Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F New and Bestselling from Wiley-IEEE Press A Guide to the Wireless Engineering Body of Knowledge (WEBOK) The ComSoc Guide to Next Generation Optical Transport IEEE COMMUNICATIONS SOCIETY The ultimate reference book for professionals in the wireless industry and study guide for the WCET. The information presented in this book reflects the evolution of wireless technologies, their impact on the profession, and the industry’s commonly accepted best practices. HUUB VAN HELVOORT Provides a unique overview of SDH and OTN for engineers who are new to the field, as well as manufacturers, network operators, and graduate students who need a basic understanding of the topics. 978-0-470-43366-9 • April 2009 • Pbk • 272pp $69.95 SDH/SONET/OTN 978-0-470-22610-0 • October 2009 • Pbk • 211pp $63.50 ComSoc Guides to Communications Technologies Handbook on Array Processing and Sensor Networks Wireless Sensor Networks SIMON HAYKIN and K. J. RAY LIU Provides readers with a collection of tutorial articles contributed by world-renowned experts on recent advancements and the state of the art in array processing and sensor networks. JUN ZHENG and ABBAS JAMALIPOUR This book provides a comprehensive and systematic introduction to the fundamental concepts, major challenges, and effective solutions in wireless sensor networking (WSN). 978-0-470-37176-3 • January 2010 • Hbk • 904pp $185.00 Adaptive and Learning Systems for Signal Processing, Communications and Control Series 978-0-470-16763-2 • October 2009 • Hbk • 489pp $94.95 A Networking Perspective Ground-Based Wireless Positioning Advances in Multiuser Detection MICHAEL L. HONIG During the past decade, the design and development of current and emerging wireless systems have motivated many important advances in multiuser detection. This book provides a comprehensive overview of crucial recent developments 978-0-470-47381-8 • September 2009 • Hbk • 493pp $125.00 Wiley Series in Telecommunications and Signal Processing Next Generation Solutions TULAY ADALI and SIMON HAYKIN Recent developments have made it clear that significant performance gains can be achieved beyond those using standard adaptive filtering approaches. This book presents the next generation of algorithms that will produce these desired results. 978-0-470-19517-8 • April 2010 • Hbk • 424pp $120.00 Adaptive and Learning Systems for Signal Processing, Communications and Control Series IEEE Wireless Positioning Kegen Yu Ian Sharp Y. Jay Guo 978-0-470-74704-9 • June 2009 • Hbk • 450pp $120.00 Near-Capacity Multi-Functional MIMO Systems LAJOS HANZO, OSAMAH ALAMRI, MOHAMMED EL-HAJJAR and NAN WU Providing an all-encompassing self-contained treatment of Near-Capacity Multi-Functional MIMO Systems it gives a detailed examination of wireless landscape, including the fields of channel coding, spacetime coding and turbo detection techniques. 978-0-470-77965-1 • May 2009 • Hbk • 738pp $200.00 ORDER WILEY ONLINE… For telephone orders: Call 1-800-225-5945 (1-800-US-WILEY) Fax: (212) 850-8888 _________ E-mail: custserv@wiley.com • Visit the Wiley Electrical Engineering homepage: www.wiley.com/electrical • Wiley Communications Technology Website: www.wiley.com/go/commstech/ • Amazon Wiley Communications Technology bookstore: www.amazon.com/professional/ Please note all prices correct at time of going to press but subject to change. Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A 14140 HOW TO ORDER Communications Ground-Based Sphere-Packing, Iterative Detection and Cooperation Adaptive Signal Processing Wiley books are available through your Bookseller. Alternatively send your order to: John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA KEGEN YU, IAN SHARP and Y. JAY GUO Provides an in-depth treatment of non-GPS based wireless positioning techniques, with a balance between theory and engineering practice. The book presents the architecture, design and testing of a variety of wireless positioning systems based on the time-of-arrival, signal strength, and angle-of-arrival measurements. BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F THIS MONTH’S DIGITAL DELIVERY OF IEEE COMMUNICATIONS MAGAZINE SUPPORTED BY: Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Contents | Zoom in | Zoom out For navigation instructions please click here IEEE Search Issue | Next Page April 2010, Vol. 48, No. 4 www.comsoc.org C FT D l: ria to Tu 9 c ge So Pa om ee S Integrated Circuits for Communications ee Fr Design and Implementation: IMS Applications and Support MAGAZINE ® A Publication of the IEEE Communications Society Contents | Zoom in | Zoom out For navigation instructions please click here Search Issue | Next Page Communications Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F ©2009 Cisco Systems Inc. All Rights Reserved. IEEE Now Showing: The Future of Video Entertainment Video is driving a market transition in networking that creates unique challenges for service providers. Evolve your network with Cisco into a medianet and go beyond being a service provider to become an experience provider. Cisco is the only company, which along with its partners, can address video and rich media from an end-to-end perspective by leveraging deep expertise in IP, video and customer premise solutions. Move video more efficiently, and energize customer satisfaction and increase revenues. Deliver the connected life that’s more social, more personal and more interactive. Begin your transformation at www.cisco.com/go/sp/medianet Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Accelerating Growth and Development COMMUNICATIONS: ____________________ OPENING & KEYNOTE SESSIONS Pandor Gray Pandey September Accelerating Growth and Development Monday, 24 May 2010 • 8:30 – 9:40 Ngcaba Accelerating Growth and Development for Business Monday, 24 May 2010 • 10:15 – 11:30 Valenzuela Yeung Research and Technology for Accelerating Growth and Development Tuesday, 25 May 2010 • 8:30 – 10:00 Naledi Pandor Reuben September Reinaldo Valenzuela Conference Chair Minister of the Department of Science and Technology South Africa Group Chief Executive Officer Telkom, Republic of South Africa Director, Wireless Research Bell Labs, Alcatal-Lucent, USA Steven D. Gray Head & Vice President, Corporate Research Huawei Technologies, USA Ajay Pandey Raymond W. Yeung Managing Director & Chief Executive Officer Neotel, Republic of South Africa Chair Professor Chinese University of Hong Kong, Hong Kong Andile Ngcaba Executive Chairman Dimension Data - Africa and Middle East, Republic of South Africa BUSINESS FORUMS Monday, 24 March 2010 Tuesday, 25 March 2010 Wednesday, 26 March 2010 Mobile Broadband as an Enabler of Accelerated Broadband Development Regulatory Environment and Spectrum Reform – the Key to Growth and Development Ultra Broadband Technologies 13:30 – 15:00 11:00 – 12:30 9:00 – 10:30 IMT-Advanced - The Technical and the Strategic Landscape for 4G and Beyond Policy and Funding Models for Accelerating the Rollout of Broadband Access and Networks in Developing Countries 100 Gbps Networking: Trends, Deployment, and Challenges 15:30 – 17:00 Alternatives to providing Affordable and Sustainable Mobile Broadband in a Fast and Cost Effective Manner 13:30 – 15:00 Spectrum Management – Technologies, Economics, Regulatory Environment 15:30 – 17:00 Challenges in Commercialization of Cognitive Radio Technologies TECHNICAL SYMPOSIA • Ad Hoc Sensor and Mesh Networking • Communication and Information System Security • Communication Theory • Communications Quality of Service, Reliability and Performance Modeling • Multimedia Services, Communications Software and Services • Next Generation Networking Protocols, and Services • Optical Networks and Systems TUTORIALS • Signal Processing • Wireless Communications • Wireless and Mobile Networking • Selected Areas in Communications > Buy one get the second one free! < T1: T2: T3: T4: T5: T6: T7: T8: T9: Cooperative Wireless Communications Networking Cognitive Radios for Dynamic Spectrum Access Broadband Wireless Technologies: LTE and WiMax Locality Aware P2P Delivery: The Way to Scale Internet Video Energy Efficient Networks High-Definition Location-Awareness Compressive Sensing and Signal Scarcity in WirelessCommunications Application of Game Theory for Designing Cognitive Radio Networks Statistical Delay-QoS Provisioning in Wireless Networks: Effective Capacity and QoS-Driven Resource Allocations T10: Planning Wireless Municipal Networks based on Wi-Fi/WiMax Mesh Networks Applications, Technologies and Business Models T11: T12: T13: T14: T15: T16: T17: T18: T19: T20: Femto-cells: Opportunities and Challenges Vehicular Networking Aspects of Multiuser MIMO-Principles and Standardization in LTE-Advanced Understanding Next Generation Mobile Networks (NGMN): The Role of the Evolved Packet Core (EPC) for seamless Mobile Broadband Service Provision Multi Gigabit Transmissions at 60 GHz: Standards, Technologies, and Challenges Stochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Recovery in IP over Optical Networks: Challenges and Solutions Overview of 3GPP LTE Radio Interface: Layers 2/3 Security Issues in Dynamic Spectrum Access Networks Biologically-inspired and Nano-scale Communication and Networking WORKSHOPS W1: Smart Grid Communications W2: Energy Efficiency in Wireless Networks & Wireless Networks for Energy Efficiency W3: Vehicular Connectivity W4: Social Networks W5: Underwater Networks W6: W7: W8: W9: Cooperative and Cognitive Mobile Networks Cognitive Radio Interfaces and Signal Processing Medical Applications Networking IEEE Vehicular Networking and Applications: Future Wireless Technologies for Vehicle Infrastructure Integration (VII) Applications W10: Integrated Disaster Risk Management for Africa Register by 23 April 2010 to receive the reduced registration rate! Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Director of Magazines Andrzej Jajszczyk, AGH U. of Sci. & Tech. (Poland) A BEMaGS F IEEE Editor-in-Chief Steve Gorshe, PMC-Sierra, Inc. (USA) Associate Editor-in-Chief Sean Moore, Avaya (USA) Senior Technical Editors Tom Chen, Swansea University (UK) Nim Cheung, ASTRI (China) Nelson Fonseca, State Univ. of Campinas (Brazil) Torleiv Maseng, Norwegian Def. Res. Est. (Norway) Peter T. S. Yum, The Chinese U. Hong Kong (China) Technical Editors Sonia Aissa, Univ. of Quebec (Canada) Mohammed Atiquzzaman, U. of Oklahoma (USA) Paolo Bellavista, DEIS (Italy) Tee-Hiang Cheng, Nanyang Tech. U. (Rep. Singapore) Jacek Chrostowski, Scheelite Techn. LLC (USA) Sudhir S. Dixit, Nokia Siemens Networks (USA) Stefano Galli, Panasonic R&D Co. of America (USA) Joan Garcia-Haro, Poly. U. of Cartagena (Spain) Vimal K. Khanna, mCalibre Technologies (India) Janusz Konrad, Boston University (USA) Abbas Jamalipour, U. of Sydney (Australia) Deep Medhi, Univ. of Missouri-Kansas City (USA) Nader F. Mir, San Jose State Univ. (USA) Amitabh Mishra, Johns Hopkins University (USA) Sedat Ölçer, IBM (Switzerland) Glenn Parsons, Ericsson Canada (Canada) Harry Rudin, IBM Zurich Res.Lab. (Switzerland) Hady Salloum, Stevens Institute of Tech. (USA) Antonio Sánchez Esguevillas, Telefonica (Spain) Heinrich J. Stüttgen, NEC Europe Ltd. (Germany) Dan Keun Sung, Korea Adv. Inst. Sci. & Tech. (Korea) Danny Tsang, Hong Kong U. of Sci. & Tech. (Japan) Series Editors Ad Hoc and Sensor Networks Edoardo Biagioni, U. of Hawaii, Manoa (USA) Silvia Giordano, Univ. of App. Sci. (Switzerland) Automotive Networking and Applications Wai Chen, Telcordia Technologies, Inc (USA) Luca Delgrossi, Mercedes-Benz R&D N.A. (USA) Timo Kosch, BMW Group (Germany) Tadao Saito, University of Tokyo (Japan) Design & Implementation Sean Moore, Avaya (USA) Integrated Circuits for Communications Charles Chien (USA) Zhiwei Xu, SST Communication Inc. (USA) Stephen Molloy, Qualcomm (USA) Network and Service Management Series George Pavlou, U. of Surrey (UK) Aiko Pras, U. of Twente (The Netherlands) Topics in Optical Communications Hideo Kuwahara, Fujitsu Laboratories, Ltd. (Japan) Osman Gebizlioglu, Telcordia Technologies (USA) John Spencer, Optelian (USA) Vijay Jain, Verizon (USA) Topics in Radio Communications Joseph B. Evans, U. of Kansas (USA) Zoran Zvonar, MediaTek (USA) Standards Yoichi Maeda, NTT Adv. Tech. Corp. (Japan) Mostafa Hashem Sherif, AT&T (USA) Columns Book Reviews Andrzej Jajszczyk, AGH U. of Sci. & Tech. (Poland) History of Communications Mischa Schwartz, Columbia U. (USA) Regulatory and Policy Issues J. Scott Marcus, WIK (Germany) Jon M. Peha, Carnegie Mellon U. (USA) Technology Leaders' Forum Steve Weinstein (USA) Very Large Projects Ken Young, Telcordia Technologies (USA) Your Internet Connection Eddie Rabinovitch, ECI Technology (USA) Publications Staff Joseph Milizzo, Assistant Publisher Eric Levine, Associate Publisher Susan Lange, Digital Production Manager Jennifer Porcello, Production Specialist Catherine Kemelmacher, Associate Editor Devika Mittra, Publications Assistant ® 2 Communications IEEE MAGAZINE April 2010, Vol. 48, No. 4 www.comsoc.org/~ci 6 10 14 16 19 PRESIDENT’S PAGE/BYEONG GI LEE SOCIETY NEWS/COMSOC MEMBERS NAMED TO FELLOW GRADE CONFERENCE CALENDAR NEW PRODUCTS GLOBAL COMMUNICATIONS NEWSLETTER/EDITED BY STEFANO BREGNI DESIGN AND IMPLEMENTATION: IMS APPLICATIONS AND SUPPORT SERIES EDITOR: SEAN MOORE 24 GUEST EDITORIAL 26 IMS SERVICE DEVELOPMENT API AND TESTBED The authors explore the architectural and protocol aspects that enable third-party IMS application development and deployment. They also study how the applications will coexist with other applications already deployed in the IMS. They describe Java libraries exploiting the functionality of the IMS both in the terminal client and within the core network. SALVATORE LORETO, TOMAS MECKLIN, MILJENKO OPSENICA, AND HEIDI-MARIA RISSANEN 34 DEPLOYMENT OF CONTEXTUAL CORPORATE TELCO SERVICES BASED ON PROTOCOL ADAPTATION IN THE NGN ENVIRONMENT The authors present a practical deployment of a contextual service offered by a convergent telecommunications operator, whose functionality is to provide intelligent context-based call routing and rerouting, orchestrated from the operator’s service layer. It is based on IMS control layer capabilities to properly capture the situation of the end user in a ubiquitous coverage area. ALEJANDRO CADENAS, ANTONIO SANCHEZ-ESGUEVILLAS, AND BELÉN CARRO 42 THE DESIGN AND IMPLEMENTATION OF ARCHITECTURAL COMPONENTS FOR THE INTEGRATION OF THE IP MULTIMEDIA SUBSYSTEM AND WIRELESS SENSOR NETWORKS The authors have previously proposed a presence-based architecture for WSN/IMS integration. This architecture relies on two key components: a WSN/IMS gateway acting as an interworking unit between WSNs and the IMS; and an extended presence server serving as a context information management node in the core network. In this article the authors focus on the design and implementation of these two components. MAY EL BARACHI, ARIF KADIWAL, ROCH GLITHO, FERHAT KHENDEK, RACHIDA DSSOULI 52 BROADBAND INTERNET IN EU COUNTRIES: LIMITS TO GROWTH The author provides an analysis of broadband Internet diffusion in 27 countries of the European Union. The author also proposes a simple model of its growth and identifies the theoretical growth limits in each country. Some aspects of the European i2010 project implementation are presented, discussed, and compared with the model. RYSZARD STRUZAK 58 SERVICE TRAFFIC MANAGEMENT SYSTEM FOR MULTISERVICE IP NETWORKS: LESSONS LEARNED AND APPLICATIONS Next-generation networks offer new opportunities and challenges to Internet service providers as well as providers of other online services. Service providers can now deploy new services over an IP network infrastructure without building their own networks. In an open network environment, the network resources of ISPs should be fairly open to third parties that plan to launch their own services. To respond to the changing network paradigm, it is essential to measure the traffic of individual services, and to estimate their cost for cost accounting between service provider and ISP. However, current traffic measurement techniques only provide total traffic volume in links, without reporting the operator whose services flow through the links. JUNGYUL CHOI, SEUNG-HOON KWAK, MI-JEONG LIM, TAEIL CHAE, BYOUNG-KWON SHIM, AND JAE-HYOUNG YOO IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F “I need a high performance signal analyzer that will take me well into my wireless future.” How about 4G and beyond? The problem with time is it never stops moving forward. Imagine a high performance signal analyzer that delivers seamless integration now, but also over time to maximize flexibility, scalability and bench top longevity. Meet the new Agilent PXA signal analyzer, just one of the test tools in the X-Series, an evolutionary approach to signal analysis that spans instruments, measurements and software. With upgradable hardware including CPU, hard drives, I/O, memory, and expansion slots, it’s ready to evolve with you starting now. PXA Signal Analyzer (N9030A) Up to 75 dB of SFDR* over 140 MHz analysis bandwidth for multi-carrier analysis Up to -87 dBc 3GPP ACLR dynamic range LTE and HSPA+ are just two of numerous one-button measurement applications Agilent 89600 VSA software for deep capture and analysis Save up to 40% on measurement applications and view LTE ACLR, W-CDMA, Noise Floor Extension app notes at www.agilent.com/find/beyond *spurious free dynamic range © 2010 Agilent Technologies Communications IEEE u.s. 1-800-829-4444 canada: 1-877-894-4414 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 2010 Communications Society Elected Officers Byeong Gi Lee, President Doug Zuckerman, Past President Mark Karol, VP–Technical Activities Khaled B. Letaief, VP–Conferences Sergio Benedetto, VP–Member Relations Leonard Cimini, VP–Publications Members-at-Large Class of 2010 Fred Bauer, Victor Frost Stefano Galli, Lajos Hanzo Class of 2011 Robert Fish, Joseph Evans Nelson Fonseca, Michele Zorzi Class of 2012 Stefano Bregni, V. Chan Iwao Sasase, Sarah K. Wilson 2010 IEEE Officers Pedro A. Ray, President Moshe Kam, President-Elect David G. Green, Secretary Peter Staecker, Treasurer John R. Vig, Past-President E. James Prendergast, Executive Director Nim Cheung, Director, Division III IEEE COMMUNICATIONS MAGAZINE (ISSN 01636804) is published monthly by The Institute of Electrical and Electronics Engineers, Inc. Headquarters address: IEEE, 3 Park Avenue, 17th Floor, New York, NY 10016-5997, USA; tel: +1-212-705-8900; http://www.comsoc. org/ci. Responsibility for the contents rests upon authors of signed articles and not the IEEE or its members. Unless otherwise specified, the IEEE neither endorses nor sanctions any positions or actions espoused in IEEE Communications Magazine. ANNUAL SUBSCRIPTION: $27 per year print subscription. $16 per year digital subscription. Non-member print subscription: $400. Single copy price is $25. EDITORIAL CORRESPONDENCE: Address to: Editorin-Chief, Nim K. Cheung, Telcordia Tech., Inc., One Telcordia Drive, Room RRC-1B321, Piscataway, NJ 088544157; tel: +(732) 699-5252, e-mail: n.cheung@ieee.org _________. COPYRIGHT AND REPRINT PERMISSIONS: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limits of U.S. Copyright law for private use of patrons: those post-1977 articles that carry a code on the bottom of the first page provided the per copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint, or republication permission, write to Director, Publishing Services, at IEEE Headquarters. All rights reserved. Copyright © 2010 by The Institute of Electrical and Electronics Engineers, Inc. POSTMASTER: Send address changes to IEEE Communications Magazine, IEEE, 445 Hoes Lane, Piscataway, NJ 08855-1331. GST Registration No. 125634188. Printed in USA. Periodicals postage paid at New York, NY and at additional mailing offices. Canadian Post International Publications Mail (Canadian Distribution) Sales Agreement No. 40030962. Return undeliverable Canadian addresses to: Frontier, PO Box 1051, 1031 Helena Street, Fort Eire, ON L2A 6C7 SUBSCRIPTIONS, orders, address changes — IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08855-1331, USA; tel: +1-732-981-0060; e-mail: address.change@ ieee.org. ____________ ADVERTISING: Advertising is accepted at the discretion of the publisher. Address correspondence to: Advertising Manager, IEEE Communications Magazine, 3 Park Avenue, 17th Floor, New York, NY 10016. SUBMISSIONS: The magazine welcomes tutorial or survey articles that span the breadth of communications. Submissions will normally be approximately 4500 words, with few mathematical formulas, accompanied by up to six figures and/or tables, with up to 10 carefully selected references. Electronic submissions are preferred, and should be sumitted through Manuscript Central (http://commag-ieee.manuscript central.com/). Instructions can be found at: http:// ______ ___ www.comsoc.org/pubs/commag/sub_guidelines.html. __________________________ For further information contact Steve Gorshe, Associate Editor-in-Chief (steve_gorshe@pmc__________ sierra.com). All submissions will be peer reviewed. _____ 4 Communications IEEE A BEMaGS F 66 SAFETY ASSURANCE AND RESCUE COMMUNICATION SYSTEMS IN HIGH-STRESS ENVIRONMENTS: A MINING CASE STUDY Effective communication is critical to the success of response and rescue operations. However, unreliable operation of communication systems in high-stress environments is a significant obstacle to achieving this. The contribution of this article is threefold. First, it outlines those common characteristics that impair communication in highstress environments and then evaluates their importance, specifically in the underground mine environment. Second, it discusses current underground mine communication techniques and identifies their potential problems. Third, it explores the design of wireless sensor network based communication and location sensing systems that could potentially address current challenges. PRASANT MISRA, SALIL KANHERE, DIETHELM OSTRY, AND SANJAY JHA TOPICS IN INTEGRATED CIRCUITS FOR COMMUNICATIONS SERIES EDITORS: CHARLES CHIEN, ZHIWEI XU, AND STEPHEN MOLLOY 74 GUEST EDITORIAL 76 VIDEO ENCODER DESIGN FOR HIGH-DEFINITION 3D VIDEO COMMUNICATION SYSTEMS The authors present an overview of 3D video coding standards developments and design challenges of an MVC encoder. Then the algorithm and architecture optimization schemes are proposed. For the trade-off between system memory bandwidth and on-chip memory size, a cache-based prediction engine is proposed to ease both design challenges. PEI-KUEI TSUNG, LI-FU DING, WEI-YIN CHEN, TZU-DER CHUANG, YU-HAN CHEN, PAI-HENG HSIAO, SHAO-YI CHIEN, AND LIANG-GEE CHEN 88 AN EMBEDDED 65 NM CMOS BASEBAND IQ 48 MHZ–1 GHZ DUAL TUNER FOR DOCSIS 3.0 The authors present an embedded CMOS digital dual tuner for DOCSIS 3.0 and set-top box applications. The dual tuner down-converts a total of ten 6 MHz Annex B channels or eight 8 MHz Annex A channels, for a maximum data rate of 320 Mb/s in Annex B and 400 Mb/s in Annex A mode. FRANCESCO GATTA, RAY GOMEZ, YOUNG SHIN, TAKAYUKI HAYASHI, HANLI ZOU, JAMES Y.C. CHANG, LEONARD DAUPHINEE, JIANHONG XIAO, DAVE S.-H. CHANG, TAI-HONG CHIH, MASSIMO BRANDOLINI, DONGSOO KOH, BRYAN J.-J. HUNG, TAO WU, MATTIA INTROINI, GIUSEPPE CUSMAI, ERTAN ZENCIR, FRANK SINGOR, HANS EBERHART, LOKE TAN, BRUCE CURRIVAN, LIN HE, PETER CANGIANE, AND PIETER VORENKAMP 98 INTEGRATED ELECTRONIC SYSTEM DESIGN FOR AN IMPLANTABLE WIRELESS BATTERYLESS BLOOD PRESSURE SENSING MICROSYSTEM A wireless, batteryless, less invasive blood pressure sensing microsystem based on an instrumented circular cuff has been developed for advanced biological research. The proposed sensing technique avoids vessel penetration and substantially minimizes vessel restriction due to the soft cuff elasticity. PENG CONG, WEN H. KO, AND DARRIN J. YOUNG 106 POWER LINE COMMUNICATION NETWORKS FOR LARGE-SCALE CONTROL AND AUTOMATION SYSTEMS Power line communications uses the existing power line infrastructure for communication purposes. While the majority of recent contributions have discussed PLC for high-data-rate applications like Internet access or multimedia communication serving a relatively small number of users, in this article the authors are concerned with PLC as an enabler for sensing, control, and automation in large systems comprising tens or even hundreds of components spread over relatively wide areas. GERD BUMILLER, LUTZ LAMPE, AND HALID HRASNICA 114 IMS-COMPLIANT MANAGEMENT OF VERTICAL HANDOFFS FOR MOBILE MULTIMEDIA SESSION CONTINUITY The authors propose an original solution for session continuity based on the primary design guideline of cleanly and effectively separating the signaling plane (for session reconfiguration via SIP) from the media delivery plane (data transmission and related handoff management operations). Our optimized handoff management techniques exploit terminal-based decentralized predictions to minimize service-level handoff delays. PAOLO BELLAVISTA, ANTONIO CORRADI, AND LUCA FOSCHINI 122 REPUTATION ESTIMATION AND QUERY IN PEER-TO-PEER NETWORKS Many peer-to-peer systems assume that peers are cooperative to share and relay data. But in the open environment of the Internet, there may be uncooperative malicious peers. To detect malicious peers or reward well behaved ones, a reputation system is often used. The authors give an overview of P2P reputation systems and investigate two fundamental issues in the design: reputation estimation and query. They classify the state-of-the-art approaches into several categories and study representative examples in each category. XING JIN AND S.-H. GARY CHAN IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A Communications Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A IEEE IEEE BEMaGS F BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F THE PRESIDENT’S PAGE TECHNICAL ACTIVITIES: STIMULATING TECHNICAL CONTENT CREATION T echnical Activities is the foundation pation. Long-time members might already be for many of the Communications Socifamiliar with many of the products, services, ety’s products and services, while also proand opportunities offered by ComSoc. This is viding “community” and “networking” not so for the new members whom we need opportunities for its participants. ComSoc’s to attract and involve so that we can continue Technical Activities community establishes to grow and thrive in the coming years. an environment for technical content creThrough various means, we plan to publicize ation, whereas Publications and Conferand make known “open call” opportunities ences deal with the presentation and for all individuals to actively participate and conversion of technical content into techniserve in ComSoc. Also, recognizing the cal products and services. Within ComSoc, changing and evolving technological landthe term “technical activities” encompasses scape, we will strive to stay relevant and proa wide range of topics: technical commitvide more technical activities of interest to BYEONG GI LEE tees, emerging technologies, awards, educapotential members from industry. tion, standards, distinguished lecturers, TECHNICAL COMMITTEES evaluation of IEEE Fellow nominations, We currently have 25 Technical Commitand communications history. These areas tees (TCs), including comparatively young continue to evolve in spite of and in the face TCs such as those on Cognitive Networks of cuts in important parts of the ComSoc and Power-Line Communications, and the budget (due to the economic downturn). As most recent addition, e-Health, created in mentioned in the January 2010 message, we 2009. TCs help define and implement the will strive to maintain and improve upon the technical directions of the Society. They help technical quality of ComSoc products and organize and ensure the technical quality of services, providing value to our members, workshops and conference sessions, evaluate benefiting the broader communications and and endorse proposals for new events, help networking community, and ultimately doing implement publications, define and promote our part in achieving ComSoc’s goal of industry standards, and provide many pro“Serving Humanity” – for example, helping fessional networking opportunities. serve fundamental human needs for content A list of ComSoc TCs and their officers and communications. MARK KAROL is at http://ww2.comsoc.org/about/commitSharing this month’s column is Mark tees/ Technical. You can learn much more Karol, ComSoc’s Vice President — Techni___ about the TCs by following the links to their respective TC cal Activities. Mark received his Ph.D. in electrical engiwebsites. Please visit the websites of the TCs of your interneering from Princeton University in 1986 and is an IEEE est, contact the officers with your questions, and volunteer Fellow. From 1985 until 2000 he was a member of the to help them in their endeavors. Participation in one or Research Communications Sciences Division at Bell Labomore TCs will move you into an exciting technical life, ratories. From 2000 until 2008, he was a research scientist where you can enjoy networking and co-working with colwith Avaya Labs. Since 2008, he has been a senior scientist leagues having common technical interests. in Applied Research at Telcordia Technologies. Mark So that the TCs stay current in technical topics and received the Society’s Donald W. McLellan Meritorious content, we have mechanisms to control the entry and exit Service Award in 2005, and has served as Associate Editor of TCs, with the former performed by the Emerging Techfor the Journal of Lightwave Technology, General Chair of nologies Committee (see the next section) and the latter two major IEEE conferences, ICC ’02 and INFOCOM ’94, by the TC Recertification Committee (TCRC). To ensure ComSoc’s Chief Information Officer (CIO), Director of that TCs maintain high quality standards and stay responMagazines, and Vice President — Conferences. In 2006sive to the interests of our technical community, the 2007, Mark was elected by ComSoc members to serve on TCRC, chaired by VP-Technical Activities, Mark, evaluthe IEEE Board as Division III Director, representing ates each TC once every three years and recommends to Communications Technology. the Board of Governors whether to re-certify or terminate In the rest of this article, Mark and I provide a brief it. For the recertification, the TCRC reviews the overall overview of the many technical activities within ComSoc and TC structure and evaluates the accomplishments, visions, the distinguished individuals that lead the efforts. In all of and goals of each TC. The TCRC may also recommend these activities, there are opportunities in 2010–2011 to that the Board of Governors create new TCs if it sees a implement the “ComSoc Golden Triangle” vision of Globalgap in current coverage of technical areas. ization, development of Young Leaders, and Industry partici- 6 Communications IEEE IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F THE PRESIDENT’S PAGE EMERGING TECHNOLOGIES We encourage and provide assistance to members with common interest in a new technology area to form a small activity group, called a sub-committee, with the expectation that such a group may eventually evolve into a technical committee. The Emerging Technologies Committee, chaired by Naohisa Ohta, helps identify and nurture new technical directions, and approves the formation of subcommittees. The goal is timely dissemination of technical information in emerging technology areas that are of high interest to our members and others in our field. Current technical subcommittees are: (i) Applications of Nanotechnologies in Communications; (ii) Autonomic Communications; (iii) Consumer Networking; (iv) Human Centric Communications; (v) Integrated Fiber & Wireless Technologies; (vi) Nano-Scale, Molecular, & Quantum Networking; and (vii) Peer-to-Peer Networking. More information about the technical subcommittees is at http://ww2.comsoc.org/about/ committees/emerging. Discussion is also under way regarding ______________ new opportunities in other new technological areas, such as smart grids (for the power industry), vehicular networking, and intelligent transportation systems. You may write a proposal to the ETC Chair if you identify a new emerging area that should be of interest to ComSoc. AWARDS Awards, as well as Fellow evaluation and Distinguished Lecturer selection, are auxiliary technical functions that establish an environment for technical activities by recognizing distinguished achievements. The Awards Committee receives nominations and evaluates candidates for ComSoc-level awards to select recipients. Vince Poor is Chair of the Awards Committee. There are four Career Awards, four Service Awards, and nine Paper Awards. Career Awards recognize career-long achievements, Service Awards recognize distinguished services to ComSoc, and Paper Awards recognize the best papers published in various ComSoc journals and magazines. A complete list of the ComSoc-level awards is at http://ww2.comsoc.org/about/memberprograms/comsocawards. Please look at the list and consider nominating _____ worthy candidates for the awards. The process (including deadlines) for nominating candidates is included in a link on the ComSoc website. Award winners are typically announced during ceremonies at our annual ICC and GLOBECOM conferences. We try to widely publicize the nomination deadlines so that appropriate candidates are brought to the attention of the Awards Committee. If you know someone worthy of an award, please take the initiative and nominate them — don’t assume someone else will. EDUCATION ComSoc’s Education activities apply our technical products and services to educational purposes. The ComSoc Education Board is responsible for establishing policies and setting strategic directions for all continuing education products and services. It is also responsible for maintaining the vitality and quality of existing programs, assuring that such programs continue to meet the current needs of members (and others), and coordinating ComSoc efforts with other IEEE education programs. Stefano Bregni serves as Director of Education. Examples of ComSoc educational programs include online webinars and tutorials (e.g., the Tutorials NowTM program features more than 90 titles), conventional tutorials at conferences, and courses especially tailored to cover certification program topics (e.g., in Wireless Communications Engineering Technologies (WCET)). Working groups on the Education Board are working on specific tasks to monitor and enhance all ComSoc educational products and services; for example, exploring ways of virtual collaboration for e-teaching. Globalization is a major value. Online tutorials and OnLine Distinguished Lectures are an excellent example of ComSoc’s efforts to facilitate participation by student chapters and from disadvantaged areas. We will continue to search for new educational opportunities, including development of products aimed at students — our future Young Leaders. STANDARDS ComSoc sponsors standards activities to meet the needs of our members and the worldwide communications industry. The main goal of ComSoc’s standards activities is the development of technically excellent and widely adopted standards in communications, networking, and related fields. Standards projects of interest to ComSoc include issues related to power-line communications, broadband over power-line networks, smart grid technologies, Ethernet passive optical networks, and fundamental aspects of telephony. ComSoc provides procedural guidelines, discussion forums, and support services for approved standards activities. A detailed description of standards activities is available at http://ww2. comsoc.org/about/documents/ pp/5.14. _____ ComSoc standards activities are conducted at the initiative of members and/or organizations within the Society, or of individuals or entities outside of the society. The activities are led by the Director of Standards, Curtis Siller, who helps influence and guide standards development. The standards development activity is conducted in partnership with the IEEE Standards Activities organization, with appropriate liaison with and contributions to other standards bodies. By their very nature, standards activities engage industry participation in ComSoc. In consideration of the importance of standards as an ultimate product of technical findings and also the significant influence of standards on industry, we are carefully studying the possibility of upgrading ComSoc’s standards activities to Vice President level. SELECTION OF DISTINGUISHED LECTURERS ComSoc selects Distinguished Lecturers who will provide lectures to audiences arranged by ComSoc Chapters all over the world. The Distinguished Lecturers Program (DLP) is one of a large set of membership programs, developed for the benefit of the members (and others in our field). Distinguished Lecturer Tours, especially when conducted in developing countries, help implement ComSoc’s vision of globalization and fosters ComSoc’s mission of presentation and exchange of information among its members and technical communities throughout the world. A DLT can often help generate ComSoc membership and the for- IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 7 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F THE PRESIDENT’S PAGE mation of new Chapters. Selection of Distinguished Lecturers is performed by the Distinguished Lecturers Selection Committee, which is chaired by the Vice-Chair and Secretary of the Technical Activities Council, Mehmet Ulema. As in other programs of ComSoc, we have an “open call” nomination process for Distinguished Lecturers; information is available at http://ww2.comsoc.org/ about/documents/pp/6.8. Currently ComSoc has 19 Distinguished Lecturers (DLs), as listed at http://ww2.comsoc. org/about/memberprograms/distinguished-lecturers. There also is a link to a list of past Distinguished Lecturers and their topics, who are encouraged to continue giving lectures (after their two-year terms have expired) in conjunction with business trips or events that happen to bring them to ComSoc Chapters of interest. We also have recorded a small, but hopefully growing, number of On-Line Distinguished Lectures (see the above-referenced website). neer/scientist, or technical leader. The total number of new IEEE Fellows in any one year is at most one-tenth of one percent of the IEEE voting membership (i.e., several hundred new Fellows per year). Further information (including qualifications and deadlines) about the IEEE Fellow program is available at http://www.ieee.org/fellows. A key part of the selection process is the evaluation of candidates by each of the IEEE’s Technical Societies. In ComSoc, the Fellow Evaluation Committee, chaired by Russell Hsing, reviews and evaluates all candidates identified as working in our fields of interest. The evaluations, including a rank order of the candidates and a summary of the evaluation of each candidate, are then forwarded to the IEEE Fellow Evaluation Committee. For further information about the Fellow Evaluation Committee, refer to http://ww2.comsoc.org/about/ documents/pp/6.2. ________________________________ EVALUATION OF IEEE FELLOW NOMINATIONS Communications History is a special auxiliary function of technical activities. It deals with the history of communications technology, recognizing milestones of technological development. This function is conducted by the Communications History Committee, chaired by Mischa Schwartz. This committee is responsible for identifying, placing in electronic archives, and raising public awareness through all appropriate steps on the most important facts/persons/achievements of communications history in particular, as well as telecommunication milestones in general. One important activity of this committee is the regular publication of “History of Communications” articles in IEEE Communications Magazine. In addition, the committee has organized special sessions on “communications history” at recent IEEE GLOBECOM conferences. More are planned for the future. Please contact Mischa if you happen to find any important findings in communications history that have not been duly recognized. IEEE Fellow status is granted to a person with an extraordinary record of accomplishments in any of the IEEE’s designated fields of interest. The honor is conferred by the IEEE Board of Directors. It is one of the highest honors that can be bestowed upon an individual by the Institute. It recognizes important contributions as an application engineer/practitioner, educator, research engi- __________ 8 Communications IEEE COMMUNICATIONS HISTORY __________ In summary, technical activities covers a wide range of programs and helps form the backbone of the IEEE Communications Society. We are fortunate to have an experienced and dedicated group of individuals who help lead and guide the various activities. However, we always welcome new volunteers to join us and make our programs even better. In keeping with ComSoc’s Golden Triangle vision, we especially encourage additional participation by young members and industrial participants — from all parts of the world. A good first step is to join a Technical Committee (which is easy to do and has no membership fees); many of the current ComSoc leaders got their start by volunteering to help in ComSoc TCs. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F _____________________________________________________ until June 30 2010 Presented at IEEE GLOBECOM 2009 by Ali Akansu Discrete Fourier Transform (DFT) has been the center piece of popular technologies spanning xDSL based high-speed Internet access to OFDM based wireline and wireless communications. This tutorial reviews the recently introduced non linear phase Generalized DFT, which offers significant improvements over linear phase DFT. Examples include Adaptive GDFT's ability to mitigate degradation of RF power amplifier performance and Bit Error Rate Performance. Several efficient GDFT design methods and their performance in real-world communications scenarios are highlighted. FREE ACCESS SPONSORED BY For other sponsor opportunities, please contact Eric Levine, Associate Publisher Phone: 212-705-8920, E-mail: ______________ e.levine@comsoc.org Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F SOCIETY NEWS SOCIETY MEMBERS NAMED TO FELLOW GRADE Election to the grade of IEEE Fellow is one of the highest honors that can be bestowed upon our members by the Institute in recognition of their technical, educational, and leadership achievements. Only a select few IEEE members earn this prestigious honor. Congratulations to the following Communications Society members for their election to the grade of Fellow of the IEEE. They now join company with a truly distinguished roster of colleagues. RAJ ACHARYA For contributions to biomedical imaging and bioinformatics. EITAN ALTMAN For contributions to analysis, optimization, and control of telecommunication networks. JOSEPH BERTHOLD For leadership in optical internetworking. EDGAR CALLAWAY For contributions to wireless sensor networks and low power design techniques for communications devices and systems. HSIAO-HWA CHEN For contributions to radio resource allocation in code division multiple wireless systems. 10 Communications IEEE ZHIZHANG (DAVID) CHEN For contributions to time-domain electromagnetic modeling and simulation. ROY CIDECIYAN For contributions to signal processing and constrained coding for magnetic recording. THOMAS CLOONAN For leadership in development of cable modem termination systems. ROBERT DOVERSPIKE For contributions to architectures, modeling, and optimization of telecommunication networks. HESHAM EL-GAMAL For contributions to multiple-input multiple-output and cooperative communications. MARC GOLDBURG For leadership in the development and commercialization of spectrally efficient wireless communications systems. JOSEPH HELLERSTEIN For contributions to control engineering for performance management of computing systems. SHIVKUMAR KALYANARAMAN For contributions to traffic management in computer communication networks. POOI-YUEN KAM For contributions to receiver design and performance analysis for wireless communications. YOSHIO KARASAWA For contributions to the measurement and modeling of propagation effects in radio communication systems. GERHARD KRAMER For contributions to coded modulation, iterative decoding, and cooperative communications. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page F SOCIETY NEWS UWE KRAUS For contributions to digital television signal compression and transmission. MARWAN KRUNZ For contributions to resource management policies in wireless networks. CHANG-HEE LEE For contributions to wavelength division multiplexed-passive optical network. PING LI For contributions to iterative signal processing, multi-user detection and concatenated error control codes. WANJIUN LIAO For contributions to communication protocols in multimedia networking. JOHN C.S. LUI For contributions to performance modeling and analysis of storage communication systems and peer-topeer networks. STAN LUMISH For leadership in the development and implementation of commercial terrestrial lightwave systems. TADASHI MATSUMOTO For contributions to signal processing for wireless communications. VICTOR MILLER For contributions to elliptic curve cryptography. JOSEPH MITOLA For contribution to software-defined and cognitive radio technologies. PRASANT MOHAPATRA For contributions to the quality of service provisioning in computer networks. ARIA NOSRATINIA For contributions to multimedia and wireless communications. HARRY PERROS For contributions to performance evaluation modeling of computer networks. CHUNMING QIAO For contributions to optical and wireless network architectures and protocols. RAMESH RAO For leadership in wireless communications. A. L. NARASIMHA REDDY For contributions to multimedia storage and network support. LESLIE RUSCH For contributions in optical and wireless communications systems. CHRISTIAN SCHLEGEL For contributions to iterative demodulation and decoding in wireless communication. IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 11 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F SOCIETY NEWS ROBERT SCHOBER For contributions to wireless communications. DAN SCHONFELD For contributions to image and video analysis. MARK SHAYMAN For contributions to the theory of Riccati equations and discrete-event dynamic systems. ANDREW SINGER For contributions to signal processing techniques for digital communication. VISHWANATH SINHA For contributions to electrical engineering education. PETER STEENKISTE For contributions to optimization and monitoring techniques for distributed communication systems. 12 Communications IEEE MILICA STOJANOVIC For contributions to underwater acoustic communications. HEINRICH STUTTGEN For leadership in industrial research. WEI SU For leadership in military communications and electronic warfare technologys. EMMANOUIL M. TENTZERIS For contributions to three dimensional conformal integrated devices for wireless communications and sensing. NIAN-FENG TZENG For contributions to parallel computer systems and scalable routers. NITIN VAIDYA For contributions to wireless networking protocols and mobile communications. CHENGSHAN XIAO For contributions to channel modeling and signal processing for wireless communications. HOWARD YANG For leadersip in mixed-signal integrated circuit design and manufacturing. FENG ZHAO For contributions to networked embedded computing and sensor networks. WENWU ZHU For contributions to video communications over the internet and wireless. ZORAN ZVONAR For leadership in the development of digital signal processing software and hardware for wireless cellular communication. MAHESH VARANASI For contributions to multi-user and wireless communication theory. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A Communications Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A IEEE IEEE BEMaGS F BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F CONFERENCE CALENDAR 2010 APRIL • ICT 2010 – 17th Int’l. Conference on Telecommunications, 4–7 April Doha, Qatar. Info: http://www.qu.edu.qa/ ICT2010/index.php ____________ z IEEE DYSPAN 2010 – IEEE Int’l. Symposium on Dynamic Spectrum Access Networks, 6–9 April Singapore. Info: http://www.ieee-dyspan.org • WAMICON 2010 – IEEE Wireless and Microwave Technology Conference, 12–13 April Dallas, TX. Info:________________ http://www.ewi.info/world- Faro-Algarve, Portugal. Info: _________ http://noc-con- wide-cybersecurity-summit ________________ ference.com/ ________ z IEEE LAN/MAN 2010 - 17the IEEE Workshop on Local and Metropolitan Area Networks, 5-7 May • HPSR 2010 - 2010 Int’l. Conference on High Performance Switching and Routing, 14-16 June Long Branch, NJ. Info: ___________ http://www.ieeelanman.org _______ Dallas, TX. Info: http://opnear.utdallas/edu/ activ/hpsr2010/index.html ________________ • ISWPC - Int’. Symposium on Wireless Pervasive Computing, 5-7 May • APSITT 2010 - 8th Asia-Pacific Symposium on Information and Telecommunication Technologies, 15-18 June Modena, Italy. Info: http://www.iswpc.org/ 2010/ ___ z IEEE CTW 2010 - 2010 IEEE Communication Theory Workshop, 1012 May Cancun, Mexico. Info: http://www.ieee- Melbourne, FL. Info: ____________ http://www.wamicon.org/ _____ c t w . __________________________ • IEEE SARNOFF 2010 - 23rd IEEE SARNOFF Symposium 2010, 12-14 April • CNSR 2010 - Communication Networks and Services Research 2010 Conference, 12-14 May Princeton, NJ. Info: http://ewh.ieee.org/r1/ princeton-centraljersey/2010_Sarnoff_Sym__________________________ posium/ _____ Montreal, Canada. Info: http://cnsr.info/ cnsr2010/ ______ org/ __ • EW 2010 – European Wireless 2010, 12–15 April z IEEE ICC 2010 - IEEE Int’l. Conference on Communications, 23-27 May Lucca, Italy. Info: http://www.european______________ wireless2010.org __________ Capetown, South Africa. http://www.ieee-icc.org/2010/ • IEEE RFID 2010 - IEEE Int’l. Conference on RFID 2010, 14-15 April JUNE Orlando, FL. Info: http://www.ieee-rfid.org/ 2010 ___ z IEEE WCNC 2010 - IEEE Wireless Communications and Networking Conference, 18-21 April Sydney, Australia. Info: __________ http://www.ieee______ wcnc.org/ z IEEE/IFIP NOMS 2010 – IEEE/IFIP Network Operations and Management Symposium, 19–23 April Osaka, Japan. • WTS 2010 - Wireless Telecommunications Symposium 2010, 21-23 April Tampa, FL. Info: http://www.csupomona.edu/ wtsi ___ MAY • WCS 2010 - First Worldwide Cybersecurity Summit, 4-5 May Info: • NGI 2010 - 6th Euro-NF Conference on Next Generation Internet, 2-4 June Paris, France, Info: http://euronf.enst.fr/ NGI2010/Home.html _____________ • CTTE 2010 - 9th Conference of Telecommunication, Media and Internet Techno-Economics, 7-9 May Ghent, Belgium. Info: http://www.ctte-con____________ ference.org/ _______ z IEEE CQR 2010 - 2010 Int’l. Communications Quality and Reliability Workshop, 8-10 June Vancouver, BC, Canada. http://www.ieee-cqr.org/ Info: • NOC/OC&I 2010 - 15th European Conference on Networks and Optical Communications & 5th Conference on Optical Cabling and Infrastructure, 810 June z Communications Society portfolio events are indicated with a diamond before the listing; • Communications Society technically co-sponsored conferences are indicated with a bullet before the listing. Individuals with information about upcoming conferences, calls for papers, meeting announcements, and meeting reports should send this information to: IEEE Communications Society, 3 Park Avenue, 17th Floor, New York, NY 10016; e-mail: b.erlikh@comsoc.org; ____________ fax: +1-212-705-8999. Items submitted for publication will be included on a space-available basis. 14 Communications IEEE Kuching, Malaysia. Info: http://www.ieice.org/ ~in_ac/APSITT/2010 _____________ z IEEE IWQOS 2010 - 18th IEEE Int’l. Workshop on Quality of Service, 1618 June Beijing, China. Info: ___________ http://www.ieeeiwqos.org/ ______ • ICUFN 2010 - 2nd Int’l. Conference on Ubiquitous Networks and Future Networks, 16-18 June Juju Island, Korea. Info: http://www.icufn.org/ • IEEE ISGT 2010 - 2010 IEEE Innovative Smart Grid Technologies Conference, 19-21 June Gaithersburg, MD. z IEEE SECON 2010 - 2010 IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2125 June Boston, MA. Info: http://www.ieee-secon.org/ 2010/index.html __________ • Med-Hoc-Net 2010 - 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 21-25 June Juan Les Pins, France. Info: __________ http://www.medhoc-net-2010.org/ ___________ z ISCC 2010 - IEEE Symposium on Computers and Communications, 22-25 June Riccione, Italy. Info: http://www.ieee-iscc.org/ 2010 ___ JULY z IEEE HEALTHCOM 2010 - IEEE 12th Int’l. Conference on e-Health Networking, Application & Services, 1-3 July Lyon, France. Info: ______________ http://www.ieee-healthcom.org/ _____ • SPECTS 2010 - 2010 Int’l. Symposium on Performance Evaluation of Computer and Telecommunication Systems, 11-14 July Ottawa, Canada. Info: http://atc.udg.edu/ SPECTS2010 ________ IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F _____________________________________________________ ADVANCED OPTICAL FORMATS OF 40/100G AND BEYOND Coherent detection and advanced signal processing are required for the test and measurement of advanced modulation formats that are currently realized for optical transmission of 40/100G and beyond. In this presentation the basic hardware building blocks and the necessary algorithms are introduced. New tools to characterize and quantify the signal quality are applied to a number of exemplary signals. FREE ACCESS FOR A LIMITED TIME ONLY UNTIL MAY 31 FREE ACCESS SPONSORED BY For other sponsor opportunities, please contact Eric Levine, Associate Publisher Phone: 212-705-8920, E-mail: ______________ e.levine@comsoc.org Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F NEW PRODUCTS AGILENT TECHNOLOGIES’ NEW LTE APPLICATIONS TARGET 4G SYSTEM-LEVEL DESIGNERS Agilent Technologies Agilent Technologies Inc. has introduced a new line of system-level design and verification products for 3GPP LTE physical layer (PHY) design. In addition to its traditional test and measurement products, Agilent now provides predictive products and algorithmic references for the SystemVue platform that are consistent with the LTE v.8.9.0 (December 2009) standard. The new line includes four products that accelerate 4G deployment for LTE system architects, baseband hardware designers, and RF equipment by bringing new levels of realism into the architecture and modeling stages. While 4G networks promise dramatic improvements in data throughput and spectral efficiency, the complexity of the evolving 3GPP LTE standard has forced many system architects to reconsider their use of general-purpose toolsets. By cutting across a variety of domains (such as signal processing and mathematics, baseband hardware design, RF/analog design and measurements), Agilent's new 4G products are able to provide system architects with the focused application support for LTE v.8.9.0 that they demand. Agilent's 4G products streamline verification and bring measurement-level realism into the creative process. The result is higher-performance Layer 1 architectures and algorithms resulting in earlier design maturity and the need for less design margin. The four new products being introduced by Agilent include: The W1715 MIMO Channel Builder is a simulation blockset for LTE architecture and receiver designers, based on the WINNER and WINNER-II fading algorithms. By incorporating non-ideal MIMO antenna performance (e.g., crosstalk and directionality), the W1715 goes beyond these standard propagation models. It enables 2D far-field data to be imported from antenna measurements or 3D EM simulations, including Agilent EM PRO. The W1716 Digital Pre-Distortion builder helps LTE system integrators, RF component designers, and baseband architects quickly transition from 3G to 4G by creating baseband signal processing networks that improve the range of analog power amplifiers and transceiver ICs, improve efficiency, and extend battery life. The W1716 also quickly assesses the suitability of existing 3G designs for 4G applications. Such capabilities 16 Communications IEEE translate into savings for both design effort and component cost. The W1910 LTE Baseband Verification Library reference blockset has been updated to LTE v.8.9.0 and now includes expanded PRACH and HARQ support. The HARQ simulation support uses a unique dynamic dataflow simulation mode. This mode allows the symbol rate to change dynamically over the course of the simulation while retaining the timing and carrier information necessary for full RF effects, frequency-dependent phase noise, and channel fading. www.agilent.com handsets, basestations, wireless PC cards, and a host of other embedded solutions. The portfolio includes the industry's first LTE front-end modules for Bands I, IV, VII and VIII (the SKY77445, SKY77455, SKY77456 and SKY77458) for worldwide applications, and the industry's first power amplifier modules supporting LTE-FDD for North America (the SKY77449 and SKY77453). www.skyworksinc.com SKYWORKS SUPPORTS CUSTOMERS’ LTE PLATFORMS WITH LINE OF POWER AMPLIFIER AND FRONT-END MODULES The high-end R&S ZVA67 vector network analyzer from Rohde & Schwarz is now also available as a fourport model. This is the first network analyzer on the market to feature four test ports for measurements up to 67 GHz. Its high dynamic range (110 dB at 67 GHz) and output power (6 dBm at 67 GHz) give the R&S ZVA67 the flexibility and performance required for characterizing components and modules in the microwave and millimeter-wave range. It allows users in research and development to determine the S parameters of multiport devices quickly and with high precision. As an extra benefit, the analyzer’s four internal signal sources reduce test system complexity and the number of instruments required, e.g. for measuring frequencyconverting DUTs, because no external signal generators are needed. The new R&S ZVA67, with its unique architecture that includes four ports, four integrated signal sources and eight receivers, enables measurements on multiport devices such as mixers, couplers or balanced DUTs, with just one instrument. With its high output power of 6 dBm and wide power sweep range of > 40 dB, the R&S ZVA67 is able to characterize the small- and large-signal behavior of active components. Linear and nonlinear measurements can be carried out using a simple test setup. This advantage becomes apparent, for example, when measuring the S parameters or intermodulation of mixers or amplifiers, or when measuring the group delay and phase of up- or downconverters. Offering a frequency range up to 67 GHz, the four-port R&S ZVA67 covers the band intended for the wireless transmission of multimedia data (wireless HDMI). Additional applications can be found in the aerospace and defense sectors. www.rohde-schwarz.com Skyworks Solutions, Inc. Skyworks Solutions has announced the company's extensive portfolio of long-term evolution (LTE) power amplifier and front-end modules is now supporting the M710 solution from STEricsson, a world leader in wireless semiconductors and platforms. LTE is emerging as the 4G standard of choice worldwide for mobile broadband systems. These 4G systems are expected to significantly boost network throughput, improve spectral efficiency and performance, reduce latency, simplify roaming and further drive economies of scale. According to Global Mobile Suppliers Association (GSA), LTE network commitments increased 100 percent in the last eight months with 51 networks in 24 countries worldwide currently committed to LTE. All major handset OEMs, infrastructure suppliers, and operators worldwide are now committed to this technology with multiple trials underway. Skyworks’ family of LTE products, which includes four front-end modules in addition to two power amplifier modules, provide the most complete and flexible set of options for manufacturers developing and building 4G-enabled HIGH-END R&S ZVA67 VECTOR NETWORK ANALYZER Rohde & Schwarz IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F CALL FOR PAPERS th 44 Annual Asilomar Conference on Signals, Systems, and Computers Asilomar Hotel and Conference Grounds Pacific Grove, California November 7-10, 2010 www.asilomarssc.org Authors are invited to submit papers before June 1st, 2010, in the following areas: A. Communications Systems: 1. Error Control Coding, 2. CDMA, 3. Modulation and Detection, 4. Performance Bounds, 5. Synchronization, 6. Ultra Wideband, 7. OFDM / Multicarrier, 8. Wireless Communications, 9. Optical Communications, 10. Cognitive SDR, 11. Adaptive Waveform Design B. MIMO Communications and Signal Processing: 1. Space-Time Coding and Decoding, 2. Channel Estimation and Equalization, 3. Multi-User and Multi-Access Methods, 4. Cooperative Diversity. 9. Compressive Sensing, 10. Information Theoretic Signal Processing, 11. Spectral Analysis F. Biomedical Signal and Image Processing: 1. Medical Image Analysis, 2. Imaging Modalities, 3. Advances in Medical Imaging, 4. Biomedical Signal Processing, 5. Biomedical Applications, 6. Bioinformatics, 7. Image Registration and Multi-modal Imaging, 8. Image Reconstruction, 9. Computer Aided Diagnosis, 10. Functional Imaging, 11. Visualization G. Architecture and Implementation: 1. Programmable and C. Networks: 1. Transmission Techniques for Ad Hoc Networks, 2. Wireless Sensor Networks, 3. Network Information Theory, 4. Optical Networks Reconfigurable Architectures, 2. SOC Architectures, 3. Low-power Methods, 4. Compilers and Tools, 5. Integrated Algorithm and Architecture Implementation, 6. Computer Arithmetic, 7. Numerical Processing D. Adaptive Systems and Processing: 1. Adaptive Filtering, 2. Fast Algorithms for Adaptive Filtering, 3. Frequency-Domain and Subband Adaptive Filtering, 4. Adaptive Blind Processing E. Array Processing and Statistical Signal Processing: 1. Array Processing and Beamforming, 2. Sonar and Acoustical Array Processing, 3. Radar Array Processing, 4. Remote Sensing, 5. Signal Separation, 6. Estimation and Detection, 7. NonGaussian and Nonlinear Methods, 8. Identification, H. Speech, Image and Video Processing: 1. Speech Processing, 2. Speech Coding, 3. Speech Recognition, 4. Narrowband / Wideband Speech and Audio Coding, 5. Document Processing, 6. Models for Signal and Image Processing, 7. Image and Video Coding, 8. Image and Video Segmentation, 9. Image and Video Analysis, 10. Image / Video Security, Retrieval and Watermarking, 11. Image and Video Enhancement / Filtering, 12. Biometrics and Security, 13. Wavelets Submissions should include a 50 to 100 word abstract and an extended summary (500 to 1000 words, plus figures). Submissions must include the title of the paper, each author's name and affiliation, and the technical area(s) in which the paper falls with number(s) from the above list. Check the conference website (www.asilomarssc.org) for specific information on the electronic submission process. Submissions will be accepted starting February 1, 2010. No more than FOUR submissions are allowed per contributor, as author or co-author. All submissions must be received by June 1st, 2010. Notifications of acceptance will be mailed by mid August 2010, and author information will be available on the conference website by late August 2010. Full papers will be due shortly after the conference and published in early 2011. All technical questions should be directed to the Technical Program Chair, Dr. Miloš Doroslovaþki, e-mail doroslov@gwu.edu, or the General Chair, Dr. Linda DeBrunner, e-mail linda.debrunner@fsu.edu. CONFERENCE COMMITTEE General Chair: Technical Program Chair: Conference Coordinator: Publication Chair: Publicity Chair: Finance Chair: Linda DeBrunner, Florida State University Miloš Doroslovaþki, The George Washington University Monique P. Fargues, Naval Postgraduate School Michael Matthews, ATK Mission Research Murali Tummala, Naval Postgraduate School Frank Kragh, Naval Postgraduate School The site for the 2010 Conference is at the Asilomar Conference Grounds, in Pacific Grove, CA. The grounds border the Pacific Ocean and are close to Monterey, Carmel, and the scenic Seventeen Mile Drive in Pebble Beach. The Conference is organized in cooperation with the Naval Postgraduate School, Monterey, CA, and ATK Mission Research, Monterey, CA. The IEEE Signal Processing Society is a technical co-sponsor of the conference. Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F _____________________ _________________________________________ Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Global Newsletter April 2010 Activities of the IEEE ComSoc Nanjing Chapter By Nan Liu, Yueming Cai, and Guangguo Bi, ComSoc Nanjing Chapter, China The IEEE ComSoc Nanjing Chapter was founded on April 13, 2008. The opening ceremony was held in Nanjing, China. Over 35 Chapter members and over 40 guests attended the ceremony. After the inauguration, two keynote addresses, “Development of IEEE in China” and “New Rising Wireless Communications and Wireless Networks,” were given. In the afternoon the Executive Committee of the Chapter was founded and discussed activities in 2008. The Chapter Officers are Prof. Guangguo Bi of Southeast University as Chapter Chair; Profs. Jinlong Wang, Baoyu Zheng, Jinkang Zhu, and Aiping Huang from various universities serve as Chapter Vice-Chairs; Prof. Yueming Cai is Secretary; and Prof. Nan Liu serves as Secretary and Treasurer. Since coming into existence, the ComSoc Nanjing Chapter has been very active in hosting and sponsoring various activities to serve its members. In 2008 we technically sponsored/cosponsored three conferences/workshops: the International Conference on Communications and Networking in China (CHINACOM 2008, co-sponsored) was held in Hangzhou in August, accepting 270 papers for an acceptance rate of 32.8 percent, with 121 IEEE members attending the conference; the Workshop on Cognitive Wireless Networks (sponsored), held in Nanjing in September, with around 140 attendees, more than 30 being Chapter members; and the Conference on Communications and Signal Processing in China (CCSPC 2008, co-sponsored) held in October in Zhengzhou with around 150 attendees. In 2009 the ComSoc Nanjing Chapter was even more active. In June 2009 the (technically co-sponsored) Conference on Green Wireless Technology and Systems was held in Huangshan, China, with 115 attendees from many Chinese universities and industrial companies. The main topics included power-efficient and energy-saving wireless communications system design and engineering techniques, wireless access protocols, services, software design, and wireless resource saving. In August 2009 the (co-sponsored) 9th Asian Conference on Quantum Information Science (AQIS ’09) was held in Nanjing with around 180 attendees. AQIS ’09 focused on quantum information science and technology, bridging quantum physics, computer science, mathematics, and information technologies. In September 2009 we hosted three excellent talks by IEEE ComSoc Distinguished Lecturers. The first talk, “Resource Management for Multitier Wireless Networks,” given by Prof. Xueming (Sherman) Shen from the University of Waterloo, Canada, discussed issues on resource and mobility management algorithms, and achieving flexible and effective utilization of network resources with guarantees for end-to-end QoS requirements of multimedia traffic. The sec- The opening ceremony of WCSP 2009 in Nanjing, China. ond talk, “Resource Allocation for Cellular/WLAN Integrated Networks” by Prof. Weihua Zhuang, also from the University of Waterloo, Canada, focused on ways to enhance multiservice provisioning by taking advantage of the complementary cellular/WLAN integrated network strengths, and details of call assignment/reassignment strategies, admission control policies, and the impact of user mobility and data traffic variability. Both lectures drew a great deal of interest, and more than 170 faculty members and students with more than 30 IEEE members in attendance. The third talk, given by Prof. Jacob Gavan, titled “Concepts, Applications and Design of High Altitude Platform Radio Relays,” expounded the feasibility, recent status, technical issues, and advantages of different categories of HAPS for several applications. The talk concluded with recent trends in HAPS design and developments. Around 50 faculty members and students, among whom over 10 were IEEE members, attended the lecture and benefited from learning about HAPS. The highlight of the activities of the ComSoc Nanjing Chapter in 2009 was technically sponsoring the 2009 International Conference on Wireless Communications and Signal Processing (WCSP 2009) held in Nanjing, China, on November 13–15, which attracted much attention from both the academic and industrial fields. It received a total of 1023 submissions from 32 countries and regions. All papers were rigorously and independently peer reviewed by the 104 TPC members and a large number of reviewers. The conference finally accepted 366 high-quality papers from 23 countries and regions, representing an acceptance ratio of 36 percent. Accepted papers were grouped into 24 sessions with two tracks, Wireless Communications and Signal Processing. A highlight of the conference was the seven keynote speeches delivered by distinguished scientific experts from all around the world. About 300 researchers, scientists, engineers, and (Continued on Newsletter page 4) Global Communications Newsletter • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 1 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F White Spaces: Unused TV Band Channels for Rural Broadband in the United States By Ana Vazquez Alejos, Felipe Gil Castiñeira, Manuel Garcia Sanchez, and Iñigo Cuiñas University of Vigo, Spain; New Mexico State University, USA During the next few years there are three technologies called to change together the traditional rigid policy for spectrum allocation: software defined radio (SDR), cognitive radio (CR), and white space devices (WDs). The CR paradigm proposes the creation of intelligent devices (usually developed with SDR platforms so that they can modify the radio parameters by software) which automatically change their conditions of operation in response to user demands or changes in the surrounding network. The application of these technologies in the channels reserved as guard bands, known as white spaces, is derived in WDs, which have made possible not only the use of the unused bands, but also the use of licensed bands by unlicensed users without causing interference to the legitimate owners. However, in some cases spectrum-sensing technology may not be completely effective in preventing co- or adjacentchannel interference with the licensed user. In order to solve this problem, WDs have been coupled with geolocation technology (e.g., GPS positioning along with a database of services and operation times). In November 2009 the U.S. Federal Communications Commission (FCC) launched a call for proposals to manage a database network that registers and controls the use of an important amount of liberated spectrum allocated in the 50–3000 MHz band to prevent the emerging new WDs from interfering with TV stations and other wireless services operating in this frequency region. But is there available space in so large and attractive a region of the extremely scarce frequency spectrum? The reality is that a non-negligible number of gaps exist between 50–3000 MHz since the analog TV switchoff process started, and this opportunity did not pass unappreciated by many eyes (Fig. 1). The Wireless Innovation Alliance [1], formed by companies such as Google, Dell, Hewlett-Packard, Motorola, and Microsoft, became the impelling motor for the free use of this accessible spectrum to develop a new generation of wireless devices that could be the answer to the need for providing broadband access to U.S. rural areas in a cost-effective manner. The first pilot was run in October 2009 in Claudville, Virginia [2]. There are several standardization organizations working on white space technology. The IEEE [3] formed a work group that is closing the P1900 standard, which will try to provide guarantees for compatibility and interference avoidance. Even the WiMAX Forum has announced a modification to accommodate its technology to the white spaces in an attempt to avoid losing the train of a business estimated in hundreds of billions of dollars. The unused TV broadcast channels were liberated as a result of the evolution toward digital terrestrial television (DTT) presenting blocks of 6 MHz, although this assignment varies all over the territory. The origin of the changes in the spectrum scene began with the abandonment of channels 52 to 69, or 698–806 MHz, by broadcasters as a response to the analog switchoff. This portion constitutes the 700 MHz spectrum publically auctioned in 2008 to 100 bidders that obtained about 1100 licenses for $20 million. These licensed spaces will provide mainly cellular expansion, including fourth-generation Long Term Evolution (4G LTE), commercial mobile TV, and wireless broadband. The assignment of frequencies to DTT stations was done in the space 54–698 MHz, channels 2–51, and due to the local feature of these new assigned frequencies many gaps can be found in this region of the spectrum, mainly due to channel 2 Communications IEEE Figure 1. White space channels available in December 2009 [4]. guards. Since the FCC announced the free use of part of the unused broadcast channels in 2008, the technological community has put forth a giant effort to satisfy all the parts involved. The main opposition derived from the TV broadcasters that predicted important malfunctions and interference in their licensed frequencies due to the WDs. A pilot developed in 2008 demystified the prognosticated problems of co- and adjacent-channel interference, showing that cognitive technologies are the answer for future services and gadgets operating in white space gaps [2]. Among the technical advantages offered by these gaps allocated under 900 MHz, despite their unlicensed status, we can mention the longer coverage areas that can be achieved (up to one mile), the reduced loss by penetration into buildings and vegetation (a detail especially relevant in rural areas), and the reduced impact of multipath, at least compared to frequencies of the 2.4 and 3.5 GHz bands. The availability of low-cost hardware is not less important, due to the facilities for the semiconductor technology at ultra high frequency (UHF). Nevertheless, not all the news is good. We cannot forget that longer antennas are required, and this fact can represent a business opportunity for antenna manufacturers. Another downside could be the need for incorporating geolocation in the WDs, increasing power consumption and size. In the future, the WDs and unlicensed services operating in the unused broadcast frequencies will operate under the guidelines given by CFR 47 Part 15 and amendments, retaining the 6 MHz channel. More spectrum space is available in the upper 700 MHz segment, which is expected to be assigned to deploy a nationwide communication network for public safety forces. This space contains 10 MHz blocks. The creation of the database proposed by the FCC will prevent licensed services, such as wireless microphone users or TV broadcasters, suffering interference during their operation. The standards under development will ensure that the new devices have dynamic access control, taking into account the local spectrum conditions to modify transmission/reception. The database to be implemented plays an important role. 2010 can present the definitive and successful launch of WhiteFi (a Wi-Fi style system operating in white spaces), thus providing full access to the information society for rural areas. References [1] [2] [3] [4] The Wireless Innovation Alliance Bridge Wave Inc www.ieee802.org/22 http://www.showmywhitespace.com Global Communications Newsletter • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Hightlights of the IEEE 9th TELSIKS Conference By Prof. Bratislav Milovanovic, University of Nis, Serbia On October 7–9, 2009 the Faculty of Electronic Engineering in Nis, Serbia, hosted fir the ninth time the biennial International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Services (TELSIKS 2009). Like the previous conference, TELSIKS 2007, this year’s event was organized jointly by the Faculty of Electronic Engineering Nis and the National Society for Microwave Technique and Technologies. TELSIKS 2009 was organized under the technical co-sponsorship of the IEEE MTT Society, IEEE AP Society, and IEEE Region 8, and in cooperation with the IEEE Section of Serbia and Montenegro, IEEE MTT-S Chapter, and IEEE Communications Society Chapter of Serbia and Montenegro, as well as the National Society for Telecommunications and Society for ETRAN. The conference was also supported by the Serbian Academy of Science and Art, Academy of Engineering Science of Serbia and Montenegro, Ministry of Science and Technological Development, and Ministry of Telecommunications and Information Society. The main part of the conference program included presentations of scientific papers from a range of topics in the field of telecommunications. The review of submitted papers was done by an international board of conference reviewers, and the final selection was made by the Conference Program Committee. The total number of papers selected for presentation was 124, 19 of which were invited. Authors of the papers are scientists from the following countries: Bosnia and Herzegovina, Bulgaria, Canada, Czech Republic, Croatia, Germany, Greece, Italy, Libya, Macedonia, the Netherlands, Romania, Slovenia, Serbia, Ukraine, Spain, the United Kingdom, and the United States. There were 11 regular sessions and five poster sessions. All papers scheduled for presentation were published prior to the conference. The two-volume proceedings, accompanied by a CD-ROM, were distributed to all registered participants. It is important to note that the Conference Proceedings, as an official IEEE publication, will be distributed by the IEEE Conference Publications Program Prof. A. Marincic opening the TELSIKS 2009 Conference. From left: Chairmen Prof. K. Rao, Prof. B. Milovanovic, Prof. S. Tomacic, Prof. G. Stoyanov, and Prof. O. Fratu. (IEEE CPP). All of the conference papers will be indexed in the IET INSPEC database. Like previous TELSIKS conferences, this year’s conference was not just a conference with presentations of scientific papers and exchange of experience, but also an event including many activities and meetings covering different important issues related to the field of telecommunications. The first of the additional activities was the Workshop “Trends in Multimedia Communications.” The lecturers were Prof. Kamisetty R. Rao, University of Texas at Arlington, who gave a plenary talk at the beginning of the Conference as well, and Prof. Zoran Bojkovic, University of Belgrade, Serbia. Then there were two roundtables organized during the conference: “Strategy of Scientific and Technological Development in tbe Republic of Serbia 2009–2014” and “Accreditation in Higher Education — Results and Forthcoming Activities.” Since actual Serbian topics were considered, both roundtables were held (Continued on Newsletter page 4) The Spanish ICT Hyper-Sector Reduces Its Activity by Seven Percent By Juan Pedro Muñoz-Gea and Josemaría Malgosa-Sanahuja Polytechnic University of Cartagena, Spain The Spanish Association of Electronics, Information Technologies and Telecommunications (AETIC) has presented the data of the ICT hyper-sector (telecommunications industries, telecommunications services, information technologies, consumer electronics, electronic components, and professional electronics) relating to the period between July 2008 and June 2009, which shows a reduction of 7 percent in activity. This figure shows an abrupt change of trend in the ICT sector, which has always starred in annual increments upward, except in 2008, when zero growth was recorded. All sectors that make up the hyper-sector have recorded losses for the first time, highlighting the addition to this negative trend of the telecommunications services and information technologies sectors (–4 and –2 percent, respectively). In addition, the second quarter of 2009 showed a rapid decline of 13 percent in the hyper-sector (compared to the same period in 2008) with rates ranging from –8 percent in telecommunications services to –38 percent in electronic components. The telecommunication industries sector registered the biggest fall of the hyper-sector from July 2008 to June 2009 (–25 percent), which accelerated in the second quarter of 2009 with a decline of 31 percent. Among other factors, this sharp fall is associated with a decline (for the first time in Spain) in the turnover of operators, a reduction in demand for fixed networks, and stagnation of the fixed broadband market. In the second quarter computers and networks fell by 40 percent, while mobile terminals fell 17 percent in the first six months of 2009. The consumer electronics sector underwent the second biggest decline, with a reduction in turnover of 22 percent (–27 percent, second quarter). The main causes are focused on the falling prices of TVs — around 25 percent — and a reduction of close to 10 percent of sold units in the market. The electronic components sector reduced its activity by 17 percent due to negative performance in other sectors. During the second quarter, the trend worsened to –38 percent. The professional electronics sector fell 8 percent, while from April to June 2009 the decline was more pronounced (–15%) because companies had exhausted the sector’s backlog, and replacement was very limited. The telecommunications services sector decreased (for the first time in history) 4 percent in billing. The second quarter figures went down four more points(–8%). All components (Continued on Newsletter page 4) Global Communications Newsletter • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 3 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page TELSIKS CONFERENCE/continued from page 3 in Serbian. Both of them gained the attention of the Serbian academic community. Since TELSIKS is dedicated to the introduction of new telecommunications technologies and services, experimental broadcasting of digital television programs in Nis was set up during the Conference, in cooperation with the national telecommunication company Telekom Srbija, as well as three television companies, one of which has national coverage. In addition to the activities related to the presentation of scientific and professional results and activities, there were several commercial presentations. Some of the leading information and communications technology (ICT) companies presented their latest solutions and products. Furthermore, there was a one-day exhibition of IET journals. As a special attraction, the presentation of the project “Computer Simulation and 3-D Modeling of the Original Patents of Nikola Tesla” was held. It was organized by the Faculty of Electronic Engineering of Nis and the Nikola Tesla Museum in Belgrade. Among the other activities, there were meetings of the Executive Committee of the IEEE Section of Serbia and Montenegro, and the IEEE Women in Engineering Chapter of Serbia and Montenegro. Furthermore, a meeting of the Serbian Society of Cable Operators’ representatives was held as well. The conference program was rich in social events as well. There was a reception for invited authors organized by the Mayor of the City of Nis, followed by a nice musical performance for all conference participants. A sightseeing tour for all interested participants was organized. The conference gala A BEMaGS F dinner was organized at the end of the second day. Serbian national cuisine, an orchestra performing Serbian and international music, and, most important, cheerful guests made the evening memorable. After the successful series of previous TELSIKS conferences, TELSIKS 2009 again offered a forum for promoting, discussing, and spreading ideas in the field of telecommunications. I would like to thank to all of the authors, members of the TPC and organizing committee, reviewers, sponsors, exhibitors, and all the others who participated in organization and in the conference itself. SPANISH ICT HYPER-SECTOR/continued from page 3 showed negative trends in income (fixed, mobile, pay TV, wholesale services), except for Internet access, which had a positive but declining rate. This situation is a direct result of the combined effect of the fall in traffic and average revenue per line and per minute, in both fixed and mobile telephony. Despite all of this, mobile line and Internet penetration grew moderately, and fixed access penetration was steady. The information technologies sector has decreased by 2 percent in turnovers during the past 12 months (–15 percent second quarter). The negative behavior of the software and computer services has added to the behavior registered by hardware equipment for a long time. This is due primarily to decreased investment in professional systems, both public and private. NANJING CHAPTER/continued from page 1 Global Newsletter www.comsoc.org/pubs/gcn STEFANO BREGNI Editor Politecnico di Milano - Dept. of Electronics and Information Piazza Leonardo da Vinci 32, 20133 MILANO MI, Italy Ph.: +39-02-2399.3503 - Fax: +39-02-2399.3413 Email: bregni@elet.polimi.it, s.bregni@ieee.org ___________ __________ scholarship students from all over the world, about half of them IEEE members, participated in the conference. WCSP 2009 was very successful, and conference attendees felt that the conference provided them with a platform where they could learn about new advances in the wireless communications and signal processing fields, and meet and discuss issues in research with peers working in the same area. They also expressed that they look forward to participating in WCSP next year. IEEE COMMUNICATIONS SOCIETY KHALED B. LETAIEF, VICE-PRESIDENT CONFERENCES SERGIO BENEDETTO, VICE-PRESIDENT MEMBER RELATIONS JOSÉ-DAVID CELY, DIRECTOR OF LA REGION GABE JAKOBSON, DIRECTOR OF NA REGION TARIQ DURRANI, DIRECTOR OF EAME REGION ZHISHENG NIU, DIRECTOR OF AP REGION ROBERTO SARACCO, DIRECTOR OF SISTER AND RELATED SOCIETIES REGIONAL CORRESPONDENTS WHO CONTRIBUTED TO THIS ISSUE MILAN JANKOVIC, SERBIA (___________ LJILJAMJ@EUNET.YU) JOSÉ MARIA MALGOSA-SANAHUJA, SPAIN (______________ JOSEM.MALGOSA@UPCT.ES) EWELL TAN, SINGAPORE (____________ EWELL.TAN@IEEE.ORG) ® A publication of the IEEE Communications Society 4 Communications IEEE Global Communications Newsletter • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page October 4-6, National Institute of Standards and Technology A BEMaGS F www.ieee-smartgridcomm.org 1st IEEE International Conference on Smart Grid Communications October 4 – 6, 2010 ~ National Institute of Standards and Technology (NIST) Gaithersburg, Maryland, USA Developing the Smart Grid has become an urgent global priority as its economic, environmental, and societal benefit will be enjoyed by generations to come. Information and communications technologies are at the core of the Smart Grid vision as they will empower today’s power grid with the capability of supporting two-way energy and information flow, isolating and restoring power outages more quickly, facilitating the integration of renewable energy sources into the grid and empowering the consumer with tools for optimizing their energy consumption. The 1st IEEE International Conference on Smart Grid Communications (SmartGridComm) is centered on all communications aspects that are relevant to the Smart Grid and aims at bringing together researchers from Academia, Industry, and National Labs to exchange novel ideas, explore enabling technologies, discuss innovative designs, and share field trial experiences and lessons learnt. The IEEE SmartGridComm Conference will be constituted of twelve Symposia. Each symposium will address a particular aspect of Smart Grid Communications. Prospective authors are invited to submit original contributions (standard two-column IEEE format and up to 6 pages) on all aspects of Smart Grid Communications to one of the following Symposia: Paper Submission Deadline: May 1, 2010 Camera Ready Paper Due: Aug. 1, 2010 Notification of Acceptance: Author Registration Deadline: July 19, 2010 Aug. 1, 2010 George Arnold, NIST, USA Stefano Galli, Panasonic R&D, USA Fred Baker, Cisco, USA Hamid Gharavi, NIST, USA Simon Haykin, McMaster University, Canada www.ieee-smartgridcomm.org Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F SERIES EDITORIAL DESIGN AND IMPLEMENTATIONS SERIES V: IMS APPLICATIONS AND SUPPORT Sean Moore T he IEEE Communications Magazine editorial team characterizes Series and Feature Topics as covering either vertical or horizontal topics. A topic is vertical if it is focused on a particular communication technology (e.g., next-generation optical switching). A topic is horizontal if it focuses on some operational aspect that is common across many communications technologies, such as interoperability testing or performance testing. The Design and Implementation (D&I) Series is horizontal, as D&I articles are intended to teach industry professionals about building next-generation communications products and services, regardless of the specific technology area. Coincidentally, however, five of the six articles in this fifth installment of the D&I Series discuss IP multimedia subsystem (IMS) technology or support for IMS business operations. These articles were submitted independently without a call or solicitations for IMS-related topics. This coincidence indicates the market strength of IMS and suggests that IMS is in an active stage of its R&D life cycle where the graph of R&D investment vs. time has a positive second derivative. Hence, this installment of D&I has been verticalized around IMS and may be used by Communications Society members as a resource to improve the efficiency and quality of their IMSrelated projects. IMS is an architectural framework that uses Session Initiation Protocol (SIP) signaling to deliver multimedia services over IP infrastructure. IMS was developed by the Third Generation Partnership Project (3GPP) standards organization specifically to support delivery of 3G mobile services. The IMS framework is sufficiently flexible such that it is now being used as the basis for both service provider and enterprise solutions using both wireless and wired infrastructure. At the core of an IMS implementation is intelligent SIP routing, which interconnects users, devices, services, and applications. The capability to rout a SIP message to multiple applications, which are hosted by Java Enterprise Editioncompliant application servers (JEE A/S), may be the most strategic capability of IMS. For example, when a caller sends a SIP INVITE message to a callee to create a session, the IMS SIP router routs the INVITE message through a chain of independent applications or services for, say, call screening, billing, QoS assurance, presence, user location tracking, E911, contact center information, contextual services, sleep proxies, or enterprise applications. These applications are hosted by a JEE A/S. Thus, unlike the call signal processing interfaces of 24 Communications IEEE legacy softswitches, which in practice were accessible only by telephony experts of the operating companies, an IMS-based implementation is truly an open architecture that is accessible by the large community of Java enterprise application and Java web application developers. The IMS framework converges telephony applications and enterprise IT applications by providing a gateway (in the form of the SIP IMS service control [ISC] interface) between the signaling protocols of telephony systems and those of IT systems. The possibilities for high-value converged IMS applications and services are seemingly endless. But IMS service providers and enterprise vendors may not have the R&D resources necessary to meet their customers’ demands for IMS technologies — particularly the need for Java enterprise applications — and are therefore dependent on third parties to provide the resources. These third parties in some cases may be the customers themselves. IMS’s open architecture enables thirdparty participation, but IMS service providers and vendors must assist in this process and compete for these third-party resources by providing effective application development tools and educational materials to the third party markets. Currently, these market forces are quite strong, in direct correlation with the increasing penetration of IMS, and have clearly factored into the “coincidence” that so many of the D&I articles in this issue are IMS-related. Sal Loreto and an Ericsson team contributed “IMS Service Development API and Testbed,” which addresses a significant obstacle to IMS application development for Java developers. In a native IMS implementation, SIP is used for communications between the SIP router and JEE A/S-hosted applications, which requires that the application be structured as a SIP servlet to handle and process SIP messages. The Java application developer must then work directly with the SIP protocol instead of with a programmatic Java library, which is contrary to the expectations of the Java development community. This article discusses how to design and build a Java programmatic interface that abstracts IMS application development away from the SIP protocol level. A similar approach is used by other IMS vendors and for the same reason: to make IMS application development highly accessible to enterprise Java developers. Alejandro Cadenas and Alejandro Sanchez-Esguevillas of Telefonica I+D, working with Belen Carro of the University of Valladolid, describe a practical deployment of contextual services used to intelligently route calls in an IMS implementation (“Deployment of Contextual Corporate Telco Ser- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F SERIES EDITORIAL vices”). Context-aware routing factors the users’ context — location, mobility mode, presence state, current role, and so on — into call routing decisions. In the enterprise setting, context-aware routing may be used, for example, to route a call to the current best contact device while selecting the most appropriate media (voice, voice mail, text, email, etc.) for the communication. In the consumer setting, context-aware routing may be used to satisfy immediate consumer needs; for instance, a subscriber desiring to exchange currency may be routed to the closest bank providing an exchange service. The authors show how to architect context services in the IMS framework to maximize the efficiency and effectiveness of context-aware routing. The demand for contextual services drives a correlated demand for sensor networks to collect context data. In a serendipitous complement to the article by Cardenas et al., May El Barachi and a team from Concordia University and United Arab Emirates University describe how to integrate IMS implementations with wireless sensor networks (WSNs) for collecting contextual data (“Architectural Components for the Integration of IMS and WSN”). The design and implementation includes a WSN/IMS gateway and an extended presence service for managing contextual information. Barachi et al. prove out their solutions by creating IMS applications that use the contextual information collected from the WSNs. Any commercial success of IMS may be attributed in part to technology benefits, but the majority share of the credit should be given to the business operations. Without efficient marketing, planning, delivery, and operational support for IMS services, IMS service businesses may not succeed. The next two articles provide valuable information that will help improve the chances for success. Often, communications services initiatives, such as an IMS services rollout, are launched with (often unfounded) goals to achieve some percentage of market penetration, such as “near 100 percent!” Is there a simple, low-cost method for estimating realistic goals? Or equivalently, is there a method to estimate if the current business environment supports the attainment of such goals, or are additional stimuli needed? Ryszard Struzak, IEEE Life Fellow, proposes such a method in “Broadband Internet in EU Countries: Limits to Growth.” Struzak borrows the logistic growth function used in biological system modeling and applies it to early data from the European i2010 broadband initiative, which has a goal of 90 percent broadband penetration for each member country of the European Union. Given current conditions, Struzak’s method shows that many countries are not on a trajectory to achieve the goal, which suggests that actions be taken to change the business environment and thereby improve the likelihood that the i2010 goals will be met. Struzak’s method is quite general, and its application to analysis of IMS service penetration goals should be straightforward. IMS not only drives more and richer IP multimedia services but also drives growth of organizations that provide IP multimedia services over third-party IP network infrastructure. The network operators therefore need to measure precisely the traffic volumes of individual media services for accurate cost accounting and charging. Operators must also measure traffic to ensure QoS agreements, and to use the data in network design and planning. JungYul Choi and a team from Korea Telecom built a service traffic management system to solve these problems. In “Service Traffic Management System for Multiservice IP Networks,” Choi et al. share their experience and lessons learned on the project, prove empirically the accuracy of their methods, and discuss how their system supports the new business and management processes of Korea Telecom. Prasant Misra and a team from the University of New South Wales and the CSIRO ICT Centre share their experience with designing and building communication systems that may be deployed, for example, in disaster-response situations, urban war zones, and other high-stress environments (“Safety Assurance and Rescue Communications in High-Stress Environments”). Real-world testing of communications systems in such environments is obviously a barrier, but underground mines display many of the extreme communications characteristics of high-stress environments and may proxy for them as a design and implementation testbed. Solving the underground mine communications problem is by itself a significant contribution, but such solutions may be leveraged into other highstress environments. Misra et al. provide a tutorial on extreme communications characteristics and how they may be addressed, discuss current solutions for communications in mines, and conclude with an experiment assessing the performance of a wireless sensor network in an underground mine. I hope you both enjoy and learn from this fifth installment of D&I as much as I did in serving as its editor. If these articles and past installments of D&I have inspired you to consider contributing your valuable D&I knowledge to the Communications Society’s members, contact me directly (smoore-phd@ieee.org) _______________ so that together we can create a firstrate publication for the benefit of our industry members. The D&I Series Call for Papers may be found at ___________ http://www.comsoc.org/livepubs/ci1/info/cfp/cfpcommagdesignimplementa________________________________________ tion1.htm. ______ Please join me in acknowledging everyone that made possible this installment of the D&I Series: the authors’ sponsoring organizations for donating their time, Avaya for donating my time, the Editor-in-Chief Steve Gorshe, Joe Milizzo and Jennifer Porcello and her team at IEEE Communications Magazine, and the many anonymous reviewers who ensured the quality of the articles. BIOGRAPHY _____________ has over 25 years of S EAN MOORE [M’01, SM’03] (smoore-phd@ieee.org) experience in a variety of technology industries, and has been working in networking and telecommunications since 2001. He currently works at Avaya, a vendor of enterprise communications solutions, where he has served as chief scientist in the gateways division, as an enterprise architect in the CTO office, and currently serves as the chief architect for developer platforms and as Avaya's representative to ECMA International. One of his current projects is architecting the software development kits (SDKs) and platforms for use by third-party developers to create enterprise telephony web applications and SIP/IMS applications. In the past he was chief scientist at Cetacean Networks, a vendor of advanced routers and routing applications, senior director of R&D at MadeToOrder.com, a developer of supply-chain management e-commerce solutions, and director of advanced systems and director of business development at BBN Corporation, an R&D services provider to the U.S. Department of Defense. He has made contributions in peer-to-peer media distribution protocols, network admission control, web-telephony convergence, network tomography, digital signal processing, fast Fourier transform (FFT) algorithms, medical imaging, global climate modeling, global-scale distributed databases, global-scale logistics and scheduling systems, e-commerce, genetic algorithms, automated hardware design, queuing theory, TCP technology, and scheduling theory. His software for FFTs on the 2-sphere is open-sourced as SpharmonicKit. He also serves as the Design and Implementation Series Editor and Associate Editor-in-Chief for IEEE Communications Magazine. He is a charter member of the IEEE Standards Activities Board. He received a B.S. degree in electrical engineering from Tulane University in 1983, an M.S. in mathematics from the University of New Orleans in 1990 (SIAM Applied Mathematics Award co-recipient), and M.S. and Ph.D. degrees in computer science from Dartmouth College in 1993 and 1994, respectively. IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 25 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F TOPICS IN DESIGN & IMPLEMENTATION IMS Service Development API and Testbed Salvatore Loreto, Tomas Mecklin, Miljenko Opsenica, and Heidi-Maria Rissanen, Ericsson Research ABSTRACT The IP multimedia subsystem defined by the Third Generation Partnership Project is the architecture merging the Internet and telecom worlds. The IMS was designed to make it easy for third-party developers to make their applications available to all IMS users, and by doing so provide more than only the basic telecom services like voice, messaging, presence and contact management. However, good knowledge of the IMS network architecture and the underlying Internet protocols is still needed to develop IMS applications. In addition, telecom expertise is needed to deploy the application and provision users. To ease the development and deployment process, it is essential to provide application developers with APIs and similar tools available for Web 2.0 application development today. In this article we explore the architectural and protocol aspects that enable third-party IMS application development and deployment. We also study how the applications will coexist with other applications already deployed in the IMS. Moreover, we describe Java libraries exploiting the functionality of the IMS both in the terminal client and within the core network. We also show how these Java libraries can be used for developing and deploying new applications in an IMS testbed, which provides IMS functionality over commercial 3G networks. INTRODUCTION The Third Generation Partnership Project (3GPP) developed the IP multimedia subsystem (IMS) [1] architecture with the aim of providing and handling a large variety of innovative services. To achieve these goals the IMS uses Internet Engineering Task Force (IETF) protocols. In particular, it uses Session Initiation Protocol (SIP) [2] as the session control protocol to establish and control multimedia sessions. IMS is a SIP-based network architecture that provides a multiservice environment with multimedia capabilities. For this reason, 3GPP has introduced logical elements as well as protocol mechanisms that are not defined in the plain IETF SIP. The IMS network contains at least one home subscriber server (HSS), which is the central repository for user-related information (e.g., the 26 Communications IEEE 0163-6804/10/$25.00 © 2010 IEEE service to which the user is subscribed). As logical elements IMS architecture defines different call session control functions (CSCFs), which are essentially SIP proxy servers supporting IMS specific mechanisms. The serving CSCF (SCSCF) is the central node of the signaling plane. It is essentially a SIP server, but also performs session control. It also acts as a SIP registrar, maintaining a binding between the user’s location and the user’s SIP address of record. All the SIP signaling that is sent or received by the IMS terminal traverses the allocated S-CSCF. The SCSCF inspects every SIP message and determines whether the SIP signaling should visit one or more application servers (ASs) en route toward the final destination using the information contained in the initial filter criteria (IFC). This is illustrated in Fig. 1. An AS is a logical IMS element that hosts, executes, and provides the business logic for end-user services. The AS can be located either in the home network or in an external thirdparty network with which the home operator maintains a service agreement. Thus, unlike IP networks, an IMS network does not respect the end-to-end Internet philosophy which mandates that all the intelligence is at the edges of the network. Instead, an IMS network allows part of the intelligence of a service to be hosted inside the network (i.e., in the AS). This way, terminals with limited capabilities can access complex services using the support from the network. The IMS architecture was designed to be flexible and expandable, allowing third-party developers to bring new services online. However, 3GPP gave little attention to the issue of actually creating and deploying services easily. As a consequence, exposed IMS interfaces have been complex and have not attracted developers. Therefore, the existing IMS services have been used just like a set of operator controlled bit-pipe utilities. During the last few years there have been several efforts to expose IMS functionality to application developers via high-level interfaces. However, in order to provide new services to users of the IMS network, it is also necessary to implement the business logic for the new services within the network. Until now there has not been any effort to expose IMS network capabilities to service developers via high-level interfaces that would have allowed easy development and deployment of new services to an AS. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page To try to resolve this limitation we have published high-level Java IMS application programming interfaces (APIs) and an IMS testbed that enables application developers, with no prior knowledge about IMS or SIP, to build IMS applications and deploy the applications in a live IMS network (http://labs.ericsson.com). The remainder of the article is organized as follows. In the next section we explore the currently available Java APIs for both the terminal and server sides, discuss their functionality, and highlight the inconsistencies and disalignments between them. We then describe a presence service implementation built on top of the provided IMS API. We discuss application and service routing in IMS. We show how the provided Java libraries can be used for deploying new applications in an IMS testbed, which provides the IMS functionality over commercial 3G networks. To be able to use the services of the testbed network, the user has to be provisioned to the network. This is described later. In the final section we conclude the article and propose some future work. IMS CORE API Java Micro Edition (Java ME) is the most ubiquitous application platform for cellular phones with constrained resources. To lower the barriers for Java ME IMS application development, the Java Community Process (JCP) defined an IMS Services API package for the Java ME platform. This package is provided in Java Specification Request (JSR) 281 (http://jcp.org/en/jsr/detail?id=281). To target the whole Java ME user community, JSR 281 was designed using the following design principles: • High abstraction level of the API allows non-IMS developers to create IMS applications. • Creating an IMS-aware application takes only a few steps. Thus, the developer can concentrate on the logic of the application. • The API allows access to low-level APIs for developers with IMS knowledge. On the lower level, for example, JSR 180 (http://jcp. org/en/jsr/detail?id=180), which is the SIP API for Java ME, can be used. The IMS API defines a set of service methods that can be used to build IMS applications: • Session represents media exchange between two IMS endpoints. • Capabilities instance queries a remote endpoint about its capabilities. • Reference is used for referring to a remote endpoint of a third-party user or service. • Subscription subscribes to event state from a remote endpoint. • Publication publishes event state to a remote endpoint. • PageMessage is used for instant messages or exchange of small amounts of content outside of a session. No similar high-level IMS API has been defined on the server side for Java Enterprise Edition (Java EE). For Java EE there is JSR 289, which is the SIP Servlet API 1.1 (http://jcp. org/en/ jsr/detail?id=289). It standardizes the _________________ platform for delivering functionality for SIP sig- AS AS IEEE BEMaGS F AS ISC HSS P-CSCF S-CSCF I-CSCF Figure 1. SIP routing in IMS. naling for Java EE applications. SIP servlets are server-side components that perform SIP signaling. They are managed by a SIP servlet container, which is usually part of a SIP AS. The SIP Servlet API takes care of managing network listening points, retransmissions, and SIP message headers such as CSeq and CallID. The SIP Servlet 1.1 API also provides a standardized way to develop converged applications that use both SIP servlet components and standard Java EE components such as Enterprise Java Beans (EJBs). For non-SIP experts to develop IMS applications the abstraction level of the JSR 289 API is too low. Thus, a higher-level interface similar to the terminal side’s JSR 281 is needed. To solve this inconsistency between client and server APIs, we implemented an IMS Core API for Java EE. IMS API LAYERS The IMS core API for Java EE was designed to also provide on the server side a higher level of abstraction where the developer does not need to be aware of the SIP Servlet programming model or SIP signaling. As the SIP protocol is asynchronous, communication initiated by remote endpoints is handled by attaching listeners to the created services. Applications initially need to create an ImsCoreService as a handle for creating new SIP transactions and receiving incoming transactions. A listener is attached to the ImsCoreService to listen to remotely initiated transactions such as session invitations. When the application needs to initiate a transaction, the specific service is created by using the ImsCoreService. As with attaching a listener to the ImsCoreService, a listener can also be attached to the specific service to receive messages related to the service. Notifications about delivery success are delivered using the listener attached to the specific service. One of the design requirements for the IMS core API was to have a similar IMS API for both Java ME and Java EE. To achieve this, we did alignments in the abstraction level, application, and service routing, and supported features. Full alignment is not possible due to the differences between the Java platforms. The IMS API layers for both Java EE (server side) and Java ME (client side) are shown in Fig. 2. On top of the IMS core API, it is possible to IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 27 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Server API layers Registration to the IMS network can be done both from the server and the client BEMaGS F Terminal API layers Application Application Application Application Application layer A Application Application Application Application side. However, an application IMS CoSe Presence Gropu mgmt Presence domain without the Messaging be in a trusted IMS CoSe Conformance deployed on the AS is considered to need for registering the user of the application. Media control JSR309 IMS Core API JSR289 Java EE (Sailfin application server) IMS adaptation layer (JSR 281) JSR180 Java ME (client platform) Figure 2. The IMS API layers. build communication services (CoSes): a set of rules, procedures, and allowed media for a specific type of service. The most common CoSes are presence, messaging, and conferencing. Developers can build their applications using either the IMS core API or CoSe APIs, or both. Developers who are familiar with IMS and SIP concepts can also access lower-level APIs. For brevity, this article does not provide details of the CoSe services or APIs. Server Implementation — As shown in Fig. 2, on the server side there is a Sailfin AS at the bottom as the deployment platform. Sailfin contains a JSR 289 library. The server side IMS API implementation is built on top of the JSR 289 API. The abstraction level and design philosophy of the server implementation are based on the JSR 281 API. In the server API we used service and callback methods similar to the ones used in the JSR 281 API. The callback concept is based on the listener and observer design patterns (http://java.sun.com/developer/JDCTechTips/200 6/tt0113.html). _________ Using the callback mechanism, a user can set a listener for an invoked method to receive corresponding events. The core API’s connections to the IMS network are handled by JSR 289 and the Java platform. Terminal Implementation — On the terminal side, there is an implementation of the JSR 281 API as shown in Fig. 2. In addition to that, we implemented an IMS framework, which controls the connection to the IMS network. The IMS framework also takes care of routing the incoming requests to the correct application. The IMS framework can only be used in terminals that have support for JSR 180, which is 28 Communications IEEE the SIP API for Java ME (http://jcp.org/en/jsr/ A JSR 180 stack, which was implemented as part of the project, can be used if there is no native JSR 180 in the terminal. So far we have used only Sony Ericsson phones to test the APIs. detail?id=180). __________ IMS CORE API FUNCTIONALITY The core API provides high-level interfaces that can be accessed from both the CoSe and application layers. The level of abstraction is similar to the abstraction level used in JSR 281. New IMS services can be introduced by combining existing interfaces or adding new ones. Currently exposed functionality is described in the following. Registration — To be able to use IMS functionality, the user needs to be registered to the IMS network. Registration is done by invoking the Registration interface method and by listening to the registration events. Registration to the IMS network can be done from both the server and client sides. However, an application deployed on the AS is considered to be in a trusted domain without the need to register the user of the application. SIP Session Management — The SIP session management interface provides the SIP core protocol functionality. By invoking interface methods and listening to the events, it is possible to perform all basic SIP session actions: invite a party to a session, accept and terminate a session, and respond to requests. SIP signaling is taken care of by the API implementation, but the user has to know how to manage concepts such as an ImsSession and ImsMedia. Instant Messaging — The IMS core API supports two modes of instant messaging: session IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page F The presence service Terminal Application server Java ME MIDlet Java EE application online and, if they CoSe layer Presence informed whether or not other users are Application interfaces CoSe layer allows a user to be are online, whether Presence they are idle or busy, as well as other IMS adaptation layer (JSR231) The core API layer (JSR281 alike) JSR180 stack Service router details of their communication means and capabilities. IMS interfaces JSR180 stack Client Java ME platform Device infrastructure Application router ServerSailfin platform (JSR289) Network infrastructure Figure 3. Presence example of a CoSe service. mode and page. Page messaging uses SIP MESSAGE, as defined in [3]. Due to the size limitations of IMS nodes like the session border controller (SBC), a bigger amount of content should preferably be sent using the session mode. Session mode messaging supports exchanging arbitrarily sized content between users. In session mode the messaging service creates a session with the destination and delivers the messages using the Message Session Relay Protocol (MSRP) [4]. An MSRP session is set up by exchanging certain information using SIP, such as the MSRP uniform resource identifier (URI). SIP Event Notification and Publication — The event notification and publication interface provides methods for using SIP subscriptions, notifications, and publications. SUBSCRIBE and NOTIFY functionality is implemented according to RFC 3265 [5] and PUBLISH according to RFC 3903 [6]. On top of this functionality, a CoSe service can, for example, publish a user’s presence information or subscribe to other users’ presence information. PRESENCE SERVICE IMPLEMENTATION The presence service allows a user to be informed whether or not other users are online and, if they are online, whether they are idle or busy, as well as other details of their communication means and capabilities. Capabilities can be used to indicate if a user supports audio, video, or instant messaging. Presence service is the first CoSe service we provide to developers, which is built on top of the IMS core API in Java EE and on top of JSR 281 in Java ME. Examples of both a Java ME MIDlet and a Java EE application using the presence service are shown in Fig. 3. At the time of implementation, JCP had not defined any presence API; thus, our implementation is not based on any JSR but follows Open Mobile Alliance (OMA) application-level specifications. The Presence API allows users to publish presence information and subscribe to other users’ presence information. The API uses Extensible Markup Language (XML) Configuration Access Protocol (XCAP) [7] for manipulating presence lists and presence authorization rules on the XML Document Management Server (XDMS). Presence authorization rules define the authorizing policy for watchers. Mechanisms to create, modify, fetch, and delete XML documents are defined by OMA. To get real-time updates about the changes in the XML documents, users can subscribe to the different events by using SIP NOTIFY requests as defined in the SIP event notification framework [5]. SIP event notification and publish functionality is used from the IMS core API in Java EE and from the JSR 281 API in Java ME. APPLICATION AND SERVICE ROUTING As described earlier, IMS is an architecture able to support several end-user services. The partic- IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 29 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Once the chain of applications is set for the initial request, all subsequent requests will be routed to the applications in the same order. This way, complex services can be built without making individual applications too complex. ular service a user intends to use in a session has to be identified at the time the IMS session is established so the S-CSCF can trigger the SIP signaling to the particular AS providing the service. This is illustrated in Fig. 1. SIP messages have to carry a tag to allow the terminal and network to identify the service intended to be used during an IMS session. The SIP Caller Preference mechanism (RFC 3841) [8] describes a set of extensions to SIP that allow a caller to express its preferences about request handling in servers. These preferences include the ability to select to which URI a request gets routed, and make it possible to specify certain request handling directives in proxies and redirect servers. Three request header fields, which specify the caller’s preferences, are specified: Accept-Contact, Reject-Contact, and Request-Disposition. In particular, the Accept-Contact header explicitly contains the desired properties of a terminal to which the request is to be routed. 3GPP extends this mechanism to also convey the communication service identifier (ICSI) and the IMS application reference identifier (IARI) in the Accept-Contact header. As the logic of each standardized IMS service can be utilized by a number of different service applications, each of which implements a particular end-user service, both the ICSI and IARI tags are needed in the SIP Accept-Contact header in our API implementation. These tags are needed to determine the correct IMS services and to address the correct application. SERVICE ROUTING As the IMS Core API supports the IMS multiservice concept where several services are available to the user, a service routing mechanism is needed in the IMS Core API. To route the request to the correct service, we use the 3GPP ICSI feature tag in the SIP Accept-Contact header. For example, multimedia telephony service (MMTel) would be identified with the following ICSI tag: *;+g.3gpp.app ref = “urn:Aurn-xxx:3gppservice.ims.icsi. mmtel”. The ICSI tag is configured in the application deployment descriptor and registered in the deployment phase, described later. Two dependent tag components, ServiceID and ServiceName, are linked with a configured service and used in subsequent service routing. Providing a combination of ServiceID and ServiceName allows application developers to instantiate the same IMS service with different configurations. A service router (SR) is a core API component that handles routing logic on the server side. The IMS system is responsible for routing SIP signaling to the applications that are part of a service. Routing is based on the first request sent to the S-CSCF. The request initiator inserts an ICSI tag into the Accept-Contact header and sends it toward the IMS network. The S-CSCF uses the IFC to identify the AS that has to be included in the signaling path. After the request is received at the AS container, the target application is selected using application routing, which is described later. Service selection within 30 Communications IEEE A BEMaGS F the application is done by the SR. The SR uses the received tag to select the service within the application. If the requested service is identified, the request is sent toward the service for further processing. APPLICATION ROUTING A complete service, such as a pure SIP or converged service, can be built by combining several applications hosted by an AS. Each individual application performs a part of the service independent of the others. The SIP container needs to determine which application to invoke when an initial request is received. This is done by an application router (AR), which implements the SIPApplicationRouter interface defined in JSR 289. The AR is not a part of the container, but rather an extension thereof. The AR may use any algorithm or data source to determine the order in which applications are invoked for an initial request. Once the chain of applications is set for the initial request, all subsequent requests will be routed to the applications in the same order. This way, complex services can be built without making individual applications too complex. The application independence and composition used in JSR 289 is adapted from the distributed feature composition (DFC) architecture [9]. Converged applications are identified by the application name, defined either in the deployment descriptor or as an annotation, as described later. When an application is deployed or undeployed, the AR is notified about the change in the available applications. At the start, the container notifies the AR about the available applications. The names of the affected applications are included in the notifications. APPLICATION ROUTER IMPLEMENTATION In our AR implementation we use the feature tag defined in RFC 3840 [10] and RFC 3841 [8] to map initial requests to the correct application. We did not implement the required features for application composition in the AR, since only basic services were needed. When the container receives an initial request of which it has no prior knowledge, it forwards the request to the AR. The AR is not allowed to modify the request in any way, but it extracts the required information from the request to be able to select the correct application. In our implementation we extract the Accept-Contact header and analyze its content. The AR will extract the IARI value to select the application to which the request should be routed. The ICSI is not used by our AR implementation, but can be used by the SR, as described earlier. DEPLOYMENT OF APPLICATIONS To deploy an application using the IMS APIs to a real IMS network, the IMS testbed provided by Ericsson Labs can be used (http://developer. labs.ericsson.net/apis/mjcf). In this testbed the SIP servlet container is a Sailfin AS (https://sail_______ fin.dev.java.net). Sailfin is based on the Glass___________ FishAS (https://glassfish.dev.java.net) with a SIP servlets technology extension. The network architecture of the testbed is shown in Fig. 4. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page The network contains an S-CSCF, HSS, SIPAS, and a presence server containing an XDMS. The Sailfin AS is located in another network that is connected to the IMS network with a virtual private network (VPN) tunnel. An SBC manages the signaling and MSRP streams to and from the terminals. There is also a provisioning server, which is discussed in the next section. To deploy an application to the IMS network, the application needs to be uploaded to the Sailfin AS. Deployment of IMS applications is similar to deployment of normal web applications. Directories and files of an IMS application should be laid out according to the standard web application layout. A standard web application configuration file, sun-web.xml, is needed to deploy the SIP application. If HTTP servlets are used, a web.xml deployment descriptor is also needed. In addition, the following SIP-specific configuration files are needed: • sip.xml is the SIP deployment descriptor. It contains the name of the application and servlet mappings. It is similar to the standard web.xml file, but instead of a URL pattern used in web.xml, the header field of a SIP request is used. • ims.xml is the IMS descriptor of the application. It is not part of the SIP servlet API, but a descriptor needed by the IMS APIs. ims.xml contains the ID of the service, the address of the CSCF and the SIP URI of the user on whose behalf the AS is performing actions. As an example, we have an application named com.imsinnovation.sendmessage, which is a simple application able to receive and send page messages. The name of the application is defined in the sip.xml deployment descriptor: <?xml version=”1.0” encoding=”UTF-8”?> <sip-app> <app-name>com.imsinnovation.sendmessage</app-name> <display-name>Page message test</display-name> The corresponding IARI value to route initial request to this application is +g.3gpp.app_ref= ”urn:urn-xxx:3gpp-application. com.imsinnovation.sendmessage” PROVISIONING Before the user can use the services of the IMS network, s/he needs to be provisioned to the network. In our implementation we use the Ericsson Multi Activation (EMA) provisioning system (http://www.ericsson.com/solutions/page.asp?Arti c________________________________ leId=89A4A5D2-13F7-477C-9636-CB92 ________ to provision users to the IMS netFA37FD6F) work. EMA provides a provisioning interface called the Customer Administration Interface Third Generation (CAI3G). CAI3G follows industry standards and best practices, and it uses Simple Object Access Protocol (SOAP) over HTTP. An EMA system can be used independent of the operator. XCAP SIP Diameter HTTP/CAI3G LDAP IEEE BEMaGS F Sailfin AS Internet Terminal SBC NAT/FW Provisioning server (EMA) S-CSCF Presence server HSS Figure 4. Ericsson Labs IMS network. To contact the EMA provisioning system located in the Ericsson Laboratories IMS testbed network, we have implemented a provisioning application. This application is deployed on the Sailfin AS in the testbed network. Data related to the applications is stored on the AS, and data related to the services of the IMS is stored on the HSS. To make an initial provisioning request, a SOAP-based authorization request is sent from the provisioning application to the provisioning server. This request contains the mobile subscriber integrated services digital network (ISDN; MSISDN) identifier of the user. If the response is successful, the user will receive an SMS message with a provisioning password to the mobile phone. To finalize provisioning, a final request containing the password is sent from the application to the provisioning server. This final request creates the IFC, and provisions the user to the IMS network and its services. CAI3G provides the possibility to later update the user profile and for example to provision new services. LESSONS LEARNED AND FUTURE WORK The IMS vision is to create an ecosystem where all the applications provided by the developer community are available for all users of the IMS. As IMS networks are being installed in operators’ networks around the world, it seems essential to have APIs and tools available for IMS application developers similar to the tools available for web developers today. We address this problem by providing developers with high-level Java APIs exposing the functionality of the IMS network and a live IMS testbed network. The main objective of this project was to publish high-level Java EE and ME APIs that would allow web application developers to include IMS functionality in their applications. One of the requirements was that no prior knowledge about IMS or SIP should be required of the developers. Thus far we have published a core API pro- IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 31 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page To efficiently use presence information, some information about presence standards could be useful. Defining good samples on how to use these concepts will help the developers to build their own applications. 32 Communications IEEE viding the functionality described earlier. We have also published a presence API, which is an example of a CoSe service, for both Java EE and Java ME. As we are trying to merge the telecom and Internet worlds, we are dealing on one side with asynchronous network signaling and on the other with synchronous Internet signaling. One of the biggest difficulties came from differences between SIP and HTTP sessions. Although both protocols use a request-response pattern and their syntaxes are similar, SIP is still an asynchronous communications protocol. As communication systems are inherently stateful, state and transaction management is arguably the biggest shortcoming of the SIP servlet layer we have to consider. To balance the two different approaches, we introduced some level of state information in between and used a callback mechanism dependent on network interactions. For balancing on the Internet side we used Comet’s (http://docs.sun.com/app/docs/doc/ 8204496/ghgxk?a=view) asynchronous, non_________________ blocking HTTP mechanisms. Another difficulty we faced during the project was local testing of IMS applications. Although we had an IMS environment for local testing, it was not fully compliant with standards and requirements used in the real testbed network. This meant it was not possible to test IMS network-dependent functions locally but in the remote, real IMS network. Therefore, testing of functions like presence or provisioning was done in two steps. Most of the developers who have used the APIs thus far have been students. The abstraction level in the APIs is higher than SIP, and that has been clear enough for most of the developers. However, to efficiently use presence information, some information about presence standards could be useful. Defining good samples on how to use these concepts will help the developers build their own applications. It is clear that providing only Java APIs is not enough for the needs of the developers. Our current and future work is related to implementing interfaces other than Java. Currently, we are implementing APIs (e.g., for representational state ttransfer [REST]). Other interfaces such as .Net or SOAP need to be considered as well. In addition, real-time media such as voice and video are not yet supported, but implementation work is ongoing and follows the JSR 309 Media Server Control API (http://jcp.org/en/jsr/ detail?id=309). Support for streaming media is __________ still an open issue since the current Java ME platform does not support it. A BEMaGS F For the sake of brevity, this article does not provide details of the CoSe services or APIs; however, we intend to publish these details at a future date. REFERENCES [1] 3GPP TS 23.228, “IP Multimedia Subsystem (IMS); Stage 2,” Sept. 2008. [2] J. Rosenberg et al., “SIP: Session Initiation Protocol,” IETF RFC 3261, June 2002. [3] B. Campbell et al., “Session Initiation Protocol (SIP) Extension for Instant Messaging,” IETF RFC 3428, Dec. 2002. [4] B. Campbell, R. Mahy, and C. Jennings, “The Message Session Relay Protocol (MSRP),” IETF RFC 4975, Sept. 2007. [5] A. B. Roach, “Session Initiation Protocol (SIP) — Specific Event Notification,” IETF RFC 3265, June 2002. [6] A. Niemi, “Session Initiation Protocol (SIP) Extension for Event State Publication,” IETF RFC 3903, Oct. 2004. [7] J. Rosenberg, “The Extensible Markup Language (XML) Configuration Access Protocol (XCAP),” IETF RFC 4825, May 2007. [8] J. Rosenberg, H. Schulzrinne, and P. Kyzivat, “Caller Preferences for the Session Initiation Protocol (SIP),” IETF RFC 3841), Aug. 2004. [9] M. Jackson and P. Zave, “Distributed Feature Composition: A Virtual Architecture for Telecommunications Services,” IEEE Trans. Software Eng., 1998. [10] J. Rosenberg, H. Schulzrinne, and P. Kyzivat, “Indicating User Agent Capabilities in the Session Initiation Protocol (SIP),” IETF RFC 3840, Aug. 2004. BIOGRAPHIES S ALVATORE L ORETO [SM] received his degree in computer engineering from the University of Napoli Federico II, Italy, in 1999. He obtained a Ph.D.degree in computer networks in 2006. Since 2000 he has been working for Ericsson, first in Italy and now in Finland. He is currently working as a research scientist at Ericsson Research in Finland. He has authored and co-authored several papers on transport and signaling protocols. His research interests include signaling, multimedia applications, transport protocols, and network security. He is also an active member of the IETF and currently co-chairs the HyBi wg. T OMAS M ECKLIN has been working for Ericsson since 1993 with various communication technologies. He graduated in 1994 from the Computer Science Department of Tekniska Lroverket i Helsingfors. Since 1999 he has been working as an architect for a number of SIP-based call controllers for IMS. Currently he is working as research scientist at Ericsson Research, Finland (Nomadiclab), with his main focus on service enablers, multimedia applications, privacy, and security. M ILJENKO O PSENICA received his M.Sc. degree in electrical engineering and information technology from the University of Zagreb — FER, Croatia, in 2001. He joined Ericsson in 1998. He has been working on a number of signalingbased call controllers. Currently he is working as a research scientist at Ericsson Research, Finland (Nomadiclab), with his main focus on service enablers, multimedia applications, privacy, and security. HEIDI-MARIA RISSANEN received her M.Sc. degree in communications engineering from Helsinki University of Technology, Finland, in 2007. She joined Ericsson Finland in 2005. Since 2006 she has been working as a research scientist at IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F ______________ ______________ Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F TOPICS IN DESIGN & IMPLEMENTATION Deployment of Contextual Corporate Telco Services Based on Protocol Adaptation in the NGN Environment Alejandro Cadenas and Antonio Sánchez-Esguevillas, Telefónica I+D Belén Carro, University of Valladolid ABSTRACT Deployment of contextual services is usually constrained to specific areas where contextual behavior can be obtained, mainly due to coverage limitations of context acquisition devices. Although end customers highly appreciate contextual services, those limitations make such services difficult to commercialize. In this article we present a practical deployment of a contextual service offered by a convergent telecommunications operator, whose functionality is to provide intelligent context-based call routing and rerouting, orchestrated from the operator’s service layer. It is based on IMS control layer capabilities to properly capture the situation of the end user in a ubiquitous coverage area. The user’s context is stored in a network-centric element in order to leverage that information across different services, optimizing the system by increasing the quality of the information captured and processed. This implementation proves that value-added contextual services may be built efficiently today using available products and protocols. Since contextual services will likely be a valuable part of a service provider’s portfolio, this implementation can help creators of new contextual services to meet cost and time-to-market objectives. INTRODUCTION Context-aware applications are one of the new paradigms in telecommunications commercial environments, and significant research has been done on this topic [1]. These applications are based on appropriate sensing or detection mechanisms whose objective is to identify the situation, or context, of the user that will consume the context-aware service. This sensing mechanism can be either push or pull, depending on the specific sensor device and magnitude detected. Context is a diverse concept. It can range from the physical presence of the user in a given room to the emotional situation of a user that may affect the way some services are delivered. It also has a strong dependence on the time in which it is acquired, as some types of information have expiration times (location, activity, etc.). 34 Communications IEEE 0163-6804/10/$25.00 © 2010 IEEE The technology to capture such user information becomes instrumental for the deployment of context-aware services. While detecting the presence of the user in a specific location may require location capabilities from the access network, a global positioning system (GPS) on the user terminal, or even a radio frequency identification (RFID) tag carried by the user, aspects like the emotion or current activity of the user are more difficult to capture or detect. On top of that, even if the context of the user can be properly detected, the sensor may be deployed in a given location or area (e.g., an enterprise building), and the context awareness of the service can only be obtained for that area in which the user information can be detected. These issues become important barriers to the successful deployment of commercial consumer context-aware services by telco operators, since when targeting the mass market global coverage for the services is required. The existing implementations of contextaware services are in several cases limited to laboratory environments or small areas [2]. Information about the user context is usually processed by a service platform where the context-aware service is executed [3]. This platform is connected to the user context sensing device. Accordingly, in these scenarios a tight coupling exists between the application and the sensors. That is typically known as a vertical service layer architecture in which all information required for the service execution is obtained by and processed at the service execution platform, and no sharing of user context information exists among the different context-aware service platforms. The telco operators have a relevant role on such activities, especially the convergent operators (i.e., those operators that own both fixed and mobile networks). This is due to the fact that contextual services deployed by convergent operators can efficiently make use of both fixed and mobile access networks to process the user information obtained by contextual sensors. Such diversity of the access network means a significant increase in coverage of the contextaware service. Hosting the context-aware platforms at the IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page telco operator service layer also offers advantages thanks to the sharing of user context information among different services. Therefore, the captured contextual information can be reused by any existing application in a horizontal way. This means that the contextual information is highly exploited across multiple applications. Based on such objectives as horizontality of the contextual information across the service layer and the coverage range of the contextaware services, a telco contextual architecture is presented in this article. This architecture uses the capabilities provided by the IP multimedia subsystem (IMS) convergent control layer specified by Third Generation Partnership Project (3GPP) [4]. Details about the architecture design, protocols used, and a first service implemented and deployed taking advantage of such capabilities are also described. Different alternatives and options chosen are provided, as well as details of an implementation project of a context-aware service. The article closes with lessons learnt and conclusions. IMS-BASED ARCHITECTURE: CONTEXT ENABLER Worldwide operators are currently evolving toward network convergence as well as horizontal architectures of their service layers. Such evolution is driven by cost reduction and quality of service (QoS) objectives, and is based on the technology of IMS, whose main protocol is Session Initiation Protocol (SIP), specified by the Internet Engineering Task Force (IETF) in Request for Comments (RFC) 3261, which provides interworking capabilities with different types of access networks. Apart from other key advantages oriented to security, authorization, accounting, and authentication (AAA), QoS, and so on, IMS is a suitable framework to deploy the elements required to handle the information about user context. In IMS terminology, this is precisely the concept called enabler [5]. An enabler is an element of the service layer accessed through IMS. It is not a service itself, but an entity whose objective is to provide additional information to the existing services or applications at the service layer. An example is the presence server [6], specified by the Open Mobile Alliance (OMA). The presence server stores and manages the presence information of the end users, and provides presence information to any entity of the service layer that may request it (with appropriate permissions). Signaling exchanged between IMS enablers and application servers located at the service layer is based on SIP SUBSCRIBE/NOTIFY methods, which provide a flexible and robust procedure for the services to subscribe to the updates of information handled by the enabler. Therefore, a context enabler, handling information about the context of the user coming from different sensors, fits perfectly in the IMS standard architecture as opposed to the vertical approach, in which each and every service will handle the user context information in a sepa- Application servers IEEE BEMaGS F Enablers Etc Presence Context IMS Access network 1 Access network 2 Figure 1. Target network architecture based on IMS, interoperable with different access networks. rate way. In addition, the timing to introduce such elements into the operator service domains is appropriate, given that services compatible with the IMS control layer are becoming commercial realities in the short or mid-term, and such integration activities among different service platforms are currently taking place. The IMS-based architecture with the context enabler is presented in Fig. 1. The main advantages of such anarchitecture are the following: Ubiquity of context-aware service: It can be provided to the user regardless of geographical location and type of device. This advantage is based on the interoperability capabilities of the IMS control layer. IMS interoperability [7] with WiFi, cellular (3.5G, 3G, 2.5G), or fixed access networks guarantees that any type of sensor used to capture the user context or situation will be able to notify the context enabler of such information for its storage and processing. Enrichment of the contextual information: The possibility of connecting a higher number of sources of context information to the context enabler will make the context information stored at it more robust [8]. Different types of sensors capturing different types of information (presence, activity, battery level, noise level, etc.) will provide more accurate information about the user. Horizontal service layer: The fact that the context information is stored at a single logical point at the service layer enables complete sharing of the context information across all service layer application servers. In order to achieve that, services need to get subscribed to the context enabler for updates of the specific user context. The context information storage will be a cluster of servers that will meet all requirements IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 35 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F of the project, and have driven many of the implementation and design decisions. Presence DESIGN PHASE SIP IMS PLMS PSTN OBG PRI IP PRI CTI PBX Figure 2. Designed architecture to implement, with the presence server and OBG element. Both the mobile and fixed communications domains are depicted. of scalability and fault tolerance. Such information collection makes the development of contextual applications quicker and cheaper. DESIGN AND IMPLEMENTATION PHASES OF THE ARCHITECTURE Context-aware services are suitable for different market segments. However, the specific case presented in this article is oriented to enterprise users, with the following characteristics: • End users (enterprise employees) usually have different types of phones: corporate mobile phone, office fixed desk phone, and in some cases a corporate PC softphone application. • Enterprise users are more tolerant of learning curves and configuration of services than the residential market. • Specific development costs can eventually be supported by the enterprise customer if that means a significant enhancement of the telecom service obtained by the enterprise. Several parameters are considered critical during design, implementation, and deployment of services for enterprise segment. Those are time to market, interoperability of the different architectural elements, and development costs. These key parameters have been the main focus 36 Communications IEEE During the design phase the enterprise telecom system is analyzed. The global architecture is depicted in Fig. 2, including both the mobile and fixed domains, with the separate access networks, public land mobile network (PLMN) and public switched telephony network (PSTN). The corporate fixed communications are based on customer premises equipment (CPE), which is the private branch exchange (PBX) located at the premises of each enterprise, but owned and operated by the telco operator. There are a number of corporate fixed lines (extensions) connected to the PBX, typically one fixed line per end user. The PBX will route the incoming/outgoing calls through the external connection, IP-based or via a primary rate interface (PRI) connection to the PSTN. In addition, the PBX will also provide a number of enterprise communication services that are not usually available to residential and consumer subscribers, such as call reject, call hold and retrieve, call diversion, call transfer, and some others. PC-based softphones may also get external access through the PBX. Eventually, a large corporation may decide to manage their internal communications. In that scenario the enterprise still requires a PBX with external access provided by a telco operator, so the system implementation is exactly the same as if the internal communications were also operated by an external telco operator. An additional element, the operator business gateway (OBG), is also included in the architecture. This element is justified in the implementation phase. The corporate mobile communications are based on a contract with the mobile telecom operator, which provides mobile numbering translation services when calls are made between mobile phones of the same corporation (using a short numbering scheme), in addition to others very similar to the ones provided by the PBX on the fixed side. Such services are usually provided via intelligent network protocols from the service layer at the mobile network. In order to capture information on the situation of a user from a fixed phone, a trigger is implemented at the PBX. That trigger converts the PBX in the actual context sensing device, and generates a signaling notification upon any event that takes place at the PBX for a given extension. An incoming call, outgoing call, call end, call cancel, and so on will generate a notification from the PBX to an external monitoring application. In the presented design that event notification is carried over a computer telephony interface (CTI) protocol supported by the PBX, which is oriented to report specific telephony events. Although there are other choices, the option selected is the Computer Supported Telecommunications Applications (CSTA) PhaseIII protocol, specified by the European Computer Manufacturers Association (ECMA) [9], supported by (or on the roadmap of) many PBX manufacturers. This protocol consists of a complete call control signaling specification, imple- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE mented through a set of XML commands whose format is defined by ECMA, carried on two possible transport options, SIP or Simple Object Access Protocol (SOAP)/HTTP. In addition, the PBX may also receive telephony commands from external computing functions over CSTA PhaseIII (release an ongoing call, reject an incoming call, establish a call to a specific destination, etc.). The CSTA PhaseIII XML message sent to the PBX to clear a specific connection (a voice call) is the following. <?xml version=”1.0” encoding=”UTF-8”?