for them <strong>and</strong> they buy the equipment<br />

themselves, then the problem is who is responsible for the cost <strong>of</strong> maintenance, upgrade <strong>and</strong><br />

replacement in the future. They need FSU to set a policy for this issue. For technical dif<strong>fi</strong>culties,<br />

Mr. Clint Ringgold indicated that most <strong>of</strong> the time there is no data-<strong>wi</strong>res in the location where<br />

they want to install an AP, so they need to <strong>wi</strong>re it by themselves or change the planned location.<br />

Users complain about the speed <strong>and</strong> service quality, but it depends on the radio interference,<br />

such as distance from the AP, microwave <strong>and</strong> cell-phone. There is another technical problem that<br />

73


Mr. Phillip M. Callahan mentioned. He said that sometimes people buy their own devices <strong>and</strong><br />

just plug them in <strong>wi</strong>thout reporting them to the OTC. They can cause interference <strong>and</strong> security<br />

problems. He said it may be cheaper to buy an AP in local store, but this would cause security<br />

vulnerability in the end.<br />

5.1.4. Conclusion<br />

Figure 5-9 FSUWIN Login System<br />

FSU campus is a relatively small area, so it is suitable for Wi-Fi. The network structure is<br />

also designed very well. It is a successful <strong>wi</strong>reless network model. The next step <strong>of</strong> FSUWIN is<br />

to install a central controller, upgrade the network for roaming <strong>and</strong> extend coverage for more<br />

indoor environments. So far, the OTC does not have any plans to upgrade the system to IEEE<br />

802.11n or IEEE 802.16, said Mr. Phillip M. Callahan. FSUWIN does not have many serious<br />

problems. The technical problems can be solved by new technologies <strong>and</strong> the policy issues are<br />

dependent on FSU. Beside these issues, FSUWIN is a stable <strong>and</strong> convenient <strong>wi</strong>reless public<br />

network. In the future, if a small town, a village or other smaller areas want to upgrade its existed<br />

<strong>wi</strong>red network to <strong>wi</strong>reless public network, FSU is a good example to follow.<br />

5.2. WiFly in Taipei<br />

5.2.1. Introduction<br />

WiFly is part <strong>of</strong> the Mobile Taiwan Applications Promotion Project. This project started in<br />

2004 <strong>and</strong> its goal is “to bring out communication industries growth <strong>and</strong> stronger <strong>of</strong> national<br />

competitiveness based on complete broadb<strong>and</strong> network infrastructure.” [74] WiFly is based on<br />

Wi-Fi st<strong>and</strong>ard (IEEE 802.11 a/b/g). The WiFly has <strong>of</strong><strong>fi</strong>cially operated for one <strong>and</strong> a half years<br />

74


since the January 2006. The population coverage is more than 90%, but the geographic coverage<br />

is only about 50%. The total number <strong>of</strong> APs are about 4200.<br />

5.2.2. Implementation<br />

The WiFly infrastructure installation was split in three stages. The <strong>fi</strong>rst stage was to cover<br />

the 30 MRT (Mass Rapid Transit) stations <strong>and</strong> the surrounding areas, including the underground<br />

shopping streets. This stage was <strong>fi</strong>nished in May 2005. The second stage included 42 main city<br />

arteries, shopping districts, c<strong>of</strong>fee shops, <strong>and</strong> the rest <strong>of</strong> MRT stations <strong>and</strong> so on. There were<br />

about 2000 APs that were installed in this stage. In the third stage, there were 9 city hospitals, 53<br />

libraries, 12 Taipei administrative buildings <strong>and</strong> 600 7-11s (chained convenient stores) included.<br />

The <strong>fi</strong>nal stage was <strong>fi</strong>nished in July 2006. More than 4200 APs were used, <strong>and</strong> up to 90% <strong>of</strong> the<br />

population was covered. This was a br<strong>and</strong> new world record. [72]<br />

The WiFly uses Nortel Wireless Mesh Network as its fundamental model. Two components,<br />

Wireless Gateway 7250 <strong>and</strong> Wireless Access Point 7220, were used for this model. In this<br />

network, the connection between APs is 802.11a <strong>and</strong> the connection between AP <strong>and</strong> end users<br />

is 802.11b/g. Since there is no need to <strong>wi</strong>re every AP in the network, the cost <strong>of</strong> installing <strong>wi</strong>red<br />

network from gateway to AP <strong>and</strong> AP to AP can be eliminated. [72]<br />

The Nortel Wireless Mesh Network is a solution <strong>of</strong> installing the outdoor <strong>and</strong> indoor Wi-Fi<br />

network. It is scalable <strong>and</strong> secure. An ISP can use it to provide <strong>wi</strong>reless internet service <strong>and</strong><br />

companies can use it to build inner private networks. The network contains three components; a<br />

<strong>wi</strong>reless access point, <strong>wi</strong>reless a gateway <strong>and</strong> a <strong>wi</strong>reless mesh management platform. Figure 5-<br />

10[75], Figure 5-11[75], Table 5-5[75]<br />

There are two models <strong>of</strong> APs, Wireless AP 7220 <strong>and</strong> Wireless AP 7215. The WAP 7220 is<br />

an outdoor <strong>and</strong> indoor-type AP <strong>and</strong> the WAP 7215 is an indoor-type AP. Figure 5-12[75]. The<br />

WAP 7220s can be connected together to cooperate for improving system performance. WAP<br />

7215 only works in indoor locations. It can connect to either <strong>wi</strong>red or <strong>wi</strong>reless networks. WAP<br />

7220 <strong>and</strong> WAP 7215 also can cooperate together to form the <strong>wi</strong>reless mesh network. The<br />

<strong>wi</strong>reless gateway has two models as well; Wireless Gateway 7250 <strong>and</strong> Wireless Gateway 7240.<br />

The WG 7250 can support 10/100 Ethernet interface <strong>and</strong> 120 WAPs. The WG 7240 also has<br />

10/100 Ethernet interface but only supports 10 WAPs. The Wireless Mesh Management System<br />

provides a communication interface for Nortel’s <strong>wi</strong>red <strong>and</strong> <strong>wi</strong>reless network products. [75]<br />

75


Figure 5-10 Wireless Mesh Network Structure I<br />

Figure 5-11 Wireless Mesh Network Structure II<br />

76


Table 5-5 Parameters <strong>of</strong> WLAN <strong>and</strong> Mesh Network<br />

Figure 5-12 Wireless Access Point 7220<br />

The advantage <strong>of</strong> the mesh network is that all APs can share the connections among the<br />

network. Therefore the reliability <strong>and</strong> stability <strong>of</strong> the network can be improved. If any AP in the<br />

network is malfunctioning, the transmission route is not going to fail. Other APs <strong>wi</strong>ll form an<br />

alternative path to keep the network functional. The other advantage is that for places that <strong>wi</strong>red<br />

network is dif<strong>fi</strong>cult to install or cannot be installed; this type <strong>of</strong> network is a nice alternative<br />

solution. [75]<br />

77


In the AP operation system, Nortel developed a critical scheme called Nortel’s Adaptive<br />

Mesh Management Protocol. This protocol can simplify the deployments <strong>and</strong> optimize the<br />

overall performance <strong>of</strong> the mesh network. There are several important functions in this protocol:<br />

auto-discover the neighbor APs, auto-con<strong>fi</strong>guration <strong>and</strong> system synchronization, radio resource<br />

management, smart antenna management, dynamic mesh routing, <strong>and</strong> fast fault recovery. With<br />

these technologies, the Nortel Wireless Mesh Network can solve many technical problems such<br />

as interference, security, system scalability <strong>and</strong> reliability, QoS, simplifying installation <strong>and</strong><br />

lower the cost. [75] Table 5-6[75] is the features <strong>of</strong> Nortel Wireless Mesh Network.<br />

While dealing <strong>wi</strong>th interference, Nortel uses three schemes, Nortel’s Adaptive Mesh<br />

Management Protocol, smart antenna mechanism, <strong>and</strong> dual radio design. The dual radio design<br />

uses different spectrums for transmission <strong>and</strong> reception to avoid self-interference. Nortel’s<br />

Adaptive Mesh Management Protocol can sense the status <strong>of</strong> nearby channels to achieve the<br />

maximum usage <strong>of</strong> channels. With the smart antenna mechanism, data is transmitted in a<br />

beamform <strong>and</strong> directional way, so the data streams do not affect or be affected by other beams.<br />

[75]<br />

In the security <strong>fi</strong>eld, because the <strong>wi</strong>reless network is easier to be attacked by hackers than<br />

<strong>wi</strong>red network, to enhance this defect, Nortel’s mesh network adopts WEP/WAP/WAP2 <strong>and</strong><br />

IPSec (IP Security Protocol). IPSec is derived from VPN (Virtual Private Network) technology.<br />

It uses a <strong>fi</strong>rewall to <strong>fi</strong>lter the incoming data stream before entering the <strong>wi</strong>red network. For<br />

extending the network capacity, the mesh network allows the network designers to add new<br />

WAPs into the network at any locations in the covered area. This is the scalability <strong>of</strong> the Nortel<br />

Wireless Mesh Network. With the Nortel’s Adaptive Mesh Management Protocol, a new WAP<br />

can auto-discover the surrounding WAPs <strong>and</strong> establish the new optimized transmission path.<br />

Similarly, when an AP or more APs are malfunctioning, the Nortel’s Adaptive Mesh<br />

Management Protocol can re-route a substitute path to keep the network functional. [75]<br />

Nortel’s Wireless Mesh Network solution can be integrated <strong>wi</strong>th WiMax BS. With the<br />

indoor/outdoor APs <strong>and</strong> the mesh network features, this solution gives network designers a lot <strong>of</strong><br />

freedom to build up a low-cost <strong>and</strong> network that is also fairly simple. [75]<br />

78


Table 5-6 Features <strong>of</strong> Nortel Wireless Mesh Network<br />

79


Figure 5-13 Nortel Wireless Mesh Network Solution Example [75]<br />

The follo<strong>wi</strong>ng section is the data <strong>of</strong> AP <strong>and</strong> gateway. [73]<br />

Wireless Access Point 7220<br />

Technical Speci<strong>fi</strong>cations<br />

Wireless AP 7220 Access Link 802.11b/g (2.4 GHz) Radio System<br />

Center frequency<br />

• 2417 MHz to 2457 MHz (i.e., North America)<br />

Data rate: 54 Mbps max<br />

• Supports 1, 2, 5.5, 11 Mbps (IEEE 802.11b)<br />

• Supports 6, 9, 12, 18, 24, 36, 48 <strong>and</strong> 54 Mbps (IEEE 802.11g)<br />

• IEEE 802.11b/g st<strong>and</strong>ard rates<br />

Access antenna options<br />

• Co-linear whip, 5 dBi nominal antenna, SMA connectors<br />

• PIFA integrated antenna, 0 dBi nominal SMA connectors<br />

Radiated EIRP<br />

• +26 dBm typical<br />

Receive Sensitivity 802.11b (11Mbps)<br />

• -95 dBm typical @ 11 Mbps<br />

• -96 dBm typical @ 5.5 Mbps<br />

• -98 dBm typical @ 2 Mbps<br />

80


• -101 dBm typical @ 1 Mbps<br />

Receive Sensitivity 802.11g (54 Mbps)<br />

• -80 dBm typical @ 54 Mbps<br />

• -82 dBm typical @ 48 Mbps<br />

• -86 dBm typical @ 36 Mbps<br />

• -90 dBm typical @ 24 Mbps<br />

• -92 dBm typical @ 18 Mbps<br />

• -95 dBm typical @ 12 Mbps<br />

• -95 dBm typical @ 9 Mbps<br />

• -96 dBm typical @ 6 Mbps<br />

Wireless AP 7220 Transit Link 802.11a (5 GHz) radio system<br />

Center frequency<br />

• 5740 MHz to 5840 MHz<br />

Data rate: 54 Mbps max<br />

• Supports 6, 9, 12, 18, 24, 36, 48 <strong>and</strong> 54 Mbps<br />

• IEEE 802.11a st<strong>and</strong>ard rates<br />

Antenna system gain from radio module card inside the unit<br />

• 8.4 dBi nominal<br />

Radiated EIRP<br />

• +28 dBm typical @ 54 Mbps<br />

• +30 dBm typical @ 48 Mbps<br />

• +32 dBm typical @ 6-36 Mbps<br />

Receive Sensitivity (


• Wired network interface: Auto sensing 10/100BaseT Ethernet, 1.5kV surge<br />

protection per IEC60950<br />

• Power input nominal: 100V - 240V AC (45Hz – 65Hz)<br />

Power consumption<br />

• Operating: Indoor or outdoor > 0°C = 8W typical Outdoor < 0°C = 8W – 14W (-<br />

