UNIVERSITY OF OSLO Department of informatics Functionality of Alternative Broadband Access and Impact on Market Master thesis 60 credits Saqib Rana 26. 05. 2007 1 Acknowledgements Thomas Haslestad Josef Noll 2 Abstract Today’s wireless access is dominated by mobile networks with GSM/ UMTS and private WLAN networks based on 802.11 standard. The market situation can change quickly owing to the fact that new access methods are expected to be introduced in the market soon. WIMAX (802.16), 802.20, CDMA2000 and Cognitive Radio (802.22) are such promising technologies. These radio technologies uses methods for better spectrum utilization like MESH network technology, Adhoc routing and dynamic frequency allocation. This thesis is looking into functionality of new access methods, actors in the Nordic market and how these actors plans to use this functionality. 3 Table of Content Acknowledgements ............................................................................................................. 2 Abstract ............................................................................................................................... 3 Table of Content ................................................................................................................. 4 Introduction ......................................................................................................................... 7 Part A – Technical Analysis ............................................................................................... 8 Alternative Access Technologies for Wireless Broadband ............................................ 8 Part B – Market Analysis .................................................................................................... 8 Forord .................................................................................................................................. 9 Innledning ......................................................................................................................... 10 Bakgrunnstoff ................................................................................................................... 11 Overordnet diskusjon ........................................................................................................ 12 Beskrivelse av det man har gjort ....................................................................................... 13 Mer finkornet diskusjon .................................................................................................... 14 Oppsummering og videre arbeid ....................................................................................... 15 Vedlegg ............................................................................................................................. 16 Concluding remarksLiterature references ......................................................................... 17 Literature references ......................................................................................................... 18 Appendices ........................................................................................................................ 20 Wi-Fi: IEEE802.11 Wireless local Area Network (WLAN) ............................................ 20 From Wikipedia, the free encyclopedia .................................................................... 20 Uses ............................................................................................................................... 20 Wi-Fi at home ........................................................................................................... 21 Wi-Fi in Business ...................................................................................................... 21 Wi-Fi at Hotspots ...................................................................................................... 22 Technical information ................................................................................................... 22 Channels .................................................................................................................... 23 Advantages of Wi-Fi ................................................................................................. 23 Disadvantages of Wi-Fi ............................................................................................ 24 Standard Devices .......................................................................................................... 25 Wireless Access Point (WAP) .................................................................................. 25 Wireless Adapter ....................................................................................................... 25 Wireless Router......................................................................................................... 25 Wireless Ethernet Bridge .......................................................................................... 26 Range Extender ......................................................................................................... 26 Antenna connectors ................................................................................................... 26 Non-Standard Devices .................................................................................................. 26 DIY Range Optimizations......................................................................................... 26 Long Range Wi-Fi .................................................................................................... 26 Wi-Fi and its support by operating systems .................................................................. 27 Microsoft Windows .................................................................................................. 27 Apple Mac OS........................................................................................................... 28 Open source Unix-like systems ................................................................................ 28 Embedded systems .................................................................................................... 29 Social concerns ............................................................................................................. 30 4 Unintended and intended use by outsiders................................................................ 30 Wi-Fi vs. amateur radio ............................................................................................ 30 Health risks ................................................................................................................... 31 History........................................................................................................................... 31 Origin and meaning of the term 'Wi-Fi' .................................................................... 32 IEEE 802.11 ...................................................................................................................... 33 From Wikipedia, the free encyclopedia .................................................................... 33 Protocols ....................................................................................................................... 34 Summary ................................................................................................................... 34 802.11 legacy ............................................................................................................ 35 802.11a ...................................................................................................................... 35 802.11b...................................................................................................................... 37 802.11g...................................................................................................................... 38 802.11n...................................................................................................................... 39 Channels and international compatibility ..................................................................... 41 Standard and Amendments ........................................................................................... 41 Standard or Amendment? ......................................................................................... 42 Nomenclature ................................................................................................................ 43 Community networks .................................................................................................... 43 Security ......................................................................................................................... 43 WiMAX: IEE802.16 ......................................................................................................... 45 From Wikipedia, the free encyclopedia .................................................................... 45 Definitions of terms[1] ................................................................................................... 45 Uses ............................................................................................................................... 46 Broadband Access ..................................................................................................... 46 Mobile applications ................................................................................................... 46 Technical information ................................................................................................... 47 MAC layer/ Data Link Layer .................................................................................... 47 Physical layer ............................................................................................................ 47 Comparison with Wi-Fi ............................................................................................ 48 Spectrum Allocations issues ..................................................................................... 48 Standards ....................................................................................................................... 50 IEEE 802.16e-2005 ................................................................................................... 50 WiBro........................................................................................................................ 51 Associations .................................................................................................................. 51 WiMAX Forum ......................................................................................................... 