> <ClearConnection xmlns=”http://www. ecma-international.org/standards/ecma323/csta/ed3”> <connectionToBeCleared> <callID>123456789</callID> <deviceID> tel:+34913374005 </deviceID> </connectionToBeCleared> </ClearConnection> The CSTA PhaseIII events generated from the PBX to an external entity are information about the context of the user. The procedure to capture similar context information at the mobile network side is the presence and registration status management of the mobile cellular networks, a capability already available in commercial mobile networks. Such capability can provide updated information about the location, registration status, and availability of cellular devices. In our mobile network the location and registration information is stored at the home location register (HLR) of the home network of the mobile device, and is updated during registration procedures via SS7 signaling protocols. The registration information is sent from the mobile network to the convergent service layer via a SIP interface, through a protocol gateway deployed at the mobile network. The objective is to route all such contextual information to a context enabler located at the convergent service layer, accessible from both fixed and mobile service layers. However, the development of a context enabler platform was not considered within the timeframe of the project due to the availability of existing elements already deployed in the operator service layer which can cover that need. The simplicity of the context model to be followed (presented below) made it clear that having a dedicated platform for context management was suboptimum given the time to market objectives. The development of a complete context management enabler became a parallel working direction with different time constraints. The existing platform where the available context of the user will be located is the OMA presence server. Context information will be routed to the presence server, and the context of the user will be stored as a parallel presence status. IMPLEMENTATION PHASE A very important feature of the system on the fixed side is the wide geographical distribution of the PBXs. There is a PBX in each customer premises (enterprises with several distributed premises), meaning a big number of PBXs in a wide geographical area (1000+ PBXs deployed in several cities). There may also be enterprise customers with a much smaller geographical distribution (or no distribution at all). That is a critical aspect for the transport network. Initially, global connectivity over a SIP overlay was considered. However, given the geographical distribution of the network elements and the different network domains the signaling needs to traverse (in some cases operated by the enterprise customer itself), a transport protocol with better interoperability and connectivity characteristics was finally considered. Based on this, the CSTA PhaseIII transport option chosen is HTTP/SOAP. Given that after preliminary laboratory testing the estimated link bandwidth consumption imposed by this signaling load is minimum (on the order of hundreds of kilobits per second), the best option available was to use the data link purchased by enterprise customers at each premises to get external data connection. In those premises where the external data access is heavy loaded, additional digital subscriber line (xDSL) access may be deployed (possible but unlikely). Another key aspect that affected the implementation even more than the geographical distribution is the diversity of PBX manufacturers. There will be several PBX manufacturers involved (initially two manufacturers were involved, but additional ones may be included in order to offer these services to all enterprise customers). Getting all manufacturers involved to implement a coherent CSTA PhaseIII protocol with the same behavior of PBXs in a robust way was an unrealistic approach. PBXs from different manufacturers would have different implementations of CSTA PhaseIII, which would make it impossible to get all the systems working properly with tight time-to-market constraints. Different manufacturers would mean different CSTA PhaseIII flavors. This implementation issue affected the architecture itself, calling for the definition of an additional element, the OBG, whose mission is to solve the inter-PBX vendor compatibility problem. The function of the OBG is to act as a single entry point of contextual signaling traffic from all the PBXs. All the particularities of different PBX manufacturers would be considered at that element, and the OBG would perform adaptations from the different CSTA PhaseIII flavors from different PBX manufacturers into a CSTA PhaseIII implementation that is standard and stable within the operator service layer domain. So the OBG would deal with the interoperability aspects among the different interface implementations from the variety of PBX manufacturers. The drawback of including this new element in the architecture is mainly the significant increase in the development costs of the project. However, such protocol adaptation in the end decreased the operational costs significantly. So it was proven to be the right decision also in terms of global costs. This is one of the main project conclusions presented below. Finally, it is worth clarifying that, since the OBG has been defined as a single entry point for CSTA PhaseIII signaling from the PBXs, it is IEEE BEMaGS F Different manufacturers would mean different CSTA PhaseIII flavors. This implementation issue affected the architecture itself, calling for the definition of an additional element, namely the OBG, whose mission is to solve the inter-PBX vendor compatibility problem. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 37 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page The delay observed for a single CSTA PhaseIII signaling transaction from PBX to the hosted service is in the order of 100 ms. For a complete scenario in which a call is routed and the presence status is updated, the whole delay is in the order of 500 ms. a network element located at the operator service layer. Accordingly, the interface between the OBG and the context enabler, as well as with any other service, will be an operator network protocol. Given that this is a convergent architecture based on an IMS core network, it was quickly considered to implement such an interface over a SIP transport protocol. This would make any later integration between the OBG and additional services much easier. Since SIP is chosen for the interface between the OBG and the context enabler, the CSTA PhaseIII messages received from the PBXs over HTTP/SOAP will be parsed by the OBG and adapted to standard CSTA PhaseIII over SIP (uaCSTA), screening any particularity of the PBX manufacturer implementation. The final XML CSTA PhaseIII message is then embedded in the body of a SIP INFO method, as stated by the uaCSTA PhaseIII specification [10]. The CSTA PhaseIII XML message is the same regardless of the transport protocol (SIP or HTTP/SOAP). INTEROPERABILITY TESTING Both the selection of SOAP as the protocol for the CSTA PhaseIII message transfers and the inclusion of OBG in the architecture respond to the objective of improving interoperability with minimum development. So interoperability testing was an important phase before commercial rollout. Again, to optimize time to market, an agile development mechanism [11] is followed. Short development cycles are implemented (1–2 mo), and different levels of interoperability testing were performed at the end of each development cycle. PBX Level — A project structure based on sequential functional iterations is followed jointly by the PBX manufacturers and the operator. Periodically, the manufacturer releases a set of functionality, and signaling compliance is validated by the operator via a simulator [12] that can be quickly adapted to the special implementation of each PBX manufacturer. OBG Level — The OBG element also needs to be validated. The same procedure as with the PBX manufacturers is followed. The engineering simulation tool is also used in this interoperability testing. End-to-End Level — Finally, all elements are installed in a laboratory environment with real phones and fixed PBX extensions. Some interoperability issues are still identified, but this phase is mostly a functional validation by the operator. THE SERVICE USE CASE DEPLOYED: CONTEXT-AWARE CALL ROUTING SERVICE There is currently no known (as far as we are concerned) commercially deployed convergent service that is able to route incoming calls to corporate lines (PC, mobile or a fixed deskphone) to the appropriate destination based on a specific situation (e.g., context) of the employees associated with the corporate lines. 38 Communications IEEE A BEMaGS F The flexibility of the architecture presented in the previous sections is demonstrated with the intelligent routing service presented in this section. The basic use case of the service is presented in Fig. 3, in which an incoming call arrives to the PBX targeting an employee subscribed to the intelligent routing service [13]. In Fig. 3, when a call arrives to the PBX from the PSTN, the PBX temporarily stops the call progress and sends a CSTA PhaseIII event to the OBG, requesting a route for the call (CSTA_RouteRequest). The trigger to the hosted service is executed by the PBX before a call is routed to the destination extension, taking into account that incoming calls can also originate from another internal extension of the PBX. The OBG performs the protocol adaptations required based on the PBX manufacturer and sends the request for a route to the intelligent routing service by including the same RouteRequest XML over a SIP INFO method. The intelligent routing service has a specific business logic implemented to select the destination of the call. That service logic includes, at a high level, checking a list of prioritized destinations and the situation of each one by querying the IMS presence server or additional information repositories like corporate calendar services. If the destination user is online at any of his/her phone devices, the service selects that destination and responds to the OBG with a command (CSTA_RouteSelect) including the destination for the pending call. Again, the OBG performs protocol adaptations as required, and sends to the PBX the selected route for the call that is waiting to be delivered. This selected destination may be a fixed extension (connected to the PBX or to another PBX) or a mobile extension. If it is a mobile destination, the PBX will then need to forward the call through the public mobile network. The selected destination might even be a PC-based softphone that the PBX can reach through the corporate private network. Once the call is successfully established, the context enabler is updated with the new user context, again via CSTA PhaseIII notification. Similar services can be designed, using the contextual information stored at the presence server (or a dedicated context enabler platform), making use of the architectural mechanisms deployed. In terms of performance figures, the delay observed for a single CSTA PhaseIII signaling transaction from PBX to the hosted service is on the order of 100 ms. For a complete scenario in which a call is routed and the presence status is updated, the whole delay is on the order of 500 ms. Both values are consistent with the figures observed in a laboratory environment, with very small variance values. However, much stronger performance testing is required in a later deployment phase, as the current number of customers is still growing. LESSONS LEARNED During the design of the architecture and the deployment, several lessons can be identified to consider in future developments with similar IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Public network PBX OBG Intelligent routing service IMS Presence server F Due to the limited complexity of the first service that will INCOMING CALL use the contextual Stop call information stored at [WSCSTA]: Incoming call Event the Presence Server, the number of [uaCSTA]: Incoming call Event possible context [uaCSTA]: Incoming call Event statuses is small. The range of values Contextual service logic [SIP]: SUBSCRIBE might be increased [SIP]: NOTIFY for other contextual services with little effort. [uaCSTA]: Selected Destination [uaCSTA]: Selected Destination [WSCSTA]: Selected Destination Call routing [WSCSTA]: New Context Status [uaCSTA]: New Status [uaCSTA]: New Status Context update Figure 3. Signaling flow for the intelligent routing service, based on the contextual architecture presented. purposes. The capabilities and protocols supported by the different PBX manufacturers are very diverse. That happens in any context-aware system deployed by telco operators. The types and sources of user context are also very diverse, and interoperability and protocol adaptations are required. During the analysis phase, it was clear that the number of protocols used within the operator network should be minimized to avoid interoperability issues. Since the control layer at the operator network is IMS, the protocol used within both that domain and the service layer is SIP. This means a simplification of the transport network configuration at the operator network. If a different/additional protocol is to be used, it would require modifications of the traffic flows and verifications of connectivity across existing firewalls. From an operational perspective that would mean huge problems. The transport protocol chosen to carry the information from PBX to the operator network is SOAP/HTTP. This option is selected as opposed to SIP because of the simplicity of the initial deployment and subsequent upgrades or maintenance tasks. The data networks deployed to connect customer premises with the operator are not usually prepared to support SIP without significant configuration updates. Due to the limited complexity of the first service that will use the contextual information stored at the presence server, the number of possible context statuses is small. The range of values might be increased for other contextual services with little effort. An additional element to develop was a single entry point into the operator network that provides signaling adaptation into a secure and standard protocol. The benefits for the testing phase, the isolation of PBX vendor-specific issues, and the subsequent securization of operator service layer generated project benefits that justified the associated development cost. CONCLUSIONS AND FUTURE WORK In this work an architecture to handle the context information of telco users is presented. This information is sent from the different access networks to a context server (enabler) hosted at the operator service layer. Due to time to market reasons, the context management server is collocated with the OMA presence server. This proposed architecture is designed to be future-proof and flexible to allow other services to take advantage of the user context informa- IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 39 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page This proposed architecture is designed to be future-proof, and flexible to allow other services to take advantage of the user context information, becoming with small development costs context-aware tion, becoming with small development costs context-aware services. In order to do that, the signaling protocols within the operator service layer are properly selected. A context-aware convergent service is designed with this architecture. The objective of the service is intelligent context-aware incoming call routing for a corporate telephony network (both fixed and mobile). The future lines of work are twofold: • Design and integrate new services into this architecture, enhancing the added value of the operator commercial portfolio. • Develop a dedicated context management platform where specific and more complex information processing algorithms may be implemented, including context semantic processing and user profiling, among others. services. REFERENCES [1] D. Saha and A. Mukherjee, “Pervasive Computing: A Paradigm for the 21st Century,” Computer, vol. 36, no. 3, Mar. 2003, pp. 25–31. [2] J. Sun, Z.-H. Wu, and G. Pan, “Context-aware Smart Car: From Model to Prototype,” J. Zhejiang Univ. — Science A, vol. 10, no. 7, July 2009, pp. 1049–59. [3] M. Baldauf, S. Dustdar, and F. Rosenberg, “A Survey on Context-aware Systems,” Int’l. J. Ad Hoc Ubiquitous Comp., June 2007, pp. 263–77. [4] 3GPP TS 23.228 “IP Multimedia Subsystem (IMS): Stage 2”; http://www.3gpp.org [5] H. van Kranenburg et al., “A Context Management Framework for Supporting Context-aware Distributed Applications,” IEEE Commun. Mag., vol. 44, no. 8, Aug. 2006, pp. 67–74. [6] C. Chi et al., “IMS Presence Server: Traffic Analysis and Performance Modeling,” IEEE Int’l. Conf. Net. Protocols, Oct. 19–22, 2008, pp. 63–72. [7] M. Schmidt et al., “IMS Interoperability and Conformance Aspects,” IEEE Commun. Mag., vol. 45, no. 3, Mar. 2007, pp. 138–42. [8] S. Arbanowski et al., “I-centric Communications: Personalization, Ambient Awareness, and Adaptability for 40 Communications IEEE A BEMaGS F Future Mobile Services,” IEEE Commun. Mag., vol. 42, no. 9, Sept. 2004, pp. 63–69. [9] ECMA Standard 348 “Web Services Description Language (WSDL) for CSTA Phase III,” June 2009. [10] ECMA Tech. Rep. TR/87, “Using CSTA for SIP Phone User Agents (uaCSTA),” June 2004. [11] M. Fowler and J. Highsmith, “The Agile Manifesto,” Aug. 2001; http://agilemanifesto.org/ [12] J. M. González, A. Cadenas, and O. Solá, “Adaptation Middleware to Enable Presence and Call Control for Corporate Fixed Lines: Evolution to Convergent Network over IMS,” NGNM ‘08, Sept. 2008. [13] A. Cadenas et al., “Distributed PBX Gateways to Enable the Hosted Enterprise Services Architecture in a NGN Scenario,” 1st ITU-T Kaleidoscope Academic Conf., May 12–13, 2008, pp. 203–10. BIOGRAPHIES ALEJANDRO CADENAS [M] (cadenas@tid.es) _________ is currently a project manager in Telefónica Research and Development, focusing on IMS, NGN, and innovation in end-user services, network evolution of the operator infrastructure toward user-centric services, context-aware hosted services, and protocol adaptations. Previously he was a senior systems engineer in Motorola Inc. for several years workingon network design and IMS control layer design. He is a Ph.D. candidate researching convergent contex-aware architectures and interoperation with telco services. ANTONIO SANCHEZ-ESGUEVILLAS [SM] (a.sanchez-esguevillas@ _____________ ieee.org) has managed innovation at Telefónica (both corporate and R&D), Spain. He is also an adjunct professor at the University of Valladolid. His research interests relate to services and applications. He is an Editorial Board member of IEEE Communications Magazine and IEEE Network, founder and Chairman of the IEEE Technology Management Council Chapter Spain, guest editor of IEEE Wireless Communications, IEEE Communications Magazine, and IEEE Network, and has served on the TPCs of ICC, GLOBECOM, PIMRC, WCNC, HealthCom, CCNC, and VTC. BELÉN CARRO (belcar@tel.uva.es) __________ is an associate professor at the University of Valladolid, where she is director of the Communication and Information Technologies (CIT) laboratory. Her research interests are in the areas of service engineering, IP broadband communications, NGN and voice over IP, and quality of service. She has extensive research publications experience as author, reviewer, and editor. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F __________________________________________ Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F TOPICS IN DESIGN & IMPLEMENTATION The Design and Implementation of Architectural Components for the Integration of the IP Multimedia Subsystem and Wireless Sensor Networks May El Barachi, University of Quebec Arif Kadiwal, Nuance Communications Roch Glitho, University of Quebec and Concordia University Ferhat Khendek, Concordia University Rachida Dssouli, Concordia University and United Arab Emirates University This article is an extended version of the article presented at IEEE VTC 2009-Spring under the title of “The Design and Implementation of a Gateway for IP Multimedia Subsystem/Wireless Sensor Networks Interworking.” 42 Communications IEEE ABSTRACT INTRODUCTION The IP multimedia subsystem is becoming the de facto standard for IP-based multimedia services, while wireless sensor networks are gaining in popularity due to their ability to capture a rich set of contextual information. Integrating the sensing capabilities of WSNs in the IMS can open the door to a wide range of context-aware applications in areas such as wireless healthcare and pervasive gaming. We have previously proposed a presence-based architecture for WSN/IMS integration. This architecture relies on two key components: a WSN/IMS gateway acting as an interworking unit between WSNs and the IMS; and an extended presence server serving as a context information management node in the core network. In this article we focus on the design and implementation of these two components. Furthermore, two applications (a pervasive game and a personalized call control application) are used to concretely show how new applications can be developed using our architecture. Performance has also been evaluated. Several important findings were made in the course of this work; one is that the IMS integration with a large and evolving variety of WSNs may be a never-ending endeavor — the gateway requiring constant upgrading due to the lack of standard APIs for the interaction with sensors produced by different vendors. Another finding is that while the introduction of context as an application building block in the IMS ensures the availability of additional contextual information in the network and enables fast and easy development of context-aware applications, the lack of mature IMS application development toolkits remains a roadblock. The Third Generation Partnership Project (3GPP)-defined IP multimedia subsystem (IMS) is becoming the de facto standard for IP-based multimedia services [1]. It consists of an overlay control and service layer that is deployed on top of IP-based mobile and fixed networks in order to enable the seamless provisioning of IP multimedia services to end users. Wireless sensor networks (WSNs) are formed by a set of distributed sensor nodes that collaborate to monitor physical, environmental, and physiological conditions [2]. Such networks are increasingly popular because they can capture a rich set of contextual information that can be used for a wide range of applications. Context awareness is the ability to use contextual information to provide relevant information and/or services to users. By integrating the sensing capabilities of WSNs in the IMS, a rich set of contextual information can be exploited to provide new and personalized multimedia services to IMS users. Examples of such services include wireless healthcare applications monitoring and interpreting patients’ physiological data and offering them personalized medical assistance for problematic health conditions; pervasive games involving interaction with physical/virtual objects and characters, and using the game context to adapt the players experience; and lifestyle assistance applications making use of users’ situational information to assist them in their daily activities (e.g., training and shopping). We have previously proposed a presencebased architecture for WSN/IMS integration. This article focuses on the design and implemen- 0163-6804/10/$25.00 © 2010 IEEE IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE WSNs Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page WSN/IMS Gateway (PEA) Proprietary sensors interfaces Pexb (Internal) defined in the 3GPP architecture. One of Presentity presence proxy ISC P-CSCF F types of PAs are IMS core entities (e.g. CSCFs) Pwp Pexa BEMaGS We note that several Pwn Extended PS (AS) A Watcher presence proxy these types is the Presence External S-CSCF I-CSCF S-CSCF Agent (PEA) P-CSCF responsible of Pw = Mw Pw = ISC Pw = Gm publishing information provided HSS IMS AS (E.g. GS) IMS user applications by external entities/networks about the user. Figure 1. The WSN/IMS integrated architecture. tation of the key components of our architecture, and illustrates how applications (leveraging its capabilities) can be built, using two concrete examples. Furthermore, the article presents the results of the performance evaluation we conducted using one of the developed applications, and reports on what we learned from this project. The next section gives an overview of the previously proposed architecture. In the following section, the architectural components’ design is presented. This is followed by a description of the prototype implementation and proof-of-concept applications. We then present the performance evaluation. The last section ends the article with a discussion of related work and the lessons learned. AN OVERVIEW OF THE WSN/IMS INTEGRATED ARCHITECTURE Figure 1 depicts the architecture we proposed in [3] to enable the integration of WSNs in the IMS. This architecture is an extension of the 3GPP presence architecture, which focuses on the management and dissemination of user presence information (a subset of context information) within the network. The 3GPP presence architecture relies on five main functional entities: presence agents (PAs), which make information available to the network in a standard format and via standard interfaces; the presence server (PS), responsible for the management of information published by agents; the presence list server, responsible for group list management; presence proxies, acting as inbound/outbound proxies to the presence network by performing routing, security, and charging functions, and whose roles are assumed by call session control functions (CSCFs); and watchers, acting as information consumers. We note that several types of PAs are defined in the 3GPP architecture. One of these types is the presence external agent (PEA), responsible for publishing information provided by external entities/networks about the user. To achieve WSN/IMS integration, we assigned the role of PEA to the WSN/IMS gateway, which will publish information captured by WSNs (after proper processing/formatting) to an extended presence server (capable of managing the different types of information provided) via a trusted node (a presence proxy) over the Pexa interface. In addition to the indirect interactions over the Pexa interface, the WSN/IMS gateway directly interacts with the PS over the Pexb interface for the management of subscription policies (enabling information access control). We note that the WSN/IMS gateway can be considered specialized user equipment, only used for the management and publication of sensory information in the 3G network. Other entities such as IMS application servers (e.g., game servers) and IMS user applications can access the information managed by the PS via presence proxies using the Pw interface (corresponding to the IMS service control [ISC] and Gm interfaces), while IMS core network entities acting as watchers (e.g., CSCFs) can directly access this information using the newly defined Pwn intra-operator interface (without triggering the generation of charging records). It should be noted that the XML Configuration Access Protocol (XCAP) [4] is used over the Pexb interface, while an optimized version of the SIMPLE protocol [5] is used over the Pex a , Pw, and Pw n interfaces. To enable the management and dissemination of the collected sensory information, we proposed an extension of the standard presence information model (i.e., the presence information data format [PIDF]) in order to allow the representation of the additional types of information captured by WSNs (i.e., spatial, physiological, and environmental data) in a standard format, while allowing the distinction between the different types of entities to which the information relates, as follows: To allow the encapsulation of physiological and environmental data within a presence document, two new subelements (physiologicalData and environmentalData) were added to the existing tuple element. Each of these subelements was further divided into other subelements. For instance, the IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 43 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F The abstraction layer is responsible for Abstraction layer Info management functions conveying the Info rep. information captured by WSNs to the IMS, after the proper Info acquisition module Processed WSN info Data model rep. XML formatter - PIDF - Mapping table processing and formatting. This layer Policies rep. consists of two types of functions (i.e., information Extended PEA management functions and Support functions Trigger handler Publisher Events monitor Registration and security ISIM app. Capabilities publication - Subscription authorization policies - Publication policies Information access control support functions). WSN interface 3G interface Connectivity layer Figure 2. The WSN/IMS gateway architecture. complex element environmentalData is divided into ambientTemperature, soundLevel, lightIntensity, and relativeHumidity subelements, in addition to a qualityInfo subelement and any number of extension subelements. For spatial information we leveraged the existing GEOPRIV extension data element (specified in RFC 5491) for its representation, and extended one of its child elements (civicLoc) with refined location information such as room ID, displacement direction, and relative distance to other. Finally, to enable the distinction between different types of entities (i.e., person, object, place, or network) to which the information may relate, we added two new mandatory attributes, entityType and entityDescription, to the existing presence element. In our architecture, three information publication models were employed to enable flexible and resource-efficient information exchange within the network: interval-based publications, in which information is published at regular time intervals; event-based publications, in which information is published when certain events are detected; and trigger-based publications, in which information is published upon receipt of a publication trigger from the PS. ARCHITECTURAL COMPONENTS’ DESIGN As shown in the previous section, our architecture relies on two main components in its operation: the WSN/IMS gateway and the extended presence server. In the subsequent subsections, we describe the designs of these two components. 44 Communications IEEE THE WSN/IMS GATEWAY ARCHITECTURE The WSN/IMS gateway plays a key role in our architecture by acting as an intermediary between WSNs and the 3G network. Figure 2 depicts the proposed gateway architecture, which consists of two layers: a connectivity layer and an abstraction layer. The connectivity layer includes a dual networking interface, ensuring connectivity to both WSNs and the 3G network. The abstraction layer is responsible for conveying the information captured by WSNs to the IMS, after the proper processing and formatting. This layer consists of two types of functions (i.e., information management functions and support functions) that are described in detail in the coming subsections. The Support Functions — The support functions are realized by the following modules: the registration/security module, capability publication module, and information access control module. The registration/security module is the first module invoked when the gateway (GW) is put in service. It interacts with the ISIM application (contained in the gateway’s SIM card) to get the information required for IMS registration and security association establishment (e.g., public/private identities and the long-term secret), builds the first SIP REGISTER message, and interacts with the capabilities publication module that inserts the gateway capabilities information (e.g., the type of information provided by the GW) in the message body. The registration module then carries out the rest of the IMS registration procedure normally. After the registration phase, the information access control module communicates with the PS IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page to set the required subscription authorization policies (which are preconfigured in the GW’s policies repository). Those policies are used by the PS to install filters that determine which watchers are allowed to access the information related to a certain contextual entity, thus preserving information privacy. In addition to subscription policies, the GW’s policies repository also contains publication policies indicating the types of information that should be published at regular time intervals and the ones that are published based on events’ detection. The Information Management Functions — The information management functions are performed by a set of information acquisition modules, an XML formatter, an extended PEA, and three repositories. The first repository (the data model repository) contains the extended PIDF we defined as an information model and mapping tables correlating IMS entities’ IDs (identifying the entities whose information is being published in the IMS) to sensor IDs (identifying the sensors capturing information related to a certain entity), while the second (the information repository) contains the processed WSN information that is persistently stored in the GW for future publications. The third repository is the policies repository presented above. The information acquisition modules are specialized components that enable the interaction with various WSNs. There is one acquisition module per WSN type. Such a module is capable of extracting sensor-specific data from WSN messages, and preprocessing this information (by performing data fusion and consistency checking) before storing it in the GW’s information repository. When the WSN comes with a middleware (e.g., the one proposed in [6]), the module interacts with the middleware instead of interacting directly with the WSN. In this case less or no preprocessing may be required, depending on the middleware capabilities. The extended PEA represents the heart of the WSN GW. It publishes the WSNs’ information to the IMS, based on the publication policies defined in the GW. Two modes of publications are supported by the extended PEA: the proactive mode, in which information is actively published by the GW at regular time intervals or when certain events are detected; and the reactive mode, in which information is only published upon receipt of a trigger from the PS. These two modes of publication are realized by the PEA submodules as follows: Based on the publication policies, the publisher saves a list of information that should be proactively published at regular time intervals; following those intervals, it consults the information repository to retrieve the needed information, which is then passed to the XML formatter (if the information is not yet in the standard format). The XML formatter consults the IDs’ mapping tables and the extended PIDF in order to represent the processed information in a standard format, and then returns the resulting XML document to the publisher, which publishes it to the PS. Similarly, the events monitor saves a list of information to be proactively published upon detection of events (e.g., publish temperature when above - Extended PIDF - Contextual info - Info access policies XML/parser/ formatter Publication and Trigger subscription generator manager Notifier Events monitor IEEE BEMaGS F Info/policies repository Authentication and authorization module Presence service logic SIMPLE stack (SIP servlet API) Figure 3. The extended presence server architecture. 30°C), and keeps interacting with the information repository to detect the occurrence of those events. Once an event is detected, the events monitor interacts with the publisher, which will fetch the needed information and publish it (after proper formatting) to the PS. As for the trigger handler, it does not actively publish any information. However, once it receives a publication trigger (from the PS), it contacts the publisher, which will convey the needed information to the PS. THE EXTENDED PRESENCE SERVER ARCHITECTURE Figure 3 depicts the software architecture of the extended presence server serving as the context management node in our system. This architecture consists of protocol and service-related components. The protocol supported in this case is the SIMPLE protocol, which is accessible via the SIP servlets application programming interface (API). The service component consists of a presence service logic module implementing the logic of the PS engine. This module relies on several submodules in its operation: a publication/subscription manager that handles information publications and subscriptions from presence agents and information watchers; a notifier that creates and sends information notification messages based on received subscriptions (these notifications could be sent following regular time intervals or upon the detection of events); an events monitor that monitors the collected information and detects the occurrence of events that could possibly lead to information notifications; a trigger generator that generates publication triggers to prompt the publication of information that is missing or not fresh enough in the network; and an authentication and authorization module that is responsible for the authentication of publishers/ watchers and the enforcement of subscription authorization policies. It should be noted that these submodules rely on an XML parser/for- IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 45 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Extended PS (SIP servlet) SIP container WSN/IMS GW Server side of game (SIP servlet) Server side of SenseCall App. (SIP servlet) SIP / SIMPLE Emulated CSCF SIMPLE Diameter Emulated HSS SIP Game client (deployed on phone) and SenseCall client (deployed on laptop) UE Figure 4. The prototype components. matter for the extraction of information from received messages and for XML formatting of information to be inserted in newly created messages; and they rely on an information/policies repository for the storage of the extended PIDF (used as XML schema), the information access policies, and the contextual information that is persistently stored for future notifications. PROTOTYPE IMPLEMENTATION AND PROOF OF CONCEPT APPLICATIONS To build a proof-of-concept prototype of our architecture, we used Ericsson’s Service Development Studio (SDS) [7] as the implementation platform and extended the existing JAIN presence server [8] to fit our design. The WSN/IMS GW was implemented from scratch. Furthermore, to illustrate how new applications can be developed using the capabilities of our system, a pervasive game called Fruit Quest and a personalized call control application, Sense Call, were developed. In this section we start by giving a general description of these two applications, and then discuss the prototype architecture before presenting the setups used to test the application scenarios. PROOF OF CONCEPT APPLICATIONS Fruit Quest is a strategic pervasive game designed in our laboratory. In this game, players are assigned plantation zones, in addition to some virtual game objects (e.g., fruits, walls, bombs, and virtual money). WSNs are used to detect and convey the location of players and their presence in zones to the network. Players physically move between plantation zones within the game area, and as they move, they see the zones appearing on their terminals and get notifications about game events. They can also communicate with each other using IMS instant messaging. When players are in their plantation zones, they can plant fruits and add defensive walls for protection. When in rivals’ zones, players can pick fruits and attack the zones using bombs. When all defensive walls in a zone are destroyed, the zone can be occupied by rivals. When the time of the game ends, the player with the highest number of zones and fruits wins the game. 46 Communications IEEE A BEMaGS F Sense Call [9] is a personalized call control application previously developed in our laboratory as part of another project in which a webservice-based GW was used to enable applications’ interaction with sensors. This application monitors users’ locations and enables the automatic (pre-booked) establishment of a call between two colleagues when they are in their respective offices. To illustrate the capabilities of our system, Sense Call was remodeled and deployed in our WSN/IMS integrated environment. PROTOTYPE ARCHITECTURE The SDS is an Eclipse-based design and execution environment in which IMS applications can be designed, deployed, and tested. One of the features provided by SDS is an IMS simulated environment simulating CSCFs, a home subscriber server (HSS), and an application server acting as a container for the deployment of SIP servlet-based services. Figure 4 illustrates the different prototype components developed using the SDS platform. In the prototype the JAIN PS [8] (originally relying on a JAIN SIP stack for communication) was remodeled as a SIP servlet to enable its deployment in the SDS application server. Furthermore, the presence server’s XML schema was extended with the additional data elements, and its logic was enhanced with the publication trigger mechanism. The server side of the gaming application was implemented as a SIP servlet and deployed in the SDS application server, while the game clients were developed using the SDS IMS client platform and installed on P990 Sony Ericsson phones. The server side of Sense Call [9] (originally developed as a SIP-based standalone Java application) was remodeled as a SIP servlet and ported to SDS. Furthermore, the application logic was modified to communicate with the PS (instead of direct communication with the GW) to obtain the required information. In this prototype two types of sensors were used: MIT Cricket location sensors [10], accessible via the Cricket API; and the MTS300/Mica2 environmental sensor [11], accessible via the Crossbow API. As for the WSN/IMS GW, it was implemented as a Java-based extended presence agent relying on a Microsoft access database and a set of APIs (the JAIN SIP, Cricket, and Crossbow APIs) in its operation. All of the components of the GW were implemented, except for the capability publication and access control modules, which were omitted for simplicity. PROTOTYPE SETUPS AND TEST SCENARIOS As shown in Fig. 5a, the Fruit Quest game setup consisted of two laptops and three phones, forming a WLAN, in addition to a set of MIT Cricket location sensors [10]. The game clients ran on the phones, while one of the laptops represented the IMS simulated environment (including the game server) and the other laptop represented the WSN GW. The following interactions related to the pervasive gaming scenario were successfully tested: First, the WSN GW was registered in the IMS. Then three players, each carrying a phone with an attached Cricket listen- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page er, started moving between three game zones. Cricket beacons mounted to the ceiling were used in conjunction with the Cricket listeners attached to the phones to determine the location of the players. This information was conveyed (by Cricket software running on phones) to the WSN GW using TCP/IP communication. The GW monitored the information received, and when it determined that a player had moved to another game zone, it published this event (using a SIP PUBLISH message) to the extended PS, which notified (using a SIP NOTIFY message) the game server. This last then sent the appropriate game updates (based on the received information) to the game clients hosted by the players’ UE, which updated the game display. A similar setup was used for the Sense Call application, as depicted in Fig. 5b. In this case, the application clients were installed on two laptops, while the IMS simulated environment hosted the server side of the application. The following interactions were then successfully tested: First, the two clients were registered as IMS users, and the server side of the application was used to schedule a call between them. Next, the users, carrying their laptops (with attached Cricket listeners), started moving throughout the office space, and their location information was conveyed to the GW. Upon detection of a location change, the GW published this event (using a SIP PUBLISH message) to the PS, which notified the server side of the application (using a SIP NOTIFY message). When the application detected that two users were in their respective offices, it established a third-party controlled call between them by sending a SIP REFER message to one of the users’ UE. This last accepted the referral using a SIP 202 message, then sent a SIP INVITE message to UE2. When the call was established successfully, UE1 notified the Sense Call application about the result of the referral event. PERFORMANCE EVALUATION To evaluate the performance of our system, we used the Fruit Quest prototype to collect some measurements, focusing on the publication interactions (between the GW and the PS) and notification interactions (between the PS and the game server). Spatial (i.e., location) and environmental (i.e., light/temp) data was collected, and two performance metrics were used: the response time (in milliseconds) and the network load (in bytes). In addition to the sensors, the testbed consisted of the following: the GW, running on a Pentium 4/2.5 GHz laptop, with 512 Mbytes RAM and Windows XP. This laptop was connected with an MIB510 sink node, allowing it to communicate and collect data from sensor nodes — this data being monitored using a MoteView application installed on the laptop. A second laptop with a similar configuration (i.e., 1.6 GHz Intel Pentium Duo with 1 Gbyte RAM, running Windows XP) hosted the IMS simulated environment (the CSCFs, HSS, and extended PS), while a third laptop with an identical configuration hosted a second instance of the IMS environment in which the Fruit Quest game server WSN/IMS gateway 2. Event detected: game zone change IEEE BEMaGS F 4. NOTIFY (game_zone_ change event) 3. PUBLISH (game_zone_ change event) / 200 OK IMS simulated environment (CSCFs, HSS, extended PS, game server) Area 1 5. Game updates Area 3 Area 2 1. Update location 1. Update location User’s phone (with attached cricket listener) 1. Update location Cricket beacons User’s phone (with attached cricket listener) User’s phone (with attached cricket listener) (a) WSN/IMS gateway 2. Event detected: location change 4. NOTIFY (location_ change event) 3. PUBLISH (location_ change event) / 200 OK 5. Event detected two users in their offices IMS simulated environment (CSCFs, HSS, extended PS, SenseCall application server) 1. Update location 1. Update location 7. INVITE/ OK/ACK 6. REFER (refer_to: UE2; method=invite)/ 8. NOTIFY (refer_event) User’s laptop (with attached cricket listener) Room A Cricket beacons User’s laptop (with attached Room B cricket listener) (b) Figure 5. Prototype setups: a) Fruit Quest game setup; b) Sense Call application setup. was deployed. It should be noted that the game server’s logic was slightly modified (for testing purposes) to subscribe/accept environmental information from the PS, in addition to the location information it originally used. Furthermore, three Sony Ericsson P990 phones, with attached Cricket listeners and running the Symbian operating system and the IMS client platform (provided with SDS), hosted the game clients. Table 1 shows some of the measurements collected using this testbed. These values are average measurements over 20 trials. In the measurements displayed in Table 1, the response time for proactive publications is calculated at the GW level as the time duration between the moment when information is accessed by the GW’s publisher module (from the information repository) and the message is created/sent, until a successful publication response is received from the PS. For reactive publications, the response time (also measured at the GW level) is calculated from the moment a publication trigger (i.e., a SIP OPTIONS mes- IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 47 A BEMaGS F Communications IEEE Operation Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Scenario Response time (ms) Network load (bytes) Proactive-location information 205 1139 Proactive-environmental information 178 1067 Reactive-location information 228 2371 Reactive-environmental information 214 2300 Location information 224 1335 Environmental information 164 Publication Notification 1241 Table 1. Network load and response time measurements. sage) is received from the PS, acknowledged and responded to by a PUBLISH message, until a successful publication response is returned by the PS. As for notifications, the response time is measured at the PS, from the moment the information is internally accessed and the message is created/sent, until a successful notification response is received from the game server. Several types of comparative analysis were made by examining the collected measurements, two of which are presented here. The first analysis was made by comparing the performance of the two modes of publication for the same type of information (e.g., proactive location vs. reactive location), in order to calculate the overhead introduced in the case of the reactive mode. This overhead is caused by the exchange of an additional pair of SIP messages (i.e., OPTIONS and OK messages) to trigger the publication, and by the processing of the publication triggers contained in the OPTIONS message body. The average overhead, in terms of response time, ranges between 23 ms (for location info) and 36 ms (for environmental info) per operation, which can be considered non-significant, since its effect will barely be felt by the end user. The penalty in terms of network load is nevertheless significant (an increase of 1.2 kbytes/operation, for both types of information). However, this penalty will only be incurred occasionally since the reactive mode is a secondary mode of operation only used when the required contextual information is not available (or is not fresh enough) in the network. By comparing the performance of one mode of publication for two different types of information (e.g., proactive location vs. proactive environmental), we can see how the type of information exchanged can affect the performance. The same type of comparison can be made for notifications of different types of information. In general, we notice that the publications/notifications of environmental data achieve better response times and induce lighter loads 48 Communications IEEE A BEMaGS F than location-information-related interactions (e.g., a decrease of 27 ms and 72 bytes for proactive-environmental publication in comparison to proactive-location publication). This is because the number of XML fields/tags required to represent location information is larger than what is needed to model environmental data, thus requiring more time for XML formatting and generating bigger message payloads. The performance of location-information-related interactions could therefore be improved by using another modeling schema that requires a smaller number of tags for the representation of this type of information. RELATED WORK AND LESSONS LEARNED Several solutions have been proposed for the integration of WSNs in the Internet, while few others have investigated their integration with 3G networks. In this section, we discuss the solutions that are the most relevant to our work. The e-SENSE architecture [12] aims at making ambient intelligence available to beyond 3G networks to enhance their service provisioning capabilities. This solution focuses on information acquisition aspects by defining the protocol stack to be implemented by sensor nodes as well as a reference model for the WSN GW, but it does not address issues related to information management in the core network. Moreover, the proposed GW model is generic and does not take into consideration IMS-specific requirements for WSN/3G integration. TinyREST [13] and TinySIP [14] are solutions for WSN/Internet integration. Both solutions propose the use of application-level GWs to enable the exchange of information between WSNs and Internet clients. Although these solutions rely on standard IP protocols (i.e., HTTP and SIP), they employ standalone GWs that are built to be used directly by end users’ applications and cannot be integrated in the IMS to leverage its other capabilities. The same limitation applies to the web-service-based GW [9] previously developed in our laboratory. During the course of this project, we learned several important lessons. The first is that the introduction of a sensor GW and an extended PS in the IMS architecture enables the availability of additional contextual information in the network. For instance, in our prototype, two additional types of information were made available in the IMS: high-precision location information provided by Cricket sensors (e.g., the ID of a room in a building) — information that constitutes a refinement of the location information currently supported in mobile networks (mainly low-precision cell ID information); and environmental data provided by the MTS300/Mica2 environmental sensor — information that is currently unavailable in a standalone IMS. Additional types of information could also be supported by integrating other types of sensors, such as the Zephyr BioHarness system providing physiological and activity-related information. Another lesson we learned while implementing the GW is that the development of systems IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE that interact with heterogeneous sensors coming from different vendors is challenging. In our case, our WSN/IMS GW interacted with location and environmental sensors using two proprietary interaction mechanisms (i.e., the MIT Cricket API and the Crossbow platform), and had to map their sensor-specific data into an abstract format before transforming it into XML documents that are published using SIP in the 3G network. Therefore, the interaction with additional types of sensors would require modifications/additions to the GW logic (mainly the WSN interface and the information acquisition module) each time a new sensor type is considered. This is due to the lack of a unified standard API enabling interaction with various sensors. An initiative that may solve this issue is the Zigbee standard [15], which aims at achieving interoperability between sensor nodes as well as sensors and sinks, by defining a common protocol stack to be supported by all vendors. Currently, the Zigbee standard has specified the protocol layers up to the transport level — the application layer, however, remains to be defined. We should also note that the modularity of our GW design helps to minimize this impact by limiting to two the number of modules that will be affected (by the change of the targeted sensor). Another lesson related to the implementation of the extended presence server is that there are only a relatively small number of SIMPLE-based open source presence servers. In this project we chose the JAIN PS since it is easily extendible and is based on the popular JAIN SIP stack with which we were familiar from other projects. However, like the other open source servers, the JAIN server does not implement advanced presence functionalities such as partial publications/notifications and event notification filters. Furthermore, its design suffers from tight coupling between the presence server functionality and the SIP proxy/registrar functionalities, which are all bundled together. This resulted in duplicate functionality when this server was deployed in SDS. For example, IMS users had to be registered twice, once to the CSCF and again to the PS. In relation to applications development, we also learned that the introduction of context as an application building block in the IMS facilitates the development of novel context-aware value-added services. In fact, the functional separation between context management operations and the logic of the applications (using the contextual information) enables the reuse of common mechanisms and concepts by different applications, and abstracts developers from the complexities of context acquisition/management operations (e.g., the interaction with sensors using proprietary APIs, and the processing of the collected low-level information), thus speeding the application development process. This is evidenced by the fact that the initial version of the game, which was designed to directly communicate with sensors (in the initial phase of the project), required close to two weeks for the implementation of the logic related to sensory information acquisition from the Cricket sensors, with which we were not familiar. Additional time would have been required if we had to learn how to deal with other types of sensors. However, porting this application to our WSN/IMS integrated environment, by replacing the original information acquisition logic with standard SIMPLE-based interactions with the PS, only took us one day — with the observation that minimal effort would be required for the collection of additional types of information from the PS, since the same logic could be reused. Finally, the availability of IMS development toolkits is essential for the development and testing of IMS-related prototypes and applications. However, the choices of freely available toolkits are limited to Ericsson’s SDS and the open source IMS core (OSIMS) [16] developed by Focus. Unlike the OSIMS, which only offers some of the IMS core nodes (i.e., CSCFs and an HSS), SDS provides a more comprehensive design and test environment by also offering an integrated development environment, a set of service APIs facilitating the development of client/server side applications, an IMS terminal emulator, an automated testing framework, and a presence group management (PGM) module. Despite its attractive features, SDS does have some limitations, the first being its lack of extensibility. In fact, since this toolkit is not open source, it was not possible to extend its PGM module, which obliged us to use an external PS and remodel it according to the SIP servlet technology in order to deploy it in SDS. Furthermore, SDS did not support all the IMS functionalities we needed; for instance, implicit registration of identities was not supported by its provisioning environment. Finally, it is important to mention that the use of SDS requires basic knowledge of the IMS operation and offers a low level of abstraction in relation to its configuration, the provisioning of users, and the technology supported for the development of server-side applications (i.e., the SIP servlet technology). This is certainly a roadblock to speedy application development, independent of the type of applications involved. IEEE BEMaGS F It is important to mention that the use of SDS requires basic knowledge of the IMS operation and offers a low level of abstraction in relation to its configuration, the provisioning of users, and the technology supported for the development of server-side applications. REFERENCES [1] G. Camarillo and M. Garcia-Martin, The 3G IP Multimedia Subsystem, Wiley, Aug. 2004. [2] I. Akyildiz et al., “Wireless Sensor Networks: A Survey,” IEEE Commun. Mag., Aug. 2002. [3] M. El Barachi et al., “A Presence-Based Architecture for the Integration of the Sensing Capabilities of Wireless Sensor Networks in the IP Multimedia Subsystem,” IEEE WCNC ‘08, Las Vegas, NV, Mar. 2008. [4] J. Rosenberg, “The XML Configuration Access Protocol (XCAP),” IETF RFC 4825, May 2007. [5] SIMPLE Working Group, “SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE)”; http://www. ietf.org/html.charters/simple-charter.html [6] K. Aberer, M. Hauswirth, and A. Salehi, “A Middleware for Fast and Flexible Sensor Network Deployment,” 32nd Int’l. Conf. Very Large Databases, Seoul, Korea, 2006. [7] “Ericsson Service Development Studio 3.1 — Technical Product Description,” Feb. 2006; http://www.ericsson. com/mobilityworld/developerszonedown/downloads/ docs/ims_poc/SDS_technical_description.pdf _______________________ [8] JAIN-SIP-PRESENCE-PROXY; http://www-x.antd.nist.gov/ proj/iptel/nist-sip-downloads.html __________________ [9] T. Ta et al., “Using Web Services for Bridging End User Applications and Wireless Sensor Networks,” IEEE ISCC ‘06, Sardinia, Italy, June 2006. [10] A. Smith et al., “Tracking Moving Devices with the Cricket Location System,” MOBISYS, Boston, MA, 2004. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 49 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page IEEE F ROCH H. GLITHO [SM] holds a Ph.D. (Tekn.Dr.) in tele-informatics (Royal Institute of Technology, Stockholm, Sweden) and M.Sc. degrees in business economics (University of Grenoble, France), pure mathematics (University of Geneva, Switzerland), and computer science (University of Geneva). He works in Montreal, Canada, as associate professor at ETS, University of Quebec, and as adjunct associate professor at CIISE, Concordia University. He has held several senior technical positions (e.g., expert, senior specialist) at Ericsson Canada and Ericsson Sweden. He has also served as Editor-In-Chief of two IEEE Communications Society magazines: IEEE Communications Magazine and IEEE Communications Surveys & Tutorials. (http://www.ece.concor_____________ dia.ca/~glitho/) ________ BIOGRAPHIES FERHAT KHENDEK received a Bachelor’s degree in computer engineering, option software, from the University of TiziOuzou, Algeria, and M.Sc. and Ph.D. degrees in computer science from Université de Montréal. He is a professor with the Electrical and Computer Engineering Department of Concordia University. From 2001 to 2002, and from 2008 to 2009, he was a visiting researcher with Ericsson Research Canada in Montreal. He has published more than 120 refereed research papers in journals and conference proceedings. His research interests are mainly in the design, modeling, and analysis of real-time software systems, high service availability, and value-added service engineering for next-generation networks. ARIF VALI KADIWAL received a B.S. degree in computer engineering from Sir Syed University of Engineering and Technology, Pakistan, in 2003 and an M.S. degree in electrical and computer engineering from Concordia University in 2009. He worked at the Telecommunication Service Engineering Laboratory, a joint research laboratory between Ericsson and Concordia University, from 2007 to 2008. His work was concentrated in the area of the IP multimedia subsystem and wireless sensor networks. Communications BEMaGS [11] MTS300 Sensor; http://www.xbow.com/Products/ productsdetails.aspx?sid=75 _______________ [12] A. Gluhak et al., “e-SENSE Reference Model for Sensor Networks in B3G Mobile Communication Systems,” 15th IST Summit, 2006. [13] T. Luckenbach et al., “TinyREST: A Protocol for Integrating Sensor Networks into the Internet,” REALWSN ‘05, Sweden, 2005. [14] S. Krishnamurthy, “TinySIP: Providing Seamless Access to Sensor-based Services,” MOBIQUITOUS ‘06, San Jose, CA, 2006. [15] Zigbee Alliance, “Zigbee Specification 1.0,” June 2005; http://www.zigbee.org/en/index.asp [16] Open IMS Core; http://www.openimscore.org/ MAY EL BARACHI (elbar_m@ece.concordia.ca) _______________ holds a Ph.D. and a Master’s degree in electrical and computer engineering from Concordia University, Canada, and a Bachelor’s degree in electronics and telecommunications engineering from the Arab Academy for Science and Technology, Egypt. She carried out her Master’s and doctoral research as part of an industry/academia cooperation program established between Ericsson Research Canada and Concordia University. She was also part of the IST Ambient Networks project — a European Union (EU) 6th framework project. Presently, she is a postdoctoral fellow at the University of Quebec School of Superior Technology (ETS). Her current research interests include service engineering, quality of service and adaptive resource management, context awareness, virtual networks, and next-generation networks. 50 A R ACHIDA D SSOULI received a Doctorat d’Université degree in computer science from the Université Paul-Sabatier of Toulouse, France, in 1981, and a Ph.D. degree in computer science in 1987 from the University of Montréal. She is a professor with the Electrical and Computer Engineering Department of Concordia University and with the College of Information Technology of the United Arab Emirates University. She spent a sabbatical year (1995–1996) at Nortel and was a visiting professor at Abu Dhabi University, United Arab Emirates, from 2008 to 2009. Her research area is communication protocol engineering, requirements engineering, and multimedia applications. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Join ComSoc at 1/2 Year Rate! www.ieee.org/join Run Ahead of the Curve IEEE Communications Society Global Community of Communications Professionals Membership benefits society members enjoy include: IEEE Communications Magazine. Wireless Communication Engineering Technologies (WCET) Certification Program. ComSoc e-News issues. ComSoc Community Directory. member-only products. For free digital sample copy, go to http://ww2.comsoc.org/Digital-Sample ____________ ______________ Headquarters - New York, USA 3 Park Avenue, 17th Floor New York, NY 10016 USA Tel: +1 212 705 8900 Fax: +1 212 705 8999 society@comsoc.org, www.comsoc.org _________ Communications IEEE Singapore Office Fanny Su Beh Noi, Manager 59E Science Park Drive The Fleming, Singapore Science Park Singapore 118244 SINGAPORE Tel. +65 778 2873, Fax: +65 778 9723 f.su@ieee.org ______ China Office Ning Hua, Chief Representative Rm 1530, South Twr, Raycom Info Tech Park C. Haidian District Beijing, 100190, China Tel. +86 10 8286 2025, Fax: +86 10 8262 2135 n.hua@ieee.org _______ IEEE Member Services IEEE Operations Center 445 Hoes Lane, Piscataway, NJ 08854-4141 USA Tel: +1 800 678 IEEE (4333) Outside USA & Canada: +1 732 981 0060 Fax: +1 732 562 6380 member-services@ieee.org, www.ieee.org ___________ Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F TOPICS IN DESIGN & IMPLEMENTATION Broadband Internet in EU Countries: Limits to Growth Ryszard Struzak, National Institute of Telecommunications ABSTRACT This article provides an analysis of broadband Internet diffusion in 27 countries of the European Union. It proposes a simple model of its growth and identifies the theoretical growth limits in each country. Some aspects of the European i2010 project implementation are presented, discussed, and compared with the model. Comments on bottlenecks and major barriers in the broadband Internet diffusion process are also offered. The existing digital gaps are irreducible in some cases and will exist as long as the current development conditions continue. The approach and analysis method proposed here may be useful in examining limits of other services or in other regions during the planning, design, implementation, and performance tracking stages of existing or new services. INTRODUCTION Broadband Internet popularity is not uniform and there are significant gaps or divides among countries, regions, social groups, and so on. That popularity is often expressed in terms of the number of broadband access lines per 100 inhabitants, known as the penetration rate. The percentage of households with broadband Internet access and percentage of enterprises with such access are other metrics of the popularity. These disproportions (digital gaps) constitute an open issue for both developed and developing countries, and various projects have been initiated around the world to reduce them. The European Union (EU), for instance, has launched its i2010 project [1]. The EU is an economic and political union of 27 member states offering the free movement of people, goods, services, and capital. It represents about 500 million citizens and 22 percent of the gross world product. The EU countries differ significantly in size, development degree, and wealth. For instance, the gross domestic product purchasing power parity per capita (GDP PPP) is $81,200 in Luxembourg and $12,900 in Bulgaria. Large differences also exist between geographical regions and between social strata in some countries. The aim of the i2010 project is to complete the Single European Information Space. The target is a broadband penetration rate of 90 52 Communications IEEE 0163-6804/10/$25.00 © 2010 IEEE percent (uniform across the whole EU) by the year 2010 and higher percentages in later years [2]. The project is well advanced and statistical data indicate that every EU country has been progressing fast. In spite of that success, the gaps between countries still exist, and in some cases they have increased during the project lifetime. Will the gaps ever vanish? As the raw statistical data do not directly answer this intriguing question, this article proposes a simple approach that leads to a reasonable answer. The article is organized as follows. The next two sections present the approach used. A mathematical model is proposed to infer intrinsic limits of the penetration rates in various countries and user groups. Once the limits are known, it is straightforward to determine whether or not the gap between two given countries or user groups will vanish and to answer the question. The limits are calculated for each of the 27 EU countries, and compared with the actual penetration rate and the i2010 target. Some barriers to broadband diffusion are discussed. Efforts required to reach the i2010 target are evaluated and compared among countries to infer possible bottlenecks. For that purpose, two indices, the market index and effort index, are proposed. The article extends earlier work [3]. The presented approach is generic and may be applied to other regions outside the EU and to other services in the telecommunications space. It may be useful when assessing the business viability of a new or existing service, and when tracking the business performance of a service after deployment. MODELING From time immemorial, people have wanted to know the future. Earlier, they consulted oracles and magic omens, but today they use mathematical models that are based on data, which represent the process under consideration. Having the data, one selects an appropriate mathematical function and matches it to the data. With such a function, one can calculate (interpolate or extrapolate) new data, outside the original set of known (measured) data. The model presented below is proposed not to make specific predictions, but to explore and understand better how the broadband Internet IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE penetration rate grows with time. That idea is somewhat borrowed from The Limits to Growth, a famous book by Donella H. Meadows and her MIT colleagues, as the title of this writing indicates. The growth of the Information Society and Internet diffusion can be compared to a course of virtual illness, where infected people become Internet users. In case of real diseases we would like to be all 100 percent immune; hence vaccinations and other preventive measures. With Internet diffusion the aim of governmental policies is quite the opposite — 100 percent of the population infected; hence i2010 and similar projects. In studying diseases differential equations have been successfully used [4], but such an approach cannot be applied here because of the lack of necessary data. Data used in this article are the yearly statistics collected by Eurostat, the Statistical Office of the European Communities [5]. For each data set a logistic growth function is constructed in the form y (t ) = a ( ) . F 100% 1 2 3 50% 4 (1) Here y is the penetration rate of broadband Internet access (or percentage of households/ enterprises with such access) at time t. Constants a, b, c, and d are time-independent growth parameters: a is the growth limit, and b, c, and d are the time-scaling factors. These represent the collective effect of all factors (economic, technological, social, etc.) that influence the diffusion process. Their numerical values are determined using the method of least squares fitting to the measured data in hand. This forces the plot of the growth function y(t) to pass as close to every data point as possible. As the function contains four unknown growth parameters, the data set should contain not less than four data points. Otherwise, the values of some parameters have to be assumed. The popularity of broadband Internet increases from year to year. Each time a new data point is taken into account in the model, the growth parameters are to be determined anew, and the future growth path including the growth limit may change slightly. The limit becomes a moving limit, per analogy to moving average known from statistics. DISCUSSION There are no ideal models; potential sources of modeling errors are [6]: • The model fails to include significant variables. • The model includes superfluous variables. • The model uses wrong data. • The model assumes the wrong function. The first two items do not apply here because the model is descriptive and does not touch the cause-effect relations. The data concern the broadband Internet, but broadband represents various numerical values in various countries [5], and this may influence comparisons among countries. With respect to the last item from the list above, Eq. 1 is quite appropriate, and the figures below show 0% 2000 2005 2010 2015 Year Figure 1. Diffusion of broadband Internet in Poland for various user groups. 