40°C)<br />

• Startup: Indoor or outdoor > 0°C = 8W typical Outdoor < 0°C = 24W (short<br />

duration) 8W– 14W (- 40°C)<br />

Dimensions (<strong>wi</strong>thout mounting brackets or antennas)<br />

• 265mm (10.5 inches) tall x 200mm (8 inches) diameter<br />

• Weight: 2.4 kg (5.3 lbs)<br />

• Color: Gray<br />

Optional accessories<br />

• Mounting brackets (right-angle or straight horizontal attachment)<br />

• 5m, CAT5 Ethernet indoor/outdoor rated cable for network access point (NAP)<br />

operation<br />

• Street light photo-electric control power tap 'luminaire' 120/208/240 V<br />

• 13dBi, 18dBi <strong>and</strong> 23dBi TL external antennae<br />

Wireless Gateway 7250<br />

Technical Speci<strong>fi</strong>cations<br />

St<strong>and</strong>ard:<br />

• 128 MB memory<br />

• Processor - 850 MHz<br />

• PCI expansion slot - one (available for additional Ethernet interface or hardware<br />

accelerator card)<br />

• LAN/WAN interfaces<br />

Two 10/100 BaseT Ethernet<br />

Management/console (DB9)<br />

Optional:<br />

• One additional 10/100 BaseT Ethernet interface (provides additional LAN/WAN<br />

connectivity, if required by network design)<br />

• 128 MB RAM upgrade<br />

• Hardware encryption accelerator card<br />

Physical speci<strong>fi</strong>cations:<br />

• Length: 21 in. (53.3 cm)<br />

• Width: 17.25 in. (43.8 cm)<br />

• Height: 3.5 in. (8.9 cm)<br />

• Weight: 10.0 lb. (4.5 kg)<br />

82


Operating environment speci<strong>fi</strong>cations:<br />

• Electrical: 90-264 VAC, 2.0 @ 90 VAC, 47-63 Hz<br />

• Temperature: 32°-104° F (0°-40° C)<br />

• Relative humidity: 10-90% non-condensing<br />

5.2.3. Analysis<br />

The WiFly has been in operation for about 21 months. As <strong>of</strong> the end <strong>of</strong> August 2007, there<br />

were one hundred <strong>and</strong> <strong>fi</strong>fty thous<strong>and</strong> registered customers <strong>wi</strong>th an average <strong>of</strong> six thous<strong>and</strong> users<br />

per month. The population coverage is 96% (two million six hundred thous<strong>and</strong> people) <strong>and</strong> the<br />

number <strong>of</strong> APs are 4600. [72] This is the biggest <strong>wi</strong>reless network construction in the world.<br />

However, there were many complaints since the <strong>fi</strong>rst day <strong>of</strong> service. There are several reasons.<br />

First, the signal is unstable <strong>wi</strong>th too many dead spots. Second, coverage is concentrated in<br />

metropolitan areas; the geographic coverage is only 50%. Third, the signal path is too<br />

unpredictable. This is because <strong>of</strong> the multipath fading <strong>and</strong> signal reflection. Forth, the price is too<br />

high <strong>and</strong> lacks service applications. These problems can be classi<strong>fi</strong>ed as two parts, mechanical<br />

<strong>and</strong> marketing. The mechanical part includes signal stabilization, AP coverage <strong>and</strong> security; the<br />

marketing part contains service applications <strong>and</strong> pricing rate. [76] – [78][85]<br />

Compared <strong>wi</strong>th the population coverage, the numbers <strong>of</strong> user is very low. Table 5-7. This<br />

project spent a total <strong>of</strong> approximately thirty million dollars, but ended up facing a low usage<br />

situation. Taiwan has a strong manufacturing background <strong>and</strong> in the 1980s <strong>and</strong> 1990s, MIT<br />

(Made in Taiwan) became a well known mark around the world. With this ability, the<br />

infrastructure installation is not a dif<strong>fi</strong>cult job at all. WiFly is a <strong>fi</strong>rst city-<strong>wi</strong>de <strong>wi</strong>reless network<br />

project; therefore since there is no precedent to learn from, WiFly has to learn through trial <strong>and</strong><br />

error. [76] – [78][85]<br />

Date<br />

Terms<br />

Table 5-7 The Numbers <strong>of</strong> Subscribers<br />

Registered Users Active Users Industry Customer<br />

2006/6 45,000 20,000 N/A<br />

2007/1 110,000 35,000 70<br />

2007/8 150,000 6,000 (monthly) N/A<br />

In the mechanical problem part, the signal is the <strong>fi</strong>rst problem. It is what most customers<br />

complain about. This problem is caused by many factors, such as the number <strong>of</strong> users, weather,<br />

environment, AP locations, <strong>and</strong> RF interference. This is a common dif<strong>fi</strong>culty <strong>of</strong> all <strong>wi</strong>reless<br />

83


communications. Taipei is a busy city <strong>wi</strong>th many <strong>of</strong><strong>fi</strong>ce buildings. It is a “concrete jungle”,<br />

especially in the metropolitan area. This kind <strong>of</strong> area is very unfavorable to signal transmission<br />

<strong>and</strong> it <strong>wi</strong>ll cause serious multipath fading. Thus, the end users may scan the signal, but cannot<br />

establish a connection, or even have no signal at all. The other problem is AP. It includes<br />

numbers <strong>of</strong> user <strong>and</strong> locations. Most <strong>of</strong> APs are located outdoor, such as <strong>wi</strong>re poles <strong>and</strong> street<br />

lights. Because APs are exposed outside <strong>and</strong> Taiwan is hot <strong>and</strong> humid, the failure rate <strong>wi</strong>ll be<br />

high. Moreover these kinds <strong>of</strong> AP locations also have big security issues. There are 4600 APs in<br />

Taipei, management <strong>and</strong> maintenance is a big challenge. And since the AP installation is focus<br />

on population coverage, most suburb residents do not have WiFly signal.<br />

The Q-ware does not limit the numbers <strong>of</strong> user on an AP. Therefore it may cause congestion<br />

<strong>and</strong> channel overlapping problems. For channel allocation <strong>and</strong> reallocation, Linda Yeh, the<br />

Account Manager in Sales & Customer Service Dep. <strong>of</strong> Q-ware Systems & Services Corp. [148],<br />

said the company has a control platform to manage each AP’s operation channel. In a high<br />

density area, if there is congestion or channel overlapping the network engineers can use this<br />

platform to s<strong>wi</strong>tch the operation channel for each AP to release the situation. However, the<br />

platform cannot solve the problem completely. In most high usage areas <strong>of</strong> WiFly, after<br />

s<strong>wi</strong>tching channels, the problem still exists. She said this is because there are only three channels<br />

that can be used in one area. It is Wi-Fi’s inherent limitation. [148]<br />

The maximum data rate for each user was 512 kbps for both Uplink <strong>and</strong> Downlink. In<br />

January 2007, Q-ware upgraded to 1Mbps for Downlink <strong>and</strong> 512 kbps for Uplink. This speed is<br />

not a shearing speed, which means it <strong>wi</strong>ll not be changed even if the users increased. [148] To<br />

avoid heavy traf<strong>fi</strong>c, Linda indicated that they have a flow control scheme to monitor the traf<strong>fi</strong>c<br />

flow for APs. The detail <strong>of</strong> flow control scheme is trade secret, thus she cannot provide more<br />

information for it. Channel overlapping <strong>and</strong> congestion are two major problems <strong>of</strong> signal<br />

transmission. There are several methods to solve the congestion issue, such as, hop-by-hop<br />

congestion control <strong>and</strong> multihop congestion control. [149][150] The main idea <strong>of</strong> these methods<br />

is to send a congestion feedback packet to slow down the source speed to release the congestion.<br />

The congestion control has been studied for years. Here is some related researche. [151] – [153]<br />

For improving signal stability, end users can install bridge or high power <strong>wi</strong>reless network<br />

cards. These two methods can solve most signal instability. Q-ware also has to install more APs<br />

or use high power APs in high usage areas. Since WiMax licenses have been issued in Taiwan. It<br />

can also be a solution for signal stability <strong>and</strong> extending geographical coverage. About security<br />

vulnerability, Q-ware said that the <strong>wi</strong>reless connection must be authorized before established <strong>and</strong><br />

the user account needs two identi<strong>fi</strong>cations to apply. However there is no one hundred percent<br />

security scheme. Users still have to protect their account information <strong>and</strong> PC from spy-programs.<br />

The responsibility is upon both WISP <strong>and</strong> the users.<br />

The Nortel Wireless Mesh Network solution is a suitable model for WiFly. However, no<br />

matter how perfect the model is, Taipei still has its intrinsic limitations, such as high <strong>of</strong><strong>fi</strong>ce<br />

84


uilding density, high population density, humid <strong>and</strong> hot weather, <strong>and</strong> unfavorable <strong>wi</strong>red<br />

network infrastructure. Because the Nortel Wireless Mesh Network solution adopts mesh<br />

structure (APs <strong>and</strong> Ethernet communicate through Gateways), it decreases the dif<strong>fi</strong>culty while<br />

installing APs. Nevertheless, the APs’ power supply is still a big issue. And even through APs<br />

are not necessary to connect to Ethernet, the Gateways have to. One Gateway can support 120<br />

APs, so 4600 APs need at least 39 Gateways. Considering the connection status, usage <strong>and</strong> AP<br />

locations, it is impossible to use just 39 Gateways to h<strong>and</strong>le the whole network <strong>and</strong> it <strong>wi</strong>ll cause<br />

serious congestion problem. Therefore, where to install the Gateways <strong>and</strong> how to <strong>wi</strong>re the<br />

Gateways are other important issues. According to Linda Yeh, so far the company does not have<br />

an ef<strong>fi</strong>cient way to solve channel overlapping <strong>and</strong> congestion problems completely. To install a<br />

booster to increase the signal power can be a good solution for these problems, but the National<br />

Communications Commission (NCC) has strict rules for signal power. Therefore, Q-ware does<br />

not have plans to install it. These problems are still pending. [148]<br />

The marketing problem is another big issue waiting to be solved. When WiFly <strong>fi</strong>rst came out,<br />

it guarantees to provide ubiquitous connection to every citizen. However it was plagued <strong>wi</strong>th<br />

serious mechanical problems <strong>and</strong> that is not the only reason for low numbers <strong>of</strong> users. The WiFly<br />

did not meet the needs <strong>of</strong> end users.<br />

Before WiFly, Wi-Fi had been available in stores for years, such as McDonald’s <strong>and</strong> some<br />

c<strong>of</strong>fee shops. This company was called Yaw Jenq Technology <strong>and</strong> the service was called “Easy-<br />

Up”. At that time the project was cooperated <strong>wi</strong>th Intel. It was the <strong>fi</strong>rst WISP in Taiwan, but<br />

ended up in.bankruptcy in May 2005. Easy-Up brought new Internet access to people. This<br />

project <strong>of</strong><strong>fi</strong>cially began in May 2003. At that time the <strong>wi</strong>reless interface is NB <strong>wi</strong>th built-in<br />

centrino platform. With Easy-Up, access internet in McDonald’s or other chain stores was slowly<br />

becoming a trend. Currently, sitting in a Starbucks, having a cup <strong>of</strong> c<strong>of</strong>fee <strong>and</strong> browsing the<br />

Internet has become a very common activity.<br />

With regards to the service policy, Linda Yeh said that the indoor APs are used for mobile<br />

devices users <strong>and</strong> the outdoor APs are mainly for <strong>fi</strong>xed users. The indoor APs are most installed<br />

in c<strong>of</strong>fee shops, chain restaurants <strong>and</strong> other public areas, such as airports. In these places, the<br />

signal is more stable <strong>and</strong> the connection quality is better than outdoor. The outdoor APs are used<br />

to provide service to <strong>fi</strong>xed users such as home <strong>and</strong> industries. These users can use bridges or<br />

antennas to receive WiFly signal. However because <strong>of</strong> many external factors, such as RF<br />

interference, weather <strong>and</strong> transmission path, the signal quality is not as good as the indoor APs.<br />