51 WiMAX Spectrum Owners Alliance - WiSOA ........................................................ 51 Competing technologies................................................................................................ 52 3G and 4G Cellular Phone Systems .......................................................................... 52 Mobile Broadband Wireless Access ......................................................................... 54 Internet Oriented Systems ......................................................................................... 54 Comparison ............................................................................................................... 54 Future Development...................................................................................................... 55 Current Deployments .................................................................................................... 55 IEEE 802.16 ...................................................................................................................... 56 From Wikipedia, the free encyclopedia .................................................................... 56 802.16 standards ........................................................................................................... 56 Amendments in progress........................................................................................... 57 5 802.16e-2005 Technology ............................................................................................ 57 PHY........................................................................................................................... 57 MAC ......................................................................................................................... 57 Certification .................................................................................................................. 58 Mesh networking .............................................................................................................. 60 From Wikipedia, the free encyclopedia .................................................................... 60 Examples ....................................................................................................................... 60 Cognitive radio.................................................................................................................. 61 From Wikipedia, the free encyclopedia .................................................................... 61 History........................................................................................................................... 61 Terminology.................................................................................................................. 61 Technology ................................................................................................................... 62 IEEE 802.20 ...................................................................................................................... 64 From Wikipedia, the free encyclopedia .................................................................... 64 IEEE 802.22 ...................................................................................................................... 65 From Wikipedia, the free encyclopedia .................................................................... 65 Technology ................................................................................................................... 65 Overview of the WRAN Topology ............................................................................... 65 An approach to the PHY layer ...................................................................................... 66 An approach to the MAC layer ..................................................................................... 66 IEEE 802 ........................................................................................................................... 67 From Wikipedia, the free encyclopedia .................................................................... 67 6 Introduction The thesis is divided into two segments, a technical analysis part A, and a market analysis part B. In the technical part A new alternative access technologies for Broadband Wireless/ Radio Access is discussed. The focus is on WiFi and WiMax. Factors that make these technologies alternatives to today’s mobile access are emphasized. Especially opportunities that exist in such alternative access are thrown light on. The concepts of Cognitive Radio in the VHF/ UHF bands are described along with regulatory situation in Norway. How Cognitive Radio can be used in public mobile services is also considered. In the market analysis part B an overview of WiFi and WiMax operators in the Nordic Countries is presented. Position in the value chain, size, product portfolio and market position for every major actor are illustrated. This information is then used to predict a picture of the situation in the alternative broadband market. The market analysis part also covers how new functionality in form of chosen features could influence the existing market. These selected features in this regard are MESH Networking and Switched WiFi/ CAPWAP for both WiFi and WiMax. The potential market impact of Cognitive Radio is also evaluated. 7 Part A – Technical Analysis Alternative Access Technologies for Wireless Broadband Part B – Market Analysis 8 Forord (ca 1/3 side) 9 Innledning (5 sider) Problemestilling Kort gjennomgang av kapitlene 10 Bakgrunnstoff (20 sider) Innføring i støtteområder etc. for oppgaven 11 Overordnet diskusjon (ca 15) Hovedvalg og vurderinger for disse 12 Beskrivelse av det man har gjort (ca 25 sider) Gå gjennom hovedlinjene 13 Mer finkornet diskusjon(ca 20 sider) Diskusjon trenger “kontekst” Se på alternative utvidelser 14 Oppsummering og videre arbeid (5- 10 sider) Tilbakeblikk, med kommentarer (gjerne kritiske) Hvor står man i forhold til problemstillingen Retninger å gå videre I (Råd til neste hovedfagsrtudent) 15 Vedlegg 16 Concluding remarks 17 Literature references [1] Wikipedia. (2006).Internet [online]. Available at <URL: http://en.wikipedia.org/wiki/Internet> [2] Philippe Le Hégaret. (2006). Web Services Activity [online]. Available at URL:http://www.w3.org/2002/ws/ [3] Haas H. (2006). Web Services Activity Statement [online]. Available at <URL: http://www.w3.org/2002/ws/Activity> [4] Wikipedia. (2006). Web service [online]. Available at <URL: http://en.wikipedia.org/wiki/Web_service> [5] Bayer j et el. (2006). Implementation Roadmap for ASG-based services[online]. Internally available at<URL:https://asg-platform.org/cgibin/ twiki/viewauth/Internal/RoadmapForSemanticServices> [6] http://www.scientificamerican.com/article.cfm?articleID=00048144-10D2-1C7084A9809EC588EF21&catID=2By Tim Berners-Lee, James Hendler and Ora Lassila [7] Wikipedia. (2006). Common Object Request Broker Architecture [online]. Available at URL:http://en.wikipedia.org/wiki/CORBA [8] Wikipedia. (2006). Java remote method invocation [online]. Available at <URL: http://en.wikipedia.org/wiki/Java_remote_method_invocation > [9] Wikipedia. (2006). Distributed component object model [online]. Available at <URL: http://en.wikipedia.org/wiki/Distributed_component_object_model> [10] Brown P et al. (2006). Reference Model for Service Oriented Architecture 1.0 [online]. Available at <URL: http://www.oasis-open.org/committees/download.php/18486/pr2changes.pdf> [11] Panda D. (2005). An Introduction to Service-Oriented Architecture from a Java Developer Perspective [online]. Available at <URL: http://www.onjava.com/pub/a/onjava/2005/01/26/soa-intro.html> [12] By Raghu R. Kodali. (2005). What is service-oriented architecture? [online]. Available at <URL: http://www.javaworld.com/javaworld/jw-06-2005/jw-0613-soa.html> [13] Wikipedia. (2006). SOA [online]. Available at <URL: Wikipedia. http://en.wikipedia.org/wiki/SOA > [14] Updegrove A. (2005). The Semantic Web [online]. Available at <URL: 18 http://www.consortiuminfo.org/bulletins/semanticweb.php> [15] Wikipedia. (2006). Semantics [online]. Available 19 Appendices Wi-Fi: IEEE802.11 Wireless local Area Network (WLAN) From Wikipedia, the free encyclopedia Official Wi-Fi logo Wi-Fi, popularly known as an acronym for wireless fidelity (see below for origin), but, in actuality is simply a play on the term "Hi-Fi," was originally a brand licensed by the WiFi Alliance to describe the embedded technology of wireless local area networks (WLAN) based on the IEEE 802.11 specifications. Use of the term has now broadened to generically describe the wireless interface of mobile computing devices, such as laptops in LANs. Wi-Fi is now increasingly used for more services, including Internet and VoIP phone access, gaming, and basic connectivity of consumer electronics such as televisions, DVD players, and digital cameras. More standards are in development that will allow Wi-Fi to be used by cars on highways in support of an Intelligent Transportation System to increase safety, gather statistics, and enable mobile commerce (see IEEE 802.11p). Wi-Fi and the Wi-Fi CERTIFIED logo are registered trademarks of the Wi-Fi Alliance - the trade organization that tests and certifies equipment compliance with the 802.11x standards. Uses A person with a Wi-Fi enabled device such as a pc, cell phone or PDA can connect to the Internet when in proximity of an access point. The region covered by one or several access points is called a hotspot. Hotspots can range from a single room to many square miles of overlapping hotspots. Wi-Fi can also be used to create a mesh network. Both architectures are used in community networks. Wi-Fi also allows connectivity in peer-to-peer (wireless ad-hoc network) mode, which enables devices to connect directly with each other. This connectivity mode is useful in consumer electronics and gaming applications. When the technology was first commercialized there were many problems because consumers could not be sure that products from different vendors would work together. The Wi-Fi Alliance began as a community to solve this issue so as to address the needs of the end user and allow the technology to mature. The Alliance created the branding Wi-Fi CERTIFIED to show consumers that products are interoperable with other products displaying the same branding. 