1: percentage of large enterprises (>250 employees) with broadband Internet; 2: the same for enterprises with 50 to 249 employees; 3: the same for enterprises with 10 to 49 employees; 4: percentage of households with broadband Internet; 5: penetration rate (the number of broadband access lines per 100 inhabitants). The points represent the observation data [5], and lines the results of author's calculations following Eq. 1. The limits (asymptotes) of lines 3, 4, and 5 are noticeable after 2012. that it fits the data in hand well. One should mention, however, that some researchers use more sophisticated models; the interested reader is referred to R&D report [7]. In determining the model parameters, one can impose additional constraints on the logistic function. Indeed, in a few cases, when the calculated trend line tended to exceed 100 percent, we added an arbitrary requirement that it must not surpass that percentage. EXAMPLES: LIMITS, DELAYS, AND GAPS Due to limited space, it is impractical to examine every EU country here; therefore, only three countries are presented as examples; similar patterns are observed in other countries. These countries are Poland, Romania, and Estonia. Poland is the sixth largest country in the EU in terms of population size, GDP, and area. Its population is 38.1 million, the GDP per capita is 58 percent of the EU average, and the Human Development Index (HDI) equals 0.880. The population of Romania is 21.5 million, its GDP per capita reaches 46 percent of the EU average, and the HDI is 0.837. The population of Estonia is 1.3 Mmillion, its GDP per capita amounts to 68 percent of the EU IEEE Communications Magazine • April 2010 IEEE BEMaGS 5 1 + exp b + c d + t Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 53 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 100% 1 2 3 4 50% 5 6 0% 2000 2005 2010 2015 Figure 2. Broadband Internet diffusion in Estonia (continuous lines) and Romania (dashed lines). 1 and 2: percentage of large enterprises connected to a broadband network; 3 and 4: percentage of households connected to a broadband network; 5 and 6: the penetration rate of broadband. The points represent the observation data [5], and lines the results of author's calculations following Eq. 1. average, and the HDI is 0.883. As concerns the broadband Internet penetration rate, Poland ranks 26th, Romania 23rd, and Estonia 10th among the EU countries. LIMITS Figure 1 illustrates the diffusion process of broadband Internet in Poland. The figure compares the growth of Internet diffusion in enterprises and households. At first glance data series 3, 4, and 5 seem to grow without limits, and only application of Eq. 1 makes it possible to infer their limits. The percentages of households and small enterprises with broadband Internet exhibit the lowest limits; the same relations are observed in all countries. DELAYS Figure 1 shows that the growth lines are delayed relative to one other. By definition, the delay 6t(y) is the time difference between the two lines at a given growth level y. It can be determined graphically or using function t(y), the inverse function for y(t) from Eq. 1. For example, the delay of line 3 relative to line 2 at the level of 50 percent is about four years. Note, however, that the delay cannot be determined for levels above 60 percent. The reason is that line 3 does not reach such high values: its growth limit is lower. GAPS Figure 1 illustrates the degree of digital divide among various user groups. For large enterprises (> 250 employees) the percentage limit is at 94 percent. For medium ones (50 to 249 employ- 54 Communications IEEE A BEMaGS F ees) it is at 77 percent, and for small enterprises (10 to 49 employees) at 53 percent. For households, the penetration limit is the lowest and equals 51 percent. Once the growth limits are known, it is straightforward to determine whether the digital gap between two given user groups or countries will vanish, or not. The gap, 6y(t), is defined as the difference between two growth functions, y1 and y2, at a given reference time t. For instance, in Fig. 1 the gap between lines 3 and 2 in 2005 reaches 30 percentage points or so. In this example the lines do not converge; the process that started at a lower level remains always delayed, and the gap remains forever: it is irreducible. However, in the case of lines 3 and 4, the gap first increases (up to 2006 or so) and then decreases asymptotically. Generally, the gap varies until it reaches its asymptotic value. It vanishes only if the two growth lines have a common limit. As the growth lines approach the limit asymptotically, the process of closing the gap takes a long time, theoretically infinite. The irreducible gap is the limit to which the gap 6y approaches when time tends to infinity. It is easy to notice that it equals the difference |a1 – a2|, where indices 1 and 2 differentiate between the growth lines, and a has been introduced in Eq. 1. For instance, in the figure the irreducible gap between 1 and 3 is about 40 percentage points. FURTHER EXAMPLES Figure 2 compares the growth of broadband Internet popularity in two other EU countries, Estonia and Romania. (To make the figure readable, only two user groups are shown: households and large enterprises.) For large enterprises in Estonia, the limit exceeds 95 percent, whereas in Romania it is lower, about 75 percent. For households in Estonia the limit is about 65 percent; in Romania it is also lower, about 25 percent. In spite of these differences, the penetration rates (that merge households and enterprises) in both countries tend to the same limit of about 25 percent. DISCUSSION In the long term, each and every household will have broadband access to the Internet, as we all wish. Consequently, it appears that the ultimate limit for the percentage of households with Internet access should be 100 percent. However, it is difficult to reach such a high limit, as there are people immune to the Internet, afraid of cybercrime, or those below the poverty line (we will come back to these issues later on). The authors of [7], for instance, account for this fact by assuming the limit (they call it saturation level) of broadband Internet penetration rate at 20 percent for Poland and 55 percent for France. At the time of their study, broadband services in the EU were at an early phase, and the diffusion data were scarce, so they had to assume some values. In contrast, in this article the limiting values below 100 percent result from the actual data on broadband Internet diffusion [5]. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page In the future, with the mass applications of the broadband Internet of Things, the limit may surpass 100 percent, as has already happened with the telephone penetration rate in some countries. 0% The theoretical limits, calculated for each of the 27 EU countries, are presented in Fig. 3, together with the actual penetration rates for each EU country. These limits are expected to be reached in the long-term perspective if the present development conditions continue in each country without change. The limits are the highest in Malta, Sweden, Germany, and Denmark, but even there they are well below 90 percent, the i2010 target; the actual penetration rates are even lower. This indicates that the i2010 target of 90 percent penetration rate, uniform across the whole EU, may not be reached easily. Reaching it requires significant efforts; we will come back to that issue later on. Denmark TASKS The fact that half of the people surveyed do not need or want broadband access at home may indicate that a significant part of society has 30% 40% 50% Finland Hungary Netherlands Norway Belgium United Kingdom Estonia Luxembourg France Spain Cyprus Romania Ireland Austria Slovenia Bulgaria Latvia Italy Portugal Lithuania Czech Republic Poland Slovakia Penetration rate 2007 Limit to growth Greece 0% 10% 20% 30% 40% 50% Figure 3. The current diffusion limits in the EU countries (author's calculations following Eq. 1) compared with the actual (2007) penetration rate of broadband Internet. Source of the penetration data: [5]. another hierarchy of needs and values, and does not know, does not understand, and/or does not appreciate the benefits such access can offer. Bottlenecks are households and small enterprises in rural areas and poor social strata. To change this attitude, additional stimulus pro- IEEE Communications Magazine • April 2010 Communications IEEE F Sweden Germany BARRIERS 20% BEMaGS Malta THE I2010 PROJECT It follows from Fig. 3 that a significant part of the population in the European Union does not fully participate in the Information Society. This will continue as long as the present Internet development conditions do not change. Migration to broadband Internet in urban areas and large enterprises is developing well. It is, however, delayed in small enterprises, households, and especially in rural areas where a large part of a country’s population lives. The European Commission comments on this as follows: “Despite the general increase in broadband connectivity, access in more remote and rural regions is limited because of high costs due to low density of population and remoteness. Population scarcity limits the exploitation of economies of scale, entails lower rates of demand and reduced expected returns from investment. Remoteness often implies the need of bridging longer distances from the local exchanges to the premises and to the backbone. Commercial incentives to invest in broadband deployment in these areas often turn out to be insufficient. On the positive side, technological innovation is reducing deployment costs.” [8] In line with these comments, the EU Commission recently proposed an extra €1 billion in aid to stimulate the spread of broadband Internet [9]. There are numerous reasons for such disproportions, and they may be different in each country. These may be cultural, language, disability, age, and gender barriers, lack of skills, precarious economic conditions, and so on. An EU survey has identified the major reasons cited for not having broadband Internet at home. The most significant are: “not needed or not wanted,” “too high costs,” “lack of skills,” and “privacy or security concerns” [5]. The first one was indicated by about 50 percent of responders. 10% A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 55 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page grams and resources (effort, capital, etc.) are required. Favorable conditions need to be created in various areas [3]: • Content area (to address the real needs of small enterprises and rural communities) • Education/promotion area (to educate citizens at all levels, stimulate involvement of local communities) • Investment area (public/governmental infrastructure sharing) • Legal/regulatory area (remove legal barriers; encourage new business models; competition, investments, and sharing infrastructures; facilitate fiscal conditions; broadband access as universal service; solve issues of spectrum access and intellectual property rights) • Business area (public aid; new business models) 0% 5% 10% 15% 20% Germany Italy France United Kingdom Spain Netherlands Greece Portugal Czech Republic Hungary Belgium Bulgaria Austria Sweden Slovakia Finland Denmark Ireland Lithuania Latvia Slovenia Estonia Cyprus Malta 5% 10% 15% 20% Figure 4. Market index — increase of broadband subscriber base required in each EU country to reach the i2010 target; European Union = 100 percent. (Author's calculations.) IEEE • Technology area (cheap/free software and inexpensive hardware) • Organization area QUANTIFYING EFFORTS The creation of the single European information space means significant efforts must be made in each European country, and each country’s position is specific. At first glance it seems that countries in which the current penetration rate is the lowest confront the greatest effort to reach the i2010 target. However, that effort is to be measured not in terms of the penetration rate but in terms of the increase of the broadband subscriber base required to reach the target. To quantify that effort, we propose the market index, defined as the product of the country’s population and the required increase in the actual penetration rate to reach the 90 percent target. It is the potential market size induced by the i2010 project (the size of the new subscribed base to be created). In Fig. 4 it is normalized in such a way that 100 percent represents the whole European Union. Seven countries (Germany, Italy, France, United Kingdom, Spain, Poland, and Romania), represent a major part of the new subscribers part of the i2010 target. CONCLUSIONS Luxembourg Communications F The EU countries differ not only in the market size mentioned above, but also in wealth, or the GDP (PPP) per capita, and these two factors play major roles in ensuring uniform broadband Internet penetration. Efforts needed to reach the i2010 target increase with the size of the base of new broadband subscribers and decreases with the country’s GDP: the greater the subscribers’ base to be created and the lower the GDP, the greater the efforts. To make reasonable comparisons among the EU countries in this aspect, an effort index is proposed. It is defined as the ratio of the market index to the GDP (PPP) per capita. It is shown in Fig. 5 for each EU country. Bottlenecks are to be expected to materialize in poor social strata, rural, areas and small enterprises in countries facing the greatest efforts. These need special attention to avoid significant delays in reaching the i2010 target. Figure 5 indicates that seven countries (Poland, Germany, Romania, Italy, Spain, United Kingdom, and France) are facing the greatest efforts; consequently, they require special assistance. A question arises on how to allocate that aid to lower the probability of major bottlenecks before they materialize. A rational guide would be to distribute it proportionally to the effort index. Romania 56 BEMaGS QUANTIFYING BOTTLENECKS Poland 0% A The model proposed here matches the historical data well. It infers intrinsic limits to growth of the broadband Internet penetration rate that may be unnoticeable otherwise. These growth limits depend on many factors. Rural and poor regions and small enterprises are major bottlenecks. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page The model does not confirm that the existing disproportions in broadband Internet penetration rates between countries, regions, and user groups vanish with time. They increase and decrease with time and, in some cases, are irreducible and will exist as long as the present development conditions continue. This warning calls for a review of our attitude toward reducing the digital divide not only in the European Union but also elsewhere. The i2010 target of 90 percent penetration rate, uniform across the whole EU, may not be reached as quickly as originally expected. This target requires significant efforts, and some countries/regions require special assistance, such as the recent program [9]. The effort index could serve as a guide for where that assistance should be directed. The approach used here to examine Internet diffusion in the European Union may also be applied to non-EU countries as well as to other services besides broadband. ACKNOWLEDGMENTS The author would like to thank Juerg Daellenbach, Sean Moore, Marcin Struzak, and anonymous reviewers for their contributions and comments, which have strengthened this text. 0% 5% 10% 15% 5% 10% 15% A BEMaGS F Poland Germany Romania Italy Spain United Kingdom France Bulgaria Hungary Portugal Czech Republic Greece Netherlands Slovakia Belgium Austria Sweden REFERENCES [1] Commission of the European Communities, “Preparing Europe’s Digital Future: i2010 Mid-Term Review,” COM(2008) 199, Apr. 2008. [2] “Opinion of the Committee of the Regions on Bridging the Broadband Gap and i2010 eGovernment Action Plan (2007/C 146/09),” Official J. EU, June 30, 2007. [3] R. Struzak, “Growth of Broadband Internet in Poland — Models, Trends, and Limits,” Telekomunikacja i Techniki Informacyjne, vol. 2009, no. 1–2, pp. 38–48, (in Polish); also: R. Struzak, “Broadband Internet Access: Trends and Limits,” Proc. 4th BroadBandCom ‘09, Wroclaw, Poland, July 15–18, 2009. [4] M. Keeling, “The Mathematics of Diseases,” Plus Mag., Mar. 2001, p. 3–8. [5] EUROSTAT databases, accessed Mar. 22, 2009; ____ http:// epp.eurostat.ec.europa.eu ______________ [6] R. I. Ackoff, Scientific Method: Optimizing Applied Research Decisions, Wiley, 1962. [7] R. Montagne et al., “Broadband Access Roadmap Based on Market Assessments and Technical-Economic Analysis,” BROADWAN, Deliv. D15, 2005. [8] Commission of the European Communities, “Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee, and the Committee of the Regions: Bridging The Broadband Gap,” COM(2006) 129, Brussels, Belgium, Mar. 20, 2006. [9] European Commission, “Better High-speed Internet Access Needed to Revitalise Europe’s Rural Regions,” press rel. no. IP/09/343, EU Brussels, Mar. 3, 2009. BIOGRAPHY RYSZARD STRUZAK [LF] (r.struzak@ieee.org) __________ is a full professor at the National Institute of Telecommunications, Poland, and Wroclaw University of Technology, and co-director of the ICTP School Series on Wireless Networking. He is the author/co-author of some 200 publications and 10 Denmark Lithuania Latvia Finland Ireland Slovenia Estonia Cyprus Malta Luxembourg 0% Figure 5. Effort index of each EU country to reach the i2010 target. European Union = 100 percent. (Author's calculations.) patents. He was the former acting assistant director and head of the Technical Department CCIR-ITU, Editor-in-Chief and Editorial Board Chair of Global Communications, and a consultant to ITU, UN-OCHA, WB, IUCAF, and other entities. He is co-founder and former Chair of the International Wroclaw Symposium on EMC. He was elected to leading positions in ITU-RRB, CCIR, URSI, and CISPR. He is the recipient of the ITU Silver Medal, two International Symposia awards, and national awards and decorations. He is a member of the New York Academy of Science and an Academician of the International Telecommunication Academy. IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 57 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F TOPICS IN DESIGN & IMPLEMENTATION Service Traffic Management System for Multiservice IP Networks: Lessons Learned and Applications JungYul Choi, Seung-Hoon Kwak, Mi-Jeong Lim, Taeil Chae, Byoung-Kwon Shim, and Jae-Hyoung Yoo, KT Corporation ABSTRACT Next-generation networks offer new opportunities and challenges to Internet service providers as well as providers of other online services. Service providers can now deploy new services over an IP network infrastructure without building their own networks. In an open network environment, the network resources of ISPs should be fairly open to third parties that plan to launch their own services over the network. To actively respond to the changing network paradigm, it is essential to measure the traffic of individual services, and to estimate their cost for cost accounting between service provider and ISP. However, current traffic measurement techniques only provide the total traffic volume in links, without reporting the operator whose services flow through the links. Some commercial products can classify traffic into each application at a specific spot, but we should install monitoring systems at every spot throughout the entire network in order to observe which service traffic flows in every link. To satisfy the requirements of the NGN environment, we developed the Service Traffic Management System that can analyze the traffic of individual services based on user log data. STMS can report not only the traffic of individual services in every link, but also user behavior for each service. In addition, this article shares our experience of STMS development. We also introduce how we utilize STMS in IP network design, and discuss business and management support. INTRODUCTION Each year Internet service providers (ISPs), which own large-scale network infrastructure, pump a great deal of money into building their networks in order to sustain soaring Internet traffic. The explosive increase in Internet traffic, which is mostly due to peer-to-peer services and free-rider services, places a huge burden on ISPs, with little resulting revenue from their network investment. On the other hand, the emergence of new services such as Internet Pro- 58 Communications IEEE 0163-6804/10/$25.00 © 2010 IEEE tocol television (IPTV) and fixed mobile convergence (FMC) is expected to offer new added value to ISPs and opportunities to service providers. This is because the next-generation network (NGN) environment now enables the provision of a variety of new services over IPbased transport networks by utilizing network and service control platforms without building a separate network for each service [1, 2]. This is the fruit of the realization of the NGN environment, which can pave a new way to profitable network operation. In this context, an exact cost accounting of individual services is essential for ISPs that provide services over their own network, as well as for service providers that utilize open networks for service provisioning. Cost accounting of individual services in network building and operation will be the basis for the settlement of accounts between ISPs and service providers, or between business departments and a network operating department in an ISP. Accordingly, we should measure and analyze the traffic volume of individual service flows in every link over the entire network. User behavior in the use of services and traffic characteristics of services should also be examined and utilized in network design and planning. However, legacy traffic measurement techniques simply provide the total traffic volume in links, without reporting which service traffic flows through the links [3, 4]. It does not report on user behavior in the use of services, nor does it report the traffic characteristics of services. Recent commercial products can classify traffic into each application and provide detailed traffic characteristics [5, 6]. Deep packet inspection (DPI)-based traffic analysis can provide application-level contents of traffic by inspecting the payload of each packet [7]. However, application of DPI-based techniques should be carefully applied in large ISPs for protecting personal privacy and network neutrality [8]. These solutions give benefits in providing detailed applicationlevel traffic classification, but have limited scalability and high cost. We should install such traffic monitoring systems at every spot throughout the entire network in order to exactly measure the IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page VoD servers F To address this limitation of legacy traffic measurement techniques, we IPTV IP core network Access network VoIP Access edge router Head-end center developed a new traffic management system that can Core edge router classify individual service traffic in links over the entire Internet access network, and IPTV VOD analyze user behav- IPTV multicast ior in the use of VoIP services with high Internet economic benefit. Figure 1. Multiservice IP network environment. traffic volume of individual services and where they flow [9]. Thus, to address the changed open network environment for NGN, there is a demand to develop a service traffic management system for achieving the following goals: • Can it measure the traffic volume of individual service flows in every link over the entire network and where they flow? • Can it provide an economic solution that does not require traffic monitoring systems at each spot? • Can it provide user behavior data in the use of services in links and regions? • Can it provide basic data for estimating cost accounting of each service provisioned in an open network environment? • Can it provide basic data for an IP network design and planning reflecting the characteristics of individual service traffic in specific regions? These goals accord with the requirements of Korea Telecom (KT) to do internal trading between business departments and the network operating department in our Company-in-Company system. The open network environment has similar issues in cost accounting to those when dealing with two separate companies. To respond to the changing network environment, and utilize network design and business support, we developed the Service Traffic Management System (STMS). A unique feature of STMS that differentiates it from legacy traffic management systems relying on passive measurement is the use of user log data of individual services when STMS analyzes the traffic volume of individual services in links. In this article we introduce the detailed functions of STMS and discuss how to compute service traffic. Verification of accuracy of the results from STMS is also presented by comparing them with measured traffic. We share the experiences we gained during system development. Finally, we present a new design methodology for IP networks and business support as possible applications of STMS. STMS As shown in Fig. 1, diverse service traffic flows over IP networks, and a single link can hold multiple different types of service traffic. Legacy traffic measurement systems can only collect data on incoming/outgoing traffic at network equipment using Simple Network Management Protocol (SNMP) [3], and analyze flow-level traffic [4, 10] or application-level traffic [7]. While these systems are useful in analyzing packet, flow, or application-level traffic, they can place a big burden on ISPs if there is the need to establish them in every link for precise service traffic management throughout the entire network. To address this limitation of legacy traffic measurement techniques, we developed a new traffic management system that can classify individual service traffic in links over the entire network, and analyze user behavior in the use of services with high economic benefit. STMS can analyze services that require authentication processes and generate user log data such as IPTV video on demand (VOD), IPTV real-time channel type, and Session Initiation Protocol (SIP)based VoIP. STRUCTURE AND FUNCTIONS OF STMS The structure and function blocks of STMS are illustrated in Fig. 2. STMS has a three-tier architecture. A collecting server linked with network management systems (NMS) gathers source data. An analyzing server, which is the heart of STMS, processes the linked source data and computes service traffic based on the source data. A web server provides users with a screen on which they can inquire regarding the results of service traffic and statistics. STMS periodically collects network facility data, user log data of services, and traffic data from related network management systems using FTP. Especially, network facility data provides connection link information between two pieces of equipment (port-level) for reconstituting the IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 59 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Traffic data User behavior data Statistics Service traffic analysis User behavior analysis Failed/subscribers statistics A BEMaGS F Web server Analyzing server Service traffic VOD user behavior Network facility End-to-end traffic VOD contents usage Subscribers Traffic trend VoIP user behavior Peak time Daily user behavior Overloaded links Service account log Traffic data Collecting server Access network traffic Core network traffic VOD log Channel log VoIP log Facilities and services contract Network facility Service contract information NMS IP networks Figure 2. Configuration and functional entities of STMS. network topology. The equipment ranges from subscriber aggregation switches to access and backbone network routers, and application servers. User log data for IPTV VOD service, for example, includes subscriber ID, set-top-box (STB) IP address, event time, VOD contents title, VOD server IP address, and bandwidth (constant bit rate [CBR]-encoded, bits per second). Traffic data measured by SNMP in access and backbone networks provides total port-level traffic information. Table 1 summarizes the linked source data collected by NMS. Based on the source data, STMS analyzes the traffic of individual services, user behavior in the use of each service, and the statistics of the network facility and subscribers. Regarding traffic data, STMS provides service traffic at the port, system, and node (e.g., central office [CO]) levels. Future traffic trends based on time-series analysis as well as traffic ratio of services in links are provided. User behavior in the use of service includes the average service time and the arrival rate of each service, the ratio of voice and video communications, and VOD contents usage rate by areas. Statistics of the network facilities and subscribers are also analyzed and managed at the port, system, and node levels. COMPUTATION OF SERVICE TRAFFIC STMS computes the traffic of individual services with collected source data through the following procedure, illustrated in Fig. 3. After completely collecting all source data, STMS first reconstitutes the network topology from access edge routers to backbone networks based on connection link data between network equip- 60 Communications IEEE ment. The connection link consists of upper equipment and its port corresponding to connected equipment, and lower equipment and its port corresponding to connected equipment. In addition, STMS maps subscribers (e.g., IPTV STB, VoIP phone, and PC) onto an access edge router because STMS regards the end of the subscriber’s part as an access edge router of an IP network. Next, according to the transmission policy of each service, STMS computes end-toend service traffic individually. For doing this, STMS configures an end-to-end session of each service from access edge routers to application servers using the user log data of services. Finally, based on the subscriber’s ID for services and the Internet access line linked with access edge routers, the computed service traffic in an end-to-end manner is mapped onto links and nodes on the route of the session. Computing service traffic is explained individually as follows. For IPTV VOD service provided through unicast from VOD servers to a subscriber’s STB, STMS configures the VOD service session with {access edge router’s IP address, session start time, stop time, VOD server’s IP address, bandwidth} from the collected user log data. Since the original log data only provides a single event time, we need to configure a session from start time to stop time based on the group of the same subscriber’s IP, STB IP, contents title, and VOD server IP. The start event includes start, replay, fast forward, and fast backward (rewind), and the end event includes end and pause. When end-to-end traffic computation of IPTV VOD service has been finished, each ses- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Data type Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Management systems Facility (backbone) {equipment code (upper), port number code (upper), equipment code (lower), port number code (lower)} Facility (access) {subscriber ID, equipment code} IPTV (VOD) {subscriber ID, STB IP, event time, contents title, VOD server IP, bandwidth}, where event = {start (replay), end, pause, fast forward, fast backward} IPTV (channel type) {subscriber ID, STB IP, event time, channel number, channel server IP, bandwidth}, where event = {start, end} VoIP {calling party number, called party number, event time, service type (voice, video), bandwidth} , where event = {start, end} Traffic {equipment code, port number code, date, incoming traffic (b/s), outgoing traffic (b/s)} IPTV (channel type) {equipment code, port number code, date, total channel traffic (b/s)} Facility data User log data Linked source data Traffic data A BEMaGS F Interface FTP Table 1. Source data collected from management systems. sion’s traffic is allocated in a timeline to the route of the session composing links and nodes on the network topology. Using the time for which the session is maintained and the bandwidth of the session, STMS computes the average traffic bandwidth for the session. Let us exemplify how to compute the traffic volume of this service in a specific link. It is assumed that there are three sessions with 2 Mb/s from 0 to 30 min (session 1), 6 Mb/s from 10 to 50 min (session 2), and 4 Mb/s from 20 to 40 min. As a result, the one-hour average bandwidth of the service in the link is computed as 6.33 Mb/s (= {2 Mb/s * 30 * 60 s + 6 Mb/s * 40 * 60 s + 4 Mb/s * 20 * 60 s}/3600 s). For IPTV real-time channel service provided through multicast from a head-end center to an STB, STMS configures the channel session with {access edge router’s IP address, start time, stop time, channel ID, channel server’s IP address, and bandwidth}. When traffic computation of end-to-end IPTV channel service is finished, each channel’s traffic is allocated in the timeline to the route of the channel composing links and nodes on the network topology. From Fig. 4, we can easily understand how STMS computes IPTV channel service traffic in a link. Figure 4a shows that seven subscribers watched three different channels, the traffic of which flowed through the link at different times. Due to the multicast nature of IPTV channel service, there are only three channels’ traffic flowing through the link, as shown in Fig. 4b. As a result, the one-hour average bandwidth of channel service in the link is computed as 6.33 Mb/s (= {2 Mb/s * 50 * 60 s + 4 Mb/s * 50 * 60 s + 2 Mb/s * 30 * 60 s}/3600 s). A VoIP service session consists of {edge router for calling party, edge router for called party, start time, end time, conversation type [voice or video communications], and bandwidth}. When end-to-end session traffic is calculated based on conversation time and bandwidth, the session traffic is allocated to the route of a VoIP session on the topology. Very similar to the traffic computation process for IPTV service except for the bidirectional feature of VoIP service, STMS computes VoIP service traffic in all links over the entire network. Regarding Internet access service traffic, STMS gathers the total amount of traffic in all links. Because the Internet access service does not have any user log data, STMS cannot configure an end-to-end session for it. Thus, after subtracting the traffic of all services from the total traffic in links, what remains is the Internet traffic. VERIFICATION AND RESULTS OF SERVICE TRAFFIC COMPUTED The most critical point in the success of STMS development is how accurately the service traffic computed from user log data reflects the real traffic. The possible sources of error in STMS can be classified to one of the following two categories: • Errors and omissions in source data, such as traffic data, user log data, and network facility data • Errors in algorithms to compute traffic of individual services From checking the possible errors, it was found that 1 percent of log data errors are due to missing user log data and mismatch of subscriber’s contract data, and about 5 percent of network facility data errors are due mostly to missing data. Errors in service traffic computing algorithms can be verified from the following comparison between STMS traffic and measured traffic. Figure 5 compares the IPTV VOD service traffic in a day from STMS with measured traffic at VOD server farms located in each node (CO). Each node shows 24 hours of traffic data. In most nodes the computed traffic from STMS is the same as the measured traffic within a 5 percent error range. The difference between them is revealed mostly due to errors and loss in network facility data. In addition, to verify the algorithm to compute IPTV real-time channel traffic, we tapped traffic at a 1 Gb/s link using a passive measurement system, and classified the IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 61 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F An interesting result regarding user behavior in the use Head-end center (VOD server) IPTV STB Facility data VoIP (called party) VoIP (calling party) of VoIP service is that average holding IDC/PC (web server) Internet access time (AHT) between (a) VoIPs is much longer than that between VoIP and PSTN, and User log data between VoIP and mobile phone. AHT (b) from VoIP to mobile phone is reported the shortest time. Traffic data (c) IPTV traffic VoIP traffic Internet traffic Figure 3. Service traffic computing process: a) reconstitution of network topology from network facility data; b) end-to-end service traffic computation from user log data; c) allocation of end-to-end service traffic over the entire network. channel traffic for comparing STMS traffic. The VoIP traffic computing algorithm was verified by comparing STMS traffic with the measured traffic of VoIP-level quality of service (QoS) at a differentiated services (DiffServ)-enabled router. From this, we can reason that the service traffic computed by STMS based on user log data will be the same if the integrity of network facility data and user log data is guaranteed. We add some results of service traffic obtained from STMS. Figure 6 shows the total traffic volume and each service traffic volume summing up at access edge routers in a day. At the peak time of the network, the Internet access service occupies about 57 percent of total traffic volume, IPTV VOD 9 percent, IPTV channel 34 percent, and VoIP 0.1 percent. The majority of total traffic volume is still due to the Internet access service, but IPTV service traffic has quickly soared in the KT network since KT deployed IPTV services in 2007. When it comes close to the backbone network, the effect of IPTV channel traffic gradually decreases due to the feature of multicasting transmission on which IPTV channel service relies. VoIP traffic currently occupies a very small portion of total traffic volume, mostly due to the narrow bandwidth of each session, but is fast growing thanks to increased subscribers. STMS also reports some interesting results regarding the traffic volume per user of services. At the peak time of individual services, the traffic volume per user of IPTV VOD service is two times that of Internet access service. IPTV channel service produces five times larger traffic vol- 62 Communications IEEE ume than Internet access service. In other words, in terms of traffic volume, the cost of IPTV channel service is five times that of Internet access service. This result gives the basis for the settlement of accounts between business departments and network operating departments with the totally occupied traffic volume of each service end-to-end throughout the entire network. Traffic volume per user of VoIP service is negligible compared to other services. An interesting result regarding user behavior in the use of VoIP service is that average holding time (AHT) between VoIP users is much longer than that between VoIP and the public switched telephone network (PSTN), and between VoIP and mobile phones. AHT from VoIP to mobile phone is reported to be the shortest. User behavior regarding AHT seems mostly due to the different chargea for the types of calls. LESSONS LEARNED FROM THE DEVELOPMENT OF STMS In the beginning of the STMS development project, the prime obstacle we faced was that we were not sure of the accuracy of service traffic computed by STMS compared to real traffic data. To the best of our knowledge, there is no attempt to compute service traffic as STMS does in academia or industry. As introduced earlier, we had to focus on the verification of service traffic computed. From our experience during the verifying process, we found valuable lessons for improving the quality of STMS. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page During verification of traffic computation of IPTV VOD service, we found that there were missing items in user log data that are indispensable in computing service traffic. Since KT’s IPTV VOD service is provided by streaming, a user can select start, pause, replay, and stop as well as fast forward (FF) and fast backward (FB). Initial log data only contains the first four events, but the latter two events are not provided because these events are not indispensable for service provisioning. Thus, there was missing traffic between the time of FF/FB to stop (or pause). Thus, we asked the IPTV VOD service department to add the two events in the log data, and STMS consequently produces more accurate results. Similarly, there was only the start time of the channel but not its end time in user log data of IPTV channel service. The end time of the channel can be regarded as the start time of a new channel by the same user’s choice at the same time. However, the problem occurs when a user turns off an STB without reporting the end time of the channel. Currently, the IPTV server periodically performs a health check of the STB, so we may guess the end time of the channel will be halfway between the turning off of the STB and the health check. Such an inaccurate log data possibly produces errors in producing service traffic. To resolve the problem, we asked to add the end time of a channel in user log data and applied this in STMS. Likewise, the integrity of user log data is the most precious thing for success of STMS. Thanks to the verifying process for STMS functions, we found missing log data and errors in the STB for the log data generating function. There is another issue of integrity for network facility data. Errors and missing data for the network facility are possible in the area between access and backbone networks due to different ownership of network management. Since KT owns and manages hundreds of thousands of switches and routers for IP networks, KT has to divide the network into access and backbone with different network management systems. Thus, we had to check the integrity of the network facility data located in the shared area managed at different NMS. We then reported the erroneous data to the NMS for fixing and updating them by authorizing the managing task for related equipment. Finally, we have a comment about management lag time in STMS. Due to the log data generation by NMS and difficulty of real-time data collecting, STMS collects source data from NMS daily. In addition, many sessions start just before 0 o’clock and end after 0 o’clock the following day; thus, STMS can generate the sessions when it collects the log data after another day. It also takes around 7–8 hours for STMS to generate end-to-end session traffic of services and compute service traffic in all links over the entire network based on the source data reaching around 10 Gbytes. As a result, STMS can only report the traffic data around two days after the real date. In order to minimize the management lag time, it is recommended to collect the source data from NMS every hour and have Subscriber 7 0 IEEE F Channel 3 (4 Mb/s) Channel 2 (2 Mb/s) Channel 2 (2 Mb/s) Channel 1 (2 Mb/s) Channel 1 (2 Mb/s) Channel 1 (2 Mb/s) 10 20 30 40 50 60 (min) (a) Channel 3 (4 Mb/s) Channel 2 (2 Mb/s) Channel 1 (2 Mb/s) 0 10 20 30 40 50 60 (min) (b) 8 Mb/s 6 Mb/s 4 Mb/s 2 Mb/s 6.33 Mb/s 0 10 20 30 40 50 60 (min) (c) Figure 4. Example of how to compute the average traffic bandwidth of IPTV channel service in a link: a) channel traffic from user log data; b) multicast channel traffic; c) average traffic bandwidth. STMS process them on an hourly basis. However, it is practically very difficult to collect source data from NMS every hour while keeping the integrity of source data as well as the performance of STMS high. APPLICATIONS OF STMS As it provides traffic-related data, user behavior data, and facility statistics, STMS has an important role in a data warehouse for IP network infrastructure in KT. STMS can be expanded to applications such as traffic monitoring, network facility management, network design, and business and management support, including marketing promotion and cost accounting for services. This section introduces two applications of STMS in IP network design, and in business and management support. IP NETWORK DESIGN IP network design in a multiservice environment should reflect the traffic characteristics and user behavior of services. However, a legacy network design relying on total link traffic data is hard to apply in a new environment [11, 12]. We thus developed a new IP network design methodology based on end-to-end traffic data provided by STMS. The IP network design process first gathers IEEE Communications Magazine • April 2010 Communications BEMaGS Channel 3 (4 Mb/s) Subscriber 6 Subscriber 5 Subscriber 4 Subscriber 3 Subscriber 2 Subscriber 1 A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 63 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 10,000 STMS traffic Measured traffic 8000 Mb/s 6000 4000 BEMaGS F Changes in the traffic route due to factors such as routing policy change as well as changes in network topology can easily be reflected in the network design by allocating the end-to-end traffic of each service on the changed routes. Finally, we can accurately estimate the cost pricing of services in network building and operation, because we consider the individual service-related characteristic in the network design. BUSINESS AND MANAGEMENT SUPPORT 2000 0 A B C D Nodes E F Figure 5. Comparison of STMS traffic and measurement traffic. network facility data, traffic data, user behavior data, service demands, and routing policy including service transmission route. Next, it configures the target network topology and computes network design parameters based on the gathered data. The following process explains how to produce the estimated traffic volume at the target year in each link, based on end-to-end traffic and network design parameters: • For services that provide user log data such as IPTV and VoIP, computing end-to-end traffic per user of service, based on end-toend traffic that STMS provides and the number of users at an end node (endpoint). • Forecasting end-to-end traffic per user of each service at the target point of time. • Calculating end-to-end traffic of each service by multiplying forecast traffic by future demands. • Producing offered traffic at links by allocating the end-to-end traffic to the service traffic routes, service by service. • Producing designed traffic at links by considering traffic variation over time, because the offered traffic is produced based on the average peak time of month. To compensate for the traffic difference at the average peak time of month and day, we compute an adjustment factor and apply it to compute the designed traffic from the offered traffic. • Performing link and node design that can accommodate the designed traffic. On the other hand, since the Internet access service does not have end-to-end traffic data, we need to compute this traffic link by link, not end to end, and add the link traffic to the service traffic computed earlier. The capacity planning we design is only related to the downstream traffic since the traffic volume is much higher than upstream. The proposed design methodology based on end-to-end traffic provides the following features. As we consider user behavior for individual services and the traffic characteristic of each service, it is possible to design networks more accurately by reflecting area-specific features. 64 Communications IEEE A Since KT merged with Korea Telecom Freetel (KTF), an affiliated company of KT in mobile wireless communications, in June 2009, KT has been preparing to transition the company structure to a Company-in-Company (CIC) system. Under the CIC system, business departments and the network operating department have to account for internal trading using network resources for individual services. Thus, an exact cost accounting between companies becomes a critical issue. The open network environment has similar issues in cost accounting between two separate companies. Currently, cost accounting is mostly performed based on the number of subscribers, revenue per subscriber, and traffic volume at the point of access between two ISPs. There is no clear criterion in the cost estimation of individual services from the viewpoint of network building and operation [13]. Thanks to STMS, which provides precise information on the traffic volume for individual services on every link in the entire network, we can now estimate the cost of each service based on the traffic volume actually used by users. Cost pricing of services is just one example of what STMS can support. There are wide applications of STMS in business and management support. User behavior in the use of services can be utilized as the basic data to establish a business and management strategy, and to support a marketing plan for service promotion, new service development, service pricing policy, and so on. Traffic-related information can be utilized to support decision making by management, as well as network operating system improvement. CONCLUSION STMS is a useful tool for building a data warehouse for IP network infrastructure in a multiservice environment for KT. In addition to service traffic monitoring and management, we can expect the following merits from STMS in various areas of applications. First, network design can become more accurate and flexible, because it can consider area- and service-specific data, and easily reflect changes in traffic routes and network topology. Second, the cost of individual services in network building and operation can be more accurately estimated. Third, knowledge of user behavior in the use of services in specific areas is helpful when planning business and marketing strategy. In conclusion, during this era of open networking and network convergence, KT’s experience in developing STMS is expected to offer a new way for network operation, and a new business strategy for global ISPs facing the changed network paradigm. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F REFERENCE BIOGRAPHIES J UNG Y UL C HOI (passjay@kt.com) _________ received his B.S. degree from Inha University, South Korea, in 2000, and his M.S. and Ph.D. degrees from Information and Communications University (currently merged with Korea Advanced Institute of Science and Technology), South Korea, in 2002 and 2006, respectively. He has been working at the Network R&D Laboratory, KT Corporation (formally, Korea Telecom) since 2006. He has authored around 20 reviewed technical journal papers, and holds around 10 patents in telecommunications networks. He was nominated for Marquis Who’s Who in the World 2009 and International Engineer of the Year for 2010 from IBC. He has been a reviewer of technical conference and journal papers for IEEE INFOCOM, IEEE Communications Letters, IEICE Transaction on Communications, IEICE Transaction on Information and Systems, Elsevier Journal of Visual Communication and Image Representation, and ETRI Journal. His research interests are in next-generation networks, future networks, wired/wireless convergence, and network economics. S EUNG H OON K WAK (shkwak@kt.com) _________ received his B.S. and M.S. degrees from Chonbuk National University, South Korea, in 1995 and 2001, respectively. He has been working at the Network R&D Laboratory, KT Corporation since 1995. His research interests are in next-generation networks, network dimensioning, and traffic analyzing. M I -J EONG L IM received her B.S. and M.S. degrees from Chungnam National University, South Korea, in 1991 and 1994, respectively. She has been working at the Network 2200 2000 1800 1600 Total traffic Internet access IPTV channel IPTV VOD VoIP 1400 Gb/s [1] K. Knightson, N. Morita, and T. Towle, “NGN Architecture: Generic Principles, Functional Architecture, and Implementation,” IEEE Commun. Mag., vol. 43, no. 10, Oct. 2005, pp. 49–56. [2] C.-S. Lee and D. Knight, “Realization of the Next-Generation Network,” IEEE Commun. Mag., vol. 43, no. 10, Oct. 2005, pp. 34–41. [3] C. Fraleigh et al., “Packet-Level Traffic Measurements from the Sprint IP Backbone,” IEEE Network, vol. 17, no. 6, Nov. 2003, pp. 6–16. [4] J. Quittek et al., “Requirements for IP Flow Information Export (IPFIX),” IETF RFC 3917, Oct. 2004. [5] Procera PacketLogic; http://www.proceranetworks.com/ products.html ________ [6] Blue Coat Packetshaper; http://www.bluecoat.com/ products/packetshaper ____________ [7] P.-C. Lin et al., “Using String Matching for Deep Packet Inspection,” IEEE Computer, vol. 41, 2008, pp. 23–28. [8] S. Jordan, “Some Traffic Management Practices Are Unreasonable,” Proc. 18th ICCCN ‘09, Aug. 2009. [9] M. Sidibe and A. Mehaoua, “Service and Network Monitoring Support for Integrated End-to-End QoS Management,” Proc. IEEE Net. Ops. Mgmt. Symp. Wksp., Apr. 2008, pp. 132–37. [10] Cisco Netflow; http://www.cisco.com/ [11] T. Jensen, “Network Planning — Introductory Issues,” Telektronik, vol. 3/4, 2003, pp. 9–46. [12] T. Jensen, “Network Strategy Studies,” Telektronik, vol. 3/4, 2003, pp. 68–98. [13] G. Davies, M. Hardt, and F. Kelly, “Come the Revolution — Network Dimensioning, Service Costing and Pricing in a Packet Switched Environment,” Telecommun. Policy, vol. 28, 2004, pp. 391–412. 1200 1000 800 600 400 200 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Hour Figure 6. Results of service traffic computation. R&D Laboratory, KT Corporation since 1994. Her research interests are in traffic monitoring/management and network engineering. T AEIL C HAE (tichae@kt.com) _________ received his B.S. and M.S. degrees from Yonsei University, South Korea, in 1987 and 1989, respectively, and his Ph.D. degree from Information and Communications University, South Korea, in 2007. He has been working for Network R&D Laboratory, KT Corporation since 1993. He has authored a few technical journal papers in areas of optical communications networks, and has several patents in optical systems and telecommunications. His research interests are in next-generation networks, optical packet networks, fixed mobile convergence, and network economics. BYOUNGKWON SHIM (bkshim@kt.com) _________ received his B.S. and M.S. degrees from Hanyang University, South Korea, in 1985 and 1987. He has been working at the Network R&D Laboratory, KT Corporation (formally, Korea Telecom) since 1987. As a director and project leader, his research interests are traffic analysis and engineering for next-generation networks, and network economics. JAE-HYOUNG YOO [M] (styoo@kt.com) ________ is a vice president and group leader in the Network Strategy Research Group, Network R&D Laboratory, KT Corporation. He received his B.S., M.S., and Ph.D. degrees from the Electronic Engineering Department of Yonsei University, South Korea, in 1983, 1985, and 1999, respectively. Since he joined KT in 1986, he has worked on the research and development of various networks, QoS management and traffic engineering systems including PSTN, ATM, and fixed and mobile Internet. His research interests include routing algorithms, traffic engineering, fixed and mobile IP network architecture, and next-generation operation support systems (NGOSS). He was an Application Session Co-Chair of NOMS 2004 and a Special Session co-chair of APNOMS 2006 and 2009. He is an editorial board member of the International Journal of Network Management and Journal of Telecommunications Management. IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 65 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F TOPICS IN DESIGN & IMPLEMENTATION Safety Assurance and Rescue Communication Systems in High-Stress Environments: A Mining Case Study Prasant Misra and Salil Kanhere, The University of New South Wales Diethelm Ostry, CSIRO ICT Centre Sanjay Jha, The University of New South Wales ABSTRACT Effective communication is critical to the success of response and rescue operations; however, unreliable operation of communication systems in high-stress environments is a significant obstacle to achieving this. The contribution of this article is threefold. First, it outlines those common characteristics that impair communication in high-stress environments and then evaluates their importance, specifically in the underground mine environment. Second, it discusses current underground mine communication techniques and identifies their potential problems. Third, it explores the design of wireless sensor network based communication and location sensing systems that could potentially address current challenges. Finally, preliminary results are presented of an empirical study of communication using a WSN constructed from commercially available wireless sensor nodes in an underground mine near Parkes, New South Wales, Australia. INTRODUCTION Communication systems relying on wireless links have become integral to industry and to our daily life. They now form a core infrastructure component, which has led to great improvements in convenience, productivity, and safety. Their success has led to a desire to make their capabilities available reliably in all environments of commercial, industrial, and social importance. Some of these environments inherently present challenging technical problems, which constrain wireless communications. For example, wireless communication between mobile devices inside buildings and factories must often operate in conditions of high signal attenuation, electrical interference, and multiple reflections or echoes, which restrict range and performance. Apart from those requirements, which arise in specific applications, reliable operation requires that a communication system should be designed to survive foreseeable accidents and emergencies. These two situations might together be 66 Communications IEEE 0163-6804/10/$25.00 © 2010 IEEE termed high-stress environments: environments in which by their nature it is intrinsically difficult to provide communications, and the extreme or abnormal conditions following an accident or disaster, which can both destroy system components and radically alter environmental conditions in which the system must operate. We shall focus in this article on one such environment, which is both physically harsh under normal operating conditions, and has significant risk of accidents that can damage communications infrastructure and disrupt communications: underground mines. Underground mines are typically extensive labyrinths of long (perhaps several kilometers) and narrow (only a few meters in width) tunnels. They may employ hundreds of mining personnel working at one time under extreme environmental conditions and distributed throughout the mine. The overall mining process is highly mobile, and mining machinery has to be repositioned as the mining operation progresses; consequently, the communication environment continually changes. The combination of ever-changing ground conditions with a dynamic mining system generates a broad profile of risks, which results in human casualties in mine accidents [1]. Management of the hazards in underground mines requires continuous monitoring of critical information: the presence and concentration of flammable and toxic gases and dust, the structural integrity and stability of the mine tunnels, water ingress, and the current locations and communication status of all underground mine personnel. In the aftermath of an accident, it can be vital to maintain communications with trapped miners and rescuers, and to establish and track their positions. A knowledge of environmental conditions through remote sensors in potential escape routes would aid the preparation, planning, and execution of rescue operations. Regardless of the specific type of high-stress environment, reliable communication is essential for successful mine operation under normal conditions, and is vital to the success of emergency response and rescue operations. Communication IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE failures in hostile environments can occur because of inadvertent destruction of network infrastructure during normal operations as well as in emergencies. Failures also occur due to an error-prone communication channel in the particular application environment, and degradation of the channel after an accident. The term communication channel here notionally lumps together all the physical components of the system between the communicating devices, typically including the material path through which signals must pass. Conventional communication equipment may never be entirely adequate in some severe high-stress environments, but it is important to identify and investigate the various characteristics that prevent satisfactory communication in such environments, both to map the range of applicability of different approaches and to indicate possible direction that may lead to future advances. This article provides a summary view of the field, which may provide practical benefits to other engineers who are working on similar problems and projects. The remainder of the article is arranged as follows. The next section presents a general study of the channel characteristics for high-stress environments, and then examines these characteristics in the specific case of underground mines. We then outline the various communication techniques used in underground mines, and provide a brief survey of the location sensing and tracking approaches for these conditions. Wireless sensor networks (WSNs) have recently been applied to this task, and we provide a concise background and overview of existing work on WSNs, and then explore the design of WSN-based communication systems. This approach is supported by an empirical study of the wireless communication characteristics of typical commercial WSN nodes deployed in an underground mine. The final section suggests potential research directions in the field of underground mine communication and concludes with a summary of the areas covered in the article. COMMUNICATION CHANNEL CHARACTERISTICS This section first outlines the general channel properties that are common to what we have called high-stress or harsh environments, and then specializes them to the unique channel conditions prevalent in underground mines. HIGH-STRESS ENVIRONMENTS Communication channels in high-stress environments share several characteristics that make reliable operation difficult [1–4]. Extreme Path Loss Due to Signal Absorption and Geometric Spreading — The transmitted signal is attenuated by absorption in the medium through which the signal travels, and by the geometric effect of the wavefront area expanding as it propagates away from the transmitter. Both these effects cause a decrease in signal strength with range from the transmitter. The dependence on range typically has an inverse power law with an exponent, which depends on material properties of the medium (which may vary with operating frequency and environmental factors such as temperature and humidity) and the geometry of the channel. The absorption of electromagnetic (EM) waves in water may be so high at usable frequencies that acoustic links can be an alternative to radio or optical links. EM signals are generally strongly attenuated by the Earth at frequencies normally used for wireless communications, but can penetrate large distances at ultra-low frequencies (hertz to kilohertz). IEEE BEMaGS Extensive Multipath Propagation and Fading — When a transmitted signal travels by multiple routes (i.e., multipath) to a receiver (e.g., by reflection from surfaces in the environment), they get added at the receiver antenna. This sum typically ranges between a maximum corresponding to the case when all the individual signals add in phase, to a minimum, even zero, when the signals cancel. The random addition causes space and time fluctuations in signal strength which varies with receiver and transmitter position, signal frequency, and also movement of the transmitter, receiver, or reflecting surfaces (which may be, e.g., vehicles). When different paths have large length differences, their corresponding signals interfere to cause multipath fading and overlap in time, and may result in distortions causing a degradation in the link quality. F When different paths have large length differences, their corresponding signals interfere to cause multipath fading and overlap in time, and may result in distortions causing a degradation in the link quality. Rapidly Changing Time-Varying Channels — Rapid motion of portable communication equipment, as well as variations in the intervening channel caused by the motion, can cause Doppler frequency shifts and rapid signal strength fluctuations as multipath conditions change. Underwater communication devices may also encounter equivalent acoustic conditions as a result of the motion of the ocean surface and waves in internal water strata. Large Propagation Delay and High Delay Variance — This is a prime challenge faced by very-long-range communication devices (e.g., satellites and deep space communication), as well as underwater communications where the acoustic propagation is some 200,000 times slower than EM waves in air. Variations in the effective path length of the signals due to non-homogeneous material along the path can cause changes to the total propagation time and also introduce a large variance in path delays. Noise — Noise in the communication system, whether externally or internally generated, reduces the effective system sensitivity and therefore maximum range. Some environments (e.g., the vicinity of high-power electrical motors) can have high noise levels, which can degrade radio communication. Noise levels can be severe in satellite and deep space communications because of EM radiation from transient solar storms and background astronomical sources. In the ocean storm, wave motion, shipping, and even biological activity can generate severe acoustic noise. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 67 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F attenuation. Restrictions on LOS communication arise from the normal mine arrangement of long orthogonal tunnels, support pillars, tunnel blockages, and floor undulations. Miner 1 transmitting Leaky feeder cable Signals are leaking along the entire length of the cable. Ionized Air — Fires generate ionized air, which can act as a plasma and disturb EM propagation in mines. Humid and Warm Conditions — The relative humidity in mines is high, typically greater than 90 percent and the ambient temperature is commonly around 28°C. Miner 2 receiving Figure 1. Wireless communication mediated through fixed leaky feeder cables. Besides these factors, stringent power constraints, topological variability, lack of interoperability, and the use of fixed communication infrastructure [1] are important characteristics of harsh environments. As a consequence of all these factors, communication systems may suffer from limited bandwidth, intermittent link connectivity, high distortion and link error and packet loss rates, unacceptable packet reception jitter, and delay (important in the case of lowlatency applications such as voice and video). UNDERGROUND MINES Underground mines are generally structurally non-uniform, with a network of interconnected tunnels, crosscuts, shafts, escape ways, first-aid stations, alcoves, and tunnel blockages. Some of the tunnels may contain rail tracks and conveyor belts. The walls are generally rough and the ground surface uneven, and scattered regions of accumulated water may be present. Some parts of the wall and ceilings may be strengthened with bolted wooden grids and metal beams. Environmental conditions that affect communication in mines include the following [1, 5]. Dynamic Changes in Underground Topology — The location of mine walls and faces may alter continuously as a result of mining operations. 