[148] In WiFly’s <strong>of</strong><strong>fi</strong>cial website, there is a search engine for WiFly hotspot, but they do not<br />

provide AP location search. If a customer wants to know if are there any APs nearby, they need<br />

call Q-ware directly. [148]<br />

Wireless Internet access is de<strong>fi</strong>nitely a business point. WiFly also has the ability to occupy a<br />

high market share. But the wrong market positioning <strong>and</strong> unfriendly pricing rate makes the usage<br />

much lower than the prediction. WiFly can never replace the ADSL at home. Therefore it is an<br />

85


auxiliary <strong>of</strong> extending the ADSL to end users in short range. Unless there is a unique application<br />

that only WiFly can do; other<strong>wi</strong>se keep seeking new service to increase users is still no help.<br />

ADSL <strong>and</strong> WiFly are like roads <strong>and</strong> bridges, but if WISP tries to use bridges to replace roads;<br />

then there is no future for WiFly. Taipei’s city government <strong>and</strong> Q-ware now are trying to use<br />

new VoIP service (Taipei easy call) <strong>and</strong> WiFly cube to attract more users. [76] – [78][85]<br />

However the fundamental problem is why WiFly. There are other choices for indoor <strong>wi</strong>reless<br />

internet service, such as Hinet-WLAN <strong>and</strong> 3G <strong>wi</strong>reless.<br />

It is like selling a game station <strong>wi</strong>thout games <strong>and</strong> the price is also way too high. For<br />

temporary users, $3.20 for one day access is too expensive; not to mention carrying the NB <strong>and</strong><br />

looking for signal. WiFly’s unique feature is its ubiquitous connection, but if the feature cannot<br />

be used stably <strong>and</strong> conveniently; then it is still useless.<br />

5.2.4. Conclusion<br />

WiFly tries to provide make people’s lives more convenient. However, it still has<br />

fundamental problems to be conquered. How to provide end users more stable connection <strong>and</strong><br />

higher speed should be the current mission <strong>of</strong> WiFly. And the customers have to <strong>fi</strong>nd out<br />

whether they need WiFly or not. Taiwanese network market is already saturated <strong>and</strong> has many<br />

competitors, so if WiFly wants to take the market share it <strong>wi</strong>ll be not easy. Since Wi-Fi has some<br />

limitations <strong>and</strong> the original design is for home use; thus it is dif<strong>fi</strong>cult to use as the last mile <strong>of</strong> the<br />

network <strong>and</strong> the city-<strong>wi</strong>de coverage. Since the mother company <strong>of</strong> WiFly, FAREASTONE, has<br />

gotten the operation license <strong>of</strong> WiMax; the next step <strong>of</strong> WiFly should be the WiMax<br />

infrastructure installation. By adopting WiMax, WiFly may be able to have much better<br />

performance <strong>and</strong> show its real value.<br />

5.3. Wibro in South Korea<br />

5.3.1. Introduction<br />

WiBro (Wireless Broadb<strong>and</strong> Access Service) is a WBA technology. It is a st<strong>and</strong>ard extended<br />

from 802.16-2004 <strong>and</strong> 802.16 2005 <strong>and</strong> uses many techniques the same <strong>wi</strong>th them. Figure 5-<br />

14[79]. It has better coverage <strong>and</strong> stronger mobility than WLAN <strong>and</strong> higher data rate than 3G.<br />

However, 3G has better coverage than WiBro <strong>and</strong> WLAN has higher data rate than 3G.<br />

Therefore WiBro’s position is just in the middle. It can <strong>fi</strong>x their weaknesses, but cannot replace<br />

them. This st<strong>and</strong>ard was developed by KT (Korean Telecoms Industry) <strong>and</strong> st<strong>and</strong>ardized by TTA<br />

(Telecommunications Technology Association) later on.<br />

The manufacturers who are contracted to produce WiBro devices are Samsung, LG,<br />

POSDATA <strong>and</strong> so on. For extending transmission range <strong>and</strong> decreasing dead spot, the TDD<br />

86


epeater r is developping<br />

<strong>and</strong> it <strong>wi</strong>ll have two<br />

versionn,<br />

optical reppeater<br />

<strong>and</strong> RF repeaterr.<br />

Figure 5-<br />

15[79] shows the nnetwork<br />

struucture<br />

<strong>of</strong> WWiBro.<br />

The related<br />

workks<br />

: [134][1335]<br />

5.3.2.<br />

History<br />

Figure 5-14<br />

The Relat tionship Beetween<br />

WiMMax<br />

<strong>and</strong> WiBBro<br />

Figuure<br />

5-15 Thhe<br />

Network Structure <strong>of</strong>f<br />

WiBro<br />

Thi is project wwas<br />

initiateed<br />

by manu ufacturers ( (Samsung a<strong>and</strong><br />

LG) a<strong>and</strong><br />

telecom mmunicationn<br />

industriies<br />

(KT <strong>and</strong>d<br />

SKT). It sstarted<br />

fromm<br />

2003 to 20005.<br />

They tootal<br />

investeed<br />

approximmately<br />

thirtyy<br />

six milllion<br />

dollars in this projject.<br />

The <strong>fi</strong>rst<br />

stage sta<strong>and</strong>ardizatioon<br />

was commpleted<br />

by TTA T in latee<br />

87


2004. It was a very big delay since WiMax was well developing at that time. November 2004<br />

was the critical timing for WiBro. Intel started to get involved in WiBro’s development. It<br />

cooperated <strong>wi</strong>th LG <strong>and</strong> KT to help develop WiBro’s equipments <strong>and</strong> ensure that WiBro can be<br />

compatible <strong>wi</strong>th WiMax. In April 2005, Samsung was elected as a member <strong>of</strong> WiMax Forum<br />

board, so the integration <strong>of</strong> WiMax <strong>and</strong> WiBro was speeded up. Therefore, WiBro became a<br />

world<strong>wi</strong>de st<strong>and</strong>ard, little by little. U.S. <strong>and</strong> Japan both had plans to use WiBro to build their<br />

WiMax network. In January 2005, three companies got the operation license, KT, HTI (Hanaro<br />

Telecom, Inc.), <strong>and</strong> SKT. And KT <strong>and</strong> SKT were selected to run the WiBro business. The<br />

system installation was initiated in early 2006. The project has three stages. First stage is to<br />

<strong>fi</strong>nish installation in 20 major cities at the end <strong>of</strong> 2006. Second is to <strong>fi</strong>nish 18 medium scale<br />

cities installation in 2007. And <strong>fi</strong>nally <strong>fi</strong>nish the 46 remote areas’ installation in 2008. [76] –<br />

[78][84][85]<br />

5.3.3. Implementation<br />

The operation b<strong>and</strong> <strong>of</strong> WiBro is between 2.3 GHz to 2.4 GHz. This b<strong>and</strong> is divided into 9<br />

channels. These channels are not overlapped but adjacent <strong>and</strong> every 3 channels have one guard<br />

b<strong>and</strong>, <strong>fi</strong>gure 5-16[79] – [82]. WiBro PHY-layer is based on OFDMA for against multipath fading<br />

<strong>and</strong> interference. WiMax supports both TDD <strong>and</strong> FDD scheme, but WiBro only supports TDD.<br />

This is for having biggest spectrum usage. In modulation <strong>fi</strong>eld, WiBro supports QPSK, 16QAM<br />

<strong>and</strong> 64QAM. And for coding, WiBro uses CTC <strong>and</strong> other optional method, such as BTC, RS-CC<br />

<strong>and</strong> FEC. Figure 5-17[79] – [82] shows the goal <strong>and</strong> features <strong>of</strong> WiBro.<br />

Figure 5-16 The Operation B<strong>and</strong><br />

88


Figure 5-17 WiBro Features<br />

The data rate <strong>of</strong> Wibro is asymmetric, for a RAS (Radio Access Station) the maximum<br />

downlink speed is 18 Mbps <strong>and</strong> uplink speed is 6 Mbps; for a PSS (Portable Subscriber Station)<br />

the maximum downlink speed is 3 Mbps <strong>and</strong> uplink speed is 1 Mbps. Under mobile conditions,<br />

WiBro can only support under 60 kmph movement. It is lower than 3G which is support at least<br />

120 kmph, but much better than Wi-Fi. The coverage <strong>of</strong> a RAS is de<strong>fi</strong>ned in three levels, Pico,<br />

Micro <strong>and</strong> Macro. Pico can cover a radius <strong>of</strong>100 meters area. Coverage <strong>of</strong> Micro is 400 meters<br />

<strong>and</strong> Macro is 100 meters. This design would make installation <strong>of</strong> RAS more flexible. [79] – [82]<br />

WiBro also has QoS. It contains three schemes, rtPS, nrtPS <strong>and</strong> BS; not including UGS. For<br />

saving power, WiBro provides sleep mode for end users to extend the battery life. In order to<br />

improve the system performance, WiBro introduces scheduling algorithm for transmission<br />

service <strong>and</strong> AMC for coding <strong>and</strong> modulation. WiBro also supports ARQ/H-ARQ (Hybrid<br />

Automatic Request) as well as WiMax. This scheme can effectively re-send the packet, if it is<br />

damaged by interference or channel fading. The h<strong>and</strong><strong>of</strong>f break time between two RASs is less<br />

than 150 ms, it is a very good performance comparing <strong>wi</strong>th other <strong>wi</strong>reless algorithm, such as<br />

PHS. [79] – [82]<br />

There are still other optional technologies used in WiBro, for example MIMO, AAS <strong>and</strong><br />

SDCA(Space Time Coding Adoption). The purpose is to extend the coverage <strong>and</strong> against<br />

interference. Table 5-8[79] – [82] contains the PHY speci<strong>fi</strong>cation <strong>of</strong> WiBro. Figure 5-18[79] –<br />

[82] shows the MAC-layer structure.<br />

89


- Transformation <strong>of</strong><br />

external network data<br />

into MAC SDUs;<br />

- Payload header suppression<br />

- System Access<br />

- B<strong>and</strong><strong>wi</strong>dth Allocation<br />

- Connection set-up<br />

- Connection maintenance<br />

-QoS<br />

- Authentication<br />

- Secure key exchange<br />

-Encryption<br />

Figure 5-18 MAC Layer Model<br />

Samsung is the major manufacturer producing the ACRs <strong>and</strong> RASs. In June 2007, Samsung<br />

won the WiMAX World Europe 2007 Award by U-RAS Premium Base Station in System<br />

Design. Figure 5-19[83] is the technology data <strong>and</strong> the picture for U-RAS Premium Base Station.<br />

Figure 5-20[83] is the information for ACRs. Table 5-8 is the <strong>comparison</strong> <strong>of</strong> WiBro <strong>and</strong> WiMax.<br />

90


Figure 5-19 U-RAS Premium<br />

Figure 5-20 ACR Basic Data<br />

91


Terms<br />

Table 5-8 The Comparison <strong>of</strong> WiBro <strong>and</strong> WiMax.<br />

St<strong>and</strong>ards<br />

Operation B<strong>and</strong><br />

B<strong>and</strong><strong>wi</strong>dth<br />

WiMax<br />

(IEEE 802.16-2005)<br />

2 – 11 GHz for <strong>fi</strong>xed<br />

10 – 66 GHz for mobile<br />

1.75 MHz, 3.5 MHz, 7 MHz,<br />

14 MHz, 1.25 MHz, 5 MHz,<br />

10 MHz, 15 MHz, 8.75 MHz<br />

92<br />

WiBro<br />

2.3 – 2.4 GHz<br />

10 MHz<br />

Multiplexing Burst TDM/TDMA/OFDMA OFDMA<br />

Duplexing TDD <strong>and</strong> FDD TDD<br />

Modulation QPSK, 16-QAM, 64-QAM<br />

QPSK, 16-QAM, 64-<br />

QAM<br />

Channel Coding CC, CTC, RS, LDPC CTC<br />

Data Rate 1 – 75 Mbps<br />

QoS mode<br />

5.3.4. Analysis<br />

UGS, rtPS, nrtPS, BS;<br />

ARQ/H-ARQ<br />

UL: 6.1 Mbps<br />

DL: 18.4 Mbps<br />

rtPS, nrtPS, BS;<br />

ARQ/H-ARQ<br />

Power Saving Sleep Mode, Idle Mode Sleep Mode<br />

Coverage Maximum 10 km Urban 1 km<br />

Mobility 120 km/hr 60 km/hr<br />

Other Techs AAS, AMC, MIMO AAS, AMC, MIMO<br />

WiBro has been in use for one year. However the number <strong>of</strong> users is not as high as predicted.<br />