20 Wi-Fi at home Home Wi-Fi clients come in many shapes and sizes, from stationary PCs to digital cameras. The trend today is to incorporate wireless into every electronic where mobility is desired. Wi-Fi devices in home or consumer-type environments connect in the following ways: Via a broadband Internet connection into a single router which can serve both wired and wireless clients Ad-hoc mode for client to client connections Built into non-computer devices to enable wireless connectivity to other devices or the Internet Wi-Fi in Gaming Gaming consoles and handhelds make use of Wi-Fi technology to enhance the gaming experience. Examples include: The Nintendo DS handheld is Wi-Fi compatible, and is compatible with WEP encryption. The Wii is Wi-Fi compatible, and is compatible with WEP and WPA encryption. The PlayStation 3 Premium model features built-in Wi-Fi which is compatible with WEP and WPA encryption, while the Basic model can be upgraded with a separate wireless adapter. The PlayStation Portable is Wi-Fi compatible, and is compatible with WEP and WPA encryption. The Xbox 360 can be made Wi-Fi compatible if the user purchases a separate wireless adapter. Wi-Fi in Business Business and industrial Wi-Fi has taken off, with the trends in implementation varying greatly over the years. Current technology trends in the corporate wireless world are: Dramatically increasing the number of Wi-Fi Access Points in an environment, in order to provide redundancy,support fast roaming and increasing overall network capacity by using more channels and/or creating smaller cells Designing for wireless voice applications (VoWLAN or WVOIP) Moving toward 'thin' Access Points, with more of the network intelligence housed in a centralized network appliance; relegating individual Access Points to be simply 'dumb' radios Outdoor applications utilizing true mesh topologies A proactive, self-managed network that functions as a security gateway, firewall, DHCP server, intrusion detection system, and a myriad of other features not previously considered relevant to a wireless network. 21 Wi-Fi at Hotspots The most publically visible use of Wi-Fi is at hotspots. These trends include: Free Wi-Fi at venues like Panera Bread, It's a Grind Coffee House, and over 100,000 locations in the USA has been growing in popularity. According to a door-to-door survey in San Jose, CA, the number of venues and users is growing fast. Paid Wi-Fi at venues like Starbucks, McDonalds, and at hotels. This trend is flat. According to Muni Wireless, metropolitan-wide WiFi (Mu-Fi) already has more than 300 projects in process. Technical information Wi-Fi: How it Works Wi-Fi networks use radio technologies called IEEE 802.11 to provide secure, reliable, fast wireless connectivity. A typical Wi-Fi setup contains one or more Access Points (APs) and one or more clients. An AP broadcasts its SSID (Service Set Identifier, "Network name") via packets that are called beacons, which are usually broadcast every 100 ms. The beacons are transmitted at 1 Mbit/s, and are of relatively short duration and therefore do not have a significant effect on performance. Since 1 Mbit/s is the lowest rate of Wi-Fi it assures that the client that receives the beacon can communicate at at least 1 Mbit/s. Based on the settings (e.g. the SSID), the client may decide whether to connect to an AP. If two APs of the same SSID are in range of the client, the client firmware might use signal strength to decide with which of the two APs to make a connection. The Wi-Fi standard leaves connection criteria and roaming totally open to the client. This is a strength of Wi-Fi, but also means that one wireless adapter may perform substantially better than another. Since Wi-Fi transmits in the air, it has the same properties as a nonswitched wired Ethernet network, and therefore collisions can occur. Unlike a wired Ethernet, and like most packet radios, Wi-Fi cannot do collision detection, and instead uses an acknowledgment packet for every data packet sent. If no acknowledgement is received within a certain time a retransmission occurs. Also, a medium reservation protocol can be used when excessive collisions are experienced or expected (RequestToSend/ClearToSend used for Collision Avoidance or CA) in an attempt to try to avoid collisions. A Wi-Fi network can be used to connect computers to each other to the internet and to wired networks (which use IEEE 802.3 or Ethernet). Wi-Fi networks operate in the unlicensed 2.4 (802.11b/g) and 5 GHz (802.11a/h) radio bands, with an 11 Mbps (802.11b) or 54 Mbps (802.11a or g) data rate or with products that contain both bands (dual band). They can provide real world performance similar to the basic 10BaseT wired Ethernet networks. 22 Channels Except for 802.11a/h, which operates at 5GHz, Wi-Fi devices historically primarily use the spectrum in 2.4GHz, which is standardized and unlicensed by international agreement, although the exact frequency allocations and maximum permitted power vary slightly in different parts of the world. Channel numbers, however, are standardized by frequency throughout the world, so authorized frequencies can be identified by channel numbers. The 2.4 GHz band is also used by microwave ovens, cordless phones, baby monitors and Bluetooth devices. The maximum number of available channels for Wi-Fi enabled devices are: 13 for Europe 11 for North America. Only channels 1, 6, and 11 are recommended for 802.11b/g to minimize interference from adjacent channels.[1] 14 for Japan [2] Advantages of Wi-Fi Wireless Internet on the beach, Taba, Egypt Allows LANs to be deployed without cabling for client devices, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. Built into most modern laptops, getting a laptop without a built in WiFi has become an exception. Wi-Fi chipset pricing continues to come down, making Wi-Fi a very economical networking option and driving inclusion of Wi-Fi in an ever-widening array of devices. Wi-Fi products are widely available in the market. Different competitive brands of access points and client network interfaces are inter-operable at a basic level of service. Products designated as Wi-Fi CERTIFIED by the Wi-Fi Alliance are backwards inter-operable. 23 Wi-Fi is a global set of standards. Unlike cellular carriers, the same Wi-Fi client works in different countries around the world. Widely available in more than 250,000 public hot spots and tens of millions of homes and corporate and university campuses worldwide. As of 2007, WPA is not easily cracked if strong passwords are used and WPA2 encryption has no known weaknesses. New protocols for Quality of Service (WMM) and power saving mechanisms (WMM Power Save) make Wi-Fi even more suitable for latency-sensitive applications (such as voice and video) and small Form-Factor Disadvantages of Wi-Fi Spectrum assignments and operational limitations are not consistent worldwide; most of Europe allows for an additional 2 channels beyond those permitted in the US (1-13 vs 1-11); Japan has one more on top of that (1-14) - and some countries, like Spain, prohibit use of the lower-numbered channels. Furthermore some countries, such as Italy, used to require a 'general authorization' for any Wi-Fi used outside an operator's own premises, or require something akin to an operator registration. Equivalent isotropically radiated power (EIRP) in the EU is limited to 20 dBm (0.1 W). Power consumption is fairly high compared to some other low bandwidth standards (Zigbee and Bluetooth), making battery life a concern. The most common wireless encryption standard, Wired Equivalent Privacy or WEP, has been shown to be easily breakable even when correctly configured. WiFi Protected Access (WPA and WPA2) which began shipping in 2003 aims to solve this problem and is now available on most products. Wi-Fi Access Points typically default to an open (encryption-free) mode. Novice users benefit from a zero configuration device that works out of the box but without security enabled providing open wireless access to their LAN. To turn security on requires the user to configure the device, usually via a software GUI. Many 2.4 GHz 802.11b and 802.11g Access points default to the same channel on initial start up, contributing to congestion on certain channels. To change the channel of operation for an access point requires the user to configure the device. Wi-Fi networks have limited range. A typical Wi-Fi home router using 802.11b or 802.11g with a stock antenna might have a range of 45 m (150 ft) indoors and 90 m (300 ft) outdoors. Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency block has slightly better range than Wi-Fi in the 5 GHz frequency block. Outdoor range with improved antennas can be several kilometres or more with line-of-sight. Wi-Fi pollution, of an excessive number of an access point with other access points in the area, especially on the same or neighboring channel, can prevent access and interfere with the use of other access points by others caused by overlapping channels in the 802.11g/b spectrum as well as with decreased signalto-noise ratio (SNR) between access points. This can be a problem in high-density areas such as large apartment complexes or office buildings with many Wi-Fi access points. Additionally, other devices use the 2.4 GHz band: microwave 24 ovens, cordless phones, baby monitors, security cameras, and Bluetooth devices can cause significant additional interference. It is also an issue when municipalities[3] or other large entities such as universities seek to provide large area coverage. Everyone is considered equal for the base standard without 802.11e/WMM when they use the band. This openness is also important to the success and widespread use of 2.4 GHz Wi-Fi, but makes it unsuitable for "must have" public service functions or where reliability is required. Users sometimes suffer network "frustrations" or a total network breakdown if gaming because a neighbour microwaves some pop corn. Interoperability issues between brands or proprietary deviations from the standard can disrupt connections or lower throughput speeds on other user's devices that are within range. And, Wi-Fi devices do not presently pick channels to avoid interference. Wi-Fi networks that are open (unencrypted) can be monitored and used to read and copy data (including personal information) transmitted over the network unless another security method is used to secure the data like a VPN or a secure web page. Standard Devices Wireless Access Point (WAP) Main article: Wireless access point A wireless access point connects a group of wireless devices to an adjacent wired LAN. An access point is similar to an ethernet hub, relaying data between connected wireless devices in addition to a (usually) single connected wired device, most often an ethernet hub or switch, allowing wireless devices to communicate with other wired devices. Wireless Adapter A wireless adapter allows a device to connect to a wireless network. These adapters connect to devices using various external or internal interconnects such as PCI, miniPCI, USB, ExpressCard, Cardbus and PC card. Most newer laptop computers are equipped with internal adapters. Internal cards are generally more difficult to install. Wireless Router A wireless router integrates a WAP, ethernet switch, and internal Router firmware application that provides IP Routing, NAT, and DNS forwarding through an integrated WAN interface. A wireless router allows wired and wireless ethernet LAN devices to connect to a (usually) single WAN device such as cable modem or DSL modem. A wireless router allows all three devices (mainly the access point and router) to be configured through one central utility. This utility is most usually an integrated web server which serves web pages to wired and wireless LAN clients and often optionally to WAN clients. This utility may also be an application that is run on a desktop computer such as Apple's AirPort. 