68 Communications IEEE Gaseous Hazards — The main component of the flammable gases that leak from coal seams is methane. When the concentration of methane exceeds a critical threshold, an explosive mixture is formed with a risk of gas blasts. Hence, continual ventilation is required to decrease the buildup of dangerous gases. However, in the case of a disaster, power supply to the mine equipment may be cut, possibly leading to failure of the ventilation system with the risk of dangerous gas accumulation. Equipment for use in coal mines in most jurisdictions must be certified as explosion-proof (i.e., unable to trigger an explosion in air containing any proportion of methane). Besides these natural environmental conditions, every mine is unique with its own distinct operating considerations. In addition to the above environmental properties, there are other channel characteristics specific to underground mines. Waveguide Effect — Mine tunnels can act as waveguides at certain frequencies, and allow relatively low-loss propagation, which can provide long-range communication. This behavior is discussed in more detail in the next section. Noise — The EM channel is effectively shared with all the other electrical systems in the mine, leading to background noise. Electric machinery, power cabling and other mining appliances can generate noise in some of the frequency bands used by underground communication devices, and hence can have an adverse effect on their performance. Other independent systems using wireless links can also contribute to the background noise. In a disaster response and recovery situation, noise levels may be temporarily reduced due to power shutdowns, but heavy mechanical rescue equipment and other electronic equipment may introduce additional noise. UNDERGROUND MINE COMMUNICATION Instability in Mine Structures — Some extraction techniques use collapse zones where there are no supports and the faces are allowed to collapse as mining operations proceed, or in the event of seismic activity. This section describes some of the communication techniques that have been applied in underground mines, and outlines recent approaches to communication and tracking devices. Limited Line of Sight— Having a line of sight (LOS) between transmitter and receiver can significantly improve communication, as signals can propagate directly rather than through material or around corners, both of which cause excess Communication techniques applied in mines can be classified as one of three basic types [5]: Through-the-Wire (TTW), Through-the-Air (TTA), and Through-the-Earth (TTE). COMMUNICATION TECHNIQUES IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Advantages A BEMaGS F Name Type Disadvantages Telephones TTW Easy operation Vulnerable to damage from roof falls, mine fires, and explosions Pager phones TTW + TTA Cheap; simple operation One-way Trolley phones TTW Fixed/mobile — can provide communication to all rail haulage vehicles Limited coverage; constant vibration; warm, humid, and dusty conditions; interference from electrical machinery Hoist phones TTW Simple operation Limited to communication between the hoist cage and surface/underground stations Walkietalkie TTA Wireless communication; portable; twoway; can connect to nearby communication infrastructure (e.g., leaky feeder) Generally poor range but may have good LOS performance Table 1. Communication devices. Through-the-Wire — As in systems deployed above ground, a fixed infrastructure can provide routine long-distance communication in harsh mine environments. Signals can be sent over electrical conductors such as twisted pair and coaxial cables, and via optical fibers [1, 2]. Cabling primarily intended for other purposes, such as to provide power to electric rail vehicles (trolleys), can also be used to carry signals. A major disadvantage of these systems is that underground personnel must use equipment that is physically connected to the cables for signaling, whereas communication with unhindered mobility is a prime requirement underground. Hybrid systems, such as those using leaky feeders, which use fixed wiring to distribute signals accessed by wireless connections to nearby miners (Fig. 1) will be discussed in the next section. Although the performance of TTW systems is satisfactory for routine operations, fixed cabling is prone to damage and breakage in accidents involving fire, earth falls, and tunnel disruptions, and is difficult to maintain [5]. In order to improve the reliability of TTW systems, various cable protection schemes have been applied, including deployment through conduit, burying the cable, feeding cables through borehole connections to main lines, and redundant cabling [1]. However, these methods are expensive, make maintenance more difficult, and increase system complexity. Fiber optic cables have a significant advantage over conventional wired communication techniques as they are not susceptible to electrical interference and generally have far lower attenuation with distance. Some existing communication devices [2, 5] that use TTW techniques are shown in Table 1. Through-the-Air — TTA systems use wireless links to allow untethered mobile communications. The environmental conditions in both metalliferous and coal mines present a unique set of challenges for wireless communications. A simple model of a wireless communication system comprises a transmitter, which generates and launches an EM signal, the communication channel through which the signal propagates, and a receiver. Apart from the practical constraints on portable transmitter and receiver design, the main difficulties in an underground wireless system arise from the properties of the communication channel and noise sources. In general, EM propagation between two arbitrary points in a mine level requires propagation through the Earth, down tunnels, around corners and past machinery blockages. All these conditions cause strong attenuation and signal degradation, dependent on both operating frequency [1] and the specific environment. The material through which mine tunnels are constructed typically behaves as a low-loss dielectric, allowing a tunnel to act as a waveguide, with relatively low-loss EM propagation possible along it [5]. Ideal waveguides have a characteristic frequency called the cutoff frequency, below which EM waves cannot propagate. The cutoff frequency is directly related to the tunnel crosssection dimensions, and for typical mines the cutoff frequency is in the tens to low hundreds of megahertz (i.e., the very high frequency [VHF] band). Above the cutoff frequency, EM waves can propagate by essentially following paths that bounce along the tunnel walls at a grazing angle. At each reflection, some signal energy is lost by scattering from irregularities in the tunnel walls and floor, and refraction into the surrounding material. The loss tends to be greater at higher frequencies. LOS waveguide propagation can be surprisingly good at ultra high frequency (UHF) [6], with the best performance in coal mines typically at around 900 MHz in the UHF band and providing ranges of some hundreds of meters. Below the cutoff frequency, waveguide propagation is not possible, although direct LOS propagation can allow communication over a short range. Long-range across-mine communications can be implemented with hybrid systems in which signals are carried sequentially in both fixed TTW infrastructure and generally shorter wireless links. The TTW infrastructure can have translation or bridge equipment at regular spacing to convert signals from cable form to wireless UHF signals, for example, which can be used by miners with portable and handheld UHF equipment. This approach combines some of the benefits of both TTW and TTA systems, but also carries the disadvantage that the fixed infrastructure is vulnerable in mining accidents. Two common hybrid forms use either UHF or IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 69 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Extremely low frequency (ELF) (30–300 Hz) Very low frequency (VLF) (3–30 kHz) Low frequency (LF) (30–300 kHz) Medium frequency (MF) (300–3000 kHz) Very high frequency (VHF) (30–300 MHz) Decreases Bandwidth Increases Increases Antenna size Decreases Decreases Attenuation Increases Increases Noise level Decreases A BEMaGS F Ultra high frequency (UHF) (300–3000 MHz) Figure 2. Influence of operating frequency. medium frequency (MF) signals at around 1 MHz. A UHF implementation typically uses leaky feeder cables mounted along selected tunnels as the fixed infrastructure. Leaky feeder cable is specially constructed to allow a proportion of EM signals traveling in the cable to both escape into the environment and enter the cable from the environment. Two separated miners, each near the leaky feeder, can communicate via this cable using UHF handsets. The signal transmitted by one is picked up by the leaky feeder cable, propagates down the cable while being partly re-radiated into the environment along the whole cable length, and the second miner can receive this signal. MF signals strongly couple to continuous metal conductors and can use them as the longrange transmission medium rather than specially constructed leaky feeders. Miners use MF equipment, generally bulkier and less portable than UHF equipment, to generate signals that are carried along purpose-deployed single metallic conductors, or suitable pre-existing structures such as lifelines or power rails. One benefit of MF systems is that, in case of an accident, it may be possible to use any available undamaged conductors to traverse blocked tunnel regions. A natural extension of the hybrid approach uses a deployment of wireless nodes to form a wireless mesh network, which can forward messages from a miner within range of any node to a destination point in the network where the message can be either delivered or forwarded through other communications systems. The availability of multiple paths in these networks gives them resistance to link failures, which are likely to occur in emergencies. Digital modulation technologies (e.g., as used in WiFi networks) have been developed to operate at high data rates in the severe multipath environments typical of mines, and hence may be able to support speech and video communications. Because of their flexibility and potential performance in a range of difficult environments, wireless mesh networks are the subject of active current research. 70 Communications IEEE All the above systems can be combined to extend the range over which communication is possible and to provide system redundancy by providing independent modes of operation. Through-the-Earth — The attenuation of EM signals through the ground strongly depends on operating frequency. Figure 2 shows the qualitative dependence of several factors: available signal bandwidth, attenuation, antenna size, and noise levels on the frequency. These trade-offs prevent a system operating in one frequency band from satisfying all operational and emergency requirements. EM signals at the operating frequencies typically used by TTA systems are unable to penetrate rock strata. However, attenuation of EM signals through the earth (TTE) decreases with frequency, and at very low frequencies, ranges can become great enough to allow even direct surface-to-underground communication [5]. TTE communication systems typically operate between 90 Hz and 4 kHz, and typically must use large loop antennae to launch EM signals efficiently at these frequencies. The data rates required for speech cannot be supported at these frequencies, so communications are limited to text messages. Efficient antennas must be large (perhaps even kilometers in diameter to support direct surfaceto-miner operation), and miners may have to deploy wire loops underground as required. The capability of direct communication with trapped miners, independent of below-ground mine infrastructure, makes provision of TTE systems particularly important in mine emergencies. TTW, TTA, and TTE communication technologies have their distinct capabilities and limitations, which makes selection of a suitable system or combination of systems strongly dependent on the particular application [2]. TRACKING SYSTEMS The majority of current tracking systems are based on radio frequency identification device (RFID) technology. RFIDs or tags are small electronic IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page devices that can communicate with more complex reader nodes via wireless communications. Reader nodes can interrogate tags to exchange identity and other information. Two main systems are currently being used. In the first, miners carry RFID tags, and reader nodes placed at known fixed positions are connected to a mine communications system, which can send data back to a central collection point. When a miner passes within range of a reader, the tag identity is transmitted back to the control center, giving an indication that a particular miner is located within the reception zone of the reader. Position resolution depends on the density of reader nodes in the mine and their coverage areas. In the alternate system known as reverse RFID, the RFID devices are deployed at known positions. The miners now carry portable readers, which interrogate the static RFID devices for their identity and transmit the information back to a central site via the miners’ existing communication system. As mentioned previously, underground wireless communications can be implemented via a mesh network of fixed nodes (Fig. 3). This raises the possibility of integrating communication and positioning functions in one system. At its simplest, the identities of the nodes nearest to the miner can give zone position information. System performance can be improved by combining link information, such as signal strength and propagation timing measurements, to allow more precise localization. Information about research agencies, manufacturers, and commercially available tracking systems can be found in [1, 7]. WSNS IN UNDERGROUND MINES The general dependence on TTW systems for operational use, together with restricted environmental monitoring capabilities, is a limitation in providing safety assurance and rescue communication capabilities. This section investigates the feasibility of applying the emerging WSN technology to implement a location sensing and environmental monitoring system, and discusses related work and our own experiences in the deployment of a WSN in an underground mine in Parkes, New South Wales, Australia. BACKGROUND WSNs provide a new option for portable wireless communication systems, by using a network of WSN nodes to provide the required network connectivity in a cheap and efficient manner. WSN devices are also well suited to distributed environment monitoring, and can report gas and dust concentrations and geological stability data over their deployment range by attaching suitable sensors. F Figure 3. Node-based tracking system: a wireless mesh network. for integration with deployed systems and planned enhancements • Modifications required to make WSN nodes usable in the mining environment and able to provide the desired data • Long sensor node life through use of both batteries high in energy density or rechargeable using available energy sources, and techniques to minimize node power consumption while carrying out network operations • Physical protection of the WSN nodes and sensors to prevent damage or faulty operation in normal and post-accident circumstances without adversely affecting communications • Network protocols to store, exchange, and retrieve information reliably under harsh operating conditions • System health monitoring to establish and report the functional status of the system during normal conditions as well as after the occurrence of a mine accident • System maintainability, that is, the effort required to keep the system operational in both normal and emergency conditions • Decision systems to present sensor data in a way that can be easily interpreted to assist operational and emergency planning AN EMPIRICAL STUDY IN AN UNDERGROUND MINE There are a number of important factors that must be considered in order to design a WSN implementation for location sensing and environmental monitoring in underground mines: • Availability of sensors and nodes suitable In order to assess the limitations of currently available commercial WSN nodes when deployed as a wireless communication network in underground mines, we conducted a series of experiments using off-the-shelf MicaZ [1] wireless IEEE Communications Magazine • April 2010 IEEE BEMaGS The system reconfigures when a node in a route fails and determines a new route for communication. REQUIREMENTS FOR A WSN IN HARSH ENVIRONMENTS Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 71 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 0 Base station 10 8.5 m 9 1 14 m 12 m 2 8 8.8 m 12 m 3 7 11 m 4 9.5 m 4m 6 5 5m A BEMaGS F received by the base station from a majority of the motes. Hence, a second experiment was conducted with the motes placed much closer to each other, as shown in Fig. 4. Figure 5 shows the percentage of packets received correctly at the base station from each of the individual motes. The success rate is less than 50 percent for most of the motes. The results suggest that those motes at one hop distance from the base station (motes 1 and 10) and with a clear LOS (mote 10) performed better than the other motes. Several factors were identified that could have contributed to the low packet reception rate: dynamic channel changes due to personnel motion during the tests; slight misalignment of antennas due to the mounting method, and multiple reflections from the mine walls and other metallic objects attached to them. In addition, we believe that variations in the performance of the individual mote radios also influenced packet throughput, as some motes achieved good signal strength and performance, while others failed to communicate at the same distance in a similar configuration. Our experience highlights the need for custom design of wireless sensor nodes that can provide reliable communication in harsh environments. EXISTING WORK Figure 4. Experimental setup inside the mine. sensor nodes (motes) in an underground gold and copper mine located near Parkes, New South Wales, Australia. Deployment — The mine tunnel that was accessible for experimentation was approximately 5 m in width and 10 m in height, and had projecting bolts positioned approximately 2 m above the tunnel floor. MicaZ motes were enclosed in plastic boxes to act as a protective casing, with the antennas protruding. The plastic boxes containing the MicaZ motes could be mounted on the bolts in the tunnel walls. Mote 0 was configured as the base station, while all the other motes (numbered 1–10) were sited along both walls of the tunnel, as depicted in Fig. 4. An experiment was conducted to test whether motes 1–10 were able to successfully send packets to the base station across multiple hops. All the motes were programmed using TinyOS and nesC [1]. The packet length was fixed at 29 bytes with a simple structure comprising a header and a payload containing the mote identification code. Packets were sent at intervals of 100 ms, and approximately 6000 packets were sent from each mote over a period of 10 min. Discussion — It proved to be more difficult than expected to set up the experiment in the humid and dusty mine environment. Coordinating the deployment of sensor motes inside a dark underground mine tunnel and conducting experiments is a nontrivial task in practice, as the acoustic properties of the tunnel do not permit people to speak to each other if they are more than 50 m apart. When the motes were placed at 15 m intervals, no packets were 72 Communications IEEE We provide here a brief survey focusing on work directed to the systems design and deployment of WSNs in underground mines. Li et al. [8] present a sensor network deployment and collaborative communication strategy to detect the structural changes in the event of underground mine collapses. Field studies were conducted through the deployment of a prototype system consisting of 27 Crossbow Mica2 motes in the D. L. coal mine in China. The prospects of using ultra-wide-band (UWB) signals in conjunction with WSNs for localization in underground mines have been studied by Chehri et al. [9]. Measurement data for simulation were collected from the CANMET experimental mine in Canada. Xuhui et al. [10] describe the implementation of a methane gas sensor and propose an automatic calibration technique with the help of network connectivity. FireFly, a new sensor hardware platform based on a cross-layer solution for tracking and voice communication in harsh environments, was introduced in Mangharam et al. [11]. The experimental results reported in that work were collected in a NIOSH experimental coal mine. Xiaodong et al. [12] describe their experiences in monitoring the coal mine conditions via a wireless network consisting of Crossbow MicaZ sensor nodes equipped with custom developed multifunctional sensor boards. RESEARCH DIRECTIONS AND CONCLUSION The performance of communication and tracking systems in underground mines has not been as actively or extensively researched as contemporary surface-based systems. There are few existing systems, and there is limited public information regarding implementation details and actual performance in mines. Ensuring safe- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page ty of mining personnel is one of the dominant issues driving the development of these systems. However, the difficult conditions in mines and the lack of practical approaches have prevented the development of a robust and generally applicable safety system. In view of experiences learned from mining accidents, there is a need to research the applicability of new technologies in mine environments. Current systems lack the capability of sensing and assessing information that could help in predicting the risk of an accident. There is a need to engineer early warning systems to bridge this gap because there is only a very limited capability to limit the intensity and impact of a disaster when it strikes. Currently available tracking systems only register that a person is within a certain region or zone. Research is needed into autonomous and robust tracking systems capable of high spatial resolution in real-time continuous tracking. Wireless systems using spread-spectrum or UWB radios that promise accurate positioning together with robust communication in strong-multipath environments, and software defined radios able to adapt to dynamic propagation conditions are other promising research areas that could address some of the challenges posed by radio propagation in mines. This article outlines features common to a range of high-stress environments and described the factors that may affect communication in deployments in these environments. It identifies those factors that present the greatest challenges to reliable communication in underground mines. Properties of the underground wireless channel, and the design and implementation of current approaches to communication and tracking using this channel are also discussed. Finally, the article discusses the emerging technology of WSN deployments in harsh environments and its applicability in underground mines, and we describe our preliminary experiments to assess the operation of WSNs in mines using generalpurpose commercial nodes. REFERENCES [1] P. Misra et al., “Safety Assurance and Rescue Communication Systems in High-stress Environments,” tech. rep. UNSW-CSE-TR-0912, Univ. New South Wales, 2009. [2] Niosh Office of Mine Safety and Health Research, “Tutorial on Wireless Communications and Electronic Tracking,” working draft, May 2009; http://www.msha.gov/ techsupp/PEDLocating/WirelessCommandTrack2009.pdf _____________________________ [3] I. F. Akyildiz, D. Pompili, and T. Melodia, “ Underwater Acoustic Sensor Networks: Research Challenges,” Ad Hoc Net. J., 2005, pp. 257–79. [4] I. F. Akyildiz et al., “Interplanetary Internet: State of the Art and Research Challenges,” Comp. Net., vol. 43, no. 2, 2003, pp. 75–112. [5] L.K. Bandyopadhyay, S. K. Chaulya, and P. K. Mishra, Wireless Communication in Underground Mines, Springer, 2010. [6] A.G. Emslie, R.L. Lagace, and P.F. Strong, “Theory of the Propagation of UHF Radio Waves in Coal Mine Tunnels,” IEEE Trans. Antennas Propagation, vol. AP-23, no. 2, Mar. 1975. [7] P. Misra, D. Ostry, and S. Jha, “Underground Mine Communication and Tracking Systems: A Survey,” tech. rep. UNSW-CSE-TR-0910, Univ. New South Wales, 2009. [8] M. Li and Y. Liu, “ Underground Coal Mine Monitoring with Wireless Sensor Networks,” ACM Trans. Sensor Net., vol. 5, no. 2, 2009, pp. 1–29. [9] A. Chehri, P. Fortier, and P. M. Tardif, “UWB-Based Sensor Networks for Localization in Mining Environments,” Ad Hoc Net., vol. 7, no. 5, 2009, pp. 987–1000. IEEE BEMaGS F 70 60 50 40 30 20 10 0 1 2 3 4 5 6 Node ID 7 8 9 10 Figure 5. Success rate vs. node ID. [10] Z. Xuhui and W. Sunan, “Design of a Wireless Sensor Network for Methane Monitoring System,” 6th IEEE Int’l. Conf. Industrial Informatics, 2008, pp. 614–18. [11] R. Mangharam, A. Rowe, and R. Rajkumar, “Firefly: A Cross-Layer Platform for Real-Time Embedded Wireless Networks,” Real-Time Sys., vol. 37, no. 3, 2007, pp. 183–231. [12] X. Wang et al., “Deploying a Wireless Sensor Network on the Coal Mines,” IEEE Int’l. Conf. Net., Sensing, Control, 2007, pp. 324–28. BIOGRAPHIES PRASANT MISRA (pkmisra@cse.unsw.edu.au) _______________ is a Ph.D. student in the Networks Research Laboratory (NRL), School of Computer Science and Engineering, University of New South Wales (UNSW), Sydney, Australia. His research interests have been in the area of wireless sensor networks, network embedded systems, and wireless networks. He is a recipient of the Australian Leadership Awards (ALA) scholarship, awarded by the Australian Agency for International Development (AusAID), Government of Australia. He received his B.E. (Hons) in computer science and engineering from Sambalpur University, India, in 2006, and worked as a senior software engineer in Keane Inc., Bangalore, India, 2006–2008. SALIL KANHERE received his M.S. and Ph.D., both in electrical engineering, from Drexel University, Philadelphia, Pennsylvania, in 2001 and 2003, respectively. He is currently a senior lecturer in the School of Computer Science and Engineering, UNSW. His current research interests include participatory sensing, vehicular communication, and wireless mesh and sensor networks. DIETHELM OSTRY [M] (diet.ostry@csiro.au) ___________ is a research scientist in the Wireless and Networking Technologies Laboratory, ICT Centre, CSIRO Australia. His recent research interests have been in the areas of wireless networks, data network traffic characterization, optical packet networks, and wireless sensor networks. He holds a B.Sc.(Hons) in physics from the Australian National University and an M.Comp.Sc. from the University of Newcastle, Australia. SANJAY JHA is a professor and head of the Network Group at the School of Computer Science and Engineering at UNSW. He holds a Ph.D. degree from the University of Technology, Sydney, Australia. His research activities cover a wide range of topics in networking including wireless sensor networks, ad hoc/community wireless networks, resilience/quality of service (QoS) in IP networks, and active/programmable networks. He has published over 100 articles in high-quality journals and conferences. He is the principal author of the book Engineering Internet QoS and a co-editor of the book Wireless Sensor Networks: A Systems Perspective. He is an Associate Editor of IEEE Transactions on Mobile Computing. He was a Member-at-Large, Technical Committee on Computer Communications (TCCC), IEEE Computer Society for a number of years. He has served on program committees of several conferences. He was the Technical Program Chair of the IEEE Local Computer Networks 2004 and ATNAC ‘04 conferences, and CoChair and General Chair of the Emnets-1 and Emnets-II workshops, respectively. He was also the General Chair of the ACM SenSys 2007 Symposium. IEEE Communications Magazine • April 2010 Communications A 80 Success rate (%) Communications Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 73 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F SERIES EDITORIAL TOPICS IN INTEGRATED CIRCUITS FOR COMMUNICATIONS Charles Chien I Zhiwei Xu Stephen Molloy n the past ten years, we have witnessed rapid advances in communication technology that enabled more than an order magnitude increase in throughput and reduction in power consumption. The steep rise in available throughput has stimulated the growth of ubiquitous broadband services such as streaming of high-definition video contents, while on the other extreme, the steep drop in power consumption, in particular for short-range radio technologies, has enabled personal area connectivity for all kinds of portable consumer electronic devices, such as headsets, cell phones, and cameras. Current third-generation (3G) mobile devices easily support data rates on the order of 1–10 Mb/s, while quasi-static devices can easily support up to 600 Mb/s with wireless LAN based on IEEE 802.11n. For short distances, Bluetooth and ZigBee connectivity technology consume power as low as 10–50 mW. In the next few years, we will continue to see expansion of available throughput to meet the increasing demand to access high-definition (HD) contents such as Blu-ray quality video over the Internet. Such increase in demand has propelled infrastructure upgrades for higher-speed backbone technology such as Data over Cable Service Interface Specification (DOCSIS) 3.0, which achieves four to eight times higher throughput compared to its predecessor, version 2.0. Typical deployment of DOCSIS 3.0 achieves throughput of 171–343 Mb/s by means of channel bonding. The improved throughput makes it possible to download high-definition contents from the Internet with low latency. A further push in broadband capabilities will be driven by enhanced visual renderings such as 3DTV, which captures stereo information in two optical polarizations, one for each eye. At a minimum, the additional stereo information doubles the throughput requirement. While 3DTV volume has reached only 1.2 million in 2009, its volume is projected to hit 46 million by 2013. Another future trend points to ultra-low-energy radio systems for remote monitoring of vital signs in patients or people with pre-existing health conditions. Such systems require implants that make regular replacement of batteries inconvenient. Ideally, suitable technologies should be capable of replenishing wasted energy by harvesting elec- 74 Communications IEEE trical energy from the environment (e.g., body motion, ambient light, and thermal gradient). Existing short-range radios such as ZigBee, adopted for building automation and home energy management, still dissipate too much power to self-sustain based on energy harvesting. In this issue of the Topics in Circuits for Communications Series, we have selected three articles that mark recent progress in the communications semiconductor industry for highly integrated radio system-on-chip (SoC) that enables future trends in broadband delivery of enhanced high-definition video contents and self-powered health monitoring systems. In the first article, “Video Encoder Design for High Definition 3D Video Communication Systems,” the authors address the challenges to realizing efficient encoders for emerging bandwidth constrained consumer video applications, which have recently expanded beyond current HDTV to the higher-resolution quad-HDTV as well as three-dimensional video. Two key challenges in reaching these incredible processing rates are memory bandwidth and the complexity of context-adaptive binary arithmetic coding (CABAC). The article describes new architecture and circuit techniques to address these two key challenges. Novel caching is applied to minimize external memory bandwidth, while algorithm parallelism at the frame level is applied to the CABAC bottleneck. The authors then demonstrate an example implementation and test chip for the architecture, capable of encoding a single view at a resolution of 4096 × 2160 or multiple views at lower resolution. The second article, “An Embedded 65nm CMOS Baseband IQ 48MHz-1GHz Dual Tuner for DOCSIS 3.0,” exemplifies a fully integrated embedded complementary metal oxide semiconductor (CMOS) digital dual tuner for DOCSIS 3.0 and set-top box applications. To compete with higher throughput offered by gigabit passive optical network (GPON) and very high bit rate digital subscriber line (VDSL), cable providers introduced DOCSIS 3.0, which offers an increase in throughput by bonding multiple downstream channels. Coexistence with high-powered analog cable transmissions imposes substantial challenges on IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F SERIES EDITORIAL the integrated tuner design that has to demodulate eight downstream channels simultaneously. To maintain low power dissipation, the authors describe a cost-effective multichannel and multituner solution by integrating the tuner, digital demodulator, MPEG decoder, memory, and processor core on a single SoC. The article covers several critical design issues, such as harmonic rejection for demodulation, image rejection with imbalance canceller, and high dynamic range front-end. The authors also provide detailed design trade-offs in the tuner architecture and RF circuit design issues, as well as the benefit of their unique implementation with respect to power consumption and cost in future technology scaling. The third article, “Integrated Electronic System Design for Implantable Wireless Batteryless Blood Pressure Sensing Microsystem,” reviews the recent techniques used in real-time monitoring of blood pressure to identify genetic susceptibility to diseases. These techniques provide critical research tools to develop new treatments for cardiovascular and hypertension. In contrast to conventional monitoring techniques that rely on invasive bulky catheter tip transducers, an implantable miniature lightweight blood pressure sensing microsystem with wireless data communication and adaptive RF powering capability is highly desirable. However, the integration of a batteryless wireless communication system with real-time blood pressure monitoring remains a challenge. The authors describe design challenges with respect to various circuits and microsystem impairments such as continuously changing RF power coupling and magnetic field. The article then describes design techniques to boost the circuit immunity to dynamic environment and interferences, and demonstrate the integrated blood pressure sensing microsystem for future implantable integrated health monitoring systems. We would like to take this opportunity to thank all the authors and reviewers for their contributions to this series. Future issues of this series will continue to cover circuit technologies that are enabling new and emerging communication systems. If the reader is interested in submitting a paper to this series, please send your paper title and an abstract to any of the Series Editors for consideration. BIOGRAPHIES CHARLES CHIEN is president and CTO of CreoNex Systems, which focuses on technology development for next-generation systems. Previously he held various key roles at Conexant Systems, SST Communications, and Rockwell. In his career he has architected several key products including a CMOS/SiGe chipset for multimedia over coax (MoCA), an IEEE 802.11abg WLAN RF CMOS transceiver and GaAs PA/RF switches, a wireless audio CMOS chipset for home theatre in a box, CDMA2000 cellular RF CMOS transceivers, and low-power wireless networked sensors. He was also an assistant adjunct professor at the University of California at Los Angeles (UCLA) from 1998 to 2009. His interests focus mainly on the design of system-on-chip solutions for wireless multimedia and networking applications. He has published in various journals and conferences, and has authored a book entitled Digital Radio Systems on a Chip. He received his B.S.E.E. from the University of Caifornia at Berkeley, and his M.S. and Ph.D. from UCLA. He was a member of the technical program committee of ISSCC from 1998 to 2006. ZHIWEI XU received B.S. and M.S. degrees from Fudan University, Shanghai, China, and a Ph.D. from UCLA, all in electrical engineering. He held industry positions with G-Plus Inc., SST communications, Conexant Systems, and NXP Inc., where he did development for wireless LAN and SoC solutions for proprietary wireless multimedia systems, CMOS cellular transceivers, MoCA systems, and TV tuners. He is currently with SST as department head, working on various aspects of wireless communication SoC and software defined radios. His current research interests include wireless communication SoCs for high data throughput as well as ultra-low-power applications. He has published in various journals and conferences, made one contribution to the Encyclopedia of Wireless and Mobile Communications, and has four granted and five pending patents. STEPHEN MOLLOY received M.S. and Ph.D. degrees in electrical engineering from UCLA in 1993 and 1997, respectively, where his research focused on low-power circuits and architectures for video signal processing. This work led to the award of the Showman Prize from UCLA in 1997, and resulted in over a dozen conference and journal publications. He received a B.S. degree in electrical engineering from Rensselaer Polytechnic Institute in 1991. He served as Associate Editor of the IEEE Journal of Solid-State Circuits from 2001 to 2004 and was a member of the technical program committee of the IEEE International Solid-State Circuits Conference from 1998 until 2005. He is currently vice president of engineering at Qualcomm, leading architecture development. IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 75 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F INTEGRATED CIRCUITS FOR COMMUNICATIONS Video Encoder Design for High-Definition 3D Video Communication Systems Pei-Kuei Tsung, Li-Fu Ding, Wei-Yin Chen, Tzu-Der Chuang, Yu-Han Chen, Pai-Heng Hsiao, Shao-Yi Chien, and Liang-Gee Chen, National Taiwan University ABSTRACT VLSI realization of video compression is the key to real-time high-definition 3D communication systems. The newly established multiview video coding standard, as an extension profile of H.264/AVC, draws more and more attention for its high compression ratio and free-viewpoint support. Besides providing the 3D experience, multiview video can also give users complete scene perception. However, the multiple-viewpoint throughput requirement of MVC increase the complexity and hardware cost dramatically. The system memory bandwidth, on-chip memory size, and processing data throughput of each module all need to be optimized in an MVC encoder. Therefore, efficient hardware solutions for MVC architecture design are needed. In this article an overview of 3D video coding standards developments and design challenges of an MVC encoder are discussed. Then the algorithm and architecture optimization schemes are proposed. For the trade-off between system memory bandwidth and on-chip memory size, a cache-based prediction engine is proposed to ease both design challenges. Moreover, the hybrid openclose loop intra prediction scheme and the frame-parallel pipeline-doubled dual CABAC solve the throughput requirement problem. At the end of this article, based on all the proposed solutions, a prototype single-chip MVC encoder design with processing ability of 4096 × 2160 single-view to 1280 × 720 seven-view is presented. INTRODUCTION For advanced TV applications, vivid perception quality is required. Therefore, higher and higher video resolutions, like high-definition (HD) 720p (1280 × 720 pixels) and 1080p (1920 × 1080 pixels), are recommended. In addition, 3D video can bring the 3D and realistic perceptual experience to viewers by projecting different views to users’ left and right eyes simultaneously. As the technology evolves, lots of 3D related applications, such as 3D-TV and free-viewpoint TV, are emerging [1]. 76 Communications IEEE 0163-6804/10/$25.00 © 2010 IEEE In a real-time HD 3D video communication system, three key technologies make it feasible. The first one is the stereo or multiview capturing and display device. The second one is the coding standard. Since 3D video contains many different view angles, different and more efficient coding algorithms than the conventional single-view video coding standards are required to further reduce the bit rate for communication. Third, the efficient hardware architecture is required for accelerating the coding speed to meet the realtime constraint. Because of the multiple-viewangle characteristic, data needed to be processed in a 3D video is multiple times that in a conventional single-view video. Thus, if the conventional architecture is adopted, it will multiply computation complexity and hardware cost. In order to transmit and store 3D/multiview contents, an efficient multiview video coding (MVC) scheme is needed. The MPEG 3D Audio/Video (3DAV) Group is working on the standardization of MVC. In July 2008, MVC was standardized as the Multiview High Profile in H.264/AVC by the MPEG 3DAV Group [2]. The joint MVC (JMVC) was released by the MPEG 3DAV Group as the reference software and research platform [3]. In the JMVC H.264/AVC is adopted as the base layer. In addition, disparity estimation (DE) and disparity compensation (DC), the most significant features in JMVC, can effectively discover the interview redundancy of a multiview video and save 20–30 percent of bit rates. Based on the bit rate reduction, an HD MVC sequence is able to be stored in high-end multimedia portable storage like a Blu-ray disc. However, the coding complexity increases dramatically in the MVC because of the hybrid inter-view DE and intraview motion estimation (ME) prediction schemes. Furthermore, the processing throughput requirement of HD MVC is many times larger than that of the current HDTV specification. Thus, a new and efficient encoder architecture design for the MVC is desired. In this article the mainstream 3D video coding standards, design challenges in MVC encoder design, and the proposed solutions are briefly introduced. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE The video coding standard development is introduced in the next section. The hardware resource analysis is then presented. Then the proposed MVC architecture design is shown. The final section concludes this article. FROM 2D TO 3D: VIDEO CODING STANDARD DEVELOPMENT 2D VIDEO CODING: FROM MPEG-1, H.261 TO H.264/AVC Video data without compression is impossible to transmit directly due to the incredible size of the uncompressed raw data. Since 1990 many video coding standards have been defined for storage and transmission. Among these coding standards, coding efficiency is the most important criterion. There are two main series of video coding standards: the International Standards Organization (ISO) MPEG-x standards and International Telecommunication Union — Telecommunication Standardization Sector (ITU-T) H.26x standards. The MPEG-x series contains MPEG-1, MPEG-2, and MPEG-4. On the other side, the H.26x series starts from H.261 in 1990 to H.263, H.263+, and H.26L. Furthermore, some standards are the result of coworking of these two groups. For example, MPEG-2 is also called H.262 and is the result of a common project. Then H.264 is delivered by both ISO and ITU-T, which is also called the Joint Video Team (JVT). Therefore, H.264 can also be called MPEG-4 Advanced Video Coding (AVC) or H.264/AVC. Being the latest finalized advanced video coding standard from these two main streams, H.264/AVC has the best coding performance. It provides more than 50 percent bit rate reduction over the previous MPEG-2 standard. In order to provide better and better rate distortion (R-D) performance in the future, at the last MPEG meeting, a new Joint Collaborative Team between MPEG and ITU was created to work on a new standard. In order to solve the problems of the previous standards, MVC is proposed as an extension profile of H.264/AVC. In contrast to the singleview-plus-depth format, MVC encodes video data from multiple viewing angles into a single bitstream by hybrid motion and disparity compensated prediction. Figure 1 illustrates the overview of an MVC system and the corresponding block diagram of an MVC encoder. The multiview video is captured by a camera array, followed by the MVC encoder compressing the multiview video data for transmission or storage. On the decoder side, reconstructed multiview video can be displayed on various displays such as currently commercialized HDTV, or nearly developed stereo and multiview 3DTV. In an MVC encoder, video frames from the first view channel are compressed by a typical H.264/AVC encoder. On the other hand, DE and DC are adopted to other view channels to further reduce inter-view redundancy. This multiple-viewpoint characteristic of MVC avoids the quality degradation from the inaccurate depth map. Furthermore, the H.264/AVC-based encoding flow reduces the bit rate overhead for each view. However, the complexity of an MVC encoder is also much higher than that of the single H.264/ AVC encoder due to its multichannel characteristic. Therefore, an efficient hardware architecture is urgently required. F MVC outperforms previous 3D video coding standards by use of H.264/AVC-based coding scheme. The multiple view angles characteristic also avoids the quality uncertainty due to the depth map. However, these features also bring the larger complexity and hardware cost than previous standards. MVC outperforms previous 3D video coding standards by use of an H.264/AVC-based coding scheme. The multiple view angles characteristic also avoids the quality uncertainty due to the depth map. However, these features also bring larger complexity and hardware cost than previous standards, especially when the resolution requirement is as high as the HDTV specifications. The main design challenges of an MVC encoder are shown in Fig. 2 and discussed below. ULTRA HIGH COMPUTATION COMPLEXITY AND THROUGHPUT REQUIREMENT 3D video has always played an important role in the video processing research field, including, of course, 3D video coding. The first finalized 3D video coding standard was the MPEG-2 Multiview Profile. A stereo video sequence can be compressed into a bitstream containing a base layer and an enhancement layer. In addition to the stereo-view representation, another approach to 3D video is the single-view-plus-depth, or socalled 2D + Z, format. The Advanced ThreeDimensional Television System Technologies (ATTEST) from European Information Society Technologies (IST) and MPEG-C Part 3 from MPEG both focus on this format. The depth information can be captured by the depth sensor. With the depth map, virtual views can be generated by depth image-based rendering (DIBR). However, the technology of depth map generation is not mature enough. It directly causes quality degradation of the rendered virtual views on the receiver side. MVC has large computational requirements because it needs to compress data from multiple viewpoints. In a video coding system, inter-frame redundancy elimination causes most of the complexity. For a single-view video, ME is used to find out the inter-frame relationship and reduce the data redundancy in the temporal domain. In MVC DE is used as well for the inter-view domain inter-frame prediction. For an N-view multiview sequence, this hybrid ME/DE encoding scheme requires more than N times more computation than a single-view sequence. Figure 2a shows the integer ME/DE (IMDE) computation analysis under different resolutions and view numbers, where different search algorithms used in integer ME/DE and the corresponding computation requirements are listed. Two hardware oriented algorithms are considered in Fig. 2a. The full search algorithm uses all possible candidates over the entire search window (SW) and thus provides the best rate-distortion (R-D) perfor- IEEE Communications Magazine • April 2010 IEEE BEMaGS DESIGN CHALLENGES OF AN HD MVC ENCODER 3D VIDEO CODING: FROM MPEG-2 MULTIVIEW PROFILE TO MVC Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 77 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page In the architecture design field, the A BEMaGS F Output various representation Input multiview video system memory bandwidth and the HDTV on-chip memory size are two major Stereo TV limitations. The trade-off between MVC encoder them is classic in architecture design. Storage/ transmission MVC decoder That is, larger Multiview 3DTV on-chip memory allows lower system memory bandwidth. Input frame From view 1 Block engine Entropy coding Compressed data Intra prediction Motion estimation Motion compensation Frame(s) memory MV First view channel MV and DV Second view channel Motion/ disparity estimation Vector coding Vector coding Frame(s) memory Motion/disparity compensation Intra prediction Input frame From view 2 Block engine M u l t i p l e x e r Bitstream Entropy coding Third view channel Nth view channel Figure 1. Overview of an MVC system and the block diagram of an MVC encoder. mance. However, it requires huge computation. Hierarchical search is a fast algorithm to reduce the computation. By hierarchically downsampling the SW, the required number of search candidates can be reduced to about 10 times less than that of full search. However, the computation is still too large to be processed for the HD MVC specifications. As shown in Fig. 2a, the required instructions per second (IPS) is over 1000 GIPS even when hierarchical search is adopted. Meanwhile, the high-end quad-core CPU by Intel, QX9770, can only provide 60 GIPS. According to this analysis, hardware acceleration is needed for an HD MVC encoder design. 78 Communications IEEE Another design challenge of an HD MVC encoder is the large data throughput requirement. To encode an N-view MVC sequence, the throughput requirement is about N ore more times that of encoding a conventional single-view sequence. However, throughput on some modules cannot be enlarged by simply duplicating and parallel processing. Taking the entropy coding, for example, the entropy coder in H.264/AVC and MVC, content-based adaptive binary arithmetic coding (CABAC), has very strong data dependence since it needs to consider the previous symbols when generating the current symbol. Therefore, most existing IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F CABAC symbol rate 2000 IMDE computation in MVC 1E+5 Maximum symbol count Average symbol count 1800 Symbols/MB Instructons/s (GIPS) 1600 1E+4 1E+3 60 GIPS== QX9770 1E+2 1200 1000 800 600 10 Full search Hierarchical search Throughput limit of one-symbol CABAC 400 1 200 20 0 8 12 x7 x2 0 8 12 20 x7 x3 20 0 8 12 x7 (a) x4 0 92 80 x2 0 x1 80 0 92 1 x3 0 0 x1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Frame number 1 (b) SRAM size in MVC System bandwidth in MVC 10000 10 Level C Level C+ Level D Hier. 1000 kbytes Gbyte/s 1400 1 100 Level C Level C+ Level D Hier. 10 1 0.1 80 12 x 0 72 x2 80 12 x 0 72 x3 80 12 (c) x 0 72 0 2 19 x4 x1 0 08 x2 0 08 0 2 19 x1 x3 20 80 12 x2 20 x7 80 12 x7 x3 80 12 (d) 20 x4 x7 20 19 80 x2 80 0 x1 20 x3 0 x1 19 Figure 2. Design challenges in an HD MVC encoder: (a) IMDE computation analysis; (b) CABAC throughput analysis; (c) system bandwidth analysis; (d) on-hip SRAM size analysis CABAC coder designs can only provide the throughput of one symbol per clock cycle. However, this processing ability is far from the target HD MVC throughput. Figure 2b illustrates the frame-by-frame symbol count analysis result on an HDTV sequence. The red line is the largest throughput of a one-symbol CABAC coder. This throughput limit is calculated from the operating frequency and video resolution. Take our target HD MVC specifications, for example. Considering the systemon-chip (SoC) integration compatibility, the highest operating frequency of the previous H.264/AVC encoders is selected as no more than 200 MHz [4–6]. However, when the target specifications are as high as the HD MVC, the available processing cycles for a macroblock (MB) is only about 350 cycles even the operating frequency is increased to 300 MHz. As shown in Fig. 2b, the symbol count has large variance between frames because the symbol counts of the I-frame and P-frame are much higher than that of the B-frame. A conventional CABAC coder can barely deal with the average case, but is infeasible for the maximum symbol rate. Unfortunately, the symbol rate cannot be raised by increasing the parallelism because of the data dependence issues mentioned above. Therefore, a new and efficient architecture is required. HIGH SYSTEM MEMORY BANDWIDTH AND LARGE ON-CHIP MEMORY SIZE Since hardware acceleration is needed according to the analysis above, further system and memory analysis is required before the implementation. In the architecture design the system memory bandwidth and on-chip memory size are two major limitations. The trade-off between them is classic in architecture design. That is, larger on-chip memory allows lower system memory bandwidth. In a video encoder design, IME, or IMDE in MVC, requires most of the bandwidth and onchip memory because a large SW must be loaded onto the chip for doing IMDE. Typically the width and height of the SW are set to about 10 percent of the frame width and height, respectively. Furthermore, more than one SW is loaded when the frame type is B-frame or the multiple-reference-frame scheme is enabled. In order to reduce the hardware cost, various data reuse schemes, including level C, level C+, level IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 79 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F 350 Cycles/stage Stage 2: IMDE Stage 3: NOP Stage 4: FMDE Pf Stage 1: IMDE Pf Stage 5: FMDE Stage 6: IP and MDC Stage 7: REC Stage 8: Dual-EC and DB MVC encoder chip View-parallel MB-interleaved CTRL EC select View1 cache SRAM EC core 1 IP core IMDE prefetch IMDE core Residue MB SRAM Bitstream buf. Cur. MB buf. Cur. Luma MB buf. FMDE core FMDE prefetch Cur. Luma MB buf. EC core 2 IMDE core MDC core Bitstream buf. Cur. MB buf. IMDE core Rec. MB SRAM MDC MB SRAM DB MB SRAM View2 cache SRAM 128-bit system bus interface System external memory DRAM controller IMDE: Integer ME/DE FMDE: Fractional ME/DE Bus mater/slave IP: Intra prediction MDC: Motion/disparity compensation Processor Video input REC: Reconstruction Pf: Prefetch External bus EC: Entropy coding DB: Deblocking Figure 3. Proposed eight-stage MB pipelined MVC encoder architecture. Note that each stage has about 350 processing cycles if the processing frequency is 300 MHz under HD MVC specifications. D, and hierarchical search, have been proposed in recent years [7]. The system memory analysis of these algorithms for MVC with different numbers of views and resolutions are shown in Figs. 2c and 2d. Different trade-offs between bandwidth and memory size are selected under different algorithms. For example, level D data reuse has the largest on-chip SRAM size and lowest memory bandwidth. From the bandwidth point of view, a high-end SoC with a fairly wide 128-bit bus can only support about 4 Gbytes/s bandwidth even under 100 percent bus utilization and 250 MHz operating frequency. Meanwhile, the required bandwidth is over 5 Gbytes/s for nearly all algorithms listed in Fig. 2c for 1a 080p three-view MVC sequence. On the other hand, if the TSMC 90LP process is used, the lowest point in Fig 2d, which is about 60 kbytes, occupies the equivalent gate count from 0.57 to 1.94 million under different memory compiler 80 Communications IEEE configurations. From Fig. 2d, when the target specification matures, the maximum memory requirement may be as high as dozens or even hundreds of millions of gates, which is far beyond what a high-end SoC system can support. Therefore, a smart strategy to reduce both onchip memory size and system memory bandwidth is desired. PROPOSED MVC ENCODER SOLUTIONS SYSTEM ARCHITECTURE Figure 3 shows the system architecture of the proposed MVC encoder. The encoder contains seven kinds of computation cores, including integer ME/DE (IMDE), fractional ME/DE (FMDE), intra prediction (IP), motion and disparity compensation (MDC), reconstruction IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE (REC), entropy coding (EC), and deblocking filter (DB). According to the design challenges described above, instead of simply raising the parallelism from the conventional three-or four-stage MB pipelined architecture in the previous H.264/AVC encoder design [4–6], an eight-stage MB pipelining is proposed. In order to ease the hardware cost of IMDE, the inter-frame prediction part is split into five MB pipeline stages, and the cache-based prediction core is adopted. After the cache memory is used, two SW prefetching stages for IMDE and FMDE are added to load SWs into on-chip SRAM prior to the processing stage. They not only reduce the burden of the pipeline-cycle budget but also enhance the hardware utilization of IMDE and FMDE cores. An no operation (NOP) stage is inserted to deal with the data dependence between the prefetching and processing stages. After the inter-frame prediction is done, the intra-frame prediction and motion/disparity compensation are performed in parallel in the sixth stage. The reconstruction stage reconstructs the compressed frame as the reference for the following frames. Finally, two CABAC EC modules and one DB module are processed simultaneously in the eighth MB pipeline stage. According to the analysis in the previous section, each pipeline stage only has about 350 cycles under the target HD MVC specifications. PREDICTOR-CENTERED CACHE-BASED MOTION/DISPARITY ESTIMATION According to the analysis in the previous section, the IMDE part accounts for most of the hardware cost. One major reason is that it requires a large SW buffer, which grows proportionally to the frame resolution. Based on previous work on fast search, only 30 percent of the SW area is really used in common intermediate format (CIF), and this utilization decreases to 15 percent in D1 video. That is, much data is loaded to the on-chip SW buffer unnecessarily. However, if we directly shrink the search range, the R-D performance drops greatly. These two characteristics indicate that we only need a small part of data in the SW, but we cannot assume that the location of this part is always close to zero-MV. Therefore, a predictor-centered cache-based IMDE is proposed. The SW is centered by the predictor, so the search range can be reduced with little quality degradation. The cache memory trades off the possibility of cache misses for a much smaller on-chip memory capacity, and is still able to handle the varying and dynamic data access pattern. Figures 4a and 4b are the comparison between the conventional ME algorithm and the proposed predictor-centered algorithm. Figure 4a shows the concept of previous hardware-oriented algorithms. In order to find the relationship between frames, a SW is set on the reference frame around the relative location of the current MB. That is, the center of the SW is the zero motion vector (MV). Since the length of MV grows proportionally to the dimension of video frames, the size of SW also needs to be enlarged to keep the best-matching MV inside, or the quality drops greatly. To prevent this from raising SW cost, the proposed algorithm shown in Fig. 4b takes the relationship between MVs into consideration. Since MBs inside the same object should have similar MVs, MVs from the neighboring MBs can be set as the initial search hint of the current ME process. If we put the SW around the best hint instead of the zero MV, the required SW size can be dramatically reduced because of the inter-MB MV similarity. Based on this concept, the detailed algorithm flow of the proposed predictor-centered algorithm is described as follows. First, several initial hints are set, and each has a tiny SW. The window size is 4 × 4 in our implementation. Second, each candidate in these windows is sent to the IMDE module, and a corresponding R-D cost is calculated. The candidate with the best R-D cost is chosen as the refinement center, and a larger refinement range is defined around it. However, this multiple hints and refinement flow may cause a larger quality drop in cases with non-uniform motion fields. A motion information preserving scheme is proposed to maintain the quality on the complex motion field by getting more accurate initial hints and refining centers. In the proposed scheme motion information is saved and reused in the intra-coded MBs. The MV predictor defined in the standard H.264/AVC is derived from the MV field. As a result, when an MB is intra-coded, its motion information is not encoded, and no MV is available. However, if the MV pointing to the best matched block is stored, even if the intra mode wins the inter/intra mode decision, the MV can still be used as a hint for neighbor MBs. Therefore, motion information is reused instead of being discarded even if the block is intra-coded. After the proposed scheme, the R-D performance on all the test sequences used in JVT H.264/AVC meetings can be maintained as less than 0.1 dB drop even when the SW size is as small as ±16 × ±16 under our target HD MVC specifications. Based on this multiple hints with refinement scheme, the SW can be retargeted MB by MB dynamically, and therefore the requirement on SW size is reduced. Figures 4c and 4d illustrates how the predictors are generated. The performance of this predictor-centered algorithm highly depends on the accuracy of hints. If the hint targets a wrong region, it needs a larger refinement range to compensate for the quality loss, and the benefit of the predictor-centered algorithm is decreased. Two kinds of hints are used to exploit the spatial and temporal correlation of MVs inside the same object. The first is the intra-frame predictors, which are MVs/DVs from the neighborhood MBs. Since the video processing is done in raster-scan order, only MBs above or left to the current MB have MVs available. Thus, the MVs/DVs from the top, top-left, top-right, and left MB are used as the intra-frame predictors. Furthermore, the zero MV and motion vector predictor (MVP) defined in H.264/AVC and MVC, which is the median-filtered result of the top, topright, and left MVs, are also allocated as intraframe predictors. The inter-frame predictors are the other kind of predictors. Because an MVC sequence consists of more than one viewpoint, one IEEE BEMaGS F A motion information preserving scheme is proposed to maintain the quality on the complex motion field by getting more accurate initial hints and refining centers. In the proposed scheme, motion information is saved and reused in the intra-coded MBs. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 81 A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page F Because of the splitting of the intra Search window Frame Current macroblock Initial search hint prediction and reconstruction stages, only one best matched mode is Ref. frame required for Current frame Ref. frame Current frame reconstruction. Consequently, the ME ME cycle budget is enough even under scheme. Time Time the close-loop t t–1 t–1 (a) t (b) View 1 t MV2 Time Cur. MB MV1 DV2 Currrent frame MV1 + DV1 ~=MV2 + DV2 MV2 from best matching MB (c) View DV1 t–1 MVs from neighboring MBs Current frame View 2 . (d) Figure 4. Proposed IMDE algorithm: a) concept of previous hardware oriented algorithms; b) the proposed predictor-centered algorithm; c) intra-frame predictor generation and reuse; d) inter-view predictor generation and reuse. object may be captured in more than one view at the same time. Since the object is the same, the captured motion in different cameras are also similar. Therefore, the MVs from the neighboring views are very strong predictors [8]. In fact, after including the inter-frame predictors, the required refinement range can be shrunk to 4 × 4, the same size as the tiny search window for a hint. That is, the refinement step in ME can be canceled for those views under both ME and DE [9]. In order to support the dynamic hint refinement access pattern without loading all the pixels in all possible locations of SW, a cache system is implemented as the SW buffer. Unlike the conventional cache memory system in the computer architecture field, cache memory used in video processing has several different features. The most significant difference between them is that video data has 2D spatial coherence rather than the 1D addressing in general cache memory design. To fully utilize this coherence, the internal index wraps in two dimensions. The three-tuple vector (x, y, frame-index) is translated to the tag address and the tag. A tag set is pointed by the tag address, and the tag is compared to that set. Upon a cache hit, the word address locates the word in a five-banked on-chip SRAM. 82 Communications IEEE The cache system provides flexible data access. However, the cache miss penalty is considerable. Every time the wanted data are not in the cache, the system needs to be stalled, and the required data is reloaded from the external memory. This stall-and-reload waiting time lowers the hardware utilization. Therefore, two new MB pipelines, IMDE prefetch and FMDE prefetch, are added to the proposed MVC system architecture to lower the cache miss rate. After this scheduling optimization and other proposed cache architecture optimizations, including priority-based replacement policy and a concurrent SW prefetching and reading scheme, the total cycles of cache miss penalty are reduced by 93 percent. That is, only 1.2 misses will happen during one MB pipeline stage, which has 350 cycles. HYBRID OPEN-CLOSED LOOP INTRA PREDICTION Other than the inter-frame prediction, intraframe prediction is also used for reducing the spatial redundancy within a frame. Pixels are predicted from the neighboring pixels. In the H.264/AVC high profile and MVC, there are three kinds of intra predictions: intra4 × 4 (I4) mode, intra8 × 8 (I8) mode, and intra16 × 16 IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F D1 SDTV 1080p HDTV Task Setup Intra_4x4 14 Intra_4x4 14 Blk0 Blk0 Blk0 Blk1 Pred. Rec Pred. rec I16 Blk0 ... Intra_4x4 14 Blk15 Blk15 Pred. R ec I16 Blk1 Chroma ... Chroma Mode0 Mode4 5 I16 Blk0 ... Intra_8x8 910 Cycles 1300 (a) Use reconstructed pixels Blk 0 Blk 5 Blk 2 Blk 3 Blk 6 Blk 7 Blk 8 Blk 9 Blk 10 Blk 11 Blk 12 Blk 13 Blk 14 Blk 15 Use original pixels Prediction stage Setup Blk 4 Blk 1 HD MVC Task Intra_16 Intra_16 Blk0/1 Blk2/3 Pred. Pred. ... Intra_4x4 Intra_4x4 Blk0/1 Blk2/3 Pred. Pred. ... Intra_8x8 Blk0 Pred. Reconstruction stage ... Intra_16 Blk14/15 Pred. Intra_4x4 Blk14/15 Pred. Intra_8x8 Blk4 Pred. Reconstruction of the best pred. mode from I16/I4/I8 Cycles 272 (b) 320 350 (c) Figure 5. Issues and solutions on the intra stage: a) illustration of the throughput bottleneck due to data dependence; b) the pro-posed hybrid open-close loop intra prediction; c) the corresponding processing scheduling. (I16) mode. The 4 × 4 discrete cosine transform (DCT) is used in I4 and I16, while the 8 × 8 DCT is used in I8 mode to further improve the coding efficiency. In previous H.264/AVC designs, intra prediction for the baseline and main profile are well developed for lower specifications like D1 (720 × 480 pixels) and HD 720p. However, there are two main design challenges that lower the efficiency of previous designs. The first issue comes from the data dependence between each subblock. According to the definition of I4 and I8 modes in H.264/AVC standard, each subblock should be processed in zig-zag scan order. Since the predictor pixels in the intra prediction are generated from neighboring blocks and are not available until the neighboring blocks are reconstructed, each subblock should be processed sequentially. This data dependence also causes the other design challenge of low hardware utilization. As Fig. 5a shows, sequential processing scheduling makes it difficult to increase the parallelism. Thus, it costs about 1300 cycles to finish intra prediction of one MB in a D1-size video under single-view encoding. However, as mentioned before, the cycle count available for one MB is only around 350 cycles under the target HD multiview specifications. In order to improve the throughput, the hybrid open-close loop intra prediction scheme is proposed to break the data dependence described above [10]. It is illustrated in Fig. 5b. For subblock boundaries, the original pixels instead of the reconstructed pixels are used as the intra predictor, and this is the open-loop part. This modi- fication is based on the assumption that the difference between the original and reconstructed pixels is very small if the target peak signal-tonoise ratio (PSNR) is higher than 35 dB. In our target HD multiview environment, this assumption works well. For MB boundaries, the reconstructed pixels are still used as predictors since these pixels are already reconstructed in the previous MB pipeline stages. The proposed processing schedule is shown in Fig. 5c. Intra prediction on Blk0 and Blk1 in Fig. 5c can start simultaneously because Blk1 does not need the reconstructed pixels from Blk0. Therefore, the parallelism of intra prediction can be largely improved to meet the target HD MVC specifications with little quality loss. However, this openloop scheme cannot be adopted to the reconstruction step because the original pixels are not available in the decoder side, and mismatch between the encoder and decoder would break standard compliance. For this reason, the reconstruction step is split as a standalone stage. MBs are reconstructed in a closed-loop manner in the reconstruction stage. Because of the splitting of the intra prediction and reconstruction stages, only one best matched mode is required for reconstruction. Consequently, the cycle budget is enough even under the closed-loop scheme. FRAME-PARALLEL PIPELINE-DOUBLED DUAL CABAC Entropy coding compresses data based on the probability distribution of symbols, and it plays an important role in video coding. In the base- IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 83 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Data1 Data2 ctx2 ctx1 State (2-symbol) Symbol Index Context Context modeling Bypass Side information Binary arithmetic coding Range Range Low Low Bitstream Output F Ctx state Update Ctx comparators Binarization BEMaGS Read state 2*(206:1 table) CABAC Syntax element A Output (a) Update Write state 2*(3:1 table) Ctx state Output1 Output2 (b) Task CABAC view1 MB2 CABAC view1 MB1 CABAC view2 MB1 CABAC view1 MB3 CABAC view2 MB2 ... CABAC view2 MB3 ... Cycles 350 Cycle budget of other MB pipelines (c) (d) Figure 6. Issues and solutions on the CABAC stage: a) the system overview of CABAC; b) proposed two-symbol arithmetic coder; c) the frame-parallel scheme of the CABAC stage further improves the symbol rate; d) chip photo of the proposed MVC encoder. line profile, H.264/AVC adopts context-based adaptive variable length coding (CAVLC) as the entropy coder. In the main profile or other advanced profiles, including the MVC, CABAC is adopted. CABAC achieves 9 to 14 percent bit rate savings over CAVLC, but its computation is much more complicated. Furthermore, due to the sequential nature of arithmetic coding, the hardware design makes it extremely difficult to exploit pipelining or parallel techniques. Figure 6a shows the block diagram of CABAC. The inputs of CABAC are syntax elements (SEs) and side information. Syntax elements are the essential data to be coded, such as MB type, prediction mode, and residues. Side information, usually the information of neighboring coded blocks, helps to estimate the probability of symbols. These SEs must be transformed into binary symbols before binary arithmetic encoding. The adaptive effect is achieved through the context (ctx) assigned to the symbol. These ctxs are modeled according to the SE type, side information, and binary index. Symbols with the same ctx have similar statistical properties and use the same adaptive probability state for estimation. Besides normal arithmetic coding, bypass mode is introduced to speed up the encoding process. The symbol along with its associated ctx and bypass flag enters the binary 84 Communications IEEE arithmetic coder. Finally, the arithmetic coder generates an output bitstream. Due to the limited cycle budget in the MB pipeline architecture, an EC engine with a onesymbol arithmetic encoder can only process about 350 symbols in one MB pipeline stage. As discussed earlier, this throughput ability is way below the target HD MVC spec. Therefore, the multisymbol CABAC architecture is proposed [11]. The arithmetic coder is duplicated as in Fig. 6b. For range stage, low stage, and output stage, two one-symbol PEs are directly cascaded. However, we cannot simply cascade two onesymbol state stages because they are possibly the same. The two-symbol state stage is shown on the right of Fig. 6b. The proposed two-symbol arithmetic coder may not provide exactly doubled throughput since the throughput depends on the ctx types. Based on our simulation, the actual throughput of the proposed two-symbol coder is 1.94 times larger than the conventional one-symbol/clock cycle architecture. Applying the two-symbol CABAC architecture can double the throughput. However, for some textured MBs, the two-symbol CABAC architecture still does not meet the throughput requirement. Based on the analysis from previous work, the critical path increases with the number of concurrently processed symbols in the IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE arithmetic coder. For our target operating frequency, 250–300 MHz, architectures processing more than two symbols in parallel are not feasible. Therefore, frame-parallel pipeline-doubled dual (FPPDD) CABAC is proposed to utilize frame-level parallelism. Dual CABAC computation cores are adopted, and each CABAC core has a doubled pipeline cycle budget of 700 cycles. These CABAC computation cores process in an interleaved manner as shown in Fig. 6c. Thus, the frame-parallel scheduling scheme can be adopted to avoid data dependence between the two cores. With circuit- and frame-level optimization, the throughput of the proposed FPPDD CABAC is 3.88 times that of the onesymbol design. CHIP IMPLEMENTATION Besides the above algorithm and architecture optimization, all the other modules, including the view parallel MB interleaved (VPMBI) scheduling controller, fractional motion/disparity estimation [12], and motion/disparity compensation, are also optimized. After adopting all the proposed solutions, a prototype MVC single chip encoder was fabricated by Taiwan Semiconductor Manufacturing Company (TSMC) with 90 nm 1P9M process [13]. The chip photo is shown in Fig. 6d. The core size of the chip is 11.46 mm2 (3.95 mm × 2.90 mm), which contains 1732 kgates. This chip supports both H.264/AVC Multivew High Profile and High Profile at level 5.1. For multiview video coding, the proposed MVC chip can support from the full HD 1080p three views to the HDTV 720p seven views. According to this view scalability, the processing ability can be as high as 4096 × 2160p if the view number is only one. Thus, the proposed chip can support not only the HD MVC encoder, but also the quad full HD (QFHD) H.264/AVC singleview encoding. CONCLUSION In this article several issues in video encoder design for 3DTV applications are discussed. First, the video coding standard development from 2D to 3D video is introduced. Among these standards, MVC, an extension profile in H.264/AVC, provides the best coding efficiency with a dramatically huge computation requirement. Therefore, very large-scale integrated (VLSI) hardware acceleration is required to enable real-time applications. Moreover, the system analysis shows that the previous design methods used in single video coding have dramatic hardware resource requirements and cannot be employed directly. In order to deal with these design challenges, solutions for each module in the MVC encoder, including cache-based and predictor-centered IMDE, hybrid open-close loop intra prediction, and FPPDD CABAC, are proposed. After adopting all the proposed algorithm and architecture optimizations, an MVC single chip encoder is implemented under the TSMC 90 nm process. By the proposed MVC encoder design, the target HD MVC specifications can be supported with different view scalability from the 1920 × 1080p full HD three views to 1280 × 720 HDTV seven views. Furthermore, the single view QFHD H.264/AVC encoding is also supported. With the proposed VLSI techniques, real-time 3D video applications become feasible, and we believe more and more 3D video consumer products can be realized in the near future. IEEE BEMaGS F The frame-parallel scheduling scheme can be adopted to avoid data REFERENCES dependency [1] ISO/IEC MPEG Video and Requirements Group, “Applications and Requirements on 3D Video Coding,” ISO/IEC JTC1/SC29/WG11 N10857, 2009. [2] Joint Video Team of ISO/IEC MPEG and ITU-T VCEG, “Joint Draft 7.0 on Multiview Video Coding,” ISO/IEC JTC1/SC29/WG11 and ITU-T SG16 Q.6 JVT-AA209, Apr. 2008. [3] Joint Video Team of ISO/IEC MPEG and ITU-T VCEG, “WD 1 Reference Software for MVC,” ISO/IEC JTC1/SC29/WG11 and ITU-T SG16 Q.6 JVT-AA212, Apr. 2008. [4] Y.