At the end <strong>of</strong> June 2007, there were twenty thous<strong>and</strong> registered users <strong>and</strong> the goal is two hundred<br />

thous<strong>and</strong> by the end <strong>of</strong> 2007. If WiBro wants to reach this goal, it has to increase by 170,000<br />

users in half year! According to a recent study from IDC Korea, the subscribers <strong>wi</strong>ll reach<br />

130,000 at the end <strong>of</strong> 2007, 600,000 in 2008, 1.4 million in 2009 <strong>and</strong> 3.9 million in 2011. If there<br />

are various supplemental applications <strong>and</strong> devices available in the market, the number <strong>wi</strong>ll grow<br />

to 800,000 in 2008 <strong>and</strong> 5 million in 2011. This prediction may be too optimistic compared to the<br />

current situation. [84][85]


In KT’s recent report, 60% <strong>of</strong> subscribers are between 30 <strong>and</strong> 40 <strong>and</strong> 20% are college<br />

students in their 20s. They also <strong>fi</strong>nd that these customers are satis<strong>fi</strong>ed <strong>wi</strong>th service <strong>and</strong> price but<br />

upset about the prices <strong>and</strong> availability <strong>of</strong> devices. KT has to pay subsidization to laptops, WiBrophone<br />

<strong>and</strong> USB-modem buyers about one hundred to two hundred <strong>and</strong> sixty dollars. However,<br />

after subsidizing, the NB (model # NT-Q35) still costs $1750 to $2400, not including accessories.<br />

Until June 2007, the WiBro-related products include two pc-cards, two cell-phones, two mobile-<br />

PCs <strong>and</strong> one notebook. The choices are very limited. [76] – [78][84][85]<br />

The coverage <strong>of</strong> WiBro so far is still restricted in Seoul <strong>and</strong> certain nearby areas. The speed<br />

is fast but the signal is not stable. Although the mobility is available in a bus or subway, the<br />

operation environment is not friendly to use a mobile-PC or NB, not to mention the connection is<br />

not stable. People need a seat to operate them. Since 3G also can provide mobile internet service<br />

<strong>and</strong> is more reliable, WiBro really faces a very dif<strong>fi</strong>cult situation in South Korea. Mobility is the<br />

most important feature <strong>of</strong> WiBro. If subscribers cannot feel the advantages, it would be dif<strong>fi</strong>cult<br />

to increase numbers. Therefore in technical <strong>fi</strong>eld, WiBro has to not only improve signal quality<br />

<strong>and</strong> coverage, but also the mobility. The device problem, sooner or later, <strong>wi</strong>ll be solved. It is just<br />

a matter <strong>of</strong> time. When mechanism becomes mature, the price <strong>wi</strong>ll goes down <strong>and</strong> products <strong>wi</strong>ll<br />

be more varied.<br />

In marketing <strong>fi</strong>eld, KT WiBro proposed six applications: Wonder-Eye (Personal Multimedia<br />

service, Push-Pull on Dem<strong>and</strong>), Wonder-Media (Video Streaming), Wonder-Media (MMS),<br />

Wonder-Phone (Video-Phone), Wonder-Net (Wireless Internet Service), Wonder-Tour (3-D tour<br />

<strong>of</strong> APEC). These applications contain multimedia <strong>and</strong> internet service. WiBro is an interface<br />

between users <strong>and</strong> network. And it can be found out that these applications are overlapped <strong>wi</strong>th<br />

3G <strong>and</strong> Wi-Fi. Thus WiBro has to provide better system performance; other<strong>wi</strong>se it is dif<strong>fi</strong>cult to<br />

take marketing share from other two st<strong>and</strong>ards. After all, they are not kill applications. For<br />

WiBro’s long term development, KT <strong>and</strong> SKT should put more effort on technical problems.<br />

5.3.5. Conclusion<br />

KT, SKT <strong>and</strong> Samsung still believe in the future <strong>of</strong> WiBro. With the extension <strong>of</strong> coverage<br />

<strong>and</strong> new available devices, the subscribers are going to increase. But prices <strong>and</strong> service contents<br />

are the real problems waiting to be solved. If WiBro is not the essential requirement <strong>and</strong> there are<br />

alternative choices available <strong>and</strong> better for internet access, WiBro is dif<strong>fi</strong>cult to increase the<br />

market share. Therefore considering the occasions which WiBro is used, mobility <strong>and</strong> stable<br />

signal are the only way for it to keep going.<br />

93


5.4. Overall analysis<br />

Table 5-9 is the basic information <strong>of</strong> FSUWIN, WiFly <strong>and</strong> WiBro. FSU <strong>and</strong> Taipei use the<br />

same st<strong>and</strong>ard; Taipei <strong>and</strong> Seoul belong to the same area. In technical <strong>fi</strong>eld, Taipei should use<br />

WiMax not Wi-Fi, because it is not designed for metropolitan area. Even if WiFly upgrades to<br />

the IEEE 802.11n in the future, the overall performance is not going to improve too much. It is<br />

like carrying seven people in car <strong>wi</strong>th four seats; it can work, but not very well. So the best way<br />

is to replace the system to WiMax or combine <strong>wi</strong>th WiMax. In Seoul, WiBro’s major problem is<br />

mobility <strong>and</strong> it is also the selling point. Using WiMax to cover a city is a suitable way. It is what<br />

WiMax designed for. Even though WiBro’s overall performance is not as good as expected so<br />

far, the technical issues are solvable by new devices <strong>and</strong> technologies. As for cost <strong>and</strong> service<br />

problems, it is the same road <strong>and</strong> bridge issues <strong>wi</strong>th WiFly. Both WiFly <strong>and</strong> WiBro are WISPs<br />

<strong>and</strong> the best way for them to survive in future Internet market is to integrate <strong>wi</strong>th ISPs.<br />

FSUWIN is the most successful <strong>case</strong> <strong>wi</strong>thin these three <strong>case</strong>s. In the future, after installing<br />

the central controller, OTC can easily monitor the network status <strong>and</strong> provide more reliable<br />

service. FSUWIN reached its goal <strong>and</strong> does a good job. One more factor <strong>of</strong> FSUWIN’s success<br />

is no <strong>fi</strong>nancial burden. It is not a commercial network <strong>and</strong> is supported mainly by tuition. Thus it<br />

does not have to worry about users <strong>and</strong> application issues. This feature makes its operation<br />

simpler than other two systems. In short, it is a good solution for smaller <strong>and</strong> local area.<br />

So far WiFly <strong>and</strong> WiBro are still seeking their marketing positioning. 3G, Wi-Fi, WiMax<br />

<strong>and</strong> <strong>wi</strong>red internet service where the balance point for these technologies is an important issue to<br />

industries, manufactures <strong>and</strong> researchers. Table 5-10 is the basic information for internet access<br />

methods. The service providers <strong>and</strong> WISP should not only focus on providing content but also<br />

have to think about the dem<strong>and</strong> <strong>of</strong> <strong>wi</strong>reless network users.<br />

Based on the patterns <strong>of</strong> people’s behaviors accessing the Internet, these technologies should<br />

be coexisted. Figure 5-21 is an example for using these technologies. When a man wants to go to<br />

a state park <strong>and</strong> has the Internet access all the way, he has to bring his phone <strong>and</strong> NB. At home<br />

he can use Wi-Fi to collect the information <strong>of</strong> the state park. During transportation, he can access<br />

the Internet by mobile-WiMax. And then, when he arrives the state park, he can still check his email<br />

by <strong>fi</strong>xed-WiMax service. If he wants to take a rest, he can stay in the state park service<br />

center where Wi-Fi is available. Moreover, all the way, he can make a video phone call<br />

anywhere at any time. It is one possibility for future development.<br />

WiFly <strong>and</strong> WiBro were just commercialized. They have to learn from mistakes, because<br />

they are the pioneers <strong>of</strong> public <strong>wi</strong>reless network. The technical issues they have right now are all<br />

solvable. WiBro can showed its real capacity only after the mobility is truly functional <strong>and</strong><br />

devices price is acceptable. WiFly can adopt WiBro’s technologies to improve its signal <strong>and</strong><br />

coverage issues. The <strong>wi</strong>reless city story has not <strong>fi</strong>nished yet, <strong>and</strong> WiFly <strong>and</strong> WiBro still have a<br />

chance for success.<br />

94


Figure 5-21 An Example Application <strong>of</strong> 3G, Wi-Fi <strong>and</strong> WiMax<br />

5.5. Other developing <strong>wi</strong>reless network<br />

In U.S., Sprint Nextel has announced to cooperate <strong>wi</strong>th Samsung, Motorola <strong>and</strong> Intel <strong>wi</strong>ll<br />

build a national-<strong>wi</strong>de 4G broadb<strong>and</strong> mobile network. They are going to invest $1 billion in 2007<br />

<strong>and</strong> between $1.5 billion <strong>and</strong> $2 billion in 2008. In China, they are developing their own 4G<br />

st<strong>and</strong>ard, McWill. It is not an international st<strong>and</strong>ard <strong>and</strong> has a worse performance than WiMax.<br />

The Chinese government set many restrictions on WiMax <strong>and</strong> wants to develop their own<br />

st<strong>and</strong>ard, so in short term, WiMax is not going to develop in China. In Europe, Engl<strong>and</strong> started<br />

to install <strong>fi</strong>xed-WiMax since 2005. There are two companies in the projects, Telebria <strong>and</strong><br />

Community Internet (CI). Japan issued three WiMax licenses at the end <strong>of</strong> 2006. They are KDDI,<br />

NTT DoCoMo <strong>and</strong> Yozan. Taiwan issued six WiMax licenses <strong>and</strong> split into two area, North<br />

district <strong>and</strong> South district. The test service <strong>wi</strong>ll be launched in 2008.<br />

95


Service Name<br />

Parameters<br />

Table 5-9 The Basic Data <strong>of</strong> FSUWIN, WiFly <strong>and</strong> WiBro<br />

FSUWIN WiFly WiBro<br />

St<strong>and</strong>ard IEEE 802.11 b/g IEEE 802.11 a/b/g IEEE 802.16e<br />

Location<br />

FSU, Tallahassee,<br />

FL, USA<br />

96<br />

Taipei<br />

Taiwan<br />

Seoul<br />

South Korea<br />

Operator FSU, OTC Q-ware KT, SKT, Samsung<br />

Launch date 2003 ~ 2004 January 2006 July 2006<br />

B<strong>and</strong> 2.4 GHz ISM 2.4 GHz ISM 2.3 ~ 2.4 GHz<br />

Data rate ~ 25 Mbp UL/DL:512 kbps<br />

Coverage<br />

Indoor: 600 m<br />

Outdoor: 7200 m<br />

UL:6.1 Mbps<br />

DL:18.4 Mbps<br />

N/A Urban ~ 1 km<br />

Overall Coverage 75% <strong>of</strong> campus 90% <strong>of</strong> population N/A<br />

Mobility X X 60 km/hr<br />

H<strong>and</strong>-Off Ability X X Low<br />

Subscribers<br />

All students <strong>and</strong><br />

faculty<br />

150,000 (6/2007) 24,000(7/2007)<br />

Users per device 100 N/A N/A<br />

AP model<br />

Operation<br />

environment<br />

Applications<br />

Vivato, Xirrus,<br />

Foundry<br />

Networks<br />

Nortel AP 7220 Samsung RAS<br />

Campus Metropolitan area Metropolitan area<br />

Internet access<br />

FSU campus life<br />

WiFly cube<br />

Taipei easy call<br />

N/A<br />

(VoIP <strong>wi</strong>ll not be<br />

supported)