25 Wireless Ethernet Bridge A wireless Ethernet bridge connects a wired network to a wireless network. This is different from an access point in the sense that an access point connects wireless devices to a wired network at the data-link layer. Two wireless bridges may be used to connect two wired networks over a wireless link, useful in situations where a wired connection may be unavailable, such as between two separate homes. Range Extender A wireless range extender or wireless repeater can extend the range of an existing wireless network. Range extenders can be strategically placed to elongate a signal area or allow for the signal area to reach around barriers such as those created in L-shaped corridors. Wireless devices connected through repeaters will suffer from an increased latency for each hop. Additionally, a wireless device at the end of chain of wireless repeaters will have a throughput that is limited by the weakest link within the repeater chain. Antenna connectors Most commercial devices (routers, access points, bridges, repeaters) designed for home or business environments use either RP-SMA or RP-TNC antenna connectors. PCI wireless adapters also mainly use RP-SMA connectors. Most PC card and USB wireless only have internal antennas etched on their printed circuit board while some have MMCX connector or MC-Card external connections in addition to an internal antenna. A few USB cards have a RP-SMA connector. Most Mini PCI wireless cards utilize Hirose U.FL connectors, but cards found in various wireless appliances contain all of the connectors listed. Many high-gain (and homebuilt antennas) utilize the Type N connector more commonly used by other radio communications methods. Non-Standard Devices DIY Range Optimizations USB-Wi-Fi adapters, food container "Cantennas", parabolic reflectors, and many other types of self-built antennae are increasingly made by do-it-yourselvers. For minimal budgets, as low as a few dollars, signal strength and range can be improved dramatically. There is also a type of optimization by polarizing the signal to achieve a planar coverage like a plate. Many of these high-gain aftermarket modifications are technically illegal under FCC and other regulatory guidelines. Long Range Wi-Fi For more details on this topic, see Long Range Wi-Fi. 26 Recently, long range Wi-Fi kits have begun to enter the market. Companies like RadioLabs and BroadbandXpress offer long range, inexpensive kits that can be setup with limited knowledge. These kits utilize specialized antennas which increase the range of Wi-Fi dramatically, in the case of the world record 137.2 miles (220km). These kits are commonly used to get Broadband internet to a place that cannot access the service itself.[4] The longest link ever achieved was by the Swedish space agency. They attained 310 km, but used 6 watt amplifiers to reach an overhead stratospheric balloon. The longest link without amplification was 279 km in Venezuela, 2006 Read PDF by www.eslared.org Wi-Fi and its support by operating systems There are two sides to Wi-Fi support under an operating system: driver level support, and configuration and management support. Driver support is usually provided by the manufacturer of the hardware or, in the case of Unix clones such as Linux and FreeBSD, sometimes through open source projects. Configuration and management support consists of software to enumerate, join, and check the status of available Wi-Fi networks. This also includes support for various encryption methods. These systems are often provided by the operating system backed by a standard driver model. In most cases, drivers emulate an ethernet device and use the configuration and management utilities built into the operating system. In cases where built in configuration and management support is non-existent or inadequate, hardware manufacturers may include their own software to handle the respective tasks. Microsoft Windows Microsoft Windows has comprehensive driver-level support for Wi-Fi, the quality of which depends on the hardware manufacturer. Hardware manufactures almost always ship Windows drivers with their products. Windows ships with very few Wi-Fi drivers and depends on the original equipment manufacturers (OEMs)and device manufacturers to make sure users get drivers. Configuration and management depend on the version of Windows. Earlier versions of Windows, such as 98, ME and 2000 do not have built-in configuration and management support and must depend on software provided by the manufacturer Microsoft Windows XP has built-in configuration and management support. The original shipping version of Windows XP included rudimentary support which was dramatically improved in Service Pack 2. Support for WPA2 and some other security protocols require updates from Microsoft. There are still problems with XP support of Wi-Fi. (One simple interface problem is that if the user makes a mistake in the (case sensitive) passphrase, XP keeps trying to connect but never tells the user that the passphrase is wrong. A second problem is not allowing the 27 user to see different BSSID's for the same ESSID; that is, it provides no way for the user to differentiate access points with the same name.) To make up for Windows’ inconsistent and sometimes inadequate configuration and management support, many hardware manufacturers include their own software and require the user to disable Windows’ built-in Wi-Fi support. See article "Windows XP Bedevils Wi-Fi Users" in Wired News. Microsoft Windows Vista has improved Wi-Fi support over Windows XP. The original betas automatically connected to unsecured networks without the user’s approval. The release candidate (RC1 or RC2) does not continue to display this behavior, requiring user permissions to connect to an unsecured network, as long as the user account is in the default configuration with regards to User Account Control. Apple Mac OS Apple was an early adopter of Wi-Fi, introducing its AirPort product line, based on the 802.11b standard, in July 1999. Apple then introduced AirPort Extreme as an implementation of 802.11g. All Macs starting with the original iBook included AirPort slots for which an AirPort card can be used, connecting to the computer's internal antenna. All Intel-based Macs either come with built-in Airport Extreme or a slot for an AirPort card. In late 2006, Apple began shipping Macs with Broadcom Wi-Fi chips that also supported the Draft 802.11n standard which can be unlocked through buying a $2 driver released by Apple at the January 2007 Macworld Expo. The driver is also included for free with Apple's 802.11n AirPort Extreme. Apple makes the Mac OS operating system, the computer hardware, the accompanying drivers, AirPort WiFi base stations, and configuration and management software, simplifying Wi-Fi integration. The built-in configuration and management is integrated throughout many of the operating system's applications and utilities. Mac OS X has WiFi support, including WPA2, and ships with drivers for Apple’s Broadcom-based AirPort cards. Many third-party manufacturers make compatible hardware along with the appropriate drivers which work with Mac OS X’s built-in configuration and management software. Other manufacturers distribute their own software. Apple's older Mac OS 9 does not have built in support for Wi-Fi configuration and management nor does it ship with Wi-Fi drivers, but Apple provides free drivers and configuration and management software for their AirPort cards for OS 9, as do a few other manufacturers. Versions of Mac OS before OS 9 predate Wi-Fi and do not have any Wi-Fi support, although some third-party hardware manufacturers have made drivers and connection software that allows earlier OSes to use Wi-Fi.[5] Open source Unix-like systems Linux, FreeBSD and similar Unix-like clones have much coarser support for Wi-Fi. Due to the open source nature of these operating systems, many different standards have been developed for configuring and managing Wi-Fi devices. The open source nature also fosters open source drivers which have enabled many third party and proprietary devices 28 to work under these operating systems. See Comparison of Open Source Wireless Drivers for more information on those drivers. Linux has patchy Wi-Fi support[6]. Native drivers for many Wi-Fi chipsets are available either commercially or at no cost[7], although some manufacturers don't produce a Linux driver, only a Windows one. Consequently, many popular chipsets either don't have a native Linux driver at all, or only have a half-finished one. For these, the freely available NdisWrapper and its commercial competitor DriverLoader[8] allow Windows x86 and 64 bit variants NDIS drivers to be used on x86-based Linux systems but not on other architectures. As well as the lack of native drivers, some Linux distributions do not offer a convenient user interface and configuring Wi-Fi on them can be a clumsy and complicated operation compared to configuring wired Ethernet drivers[9]. This is changing with NetworkManager, a utility that allows users to automatically switch between networks without using the command line. FreeBSD has Wi-Fi support similar to Linux. Support under FreeBSD is best in the 6.x versions, which introduced full support for WPA and WPA2, although in some cases this is driver dependent. FreeBSD comes with drivers for many wireless cards and chipsets, including those made by Atheros, Ralink, Cisco, Dlink, Netgear, and many Centrino chipsets, and provides support for others through the ports collection. FreeBSD also has "Project Evil", which provides the ability to use Windows x86 NDIS drivers on x86-based FreeBSD systems as NdisWrapper does on