-W. Huang et al., “A 1.3TOPS H.264/AVC Single-chip Encoder for HDTV Applications,” IEEE ISSCC Dig. Tech. Papers, 2005. [5] Y. K. Lin et al., “A 242mw 10mm 2 1080p H.264/AVC High-profile Encoder Chip,” IEEE ISSCC Dig. Tech. Papers, 2008. [6] Z. Liu et al., “A Real-Time 1.41w H.264/AVC Encoder SOC for HDTV 1080p,” IEEE Int’l. Symp. VLSI Circuits Dig. Tech. Papers, 2007. [7] C.-Y. Chen et al., “Level C+ Data Reuse Scheme for Motion Estimation with Corresponding Coding Orders,” IEEE Trans. Circuits Sys. Video Tech., vol. 16, no. 4, Apr. 2006, pp. 553–58. [8] L.-F. Ding et al., “Content-aware Prediction Algorithm with Inter-View Mode Decision for Multiview Video Coding,” IEEE Trans. Multimedia, vol. 10, no. 8, Dec. 2008, pp. 1553–64. [9] P.-K. Tsung et al., “Cache-Based Integer Motion/Disparity Estimation for Quad-HD H.264/AVC and HD Multiview Video Coding,” Proc. IEEE Int’l. Conf. Acoustics, Speech, Signal Process., 2009, pp. 2013–16. [10] T.-D. Chuang et al., “Algorithm and Architecture Design for Intra Prediction in H.264/AVC High Profile,” Proc. Picture Coding Symp., 2007. [11] Y.-J. Chen, C.-H. Tsai, and L.-G. Chen, “Architecture Design of Area Efficient SRAM-Based Multi-Symbol Arithmetic Encoder in H.264/AVC,” Proc. IEEE Symp. Circuits Sys., 2006, pp. 2621–24. [12] P.-K. Tsung et al., “Single-Iteration Full-Search Fractional Motion Estimation for Quad Full HD H.264/AVC Encoding,” Proc. IEEE Int’l. Conf. Multimedia Expo., 2009, pp. 9–12. [13] L.-F. Ding et al., “A 212MPixels/s 4096×2160p Multiview Video Encoder Chip for 3D/Quad HDTV Applications,” IEEE ISSCC Dig. Tech. Papers, 2009, pp. 154–55. between the two cores. With the circuit-level and frame-level optimization, the throughput of the proposed FPPDD CABAC is 3.88 times of the one-symbol design. BIOGRAPHIES PEI-KUEI TSUNG (iceworm@video.ee.ntu.edu.tw) _________________ received his B.S. degree in electrical engineering and M.S. degree in electronics engineering from National Taiwan University, Taipei, Taiwan, in 2006 and 2008, respectively, where he is working toward his Ph.D. degree in electronics engineering. His major research interests include stereo and multiview video coding, motion estimation algorithms, view synthesis algorithms, and associated VLSI architectures. LI-FU DING received his B.S. degree in electrical engineering, and M.S. and Ph.D. degrees in electronics engineering from National Taiwan University in 2003, 2005, and 2008, respectively. In 2009 he joined Taiwan Semiconductor Manufacturing Company as a principal engineer. His major research interests include stereo and multiview video coding, motion estimation algorithms, and associated VLSI architectures. WEI-YIN CHEN received his B.S. degree in electrical engineering and M.S. degree in electronics engineering from National Taiwan University in 2005 and 2008, respectively. In 2007 he was with MIT as a visiting graduate student. His major research interests include super high definition and multiview video coding, associated VLSI architectures, high-level synthesis, and computer architecture. T ZU -D ER C HUANG received his B.S.E.E. degree from the Department of Electrical Engineering, National Taiwan Uni- IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 85 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page versity in 2005. Now he is working toward his Ph.D. degree in the Graduate Institute of Electronics Engineering, National Taiwan University. His major research interests include the algorithm and related VLSI architectures of H.264/AVC, and scalable video coding. YU-HAN CHEN received his B.S. degree from the Department of Electrical Engineering, National Taiwan University in 2003. He is currently pursuing his Ph.D. degree at the Graduate Institute of Electronics Engineering, National Taiwan University. His research interests include image/video signal processing, motion estimation, algorithm and architecture design of H.264 video coders, and low-power and power-aware video coding systems. P AI -H ENG H SIAO received his B.S.E.E. degree from the Department of Electrical Engineering, National TsinhHua University, Hsinchu, Taiwan, in 2007. Now he is working toward his Master’s degree in the Graduate Institute of Electronics Engineering, National Taiwan University. His major research interests include the algorithm and architectures of video coding and neural signal processing. SHAO-YI CHIEN [S‘99, M‘04] received B.S. and Ph.D. degrees from the Department of Electrical Engineering, National Taiwan University in 1999 and 2003, respectively. During 2003 to 2004 he was a research staff member at Quanta Research Institute, Tao Yuan County, Taiwan. In 2004 he joined the Graduate Institute of Electronics Engineering and Department of Electrical Engineering, National Taiwan University, as an assistant professor. Since 2008 he has been an associate professor. His research interests include video segmentation algorithms, intelligent video coding technology, perceptual coding technology, image processing for digital still cameras and display devices, computer graphics, and the associated VLSI and processor architectures. He has published more than 120 papers in these areas. He serves as an Associate Editor for IEEE Transactions on Circuits and Systems for Video Technology and Springer Circuits, Systems, and Signal Processing, and served as a Guest Editor for Springer Journal of Signal Processing Systems in 2008. He also serves on the Technical Program Committees of several conferences, including ISCAS, A-SSCC, and VLSI-DAT. 86 Communications IEEE A BEMaGS F L IANG -G EE C HEN [S‘84, M‘86, SM‘94, F‘01] received B.S., M.S., and Ph.D. degrees in electrical engineering from National Cheng Kung University, Taiwan, in 1979, 1981, and 1986, respectively. He was an instructor (1981–1986) and an associate professor (1986–1988) in the Department of Electrical Engineering, National Cheng Kung University. In the military service during 1987 and 1988, he was an associate professor in the Institute of Resource Management, Defense Management College. In 1988 he joined the Department of Electrical Engineering, National Taiwan University. During 1993 to 1994 he was a visiting consultant at the DSP Research Department, AT&T Bell Labs, Murray Hill, New Jersey. In 1997 he was a visiting scholar of the Department of Electrical Engineering, University of Washington, Seattle. Currently, he is a professor at National Taiwan University. Since 2004 he has also been the executive vice president and general director of the Electronics Research and Service Organization (ERSO) in the Industrial Technology Research Institute (ITRI). His current research interests are DSP architecture design, video processor design, and video coding systems. He is a member of the honor society Phi Tau Phi. He was the general chairman of the 7th VLSI Design CAD Symposium. He is also the general chairman of the 1999 IEEE Workshop on Signal Processing Systems: Design and Implementation. He has served as an Associate Editor of IEEE Transactions on Circuits and Systems for Video Technology since June 1996 and as an Associate Editor of IEEE Transactions on VLSI Systems since January 1999. He has been an Associate Editor of the Journal of Circuits, Systems, and Signal Processing since 1999. He served as a Guest Editor of the Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology in November 2001. He is also an Associate Editor of IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing. Since 2002 he has also been an Associate Editor of Proceedings of the IEEE. He received the Best Paper Award from the R.O.C. Computer Society in 1990 and 1994. From 1991 to 1999 he received Long-Term (Acer) Paper Awards annually. In 1992, he received the Best Paper Award of the 1992 Asia-Pacific Conference on Circuits and Systems in VLSI design track. In 1993 he received the Annual Paper Award of the Chinese Engineer Society. In 1996 he received the Outstanding Research Award from NSC and the Dragon Excellence Award from Acer. He was elected as the IEEE Circuits and Systems Distinguished Lecturer in 2001–2002. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F ____________ _______ _____________ Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F INTEGRATED CIRCUITS FOR COMMUNICATIONS An Embedded 65 nm CMOS Baseband IQ 48 MHz–1 GHz Dual Tuner for DOCSIS 3.0 Francesco Gatta, Ray Gomez, Young Shin, Takayuki Hayashi, Hanli Zou, James Y.C. Chang, Leonard Dauphinee, Jianhong Xiao, Dave S.-H. Chang, Tai-Hong Chih, Massimo Brandolini, Dongsoo Koh, Bryan J.-J. Hung, Tao Wu, Mattia Introini, Giuseppe Cusmai, Ertan Zencir, Frank Singor, Hans Eberhart, Loke Tan, Bruce Currivan, Lin He, Peter Cangiane, and Pieter Vorenkamp, Broadcom Corporation ABSTRACT An embedded CMOS digital dual tuner for DOCSIS 3.0 and set-top box applications is presented. The dual tuner down-converts a total of ten 6 MHz Annex B channels or eight 8 MHz Annex A channels, for a maximum data rate of 320 Mb/s in Annex B and 400 Mb/s in Annex A mode. The dual tuner exceeds all the stringent SCTE 40 specifications over the 48–1004 MHz bandwidth, without using any external components or SAW filters. Enabling technologies are a harmonic rejection front-end, a low-noise highfrequency resolution PLL, and digital image rejection. To our knowledge this is the first reported multichannel broadband tuner embedded in a DOCSIS 3.0 System on a chip implemented in 65 nm pure digital CMOS technology. MOTIVATION The convergence of data, audio, and video over the Internet medium is resulting in ever increasing data bandwidth needs. Due to customer demand and competition from other services, cable television (CATV) service providers are motivated to deliver data rates that far exceed the capabilities of presently available cable networks. Data Over Cable Service Interface Specification (DOCSIS) is the standard that regulates high-speed data transfer over cable TV networks. In order to compete with the higher bandwidth offered, for example, by gigabit passiver optical network (GPON) and very-highrate digital subscriber line (VDSL) services, cable providers have introduced the DOCSIS 3.0 standard [1]. DOCSIS 3.0 provides bandwidth increase as well as additional customer flexibility by bonding together multiple downstream (DS) data or video channels. To increase the penetration of digital cable services in cost-sensitive emerging markets, more cost-effective and robust tuner integrated circuit (IC) solutions are necessary. CATV tuners must operate with good performance over a wide 88 Communications IEEE 0163-6804/10/$25.00 © 2010 IEEE range of cable plant conditions, ranging from high-power-loading scenarios requiring exceptional linearity, to extremely-low-power conditions where linearity must be traded off for optimized noise performance. Although terrestrial analog transmissions are being replaced with digital channels in many countries, legacy analog channels still coexist with digital channels on the CATV medium. Because the analog channels are usually broadcast at significantly higher power than the digital channels, the tuner dynamic range requirements are substantial. Besides robust operation under different signal loading scenarios, we desire an architecture that is easily adaptable to multichannel cable modem DOCSIS 3.0 applications and can be used for multituner digital video recorder (DVR) or personal video recorder (PVR) set-top box (STB) applications. A cost-effective multichannel multituner solution can be achieved by integrating the tuner, digital demodulator, MPEG decoder, memory, and processor core on a single system on chip (SoC), with considerable savings in power and system complexity. This article reports a 65 nm complementary metal oxide semiconductor (CMOS) dual tuner embedded in a low-cost low-power DOCSIS 3.0 cable modem SoC that can demodulate up to 8 DS channels with frequency flexibility. In addition, although in the majority of cable plants the highest spectrum frequency is 864 MHz, cable providers are extending the CATV bandwidth to 1 GHz to deliver more services. Therefore, we designed the tuner to operate between 48 MHz and 1 GHz to allow deployment in all present and future extended cable plants. The next section describes the tuner requirements, including the SCTE 40 requirements, in more detail. We then describe the challenges related to the tuner design for DOCSIS 3.0, while the following section describes the dual tuner architecture. Circuit details are then presented, and the final section reports experimental results. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F DOCSIS 3.0 FREQUENCY ALLOCATION AND PERFORMANCE REQUIREMENTS The CATV radio frequency (RF) input frequency ranges between 54 and 864 MHz. The DOCSIS standard calls for 64-quadrature amplitude modulation (QAM) or 256-QAM modulated digital channels, occupying the same bandwidth as conventional analog TV channels. DOCSIS symbol rates are 5.36 MHz (corresponding to a 6 MHz RF bandwidth) for Annex B (United States) and 6.952 MHz (corresponding to an 8 MHz RF bandwidth) for Annex A (worldwide). 256-QAM modulation gives an effective data rate up to 38 Mb/s in DOCSIS 2.0. DOCSIS 3.0 allows a minimum data rate of 152 Mb/s by bonding any four channels in a 64 MHz contiguous RF bandwidth. Solutions that allow even more DS channel bonding and provide more flexibility in the allocated frequency spectrum are preferred by cable operators. For cable modem applications, the tuner must meet the DOCSIS specifications [1]. For STB applications, the requirements for the U.S. market are summarized in the SCTE 40 standard [2]. Most customers currently require SCTE 40 compliance for all CATV applications; therefore, in this work the tuner design has focused on meeting the more stringent SCTE 40 specifications. SCTE 40 specifies a set of demodulation scenarios in terms of desired signal power levels, analog adjacent channel interference (ACI) levels, digital ACI levels, and cable plant loading with analog and digital channels. The standard specifies channel impairments, such as incoming phase noise, echoes, power line hum, and input signal-to-noise ratio (SNR), which represents the noise generated by the CATV distribution system. In a worst-case 256-QAM scenario, the tuner and demodulator must be able to operate error-free with a –12 dBmV desired channel with +16 dBc analog ACI or +12 dBc digital ACI combined analog and digital loading of the CATV spectrum, 33 dB input SNR, echoes, hum, and added phase noise. The demodulator requires about 29 dB SNR to operate error-free with margin, which means that the tuner itself must handle the above conditions with at least 32 dB SNR. The 64-QAM low-power worst-case scenario is less stringent than 256-QAM because error-free video requires an SNR greater than 23 dB. TUNER DESIGN CHALLENGES AND SPECIFICATIONS A typical U.S. cable TV spectrum, shown in Fig. 1, includes legacy analog channels coexisting with digital channels, with the analog channels usually between 54–550 MHz and the digital channels extending to 864 MHz. This broadband signal spectrum imposes stringent requirements on tuner design parameters such as harmonic rejection, dynamic range, spurious pickup, and local oscillator (LO) purity. Harmonic rejection means that the tuner must cope with signals located at the harmonics of the LO, since they can be down-converted in the mixing operation to the same intermediate frequency (IF) as the Figure 1. Cable spectrum. desired channel, degrading SNR. Second-order and third-order distortion products (composite second order [CSO] and composite triple beat [CTB]) from many different frequencies can fall on the desired signal and must be minimized by using highly linear RF blocks. However, the linearity cannot be obtained at the expense of noise figure (NF), leading to high dynamic range requirements. In a broadband RF receiver, particular care must be taken to avoid spurious noise pickup, in both the signal path and the synthesizer. This task is especially challenging in an SoC environment, where the digital noise sources are too numerous to avoid spurious noise pick-up by proper frequency planning. To meet the stringent CATV requirements, previously reported high-performance silicon tuner designs have been RF standalone ICs isolated from the noisy SoC environment [3–5]. The design in [5] uses a dual-conversion architecture, while [3, 4] use a single-conversion low-IF architecture, with integrated active filters [4] or a system in package (SiP) solution where high-selectivity filters are implemented in the package substrate [3]. The first approach uses expensive external surface acoustic wave (SAW) filters, and the long receive path results in high power consumption and overall system complexity. The low-IF SiP architecture reduces power consumption significantly, due to the external tracking filters that dramatically reduce the tuner dynamic range requirements. However, this approach is not suitable for multichannel applications because of the difficulty in maintaining good image rejection over many channels. Most important, both architectures are expensive for integration in SoCs, given the use of bipolar CMOS (BiCMOS) technology [5] and the prohibitive cost of the SoC package for SiP components [3]. The tuner design is even more challenging for a DOCSIS 3.0 application due to the channel bonding requirement. Multiple tuners can be used to implement a DOCSIS 3.0 system, with each tuner down-converting a single channel. This provides full frequency flexibility at the expense of system cost and power. On the other hand, a single tuner can down-convert the full 64 IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 89 A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page F 32 MHz Image rejection is -2 -1 enhanced digitally, 0 +1 +2 Tuner 1 LO taking advantage of Tuner 1 the tuner integration into the SoC, LPF 2.5-20MHz LPF HRM eliminating the need Tuner 1 I path Tuner 1 ADC for part-to-part TIA calibration. An HR innovative PLL PGA VGA 0,-5dB, -10dB,-15dB DS AGC -2 -2 -1 -1 0 0 +1 +1 +2 +2 LO generation 1 architecture achieves HR low phase noise and Tuner 1 Q path low reference spurs while providing very RF PGA CAM-DS IMC RF fine frequency resolution. RF splitter Tuner 2 Q path RSSI LO generation 2 HR Tuner 2 I path HR HR RFFE Tuner 2 Tuner 2 32 MHz -2 -1 0 +1 +2 Tuner 2 LO Figure 2. Dual tuner top-level block diagram. MHz RF bandwidth with reduced system power and complexity, but no frequency flexibility since all the channels need to be contiguous. TUNER ARCHITECTURE This article presents a CMOS dual digital CATV tuner for embedded SoC multichannel applications that simultaneously provides frequency flexibility, low system cost and power, and superior tuner performance [6]. Two tuners, each able to select an agile 32 MHz frequency band, can down-convert ten 6 MHz Annex B channels, or eight 8 MHz Annex A channels. Figure 2 shows the top-level block diagram. The RF signal is amplified by an external low noise amplifier (LNA), which drives an internal splitter, followed by the two baseband IQ tuners. Each tuner downconverts five 6 MHz Annex B channels to IF frequencies centered at DC with respect to the tuner local oscillator (channel 0), +6 MHz (channel +1), +12 MHz (channel +2), –6 MHz (channel –1), and –12 MHz (channel –2). For Annex A, one tuner down-converts four 8 MHz channels to IF frequencies centered at +4 MHz (channel +1), +12 MHz (channel +2), –4 MHz (channel –1), and –12 MHz (channel –2). Channels +1 and +2 are located at the images of channels –1 and –2, respectively. The baseband IQ architecture acts as direct conversion for channel 0 and low-IF conversion for all the other channels. Any or all channels can be selected for 90 Communications IEEE demodulation by the SoC, up to a maximum of eight. Following the tuner, an eight-channel multirate 64–256–1024-QAM downstream (DS) receiver separates and demodulates the eight channels individually. This architecture does not require a SAW filter, allowing complete integration in the SoC. Each tuner core included in this RF front-end is designed to meet both DOCSIS and SCTE 40 standards. To suppress signals at the odd harmonics of the LO, a harmonic rejection mixer (HRM) is used in combination with a highly linear RF-tracking filter. Image rejection is enhanced digitally, taking advantage of the tuner integration into the SoC, eliminating the need for part-to-part calibration. An innovative phase locked loop (PLL) architecture achieves low phase noise and low reference spurs while providing very fine frequency resolution. The dual tuner core has been integrated in a 65 nm CMOS technology DOCSIS 3.0 cable modem SoC that contains more than 32 million gates. Embedding a noise-sensitive broadband tuner in the SoC is particularly challenging because the double data rate (DDR) clock/data and million instructions per second (MIPS) clock fall in the middle of the RF band. A significant amount of noise pickup occurs in the package leads and bond wires. By moving the LNA off chip, the signal level is raised at the noisy boundary, and pickup suppression requirements are relaxed. The external variable gain LNA (VGLNA) provides up to 20 dB power gain with IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F HR filter LO1 Flo 3Flo 5Flo IF OUT 2 7Flo 9Flo LO2 Flo 3Flo 5Flo 7Flo 9Flo 1 1 IF OUT 1/3 1/5 -1 Flo LO1 1/7 1/9 1/7 1/9 LO2 2 Flo LO3 Flo3Flo 5Flo 7Flo 9Flo 1 LO3 7Flo 9Flo LO=LO1 + 2 LO2 + LO3 (a) (b) TIA CMFB + - LOP_0 LON_0 RFP W/L LOP_0 LOP_45 RFN RFP IF OUT LOP_90 LOP_45 LON_45 RFN 2W/L RFP LOP_90 LON_90 W/L RFN (c) Figure 3. Harmonic rejection mixer: a) harmonic folding; b) harmonic rejection concept; c) harmonic rejection mixer. 5 dB NF and a stable and high output thirdorder intercept point (OIP3) over a 30 dB gain range thanks to an internal received signal strength indicator (RSSI) [7]. TUNER AGC In a cable environment the tuner input power is more tightly controlled than in a terrestrial environment where few strong ACI are present. In cable applications the ACI level is kept low, +16 dBc for 256-QAM, but the number of channels is very high. The high number of channels and high-order QAM modulation call for a continuous automatic gain control (AGC) approach. For this reason our work uses a mixed programmable Gain Attenuator (PGA)-Variable gain amplifier (VGA) approach with 50 dB VGA range and 40 dB PGA range. Two separate continuous AGC loops are used, one at RF in the VGLNA and one in the tuner baseband in the IF VGA. The AGC of the VGLNA is controlled by a wideband internal RSSI, and guarantees a constant power at the SoC tuner input. The desired channel power variations are compensated in the IF VGA, which is driven by the average power measured in the digital demodulator after the ADC. The RF AGC is optimized for the best noise figure in the different loading scenarios, while the IF AGC maximizes the ADC loading. TUNER RECEIVE PATH The block diagram of the tuner receiver slice plus splitter and RF front-end (RFFE) is shown in Fig. 2. A resistor ladder acts as impedance matching and tapped RF attenuator that optimizes the dynamic range for the two tuners. Each tuner uses an IQ baseband architecture with no external filters or SAW filters to minimize external components. This brings design challenges that must be addressed, as we discuss in the following subsections. HARMONIC REJECTION FRONT-END In a conventional Gilbert cell mixer, the LO switches are hard driven to improve linearity and optimize noise figure. However, this generates LO harmonics, where channels present at the LO harmonics are folded on top of the desired channel, degrading SNR, as shown in Fig. 3a. By using more LO phases and summing them with the right weighting, it is possible to approximate a sinusoidal switching that does not contain harmonics other than the fundamental [8]. This design uses the 0°, 45°, and 90° LO phases to suppress the third and fifth harmonics (Fig. 3b). The harmonic suppression is limited by LO phase inaccuracies and gain mismatch, but careful design and the high-speed capabilities provid- IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 91 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page environment the terrestrial environment where few strong ACI are present. In cable +1 -2 -1 tuner input power is controlled than in a BEMaGS F Channel power In a cable more tightly A Channel power 0 Frequency DC -2 +1 -1 0 +2 ADC I I(n) LO_I Flo Imbalance canceller Frequency ADC applications the ACI level is kept very low, +2 Q(n) QAM receiver Q LO_Q +16 dBc for 256-QAM, but the + I number of channels - Σ I*(1-Wa) Σ I(n) - is very high. Wa Q Wq + + Σ Q*(1+Wa) Wa Σ - Q(n) I 2 - Q2 Wq I*Q Figure 4. Single-tap image rejection. ed by our 65 nm CMOS process guarantee a minimum harmonic rejection (HR) of 40 dB. In order to reject the seventh and ninth harmonics and guarantee a total rejection greater than 65 dB for all the LO harmonics, the embedded tuner incorporates an RF tracking filter in the DOCSIS 3.0 SoC. Two source followers isolate the two tuners, reducing the cross-LO leakage, and provide a low-ohmic drive of the tracking filter. If the average frequency of the desired channels is below 330 MHz, the low-pass tracking filter is selected; otherwise, the mixer is directly connected to the splitter. This filter is exposed to the full RF input power, thus requiring extremely high linearity and low noise figure. To reduce the filter input power, a wide bandwidth first-order pole precedes the filter and implements a programmable gain optimizing the dynamic range for the specific spectrum loading condition that is encountered. A third-order Butterworth filter is implemented with a complex pole from a biquad and a real passive pole. An active RC approach is preferred over a GmC approach for its higher linearity and ease of tuning. The noise figure constraint determines the resistor value, from which the capacitor size can be derived and hence the power dissipation. To achieve the required linearity, the op-amp unity gain bandwidth needs to be higher than 3 GHz. Such high unity gain bandwidth can be obtained using the high-speed devices available in our 65 nm CMOS process. The filter bandwidth ranges between 50 and 330 MHz, and is tuned with a bank of switched capacitors. Tuning with capacitors allows the filter to keep the same 92 Communications IEEE noise density and hence the same NF for all programmed cutoff frequencies. HARMONIC REJECTION MIXER The harmonic rejection mixer (HRM) schematic is described in Fig. 3c. Three pseudo differential pairs with resistive degeneration amplify the RF signal with good NF and linearity. The three transconductance stages are weighted 1:32:1 and their outputs are multiplied in a Gilbert multiplier cell by three phases of the LO (at 0°, 45°, and 90°). The current outputs of each mixer are summed together and injected into the virtual ground of a trans-impedance amplifier (TIA) that limits the voltage excursion on the mixer output, thereby increasing linearity. A first-order pole in the TIA feedback reduces the dynamic range for the tuner back-end by attenuating higher frequency adjacent channels, while the capacitor area is minimized by means of the virtual ground operation. The TIA gain and first order pole are programmable to cover singlechannel and multichannel operation, and increase the overall tuner dynamic range. TUNER BASEBAND After the TIA, a fifth-order Butterworth lowpass filter (LPF) serves as an anti-aliasing filter and attenuates interferers that would saturate the ADC. The LPF bandwidth is programmable from 2.5 to 22 MHz to handle single-channel and multichannel applications. In the multichannel case, the filter must operate with five inband channels whose combined power can be up to 22 dB higher than the minimum desired chan- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page nel, demanding very high in-band linearity to minimize cross-channel intermodulation and clipping. To optimize the trade-off between linearity and NF, the LPF is implemented as two biquads plus a real pole in the TIA. The biquad architecture offers more flexibility in the filter design because the high-Q and low-Q biquads can be positioned based on the best trade-off between linearity and noise. Following the baseband LPF, a PGA and VGA set the ADC input power, avoiding saturation of the ADC. A 20 dB continuous IF VGA tracks cable plant power variation and compensates for process, temperature, and voltage changes by keeping a constant input power at the ADC input. It maintains full ADC loading based on the multichannel signal, independent of the individual channel power values. The main challenge in this architecture is to keep the output linearity high under all loading scenarios, while not degrading the SNR for each individual channel. Note that low-power desired channels can coexist with high-power wanted and unwanted channels. Each tuner uses a dual 11-bit 175 Msamples/s pipeline 9.5 ENOB ADC to digitize the five-channel block. IMAGE REJECTION In traditional dual- or single-conversion low-IF architectures, image rejection (IR) is implemented in the analog domain using external SAW filters or by means of calibration of the analog imperfections during power-up [3, 5]. In our design IR is enhanced in the downstream demodulator, while continuously receiving real stream data without need for power-up calibration. In order to demodulate each of the five channels present in the 32 MHz down-converted band, the corresponding images need to be cancelled. The down-conversion of a block of five 6 MHz channels with the imbalance canceller is shown in Fig. 4. Due to imperfections of the IR, image channel information will leak into the desired channel. For example, channel +1 would leak on top of channel –1 and vice versa, degrading SNR. In order not to degrade the overall system performance in the presence of all the channel impairments, the SNR due to the image must be higher than 45 dB for a 256-QAM modulated signal. Given that the maximum specified ACI from SCTE 40 is 16 dB for 256-QAM, the IR must be higher than 61 dB. The finite IR is mainly due to gain imbalances between the I and Q path and phase errors in the LO quadrature generation. As a result of the IQ gain imbalance, the amplitudes of the I and Q outputs are different, while the effect of an LO quadrature error is a non-zero product between I and Q. Following the baseband analog-to-digital conversion (ADC), two correction circuits cancel any gain and phase imbalance by driving to zero the gain error (I2 – Q2) and the phase error (I * Q). This removes any cross-correlation between the two quadrature paths. In the gain imbalance canceller, the average difference between I2 and Q2 (Wa) is used to equalize the I and Q paths by multiplying the I-path by (1 – Wa) and the Qpath by (1 + Wa). To eliminate phase imbalances, the product between I and Q (Wq) is 8 bit DAC DDFS XTAL Reference PLL X 20 Mixer PLL X 24 1000MHz 2-4GHz IEEE F /4,/8, /16,/32,/64 LO_Q Tuner 2 Figure 5. PLL block diagram. multiplied by the I-path and subtracted from the Q-path; similarly, Wq is multiplied by Q-path and subtracted from I-path. PLL ARCHITECTURE Demodulation of 256-QAM signals requires an in-band integrated phase noise better than 50 dBc. A low in-band phase noise can be achieved by increasing the LO PLL bandwidth. However, QAM demodulators also require frequency resolution in the tens of kilohertz, which demands a very low PLL bandwidth. This is the typical trade-off between in-band phase noise, reference PLL spurs, and the PLL frequency step size present in classical integer-N PLLs. Fractional-N PLLs have been commonly used in cable tuners to widen the PLL bandwidth and obtain fine frequency resolution [3, 5, 9], but they have the potential to produce fractional spurs. In a dual conversion architecture fractional spurs can be tuned out of the desired channel by moving the up-conversion LO and the down-conversion LO conveniently. This is not possible in a single- or direct-conversion architecture such as ours. Spurs due to digital noise pickup by the PLL are also an issue. It is sometimes possible to avoid these spurs by careful frequency planning, but this is very difficult in a complex SoC, where there are many asynchronous clock domains. The PLL for a CATV tuner must have very low out-of-band (OOB) spurs to avoid folding of the composite analog and digital loading. In this article we present a PLL architecture that combines high frequency resolution with a wide loop bandwidth, without introducing fractional reference spurs (Fig. 5). A 50 MHz low-cost differential crystal oscillator clock is multiplied to approximately 1 GHz by a fixed frequency reference PLL. This serves as the reference for the 32-bit direct digital frequency synthesis (DDFS) and an 8-bit digital-to-analog converter (DAC). The DDFS and DAC combination produces the reference clock for an integer-N PLL that drives the down-conversion mixer. This architecture enables sub-kilohertz LO frequency resolution while providing a high-frequency reference, allowing the PLL bandwidth to be increased. A larger loop bandwidth reduces phase noise, improves power supply rejection ratio (PSRR), and shrinks loop filter size, thereby eliminating the need for any external components. Given that the minimum reference frequency is higher than 90 MHz, and the typical PLL bandwidth is around 500 kHz, reference spurs better than –75 IEEE Communications Magazine • April 2010 Communications BEMaGS LO_I 90-180MHz DAC A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 93 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 55 HR RFPE Tuner 2 BEMaGS F Pin=-12dBmV Pin=-6dBmV Pin=+15dBmV 50 Slicer SNR (dB) Reference PLL Tuner 1 A 45 40 35 Error free target (29dB) 30 25 0 (a) 200 400 600 Frequency (MHz) 800 1000 (b) -50 -55 -60 2 -65 ADJ=+16dBc -70 -75 +4dBmv SNR=48dB ADJ=+10dBc -2dBmv SNR=41.5dB -2dBmv SNR=41.5dB -80 18A -12dBmv SNR=34dB -85 -12dBmv SNR=34.5dB -90 -95 -100 CH -2 CH -1 Center 600 MHz CH 0 CH +1 3.2 MHz CH +2 Span 32 MHz (c) (d) Figure 6. Dual tuner die photo and measured results. dBc are achieved. Measurements indicate similar performance for all OOB spurs. An active antialias filter following the DAC attenuates unwanted spurs and the DAC images. The mixer PLL uses an LC-VCO that spans a frequency range between 2 and 4 GHz. The VCO output is divided by 4/8/16/32 or 64 to cover the RF input spectrum, also generating the quadrature and the 0°, 45°, and 90° phases used in the HR mixers. To suppress phase modulation spurs in the VCO, the gain of the VCO is kept low. The 2 –4 GHz VCO range is implemented using a dual tank LC and an array of switched capacitors. The 1 GHz reference PLL uses a low-noise ring-based VCO with 6 MHz bandwidth. EXPERIMENTAL RESULTS A micrograph of the dual tuner is shown in Fig. 6a. In Fig. 6b the measured 256-QAM slicer SNR is shown for three input power levels: –12 dBmV (minimum power for SCTE 40), –6 dBmV (midpower), and +15 dBmV (high power). The minimum power SNR indicates the tuner NF and the margin from SCTE 40 error-free target. The midpower SNR indicates the tuner dynamic range. The high-power SNR represents the tuner peak SNR. The peak SNR drops at higher frequencies due to phase noise limitations. The single-channel 94 Communications IEEE SNR tests have been performed with Internet traffic on. Since there is no frequency where the SNR is substantially degraded due to the presence of spurs, we can conclude that the tuner immunity to signal path and PLL spurs is very high. A DOCSIS 3.0 sample operation is described in Fig. 6c with five channels received simultaneously. The power for channel 0 and channel +2 is –12 dBmV; for channels +1 and –1 it is –2 dBmV (+10 dBc ACI); while for channel –2 it is +4 dBmV (+16 dBc ACI). Channels +2 and –2 are images of each other, and they must be separated before demodulation. Therefore, the SNR of channels 0 and +2 is a good measure of the IR achieved. By noting that there is hardly a difference in SNR between channel 0 and channel +2, we can conclude that over-all IR performance is exceeding 60 dB. 1024 QAM modulation can provide a 25 percent throughput improvement over 256 QAM modulation, further increasing the DOCSIS 3.0 data rate at the expense of more tuner dynamic range. In Fig. 6d a constellation for an 847 MHz, +15 dBmV input power clean channel with 47 dB SNR is shown. Phase noise for the 1 GHz LO is –99 dBc/Hz at 10 kHz offset, while it is better than –122 dBc/Hz at 1 MHz offset. The in-band integrated phase noise at 1 GHz is 0.2° root mean square (rms) from 5 kHz to 10 MHz. PLL out- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page F Gupta ISSCC ’07 [9] Tourret JSCC ’07 [3] Stevenson ISSCC ’07 [5] This work 48–864 MHz 48–864 MHz 48–864 MHz 48–1000 MHz have different tuner 5–7 dB requirements. In the Cable modems for VoIP applications Input range NF 4–7 dB 5 dB 6–8 dB case of an electrical 256 QAM sensitivity PN @ 10 KHz –22 dBmV –90 dBc –90 dBc –85 dBc –100 dBc power outage, the cable modem must be able to operate in CTB/CSO –53/–115 dBc –57/–57 dBc –65/–60 dBc –66/ –64 dBc IR 61 dB 62 dB 75 dB >62 dB Max input power 44 dBmV 50 dBmV External filter NO YES (SiP) YES NO SoC integration NO NO NO YES Multiple channels NO NO — YES DS channels 8 Power (DOCSIS-VoIP) 540 mW, 1.8 V — — 800 mW, 2.5 V Tuner power (SCTE 40) — 780 mW, 3.3 V 1500 mW, 5 V 1100 mW, 2.5 V LNA = 400 mW RX = 400 mW PLL = 250 mW REFPLL = 50 mW ADC = 200 mW Process 0.18 +m CMOS 0.25 +m SiGe (SiP) 0.35 +m SiGe 65 nm CMOS Area (one tuner) 25 mm2 5.7 mm2 (die) 9 mm * 9 mm (SiP) 7.25 mm2 5 mm2 battery backup mode and guarantee continuity of phone service. Power consumption for the cable modem SoC and the tuner must be minimized at the expense of performance. Table 1. Performance summary and comparison with published literature. of-band (OOB) and reference spurs are better than –75 dBc over the full cable band. With 135 +15 dBmV (–32 dBm) analog channels, the measured CTB, CSO and cross modulation (XMOD) are better than –66 dBc, –64 dBc, and –60 dBc respectively. The tuner can operate in two power modes: SCTE 40 mode when used in set-top box applications and DOCSIS mode when it is used in a cable modem application. The SCTE 40 low power worst-case condition for –12 dBmV input power, +16 dBc ACI, 33 dB cable SNR, and cable plant loading is met with 1.5 dB worst case minimum margin. In a fully loaded test like SCTE40, PLL spurs can fold all the high power ACI on top of the desired channel. Good margin over the specifications testify for the purity of the tuner LO. Cable modems for VoIP applications have different tuner requirements. In the case of an electrical power outage, the cable modem must be able to operate in battery backup mode and guarantee continuity of phone service [10]. Power consumption for the cable modem SoC and the tuner must be minimized at the expense of performance: typical ACI levels are lower than 10 dBc, cable input SNR is 34 dB, and cable loading is lower than SCTE 40. With reduced power consumption, the tuner meets DOCSIS requirements over frequency with similar margins as SCTE40 operation. Finally, a performance summary with a comparison with the state of the art is shown in Table 1. CONCLUSIONS An embedded CMOS digital dual tuner for DOCSIS 3.0 and set-top box applications has been presented. The dual tuner can down-convert a total of ten 6 MHz Annex B channels or eight 8 MHz Annex A channels, for a maximum data rate of 320 Mb/s in Annex B and 400 Mb/s in Annex A mode. The dual tuner exceeds all the stringent SCTE 40 specifications over the 48–1004 MHz bandwidth, without using any external components or SAW filters. Enabling technologies are a harmonic rejection front-end, a low-noise high-frequency-resolution PLL, and digital image rejection. ACKNOWLEDGMENTS The authors would like to thank J. Brannon, S. Freville, R. Nguyen, R. Whitehead, and D. McMullin for their support. IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 95 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page REFERENCES [1] CableLabs, “Data Over Cable Service Interface Specifications, DOCSIS 3.0, Physical Layer Specification,” CM-SPPHYc3.0-I07-080522, May 22, 2008. [2] SCTE Eng. Committee, “Digital Cable Network Interface Standard,” ANSI/SCTE 40, 2004. [3] J. R. Tourret et al., “SIP Tuner with Integrated LC Tracking Filter for Both Cable and Terrestrial TV Reception,” IEEE J. Solid-State Circuits, vol. 42, no. 12, Dec. 2007, pp. 2809–21. [4] J. van Sinderen et al., “A 48 MHz to 860 MHz Digital Cable Tuner IC with Integrated RF and IF Selectivity,” IEEE ISSCC Dig. Tech. Papers, Feb. 2003, pp. 444–45. [5] J. M. Stevenson et al., “A Multi-Standard Analog and Digital TV Tuner for Cable and Terrestrial Applications,” IEEE ISSCC Dig. Tech. Papers, Feb. 2007, pp. 210–11. [6] F. Gatta et al., “An Embedded 65 nm CMOS Baseband IQ 48 MHz–1 GHz Dual Tuner for DOCSIS 3.0,” IEEE J. Solid-State Circuits, vol. 44, no. 12, Dec. 2009, pp. 3511–25. [7] D. Manstretta et al., “A Highly Linear Broadband Variable Gain LNA for TV Applications,” IEEE CICC ‘07, Sept. 2007, pp. 531–34. [8] J. Weldon et al., “A 1.75 GHz Highly Integrated Narrow-Band CMOS Transmitter with Harmonic Rejection Mixers,” IEEE J. Solid-State Circuits, vol. 36, Dec. 2001, pp. 2003–15. [9] M. Gupta et al., “A 48-to-860 MHz CMOS Direct Conversion TV Tuner,” IEEE ISSCC Digest Tech. Papers, Feb. 2007, pp. 206–7. [10] CableLabs, “PacketCable 1.5 Specifications MIBs Framework Specification,” PKT-SP-MIBS1.5-I02-070412, Apr. 12, 2007. ADDITIONAL READING [1] ITU-T G.984.1, “Series G: Transmission Systems and Media, Digital Systems and Networks, Gigabit-Capable Passive Optical Networks (GPON): General Characteristics,” Mar. 2008. [2] ITU-T G. 993.2, “Series G: Transmission Systems and Media, Digital Systems and Networks, Very High Speed Digital Subscriber Line Transceivers 2 (VDSL2),” Feb. 2006. [3] I. Vassiliou et al., “A 65 nm CMOS Multistandard, Multiband TV Tuner for Mobile and Multimedia Applications,” IEEE J. Solid-State Circuits, vol. 43, no. 7, July 2008, pp. 1522–33. BIOGRAPHIES FRANCESCO GATTA (fgatta@broadcom.com) ____________ received his Laurea and Ph.D. degrees in electrical engineering from the University of Pavia, Italy, in 1998 and 2001, respectively. His Ph.D. research focused on CMOS highly integrated receivers for UMTS applications and low-power CMOS LNA. From 2001 to 2002 he was with Valence Semiconductor working on CMOS GPS products. Since 2002 he has been with Broadcom Corporation, Irvine, California, in the Analog-RF Group where he has been working on PLL for SERDES applications, CTF for hard disk drives, and tuners for cable and satellite applications. Currently he is leading the development of all the CATV and DTV CMOS integrated tuners. His main interests are in RF CMOS design, tuner architectures, and broadband systems. He is the named inventor of three U.S. patents. RAY GOMEZ received his B.S degree in biomedical engineering from Case Western Reserve University in 1981, his M.S.E.E degree in electrical engineering from Stanford University in 1982, and his Ph.D. degree from the University of California, Los Angeles (UCLA) in 1993. He worked at TRW, Inc., Redondo Beach, California, from 1982 to 1986, where he designed high-performance frequency synthesizers. His research at UCLA, from 1986 to 1993, involved analog CMOS integrated circuits for disk-drive read channels. From 1993 to 1995 he was a member of the disk drive read channel group at Cirrus Logic, Austin, Texas. He joined Broadcom Corp. in 1995, where he has focused on CMOS RF circuits for cable and broadcast television tuners, DBS satellite set-top box tuners, and, more recently, MoCA home multimedia networking. He was named a Broadcom Fellow in 2006 for his contributions to tuner design, and has over 30 issued patents. YOUNG J. SHIN received his B.S. degree in electrical engineering and computer science from the University of California (UC) Berkeley, in 1994 and his M.S. degree in electrical 96 Communications IEEE A BEMaGS F engineering from UCLA in 1996. Since 1996 he has been with Broadcom Corp., mostly designing CMOS integrated tuners for DBS satellite, QAM cable, and fiber optic (MoCA) applications. He is currently a manager of engineering at Broadcom focusing on research and development of current and future generation tuners for QAM and MoCA settop box and modem SoCs. T AKAYUKI H AYASHI received B.A.Sc. and M.A.Sc. degrees in electrical engineering from the University of Toronto, Ontario, Canada, in 1995 and 1997, respectively. From 1997 to 2000 he was with ATI Technologies, Thornhill, Ontario, working on the development of ADC for video applications. In 2000 he joined Broadcom Corp., where he is currently a principal design engineer. His research interests are in analog and mixed-signal circuit design for communication systems. HANLI ZOU received his B.S. degree in electronic engineering from Tsinghua University, Beijing, China, in 1996, and his M.S. and Ph.D. degrees in electrical engineering from UCLA in 2000 and 2003, respectively, with a focus on integrated circuits and systems for wireless broadband communication systems. From 2001 to 2003 he worked as senior ASIC designer at Innovics Wireless Corporation, Los Angeles, California, designing baseband chipsets for a diversity enabled WCDMA transceiver. Since 2003 he has been with the Broadband VLSI Group, Broadcom Corp. as a principal scientist, working on advanced transceiver chip design for cable, satellite, home networking, and terrestrial digital TV and set-up box. His research interest includes system design and VLSI implementation for high-speed communication, with an emphasis on digital compensation for RF/analog front-end impairments, synchronization, channel estimation, equalization, and diversity processing. J AMES Y.C. C HANG received his B.Sc. degree (magna cum laude) from UC Irvine, and his M.Sc. and Ph.D. degrees from UCLA in 1990, 1992, and 1998, respectively, all in electrical engineering. He was a co-recipient of the Best Paper Award at the 1995 ESSCIRC, and the Jack Raper Award for Outstanding Technology Directions at ISSCC ’97. He received the Outstanding Ph.D. Student Award from UCLA for the year 1997–1998. He is currently with Broadcom Corp. developing cable and satellite set-top-box SoC embedded tuners. He is a named inventor on seven issued patents. LEONARD DAUPHINEE earned a B.Eng. in electrical engineering from Dalhousie University, Halifax, Canada, in 1987. From 1987 until 1989 he designed underwater data telemetry products at Vemco Ultrasonics. He returned to Dalhousie University to earn an M.A.Sc. in electrical engineering in 1991, specializing in real-time DSP architectures. From 1991 until 1993 he was the engineering manager of RF communications design at the Applied Microelectronics Institute. He began doctoral studies at Carleton University, Ottawa, Canada, with a focus on RFIC design in 1993. In 1998 he joined Broadcom Corporation as a staff scientist working on broadband tuner products and earned his Ph.D. from Carleton University in 2003. He is presently the senior engineering manager of RF tuner development at Broadcom and is named as inventor on 29 issued or filed U.S. patents. J IANHONG X IAO [S‘04] received his B.Sc. degree from the Department of Computer Science and Technology, Peking University, China, in 2001, and his Ph.D. degree from Texas A&M University in 2007. He worked at Analog Devices as design engineer intern in summer and fall 2004 and summer 2005. He joined Broadcom as a staff scientist in 2007. His main research interests cover analog and RF front-end design for broadband communication systems. TAI-HONG CHIH received his diploma in electrical engineering from National Tsing-Hua University in 2001, and his M.S degree in electrical and computer engineering from Carnegie Mellon University in 2005. He has worked in the RF tuner department at Broadcom since 2005. His interests include RF/analog circuits and tuner/broadband communication systems. DAVE (SUNG-HSIEN) CHANG received B.S. and M.S. degrees in communication engineering from National Chiao-Tung University, Hsin Chu, Taiwan, R.O.C., in 1992 and 1994, respectively. He received his Ph.D. degree in electrical engineering from the UCLA, where he was working on microwave and millimeter-wave circuits in 2000. In 2000 he joined Broadcom Corp., where he is involved in designing integrated circuits for CMOS standalone and SoC tuners for cable, set-top box, and satellite applications. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page MASSIMO BRANDOLINI received his Laurea (summa cum laude) and Ph.D. degrees in electrical engineering and computer science from the University of Pavia in 2002 and 2006, respectively. During his Ph.D., he worked on analog and RF ICs for wireless communications in CMOS and BiCMOS technologies, with focus on RF front-ends for cellular applications and multistandard radios. In 2003 he was with Agere Systems, Allentown, Pennsylvania, as an internship student, working on the design of a fully integrated CMOS FM transmitter. He joined Broadcom Corp. in January 2006, where he is a senior staff scientist working on highly integrated tuners for cable, satellite and MoCA systems. He is a co-recipient of the IEEE Journal of Solid-State Circuits 2003 Best Paper Award and the IEEE Symposium on VLSI Circuits 2005 Best Student Paper Award. JUO-JUNG HUNG received B.S. and M.S. degrees in electrical engineering from National Taiwan University, Taipei, R.O.C., and his Ph.D. degree in electrical engineering from the University of Michigan, Ann Arbor, where he was involved with the development of SiGe RFIC and RF microelectromechanical systems (MEMS) for microwave and millimeter-wave applications. He is currently a senior staff design scientist with Broadcom Corp., where he has focused on CMOS analog and RF circuits for satellite, cable, and terrestrial television receivers. DONGSOO KOH [S‘89, M‘98] received B.S. and M.S. degrees in electronics engineering from Sogang University, Seoul, Korea, in 1989 and 1991, respectively, and a Ph.D. degree in electrical engineering from UCLA in 1997. From 1997 to 1999 he was with BethelTronix, Inc, Cerritos, California, where he developed RF ICs for cordless phones and GPS systems. From 1999 to 2006 he was with Skyworks Solutions, Inc. (formerly Conexant Systems, Inc.), Irvine, California, where he worked on RF IC designs for various mobile standards including CDMA 2000 and GSM/EDGE. Since 2006 he has been with Broadcom Corp. His work has focused on RF tuner development for broadband communication products. Tao Wu received his B.S. degree in mechanical engineering from Harbin Institute of Technology, China, in 1992, and his M.S. degree in electrical engineering from the University of Arizona in 1999. Currently, he is with Broadcom’s RF tuner group and involved in RF and mixed signal circuit designs for broadband applications. From 2005 to 2006 he worked for Skyworks. From 2000 to 2005 he worked at Motorola/Freesclae, Libertyville, Illinois, where he was involved in RF and mixed signal designs for wireless applications. Mattia Introini received his Laurea degree in electrical engineering and computer science from the University of Pavia in February 2006. He joined STMicroelectronics in 2006 as an analog IC designer; during this period he worked on analog and RF ICs for hard disk drive applications in CMOS technology, with focus on the read channel RF front-end. In October 2006 he joined Broadcom Corp. as a design engineer. He has been working on highly integrated tuners for cable, satellite, and MoCA systems. G I U S E P P E C U S M A I [S‘05] received his Laurea and Ph.D. degrees in electrical engineering and computer science from the University of Pavia in 2003 and 2007, respectively. His Ph.D. research was focused on CMOS and bipolar TX/RX front-ends for WPAN communications (UWB). In 2005 he was with National Semiconductor, Santa Clara, California, as an internship student, working on a CMOS low-power highly integrated transmitter for Zigbee. Since January 2007 he has been with Broadcom Corp., where he develops highly integrated CMOS tuners for cable and satellite systems. ERTAN ZENCIR received B.Sc. and M.Sc. degrees in electrical and electronics engineering from Middle East Technical University, Ankara, Turkey, in 1995 and 1997, respectively, and a Ph.D. degree in electrical engineering from Syracuse University, New York, in 2003. Between 2004 and 2005 he worked as an assistant professor in the Department of Electrical Engineering, University of Wisconsin-Milwaukee. From 2005 to 2006 he was with the RFIC design team of Nokia Mobile Phones, San Diego, California, as a senior RFIC design engineer, where he specialized in SiGe BiCMOS cellular RF transceiver IC design for CDMA2000. Since 2006 he has been with the RF Tuner Development Department of Broadcom Corp., where he is currently a senior staff design scientist developing analog and RF CMOS ICs for IEEE BEMaGS F cable, satellite receivers, and MoCA transceivers. His interests include analog and RF IC design for broadband and wireless communications. F RANK W. S INGOR received his B.A.Sc. degree in electrical engineering from the University of Western Ontario, Canada, in 1991 and his M.A.Sc. degree from the University of Toronto, Ontario, Canada in 1994. In 1994 he joined the Data Converter Group at Maxim Integrated Products, Sunnyvale, California. In 1999 he joined Broadcom Corp., working in the Mixed Signal Group, and presently is managing Broadcom RF Tuner Development, Austin, Texas. HANS EBERHART received B.S. and M.S. degress in electrical engineering from the University of Pennsylvania, Philadelphia, in 2000 and 2001, respectively. Between 2002 and 2004 he was working toward his Ph.D. in electrical engineering at UCLA. In 2004 he joined Broadcom Corp., where he is involved in analog and mixed-signal circuit design. LOKE K. TAN received his B.S. degree from the University of Houston, Texas, in 1987, and his M.S. and Ph.D. degrees from UCLA in 1992 and 1995,respectively, all in electrical engineering. He was a consultant to PairGain Technologies in 1992. Since 1993 he has been with Broadcom Corp., where he works in the Communications Systems and IC Design Group. He has been involved in the design of QAM transceivers for HDTV applications. His interests include digital signal processing, digital communications, and highperformance CMOS circuit design. He received the 1995 Best Paper Award from the IEEE Journal of Solid-State Circuits for the paper entitled “A 200 MHz Quadrature Digital Synthesizer/Mixer in 0.8 mm CMOS.” L IN H E received her Ph.D. degree from the University of Pennsylvania in 2005. From 2005 to 2007 she was with Sarnoff Corporation, Princeton, New Jersey. She joined Broadcom Corp. in 2007 as a senior staff scientist. She is currently involved with system design for broadband communication systems. BRUCE CURRIVAN is technical director, Broadband Communications at Broadcom Corp., where he develops advanced modem architecture. He holds a B.S. from Cornell University and an M.S.E. from Princeton University, both in electrical engineering and information sciences. Prior to Broadcom he worked at RCA Astro-Electronics Division, Stanford Telecommunications, Inc., and Wavespan Corporation. He served as Chairman of the IEEE 802.14 Cable Modem Physical Layer Subgroup, and was a major contributor to the DOCSIS specifications. He is the author of many designs, papers, book chapters, and patents in the areas of modem design and adaptive equalization. PETER CANGIANE received Bachelor’s and Master’s of Science degrees in electrical engineering from Polytechnic Institute of New York in 1986 and UCLA in 1988, respectively. He was with TRW Corporation from 1986 until 2000, where he specialized in multirate digital signal processing. Since 2000 he has been with Broadcom Corp.’s Broadband Cable Business Unit. He is the named inventor of one U.S. patent. PIETER VORENKAMP received his M.S. degree in electrical engineering from Twente University, Enschede, The Netherlands. From 1989 to 1996 he was with Philips Research Laboratories, Eindhoven, The Netherlands, researching high-speed data converters in BiCMOS processes. From 1996 to 1997 he was with Philips Semiconductors, Caen, France, responsible for the development of high-speed data acquisition systems for video and instrumentation applications. In 1997 he joined Broadcom Corp., where he has held progressively senior engineering management positions. In 1999 he managed the Analog and RF Microelectronics group in Irvine, California, responsible for the analog part of all mixed-signal chips for application in digital communication systems, ranging from high-fidelity audio front-ends to RF tuner subsystems for cable and TV applications. In 2008 he managed Broadcom’s Power Management Business Unit and successfully introduced the first standalone Power Management and Energy Management product line for mobile and other battery powered SoCs into the market. Most recently he is responsible for operations engineering, including foundry engineering, product engineering, product test, and assembly within Broadcom’s Operations and Central Engineering organization. He is an author of many international publications and is a named author of almost 50 U.S. patents. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 97 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F INTEGRATED CIRCUITS FOR COMMUNICATIONS Integrated Electronic System Design for an Implantable Wireless Batteryless Blood Pressure Sensing Microsystem Peng Cong, Medtronic Inc. Wen H. Ko, Case Western Reserve University Darrin J. Young, University of Utah ABSTRACT A wireless, batteryless, less invasive blood pressure sensing microsystem based on an instrumented circular cuff has been developed for advanced biological research. The proposed sensing technique avoids vessel penetration and substantially minimizes vessel restriction due to the soft cuff elasticity. The integrated electronic system design is presented with emphases on the design trade-off and system considerations. The measurement results demonstrate full functionality of the microsystems with real-time high-fidelity blood pressure sensing capability under wireless data telemetry and adaptive RF powering conditions. INTRODUCTION Cardiovascular diseases are the number one cause of death and disability in the United States and most European countries. Long-term in vivo blood pressure monitoring is critical for treating cardiovascular disease and hypertension. Recently, DNA sequencing of small laboratory animals together with real-time monitoring of blood pressure as well as other vital signals has become a critical research tool to identify genetic susceptibility to diseases and to potentially develop new treatment methods [1]. However, the small blood vessel size of those animals, less than 1 mm in diameter for major arteries, introduces a significant design challenge for the blood pressure monitoring microsystem; there is no good solution for its long-term in vivo monitoring to date. The most common technique used in small laboratory animal monitoring relies on an invasive catheter-tip transducer, which requires a complex surgical procedure and could cause increased blood pressure, blood clotting, and reduced sensitivity over time. Furthermore, discrete electronics are typically employed to implement the implant system, resulting in a large form factor with excessive power dissipation, which in turn calls for a bulky ferrite-based radio frequency (RF) coil for external RF powering or battery recharging, thus limiting the accuracy of the measured biological signals due to post-implant trauma for long-term 98 Communications IEEE 0163-6804/10/$25.00 © 2010 IEEE monitoring. Therefore, a miniature lightweight long-term blood pressure sensing implantable microsystem with wireless data telemetry and adaptive RF powering capability is highly desirable to capture the vital signs of a free roaming small laboratory animal housed in its home cage, as depicted in Fig. 1. A LESS INVASIVE BLOOD PRESSURE MONITORING SYSTEM A 3D illustration of a wireless, batteryless, less invasive implantable blood pressure monitoring system is illustrated in Fig. 2. The system employs an instrumented elastic cuff wrapped around a blood vessel, which is not shown in the picture, to sense real-time blood pressure waveforms. The elastic cuff is made of bio-compatible silicone material and is filled with low-viscosity silicone oil with an immersed micro-electro-mechanical system (MEMS) pressure sensor and integrated electronic system. The MEMS sensor measures the pressure waveform in the cuff coupled from the expansion and contraction of the vessel. A rigid silicone isolation ring is used to decouple the sensing cuff, which is located at the structural center, from environmental variations in the animal’s body. Because of the softness of the sensing cuff’s outside wall, the pressure inside the sensing cuff is susceptible to environmental variations, such as muscle and tissue movement, without the isolation ring. The isolation ring is designed so that an air cavity between the isolation ring and the sensing cuff’s outside wall is formed upon completion of the fabrication process. As a result, the sensing cuff’s outside wall can move freely, responding to the blood vessel pressure waveform. In the figure an additional thin metal layer wraps around the isolation ring for further suppression of environment variations. The overall structure has a radius of 3.2 mm and a width of approximately 4 mm to establish an adequate contact area with a blood vessel to be inserted in the middle of the cuff through the opening/closing slot. A surgical suture will be applied to secure the cuff position after vessel IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page External RF powering and data acquisition Data receiving antenna F A wireless powering system with an adaptive power control capability is required to provide a B.P. waveform sufficient and stable energy to power the Anim implant electronics in al ca RF powering coil Blood pressure monitoring system ge a varying magnetic field. The RF-DC RF power converter also extracts clock information from the RF powering signal. Figure 1. In vivo real-time wireless batteryless blood pressure monitoring microsystem. insertion. The radius of the sensing cuff’s inside wall is designed to be approximately 0.5 mm with an outside sensing cuff wall radius of approximately 0.9 mm, thus adequate for laboratory animals with an artery diameter of around 1 mm. The silicone sensing cuff can be fabricated by a conventional machining and molding process [2]. The measured waveform represents a downscaled version of the vessel blood pressure waveform with a typical scaling factor of 10 percent and is processed by a nearby low-power integrated electronics system exhibiting a dimension of approximately 2 × 2 × 3 mm3, consisting of MEMS sensor interface circuitry, an analog-to-digital converter (ADC), and a system configuration and control unit, followed by wireless data telemetry to an external receiver. Post-implant calibration can be performed to reconstruct the vessel blood pressure waveform from the measured data. An adaptive RF-DC power converter is incorporated to provide sufficient and stable energy to the system implanted in an untethered animal as shown in the overall system diagram in Fig. 3. The spiral coil for RF powering is located outside the cuff with sealed feed-through connections to the electronics. The proposed sensing technique avoids vessel occlusion, bleeding, and blood clotting associated with the conventional catheter-tip-based approach. Furthermore, the sensing cuff is made of soft silicone material. The restrictive effect on the vessel is therefore substantially minimized, thus making it suitable for long-term monitoring. INTEGRATED ELECTRONIC SYSTEM DESIGN System integration of integrated electronics and micro-fabricated sensors can provide a unique solution to realize an implantable microsystem with small size, light weight, and reliable sensing capability. A MEMS capacitive pressure sensor is designed and incorporated in the sensing cuff to convert blood pressure information to capacitance variation. A capacitance-to-voltage (C/V) converter is thus required in the integrated electronic system to convert the capacitance variation to a voltage signal. The output of the C/V converter is then digitized by an ADC for wireless data transmission. Wireless RF powering and data telemetry are also incorporated in the microsystem to eliminate the need for external wire connections and any bulky battery. The microsystem can therefore be used to monitor freely moving small laboratory animals to obtain reliable measurements without stressinduced distortion due to wire connections or large system size. RF powering has been widely used for biomedical implants, where both transmitting and receiving units are properly placed at a fixed distance from each other with a constant RF power coupling coefficient. However, in this research the receiving unit is implanted inside a freely moving laboratory animal, resulting in a continuously changing RF power coupling. Therefore, a wireless powering system with an adaptive power control capability is required to provide a sufficient and stable energy to power the implant electronics in a varying magnetic field. The RF-DC power converter also extracts clock information from the RF powering signal. An on-chip power sensor is designed to detect the received RF power level and generates a 1-bit power-level feedback signal. The 1-bit power-level feedback signal together with the digitized blood pressure information is then transmitted to an external receiver by an on-chip oscillator-based frequency shift keying (FSK) transmitter with an off-chip inductor achieving the function of an antenna. The high-Q off-chip inductor is employed for low power dissipation. The received blood pressure information is used for real-time blood pressure monitoring. The 1-bit power-level feedback signal is used to control an external power amplifier supply voltage to realize adaptive RF powering capability. To realize a functional system, the electronics should be properly designed to achieve performance requirements, such as pressure resolution, system dynamic range, on-chip DC power level via RF powering, sensor data transmission rate, and wireless communication range. Miniaturization can be achieved by integrating various building blocks onto a single chip as well as keeping individual building blocks small by employing an optimal architecture. In addition, each building block should be designed IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 99 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Metal isolation ring m 5m 3– m 2 3. m Silicone isolation Coil for RF powering ring Sensing cuff outside wall MEMS pressure sensor with Interface Electronics immersed in silicone oil Figure 2. 3D configuration of the blood pressure sensing microsystem. immune to interference for robust performance. A fully differential architecture is used for the sensor interface electronics and ADC design for adequate common-mode signal rejection. A low-power design is important for implantable systems, where the power source is highly limited. A low-power design can be achieved by choosing proper system architectures and circuit implementations. A capacitive pressure sensor, instead of a piezoresistive pressure sensor, is selected for the overall microsystem design to minimize power dissipation. Interface electronics are designed to operate in a weak inversion region for further power reduction. It is difficult to provide a high supply voltage for wireless and batteryless microsystem operation. Therefore, low-voltage design techniques become essential. For a 1.5 +m complementary metal oxide semiconductor (CMOS) process selected for the prototype design with VTP and VTN of approximately –1 V and 0.7 V, respectively, a 2 V power supply level is chosen as a tradeoff between circuit design complexity and RF powering constraints. The 2 V power supply will be generated by an on-chip RF-DC power converter. A 2.5 V supply will also be generated to control the MOS field effect transistor (MOSFET) without dissipating any DC power. The design trade-off of the MEMS pressure sensor, C/V converter, cyclic ADC, and transmitter is presented in detail in this section. The adaptive RF-DC powering will be covered by other papers. MEMS CAPACITIVE PRESSURE SENSOR The MEMS capacitive pressure sensor was designed for the prototype microsystem design due to its miniature size, high sensitivity, low temperature dependence, zero DC power dissipation, and time stability. The fabricated sensor exhibits dimensions of 0.4 × 0.5 × 0.4 mm3 with a measured nominal capacitance value of approximately 2 pF and a sensitivity of approximately 0.8 fF/mmHg [2]. The device size is adequate to be enclosed in the blood pressure sensing cuff. CORRELATED DOUBLE SAMPLING C/V CONVERTER WITH AUTOMATIC OFFSET CANCELLATION SCHEME Interface electronics are required to convert sensor capacitance variation, which represents the blood pressure information, into analog voltage prior to 100 Communications IEEE A BEMaGS F digitization. The C/V converter needs to be designed for a sensing resolution of 100 aF over a 1 kHz bandwidth and an allowed overall full-range capacitance variation of 200 fF, which corresponds to a dynamic range of 11 bits. An automatic offset cancellation scheme is designed as shown in Fig. 3 to allow a single-ended pressure sensor with a wide range of nominal capacitance value to be used, thus greatly simplifying the MEMS fabrication process; it can also effectively suppress the output offset voltage. During the initial phase of the circuit operation, the digitally controlled reference capacitor array at the amplifier input is cycled through to find a reference capacitance closely matched to the sensor nominal capacitance. 