Name<br />

Parameters<br />

St<strong>and</strong>ard<br />

Table 5-10 Current Internet Access Technologies<br />

3G Wi-Fi WiMax<br />

WCDMA<br />

CDMA2000<br />

IEEE 802.11<br />

a/b/g/n<br />

Supporter ITU Wi-Fi Alliance<br />

B<strong>and</strong><br />

2100MHz ~<br />

2200MHz<br />

2.4 GHz<br />

Coverage 1 ~ 5 km 100m ~1000m<br />

H<strong>and</strong>-Off<br />

Ability<br />

Data rate 384 kbps<br />

97<br />

IEEE 802.16<br />

d/e<br />

WiMax<br />

Forum<br />

2 – 11 GHz<br />

for <strong>fi</strong>xed<br />

10 – 66 GHz<br />

for mobile<br />

Maximum<br />

10 ~ 50 km<br />

Wired<br />

Internet<br />

Ethernet<br />

N/A<br />

N/A<br />

Largest<br />

Highest Low Low N/A<br />

54 Mbps (a/g)<br />

200Mbps (n)<br />

70 Mbps<br />

100 Mbps ~<br />

1Gbps<br />

Mobility 100 km/hr < 20 km/hr 120 km/hr N/A<br />

Devices Cell-phone<br />

Current<br />

application<br />

FOMA (Japan),<br />

JUNE (Korea),<br />

i-mode (Taiwan)<br />

Cell-phone/<br />

PC/NB<br />

WiFly (Taipei,<br />

Taiwan)<br />

PC/NB PC/NB<br />

WiBro<br />

(Seoul,<br />

Korea)<br />

ADSL/Cable


CHAPTER SIX<br />

6. Conclusion<br />

Wireless communications have been available for more than ten years. Today, 3G, Wi-Fi<br />

<strong>and</strong> WiMax are the most popular <strong>and</strong> <strong>wi</strong>dely discussed st<strong>and</strong>ards. Telecommunication industries<br />

hope that 3G can bring them new fortune, because 3G has improved enough to support e-mail<br />

<strong>and</strong> small data download. Therefore telecommunication industries want to occupy more <strong>of</strong> the<br />

market share <strong>of</strong> <strong>wi</strong>reless Internet access by using 3G technology. But compared to Wi-Fi <strong>and</strong><br />

WiMax, it is still too slow. Moreover, <strong>wi</strong>th the new coming Wi-Fi st<strong>and</strong>ard, IEEE 802.11n,<br />

WLAN becomes more powerful than before <strong>and</strong> can overcome many past limitations, such as<br />

coverage, stability <strong>and</strong> speed. It is slowly catching up <strong>wi</strong>th the capacities <strong>of</strong> <strong>wi</strong>red networks. A<br />

Wired network’s advantage is its reliability, but its biggest disadvantage is path design. In a city,<br />

to <strong>wi</strong>re a line to a house or a building is easy; however in remote or rural areas it is a huge issue.<br />

Thus WiMax is emerging as a possible solution.<br />

Parameters<br />

Table 6-1 3G, Wi-Fi <strong>and</strong> WiMax Overall Comparison<br />

St<strong>and</strong>ard<br />

3G Wi-Fi WiMax<br />

Coverage (a single tower) 2 (< 1 km) 3 1 (1 ~ 5 km)<br />

Data Rate 3 (< 300 kbps) 1 (~ 25Mbps) 2<br />

Throughput 3 2 1<br />

Mobility <strong>and</strong> h<strong>and</strong>-<strong>of</strong>f 1 3 (WiFly) 2 (WiBro)<br />

1: Very good, 2: Good, 3: Bad<br />

Table 6-1 is a comprehensive result <strong>of</strong> Table 5-11 <strong>and</strong> 5-12. 3G, Wi-Fi <strong>and</strong> WiMax. They<br />

have individual <strong>and</strong> unique fundamental technologies, but their capacities are partially<br />

overlapped. 3G can be a way to access the Internet <strong>and</strong> Wi-Fi <strong>and</strong> WiMax can provide VoIP<br />

service as an alternative for the traditional phone-call. However in Table 6-1, it can be found that<br />

for Internet service, 3G is too slow for real-time service, such as downloading larger <strong>fi</strong>les or<br />

watching online-TV. For phone-call service, VoIP’s quality is not as good as 3G; it is because <strong>of</strong><br />

the design issue. 3G is telecommunication technology <strong>and</strong> Wi-Fi <strong>and</strong> WiMax are Internet<br />

technologies. They were designed for different purposes. Even though these technologies are<br />

overlapped in the application <strong>fi</strong>eld, it is impossible for them to replace each other at this point.<br />

The overlap can be treated simply as a backup. It is better to let a cell-phone just be a cell-phone.<br />

98


WiFly used Wi-Fi to cover 60% <strong>of</strong> the city including all metropolitan areas. It takes 4200<br />

APs to do it. If it is replaced by WiMax, it <strong>wi</strong>ll not take that much. And for FSU campus, if<br />

WiMax is applied, just one or two base stations are enough to cover the whole campus. However,<br />

two towers are not enough to take care <strong>of</strong> the daily usage. Moreover, it is always dif<strong>fi</strong>cult to<br />

receive a signal from the outside in a concrete building. Therefore it needs a bridge or a gateway<br />

to direct a signal into a building. Wi-Fi may have low coverage, but it can be <strong>fi</strong>xed by using<br />

more APs in a hotspot. The advantage is that it can not only extend the coverage but also reduce<br />

the flow rate for each AP.<br />

To build a city-<strong>wi</strong>de <strong>wi</strong>reless network is going to be a trend <strong>and</strong> it is feasible, but if a<br />

network only uses Wi-Fi or WiMax, it would suffer cost, coverage, signal <strong>and</strong> mobility issues.<br />

The best way would be for them to be used in combination <strong>wi</strong>th each other. So far there is no<br />

single technology can feed all different needs. In local area Wi-Fi has strong capability <strong>and</strong><br />

WiMax is designed as the extension <strong>of</strong> ADSL or cable. The combination <strong>of</strong> these two st<strong>and</strong>ards<br />

can form a most ef<strong>fi</strong>cient <strong>wi</strong>reless network. Therefore the future <strong>of</strong> the <strong>wi</strong>reless technologies<br />

should be created <strong>wi</strong>th the cooperation <strong>and</strong> integration <strong>of</strong> these technologies.<br />

There is a new st<strong>and</strong>ard IEEE 802.11u is based on this idea. It tries to make Wi-Fi interwork<br />

<strong>wi</strong>th other different types <strong>of</strong> networks. [154] The IEEE 802.11u allows devices to interwork <strong>wi</strong>th<br />

external networks. For this purpose, interworking refers to MAC layer enhancements. It allows<br />

the higher layer functionality to provide the overall end to end solution. Instead <strong>of</strong> telling it what<br />

to do, the IEEE 802.11u only helps upper layers to establish an end to end connection <strong>wi</strong>th<br />

external networks. It provides a “virtual point <strong>of</strong> presence” for many different networks via a<br />

single AP. IEEE 802.11u assists the advertising <strong>and</strong> connection to remote service beyond the DS<br />

<strong>and</strong> provides information to the STA about the external network prior to association. In fact, the<br />

IEEE 802.11u is an amendment to the IEEE 802.11 st<strong>and</strong>ard. The <strong>fi</strong>nal approval <strong>of</strong> IEEE<br />

802.11u is expected to be September 2009. [154] the Figure 6-1 shows the possible<br />

implementation <strong>of</strong> the future network.<br />

99


Figure 6-1 Integration <strong>of</strong> WiMax <strong>and</strong> Wi-Fi<br />

100


BIBLIOGRAPHY<br />

[01]. IEEE 802.11 <strong>of</strong><strong>fi</strong>cial website (http://www.ieee802.org/11/)<br />

[02]. Vaughan-Nichols, S.J, "Will the New Wi-Fi Fly?", Computer, Volume 39 , Issue 10,<br />

page(s): 16 - 18, Oct. 2006<br />

[03]. Reinw<strong>and</strong>, Cole C.; "Municipal Broadb<strong>and</strong> - The Evolution <strong>of</strong> Next Generation Wireless<br />

Networks", Radio <strong>and</strong> Wireless Symposium, 2007 IEEE, Pages: 273 - 276, Jan. 2007<br />

[04]. IEEE Std 802.11-1997 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />

[05]. IEEE Std 802.11-1999 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />

[06]. IEEE 802.11b-1999 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />

[07]. IEEE 802.11a-1999 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />

[08]. Kapp, S.; "802.11a. More b<strong>and</strong><strong>wi</strong>dth <strong>wi</strong>thout the <strong>wi</strong>res", Internet Computing IEEE,<br />

Volume 6 , Issue 4, page(s): 75 - 79, July-Aug. 2002<br />

[09]. Doefexi, A.; Armour, S.; Beng-Sin Lee; Nix, A.; Bull, D.; "An evaluation <strong>of</strong> the<br />

performance <strong>of</strong> IEEE 802.11a <strong>and</strong> 802.11g <strong>wi</strong>reless local area networks in a corporate<br />

<strong>of</strong><strong>fi</strong>ce environment", Communications, 2003. ICC '03. IEEE International Conference on,<br />

Volume 2, page(s): 1196 - 1200, May 2003<br />

[10]. IEEE 802.11g-2003 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />

[11]. Clincy, V.; Sitaram, A.; Odaibo, D.; Sogarwal, G,; "A Real-Time Study <strong>of</strong> 802.11b <strong>and</strong><br />

802.11g", Systems <strong>and</strong> Networks Communication, 2006. ICSNC '06. International<br />

Conference on, page(s): 69 - 69, Oct. 2006<br />

[12]. Intel Corporation (http://www.intel.com/)<br />

[13]. Sunghyun Choi; del Prado Pavon, J.; "802.11g CP: a solution for IEEE 802.11g <strong>and</strong><br />

802.11b inter-working", Vehicular Technology Conference, 2003. VTC 2003-Spring.<br />

The 57th IEEE Semiannual, Volume 1, page(s): 609 - 694, April 2003<br />

[14]. Wang, S.-C.; Chen, Y.-M.; Tsern-Huei Lee; Helmy, A; "Performance evaluations for<br />

hybrid IEEE 802.11b <strong>and</strong> 802.11g <strong>wi</strong>reless networks", Performance, Computing, <strong>and</strong><br />

Communications Conference, 2005. IPCCC 2005. 24th IEEE International, page(s): 111 -<br />

118, April 2005<br />

[15]. Mahasukhon, P.; Hempel, M.; Ci, S.; Sharif, H.; “Comparison <strong>of</strong> Throughput<br />

Performance for the IEEE 802.11a <strong>and</strong> 802.11g Networks”, AINA, pp. 792-799, 21st<br />

International Conference on Advanced Networking <strong>and</strong> Applications (AINA '07), 2007<br />

[16]. Wei-Min S. Studio, Book, "Networking Essentials", 2006, In Chinese.<br />

[17]. Gast S. M., Book, “802.11 Wireless Networks: The De<strong>fi</strong>nitive Guide”, Second Edition,<br />

2005<br />

[18]. Heusse, M.; Rousseau, F.; Berger-Sabbatel, G.; Duda, A.; "Performance anomaly <strong>of</strong><br />

802.11b", INFOCOM 2003. Twenty-Second Annual Joint Conference <strong>of</strong> the IEEE<br />

Computer <strong>and</strong> Communications Societies. IEEE, Volume 2, page(s): 836- 843, April<br />

2003<br />

[19]. Paruchuri, R.C.; Agrawal, P.; "Interference Study <strong>of</strong> 802.11b Networks for Proactive<br />

Performance Management", Network Operations <strong>and</strong> Management Symposium, 2006.<br />

NOMS 2006. 10th IEEE/IFIP, 2006<br />

[20]. Vassis, D.; Kormentzas, G.; Rouskas, A.; Maglogiannis, I.; "The IEEE 802.11g st<strong>and</strong>ard<br />

for high data rate WLANs", Network, IEEE, Volume 19, Issue 3, June 2005<br />

[21]. 802.11 PHY Layers<br />

101


(http://searchmobilecomputing.techtarget.com/searchMobileComputing/downloads/CWA<br />

P_ch8.pdf)<br />

[22]. Crow, B.P.; Widjaja, I.; Kim, L.G.; Sakai, P.T.; "IEEE 802.11 Wireless Local Area<br />

Networks", Communications Magazine, IEEE, Volume 35, Issue 9, Sept. 1997<br />

[23]. Qi, Y.; Li, H.; Hara, S.; Kohno, R.; "Clear Channel Assessment (CCA) <strong>wi</strong>th multiplexed<br />

preamble symbols for impulse Ultra-<strong>wi</strong>deb<strong>and</strong> (UWB) communications", Ultra-<br />