Linux, and Windows amd64 NDIS drivers on amd64-based systems[2]. NetBSD, OpenBSD, and DragonFly BSD have Wi-Fi support similar to FreeBSD. Code for some of the drivers, as well as the kernel framework to support them, is mostly shared among the 4 BSDs. Haiku has no Wi-Fi support at all as of April 2007. Embedded systems Wi-Fi availability in the home is on the increase. This extension of the Internet into the home space will increasingly be used for remote monitoring. Examples of remote monitoring include security systems and tele-medicine. In all these kinds of implementation, if the Wi-Fi provision is provided using a system running one of operating systems mentioned above, then it becomes unfeasible due to weight, power consumption and cost issues. Increasingly in the last few years (particularly as of early 2007), embedded Wi-Fi modules have become available which come with a real-time operating system and provide a simple means of wireless enabling any device which has and communicates via a serial port. This allows simple monitoring devices, for example a portable ecg monitor hooked up to a patient in the home, to be created. This Wi-Fi enabled device effectively becomes part 29 of the internet cloud and can communicate with any other node on the internet. The data collected can hop via the home's Wi-Fi access point to anywhere on the internet. These Wi-Fi modules are designed so that minimal Wi-Fi knowledge is required by designers to wireless enable their product. Social concerns Unintended and intended use by outsiders Measures to deter unauthorized users include suppressing the AP's service set identifier (SSID) broadcast, allowing only computers with known MAC addresses to join the network, and various encryption standards. Access points and computers using no encryption are vulnerable to eavesdropping by an attacker armed with packet sniffer software. If the eavesdropper has the ability to change his MAC address then he can potentially join the network by spoofing an authorised address. WEP encryption can protect against casual snooping but may also produce a misguided sense of security since freely available tools such as AirSnort can quickly recover WEP encryption keys. Once it has seen 5-10 million encrypted packets, AirSnort will determine the encryption password in under a second.[10] The newer Wi-Fi Protected Access (WPA) and IEEE 802.11i (WPA2) encyption standards do not have the serious weaknesses of WEP encryption, but require strong passphrases for full security. Recreational exploration of other people's access points has become known as wardriving, and the leaving of graffiti describing available services as warchalking. These activities may be illegal in certain jurisdictions, but existing legislation and caselaw is often unclear. However, it is also common for people to unintentionally use others' Wi-Fi networks without explicit authorization. Operating systems such as Windows XP SP2 and Mac OS X automatically connect to an available wireless network, depending on the network configuration. A user who happens to start up a laptop in the vicinity of an access point may find the computer has joined the network without any visible indication. Moreover, a user intending to join one network may instead end up on another one if the latter's signal is stronger. In combination with automatic discovery of other network resources (see DHCP and Zeroconf) this could possibly lead wireless users to send sensitive data to the wrong destination, as described by Chris Meadows in the February 2004 RISKS Digest. [3] In Singapore, using another person's Wi-Fi network is illegal under the Computer Misuse Act. A 17 year old has been arrested for simply tapping into his neighbor's wireless Internet connection and faces up to 3 years' imprisonment and a fine.[11] Wi-Fi vs. amateur radio In the US, Canada and Australia, a portion of the 2.4 GHz Wi-Fi radio spectrum is also allocated to amateur radio users. In the US, FCC Part 15 rules govern non-licensed 30 operators (i.e. most Wi-Fi equipment users). Under Part 15 rules, non-licensed users must "accept" (i.e. endure) interference from licensed users and not cause harmful interference to licensed users. Amateur radio operators are licensed users, and retain what the FCC terms "primary status" on the band, under a distinct set of rules (Part 97). Under Part 97, licensed amateur operators may construct their own equipment, use very high-gain antennas, and boost output power to 100 watts on frequencies covered by Wi-Fi channels 2-6. However, Part 97 rules mandate using only the minimum power necessary for communications, forbid obscuring the data, and require station identification every 10 minutes. Therefore, output power control is required to meet regulations, and the transmission of any encrypted data (for example https) is questionable. In practice, microwave power amplifiers are expensive. On the other hand, the short wavelength at 2.4 GHz allows for simple construction of very high gain directional antennas. Although Part 15 rules forbid any modification of commercially constructed systems, amateur radio operators may modify commercial systems for optimized construction of long links, for example. Using only 200 mW link radios and high gain directional antennas, a very narrow beam may be used to construct reliable links with minimal radio frequency interference to other users. Health risks There has been some debate about the effects of Wi-Fi transmissions on human health. Although the radiated energy is very low the use of laptops and PDAs may bring the sources very close to parts of the body for prolonged periods of time. There is no consensus amongst scientists, although there appears to be no evidence of harm it is impossible to prove the technology is completely safe. [12] History Wi-Fi uses both single carrier direct-sequence spread spectrum radio technology (part of the larger family of spread spectrum systems) and multi-carrier OFDM (Orthogonal Frequency Division Multiplexing) radio technology. These regulations then enabled the development of Wi-Fi, its onetime competitor HomeRF, and Bluetooth. Unlicensed spread spectrum was first made available by the Federal Communications Commission in 1985 and these FCC regulations were later copied with some changes in many other countries enabling use of this technology in all major countries.[13] The FCC action was proposed by Michael Marcus of the FCC staff in 1980 and the subsequent controversial regulatory action took 5 more years. It was part of a broader proposal to allow civil use of spread spectrum technology and was opposed at the time by main stream equipment manufacturers and many radio system operators. The precursor to Wi-Fi was invented in 1991 by NCR Corporation/AT&T (later Lucent & Agere Systems) in Nieuwegein, the Netherlands. It was initially intended for cashier systems; the first wireless products were brought on the market under the name WaveLAN with speeds of 1 Mbit/s to 2 Mbit/s. Vic Hayes, who held the chair of IEEE 802.11 for 10 years and has been named the 'father of Wi-Fi,' was involved in designing standards such as IEEE 802.11b, 802.11a and 802.11g. 31 Origin and meaning of the term 'Wi-Fi' Despite the similarity between the terms 'Wi-Fi' and 'Hi-Fi', statements reportedly made by Phil Belanger of the Wi-Fi Alliance contradict the popular conclusion that 'Wi-Fi' stands for 'Wireless Fidelity.'[14] According to Mr. Belanger, the Interbrand Corporation developed the brand 'Wi-Fi' for the Wi-Fi Alliance to use to describe WLAN products that are based on the IEEE 802.11 standards. In Mr. Belanger's words, "Wi-Fi and the yin yang style logo were invented by Interbrand. We [the founding members of the Wireless Ethernet Compatibility Alliance, now called the Wi-Fi Alliance] hired Interbrand to come up with the name and logo that we could use for our interoperability seal and marketing efforts. We needed something that was a little catchier than 'IEEE 802.11b Direct Sequence'." One possibility for the origin of the actual term is a simplified spelling of "Wi-Phy" or "Wireless Physical Network Layer". The Wi-Fi Alliance themselves invoked the term 'Wireless Fidelity' with the marketing of a tag line, "The Standard for Wireless Fidelity," but later removed the tag from their marketing. The Wi-Fi Alliance now seems to discourage the propagation of the notion that 'Wi-Fi' stands for 'Wireless Fidelity', but it has been referred to as such by the Wi-Fi Alliance in White Papers currently held in their knowledge base: "... a promising market for wireless fidelity (Wi-Fi) network equipment." [15] "A Short History of WLANs... The association created the Wi-Fi (Wireless Fidelity) logo to indicate that a product had been certified for interoperability." [16] 32 IEEE 802.11 From Wikipedia, the free encyclopedia IEEE 802.11 also known by the brand Wi-Fi, denotes a set of Wireless LAN/WLAN standards developed by working group 11 of the IEEE LAN/MAN Standards Committee (IEEE 802). The term 802.11x is also used to denote the set of amendments to the standard. The term IEEE 802.11 is also used to refer to the original 802.11 (1997), which is now sometimes called "802.11 legacy". For the application of these standards see WiFi. A Linksys Residential gateway with a 802.11b radio and a 4-port ethernet switch. A Compaq 802.11b PCI card The 802.11 family currently includes multiple over-the-air modulation techniques that all use the same basic protocol. The most popular techniques are those defined by the b/g and are amendments to the original standard; security was originally purposefully weak due to multi-governmental meddling on export requirements and was later enhanced via the 802.11i amendment after governmental and legislative changes. 802.11n is a new multi-streaming modulation technique that has recently been developed; the standard is still under draft development, although products designed based on proprietary pre-draft versions of the standard are being sold. Other standards in the family (c–f, h, j) are service amendments and extensions or corrections to previous specifications. 802.11b was the first widely accepted wireless networking standard, followed by 802.11g and then 802.11n. 802.11b and 802.11g standards use the 2.4 GHz (gigahertz) band, operating (in the United States) under Part 15 of the FCC Rules and Regulations. Because of this choice of frequency band, 802.11b and 802.11g equipment will suffer interference from microwave ovens, cordless telephones, Bluetooth devices, baby and security monitors, amateur radio 33 and other appliances using this same band. The 802.11a standard uses a different 5 GHz band, which is clean by comparison. 