1/f noise from input transistors of a front-end amplifier used in the C/V converter is typically the dominant noise source, and can effectively be suppressed by correlated double sampling (CDS) or chopper stabilization techniques [3, 4]. The CDS technique, which was originally introduced to reduce the noise produced in charge-coupled devices, is an effective method to suppress low-frequency noise, DC offset, and charge injection effects in switched-capacitor circuits. A typical CDS amplifier samples the amplifier output voltage twice per clock cycle: first in a reset phase and second in an evaluation phase. The offset and low-frequency noise, such as 1/f noise, at these two sampling instances are nearly constant due to a relatively high sampling frequency. Therefore, they are highly correlated, and can be eliminated by performing a subtraction operation between the two samples. The sampling frequency needs to be designed much higher than 1/f noise corner frequency with a typical ratio of 10. A disadvantage of CDS is that the uncorrelated thermal noise is doubled due to the double sampling. The amplifier must be designed to meet the thermal noise requirements. Chopper stabilization is another commonly used technique to reduce offset and low-frequency noise in precision analog circuit design. First, the sensor information is modulated to a high frequency by a stimulation clock, where the stimulation frequency needs to be much higher than 1/f noise corner frequency. The modulated sensor signal is then mixed by a clock exhibiting the same frequency as the stimulation frequency, followed by a low-pass filter to obtain the original sensor signal. In this process the 1/f noise and DC offset from the charge amplifier are modulated to the stimulation frequency by the mixer and then eliminated by the low-pass filter. A comparison between chopper stabilization and CDS techniques shows that CDS excels in a number of aspects for this application. First, switched-capacitor-based CDS is more compatible with a sampled data system. Second, instead of being modulated to a high frequency by the chopper stabilization technique, the DC offset and 1/f noise are eliminated by the CDS technique at the amplifier output, thus increasing the allowable signal swing range, which is critical for the low supply voltage design. Finally, chopper stabilization typically requires a mixer and a low pass filter, which result in additional power consumption and silicon area. There are three noise contributors for the pre-amplifier circuit. The first contributor is the switch thermal noise associated with the switches connected to the left plates of the sensor capaci- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Integrated circuit Voltage doubler L2 Adaptive VDD VHIGH VLOW C2 Skin 4 MHz Class-E PA On-ship DC voltage regulators CLK extraction RF power input Power-level sensor L1 C1 1110001 Quantized 1-bit power-level VR MEMS capacitive pressure sensor 11- bit cyclic ADC C/V VDD_Analog_2V VDD_Digital_2V 2-channel combiner/ polarity generator 0101110 Inductor as transmitter antenna φ2 φ1 φRST CII MEMS capacitive pressure sensor VS φ1 φ2 φRST VB ICMFB CFB 128C D7 4C D2 2C D1 1C D0 CH CI + – CFB + – OCMFB – + CI φ2 VCM OCMFB – + CH CII To ADC VCM φ2 φRST φ1 φ2 8 bit counter Digital controlled reference capacitors Digital B.P. and power-level feedback information FSK transmitter Digital B.P. information CDS C/V converter with automatic offset cancellation Cs 2.5V CalEn Range detector 2.5-Gain stage Figure 3. Electrical system design architecture. tor, C S , and the reference capacitor, C R . As a common-mode signal, this noise is highly suppressed. The second contributor is the noise associated with the switches connected between the pre-amplifier input and output. This noise is eliminated by the CDS scheme as part of the pre-amplifier 1/f noise and DC offset. Therefore, the dominant noise source is the third contributor, the amplifier thermal noise. A fully differential telescopic architecture with p-type MOS (PMOS) input transistors is chosen as the main amplifier for its low noise and low power dissipation compared to other architectures, such as a folded-cascode amplifier architecture. The folded-cascode architecture requires additional biasing transistors, thus resulting in higher current dissipation and noise contribution. Compared to a fully differential telescopic architecture, the folded-cascode topology improves input common-mode range. However, in the proposed C/V converter, input common-mode feedback (ICMFB) is employed to set the pre-amplifier input to a fixed voltage level, thus rendering the advantage associated with the folded-cascode architecture. The amplifier is biased in weak inversion with a 6 +A bias current, achieving an —— input-referred noise of 23 nV/3Hz, which corresponds to a capacitance sensing resolution of approximately 75 aF or a pressure resolution of 0.1 mmHg over 1 kHz. With a typical cuff scaling factor of 10 percent, a vessel blood pressure sensing resolution of 1 mmHg is expected. The weakinversion design technique is used to achieve the transconductance requirement at a reduced current dissipation with a resulting slow circuit speed. The reduced circuit speed, however, is suitable for typical biomedical applications with signal bandwidth typically ranging from a few Hertz to a few kilohertz. An ICMFB circuit is incorporated with the pre-amplifier design to minimize the input common-mode shift caused by the stimulation clock, hence minimizing offset due to any mismatch of parasitic capacitances and potential output drift over time. To maintain the same input commonmode voltage level with the stimulation voltage of V S, a common-mode charge of V S(C S + C R) must be compensated for by the ICMFB circuit. A CFB of 5 pF is selected to sufficiently compensate for the pre-amplifier input common-mode shift with a maximum sensor capacitance, CS, up to 5 pF. The bandwidth of the ICMFB is designed to be approximately 80 kHz by using a bias current of 1.2 +A. 80 kHz, which is 10 times higher than the pre-amplifier closed-loop bandwidth, is chosen to effectively compensate for the pre-amplifier input common-mode variation. CYCLIC ADC There are six commonly used ADC architectures: flash ADC, integrating ADC, successive approximation (SAR) ADC, pipeline ADC, sigma-delta ADC, and cyclic ADC. The following outlines the advantages as well as disadvantages of each architecture. Flash ADC is for ultra-high-speed application with a typical reso- IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 101 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 10 b1 Range detector Vref/4 01 b0 -Vref/4 00 φ3 φ2 S/H C4 φ1 – + Vin+ Vin- +– φ1 C4 φ9 φ2 φ3 φ8 φ9 φ10 φ4 φ6 φ5 φ6 VCM Vout+ φ11 φ12 C2 C1 + – φ4d VRef VCM 0 φ7 VoutVCM φ6 MDAC C3 – + C1 C2 φ5 φ6 φ4 C3 φ4d φ12 φ11 φ10 0 VCM VRef φ8 Figure 4. Schematic of an 11-bit cyclic ADC. lution up to 8 bits. The ADC exhibits high power consumption and large size, mainly due to 2N – 1 comparators required for an N-bit resolution. On the contrary, integrating ADC is typically used for monitoring DC and low-frequency signals with high resolution. However, a slow conversion rate is the drawback for this type of ADC, thus making it inadequate for the proposed application. SAR ADC is intended for medium to high resolution (8- to 16-bit resolution) with medium speed, which is suitable for the proposed biomedical application. However, this ADC is based on a successive approximation scheme, thus requiring a precisely matched capacitor array. It is difficult to achieve 11–12bit accuracy without an extensive layout effort. In addition, a large capacitor array leads to a large silicon area. Sigma-delta ADC is processinsensitive to the first order and is efficient in terms of power consumption as well as silicon area, but cannot readily be used to process multiplexed input signals due to the lack of direct correspondence between an analog input sample and digital output bits without employing a decimation filter on-chip. Pipeline ADC is intended for medium- to high-speed applications. It has become the most popular ADC architecture for sampling rates from a few megasamples per sec- 102 Communications IEEE A BEMaGS F ond up to 100 Msamples/s, with resolutions from 8 to 16 bits. This ADC could be used for implementing the proposed microsystem; however, the area would be large due to the multiple stages required with this architecture. Cyclic (algorithmic) ADC is well known to achieve low power consumption and high resolution in a small silicon area [3, 5], which is suitable for the intended application. This type of converter can be designed without calling for well matched capacitors. The detailed schematic of an 11- bit cyclic ADC is illustrated in Fig. 4. The multiplying digital-to-analog converter (MDAC) input voltage is sampled twice, followed by an exchange of sampling capacitor and integrating capacitor for a gain of two. Class A/AB amplifiers are used in the ADC for low power consumption. The overall ADC consumes a current of 6.3 +A, achieving a signal-to-noise-and-distortion ratio (SNDR) of 65 dB, which is equivalent to an effective number of bits (ENOB) of 10.5. OSCILLATOR-BASED TRANSMITTER A wireless data telemetry system is a crucial building block in an implant microsystem to minimize risk of infections and signal interference associated with hard-wire connections. Passive or active data telemetry could be used for any implantable mircrosystem. Passive data telemetry utilizes reflected impedance from a secondary circuit load seen by a primary circuit for data communication. By utilizing backscatter modulation to provide a reflected impedance change at an external coil circuitry, technically, it consumes zero power. However, due to the small internal coil connected to the microsystem, the coupling coefficient is much lower than 0.1 percent. In addition, animal movement and title angle result in much weaker coupling with a large variation range. Therefore, this requires a complex demodulator circuit with high resolution and sensitivity, which is not practical for the current system. An alternative choice, active data telemetry, is chosen for the system, and provides a reliable wireless data link independent of animal position and title angle. The challenge of transmitter design for implantable devices is the stringent power consumption requirement. FSK modulation is chosen for a reliable wireless data link and system simplicity compared to amplitude shift keying (ASK) and binary phase shift keying (BPSK) counterparts. A carrier frequency of 433 MHz, which is in the industrial, scientific, and medical (ISM) radio band, is chosen for the prototype microsystem testing and characterization due to the availability of commercial receivers in this band. In addition, 433 MHz is adequate for the implant application, low enough to avoid increased transmission loss through live tissues and high enough for a small coil antenna to be employed for overall system miniaturization. An inductor and capacitor (LC)-tuned oscillator with cross-coupled configuration is used for its design simplicity and power efficiency; a schematic is presented in Fig. 5. This configuration also allows a single inductor to be employed for the oscillator. The inductor is implemented by a high-Q off-chip inductor with a size of 1.8 × 1.24 × 1.24 mm3 to ensure low power consumption with an optimal DC bias current of 120 +A to develop a steady state differential oscillation IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE 2V M3 M4 V+ V- MC C MC VTX M2 M1 Vbias 120 μA Figure 5. Oscillator-based transmitter for data telemetry. amplitude of 0.6 V. The inductor also serves the function of an antenna for wireless data transmission. PMOS capacitors, MC, are used as variable capacitors, which are controlled by VTx, presenting Manchester-encoded digital data. The size of the PMOS is designed so that 250 kHz frequency separation is realized with a VTx amplitude of 2.5 V, which is adequate for a data rate of 48 kb/s in the prototype microsystem. The remaining bandwidth can be used for other sensing channels, which can potentially be integrated with the blood pressure sensing microsystem. WIRELESS BATTERYLESS MICROSYSTEM IN VIVO CHARACTERIZATION The integrated electronic system has been fabricated in a 1.5 mm CMOS process, exhibiting a chip area of 2.2 × 2.2 mm 2, and the fabricated overall microsystem exhibits a weight of approximately 430 mg including the metal isolation ring, which was approximately 100 mg [2]. The weight of 430 mg was less than 0.2 percent of a typical laboratory rat body weight with a value between 200 g and 400 g. The total system noise under truly wireless and batteryless conditions is measured to be 750 +V RMS referred to the ADC input, closely matching the designed value, which is equivalent to a resolution of 75 aF or 0.1 mmHg over 1 kHz with a dynamic range of 60 dB. The total power consumption is 300 +W. The microsystem was implanted in a laboratory rat at the right carotid artery. A commercial cathetertip transducer was inserted into the left carotid artery as a reference for comparison with an implant, shown in Fig. 6a. During characterization, the microsystem was powered by an external coil fabricated on a PCB positioned underneath the rat with a size of 15 cm × 20 cm driven by a Class-E power amplifier. The measured digital blood pressure information was transmitted to a nearby external commercial receiver by an onchip oscillator-based transmitter through FSK modulation in the setup shown in Fig. 6a. The worst case bit error rate (BER) is 10–3, which is limited by the commercial receiver used for testing. The maximum transmission distance between the microsystem and the receiver is approximately 15 cm, which is adequate for this application. The measured blood pressure waveforms by the wireless batteryless microsystem and the reference catheter-tip transducer are presented in Figs. 6b and 6c, respectively. The two waveforms are well matched in shape, exhibiting similar blood pressure characteristics with a calculated correlation coefficient of 95 percent. A scaling factor of 0.15 can be calculated from the measured waveform. The parameter can be used to reconstruct the blood pressure waveform in the vessel from the recorded waveform from the monitoring cuff. A heart rate of approximately 220 beats/min can also be extracted from both waveforms. A reliable blood pressure waveform can also be monitored under wireless and batteryless conditions when the rat is freely running in its own cage after recovery from the surgery. The data measured for 24 hours after implant exhibits a noise level increased by approximately 3 dB. The VCO-based transmitter center frequency was also decreased from 430 to 426 MHz over 24 hours. Further investigations show that the enhanced noise was likely caused by vapor penetration through the silicone coating to the electrical connections of the MEMS sensor and integrated circuit (IC) chip. The frequency drift was also likely caused by vapor penetration to the electrical connection traces, which is equivalent to adding a 30 fF capacitor to LC tank. The results tell us the biological environment is typically the limiting factor for a high-performance implantable system. An improved packaging technique is expected to ensure the system performance over time. IEEE BEMaGS F It is expected that the proposed sensing technique with microsystem engineering design will be desirable for future human-based health monitoring. Other sensing channels, such as temperature, EKG, activity, can be readily integrated in the system. CONCLUSION AND FUTURE WORK A wireless and batteryless implantable blood pressure sensing microsystem is demonstrated for real-time blood pressure monitoring. The design and trade-offs of the integrated electronic system have been presented in detail. The prototype microsystem was successfully implanted in laboratory rats to measure real-time blood pressure waveforms achieving a resolution of 0.1 mmHg over 1 kHz with a dynamic range of 60 dB. The demonstrated wireless implantable technology will become an important research tool for system biology research. It is expected that the proposed sensing technique with microsystem engineering design will be desirable for future human-based health monitoring. Other sensing channels, such as temperature, EKG, and activity, can readily be integrated in the system to achieve a multichannel monitoring unit, which is an ongoing project in our research group. Two blood pressure sensing cuffs can also be positioned with a fixed distance along an artery to obtain meaningful real-time blood flow information for cardiovascular disease study [6]. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 103 A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Receiving antenna Class-E amplifier driving external coil F Right carotid artery Microsystem for blood pressure monitoring Laboratory rat Catheter-tip transducer External coil (15 cm × 25 cm) (a) 800 160 770 760 750 740 10 20 30 Time (s) 40 50 60 0 770 760 750 Pressure (mmHg) 780 6.2 mmHg Output code 130 120 0 790 740 730 140 10 30 Time (s) 20 40 50 60 160 150 38 mmHg 730 150 38 mmHg 6.2 mmHg Output code 780 Pressure (mmHg) 790 140 130 120 0 0.1 0.2 0.3 0.4 0.5 0.6 Time (s) 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 Time (s) 0.7 0.8 0.9 1 (c) (b) Figure 6. Wireless batteryless blood pressure monitoring microsystem laboratory rat evaluation: a) microsystem implant; b) measurement from the blood pressure microsystem; c) measurement from the catheter-tip transducer. REFERENCES [1] B. Hoit et al., “Naturally Occurring Variation in Cardiovascular Traits among Inbred Mouse Strains,” Genomics, vol. 79, no. 5, May 2002, pp. 679–85. [2] P. Cong, W. H. Ko, and D. J. Young, “Wireless Implantable Blood Pressure Sensing Microsystem Design for Small Laboratory Animals Monitoring,” Sensors Materials, vol. 20, no. 7, 2008, pp. 327–40. [3] P. Cong, W. H. Ko, and D. J. Young, “Low Noise mWatt Interface Circuits for Wireless Implantable Real-Time Digital Blood Pressure Monitoring,” CICC ’08, San Jose, CA, Sept. 2008, pp. 523–26. [4] C. C. Enz and G. C. Temes, “Circuit Techniques for Reducing the Effects of Op-Amp Imperfections: Autozeroing, Correlated Double Sampling, and Chopper Stabilization,” Proc. IEEE, vol. 84, no. 11, Nov. 1996, pp. 1584–1614. [5] P. Li et al., “A Ratio-Independent Algorithmic Analogto-Digital Conversion Technique,” IEEE J. Solid-State Circuits, vol. 19, no. 6, Dec. 1984, pp. 828–36. [6] K. Takahata et al., “A Wireless Microsensor for Monitoring Flow and Pressure in a Blood Vessel Utilizing a Dual-inductor Antenna Stent and Two Pressure Sensors,” 17th IEEE Int’l. Conf. MEMS, 2004, pp. 216–19. BIOGRAPHIES P ENG C ONG (pengcon77@gmail.com) ______________ received his Ph.D. degree from the Department of Electrical Engineering and Computer Science at Case Western Reserve University 104 Communications IEEE (CWRU)in 2009. His research focuses on MEMS sensors, mixed-signal IC design, and microsystem integration for biomedical and harsh environmental applications. He is a senior IC design engineer for Medtronic Inc. Minneapolis, Minnesota, working on next-generation implantable medical devices. WEN H. KO [F] received Ph.D. degrees in electrical engineering from Case Institute of Technology, Cleveland, Ohio, in 1956 and 1959 respectively. He has been an assistant, associate, and full professor of electrical engineering and biomedical engineering, at CWRU since 1959, 1962, and 1967, respectively. He became a Professor Emeritus in electrical engineering of CWRU in July 1993 and is active in research on MEMS and biomedical implants including micropackage and thin film power supplies. He is a fellow of the American Institute of Medical and Biological Engineering. DARRIN J. YOUNG received his B.S., M.S., and Ph.D. degrees from the Department of Electrical Engineering and Computer Sciences at the University of California at Berkeley in 1991, 1993, and 1999, respectively. He joined the Department of Electrical Engineering and Computer Science at CWRU in 1999 as an assistant professor. In 2009 he joined the Electrical and Computer Engineering Department at the University of Utah as a USTAR associate professor. His research interests include MEMS design, fabrication, and integrated analog circuits design for wireless sensing, biomedical implant, communication, and general industrial applications. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page CALL SYNCHRONIZATION OVER ETHERNET FOR AND A BEMaGS F PAPERS IP IN NEXT-GENERATION NETWORKS Network synchronization plays a central role in digital telecommunications. It determines the quality of most services provided by the network operator. Traditionally, synchronization has been distributed across telecommunications networks using the TDM links for which the networks were designed (i.e. E1 and DS1 circuits). Several fixed and mobile Operators are migrating to a next-generation network (NGN) with IP packet-switched network infrastructure. Ethernet transport is becoming increasingly commonplace. This trend is driven by prospected lower operative costs and by the convergence between fixed and mobile services. However, migrating trunk lines to IP transport poses significant technical challenges, especially for circuit emulation and synchronization of network elements. The evolution of communications networks towards packet-switching has increased interest in the distribution of synchronization using packet methods. This has a twofold impact: 1. Synchronization distribution over packet networks using packet-based methods has become a focus of activity in thestandards bodies (ITU-T G.8261/2/3 and IEEE 1588); 2. The traditional model, in which synchronization distribution is engineered carefully for optimal performance, may give way to scenarios in which there is a greater expectation of ad-hoc synchronization quality achieved without as much need for provisioning as has traditionally been the case — similar to Ethernet "plug and play". The latter point widens the scope of interest in synchronization beyond specialists to the wider audience of telecommunications engineers. A striking example is the distribution of synchronization to next-generation wireless base-stations, which are connected to the core network only via packetswitched networks, but still require highly accurate synchronization to meet service quality expectations. SCOPE OF CONTRIBUTIONS Authors from industry and academia are invited to submit papers for this special issue of IEEE Communications Magazine on next generation synchronization, including synchronization distribution over Ethernet and IP networks. The scope of the issue includes, but is not limited to the following topics of interest: • • • • • • Key emerging standards in the area of synchronization over packet networks Timing scenarios in various network applications Tutorial papers describing packet network characteristics which impact synchronization transport Implementation challenges in achieving high-quality synchronization using the new technologies Carrier and vendor experience in deployment Measurement techniques for characterizing and qualifying packet-based synchronization The special issue is expected to have 5-7 papers. SUBMISSION GUIDELINES Articles should be tutorial in nature, with the intended audience being all members of the communications technology communities. They should be written in a style comprehensible to readers outside the specialty of the article. Mathematical equations should not be used (in justified cases up to three simple equations are allowed). Articles should not exceed 4500 words. Figures and tables should be limited to a combined total of six. The number of references is recommended to not exceed 10 (maximum 15). Complete guidelines for preparation of the manuscript are posted at http://dl.comsoc.org/livepubs/ci1/info/sub_guidelines.html. Please send a PDF (preferred) or MSWORD formatted paper via Manuscript Central (http://mc.manuscriptcentral.com:80/commag-ieee). Register or log in, and go to the Author Center. Follow the instructions there. Select "February 2011/Synchronization over Ethernet and IP in Next-Generation Networks". Manuscript Deadline: Notification of acceptance: Final paper submission: Publication date: May 31, 2010 September 30, 2010 November 30, 2010 February 2011 GUEST EDITORS Stefano Bregni Politecnico di Milano, Dept. of Electronics and Information Piazza Leonardo da Vinci 32, 20133 Milano MI, Italy Email: _______________ bregni@elet.polimi.it Communications IEEE Ravi Subrahmanyan National Semiconductor Corp. One Stiles Road, Suite 305, Salem, NH, 03079, USA Email: ____________________ ravi.subrahmanyan@ieee.org Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F ACCEPTED FROM OPEN CALL Power Line Communication Networks for Large-Scale Control and Automation Systems Gerd Bumiller, iAd GmbH Lutz Lampe, University of British Columbia Halid Hrasnica, Eurescom GmbH ABSTRACT Power line communications uses the existing power line infrastructure for communication purposes. While the majority of recent contributions have discussed PLC for high-data-rate applications like Internet access or multimedia communication serving a relatively small number of users, in this article we are concerned with PLC as an enabler for sensing, control, and automation in large systems comprising tens or even hundreds of components spread over relatively wide areas. Typical examples of such systems are energy management (Smart Grid) and facility automation systems. We provide a discussion of the communication network requirements common to such systems and present transmission concepts for PLC to make use of the existing infrastructure resources (i.e., power lines) to meet these requirements. INTRODUCTION Already during World War II, power lines were considered as a means of data transmission [1]. The main usage of power line communications (PLC) has been by electricity companies for sending control signals at low rates and in several home automation products. It was only recently, spurred by the deregulation of the telecommunication and energy market in the late nineties, that communication over power lines has received wider attention and is perceived by many as a viable alternative or valuable complement to other wired or wireless communications systems. This is particularly true for Internet access and indoor local area networks (LANs), where application of so-called broadband PLC is considered. Broadband PLC assumes service provision for multimedia applications consuming larger data rates and serving a limited number of users, and its new popularity is evidenced by two special issues on PLC-based LANs and access networks in this magazine in 2003 [2, 3], and the recent developments in standard- 106 Communications IEEE 0163-6804/10/$25.00 © 2010 IEEE ization for high-speed PLC systems within the IEEE [4]. The single main advantage of PLC over other wired communication solutions is the existence of a power line infrastructure. This, for example, allows electricity companies to retrofit their power line networks for communication purposes at little additional cost. In fact, the energy distribution grid is perhaps the most ubiquitous infrastructure worldwide, and its extremely high penetration opens the door for a plethora of applications supported by PLC. Alongside the aforementioned applications, especially the use of PLC for advanced energy management has experienced a strong boost. Examples of this trend include the recently completed research and development project Real-Time Energy Management via Powerlines and Internet (REMPLI), which involved nine partners from five European countries and was funded by the European Union (see www.rempli.org), and the Powerline Intelligent Metering Evolution (PRIME) project launched by the Spanish electric utility Iberdrola and joined by industrial partners from Europe and the United States, whose aim is the specification of an open and non-proprietary PLC-based telecommunications architecture that “could meet the future requirements on customer real time interfacing and smart grid evolution” (see www.iberdrola.com/suppliers/ SmartMetering for a White Paper). More gener__________ ally, the ubiquity of power distribution lines renders PLC an excellent candidate for industrial command-and-control and facility automation systems, in which a common communication network connects a large number of devices that are spread over a wide area. We collectively refer to such systems as large-scale control and automation systems in the following. The design and performance requirements for PLC in large-scale control and automation systems are decidedly different from those for PLC in access or indoor systems. Different network parameters, such as geographical coverage or number of network nodes, and different application-related features, such as size of data pack- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE ets or maximal response time, make it necessary to apply different transmission concepts. In the first part of this article we describe these requirements and derive the necessary features of an enabling PLC network. This is followed by a description of transmission techniques that have been developed for such PLC networks in the past few years [5–9]. We focus on the physical and medium access control (MAC) layer techniques, which are closely linked to the use of PLC as communication technology. The gist of our discussion is that conceptually fairly simple single-frequency networking together with flooding of messages are attractive methods for large PLC networks. While such an approach has been advocated in wireless ad hoc networks [10], we submit that it is also suitable for PLC networks (with no mobility) to enable service guarantees. To support this observation, we finally present a quantitative comparison of flooding and routing based on performance parameters specifically relevant to the considered application scenarios. Most of the presented material originates from work conducted for energy management systems, under the umbrella of REMPLI, and airfield ground lighting automation systems. Therefore, even though we keep the ensuing description generic for the most part, we repeatedly refer to these two specific applications. CONTROL AND AUTOMATION SYSTEMS USING PLC We start by considering the two mentioned application examples for large-scale control and automation systems to motivate PLC as a very attractive solution and concretely show what is required of a PLC network. APPLICATION EXAMPLES Energy Management Systems — The energy management system of the future foresees the implantation of considerable intelligence into the distribution grid, which essentially renders it a situation-aware network of interconnected sensors and actuators. These intelligent grids of tomorrow have gained global attention under the label Smart Grid [11]. The realization of the Smart Grid concept entails the existence of a reliable communication network, which likely integrates several communication carriers. Due to the inherent availability of power lines as carriers and the resulting advantages with respect to installation costs, we expect that PLC will play a prominent role in the implementation of Smart Grid. Let us consider a few typical examples of Smart Grid functionalities to illustrate the requirements for the communication network. The first example is real-time pricing to balance energy consumption and moderate peak loads. The key components for real-time pricing are intelligent energy meters and the possibility of communication with a central data collection and control station. Assuming that every household is equipped with such a meter, the PLC network between meters and the common transformer station can easily include 300 nodes or more. If the PLC network extends beyond the transformer station and to the medium-voltage layer, the network size can grow to thousands of nodes. Fast access to individual meters is also needed to enable advanced customer service. For example, in a recent tender a Dutch electric utility required that their call center can access 90 percent of all meters within five seconds. In Germany the national regulator Bundesnetzagentur considers the possibility of real-time switching between electric utilities, and the vendors of billing software work on solutions for customers to find the presently least expensive provider. Again, fast access to meters is an important element for these solutions. Another Smart Grid functionality is the management of energy distribution using a supervisory control and data acquisition (SCADA) system. SCADA sensors permanently monitor the grid load and report to a control center, from which open/close commands are sent to switches to adapt the distribution structure to the dynamics of energy generation and consumption. Such operations become more frequent with increasing decentralization of energy generation, and they need to be executed reliably and in real time in order to maintain grid stability. Thus, SCADA imposes strong reliability and real-time requirements on PLC. IEEE BEMaGS F The energy management system of the future foresees the implantation of considerable intelligence into the distribution grid which essentially renders it a situationaware network of interconnected sensors and actuators. Airfield Ground Lighting Automation Systems — Modern airfield ground lighting (AGL) automation systems enable individual lamp control and monitoring of sensors deployed at airfields. Such functionalities are needed to meet the latest recommendations by national and international regulators to enhance safety of aircraft ground movement and to aid visual guidance systems. Figure 1 illustrates a typical wiring topology of an AGL system. Devices such as lamps and microwave sensors are arranged in a ring structure of typically between 3 and 15 km connected to a constant current supply via transformers. PLC is a cost-effective and elegant solution to enable communication between the airport tower and the ground lighting system, particularly for existing airport infrastructures where build-up of new dedicated communication networks would be expensive. The communication network has to bridge considerable distances and also connect across power-electric components, especially transformers, which are not designed for high-frequency communication signals. In terms of signal flow, we note that all data communication needs to go through a central node directly connected to the tower (Fig. 1). Furthermore, the reaction time, the round-trip delay of a signal between the tower and a lamp, is critical. Since the communication channels are timevariant, the PLC system needs to permanently monitor the communication quality to all network nodes to guarantee a certain maximal reaction time. The time variance of the channels is due to different current steps of the regulator, variable loads in the circuit, crosstalk from other rings that often run parallel over several kilometers, and even weather conditions. Hence, the PLC system needs to be sufficiently robust with respect to channel variations. In addition, a node failure must not affect communication to other IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 107 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Automation and grid A BEMaGS F Sensor management systems have mainly a master-slave Tower Data link Remote node (slave) Remote node (slave) Remote node (slave) Remote node (slave) Remote node (slave) Remote node (slave) structure, because these applications are strictly hierarchically organized. In facility management, Constant current regulator PLC central node (master) client-server networks are becoming popular. Sensor Figure 1. Illustration of the ring structure of an airfield ground lighting automation system. A typical ring has a length between 3 and 15 km, and includes between 10 and 200 remote nodes (lamps, sensors). nodes. Hence, redundant signal paths between the central and other network nodes are mandatory for the PLC network. REQUIREMENTS FOR THE PLC INFRASTRUCTURE The described application examples are representative in that the PLC network needs to connect a large number of devices like switches, sensors, meters, and lamps that are distributed over a relatively wide area. In the following we attempt to categorize the typical requirements for the PLC infrastructure in order to support large-scale control and automation systems. Network Coverage and Data Flow — Application protocols for metering, automation, facility or grid management support point to multi-point communication with mainly short data packets. Automation and grid management systems mainly have a master-slave structure, because these applications are strictly hierarchically organized. In facility management clientserver networks are becoming popular. A client polls the server (data point), or the server pushes the data periodically. In metering applications both strictly hierarchical and client-server structures are used. All applications have in common that the devices of the system represent the communication nodes of the PLC network, and each of these nodes needs to be connected to the central node (master, server). This requirement is challenging considering that many network nodes are remote from the central node, and perhaps serve time-critical applications like those mentioned in the previous section. Furthermore, while individual nodes communicate only small amounts of data at a time, the total data volume to be transferred through the network is substantial. Hence, resource-efficient transport of data to and from the central node is mandatory to achieve sufficient network coverage. 108 Communications IEEE Robustness to Changes — In PLC networks the communication channel may change abruptly during normal operation. For example, switching operations in medium-voltage energy systems to balance the power consumption over the distribution grid will result in changes of channel transfer functions in sizeable parts of the PLC network. The PLC network design must be able to cope with such abrupt changes, which means that the connectivity must be maintained during or quickly recovered after these changes. Since severe network disruptions due to, say, physical removal of network links, are often not exceptional events but occur frequently during normal operation, maintenance of system availability is only possible with redundant communication links and autonomous use of redundancies. That is, a PLC network that needs to estimate link qualities and re-establish connections after topology changes have occurred will not be able to fulfill reliability requirements. Instead, ad hoc networking features are needed. It is important to note that the removal and addition of network nodes, or changes in the impedance of the associated device also affect the communication channels in a large neighborhood around this node. This behavior is very different from wireless communications, where the mere presence or absence of a wireless device does not affect the link quality for another device. Quality of Service — The main quality of service (QoS) requirements for the PLC network in control and automation systems are high communication reliability, high overall network throughput, and strict limits on delay. Often messages transmitted from nodes to the central node (e.g., notification about a sudden voltage drop) or from the control center to network nodes (e.g., a switching command for an actuator) are time-critical. Failure to meet delay requirements can have serious consequences, IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE often with human safety at stake. In addition, due to the time variance of the communication channels, the functionality of all network nodes needs to be verified continuously to guarantee reliable data transfer and system response time. Since optimization of throughput, reliability, and delay often pose conflicting demands on the design of the communication protocol, management of QoS requirements is a nontrivial task. TRANSMISSION CONCEPTS FOR PLC We now present transmission concepts apt to meet the need for network coverage, link redundancies, and guaranteed QoS outlined above. SINGLE-FREQUENCY NETWORK CONCEPT The spatial dimension of the PLC network renders direct communication between the central node and all other network devices infeasible. To still achieve complete coverage, messages need to be repeated, which is also known as multihop transmission or relaying. Considering that PLC reuses an existing infrastructure and the broadcast nature of the PLC channel, an altruistic repeater concept is appealing. That is, network nodes that overhear a message for another destination are prepared to retransmit this message. Such a repeater concept makes optimal use of the available communication nodes in the network, and is flexible enough to also ensure network coverage and communication reliability under changing channel conditions and topologies. In particular, the use of multiple repeaters to relay the same message signal provides redundant signal paths, which are needed to minimize network outages. To manage this multirelay transmission with minimum use of communication resources, the single-frequency network (SFN) concept, which is known from macrodiversity wireless communication systems [12], can be applied. The SFN allows all repeaters to transmit simultaneously using the same frequency band. The next receiving node(s) sees a linear superposition of the retransmitted signals, which is indistinguishable from a single signal being sent over an equivalent multipath channel. Hence, any communication technique suitable for transmission over multipath channels can be applied in an SFN. One popular method is orthogonal frequency-division multiplexing (OFDM) [5, 12]. We note that SFN-PLC transmission benefits from signal enhancement due to concurrent retransmission. In some cases destructive interference may occur, which can be mitigated using distributed space-time coding concepts presented in [8]. FLOODING CONCEPT If altruistic relaying is used to route a message through the network, the flooding concept is implemented. We submit that flooding is an attractive packet delivery process in control and automation PLC networks for the following reasons. First, flooding eliminates almost all routing overhead, which can be substantial for large networks with multiple repeater levels. Second, it is extremely robust to network changes. This is crucial for applications such as energy management or AGL systems. As mentioned above, changes in PLC networks are often abrupt and affect a large fraction of nodes. The need to establish a route would compromise communication reliability and delay constraints. Third, considering the delivery of a single packet, flooding minimizes the delay in that it always finds the shortest path to the destination. Key for flooding to be effective is the application of the SFN concept. SFN transmission avoids congestion for the packet that is flooded, and thus accomplishes efficient use of network redundancy and minimizes transmission delay. On the downside, flooding has the potential to create closed communication loops and to massively occupy channel resources. Furthermore, different packets flooded simultaneously in a specific geographical area can destroy each other. To avoid or mitigate these effects, two measures are suggested. First, active network nodes (repeaters) monitor the packets or packet numbers and ensure that every packet is repeated only once. Second, each packet is equipped with a counter nrepeat that specifies the maximal number of times a packet can be repeated before it reaches the destination, and this counter is decremented during each repetition. We note that two different counters may be used for transmission in opposite directions due to potentially non-reciprocal transfer functions or different interference situations at different locations. IEEE BEMaGS F The spatial dimension of the PLC network renders direct communication between the central node and all other network devices infeasible. To still achieve complete coverage, messages need to be repeated, which is also known as multihop transmission or relaying. MIXED DETERMINISTIC AND RANDOM MAC CONCEPT As discussed earlier, a feature common to many applications is that traffic flows to and from a central node, which suggests a centralized MAC with a master-slave concept. The organization of the transmission in the downlink direction (from master to slaves) is simple since only the master transmits data to one or multiple slaves. The situation is different for the uplink, where a number of slaves may have data to be transmitted to the master at the same time. A first option would be a purely deterministic MAC protocol that completely eliminates signal collisions. To this end, slaves could be successively polled by the master to see whether uplink resources are required. To ensure a certain polling rate, which defines the reaction time of the PLC network, a certain fraction of channel use has to be reserved for this mechanism. For example, consider a sensor which monitors rare events that occur on average, say, once every day, but which require a fast response time of, say, 10 s. The master would have to poll the sensor every 10 s, which is an excessive waste of resources. Furthermore, while this approach may be feasible in relatively small networks, the reaction time can quickly become unacceptably large for networks with hundreds of nodes. For the same reasons, other deterministic medium access policies, such as master-slave-oriented bus protocols, token ring protocols, or solutions with fixed time slots reserved for each individual network node within a time-division multiple access (TDMA) scheme are also not well suited. Random medium access techniques, such as Aloha or carrier sense medium access (CSMA), offer more flexibility in this regard. Since reliable car- IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 109 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Figure 2. Tree topology as an example model for an energy distribution grid with 100 (left) and 200 (right) nodes (shown as circles). The x- and y-axes are the main supply lines to which all nodes are connected. The master is located at the origin, and the slave nodes are generated according to a uniform distribution over the diamond-shaped area defined by the maximum cable length between master and slaves, where cables run in parallel to the x- and y-axes. The node density is kept constant regardless of the number of nodes. rier sensing in PLC is complicated by the hidden node problem [13], particular collision avoidance techniques have to be employed like those developed for indoor PLC systems [14]. However, application of mechanisms for solving the hidden node problem and collision avoidance add considerable overhead for transmission with small data packets and therefore are not well suited for automation and control PLC systems. In case of purely random access without collision avoidance (i.e., Aloha or slotted Aloha), the packet delay can become unacceptably large, and network throughput is limited in the case of highly loaded networks with a large number of nodes. These considerations motivate a hybrid MAC protocol that combines elements of deterministic and random medium access. First, the master establishes a network-wide TDMA frame structure through the broadcast of control packets to all nodes. Within each frame the master allocates time slots for dedicated master-slave connections serving services such as polling. Then the remaining time slots are used for random medium access in the uplink, which allows slaves to connect spontaneously with the master (e.g., if an event that deserves quick reaction from the master is detected or a slave joins the network). For the sensor example mentioned above, the master would poll the sensor at regular intervals much larger than the response time to ensure that the sensor is functional and synchronized to the TDMA frame structure. When the sensor has an event to report, it uses random access within the dedicated uplink frame to send the message. Considering that per-node link utilization is not high, slotted Aloha or one of its variants is the method of choice for the random access within the TDMA frame structure. Since all network resource control rests with the master, it dimensions the frame structure in accordance with the QoS demands from the specific applications served by the network. Furthermore, two mech- 110 Communications IEEE anisms due to SFN-based flooding work in favor of random access with slotted Aloha. First, as long as at least one repeater node receives a signal originating from another node successfully, the underlying message is not annihilated even though signal collisions may have occurred. Second, SFN transmission can be exploited to reduce the waiting time between retransmission attempts and thus improve overall transmission delay applying the concept of local acknowledgments devised in [7]. REMARKS We would like to remark on some of the challenges associated with the described SFN-based flooding concept. Synchronization — SFN-based flooding requires a network-wide clock. This can be established through the TDMA structure, which is maintained by broadcast packets sent by the master. Every packet is equipped with a synchronization preamble [9] based on which a slave adjusts its timing. Since broadcast packets serve several purposes, they are sent regularly. Experiments have shown that timing synchronization with an accuracy of very few (often fewer than two) symbol intervals is easily achieved, which also means that only very little additional guard space between transmissions is required for an SFN. We note that frequency synchronization is not problematic due to the low carrier frequencies used in narrowband PLC. Channel Estimation and Error Propagation — The need for receiver-side channel estimation in SFN-based flooding can be bypassed using differential modulation (e.g., across subcarriers if OFDM is applied). Likewise, the effect of error propagation can be neglected assuming the use of error detection, such that only nodes which deem a packet as received correctly will retransmit it. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Channel Occupation and Energy — Clearly, there is a price to be paid for not needing a route. First, redundant retransmissions occupy channels unnecessarily and prevent other messages being sent. When one TDMA frame travels, no other frame can travel in a certain geographical area, which means that spatial reuse and therefore packet origination rates are limited. Second, the use of many retransmissions wastes energy, which undermines the purpose of smart grids. These problems are mitigated through flooding using counters as described above. Variations of flooding that aim at reducing the number of redundant broadcasts [15] can further remedy the situation. Since the location of many network devices is static, topology information may be used during flooding. For example, in parts of the network with high connectivity, only a subset of nodes relays a message. Furthermore, signal waves can be directed toward the destination, which also increases multiplexing capability. However, topology information needs to be exploited with care as, for example, in ring topologies found in mediumvoltage energy distribution grids or AGLs (Fig. 1), a single node failure can completely change the direction in which the signal wave needs to propagate to reach the destination. NUMERICAL RESULTS: FLOODING VS. ROUTING To make the argument for SFN-based flooding more concrete, in this section we provide numerical performance results for three specific criteria pertinent to large-scale PLC networks. We compare flooding with the alternative of centralized proactive routing, for which every message is only retransmitted by exactly one repeater node at every repetition level, and the route is determined at the master node based on link quality information given by the packet error rate (PER). AVERAGE DURATION OF A POLLING CYCLE Polling is often one of the fundamental network operations. For example, in AGL automation it is critical to continuously monitor the functionality of all devices; thus, the master frequently polls all slaves. — The average duration of the polling cycle D is defined as the average time the master needs to complete a single packet-request-response service with every slave. An analytical expression — for a lower bound for D for the case of routing systems can be obtained by making the idealized assumption that the instantaneous PERs for all node-to-node links are available at the—master. To obtain an analytical expression for D for the flooding-based system, we assume that the maximal number of packet retransmissions, nrepeat, is — chosen such that D is minimized. Furthermore, we have simulated SFN-based flooding using an adaptation method for nrepeat. — Table 1 shows the numerical results for D — routes, Dflood,opt assumrout,opt assuming optimal— ing optimal nrepeat, and Dflood,adapt with adapted n repeat for a ring topology (Fig. 1) with 10 and 100 uniformly distributed nodes, and for a ran- IEEE BEMaGS Ring topology F Tree topology Channel model — D rout,opt — D flood,opt (ES) — D flood,opt (EC) — D flood,adapt (ES) — D flood,adapt (EC) 10 nodes 100 nodes 100 nodes 200 nodes 30 427 421 1027 29 28 419 403 387 367 993 939 30 29 423 404 393 368 1003 945 Table 1. Comparison of the average duration of a polling cycle using optimal routing and flooding with optimal and adapted number of retransmissions nrepeat. Duration is measured in number of time slots. EC refers to the case when the energies of the multiple signal paths are aggregated at the receiver; in ES only the individual channel with the largest energy is considered. domly generated tree topology with 100 and 200 nodes, respectively. The latter are illustrated in Fig. 2. For SFN-based flooding we distinguish two scenarios for superposition of simultaneously relayed signals: aggregation of signal energies from all signal paths (denoted energy combining [EC] in Table 1) and selection of the individual channel with the largest energy (denoted energy selection [ES]). The figures in Table 1 are the average duration of a polling cycle measured in number of time slots. We observe that flooding consistently achieves a lower polling cycle duration than routing. This is due to the fact that with flooding the packet is received via the optimal route and via additional repeater paths, and thus the probability of successful transmission is increased compared to routing. Furthermore, the restriction of the number of repetitions in flooding due to nrepeat avoids unnecessary occupation of channel resources. We further observe that performance degradations due to in situ adaptation of nrepeat are less than 4 percent. DURATION OF A BROADCAST TRANSMISSION In the considered PLC networks messages are frequently broadcast from the master to all slaves. The purpose of broadcast messages is manifold. It serves, for example, to update the TDMA frame structure, to inform slaves of which slots are used for specific services and physical-layer parameters, to download software updates, or to transmit fast time-varying application-specific parameters such as the distance of an approaching airplane in AGL automation systems. Flooding is a natural fit for fast broadcast transmission as it utilizes the very broadcasting nature of the PLC channel. The duration of a broadcast is simply max{nrepeat} times the duration for a downlink slot. In case of routing, we assume that the master sends the broadcast message to a number of slaves selected such that the union of all nodes that receive the message transmitted along those routes forms the complete set of nodes. In this way, the address field of the broadcast packet is not expanded compared to a unicast packet. To minimize the dura- IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 111 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Ring topology Tree topology Channel model 10 nodes 100 nodes 100 nodes 200 nodes Routing 5 8 37 73 Flooding 3 4 5 5 Table 2. Comparison of the average duration for a broadcast to all slaves using routing and flooding. Duration is measured in number of time slots. ES case EC case 800 Duration of polling cycle (number of slots) 750 700 650 600 550 500 450 400 350 -15 -10 -5 0 5 10 15 20 25 30 Polling cycle (0 = switch of channel mode) Figure 3. Duration of polling cycles for flooding before and after an abrupt topology change. tion of the broadcast, we apply a greedy algorithm that selects the next slave such that a maximal number of nodes is reached along its route. Table 2 shows the time needed to deliver a broadcast message with routing and flooding for the same four network topologies considered for polling. The time is measured in number of time slots, and the particular figures were determined such that the PER for all slaves is less than 0.1 percent. It is interesting to observe that performance differences between flooding and routing are moderate for ring structures, whereas they become significant for tree topologies. In particular, flooding is rather insensitive to the underlying topology since signal waves propagate in all directions. Likewise, the actual number of nodes is insignificant as long as the spatial extension of the network does not change significantly. ROBUSTNESS TO TOPOLOGY AND CHANNEL FLUCTUATIONS We have already pointed out earlier that the quality of communication links in a PLC network can vary with time due to, say, load changes. Switching operations even change the network topology. A typical example of a severe topology change would be the opening of a medium-voltage distribution line ring structure at a location close to the master node. 112 Communications IEEE A BEMaGS F To illustrate the agility of flooding, we simulated polling cycles for 100 nodes that first were arranged in a ring structure and after a certain number of cycles were rearranged into a random-tree structure. We hasten to say that such a dramatic topology change is unrealistic and only serves as an extreme academic example to test the robustness of flooding. In the simulations a request to a slave was repeated until the master successfully received a response. Figure 3 shows the measured duration for a polling cycle, where the network topology is changed before cycle number 1. We observe that before the topology change, the duration of the polling cycle jitters around average values of about 410 (EC case) and 425 (ES case) time slots. The length of the polling cycle jumps to about 700 (EC) and 780 (ES) slots right after the network change, but it is already reduced again by about 250 slots in the following cycle. Already after 5 to 7 polling cycles, the cycle durations have converged to the (new) stationary values. To have an estimate for the length of the adaptation process in absolute time, we assume a slot duration of 10 ms. This value is typical for PLC transmission in the CENELEC-A band with a bandwidth of 50 kHz. Then the average duration of a polling cycle for 99 slaves would be between 4 and 4.5 s according to the results in Fig. 3. The first polling cycle after the abrupt topology change would require 7 to 8 s to successfully reach all slaves, but within only 30 to 40 s the adaptation to the new topology is completed. This very fast adaptation, which is only possible with an algorithm with short memory, satisfies real-time requirements for the communication system in, say, Smart Grid applications even during and after a switching instant. Hence, SFN-based flooding is a very attractive solution in this regard as well. CONCLUSIONS In this article we have presented an overview of the requirements for PLC to become an enabler for advanced control and automation systems such as energy management and facility automation systems. Starting from these requirements we have described suitable PLC transmission concepts. We have advocated, and in part substantiated with numerical evidence, that the combination of single-frequency networking with flooding embedded into a hybrid MAC protocol is attractive to meet the application requirements. The efficacy of the presented concepts has been verified in field trials under the umbrella of the REMPLI project, and PLC products based on this technology are currently being used in a number of pilot projects for advanced meter management (e.g., in Karczew, Poland) and streetlight control (e.g., in Fürth, Germany). We close by noting that the future proliferation of PLC as an enabler for Smart Grid functionalities is not only a technological issue, but also depends strongly on how swiftly electric utilities are able to implement necessary changes in the energy distribution process, and ongoing legislative developments concerning infrastructure reliability and new services like real-time pricing. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE REFERENCES BIOGRAPHIES [1] H. Ferreira et al., “Power Line Communication,” in Encyclopedia of Electrical and Electronics Engineering, J. Webster, Ed., Wiley, 1999, pp. 706–16. [2] H. A. Latchman and L. W. Yonge, “Power Line Local Area Networking,” IEEE Commun. Mag., vol. 31, no. 4, Apr. 2003. [3] S. Galli, A. Scaglione, and K. Dostert, “Broadband Is Power: Internet Access through the Power Line Network,” IEEE Commun. Mag., vol. 31, no. 5, May 2003. [4] S. Galli and O. Logvinov, “Recent Developments in the Standardization of Power Line Communications within the IEEE,” IEEE Commun. Mag., vol. 46, no. 7, July 2008, pp. 64–71. [5] G. Bumiller, “Single Frequency Network Technology for Medium Access and Network Management,” IEEE ISPLC, Athens, Greece, Mar. 2002. [6] G. Bumiller, “Power-Line Physical Layer Emulator for Protocol Development,” IEEE ISPLC, Zaragossa, Spain, Mar. 2004. [7] L. Do, H. Hrasnica, and G. Bumiller, “SALA MAC Protocol for PLC Networks Based on Single Frequency Network Technique,” IEEE ISPLC, Orlando, FL, Mar. 2006. [8] L. Lampe, R. Schober, and S. Yiu, “Distributed SpaceTime Block Coding for Multihop Transmission in Power Line Communication Networks,” IEEE JSAC, vol. 24, July 2006, pp. 1389–1400. [9] G. Bumiller and L. Lampe, “Fast Burst Synchronization for Power Line Communication Systems,” EURASIP J. Adv. Signal Process., vol. 2007, article ID: 12145. [10] A. Scaglione and Y.-W. Hong, “Opportunistic Large Arrays: Cooperative Transmission in Wireless Multihop Ad hoc Networks to Reach Far Distances,” IEEE Trans. Signal Process., vol. 51, no. 8, Aug. 2003, pp. 2082–92. [11] E. Garrity, “Getting Smart,” IEEE Power Energy Mag., vol. 9, Mar./Apr. 2008, pp. 38–45. [12] M. Eriksson, “Dynamic Single Frequency Networks,” IEEE JSAC, vol. 19, Oct. 2001, pp. 1905–14. [13] M. Mushkin, “A Novel Distributed Synchronized Media Access Control Mechanism and Its Applicability to InHouse Power-Line Networking,” IEEE ISPLC, Malmö, Sweden, Mar. 2001. [14] M. Lee et al., “HomePlug 1.0 Powerline Communication LANs — Protocol Description and Performance Results,” Int’l. J. Commun. Sys., vol. 46, no. 5, June 2003, pp. 447–73. [15] T. Kwon et al., “Efficient Flooding with Passive Clustering — An Overhead-Free Selective Forward Mechanism for Ad Hoc/Sensor Networks,” Proc. IEEE, vol. 91, no. 8, Aug. 2003, pp. 1210–20. GERD BUMILLER [M] (gerd.bumiller@iad-de.com) _______________ received his Diplom (Univ.) and Ph.D. degrees in electrical engineering from the University of Erlangen, Germany, in 1997 and 2009, respectively. He joined iAd GmbH, Germany, as a communication system developer in 1997. Since 2000 he has been chief developer responsible for all power line communication projects of iAd. In this role he has been involved in a number of European and international projects on high-data-rate access, control and automation, and Smart Grid power line communications. He has published widely in the area of power line communications with contributions to channel measurement and modeling, coupling, synchronization, multicarrier modulation, coding, routing, and ad hoc networking. He is a member of Work Group 2 (Network Operations) of the EU Smart Grids initiative (www.smartgrids.eu), participates in the Open Metering initiative of ZVEI and FIGAWA in Germany, and is a member of AK 461.0.141 and UK 716.1 in the German standardization body DKE. IEEE BEMaGS LUTZ LAMPE [SM] (Lampe@ece.ubc.ca) ___________ received his Diplom (Univ.) and Ph.D. degrees in electrical engineering from the University of Erlangen, Germany, in 1998 and 2002, respectively. Since 2003 he has been with the Department of Electrical and Computer Engineering at the University of British Columbia, where he is currently an associate professor. His research interests are in communication theory with applications to wireless and power line communications. He is Vice-Chair of the IEEE Communications Society Technical Committee on Power Line Communications. He was General Chair of the 2005 International Symposium on Power Line Communications and the 2009 IEEE International Conference on Ultra-Wideband. F The efficacy of the presented concepts has been verified in field trials under the umbrella of the REMPLI project, and PLC products based on this technology are currently being used in a number of pilot projects for advanced meter management. HALID HRASNICA (hrasnica@eurescom.eu) _____________ graduated in 1993 in electrical engineering from the University of Sarajevo, Bosnia and Herzegovina. Afterward, he worked in Energoinvest Communications in Sarajevo as developing engineer for communications systems. In 1995 he joined the Institute for Telecommunications at Dresden University of Technology, Germany, where he received his Ph.D. degree in electrical engineering and information technology. Since February 2006 he has been with Eurescom GmbH in Heidelberg, Germany, where he works as programme manager for research projects on future telecommunications networks. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 113 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F ACCEPTED FROM OPEN CALL IMS-Compliant Management of Vertical Handoffs for Mobile Multimedia Session Continuity Paolo Bellavista, Antonio Corradi, and Luca Foschini, University of Bologna ABSTRACT The recent advances in wireless client devices and the crucial role of multimedia communications in our society have motivated relevant standardization efforts, such as the IP multimedia subsystem, to support session control, mobility, and interoperability in all-IP next-generation networks. IMS has already driven the design of commercial mobile multimedia, but exhibits limited support for service continuity during handoffs. In particular, it omits advanced techniques to reduce/eliminate handoff delays, especially during vertical handoffs (i.e., change of the wireless technology employed by a client to access the wired Internet, e.g., from UMTS to WiFi). We propose an original solution for session continuity based on the primary design guideline of cleanly and effectively separating the signaling plane (for session reconfiguration via SIP) from the media delivery plane (data transmission and related handoff management operations). Our optimized handoff management techniques exploit terminal-based decentralized predictions to minimize service-level handoff delays. Different from other recent related work, our proposal fully complies with the standard IMS infrastructure and works at the application level. The reported experimental results point out that our solution, available as an open source tool for the IMS community, reduces playout interruption times relevantly by introducing a limited and scalable signaling overhead. INTRODUCTION 1 Additional information, experimental results, and the IHMAS prototype code are available at http://lia.deis.unibo.it/Res earch/IHMAS/ ________ 114 Communications IEEE A growing number of mobile users require seamless access to multimedia services, such as audio/video streaming, while they move across the available, possibly heterogeneous, wireless infrastructures, spanning from IEEE 802.11 (WiFi) and Bluetooth (BT) to cellular 3G. However, despite the great potential of multimedia applications over integrated and heterogeneous wired-wireless networks, their development and deployment are still challenging tasks due to typically strict QoS requirements (e.g., data arrival time, jitter, and data losses). In addition, user mobility introduces demanding issues such as 0163-6804/10/$25.00 © 2010 IEEE bandwidth fluctuations and/or temporary loss of connectivity due to device handoffs, when a mobile node (MN) disconnects from one access point (AP) and reconnects to a new one. In particular, granting service continuity during vertical handoffs is one of the open and crucial problems still to overcome, by defining adequate and effective support for interoperable session management. A large group of standardization entities, which range from the Third Generation Partnership Project (3GPP) to the Internet Engineering Task Force (IETF) and Open Mobile Alliance (OMA), has recently specified the IP multimedia subsystem (IMS) [1]. IMS defines an overlay architecture for session control and authentication, authorization, and accounting (AAA) in all-IP next-generation networks. The main goal is achieving openness and interoperability via an application-layer approach, mainly by exploiting the Session Initiation Protocol (SIP). At its current stage, however, IMS exhibits some limitations in the support of handoff management. In particular, IMS adopts a reactive approach and starts multimedia session reconfiguration only after losing connection with origin APs, thus postponing the execution of data handoff management operations, which may be articulated, especially in the case of vertical handoffs. That is prone to produce significant handoff delays and compromise session continuity. The article tackles this problem by proposing a novel solution that exhibits three original characteristics. First, it decouples session signaling and data management, by exploiting decentralized handoff predictions that proactively activate session signaling with the new target network while data still flow over the old AP. Second, it is fully compliant with the IMS standard and does not require any change to already installed IMS equipment. Third, it applies optimized techniques for data management during handoffs to minimize data losses. The proposed support infrastructure has been implemented as an open source tool, called the IMS-compliant Handoff Management Application Server (IHMAS); 1 IHMAS is available for the IMS community, and outperforms related work in the field in terms of handoff delays and scalability [2–4]. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE The article is structured as follows. The next section briefly overviews the IMS background and related work. Then we motivate the need for proactive handoff management and propose different techniques to optimize IMS-based handoff. We then present the IHMAS design, implementation, and experimental results, while directions of our current research conclude the article. SESSION CONTINUITY IN IMS: BACKGROUND AND RELATED WORK The IMS standard supports different kinds of mobility. Our proposal focuses on terminal mobility management during service provisioning and, in particular, on vertical handoffs. Hence, in the following we use the term session continuity to indicate specifically multimedia service continuity in the case of so-called mid-call terminal mobility with vertical handoffs. IMS BACKGROUND IMS allows the creation, modification, and termination of service sessions independent of underlying data link layer technologies and transport protocols. In particular, IMS promotes the clear separation of the signaling plane — for session re-/configuration, based on all-over-IP technologies and SIP — and the media delivery plane — for data transmission, based on different possible transport protocols, such as IETF Real-Time Transport Protocol over UDP (RTPover-UDP). In addition, the IMS infrastructure offers several facilities to help multimedia service developers. It not only defines session and AAA protocols, but also provides a wide set of support functions (e.g., for decentralized proxy-based session management, endpoint localization, and introduction of new IMS-based services/extensions [1]). The core IMS functional entities are: • IMS client, which controls session setup and media transport by implementing all the SIP extensions specified by IETF and 3GPP IMS-related standards. A unique HTTPlike universal resource identifier (URI), such as sip:user@domain, identifies each IMS client. Any session is set up between two IMS clients (SIP endpoints). In this article, without losing any generality and for the sake of presentation clarity, we always consider an MN as the originating SIP endpoint and a fixed correspondent node (CN) as the terminating one. • Proxy-call session control function (PCSCF), which establishes secure associations with MNs and routes outgoing/incoming SIP messages to the inner IMS infrastructure on an MN’s behalf. • Interrogating-CSCF (I-CSCF), which is responsible for securely interconnecting and routing SIP messages among different IMS domains. • Application server (AS), which allows the introduction of new IMS services and extensions by having full control over traversing SIP dialogs. • Home subscriber server (HSS), which stores client AAA data and profiles. • Serving-CSCF (S-CSCF), which is the most important session control component and enables the coordinated interaction of all IMS entities. The S-CSCF receives register requests from IMS clients, and interacts with HSSs to authenticate them, and to update associations between SIP URIs and current client endpoints. Moreover, depending on filters/triggers specified by client profiles, the S-CSCF may either route incoming SIP messages directly to a CN — through the terminating P-/I-CSCF if a CN is in the same/different domain — or forward them to an AS [1]. • Dynamic Host Configuration Protocol (DHCP), the standard Internet facility that IMS employs for MN configuration. Given its ability to change SIP message content, the S-CSCF can also extend MN-to-CN session signaling paths through the interposition of convenient ASs; these ASs may participate in multimedia content adaptation/transport/buffering by interacting with multimedia proxy (MP) entities, which play the role of media gateways at the media delivery plane. ASs are the only points of contact between signaling and data transport planes, and can enforce data handoff management operations by controlling MPs along MNto-CN data paths. The IMS client executes at the MN; DHCP, P-CSCF, and MPs are deployed at the network edges of the MN visited networks; ASs, HSSs, I-CSCFs, and S-CSCFs typically run in home networks. With a closer view to detail, IMS-based vertical handoff management includes several functions at different protocol stack layers. At the data link layer, the crucial operation is data link connection, which includes monitoring origin AP connection loss and establishing a new connection with a target AP. The main network-layer operation is the renewal of network configuration parameters at an MN: according to the standard IMS specification, IHMAS exploits DHCP to re-establish the MN IP address and PCSCF server endpoint in the target network. Afterward, application-layer session signaling starts. First, an MN establishes a new secure association with its S-CSCF by sending a REGISTER message through the target P-CSCF. Let us note that this is one of the longest handoff management operations, requiring two roundtrips to fulfill IMS security requirements, and lasts about 320 ms [1]. Then the MN renegotiates the ongoing session by sending an INVITE message (about 85 ms), with updated Session Description Protocol parameters, such as RTPover-UDP MN endpoints and a network description. The INVITE message triggers data flow rebinding (and content adaptation when necessary) at the media delivery plane. Figure 1 shows the standard message flow during IMS-managed handoffs; our original proposal is to enhance it via AS interposition, as detailed in the following. Continuous black lines over grey background represent the IMS session signaling protocol, dotted black lines the local events emitted by the MN (e.g., old connection loss), and solid dark blue ones the data streams. Let us remark that IMS handoff may incur relatively long delays (up to 2 s) due to its reactive IEEE BEMaGS F The main networklayer operation is the renewal of network configuration parameters at MN: according to the standard IMS specification, IHMAS exploits DHCP to re-establish MN IP address and P-CSCF server endpoint in the target network. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 115 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page MN Old conn. loss Target P-/I-CSCFMN S-CSCFMN S-CSCFCN CN Data flow Media loss (4) 401 Unauth. (5) REGISTER (8) 200 OK (9) INVITE (2) REGISTER (3) 401 Unauth. (6) REGISTER (7) 200 OK (10) INVITE (11) INVITE (12) INVITE Data flow rebind (16) 200 OK (15) 200 OK (14) 200 OK (13) 200 OK Renegotiation phase (1) REGISTER Registration phase Datalink handoff and DHCP req. Data flow Figure 1. Message flow for non-optimized IMS handoff management. approach: handoff is triggered by the loss of the old connection, and all the subsequent operations are performed sequentially, without exploiting the possible overlapping between the coverage areas of the old and target APs. RELATED WORK Application-layer IMS-based handoff management has its roots in SIP-based mobility management, first proposed by Schulzrinne [5]. Thereafter, a number of SIP-based research efforts tackled session continuity by addressing two main issues: • Session reconfiguration, usually managed at the application layer with SIP • Seamless flow provisioning and data path rebinding, managed at either the application layer through SIP rebinding or, more often, the network layer via Mobile IP (MIP) and its extensions [6] The interest in IMS-based session continuity is also demonstrated by the recent special issue of this magazine on IMS infrastructures and services [7]. In the following, for the sake of briefness, we only focus on the three vertical handoff solutions closest to IHMAS, ordered by growing similarity. Intelligent Network-Seamless Mobility Access (IN-SMA) mainly focuses on session reconfiguration [2]. In particular, IN-SMA introduces an IMS AS, called the mobility server, that supports voice call (re)routing from 3G cellular networks to IMS-compliant WiFi VoIP infrastructures, while providing seamless flow provisioning via MIP. Like our approach, IN-SMA considers mobility as an advanced IMS service (implemented as an IMS AS) and does not require changes to the IMS core. However, it presents two main limitations. First, IN-SMA supports vertical handoffs only in the 3G-to-WiFi direction, and excludes decentralized, terminal-based, and proactive MN initiation of handoff management countermeasures. Second, the proposed solution for flow continuity seems to still be pre- 116 Communications IEEE A BEMaGS F liminary: the authors propose MIP usage but do not face at all the challenging issues of realworld handoff latencies. Networking Context-Aware Policy Environment (NetCAPE) also supports 3G-to-WiFi vertical handoffs. It adopts a cellular-centric solution by employing the so-called tight-coupling interworking scheme of 3GPP [3]. Similar to our proposal, NetCAPE exploits handoff prediction to proactively activate vertical handoff procedures before clients lose connectivity from their origin APs. However, its tight-coupling approach requires that any communication from the WiFi domain passes through the core cellular network, with increased communication costs. Moreover, NetCAPE focuses on handoff prediction and MIP delay optimization, but not on full compliance with the standard IMS infrastructure. To the best of our knowledge, the published solution closest to IHMAS is [4], which enables secure session continuity for the multimedia domain (MMD), the IMS-equivalent infrastructure defined by the 3GPP2 standard. MMD aims to reduce handoff latency by employing context transfer techniques to move, either reactively or proactively, session description and security information from old to new P-CSCFs, and addresses all MIP-related security issues [4]. Nonetheless, it is not easily deployable in the IMS infrastructure: it requires modifying the standard IMS session signaling protocol to support session context transfer and consistently changing existing P-CSCFs. In addition, MMD operates data handoff (MIP address reconfiguration) before multimedia session renegotiation, thus precluding multimedia flow adaptation before data transfer. Finally, the proposed prototype employs MIPv4, thus possibly undertaking long latencies due to triangular routing and, consequently, long handoff delays [4]. IHMAS APPLICATION-LAYER HANDOFF ENHANCEMENTS As exemplified in the previous section, providing session continuity of IMS-based mobile multimedia is still an open issue. About session signaling, one of the most challenging problems is to reduce the duration of session rebinding. In fact, the rebinding of ongoing sessions requires exchanging several SIP REGISTER/INVITE messages (usually called re-REGISTER and reINVITE), thus lengthening data handoff delays. Some support solutions in the literature face this issue by introducing extensions to deal with context transfer [4]. However, these solutions are not standard; their deployment requires protocol stack changes at all CSCFs, and their main goal is not session continuity. For instance, MMD does not allow data adaptation before data handoff, and this may cause the injection into the target network of multimedia flows with quality exceeding its transmission capabilities, thus possibly congesting it up to data delivery interruption. About data handoff management, current proposals tend to be MIP-based and with still unsolved issues. First, the MIP network layer IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE approach lacks the visibility of (and hardly complies with) application-specific requirements such as maximum tolerable delay. Moreover, there is a growing interest in soft data handoff strategies because they permit MNs to have two or more simultaneous connections to various APs, as opposed to hard strategies where MNs have only one connection at a time. MIP-based solutions typically adopt a hard handoff strategy that maps one MN to only one IP address, by excluding more flexible rebinding opportunities. Finally, for each vertical handoff, MIP and MIPv4 require an additional round-trip time (in addition to the ones due to REGISTER/INVITE messages) to reconfigure data endpoints at the MN home (i.e., home agents). Our IHMAS proposal overcomes all the above limitations by adopting three main design guidelines. First, our solution is fully IMS-compliant: IHMAS originally exploits IMS separation of signaling/media delivery planes and introduces a new AS to realize advanced data handoff management. In that way, the proposal is fully compatible with the current IMS standard, without the need for any intervention on already deployed IMS components. Second, our solution is proactive: to reduce vertical handoff latency, IHMAS predicts vertical handoffs at clients and starts session reconfiguration before handoff management. Third, our proposal adopts an application layer proxy-based approach, not only for session signaling, but also for data handoff. IHMAS overcomes typical MIP problems by using SIP-based flow rebinding and exploiting MPs that are locally deployed at client access localities to enable prompt, flexible applicationlayer handoff management on the media delivery plane. By focusing on session signaling, proactivity is based on the introduction of a vertical handoff predictor (VHP) that extends the IMS client by providing lightweight and completely decentralized prediction via only local access to client wireless interfaces. The IMS client exploits VHP predictions to proactively start SIP-based session reconfiguration (REGISTER/INVITE messages) over the target AP while continuing to receive multimedia data from the origin AP. On the IMS infrastructure side, the primary IHMAS component is the AS for session continuity (ASSC) that reduces handoff media losses by decoupling session rebinding and data transfer times. Deployed at the MN home network, the ASSC receives all SIP messages from the MN SCSCF; it acts as an IMS anchor point, by hiding CN from MN mobility and consuming all handoff-related SIP messages (especially INVITE); finally, it triggers data handoff control operations over the MP. The MP component implements our novel handoff management strategies for either soft or hard (the latter either reactive or proactive) handoff management. In particular, we propose a flexible two-level buffering solution: the MP, deployed along the MN-to-CN multimedia data path, hosts one second-level buffer for each MN currently active in its domain to suitably adjust multimedia flows with the main goal of service continuity [6]. The second-level buffer enables soft handoff management by locally supporting the duplication (and simultaneous transmission) of multimedia flows over multiple wireless interfaces in the last wired-wireless hop. For hard proactive handoff, instead, the second-level buffer can receive and store all the incoming packets that would be lost during the (short) RTP-over-UDP rebinding period and enable local retransmission of stored packets (forwarding) when the MN reconnects to the MP over the target AP. The hard reactive handoff strategy is a simplified case of hard proactive with no data store-and-forward. Finally, let us observe that in the following, we focus only on the downlink direction (from APs to wireless clients) because most traffic load is in this direction in multimedia streaming applications such as video on demand and IP-based TV. Anyway, the proposed IHMAS optimizations are lightweight and may easily also apply to uplink data transmissions by only requiring limited buffering resources at the client side (i.e., to cover only the handoff disconnection interval), usually available on any portable client device nowadays. The remainder of the section presents our original IMS handoff optimizations. While all IHMAS enhancements adopt a proactive approach on the IMS session signaling plane, we distinguish different types of IHMAS improvements depending on how the ASSC exploits its awareness of vertical handoff temporal proximity — through (re-)INVITE reception from MN — to trigger different management actions at the media delivery plane: hard reactive/proactive and soft data handoff management. IEEE BEMaGS F The proposed IHMAS optimizations are lightweight and may easily apply also to uplink data transmissions by only requiring limited buffering resources at the client side, i.e., to cover only the handoff disconnection interval, usually available at any portable client device nowadays. IHMAS HARD DATA HANDOFF MANAGEMENT Figure 2 shows our optimized hard proactive/reactive handoff procedures. Dashed black lines represent our original message flow extensions and red brackets point out the operations that the MP executes only for proactive management. VHP predictions enable the proactive execution of data link/network handoff operations over the target network: they permit completing the registration phase and starting renegotiation while keeping the media flows active over old connections. In particular, upon INVITE message reception (step 12), depending on the adopted handoff strategy, the ASSC triggers data handoff at the MP by either activating (proactive) or not (reactive) the store-and-forward function on multimedia flows (step 13). For proactive handoff, the MP receives and stores incoming flows in its local second-level buffer during the RTP-over-UDP rebinding period, while the IMS client supports session continuity by consuming the client-side buffer. Thus, after data rebinding, the MP can promptly fill up MN buffers by retransmitting all the data otherwise lost due to temporary disconnection. Therefore, hard proactive management requires that the MN sends a message to trigger data retransmission. RTP retransmissions were standardized only recently and some IMS clients do not yet support this facility, as well as RTP data frame reordering to present retransmitted frames in the correct order to multimedia players [8]. To guarantee the widest interoperability, in addition to the more effective hard proactive strategy, IHMAS provides hard reactive handoff. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 117 A BEMaGS F Communications IEEE MN Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Target P-/I-CSCFMN MP S-CSCFMN ASSC CN Handoff prediction Datalink handoff and DHCP req. (1) REGISTER (2) REGISTER (3) 401 Unauth. (4) 401 Unauth. (5) REGISTER (6) REGISTER (8) 200 OK (9) INVITE Media loss for reactive mng. Old conn. loss Data flow (17) 200 OK Lost frames Data flow (7) 200 OK (10) INVITE (11) INVITE (12) INVITE (13) Hard (proactive)/ reactive data handoff trigger Proactive data buffering Data flow rebind (14) 200 OK (16) 200 OK (15) 200 OK Lost data retransm. (18) Client re-transmit request Figure 2. Message flow for optimized hard reactive/proactive data handoff management. Hard reactive handoff may also be useful, in some cases, to minimize the exploitation of second-level buffer resources. However, that buffering cost is usually very low; in fact, it depends on single multimedia frame size, data rate, and especially RTP-over-UDP rebinding time, usually below 220 ms even in high-load scenarios such as the ones discussed below. In addition, let us note that hard handoff strategies should apply only if compatible with application-specific requirements on delay and data loss; otherwise, soft handoff has to be selected. Our proposal does not require any modification to the standard IMS protocol (grey background), but only adds some new messages (steps 13 and 18) to link signaling session and media delivery planes. Different from MMD, we do not postpone session renegotiation after data handoff; in this way, IHMAS can tailor multimedia flows to target network characteristics before transferring them, by granting session continuity and flow delivery at the most suitable quality at any time [4]. To activate flow adaptation at the MP proactively, the ASSC exploits Session Description Protocol data in INVITE messages. IHMAS SOFT DATA HANDOFF MANAGEMENT Figure 3 shows the optimized soft handoff procedure implemented by IHMAS. Compared to hard handoff, soft handoff supports a wider range of multimedia services, even with stricter delays and jitter requirements. It requires smaller second-level buffer resources, only to store the short streaming data chunk necessary to sustain streaming; for instance, for a G.711 (U-law) encoded audio flow with constant frame rate = 50 frame/s and G.711 RTP packet payload size of 216 bytes, it is sufficient to store three data frames (less than 1 kbyte). In addition, it slightly increases energy consumption at the client by 118 Communications IEEE A BEMaGS F maintaining the old interface active for only the short time necessary to receive the first packets over the new interface, usually below 220 ms. IHMAS soft handoff adopts a proactive session signaling approach and is completely IMS-compliant: it solely requires minor modifications at IMS clients, only affecting media delivery modules. By delving into finer detail, at INVITE message reception, the ASSC activates soft handoff at the MP (step 13). Hence, the MP duplicates and sends RTP frames over both old and target wireless links. The IMS client is in charge of removing duplicated frames. The interaction ends at the completion of RTP-over-UDP connection rebinding. To stop data flow duplication at the MP, IHMAS introduces a new control message from MN to MP by adding an optional field to the standard RTP retransmission payload format (step 18) [8]. IHMAS TESTBED IMPLEMENTATION AND PERFORMANCE RESULTS To thoroughly test and evaluate the performance of IHMAS, we carried out two types of experiments by deploying it in the widescale and heterogeneous wireless network at our campus. First, we performed field experiments validating the effectiveness of IHMAS functions. Second, we used a state-of-the-art IMS traffic generator to assess the cost and scalability of the proposed signaling by emulating the typical behavior expected in wide-area IMS deployments with a multitude of concurrent users/requests. In the evaluation testbed, the IMS infrastructure components (CSCFs, HSSs, and ASSC) run on Linux boxes with two 1.8 GHz CPUs and 2048 Mbytes RAM, following the standard IMS deployment indicated earlier. During the first experiment, MNs (Windows and Linux laptops equipped with OrinocoGold WiFi cards and MopogoBT dongles) moved between BT and WiFi cells served by MopogoBT dongles and CiscoAironet1100 APs, respectively, changing to several access networks corresponding to different university buildings. For the second experiment, instead, we employed the IMS Bench SIPp, an IMS traffic generator that conforms to the ETSI TS 186 008 IMS/NGN Performance Benchmark specification. For IMS implementation, we employed the OpenIMSCore that includes all main IMS components and various facilities to ease S-CSCF trigger creation as well as the integration of new ASs [9]. The ASSC is implemented in Java, by exploiting the portable Java application programming interface (API) for Integrated Networks (JAIN) SIP implementation by the National Institute of Standards and Technology. Our MNs exploit the open source IMS Communicator — a pure Java IMS client based on SUN Java Media Framework (JMF) and JAIN SIP with IMS SIP extensions by 3GPP and IETF — that we originally extended to support IHMAS optimizations [6, 10]. For data buffering/streaming, our MP exploits Asterisk, the widespread open source telephony engine that we extended to support second- IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE level buffering [6]; the related performance evaluation at the media delivery plane is out of the scope of this article. The results of the first set of experiments, shown in Fig. 4, point out the effectiveness of IHMAS handoff management techniques by comparing their performance in the case of vertical handoffs from BT to WiFi. Reported results are averaged over 1000 handoff cases, while provisioning an audio on demand service offering G.711 (U-law) encoded flows (constant frame rate = 50 frames/s) with buffer slots storing G.711 RTP packets (216-byte payload/packet). For each handoff management scenario, the figure shows session signaling duration (upper bar), data handoff management delay (defined as the delivery delay introduced by the applied handoff technique, middle bar), and playout interruption time (defined as the data duration of the media gap perceived by final users, lower bar); the Ø symbol represents negligible time intervals. Figure 4 focuses on a restricted time interval excluding VHP prediction: as known from our previous experiments, our BT-to-WiFi handoff prediction grants a prediction advance time between 5.4 s and 6.8 s with sufficiently low error rates (under 9.0 percent) for most mobility conditions of interest for multimedia streaming [6]. By focusing on session signaling, the reported result is the sum of the duration of the four main vertical handoff functions: data link connection, DHCP negotiation, REGISTER, and INVITE signaling times. Data link connection time strictly depends on handoff type, wireless coverage, and client card characteristics [6]. For basic handoff scenarios, it is very long (e.g., 670 ms), due to the employed reactive approach, which activates the target WiFi network and starts data link discovery only after connection loss. In all other situations, instead, IHMAS exploits VHP predictions to switch proactively to WiFi as soon as a probable handoff is predicted, thus eliminating discovery delays and dropping data link connection time to 16 ms. DHCP negotiation time highly depends on DHCP server/client implementation. We have extensively tested both Windows and Linux servers, and decided to employ Linux dhcpd due to its robustness. Moreover, while in the basic handoff management case DHCP negotiation imposes long delays (535 ms), our optimized techniques accelerate the process by promptly activating DHCP discovery as soon as the new interface is active (delay down to 206 ms). Finally, to better evaluate REGISTER and INVITE times when compared with basic handoff, we do not include the delay introduced by the distance between CN and MN home networks because the ASSC reconfigures the session directly at the MN home. Under that assumption, the measured REGISTER and INVITE signaling times are similar for all handoff management situations: 327 ms and 85 ms, respectively, as expected due to the adoption of the standard IMS session signaling. The measurements exhibited a limited variance (under 7.5 percent in all cases). The reported results clearly show that our proactive approach can relevantly reduce session signaling time. In addition, even most important, it is demonstrated to be very effective for data IEEE BEMaGS MN Target P-/I-CSCFMN MP S-CSCFMN ASSC F CN Handoff prediction Datalink handoff and DHCP req. (1) REGISTER (2) REGISTER (3) 401 Unauth. (4) 401 Unauth. (5) REGISTER (6) REGISTER (7) 200 OK (8) 200 OK (9) INVITE (10) INVITE (11) INVITE (12) INVITE Data flow over old connection Duplicates elimination (13) Soft data handoff trigger Data flow duplication and bind (14) 200 OK (16) 200 OK (15) 200 OK (17) 200 OK Data flow over Old conn. target connection loss (18) Stop data duplication Figure 3. Message flow for optimized soft data handoff management. Basic handoff management Hard reactive handoff management Data link connection DHCP renegotiation REGISTER signaling INVITE signaling Minimum service delay Playout interruption Hard proactive handoff management 0 Soft handoff management 0 0 0 200 400 600 800 1000 1200 1400 1600 1800 2000 Time (ms) Figure 4. Session signaling and data handoff completion time for BT to WiFi handoff. management delay and playout interruption. In basic handoff, due to the serialization of handoff operations, RTP connection rebinding can start only after session signaling termination, thus causing heavy data management delays (1812 ms). Our hard handoff management drops this delay down to 220 ms, which corresponds to the time required to send the INVITE message and to finish RTP connection rebinding, started as soon as MP receives the ASSC handoff trigger. Moreover, if second-level buffering is used, it is possible to mask the deriving loss of multimedia data to final users at the expense of increased packet delays (due to data buffering), thus avoiding any playout interruption. In addition, we have performed preliminary experiments for WiFi-to-3G vertical handoff, and the collected results have demonstrated the same trends of Fig. 4. The only main difference is a much longer data link connection time (from 7.3 s without optimizations to 4.2 s by properly decreasing the wakeup period of 3G cards in idle state), while the duration of other phases is approximately IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 119 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page the same. In particular, handoff prediction (in this case measuring the possibility that WiFi signal strength at the MN drops below a given threshold) permits very low latencies to be achieved, as reported in Fig. 4 for the BT-toWiFi case. Regarding IHMAS soft handoff management, it supported lossless handoffs without any additional frame delay cost in all the experiments. Finally, let us note that the performance results in Fig. 4 largely outperform other stateof-the-art solutions in the literature (e.g., the lowest MMD playout interruption time is 3666 ms). Such an improvement is possible because IHMAS can eliminate data link connection and MIP reconfiguration times, thanks to its signal- 220 200 10 cps 20 cps 30 cps 40 cps 50 cps 60 cps 70 cps 180 160 CPU % 140 S-CSCF P-CSCF3 120 100 80 60 40 20 0 330,000 390,000 450,000 510,000 570,000 630,000 690,000 750000 ms (a) 100,000 ms 10000 10 cps 20 cps 30 cps 40 cps 50 cps 60 cps 70 cps INVITE w/o ASSC INVITE with ASSC 1000 100 10 330,000 390,000 450,000 510,000 570,000 630,000 690,000 750,000 ms (b) 220 200 180 CPU % 160 10 cps 20 cps 30 cps 40 cps 50 cps 60 cps 70 cps S-CSCF P-CSCF3 ASSC 140 120 100 80 60 40 20 0 330,000 390,000 450,000 510,000 570,000 630,000 690,000 750,000 (c) ms Figure 5. IHMAS session signaling scalability. 120 Communications IEEE A BEMaGS F ing/media plane decoupling and application layer approach [4]. Figure 5 reports the results of the second set of experiments, aimed at quantitatively evaluating costs and scalability of ASSC interposition in IHMAS in wide-scale deployment scenarios and, more generally, of signaling overhead due to AS interposition in IMS. By using the IMS Bench SIPp and exploiting the concept of IMS session phases supported in it, we defined a scenario consisting of a first preparation phase, which lasts 330 s and includes only IMS client registrations with a constant arrival rate of 15 calls per second (cps), and a second evaluation phase, which consists of a mix of 2.5 percent registrations, 2.5 percent deregistrations, 15 percent reregistrations, 50 percent invitations, and 30 percent re-invitations. That mix mimics the usual IMS traffic composition. The evaluation phase is configured with 7 incremental steps of traffic, going from 10 cps to 70 cps; each step (from 330 s to 750 s) lasts 60 s, and calls arrive according to a Poisson distribution. Delving into finer detail, we first stressed the system without the ASSC within the path (Fig. 5a); then we repeated the experiments by interposing the ASSC and activating new IMS components to grant an infrastructure scalability level comparable to the one obtained without the ASSC (Fig. 5c). For the sake of simplicity, here we focus on the most overloaded components, the S-CSCF, P-CSCF, and ASSC. Reported results show CPU utilization (from 0 to 200 percent, summing up the two CPUs) because, in our experience, the CPU is the main bottleneck in IMS infrastructures due to the costs of message parsing/forwarding. Other performance indicators, such as memory and network load, have proven less relevant to scalability (additional results are available at the IHMAS web site). We also report the delay of the first INVITE signaling phase — the longest one (after the initial unchanged REGISTER) due to initial filtering criteria evaluation at S-CSCF and ASSC interposition, common to all IHMAS handoff strategies. This delay is reported with and without ASSC (dashed and solid lines in Fig. 5b, respectively, in logarithmic scale). All results have exhibited limited variance (i.e., under 5 percent for 100 runs). Without the ASSC, we have determined that to stir one S-CSCF (solid line in Fig. 5a) to its upper limit, it is necessary to deploy three PCSCFs (dashed line; we report only P-CSCF3 for sake of clarity). The S-CSCF starts collapsing at 610 s (Fig. 5a), as also shown by the sudden increment of the INVITE delay. At step 6, the IMS Bench stops injecting new traffic due to the number of received errors and S-CSCF saturation also provokes a message retransmission cascading effect on P-CSCFs, which collapse in the following step (Figs. 5a and 5b). ASSC interposition produces a non-negligible message load increase: each traversing SIP message provokes the creation and injection of an additional SIP message. However, to have performance results comparable to the ones without the ASSC, it is easy to activate an additional S-CSCF to split and balance incoming load. With this simple deployment variation, the S-CSCF begins to saturate at 530 s and IHMAS collapses at step 5, IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE with a cascading effect on the P-CSCF and ASSC (Fig. 5c; the other S-CSCF exhibits a similar behavior). The ASSC, instead, does not show any scalability issues: before system collapse, its CPU load is always below 80 percent. In short, on one hand, the reported results quantitatively show the non-negligible cost of AS interposition in any IMS infrastructure in general. On the other hand, they demonstrate that IHMAS scales well and can apply even to deployment scenarios with high cps. Let us stress that in realistic execution environments, IHMAS optimization costs apply only to a subset of incoming calls (in our experiments we considered all calls to rapidly stress our system); moreover, they are expected to be balanced by proper pricing. In addition, we did analogous performance evaluations (both sets of experiments) for the other vertical handoff direction (i.e., from WiFi to BT): apart from longer BT data link connection delays, IHMAS enabled similar delay reductions in that case as well. For this reason, due to space limitations, here we do not report those results, which are available at the IHMAS Web site, together with further implementation details and performance evaluations. CONCLUSIONS The IHMAS research work demonstrates the suitability of an application-level approach to extend the standard IMS infrastructure in order to improve its performance for session mobility during handoffs. In particular, IHMAS flexibly supports three data handoff management strategies that an ASSC can dynamically select and configure depending on service requirements and deployment conditions. That is possible by preserving full compliance with the standard, thus enabling the IHMAS deployment over already installed IMS-conformant networks. The encouraging results obtained with the IHMAS prototype are motivating our current research along two primary directions. On one hand, we are executing objective measurement of quality improvements/degradations during vertical handoffs with/without multimedia adaptation at the MP. On the other hand, we are using IHMAS to implement an IMS-based phone meeting application for mobile users (support of group communications). IEEE BEMaGS F REFERENCES [1] G. Camarillo and M. A. García-Martín, The 3G IP Multimedia Subsystem (IMS), 2nd ed., Wiley, 2006. [2] C. Kalmanek et al., “A Network-Based Architecture for Seamless Mobility Services,” IEEE Commun. Mag., vol. 44, no. 6, June 2006, pp. 103–9. [3] A. Udugama et al., “NetCAPE: Enabling Seamless IMS Service Delivery across Heterogeneous Mobile Networks,” IEEE Commun. Mag., vol. 45, no. 7, July 2007, pp. 84–91. [4] A. Dutta et al., “Mobility Testbed for 3GPP2-Based Multimedia Domain Networks,” IEEE Commun. Mag., vol. 45, no. 7, July 2007, pp. 118–26. [5] H. Schulzrinne, E. Wedlund, “Application-Layer Mobility Using SIP,” ACM Mobile Comp. Commun. Rev., vol. 4, no. 3, July 2000, pp. 47–57. [6] P. Bellavista et al., “Context-Aware Handoff Middleware for Transparent Service Continuity in Wireless Networks,” Pervasive Mobile Comp. J., vol. 3, no. 4, Aug. 2007, pp. 439–66. [7] M. Toy, H. J. Stuttgen, and M. Ulema, “IP Multimedia Systems in Infrastructure and Services — Part II,” IEEE Commun. Mag., Special Issue on IP Multimedia Systems and Services, vol. 45, no. 7, 2007, pp. 66–67. [8] J. Rey et al., “RTP Retransmission Payload Format,” IETF RFC 4588, July 2006. [9] Open IMS Core Project; http://www.openimscore.org/ [10] IMSCommunicator Project; http://imscommunicator. berlios.de/ ______ The IHMAS research work demonstrates the suitability of an application-level approach to extend the standard IMS infrastructure in order to improve its performance for session mobility during handoffs. BIOGRAPHIES ______________ graduated PAOLO BELLAVISTA [SM] (paolo.bellavista@unibo.it) from the University of Bologna, Italy, where he received a Ph.D. degree in computer science engineering in 2001. He is now an associate professor of computer engineering at the University of Bologna. His research activities span from mobile-agent-based middleware solutions and pervasive wireless computing to location/context-aware services and adaptive multimedia. He is a senior member of ACM. He is an Editorial Board Member of IEEE Communications Magazine and IEEE Transactions on Services Computing. ANTONIO CORRADI [M] (antonio.corradi@unibo.it) ______________ graduated from the University of Bologna and received an M.S. in electrical engineering from Cornell University, Ithaca, New York. He is a full professor of computer engineering at the University of Bologna. His research interests include distributed and parallel systems and solutions, middleware for pervasive and heterogeneous computing, infrastructure support for context-aware multimodal services, network management, and mobile agent platforms. He is a member of the ACM and the Italian Association for Computing (AICA). LUCA FOSCHINI [M] (luca.foschini@unibo.it) ____________ graduated from the University of Bologna, where he received a Ph.D. degree in computer science engineering in 2007. He is now a research fellow of computer engineering at the University of Bologna. His interests include distributed systems and solutions for pervasive computing environments, system and service management, context-aware session control and adaptive mobile multimedia, and mobile-agent-based middleware solutions. He is a member of AICA. IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 121 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F ACCEPTED FROM OPEN CALL Reputation Estimation and Query in Peer-to-Peer Networks Xing Jin, Oracle USA S.-H. Gary Chan, HKUST ABSTRACT Many peer-to-peer systems assume that peers are cooperative to share and relay data. But in the open environment of the Internet, there may be uncooperative malicious peers. To detect malicious peers or reward well behaved ones, a reputation system is often used. In this article we give an overview of P2P reputation systems and investigate two fundamental issues in the design: reputation estimation and query. We classify the state-of-the-art approaches into several categories and study representative examples in each category. We also qualitatively compare them and outline open issues for future research. INTRODUCTION This work was supported, in part, by the Hong Kong Innovation and Technology Fund (ITS/013/08). 122 Communications IEEE In recent years peer-to-peer (P2P) systems have seen enormous success and rich developments over the Internet. Typical applications include file sharing, streaming, Internet telephony, and overlay routing. According to CacheLogic Research, in 2006 P2P traffic accounted for over 72 percent of Internet traffic that year. In P2P systems cooperative peers self-organize themselves into overlay networks and store or relay data for each other. Many P2P systems work on the assumption of truthful cooperation among peers. However, in the open environment of the Internet, some participating peers may not cooperate as desired. They may be selfish and unwilling to upload data to others, or they may have abnormal actions such as frequent rebooting that adversely affect their neighbors. More seriously, some peers may launch attacks to disrupt service or distribute viruses in the overlay network. We call all these uncooperative, abnormal, or attacking behaviors malicious actions and the associated peers malicious peers. Malicious peers may seriously degrade the performance of P2P networks. Liang et al. have tracked several attacking behavior in practical P2P file sharing systems [1]. They find that more than 50 percent of copies of popular songs in KaZaa are polluted, meaning that the content downloaded from the network is different from the downloader’s expectation (e.g., the content is corrupt and cannot be played, or the content is a different song from the search index metadata). Their study also shows that both structured and 0163-6804/10/$25.00 © 2010 IEEE unstructured P2P file sharing systems are highly vulnerable if attackers insert massive bogus records to poison search indexes. To detect malicious peers or reward well behaved ones, a reputation system is often used. In a typical reputation system each peer is assigned a reputation value according to its performance history. Differentiated services are then provided to peers according to their reputation. While the basic idea is simple, a practical system design is not easy. Generally, a P2P reputation system consists of three functional components [2]: collecting information on peer behavior, scoring and ranking peers, and responding based on peers’ scores. All these components are nontrivial, especially given the following consideration: • Scalability: A large P2P network may have hundreds of thousands of peers. For example, Skype has several million online users. A reputation system should be highly scalable in terms of peer number. • Adaption to peer dynamics: Peers may join or leave at any time. If reputation information is maintained at peers, peer leaving may lead to information loss. A robust reputation system should take peer dynamics into account. • Security: Malicious peers may endeavor to break down the reputation system so that they can conduct malicious actions without being detected. For example, peers may purposefully leave and rejoin the system with a new identity in order to shed any bad reputation [2]. Clearly, a good reputation system should be secure to resist these adversarial behaviors. In this article we study two fundamental issues in P2P reputation systems. Reputation estimation: An estimation method describes how to generate peer reputation based on others’ feedback. We classify existing estimation methods into three categories: social network, probabilistic estimation, and game-theoretic model. We select representative examples from each category, and discuss their advantages and limitations. As many estimation methods rely on specific feedback collection mechanisms, we also discuss feedback collection mechanisms when necessary. Reputation query: Reputation query in P2P IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE networks is not trivial. First, efficient data storage and retrieval is always a challenging issue in P2P networks. Huge amounts of data require distributed storage approaches. Then efficient retrieval becomes nontrivial. Peer dynamics bring more difficulty. Second, reputation data are highly security-sensitive. The reputation of a peer cannot be locally stored at the peer itself, because a dishonest peer may misreport its reputation value in order to gain rewards or avoid punishments. We also need to consider security issues in reputation delivery. In this study we survey the state-of-the-art approaches to reputation storage and retrieval in P2P networks. We classify them into three categories. For each category, we discuss illustrative examples. We also qualitatively compare them and outline possible directions for future research. There are many other important issues in P2P reputation systems; for example, how to prevent targeted and adversarial attacks? How to interpret reputation? Interested readers may refer to [2, 3] for a comprehensive overview of P2P reputation issues. The rest of the article is organized as follows. In the next section we explore the reputation estimation issue. We then discuss reputation query techniques. We conclude in the final section. REPUTATION ESTIMATION There are mainly three reputation estimation methods in current P2P networks. The first one is the social network, where all feedback available in the network are aggregated to compute peer reputation. The second one is probabilistic estimation, which uses sampling of the globally available feedback to compute peer reputation. The third one is the game-theoretic model, which assumes that peers have rational behavior and uses game theory to build a reputation system. We elaborate on these methods below. SOCIAL NETWORK Approaches based on the social network can be further divided into two categories: separated reputation model and correlated reputation model. In a separated reputation model only the direct transaction partners of a peer (e.g., resource provider/downloader or streaming neighbor) can express their opinion on the reputation of the peer. A practical example is the eBay reputation system (although eBay is not a P2P network). After each transaction at eBay, the buyer and the seller rate each other with positive, negative, or neutral feedback. The reputation is calculated at a central server by assigning 1 point for each positive feedback, 0 point for each neutral feedback, and –1 point for each negative feedback. The reputation of a participant is computed as the sum of its points over a certain period. Considering that peers may lie in their feedback, Mekouar et al. propose to monitor suspicious feedback [4]. That is, after each transaction between a pair of peers, both peers are required to generate feedback to describe the transaction. If there is an obvious gap between the two pieces of feedback, both are regarded as suspicious. Later on, the more suspicious feedback a peer generates, the smaller weight in reputation computing its feedback has. Similarly, in [5] a peer’s reputation is computed as a weighted average of feedback from direct witnesses of its performance. Xiong et al. develop a general reputation model, which considers, for example, feedback from peers, the trustworthiness factor of feedback sources, and the transaction context factor for discriminating transaction importance [6]. Almost all separated reputation models can be expressed by this model. In a correlated reputation model the reputation of a peer is computed based on the opinion of its direct transaction partners as well as thirdparty peers. In this model a peer, A, who wishes to know the reputation of another peer, B, can ask some peers (e.g., its neighbors) to provide their opinion on B (although some of the peers may not have conducted any transaction with B). A then combines peer opinions to calculate B’s reputation. We take EigenTrust as an example [7]. In EigenTrust, whenever a peer conducts a transaction with another peer, they keep reputation values for each other. If there is no direct transaction between two peers, they keep a zero reputation value for each other. Peers then iteratively update the reputation values. Each time peer A wishes to update the reputation of peer B, A asks for B’s reputation from all other peers in the system. A then computes a weighted sum of these reputation values and keeps the result as the new reputation of B. In each iteration all peers conduct the above reputation update. The process continues until the reputation values kept at different peers converge. Another example is the network information and control exchange (NICE) reputation model [8]. Each peer holds the reputation of its transaction partners according to the quality of transactions. All peers further form a trust graph based on reputation values. Later on, an overlay path between two peers is selected as the most trustworthy path between them in the trust graph. The correlated reputation model is more like our real social network, where third-party peers can express their opinion on a peer. But it costs more to collect and aggregate third-party opinion. For example, EigenTrust takes a long time to wait for reputation values to converge. IEEE BEMaGS F The correlated reputation model is more like our real social network, where third-party peers can express their opinion on a peer. But it takes more cost to collect and aggregate third-party opinion. For example, EigenTrust takes a long time to wait for reputation values to converge. PROBABILISTIC ESTIMATION This approach uses sampling of the globally available feedback to compute peer reputation. It usually relies on some assumptions on peer behavior. For instance, it may assume that a peer is trustworthy with a certain but unknown probability. And when sharing its own experience with others, a peer may lie with some, again unknown, probability [9]. It then uses probabilistic estimation techniques to estimate all unknown parameters. Many estimation methods may be used. Despotovic et al. use maximum likelihood estimation, which assumes that peers do not collude [9]. Mui et al. use Bayesian estimation, which uses only direct interaction among peers and does not use third-party opinion [10]. By using a small portion of the globally available feedback, the probabilistic model has lower cost in feedback collection than the social net- IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 123 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page [55, 80) R Step 1 Step 2 [95, 1000] [20, 40) Step 2 [0, 20) T [80, 95) [40, 55) Step 3 B Step 4 A Proxies Streaming peers Figure 1. Process of submitting a report about a streaming peer A by its child B for the first time in a proxy-based approach (from [5]). Step 1) B sends A's IP address to R. Suppose that A's IP address is represented by a numerical value 88. Step 2) R searches in the binary tree to identify the proxy that manages 88 (T in this case). Step 3) T responds to B with its certificate. Step 4) After verifying the trustworthiness of T, B sends its report about A to T. work approach. On the other hand, the social network approach can use a complicated reputation model, and is robust to a wide range of malicious actions. But the probabilistic model can be applied to only simple reputation models (due to the difficulty in probabilistic estimation) and is effective against only a few kinds of malicious actions. The performance of the two models has been compared in [11]. It has been shown that the probabilistic model performs better for small malicious populations, while the social network approach is better when most peers are malicious. GAME-THEORETIC MODEL Different from the above two approaches, the game-theoretic model assumes that peers have rational behavior and uses game theory to build a reputation system. Rational behavior implies that there is an underlying economic model in which utilities are associated with various choices of peers and that peers act so as to maximize their utilities. Fudenberg et al. present a gametheoretic framework to offer certain characterizations of the equilibria payoffs in the presence of reputation effects [12]. But the work assumes that a central trusted authority does feedback aggregation, which may not be scalable to largescale P2P networks. REPUTATION QUERY In this section we discuss techniques for reputation query in P2P networks. 124 Communications IEEE A BEMaGS F CENTRALIZED AND PARTIALLY CENTRALIZED STRUCTURES The simplest solution is to use a powerful server to keep the reputation of all peers. For example, eBay uses a central server to collect and keep all users’ reputations. Feedback from users is sent to and stored at the server. A query of a user’s reputation is also sent to and answered by the server. Similar approaches have been used in [13]. A centralized approach is easy to implement and deploy. Security of a central server is much easier to achieve than that of distributed components in a distributed approach. Furthermore, in a centralized approach, reputation management is independent of peer joining and leaving, which greatly simplifies reputation retrieval. However, a centralized approach is not scalable to large P2P networks. Also, the server forms a single point of failure, making the system vulnerable. To address the limitations of the centralized approach, a partially centralized approach, which uses a set of servers instead of a single server, has been proposed. Mekouar et al. propose a malicious detector algorithm (MDA) to detect malicious peers in KaZaa-like systems [4]. KaZaa is a partially centralized P2P file sharing system with a set of supernodes. Each ordinary peer is attached to a unique supernode. MDA assumes that supernodes are all trustworthy and maintain reputation information for ordinary peers. All evaluation results about a peer are maintained at its attached supernode. Supernodes can then enforce differentiated service to peers according to their reputation. Note that supernodes in KaZaa are self-elected from ordinary peers and may not be fully trustworthy. One approach uses predeployed proxies instead of supernodes for reputation maintenance [5]. In this approach each peer is attached to a unique proxy according to its IP address. Correspondingly, each proxy is responsible for a certain IP range, and proxies are organized into a binary search tree based on the IP ranges they maintain. Each peer periodically generates reports about its streaming neighbors. All reports about a peer are sent to its attached proxy. A query about a peer’s reputation is also forwarded to and answered by the peer’s attached proxy. Figure 1 shows the report submission process in this approach [5]. Each circle in the figure is a streaming peer, and each quadrangle is a deployed proxy. Numbers in a quadrangle indicate the IP range maintained by the proxy (here numerical values are used to represent IP addresses). Suppose that streaming peer B is streaming peer A’s child in the streaming overlay, and B prepares to submit a report about A’s performance. If B has not sent any report about A before, B first sends A’s IP address to a random proxy (which is R in the figure). R then searches in the tree to identify the proxy whose range covers A’s IP address (T in this case). T then sends a response message to B as well as its certificate of trustworthiness (issued by a trusted certification authority). After B verifies the trustworthiness of T, it sends its report about A to T. In the following, B will directly send reports about A to T. IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Two important issues in partially centralized approaches are efficient search and load balancing among multiple supernodes/proxies. First, each peer should be attached to a unique supernode or proxy. In MD, this is done by KaZaa’s built-in mechanism. If a P2P network does not have such a built-in mechanism, this is not easy. Suppose each proxy is responsible for a certain range of peers. Given any peer in the system, we need to quickly identify the proxy responsible for it (e.g., for reputation update or query). If the number of proxies is small, simple flooding can be used for search. Otherwise, a more complicated overlay structure should be built among proxies (e.g., the binary search tree in [5]). Second, loads for reputation management should be evenly distributed among supernodes/proxies. MDA does not consider this issue as it uses the KaZaa built-in mechanism to attach peers to supernodes. In [5] a dynamic load redistribution method has been proposed to balance loads among proxies. Compared to centralized approaches, partially centralized approaches have significantly improved system scalability. However, in order to serve a large P2P network, a large number of supernodes or proxies may be needed, which leads to high implementation and maintenance costs. STRUCTURED OVERLAY Another class of approaches uses distributed hash table (DHT) to store and search for peer reputation. In DHT each peer is assigned a unique peer ID, and each object is hashed to a key in the same space of peer IDs. The peer with ID equal to the hashed key is responsible for storing the location of the object (or the object itself). With a hashed key of an object, a query for the object is routed through peers in DHT to the peer that is responsible for the object. Each peer in DHT maintains a routing table for routing messages. We take PeerTrust as an example [6]. It adopts P-Grid as the underlying DHT network. It also uses a system-wide hash function Hash, which maps one peer ID to another. Suppose that peer p has an ID, ID(p). Whenever p has a transaction with another peer, q, p generates a report about q and sends it to the peer with ID Hash(ID(q)) through DHT routing. The reputation of q is then stored and maintained at the peer with ID Hash(ID(q)), which is called the reputation manager of q. Queries of a peer’s reputation are also forwarded to its reputation manager through DHT routing. In this way, peer reputation is distributedly stored in the system. This approach has several advantages. First, peer reputation is distributedly stored and computed at the reputation managers. There is no need for a central server or supernodes. Second, a peer’s reputation manager is determined by a universal hash function, which cannot be selected by the peer itself. This reduces the possibility of collusion between a peer and its reputation manager. However, this approach has some security concerns. First, reputation managers may misbehave by providing false or random data when answering a query. Majority voting has been used to address this. That is, a DHT network can be configured to have multiple replicas responsible for the same key, or multiple hash functions can be used to map each peer to multiple reputation managers [6]. When a peer searches for the reputation of another peer, it finds all the replicas responsible for the key and uses a voting scheme to compute the final result. However, voting cannot guarantee obtaining the correct decision and does not completely address the problem. As shown in [11], simple collusion can seriously affect the result of voting. Second, a reputation report or query is delivered between its generator and the reputation manager by DHT routing. A malicious peer in the delivery path may modify, intercept, or discard the report or query. PeerTrust has proposed to encrypt messages in order to prevent data modification during delivery [6]. But it cannot prevent data discarding during routing. In summary, DHTbased approaches cannot guarantee secure reputation computing and delivery. Furthermore, DHT has its own limitations. Since peers are highly dynamic in P2P networks, a reputation manager may unexpectedly leave the system. Then the data maintained by it are no longer available. In addition, load balancing mechanisms that abide by DHT storage and routing methods are complicated, especially in dynamic networks. DHT also has its own security threats and vulnerabilities, and there are many targeted attacks on its routing scheme, data placement scheme, IP mapping scheme, and so on. IEEE BEMaGS F As compared to centralized approaches, partially centralized approaches have significantly improved system scalability. However, in order to serve a large P2P network, a large number of supernodes or proxies may be needed, which leads to high implementation and maintenance costs. UNSTRUCTURED OVERLAY XREP uses a polling algorithm to choose reliable resource in Gnutella-like file sharing networks [14]. It consists of four operations: resource searching, vote polling, vote evaluation and resource downloading (Fig. 2). The first operation is similar to searching in Gnutella. A peer broadcasts to all its neighbors a Query message containing the search keywords. When a peer receives a Query message for which it has a match, it responds with a QueryHit message, as shown in Fig. 2a. In the next operation, upon receiving QueryHit messages, the query initiator selects the best matching resource among all possible choices. It then polls other peers using an encrypted Poll message to enquire about their opinion of the selected resource or the resource provider. In XREP each peer maintains information on its own experience with the resource and other peers. Upon receiving a Poll message, each peer checks its experience data. If there is any information about the resource or the provider indicated by the Poll message, the peer sends its vote to the polling peer with an encrypted PollReply message, as shown in Fig. 2b. In the third operation the polling peer collects a set of votes and evaluates the votes. It first decrypts the votes and discards corrupt ones. Then it analyzes voters’ IPs and detects cliques of dummy or controlled votes. After that, it randomly selects a set of votes and directly contacts the voters with a TrustVote message. Each contacted voter is required to send a VoteReply message for vote confirmation. This IEEE Communications Magazine • April 2010 Communications A Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 125 A BEMaGS F Communications IEEE B A A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page ery Qu yHit er Qu Query QueryHit Q Qu uer er y D yH it (a) B B C A ll Po eply llR Po Poll PollReply P Po oll llR ep ly C A e ot stV eply u r T eR ot VTrustVote F B C A C Download VoteReply D (b) D D (c) (d) Figure 2. Operations in XREP: a) resource searching; b) vote polling; c) vote evaluation; d) resource downloading. forces attackers to pay the cost of using real IPs as false witnesses. After this checking process, the polling peer can obtain the reputation of the resource or provider. Based on the reputation value, the polling peer can either download the resource, as shown in Fig. 2d, or discard the resource and repeat the voting process on another resource. Approaches based on unstructured overlays have similar limitations to DHT-based ones. Messages may be intercepted or blocked during transmission, and voting is vulnerable to collusion among peers. Therefore, no secure reputation computing or delivery can be guaranteed. Furthermore, searching or voting on an unstructured overlay is based on flooding, which incurs heavy traffic in the network. For example, in XREP Poll messages are broadcast throughout the network each time a peer needs to find out the reputation of a resource or a provider. COMPARISONS We compare the above reputation query techniques in Table 1 and elaborate on the results below. A centralized approach requires a central server for reputation storage, and a partially centralized approach relies on supernodes or predeployed proxies. On the contrary, approaches based on structured and unstructured overlays rely on peers to manage reputation and do not require additional facilities. Specifically, in DHT-based approaches a peer’s reputation is maintained at its reputation manager, which is computed by a universal hash function. In approaches based on unstructured overlays, peers often locally hold the reputation of their transaction partners. Based on different storage mechanisms, the approaches have different reputation search methods. In a centralized approach a reputation query is directly sent to the server. In a partially centralized approach a query is first sent to a supernode, which forwards the query to the target supernode. In a DHT-based approach DHT routing is used to route queries. In an approach based on unstructured overlays, flooding is often used, which may consume much network bandwidth. Among these approaches, the centralized one has the poorest scalability, while the DHT-based one is the most scalable. The partially central- 126 Communications IEEE ized approach has better scalability than the centralized one, but still relies on predeployed proxies or supernodes and is not fully scalable. The approach based on unstructured overlays does not need any central component; however, it is not as scalable as the DHT-based one because of its high bandwidth consumption in reputation search. The centralized and partially centralized approaches are robust to peer dynamics. In these approaches reputation values are stored at a server or supernodes, which are often highly stable. In the DHT-based approach the leaving of a reputation manager will lead to the loss of data stored at it. Fortunately, DHT itself has some mechanisms to keep high data availability under peer churn. In the approach based on unstructured overlays there is little protection against data loss due to peer leaving. It may encounter high data loss in the presence of peer churn. Regarding security, the centralized and partially centralized approaches are the most secure if assuming the server and supernodes are fully trustworthy. In these approaches reports or queries are directly sent to the server or supernodes, and there are no third-party peers in delivery paths. On the contrary, the approaches based on structured or unstructured overlays cannot guarantee secure reputation computing or delivery. In these approaches a reputation maintainer may be malicious and provide forged data, and a delivery path may contain malicious peers. Although there are many methods for improving system security (e.g., encryption/ decryption or voting), none of them can guarantee 100 percent security. CONCLUSION In this article we investigate two key issues in P2P reputation systems, reputation estimation and query. We discuss representative examples in the literature and compare them from multiple aspects. There are many other research issues in P2P reputation systems, such as anonymity. In many applications, users may only be willing to participate if a certain amount of anonymity is guaranteed. But most existing reputation systems have sacrificed anonymity in order to provide secure underlying protocols, where each peer holds a unique certificate, and IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE A BEMaGS Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page F Security Approach Deployment requirement Reputation storage Reputation query Scalability Adaptation to peer dynamics Centralized A central server The server Direct server access Low Partially centralized A set of supernodes or proxies Supernodes or proxies Search among supernodes or proxies Medium Structured overlay No Peers (computed by a hash function) DHT search Unstructured overlay No Peers (e.g., transaction partners) Flooding Trustworthiness of reputation maintainer Message modification in transmission Message discarding in transmission High Full No (no overlay relay) No (no overlay relay) High Full No (no overlay relay) No (no overlay relay) High Medium No guarantee No (addressed by encryption) Possible Medium Low No guarantee No (addressed by encryption) Possible Table 1. Comparisons between various reputation query techniques. peers use the certificates to authenticate each other. Other interesting issues may include analyzing security threats and studying reward/punishment mechanisms. [14] E. Damiani et al., “A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks,” Proc. ACM CCS ‘02, Nov. 2002, pp. 207–16. REFERENCES X ING J IN [M] (xing.jin@oracle.com) _____________ received his B.Eng. degree in computer science and technology from Tsinghua University, Beijing, China, in 2002, and his Ph.D. degree in computer science and engineering from the Hong Kong University of Science and Technology (HKUST), Kowloon, in 2007. He is currently a member of technical staff in the Systems Technology Group at Oracle, Redwood Shores, California. His research interests include distributed information storage and retrieval, peer-to-peer technologies, multimedia networking, and Internet topology inference. He is a member of Sigma Xi and the IEEE Communications Society Multimedia Communications Technical Committee. [1] J. Liang et al., “Pollution in P2P File Sharing Systems,” Proc. IEEE INFOCOM, 2005. [2] S. Marti and H. Garcia-Molina, “Taxonomy of Trust: Categorizing P2P Reputation Systems,” Comp. Net., vol. 50, no. 4, Mar. 2006, pp. 472–84. [3] S. Ruohomaa, L. Kutvonen, and E. Koutrouli, “Reputation Management Survey,” Proc. IEEE ARES ‘07, Apr. 2007, pp. 103–11. [4] L. Mekouar, Y. Iraqi, and R. Boutaba, “Peer-to-Peer’s Most Wanted: Malicious Peers,” Comp. Net., vol. 50, no. 4, Mar. 2006, pp. 545–62. [5] X. Jin, Q. Xia, and S.-H. G. Chan, “Building a Monitoring Overlay for Peer-to-Peer Streaming,” Proc. IEEE GLOBECOM ‘06, Nov. 2006. [6] L. Xiong and L. Liu, “PeerTrust: Supporting Reputationbased Trust for Peer-to-Peer Electronic Communities,” IEEE Trans. Knowledge Data Eng., vol. 16, no. 7, July 2004, pp. 843–57. [7] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, “The EigenTrust Algorithm for Reputation Management in P2P Networks,” Proc. WWW ‘03, 2003, pp. 640–51. [8] R. Sherwood, S. Lee, and B. Bhattacharjee, “Cooperative Peer Groups in NICE,” Comp. Net., vol. 50, no. 4, Mar. 2006, pp. 523–44. [9] Z. Despotovic and K. Aberer, “Maximum Likelihood Estimation of Peers Performance in P2P Networks,” Proc. P2PEcon ‘04, June 2004. [10] L. Mui, M. Mohtashemi, and A. Halberstadt, “A Computational Model of Trust and Reputation,” Proc. IEEE HICSS ‘02, Jan. 2002, pp. 2431–39. [11] Z. Despotovic and K. Aberer, “P2P Reputation Management: Probabilistic Estimation vs. Social Networks,” Comp. Net., vol. 50, no. 4, Mar. 2006, pp. 485–500. [12] D. Fudenberg and D. Levine, “Reputation and Equilibrium Selection in Games with a Patient Player,” Econometrica, vol. 57, no. 4, 1989, pp. 759–78. [13] S. Jun, M. Ahamad, and J. Xu, “Robust Information Dissemination in Uncooperative Environments,” Proc. IEEE ICDCS ‘05, June 2005, pp. 293–302. BIOGRAPHIES S.-H. G ARY C HAN [M] (gchan@cse.ust.hk) ___________ received his B.S.E. degree (Highest Honor) in electrical engineering from Princeton University, New Jersey, in 1993, with certificates in applied and computational mathematics, engineering physics, and engineering and management systems, and his M.S.E. and Ph.D. degrees in electrical engineering from Stanford University, California, in 1994 and 1999, respectively, with a minor in business administration. He is currently an associate professor with the Department of Computer Science and Engineering, HKUST, and an adjunct researcher with Microsoft Research Asia, Beijing. His research interests include multimedia networking, peer-to-peer technologies and streaming, and wireless communication networks. He is a member of Tau Beta Pi, Sigma Xi, and Phi Beta Kappa. He served as a Vice-Chair of the IEEE Communications Society Multimedia Communications Technical Committee from 2003 to 2006. He was a Guest Editor for IEEE Communications Magazine, Special Issue on Peer-to-Peer Multimedia Streaming (2007), and Springer Multimedia Tools and Applications, Special Issue on Advances in Consumer Communications and Networking (2007). He was Co-Chair of the Multimedia Symposium for IEEE ICC 2007. He was Co-Chair of the workshop on Advances in Peer-to-Peer Multimedia Streaming at ACM Multimedia 2005, and the Multimedia Symposia for IEEE GLOBECOM 2006 and IEEE ICC 2005. IEEE Communications Magazine • April 2010 Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page 127 A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F ADVERTISERS’ INDEX Company Page ADVERTISING SALES OFFICES Agilent Technologies ................................................................3 Asilomar Conference................................................................17 Cisco ...........................................................................................Cover 2 GL Communications ................................................................8 ICC 2010 ....................................................................................1 International Microwave Symposium .....................................41 Closing date for space reservation: 1st of the month prior to issue date NATIONAL SALES OFFICE Eric L. Levine Advertising Sales Manager IEEE Communications Magazine 3 Park Avenue, 17th Floor New York, NY 10016 Tel: 212-705-8920 Fax: 212-705-8999 e-mail: _____________ e.levine@comsoc.org SOUTHERN CALIFORNIA Patrick Jagendorf 7202 S. Marina Pacifica Drive Long Beach, CA 90803 Tel: 562-795-9134 Fax: 562-598-8242 patrick@roymcdonald.com ________________ John Wiley & Sons, Ltd............................................................Cover 3 Korea Telecom ..........................................................................13 Samsung .....................................................................................Cover 4 NORTHERN CALIFORNIA George Roman 4779 Luna Ridge Court Las Vegas, NV 89129 Tel: 702-515-7247 Fax: 702-515-7248 Cell: 702-280-1158 george@roymcdonald.com _________________ SK Telecom................................................................................5 Smart Grid Conference 2010 ...................................................23 SOUTHEAST Scott Rickles 560 Jacaranda Court Alpharetta, GA 30022 Tel: 770-664-4567 Fax: 770-740-1399 ___________ srickles@aol.com EUROPE Rachel DiSanto Huson International Media Cambridge House, Gogmore Lane Chertsey, Surrey, KT16 9AP ENGLAND Tel: +44 1428608150 Fax: +44 1 1932564998 Email: rachel.disanto@husonmedia.com ____________________ 128 Communications IEEE IEEE Communications Magazine • April 2010 Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F New and Bestselling from Wiley-IEEE Press A Guide to the Wireless Engineering Body of Knowledge (WEBOK) The ComSoc Guide to Next Generation Optical Transport IEEE COMMUNICATIONS SOCIETY The ultimate reference book for professionals in the wireless industry and study guide for the WCET. The information presented in this book reflects the evolution of wireless technologies, their impact on the profession, and the industry’s commonly accepted best practices. HUUB VAN HELVOORT Provides a unique overview of SDH and OTN for engineers who are new to the field, as well as manufacturers, network operators, and graduate students who need a basic understanding of the topics. 978-0-470-43366-9 • April 2009 • Pbk • 272pp $69.95 SDH/SONET/OTN 978-0-470-22610-0 • October 2009 • Pbk • 211pp $63.50 ComSoc Guides to Communications Technologies Handbook on Array Processing and Sensor Networks Wireless Sensor Networks SIMON HAYKIN and K. J. RAY LIU Provides readers with a collection of tutorial articles contributed by world-renowned experts on recent advancements and the state of the art in array processing and sensor networks. JUN ZHENG and ABBAS JAMALIPOUR This book provides a comprehensive and systematic introduction to the fundamental concepts, major challenges, and effective solutions in wireless sensor networking (WSN). 978-0-470-37176-3 • January 2010 • Hbk • 904pp $185.00 Adaptive and Learning Systems for Signal Processing, Communications and Control Series 978-0-470-16763-2 • October 2009 • Hbk • 489pp $94.95 A Networking Perspective Ground-Based Wireless Positioning Advances in Multiuser Detection MICHAEL L. HONIG During the past decade, the design and development of current and emerging wireless systems have motivated many important advances in multiuser detection. This book provides a comprehensive overview of crucial recent developments 978-0-470-47381-8 • September 2009 • Hbk • 493pp $125.00 Wiley Series in Telecommunications and Signal Processing Next Generation Solutions TULAY ADALI and SIMON HAYKIN Recent developments have made it clear that significant performance gains can be achieved beyond those using standard adaptive filtering approaches. This book presents the next generation of algorithms that will produce these desired results. 978-0-470-19517-8 • April 2010 • Hbk • 424pp $120.00 Adaptive and Learning Systems for Signal Processing, Communications and Control Series IEEE Wireless Positioning Kegen Yu Ian Sharp Y. Jay Guo 978-0-470-74704-9 • June 2009 • Hbk • 450pp $120.00 Near-Capacity Multi-Functional MIMO Systems LAJOS HANZO, OSAMAH ALAMRI, MOHAMMED EL-HAJJAR and NAN WU Providing an all-encompassing self-contained treatment of Near-Capacity Multi-Functional MIMO Systems it gives a detailed examination of wireless landscape, including the fields of channel coding, spacetime coding and turbo detection techniques. 978-0-470-77965-1 • May 2009 • Hbk • 738pp $200.00 ORDER WILEY ONLINE… For telephone orders: Call 1-800-225-5945 (1-800-US-WILEY) Fax: (212) 850-8888 E-mail:_________ custserv@wiley.com • Visit the Wiley Electrical Engineering homepage: www.wiley.com/electrical • Wiley Communications Technology Website: www.wiley.com/go/commstech/ • Amazon Wiley Communications Technology bookstore: www.amazon.com/professional/ Please note all prices correct at time of going to press but subject to change. Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A 14140 HOW TO ORDER Communications Ground-Based Sphere-Packing, Iterative Detection and Cooperation Adaptive Signal Processing Wiley books are available through your Bookseller. Alternatively send your order to: John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA KEGEN YU, IAN SHARP and Y. JAY GUO Provides an in-depth treatment of non-GPS based wireless positioning techniques, with a balance between theory and engineering practice. The book presents the architecture, design and testing of a variety of wireless positioning systems based on the time-of-arrival, signal strength, and angle-of-arrival measurements. BEMaGS F Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F __________________________ ______ Communications IEEE Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page A BEMaGS F