Wideb<strong>and</strong>, The 2006 IEEE 2006 International Conference on, Sept. 2006<br />

[24]. Vermeer, V.; "Wireless LANs; why IEEE 802.11 DSSS?", WESCON/97. Conference<br />

Proceedings, Nov. 1997<br />

[25]. Spasojevic, Z.; Burns, J.; "Performance <strong>comparison</strong> <strong>of</strong> frequency flopping <strong>and</strong> direct<br />

sequence spread spectrum systems in the 2.4 GHz range", Personal, Indoor <strong>and</strong> Mobile<br />

Radio Communications, 2000. PIMRC 2000. The 11th IEEE International Symposium on,<br />

Volume 1, Sept. 2000<br />

[26]. Wieg<strong>and</strong>t, D.A.; Zhiqiang Wu; Nassar, C.R.; "High-performance, high-throughput IEEE<br />

802.11 DSSS WLAN via carrier-interferometry chip-shaping", Broadb<strong>and</strong><br />

Communications for the Internet Era Symposium digest, 2001 IEEE Emerging<br />

Technologies Symposium on, Sept. 2001<br />

[27]. Barman, K.; Malipatil, A.V.; "ICI equalizer in a CCK based DSSS communication<br />

system", TENCON 2003. Conference on Convergent Technologies for Asia-Paci<strong>fi</strong>c<br />

Region, Volume 4, Oct. 2003<br />

[28]. Chang-Joo Kim; Hyuck-Jae Lee; Hwang-Soo Lee; "Adaptive acquisition <strong>of</strong> PN<br />

sequences for DSSS communications", Communications, IEEE Transactions on, Volume<br />

46 , Issue 8, Aug. 1998<br />

[29]. Roshan, Pejman., Book, “802.11 Wireless LAN fundamentals”, 2004<br />

[30]. Singh, G.; Alphones, A.; "OFDM modulation study for a radio-over-<strong>fi</strong>ber system for<br />

<strong>wi</strong>reless LAN (IEEE 802.11a)", Information, Communications <strong>and</strong> Signal Processing,<br />

2003 <strong>and</strong> the Fourth Paci<strong>fi</strong>c Rim Conference on Multimedia. Proceedings <strong>of</strong> the 2003<br />

Joint Conference <strong>of</strong> the Fourth International Conference on, Volume 3, Dec. 2003<br />

[31]. Shenghao Yang; Yuping Zhao; "Channel estimation method for 802.11a WLAN <strong>wi</strong>th<br />

multiple-antenna", Communications, 2004 <strong>and</strong> the 5th International Symposium on<br />

Multi-Dimensional Mobile Communications Proceedings. The 2004 Joint Conference <strong>of</strong><br />

the 10th Asia-Paci<strong>fi</strong>c Conference on, Volume 1, 29 Aug.-1 Sept. 2004<br />

[32]. Wieg<strong>and</strong>t, D.A.; Nassar, C.R.; "High-performance 802.11a <strong>wi</strong>reless LAN via carrierinterferometry<br />

orthogonal frequency division multiplexing at 5 GHz", Global<br />

Telecommunications Conference, 2001. GLOBECOM '01. IEEE, Volume 6, 25-29 Nov.<br />

2001<br />

[33]. Hongwei Yang; "A road to future broadb<strong>and</strong> <strong>wi</strong>reless access: MIMO-OFDM-Based air<br />

interface", Communications Magazine, IEEE, Volume 43, Issue 1, Jan. 2005<br />

[34]. Xianbin Wang; Wu, Y.; Chouinard, J.-Y.; Hsiao-Chun Wu; "On the design <strong>and</strong><br />

performance analysis <strong>of</strong> multisymbol encapsulated OFDM systems", Vehicular<br />

Technology, IEEE Transactions on, Volume 55, Issue 3, May 2006<br />

[35]. Gerakoulis, D.; Salmi, P.; "An interference suppressing OFDM system for ultra <strong>wi</strong>de<br />

b<strong>and</strong><strong>wi</strong>dth radio channels", Ultra Wideb<strong>and</strong> Systems <strong>and</strong> Technologies, 2002. Digest <strong>of</strong><br />

Papers. 2002 IEEE Conference on, 21-23 May 2002<br />

[36]. Zou, W.Y.; Yiyan Wu; "COFDM: an overview", Broadcasting, IEEE Transactions on,<br />

Volume 41, Issue 1, March 1995<br />

102


[37]. Sun, Y.; "B<strong>and</strong><strong>wi</strong>dth-ef<strong>fi</strong>cient <strong>wi</strong>reless OFDM", Selected Areas in Communications,<br />

IEEE Journal on, Volume 19, Issue 11, Nov. 2001<br />

[38]. Maharatna, K.; Grass, E.; Jagdhold, U.; "A 64-point Fourier transform chip for highspeed<br />

<strong>wi</strong>reless LAN application using OFDM", Solid-<strong>State</strong> Circuits, IEEE Journal <strong>of</strong>,<br />

Volume 39, Issue 3, March 2004<br />

[39]. Ye Li; Chuang, J.C.; Sollenberger, N.R.; "Transmitter diversity for OFDM systems <strong>and</strong><br />

its impact on high-rate data <strong>wi</strong>reless networks", Selected Areas in Communications, IEEE<br />

Journal on, Volume 17, Issue 7, July 1999<br />

[40]. Zhengdao Wang; Giannakis, G.B.; "Complex-<strong>fi</strong>eld coding for OFDM over fading<br />

<strong>wi</strong>reless channels", Information Theory, IEEE Transactions on, Volume 49, Issue 3,<br />

March 2003<br />

[41]. Agrawal, D.; Tarokh, V.; Naguib, A.; Seshadri, N.; "Space-time coded OFDM for high<br />

data-rate <strong>wi</strong>reless communication over <strong>wi</strong>deb<strong>and</strong> channels", Vehicular Technology<br />

Conference, 1998. VTC 98. 48th IEEE, Volume 3, 18-21 May 1998<br />

[42]. Zhiqiang Liu; Yan Xin; Giannakis, G.B.; "Space-time-frequency coded OFDM over<br />

frequency-selective fading channels", Signal Processing, IEEE Transactions on [see also<br />

Acoustics, Speech, <strong>and</strong> Signal Processing, IEEE Transactions on], Volume 50, Issue 10,<br />

Oct. 2002<br />

[43]. IEEE 802.11h-2003 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />

[44]. IEEE 802.11j-2004 (http://st<strong>and</strong>ards.ieee.org/getieee802/802.11.html)<br />

[45]. IEEE 802.16 (http://www.ieee802.org/16/)<br />

[46]. IEEE 802.16a (http://www.ieee802.org/16/)<br />

[47]. IEEE 802.16c (http://www.ieee802.org/16/)<br />

[48]. IEEE 802.16-2004 (http://www.ieee802.org/16/)<br />

[49]. IEEE 802.16e-2005 (http://www.ieee802.org/16/)<br />

[50]. Andrews. J. G., Ghosh A., Muhamed R., Book, “Fundamentals <strong>of</strong> WiMax”, 2007<br />

[51]. Liu H., Li G., Book “OFDM-Based Broadb<strong>and</strong> Wireless Networks ”, 2005<br />

[52]. Johnston D., Walker, J., “Overview <strong>of</strong> IEEE 802.16 security”, Security & Privacy<br />

Magazine, IEEE, Vol. 02, Issue 3, May-June 2004<br />

[53]. Yaghoobi H., "Scalable OFDMA Physical Layer in IEEE 802.16 WirelessMAN.", Intel<br />

Technology Journal. Vol. 8, issue 3, 2004<br />

[54]. Liangshan Ma, Dongyan Jia, “The Competition <strong>and</strong> Cooperation <strong>of</strong> WiMAX, WLAN <strong>and</strong><br />

3G”, Mobile Technology, Applications <strong>and</strong> Systems, 2005 2nd International Conference<br />

on 15-17 Nov. 2005 Page(s):1 – 5<br />

[55]. Tanenbaum A. S., Book “Computer Network”, 4 th edition, 2002<br />

[56]. Borisov N., Goldberg I., Wagner D., "Intercepting Mobile Communications: The<br />

Insecurity <strong>of</strong> 802.11" , http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html<br />

[57]. Borisov N., Goldberg I., Wagner D., "Intercepting mobile communications: the insecurity<br />

<strong>of</strong> 802.11." MOBICOM 2001, pp180–189.<br />

[58]. Sweeney D., Book “WiMax operator's manual : building 802.16 <strong>wi</strong>reless networks ”,<br />

2006<br />

[59]. WiMAX Forum - WiMAX Home < http://www.<strong>wi</strong>maxforum.org/home/><br />

[60]. IEEE 802.16 http://www.ieee802.org/16/<br />

[61]. Xiao Y., “IEEE 802.11n: enhancements for higher throughput in <strong>wi</strong>reless LANs”,<br />

Wireless Communications, IEEE [see also IEEE Personal Communications], Volume<br />

12, Issue 6 ,Dec. 2005<br />

103


[62]. Lorincz, J. Begusic, D., “Physical layer analysis <strong>of</strong> emerging IEEE 802.11n WLAN<br />

st<strong>and</strong>ard”, Advanced Communication Technology, 2006. ICACT 2006. The 8th<br />

International Conference, Volume 1, 20-22 Feb. 2006<br />

[63]. Abraham, S. Meylan, A. N<strong>and</strong>a, S., “802.11n MAC design <strong>and</strong> system performance”,<br />

Communications, 2005. ICC 2005. 2005 IEEE International Conference on, Volume 5,<br />

16-20 May 2005<br />

[64]. Cai, L.X. Xinhua Ling Xuemin Shen Mark, J.W. Hua Long, “Capacity Analysis <strong>of</strong><br />

Enhanced MAC in IEEE 802.11n”, Communications <strong>and</strong> Networking in China, 2006.<br />

ChinaCom '06. First International Conference on, 25-27 Oct. 2006<br />

[65]. 簡永懿(Yung Yih Jian) , “IEEE 802.11n 技術提案摘之研究-PHY Layer Frame<br />

Format”, May 3 2005, Information <strong>and</strong> Communications Research Labs, Industrial<br />

Technology Research Institute, in Chinese.<br />

[66]. 郭俊均(Chun Chun Guo), “IEEE 802.11n 合併提案之研究-目前合併提案中 PHY 的<br />

內容與分析 (IEEE 802.11n merge study-PHY study <strong>and</strong> analysis)”, December 15 2005,<br />

Information <strong>and</strong> Communications Research Labs, Industrial Technology Research<br />

Institute, in Chinese.<br />

[67]. IEEE 802.3 (http://www.ieee802.org/3/)<br />

[68]. ITU (http://www.itu.int/net/home/index.aspx<br />

[69]. Jhih-Jiang J., Book, “3 rd Generation Mobile Telecommunication Technology”, 2006, In<br />

Chinese.<br />

[70]. FSU - OTC (http://otc.fsu.edu/Networking/NetMenu.html)<br />

[71]. Vivato Networks Inc. (http://www.vivato.net/)<br />

[72]. WiFly (http://www.<strong>wi</strong>fly.com.tw/Wifly6/tw)<br />

[73]. Nortel Networks (http://www.nortel.com/)<br />

[74]. M-Taiwan (http://www.mtaiwan.org.tw/mp.asp?mp=3)<br />

[75]. Nortel Networks, “Solution Brief Wireless Mesh Network”,<br />

(http://media.govtech.net/Digital_Communities/Nortel/WirelessMesh_SolutionBrief.pdf)<br />

[76]. CNET, Business News, In Chinese, (http://taiwan.cnet.com/)<br />

[77]. DIGITALWALL, Business News, In Chinese, (http://www.digitalwall.com/)<br />

[78]. DIGITIMES, Business News, In Chinese, (http://www.digitimes.com.tw/)<br />

[79]. WiBro (http://www.<strong>wi</strong>bro.or.kr/)<br />

[80]. Soon-Young Y., “Introduction to Wibro Technology”, Telecom R&D Center Samsung<br />

Electronics Co, Ltd., September 2004,<br />

(http://www.itu.int/ITU-D/imt-2000/documents/Busan/Session3_Yoon.pdf)<br />

[81]. Balaji S. H., Manoj C., Taewon K, “South Korea Plans for ‘WiBro’”, Samsung<br />