802.11a devices are not affected by products operating on the 2.4 GHz band. The segment of the radio frequency spectrum used varies between countries. While it is true that in the U.S. 802.11a and g devices may be legally operated without a licence. Unlicensed (legal) operation of 802.11 a & g is covered under Part 15 of the FCC Rules and Regulations. Frequencies used by channels one (1) through six (6) (802.11b) fall within the range of the 2.4 gigahertz amateur radio band. Licensed amateur radio operators may operate 802.11b/g devices under Part 97 of the FCC Rules and Regulations, allowing increased power output but not allowing any commercial content or encryption.[1] Protocols Summary Protocol Release Date Legacy 1997 Op. Frequency 2.4-2.5 GHz Throughput (Typ) 0.7 Mb/s Data Rate (Max) Range Range (Indoor) (Outdoor) 2 Mb/s ~25 meters ~75 meters 802.11a 1999 5.15-5.35/5.475.725/5.72523 Mb/s 5.875 GHz 54 Mb/s ~30 meters ~100 meters 802.11b 1999 2.4-2.5 GHz 4 Mb/s 11 Mb/s ~35 meters ~110 meters 802.11g 2003 2.4-2.5 GHz 19 Mb/s 54 Mb/s ~35 meters ~110 meters 248Mb/s ~70 = 2x2 ant meters ~160 meters 2007 (TGn draft 2.0) 802.11n 2.4 GHz and/or 74 Mb/s ratification 5 GHz timeline pushed to late 2008. 34 802.11 legacy The original version of the standard IEEE 802.11 released in 1997 specifies two raw data rates of 1 and 2 megabits per second (Mbit/s) to be transmitted via infrared (IR) signals or by either Frequency hopping or Direct-sequence spread spectrum in the Industrial Scientific Medical frequency band at 2.4 GHz. IR remains a part of the standard but has no actual implementations. The original standard also defines Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) as the medium access method. A significant percentage of the available raw channel capacity is sacrificed (via the CSMA/CA mechanisms) in order to improve the reliability of data transmissions under diverse and adverse environmental conditions. At least six different, somewhat-interoperable, commercial products appeared using the original specification, from companies like Alvarion (PRO.11 and BreezeAccess-II), BreezeCom, Digital / Cabletron (RoamAbout) , Lucent, Netwave Technologies (AirSurfer Plus and AirSurfer Pro), Symbol Technologies (Spectrum24), and Proxim (OpenAir). A weakness of this original specification was that it offered so many choices that interoperability was sometimes challenging to realize. It is really more of a "betaspecification" than a rigid specification, initially allowing individual product vendors the flexibility to differentiate their products but with little to no inter-vendor operability. Legacy 802.11 was rapidly supplemented (and popularized) by 802.11b. Widespread adoption of 802.11 networks only occurred after 802.11b was ratified and multiple product became available from multiple vendors and as a result few networks ran on the 802.11-1997 standard. 802.11a Release Date Op. Frequency Data Rate (Typ) Data Rate (Max) Range (Indoor) October 1999 5 GHz 23 Mb/s 54 Mb/s ~30 meters The 802.11a amendment to the original standard was ratified in 1999. The 802.11a standard uses the same core protocol as the original standard, operates in 5 GHz band, and uses a 52-subcarrier orthogonal frequency-division multiplexing (OFDM) with a maximum raw data rate of 54 Mb/s, which yields realistic net achievable throughput in the mid-20 Mb/s. The data rate is reduced to 48, 36, 24, 18, 12, 9 then 6 Mb/s if required. 802.11a originally had 12/13 non-overlapping channels, 12 that can be used indoor and 4/5 of the 12 that can be used in outdoor point to point configurations. Recently many countries of the world are allowing operation in the 5.47 to 5.725 GHZ Band as a secondary user using a sharing method derived in 802.11h. This will add another 12/13 Channels to the overall 5 GHz band enabling significant overall wireless capacity enabling the possibilty of 24+ channels in some countries. 802.11a is not interoperable with 802.11b as they operate on separate bands, except if using equipment that has a dual band capability. Nearly all enterprise class Access Points have dual band capability. 35 Since the 2.4 GHz band is heavily used, using the 5 GHz band gives 802.11a a significant advantage. However, this high carrier frequency also brings a slight disadvantage. The effective overall range of 802.11a is slightly less then 802.11b/g, it also means that 802.11a cannot penetrate as far as 802.11b since it is absorbed more readily when penetrating walls, or any other solid object. On the other hand, OFDM has fundamental propagation advantages when in a high multipath environment such as an indoor office. And the higher frequencies enable the building of smaller antennae with higher RF system gain which counteract the disadvantage of a higher band of operation. The increased number of usable channels (4 to 8 times as many in FCC countries) and the near absence of other interfering systems (microwave ovens, cordless phones, bluetooth products, baby monitors) makes the 5 GHz band the preferred WLAN band for professionals and businesses who require more capacity and reliability and are willing to pay a small premium for it. Different countries have different regulatory support, although a 2003 World Radiotelecommunications Conference made it easier for use worldwide. 802.11a is now approved by regulations in the United States and Japan, but in other areas, such as the European Union, it had to wait longer for approval. European regulators were considering the use of the European HIPERLAN standard, but in mid-2002 cleared 802.11a for use in Europe. In the U.S., a mid-2003 FCC decision may open more spectrum to 802.11a channels. Of the 52 OFDM subcarriers, 48 are for data and 4 are pilot subcarriers with a carrier separation of 0.3125 MHz (20 MHz/64). Each of these subcarriers can be a BPSK, QPSK, 16-QAM or 64-QAM. The total bandwidth is 20 MHz with an occupied bandwidth of 16.6 MHz. Symbol duration is 4 microseconds with a guard interval of 0.8 microseconds. The actual generation and decoding of orthogonal components is done in baseband using DSP which is then upconverted to 5 GHz at the transmitter. Each of the subcarriers could be represented as a complex number. The time domain signal is generated by taking an Inverse Fast Fourier transform (IFFT). Correspondingly the receiver downconverts, samples at 20 MHz and does an FFT to retrieve the original coefficients. The advantages of using OFDM include reduced multipath effects in reception and increased spectral efficiency. 802.11a products started shipping in late 2001, lagging 802.11b products due to the slow availability of the harder to manufacture 5 GHz components needed to implement products. 802.11a has not been widely adopted in the consumer market primarily because the less-expensive 802.11b was already widely adopted along with the arrival of less expensive early 802.11g product on the market, also some poor initial product implementations further limited its success. Manufacturers of 802.11a equipment responded to the lack of market success by significantly improving the implementations (current-generation 802.11a technology has range characteristics nearly identical to those of 802.11b), and by making technology that can use more than one band and 802.11 standard. There are dual-band, or dual-mode Access Points and NIC cards that can automatically handle 802.11a and b, or a and b/g, as available. Similarly, there are mobile adapters and access points which can support all these standards. 36 1472 byte Data rate Number of data Modulation Coding rate transfer duration (Mb/s) bits per symbol (µs) 6 BPSK 1/2 24 2012 9 BPSK 3/4 36 1344 12 QPSK 1/2 48 1008 18 QPSK 3/4 72 672 24 16-QAM 1/2 96 504 36 16-QAM 3/4 144 336 48 64-QAM 2/3 192 252 54 64-QAM 3/4 216 224 802.11b Release Date Op. Frequency Data Rate (Typ) Data Rate (Max) Range (Indoor) October 1999 2.4 GHz 4 Mb/s 11 Mb/s ~35 meters The 802.11b amendment to the original standard was ratified in 1999. 802.11b has a maximum raw data rate of 11 Mb/s and uses the same CSMA/CA media access method defined in the original standard. Due to the CSMA/CA protocol overhead, in practice the maximum 802.11b throughput that an application can achieve is about 5.9 Mb/s using TCP and 7.1 Mb/s using UDP. 802.11b products appeared on the market in early 2000, since 802.11b is a direct extension of the DSSS (Direct-sequence spread spectrum) modulation technique defined in the original standard. Technically, the 802.11b standard uses Complementary code 37 keying (CCK) as its modulation technique. The dramatic increase in throughput of 802.11b (compared to the original standard) along with simultaneous substantial price reductions led to the rapid acceptance of 802.11b as the definitive wireless LAN technology. 802.11b is normally used in a point-to-multipoint configuration, wherein an access point communicates via an omni-directional antenna with one or more clients that are located in a coverage area around the access point. Typical indoor range is 30 m (100 ft) at 11 Mb/s and 90 m (300 ft) at 1 Mb/s. The overall bandwidth is dynamically shared across all the users on a channel. With high-gain external antennas, the protocol can also be used in fixed point-to-point arrangements, typically at ranges up to 8 kilometers (5 miles) although some report success at ranges up to 80–120 km (50–75 miles) where line of sight can be established. This is usually done in place of costly leased lines or very cumbersome microwave communications equipment. Designers of such installations who wish to remain within the law must however be careful about legal limitations on effective radiated power. 802.11b cards can operate at 11 Mb/s, but will scale back to 5.5, then 2, then 1 Mb/s (also known as Adaptive Rate Selection), if signal quality becomes an issue. Since the lower data rates use less complex and more redundant methods of encoding the data, they are less susceptible to corruption due to interference and signal attenuation. Many companies created proprietary extensions and called them enhanced versions "802.11b+". These extensions have been largely obviated by the development of 802.11g, which has data rates up to 54 Mb/s and is backwards-compatible with 802.11b. 802.11g Release Date Op. Frequency Data Rate (Typ) Data Rate (Max) Range (Indoor) June 2003 2.4 GHz 19 Mbps 54 Mbps ~35 meters In June 2003, a third modulation standard was ratified: 802.11g. This flavor works in the 2.4 GHz band (like 802.11b) but operates at a maximum raw data rate of 54 Mb/s, or about 19 Mb/s net throughput (like 802.11a except with some additional legacy overhead). 802.11g hardware is backwards compatible with 802.11b hardware. Details of making b and g work well together occupied much of the lingering technical process. In an 11g network, however, the presence of an 802.11b participant does significantly reduce the speed of the overall 802.11g network. The modulation scheme used in 802.11g is orthogonal frequency-division multiplexing (OFDM) for the data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mb/s, and reverts to CCK (like the 802.11b standard) for 5.5 and 11 Mb/s and DBPSK/DQPSK+DSSS for 1 and 2 Mb/s. Even though 802.11g operates in the same frequency band as 802.11b, it can achieve higher data rates because of its similarities to 802.11a. The maximum range of 802.11g devices is slightly greater than that of 802.11b devices, but the range in which a 38 client can achieve the full 54 Mb/s data rate is much shorter than that of which a 802.11b client can reach 11 Mb/s. The 802.11g standard swept the consumer world of early adopters starting in January 2003, well before ratification due to fierce competition along with dramatic reductions in manufacturing costs. Corporate users held back - Cisco and other big equipment makers waited until ratification. By summer 2003, announcements were flourishing. Most of the dual-band 802.11a/b products became dual-band/tri-mode, supporting a, and b/g in a single mobile adapter card or access point. Despite its major acceptance, 802.11g suffers from the same interference as 802.11b in the already crowded 2.4 GHz range. Devices operating in this range include microwave ovens, Bluetooth devices, baby monitors and cordless telephones. Interference issues, and related problems within the 2.4 GHz band have become a major concern and frustration for users. Additionally the success of the standard has caused usage problems related to crowding in urban areas. This crowding can cause a dissatified user experience as the number of non-overlapping usable channels is only 3 in FCC nations (ch 1, 6, 11)or 4 in European nations (ch 1, 5, 9, 13). Also, the 802.11/11g MAC protocol doesn't share efficiently with more then a few users per channel. 802.11n Release Date Mid 2008 Op. Frequency 5 GHz and/or 2.4 GHz Data Rate (Typ) 74 Mbps Data Rate (Max) 248 Mbps (2 stream) Range (Indoor) ~70 meters Timeline Work on the 802.11n standard dates back to 2004. Publication is currently expected in September 2008, but major manufacturers are now releasing 'pre-N', 'draft n' or 'MIMObased' products based on early specs. [2] In January 2004, IEEE announced that it had formed a new 802.11 Task Group (TGn) to develop a new amendment to the 802.11 standard for wireless local-area networks. The real data throughput will reach a theoretical 270 Mbit/s for the required dual stream MIMO device. (which may require an even higher raw data rate at the physical layer), and should be up to 20 times faster than 802.11b, and up to 3 times faster than 802.11a and up to 4 times faster than 802.11g. In late July 2005, previous competitors TGn Sync, WWiSE, and a third group, MITMOT, said that they would merge their respective proposals as a draft. The standardization process is expected to be completed by the second quarter of 2009. 39 802.11n builds upon previous 802.11 standards by adding MIMO (multiple-input multiple-output). MIMO uses multiple transmitter and receiver antennas to allow for increased data throughput via spatial multiplexing and increased range by exploiting the spatial diversity, perhaps through coding schemes like Alamouti coding. Antennae are listed in a format of 2x2 for two receivers and two transmitters. A 4x4 is four receivers and four transmitters. The number of antennae relate to the number of simultaneous streams. The standards requirement is a 2x2 with two streams. The standard does optionally allow for the potential of a 4x4 with four streams. The Enhanced Wireless Consortium (EWC)[3] was formed to help accelerate the IEEE 802.11n development process and promote a technology specification for interoperability of next-generation wireless local area networking (WLAN) products. On 19 January 2006, the IEEE 802.11n Task Group approved the Joint Proposal's specification, based on EWC's draft specification. At the March 2006 meeting, the IEEE 802.11 Working Group sent the 802.11n Draft to its first letter ballot, allowing the 500+ 802.11 voters to review the document and suggest bugfixes, changes and improvements. On 2 May 2006, the IEEE 802.11 Working Group voted not to forward Draft 1.0 of the proposed 802.11n standard. Only 46.6% voted to approve the ballot. To proceed to the next step in the IEEE standards process, a majority vote of 75% is required. This letter ballot also generated approximately 12000 comments -- much more than anticipated. In November 2006, TGn voted to accept draft version 1.06, incorporating all accepted technical and editorial comment resolutions prior to this meeting. An additional 800 comment resolutions were approved during the November session which will be incorporated into the next revision of the draft. As of this meeting, three of the 8 comment topic ad hoc groups chartered in May have had completed their work and 88% of the technical comments had been resolved with approximately 370 remaining. On 19 January 2007, the IEEE 802.11 Working Group unanimously (100 yes, 0 no, 5 abstaining) approved a request by the 802.11n Task Group to issue a new Draft 2.0 of the proposed standard. Draft 2.0 was based on the Task Group's working draft version 1.10. Draft 2.0 was at this point in time the cumulative result of thousands of changes to the 11n document as based on all previous comments. On 7 February 2007, the results of Letter Ballot 95, a 15-day Procedural vote passed with 97.99% approval and 2.01% disapproval. On the same day, 802.11 Working Group announced the opening of Letter Ballot 97. It invited detailed technical comments to closed on 9 March 2007. On 9 March 2007, Letter Ballot 97, the 30-day Technical vote to approve Draft 2.0, closed. They were announced by IEEE 802 leadership during the Orlando Plenary on 12 March 2007. The ballot passed with an 83.4% approval, above the 75% minimum approval threshold. There were still approximately 3,076 unique comments, which will be individually examined for incorporation into the next revision of Draft 2. 40 According to the IEEE 802.11 Working Group Project Timelines, [4] the estimated 802.11n publish date is now September 2008. An 802.11 access point may operate in one of three modes: 1. Legacy (only 802.11a, and b/g) 2. Mixed (both 802.11a, and b/g, and n) 3. Greenfield (only 802.11n) - maximum performance See also: 802.11 non-standard equipment#Pre-802.11n equipment Channels and international compatibility See also: Wi-Fi#Technical information 802.11b and 802.11g -- as well as 802.11n when using the 2.4 GHz band -- divide the 2.4 GHz spectrum into 14 overlapping, staggered channels whose center frequencies are 5 megahertz (MHz) apart. The 802.11b, and 802.11g standards do specify the center frequency of the channel and a spectral mask width to a power level for that channel. The spectral mask for 802.11b requires that the signal be attenuated by at least 30 dB from its peak energy at ±11 MHz from the center frequency. This means that an 802.11b/g product occupies five channels to an energy level of 30 dB down from the peak or center of the signal. For an FCC country the valid channels are one through eleven: this limits the number of non-overlapped channels to three. The normal system level channel configurations for deployments are channels 1, 6 and 11. Since the spectral mask only defines power output restrictions up to ±22 MHz from the center frequency to be attenuated by 50dB, it is often assumed that the energy of the channel extends no further than these limits. It is more correct to say that, given the separation between channels 1, 6, and 11, the signal on any channel should be sufficiently attenuated to minimally interfere with a transmitter on any other channel. However, a typical transmitter on an adjacent channel can impact a weaker signal on a nonoverlapping channel only if it is closely placed to the victim radio (well within a meter). Although the statement that channels 1, 6, and 11 are "non-overlapping" is limited to a spacing or product density, the 1-6-11 guideline has merit. If transmitters are closer together than channels 1, 6, and 11 (for example, 1, 4, 7, and 10), overlap between the channels may cause unacceptable degradation of signal quality and throughput.[5] The channels that are available for use in a particular country differ according to the regulations of that country. In the United States, for example, FCC regulations only allow channels 1 through 11 to be used. In Europe channels 1-13 are licensed for 802.11b operation (with 1, 5, 9 and 13 usually deployed). In Japan, all 14 channels are licensed for 802.11b operation. Standard and Amendments Within the IEEE 802.11 Working Group[4], the following IEEE Standards Association Standard and Amendments exist: 41 IEEE 802.11 - THE WLAN STANDARD was original 1 Mbit/s and 2 Mb/s, 2.4 GHz RF and IR standard (1997), all the others listed below are Amendments to this standard, except for Recommended Practices 802.11F and 802.11T. IEEE 802.11a - 54 Mbit/s, 5 GHz standard (1999, shipping products in 2001) IEEE 802.11b - Enhancements to 802.11 to support 5.5 and 11 Mb/s (1999) IEEE 802.11c - Bridge operation procedures; included in the IEEE 802.1D standard (2001) IEEE 802.11d - International (country-to-country) roaming extensions (2001) IEEE 802.11e - Enhancements: QoS, including packet bursting (2005) IEEE 802.11F - Inter-Access Point Protocol (2003) Withdrawn February 2006 IEEE 802.11g - 54 Mb/s, 2.4 GHz standard (backwards compatible with b) (2003) IEEE 802.11h - Spectrum Managed 802.11a (5 GHz) for European compatibility (2004) IEEE 802.11i - Enhanced security (2004) IEEE 802.11j - Extensions for Japan (2004) IEEE 802.11k - Radio resource measurement enhancements (proposed - 2007?) IEEE 802.11l - (reserved and will not be used) IEEE 802.11m - Maintenance of the standard; odds and ends. (ongoing) IEEE 802.11n - Higher throughput improvements using MIMO (multiple input, multiple output antennas) (pre-draft - 2009?) IEEE 802.11o - (reserved and will not be used) IEEE 802.11p - WAVE - Wireless Access for the Vehicular Environment (such as ambulances and passenger cars) (working - 2009?) IEEE 802.11q - (reserved and will not be used, can be confused with 802.1Q VLAN trunking) IEEE 802.11r - Fast roaming Working "Task Group r" - 2007? IEEE 802.11s - ESS Extended Service Set Mesh Networking (working - 2008?) IEEE 802.11T - Wireless Performance Prediction (WPP) - test methods and metrics Recommendation (working - 2008?) IEEE 802.11u - Interworking with non-802 networks (for example, cellular) (proposal evaluation - ?) IEEE 802.11v - Wireless network management (early proposal stages - ?) IEEE 802.11w - Protected Management Frames (early proposal stages - 2008?) IEEE 802.11x - (reserved and will not be used, can be confused with 802.1x Network Access Control) IEEE 802.11y - 3650-3700 Operation in the U.S. (early proposal stages - ?) There is no standard or task group named "802.11x". Rather, this term is used informally to denote any current or future 802.11 amendment, in cases where further precision is not necessary. (The IEEE 802.1x standard for port-based network access control, is often mistakenly called "802.11x" when used in the context of wireless networks.) 