Electronics Co., December 2004<br />

(http://www.ce<strong>wi</strong>t.org.in/docms/ws3/Wimaxwsbalajih.pdf)<br />

[82]. MIC, “Wireless Internet Access : WiBro”, Korea, July 2005<br />

(http://www.telecomnetworks.ru/datadocs/doc_350tu.pdf)<br />

[83]. Samsung Electronics Co. (http://www.samsung.com/us/)<br />

[84]. WiMax.com, Business News (http://www.<strong>wi</strong>max.com/)<br />

[85]. AsiaMedia, Business News (http://www.asiamedia.ucla.edu/)<br />

[86]. Wikipedia (http://www.<strong>wi</strong>kipedia.org/)<br />

[87]. Sung Ki P.; Pyeong-Jung S.; Geun Sik B.; “Joint optimization <strong>of</strong> radio repeater location<br />

<strong>and</strong> linking in WLL systems <strong>wi</strong>th 2.3 GHz frequency b<strong>and</strong>”, Communications, 1999. ICC<br />

'99. 1999 IEEE International Conference on, Volume 3, page(s): 1617 – 1621, June 1999<br />

104


[88]. Mineno T.; Babji T.,"Issues <strong>and</strong> challenges <strong>of</strong> implementing a <strong>wi</strong>reless local loop (WLL)<br />

based telephone access network", Personal Wireless Communications, 1997 IEEE<br />

International Conference on, page(s): 366 - 370, Dec. 1997<br />

[89]. Noerpel A.R.; Yi-Bing L., "Wireless local loop: architecture, technologies <strong>and</strong> services",<br />

Personal Communications, IEEE [see also IEEE Wireless Communications], Volume 5,<br />

Issue 3, page(s): 74 - 80, June 1998<br />

[90]. Haiying Z.;Boucher L.M.; Wachira M., "Technology <strong>comparison</strong>s in <strong>wi</strong>reless local loop",<br />

Personal, Indoor <strong>and</strong> Mobile Radio Communications, 2001 12th IEEE International<br />

Symposium on, Volume 1, page(s): A-46 - A-50, Oct 2001<br />

[91]. Seidel S.Y., "Radio propagation <strong>and</strong> planning at 28 GHz for local multipoint distribution<br />

service (LMDS)", Antennas <strong>and</strong> Propagation Society International Symposium, 1998.<br />

IEEE, Volume 2, page(s): 622 - 625, June 1998<br />

[92]. Schellenberg J., "Designing the digital MMDS network for maximum bene<strong>fi</strong>t:<br />

technological considerations in service, coverage <strong>and</strong> subscriber issues", Broadcasting<br />

Convention, 1997. IBS 97., International (Conf. Publ. 447), page(s): LP1 - LP5, Sept.<br />

1997<br />

[93]. Ghosh A.; Wolter D.R.; Andrews J.G.; Chen R., "Broadb<strong>and</strong> <strong>wi</strong>reless access <strong>wi</strong>th<br />

WiMax/802.16: current performance benchmarks <strong>and</strong> future potential", Communications<br />

Magazine, IEEE, Volume 43, Issue 2 page(s): 129- 136, Feb. 2005<br />

[94]. Eklund C.; Marks R.B.; Stanwood K.L.; Wang, S., "IEEE st<strong>and</strong>ard 802.16: a technical<br />

overview <strong>of</strong> theWirelessMANTM air interface for broadb<strong>and</strong> <strong>wi</strong>relessaccess",<br />

Communications Magazine, IEEE, Volume 40, Issue 6, page(s): 98-107, Jun 2002<br />

[95]. Dong-Hoon C.; Jung-Hoon S. ;Min-Su K.; Ki-Jun H., "Performance analysis <strong>of</strong> the IEEE<br />

802.16 <strong>wi</strong>reless metropolitan area network", Distributed Frameworks for Multimedia<br />

Applications, 2005. DFMA '05. First International Conference on, page(s): 130- 136, Feb.<br />

2005<br />

[96]. Carl E., "The IEEE 802.16 St<strong>and</strong>ard for Broadb<strong>and</strong> Wireless Access"<br />

(http://www2.ing.unipi.it/ew2002/proceedings/pmp002.pdf)<br />

[97]. Sch<strong>wi</strong>ngenschlogl C.; Dastis V.; Mogre P.S.; Hollick M.; Steinmetz R., "Performance<br />

Analysis <strong>of</strong> the Real-time Capabilities <strong>of</strong> Coordinated Centralized Scheduling in 802.16<br />

Mesh Mode", Vehicular Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd,<br />

Volume 3, page(s): 1241 - 1245, 2006<br />

[98]. Nuaymi L.; Noun Z., "Simple Capacity Estimations in WIMAX/802.16 System",<br />

Personal, Indoor <strong>and</strong> Mobile Radio Communications, 2006 IEEE 17th International<br />

Symposium on, page(s): 1 - 5, Sept. 2006<br />

[99]. Juan L.; Haggman S. G., "Performance <strong>of</strong> IEEE802.16-2004 Based System in Jamming<br />

Environment <strong>and</strong> its Improvement <strong>wi</strong>th Link Adaptation", Personal, Indoor <strong>and</strong> Mobile<br />

Radio Communications, 2006 IEEE 17th International Symposium on, page(s): 1 - 5,<br />

Sept. 2006<br />

[100]. Christian H., "Analysis <strong>and</strong> performance evaluation <strong>of</strong> the OFDM-based metropolitan<br />

area network IEEE 802.16", European Wireless 2004 Conference, Volume 49, Issue 3,<br />

Pages 341-363, 19 October 2005<br />

[101]. Bo H.; Weijia J.; Lidong L., "Performance evaluation <strong>of</strong> scheduling in IEEE 802.16<br />

based <strong>wi</strong>reless mesh networks", Computer Communications, Volume 30, Issue 4, Pages<br />

782-792, 26 February 2007<br />

105


[102]. K<strong>of</strong>fman I.; Roman V., "Broadb<strong>and</strong> <strong>wi</strong>reless access solutions based on OFDM access in<br />

IEEE802.16", Communications Magazine, IEEE, Volume 40, Issue 4, page(s): 96-103,<br />

Apr 2002<br />

[103]. Baxley R.J.; Kleider J.E.; Zhou G.T., "Pilot Design for IEEE 802.16 OFDM <strong>and</strong><br />

OFDMA", Acoustics, Speech <strong>and</strong> Signal Processing, 2007. ICASSP 2007. IEEE<br />

International Conference on, Volume 2, page(s): II-321 - II-324, April 2007<br />

[104]. Yanxin Y.; Tomisawa M.; Yi G.; Yong Liang G.; Gang W.; Choi Look L., "Joint timing<br />

<strong>and</strong> frequency synchronization for IEEE 802.16 OFDM systems", Mobile WiMAX<br />

Symposium, 2007. IEEE, page(s): 17 - 21, March 2007<br />

[105]. Al-Gharabally M.; Das P., "Performance analysis <strong>of</strong> OFDM in frequency selective timevariant<br />

channels <strong>wi</strong>th application to IEEE 802.16 broadb<strong>and</strong> <strong>wi</strong>reless access", Volume 1,<br />

page(s): 351 - 356, Oct. 2005<br />

[106]. Jisang Y.; Kanghee K.; Kiseon K., "Capacity evaluation <strong>of</strong> the OFDMA-CDMA ranging<br />

subsystem in IEEE 802.16-2004", Wireless And Mobile Computing, Networking And<br />

Communications, 2005. (WiMob'2005), IEEE International Conference on, Volume 1,<br />

Page(s):217 - 223, 2005<br />

[107]. de Moraes L.F.M.; Maciel P.D.Jr.; "Analysis <strong>and</strong> evaluation <strong>of</strong> a new MAC protocol for<br />

broadb<strong>and</strong> <strong>wi</strong>reless access", Wireless Networks, Communications <strong>and</strong> Mobile Computing,<br />

2005 International Conference on, Volume 1, page(s): 107- 112, June 2005<br />

[108]. GuoSong C.; Deng W.; Shunliang M., "A QoS architecture for the MAC protocol <strong>of</strong><br />

IEEE 802.16 BWA system", Communications, Circuits <strong>and</strong> Systems <strong>and</strong> West Sino<br />

Expositions, IEEE 2002 International Conference on, Volume 1, Page(s):435 - 439, 29<br />

June-1 July 2002<br />

[109]. Haitang W.; Bing H.; Agrawal, D.P., "Admission Control <strong>and</strong> B<strong>and</strong><strong>wi</strong>dth Allocation<br />

above Packet Level for IEEE 802.16 Wireless MAN", Parallel <strong>and</strong> Distributed Systems,<br />

2006. ICPADS 2006. 12th International Conference on, Volume 1, 12-15 July 2006<br />

[110]. Cicconetti C.; Erta A.; Lenzini L.; Mingozzi E., "Performance Evaluation <strong>of</strong> the IEEE<br />

802.16 MAC for QoS Support", Mobile Computing, IEEE Transactions on, Volume 6,<br />

Issue 1, Page(s):26 - 38, Jan. 2007<br />

[111]. Lin J.; Sirisena H.; "Quality <strong>of</strong> Service Scheduling in IEEE 802.16 Broadb<strong>and</strong> Wireless<br />

Networks", Industrial <strong>and</strong> Information Systems, First International Conference on,<br />

Page(s):396 - 401, 8-11 Aug. 2006<br />

[112]. Sun J.; Yanling Y.; Hongfei Z.; "Quality <strong>of</strong> Service Scheduling for 802.16 Broadb<strong>and</strong><br />

Wireless Access Systems", Vehicular Technology Conference, 2006. VTC 2006-Spring.<br />

IEEE 63rd, Volume 3, Page(s):1221 - 1225, 2006<br />

[113]. Soong A.C.K., "Technological enablers <strong>of</strong> the IEEE <strong>wi</strong>reless metropolitan area network<br />

(IEEE 802.16)", Quality <strong>of</strong> Service in Heterogeneous Wired/Wireless Networks, 2005.<br />

Second International Conference on, 22-24 Aug. 2005<br />

[114]. Piechoclri, R.J.; Tsoulos, G.V., "A macrocellular radio channel model for smart antenna<br />

tracking algorithms", Vehicular Technology Conference, 1999 IEEE 49th, Volume 3,<br />

Page(s):1754 - 1758, 16-20 May 1999<br />

[115]. Hamid Z.; Khan Shoab A., "An Augmented Security Protocol for WirelessMAN Mesh<br />

Networks", Communications <strong>and</strong> Information Technologies, 2006. ISCIT '06.<br />

International Symposium on, Page(s):861 - 865, Oct. 18 2006-Sept. 20 2006<br />

[116]. Sen X.; Manton M.; Chin-Tser H., "Security issues in privacy <strong>and</strong> key management<br />

protocols <strong>of</strong> IEEE 802.16", ACM Southeast Regional Conference, Pages: 113 - 118, 2006<br />

106


[117]. Yun Z.; Yuguang F., "Security <strong>of</strong> IEEE 802.16 in Mesh Mode", Military<br />

Communications Conference, 2006. MILCOM 2006, Page(s):1 - 6, 23-25 Oct. 2006<br />

[118]. Sen X.; Chin-Tser H.; Matthews M., "Secure multicast in various scenarios <strong>of</strong><br />

WirelessMAN", SoutheastCon, 2007. Proceedings. IEEE, Page(s):709 - 714, March 2007<br />

[119]. Ginley M.; Sen X.; Chin-Tser H.; Matthews M., "Ef<strong>fi</strong>cient <strong>and</strong> Secure Multicast in<br />

WirelessMAN", Wireless Pervasive Computing, 2007. ISWPC '07. 2nd International<br />

Symposium on, 5-7 Feb. 2007<br />

[120]. Moiseev S.N.; Sergey N. M.; Filin S.A.; Kondakov M.S.; Alex<strong>and</strong>re V. G.; Garmonov<br />

A.V.; Andrew Y. S.; Savinkov A.Y.; Yun Sang P.; Seok Ho C., "Optimal Average<br />

Number <strong>of</strong> Data Block Transmissions for the ARQ Mechanism in the IEEE 802.16<br />

OFDMA System", Personal, Indoor <strong>and</strong> Mobile Radio Communications, 2006 IEEE 17th<br />

International Symposium on, Page(s):1 - 5, Sept. 2006<br />

[121]. Gowda H.; Lakshmaiah R.; Kaur M.; Mohanram C.; Singh M.; Dongre S., "A slot<br />

allocation mechanism for diverse QoS types in OFDMA based IEEE 802.16e systems",<br />

Advanced Communication Technology, The 9th International Conference on, Volume 1,<br />

Page(s):13 - 17, 12-14 Feb. 2007<br />

[122]. Wang F.; Ghosh A.; Love R.; Stewart K.; Ratasuk R.; Bachu R.; Sun Y.; Zhao Q., "IEEE<br />

802.16e system performance: analysis <strong>and</strong> simulations", Personal, Indoor <strong>and</strong> Mobile<br />

Radio Communications, 2005. PIMRC 2005. IEEE 16th International Symposium on,<br />

Volume 2, page(s): 900- 904, 11-14 Sept. 2005<br />

[123]. Sen I.; Wang B.; Matolak David W., "Performance <strong>of</strong> IEEE 802.16 OFDMA St<strong>and</strong>ard<br />

Systems in Airport Surface Area Channels", Integrated Communications, Navigation <strong>and</strong><br />

Surveillance Conference, 2007. ICNS '07, Page(s):1 - 12, April 30 2007-May 3 2007<br />

[124]. Hongxiang L.; Hui L., "An Analysis on Uplink OFDMA Optimality", Vehicular<br />

Technology Conference, 2006. VTC 2006-Spring. IEEE 63rd, Volume 3, Page(s):1339 -<br />

1343, 2006<br />

[125]. Esli C.; Delic H., "Performance Analysis for OFDMA in the Presence <strong>of</strong> Tone<br />

Interference", Communications, IEEE Transactions on, Volume 55, Issue 5, Page(s):845<br />

- 849, May 2007<br />

[126]. Kivanc D.; Hui L., "Subcarrier allocation <strong>and</strong> power control for OFDMA", Signals,<br />

Systems <strong>and</strong> Computers, 2000. Conference Record <strong>of</strong> the Thirty-Fourth Asilomar<br />

Conference on, Volume 1, Page(s):147 - 151, 29 Oct.-1 Nov. 2000<br />

[127]. Hui-Juan Y.; Geng-Sheng K., "An Integrated QoS-Aware Mobility Architecture for<br />

Seamless H<strong>and</strong>over in IEEE 802.16e Mobile BWA Networks", Military Communications<br />

Conference, 2006. MILCOM 2006, Page(s):1 - 7, 23-25 Oct. 2006<br />

[128]. Kuo G. S.; Yao H. J., "A QoS-Adaptive Admission Control for IEEE 802.16e-based<br />

Mobile BWA Networks", Consumer Communications <strong>and</strong> Networking Conference, 2007.<br />

CCNC 2007. 2007 4th IEEE, Page(s):833 - 837, Jan. 2007<br />

[129]. Vatsa Oman<strong>and</strong> J.; Raj M.; K Ritesh K.; Panigrahy D.; Das D., "Adaptive Power Saving<br />

Algorithm for Mobile Subscriber Station in 802.16e", Communication Systems S<strong>of</strong>tware<br />

<strong>and</strong> Middleware, 2007. COMSWARE 2007. 2nd International Conference on, Page(s):1 -<br />

7, 7-12 Jan. 2007<br />

[130]. Zhang Y.; Fujise M., "Energy management in the IEEE 802.16e MAC", Communications<br />

Letters, IEEE, Volume 10, Issue 4, Page(s):311 - 313, Apr 2006<br />

[131]. Xiao Y., "Energy saving mechanism in the IEEE 802.16e <strong>wi</strong>reless MAN",<br />

Communications Letters, IEEE, Volume 9, Issue 7, Page(s):595 - 597, July 2005<br />

107


[132]. Mukherjee S.; Leung K.K.; Rittenhouse G.E., "Protocol <strong>and</strong> control mechanisms to save<br />

terminal energy in IEEE 802.16 networks", Communications, Computers <strong>and</strong> signal<br />

Processing, 2005. PACRIM. 2005 IEEE Paci<strong>fi</strong>c Rim Conference on, Page(s):5 - 8, 24-26<br />

Aug. 2005<br />

[133]. Jee-young S.; Hyun-ho C.; Hyun-dae K.; Sang-wook K.; Dong-ho C.; Hong-sung C.;<br />

Geunwhi L.; Jun-hyung K., "Performance <strong>comparison</strong> <strong>of</strong> 802.16d OFDMA, TD-CDMA,<br />

cdma2000 1xEV-D0 <strong>and</strong> 802.11a WLAN on voice over IP service", Vehicular<br />

Technology Conference, 2005. VTC 2005-Spring. 2005 IEEE 61st, Volume 3,<br />

Page(s):1965 - 1969, 30 May-1 June 2005<br />

[134]. Yuexing P.; Hongzhong Y.; Young il K.; Yong Su L.; Wenbo W., "Performance <strong>of</strong><br />

Convolutional Turbo Coded High-speed Portable Internet (WiBro) System", Vehicular<br />

Technology Conference, 2007. VTC2007-Spring. IEEE 65th, Page(s):730 - 734, 22-25<br />

April 2007<br />

[135]. Taesoo K.; Howon L.; Sik C.; Juyeop K.; Dong-Ho C.; Sunghyun C.; Sangboh Y.; Won-<br />

Hyoung P.; Kiho K., "Design <strong>and</strong> implementation <strong>of</strong> a simulator based on a cross-layer<br />

protocol between MAC <strong>and</strong> PHY layers in a WiBro Compatible.IEEE 802.16e OFDMA<br />

system", Communications Magazine, IEEE, Volume 43, Issue 12, Page(s):136 - 146, Dec.<br />

2005<br />

[136]. Xiao Y.; Pan Y.; Li J., "Design <strong>and</strong> analysis <strong>of</strong> location management for 3G cellular<br />

networks", Parallel <strong>and</strong> Distributed Systems, IEEE Transactions on, Volume 15, Issue 4,<br />

Page(s):339 - 349, April 2004<br />

[137]. Derryberry R.T.; Gray S.D.; Ionescu D.M.; M<strong>and</strong>yam G.; Raghothaman B., "Transmit<br />

diversity in 3G CDMA systems", Communications Magazine, IEEE, Volume 40, Issue 4,<br />

page(s): 68-75, Apr 2002<br />

[138]. Proctor T.K., "Evolution to 3G services: provision <strong>of</strong> 3G services over GERAN<br />

(GSM/EDGE radio access network)", 3G Mobile Communication Technologies, 2003.<br />

3G 2003. 4th International Conference on (Conf. Publ. No. 494), Page(s):78 - 82, 25-27<br />

June 2003<br />

[139]. Rikkinen K.; Wildey C., "WCDMA scenarios for the 2.5 GHz IMT-2000 extension b<strong>and</strong><br />

supporting asymmetric frequency allocations", 3G Mobile Communication Technologies,<br />

2003. 3G 2003. 4th International Conference on (Conf. Publ. No. 494), Page(s):294 - 298,<br />

25-27 June 2003<br />

[140]. Goransson B.; Hagerman B.; Petersson S.; Sorelius J., "Advanced antenna systems for<br />

WCDMA: link <strong>and</strong> system level results", Personal, Indoor <strong>and</strong> Mobile Radio<br />

Communications, 2000. PIMRC 2000. The 11th IEEE International Symposium on,<br />

Volume 1, Page(s):62 - 66, 18-21 Sept. 2000<br />

[141]. Suryanegara M.; Hutabarat E.R.; Gunawan D., "The Interference on WCDMA System in<br />

3G Coexistence Network", Personal, Indoor <strong>and</strong> Mobile Radio Communications, 2006<br />

IEEE 17th International Symposium on, Page(s):1 - 5, Sept. 2006<br />

[142]. Liangchi H.; Cheng M.W.; Niva I., "Evolution towards simultaneous high-speed packet<br />

data <strong>and</strong> voice services: an overview <strong>of</strong> cdma2000 1/spl times/EV-DV",<br />

Telecommunications, 2003. ICT 2003. 10th International Conference on, Volume 2,<br />

Page(s):1313 - 1317, 23 Feb.-1 March 2003<br />

[143]. Becker G.E.; Rudrapatna R.; Sowlay S.; Wong K.N.; Wu J.R., "Integrated Network <strong>and</strong><br />

Element Management System for the 3rd generation CDMA2000 <strong>wi</strong>reless network",<br />

108


Network Operations <strong>and</strong> Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP,<br />

Page(s):953 - 954, 10-14 April 2000<br />

[144]. Chen H. H.; Fan C. X.; Lu W. W., "China's perspectives on 3G mobile commuunications<br />

<strong>and</strong> beyond: TD-SCDMA technology", Wireless Communications, IEEE [see also IEEE<br />

Personal Communications], Volume 9, Issue 2, Page(s):48 - 59, April 2002<br />

[145]. Xirrus High Performance Wi-Fi (http://www.xirrus.com/)<br />

[146]. Foundry Networks (http://www.foundrynet.com/)<br />

[147]. Interview From FSU-OTC, 10/08/2007, Mr. Clint Ringgold, Network Administrator <strong>of</strong><br />

OTC <strong>and</strong> Mr. Phillip M. Callahan, Assistant Director <strong>of</strong> OTC.<br />

[148]. Interview From Q-WARE SYSTEMS & SERVICES CORP., 11/06/2007, Ms. Linda Yeh,<br />

Account Manager <strong>of</strong> Sales & Customer Service Dep.<br />

[149]. Tan K.; Feng J.; Qian Z.; Xuemin S., "Congestion Control in Multihop Wireless<br />

Networks", Vehicular Technology, IEEE Transactions on, Volume 56, Issue 2, March<br />

2007<br />

[150]. Yung Y.; Shakkottai, S., "Hop-by-hop Congestion Control over a Wireless Multi-hop<br />

Network", Networking, IEEE/ACM Transactions on, Volume 15, Issue 1, Feb. 2007<br />

[151]. Zhou, H.; Hoang, D.; Nhan, P.; Mirch<strong>and</strong>ani, V., "Introducing feedback congestion<br />

control to a network <strong>wi</strong>th IEEE 802.11 <strong>wi</strong>reless LAN", Wireless Telecommunications<br />

Symposium, 2004, 14-15 May 2004<br />

[152]. Weirong L.; Jianqiang Y.; Dongbin Z.; Wen, J.T., "A Smooth Control to Avoid<br />

Congestion for Wireless Network", Networking, Sensing <strong>and</strong> Control, 2006. ICNSC '06.<br />

Proceedings <strong>of</strong> the 2006 IEEE International Conference on, 23-25 April 2006<br />

[153]. Seungcheon K.; Jamalipour, A., "Congestion control for best-effort services in <strong>wi</strong>reless<br />

access network", ATM (ICATM 2001) <strong>and</strong> High Speed Intelligent Internet Symposium,<br />

2001. Joint 4th IEEE International Conference on, 22-25 April 2001<br />

[154]. IEEE 802.11u ( http://www.ieee802.org/11/Reports/tgu_update.htm)<br />

109


BIOGRAPHICAL SKETCH<br />

Ming-Chieh Wu was born in Tainan, Taiwan, in 1978. He entered Tang Kong University in<br />

Taiwan, in 1998 majoring in Aerospace Engineering.. His interest at that time was navigation. In<br />

senior year, he joined a project called “Regional Aircraft Design” <strong>wi</strong>th another classmate. In this<br />

project, the group did not need to build a real airplane, but they had to run a simulation that had a<br />

reasonable solution to make sure this aircraft could fly. At the end <strong>of</strong> the project, the group<br />

received an “A.” Mr. Wu graduated in 2002 <strong>and</strong> joined the Air Force for two years. After his<br />

military service, he started to apply to graduate school in the U.S. <strong>and</strong> was accepted by <strong>Florida</strong><br />

<strong>State</strong> University. In graduate school, he changed his major to Electrical Engineering. After his<br />

<strong>fi</strong>rst semester, he found that his true interest was in <strong>wi</strong>reless communication. After that, he<br />

started to take communication related classes. After graduating from FSU, Mr. Wu would like to<br />

design <strong>wi</strong>reless communication networks because he believes that it <strong>wi</strong>ll be the future trend.<br />

110

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!