802.11F and 802.11T are stand-alone documents, rather than amendments to the 802.11 standard and are capitalized as such. Standard or Amendment? Both the terms "standard" and "amendment" are used when referring to the different variants of IEEE 802.11. Which is correct? 42 As far as the IEEE is concerned there is only one standard - IEEE 802.11. This standard is continuously updated by means of amendments such as IEEE 802.11a, IEEE 802.11b etc. Periodically a new version of the IEEE 802.11 standard is produced combining the previous version of the standard and all amendments published up to that date. For example, there is a 2003 edition of the standard available for purchase[6] that incorporates the IEEE 802.11a, IEEE 802.11b, and IEEE 802.11d amendments. It is possible that at some point, only this version will be made available for free download replacing the six year old version of the base standard and the first three amendments. So the correct term for the base standard called "802.11 legacy" on this page would in fact be 802.11-1999. But outside the working group that produces IEEE 802.11 such accuracy is probably unnecessary. Nomenclature Various terms in 802.11 are used to specify aspects of wireless local-area networking operation, and may be unfamiliar to some readers. For example, Time Unit (usually abbreviated TU) is used to indicate a unit of time equal to 1024 microseconds. Numerous time constants are defined in terms of TU (rather than the nearly-equal millisecond). Also the term "Portal" is used to describe an entity that is similar to an IEEE 802.1D bridge. A Portal provides access to the WLAN by non-802.11 LAN STAs. Community networks With the proliferation of cable modems and DSL, there is an ever-increasing market of people who wish to establish small networks in their homes to share their high speed Internet connection. Wireless office networks are unsecured for guests outside a firewall or rarely secured with WEP, as the security can be very easily broken or WPA AES which is a government strength encryption method. Many hotspot or free networks frequently allow anyone within range, including passersby on the street outside, to connect to the Internet. There are also efforts by volunteer groups to establish wireless community networks to provide free wireless connectivity to the public. Security In 2001, a group from the University of California, Berkeley presented a paper describing weaknesses in the 802.11 Wired Equivalent Privacy (WEP) security mechanism defined in the original standard; they were followed by Fluhrer, Mantin, and Shamir's paper entitled "Weaknesses in the Key Scheduling Algorithm of RC4". Not long after, Adam Stubblefield and AT&T publicly announced the first verification of the attack. In the 43 attack they were able to intercept transmissions and gain unauthorized access to wireless networks. The IEEE set up a dedicated task group to create a replacement security solution, 802.11i (previously this work was handled as part of a broader 802.11e effort to enhance the MAC layer). The Wi-Fi Alliance announced an interim specification called Wi-Fi Protected Access (WPA) based on a subset of the then current IEEE 802.11i draft. These started to appear in products in mid-2003. IEEE 802.11i (also known as WPA2) itself was ratified in June 2004, and uses the Advanced Encryption Standard, instead of RC4, which was used in WEP and WPA. In January 2005, IEEE set up yet another task group TGw to protect management and broadcast frames, which previously were sent unsecured. See IEEE 802.11w 44 WiMAX: IEE802.16 From Wikipedia, the free encyclopedia WiMAX is defined as Worldwide Interoperability for Microwave Access by the WiMAX Forum, formed in June 2001 to promote conformance and interoperability of the IEEE 802.16 standard, officially known as WirelessMAN. WiMAX aims to provide wireless data over long distances, in a variety of different ways, from point to point links to full mobile cellular type access. In practical terms this enables you, for example, to browse the internet on a laptop computer without physically connecting the laptop to a socket in a wall. The Forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL." Definitions of terms[1] The terms "fixed WiMAX", "mobile WiMAX", "802.16d" and "802.16e" are frequently used incorrectly. Correct definitions are: 802.16d Strictly speaking, 802.16d has never existed as a standard. The standard is correctly called 802.16-2004. However, since this standard is frequently called 802.16d, that usage also takes place in this article to assist readability. 802.16e Just as 802.16d has never existed, a standard called 802.16e hasn't either. It's an amendment to 802.16-2004, so is not a standard in its own right. It's properly referred to as 802.16e-2005. Fixed WiMAX This is a phrase frequently used to refer to systems built using 802.16-2004 as the air interface technology. Mobile WiMAX A phrase frequently used to refer to systems built using 802.16e-2005 as the air interface technology. "Mobile WiMAX" implementations are therefore frequently used to deliver pure fixed services. 45 Uses The bandwidth and reach of WiMAX make it suitable for the following potential applications: Connecting Wi-Fi hotspots with each other and to other parts of the Internet. Providing a wireless alternative to cable and DSL for last mile (last km) broadband access. Providing high-speed data and telecommunications services. Providing a diverse source of Internet connectivity as part of a business continuity plan. That is, if a business has a fixed and a wireless internet connection, especially from unrelated providers, they are unlikely to be affected by the same service outage. Providing nomadic connectivity. Broadband Access Many companies are closely examining WiMAX for "last mile" connectivity at high data rates. This could result in lower pricing for both home and business customers as competition lowers prices. In areas without pre-existing physical cable or telephone networks, WiMAX may be a viable alternative for broadband access that has been economically unavailable. Prior to WiMAX, many operators have been using proprietary fixed wireless technologies for broadband services. WiMAX access was used to assist with communications in Aceh, Indonesia, after the tsunami in December 2004. All communication infrastructures in the area were destroyed making the survivors unable to communicate with people outside the disaster area and vice versa. WiMAX provided broadband access that helped regenerate communication to and from Aceh so that condition post-tsunami can be retrieved. Subscriber Units WiMAX subscriber units are available in both indoor and outdoor versions from several manufacturers. Self-install indoor units are convenient, but radio losses mean that the subscriber must be significantly closer to the WiMAX base station than with professionally installed external units. As such, indoor installed units require a much higher infrastructure investment as well as operational cost (site lease, backhaul, maintenance) due to the high number of base stations required to cover a given area. Indoor units are comparable in size to a cable modem or DSL modem. Outdoor units are roughly the size of a textbook, and their installation is comparable to a residential satellite dish. Mobile applications Some cellular companies are evaluating WiMAX as a means of increasing bandwidth for a variety of data-intensive applications; indeed, Sprint Nextel announced in mid-2006 46 that it would invest about US$ 3 billion in a WiMAX technology buildout over the next few years[2]. In line with these possible applications is the technology's ability to serve as a high bandwidth "backhaul" for Internet or cellular phone traffic from remote areas back to an Internet backbone. Although the cost per user/point of WiMAX in a remote application will be higher, it is not limited to such applications, and may be an answer to reducing the cost of T1/E1 backhaul as well. Given the limited wired infrastructure in some developing countries, the costs to install a WiMAX station in conjunction with an existing cellular tower or even as a solitary hub are likely to be small in comparison to developing a wired solution. Areas of low population density and flat terrain are particularly suited to WiMAX and its range. For countries that have skipped wired infrastructure as a result of prohibitive costs and unsympathetic geography, WiMAX can enhance wireless infrastructure in an inexpensive, decentralized, deployment-friendly and effective manner. Technical information WiMAX is a term coined to describe standard, interoperable implementations of IEEE 802.16 wireless networks, in a rather similar way to Wi-Fi being interoperable implementations of the IEEE 802.11 Wireless LAN standard. However, WiMAX is very different from Wi-Fi in the way it works. MAC layer/ Data Link Layer In Wi-Fi the media access controller (MAC) uses contention access — all subscriber stations that wish to pass data through a wireless access point (AP) are competing for the AP's attention on a random interrupt basis. This can cause subscriber stations distant from the AP to be repeatedly interrupted by closer stations, greatly reducing their throughput. This makes services such as Voice over IP (VoIP) or IPTV, which depend on an essentially constant Quality of Service (QoS) depending on data rate and interruptibility, difficult to maintain for more than a few simultaneous users. In contrast, the 802.16 MAC uses a scheduling algorithm for which the subscriber station need compete once (for initial entry into the network). After that it is allocated an access slot by the base station. The time slot can enlarge and contract, but remains assigned to the subscriber station which means that other subscribers cannot use it. The 802.16 scheduling algorithm is stable under overload and over-subscription (unlike 802.11). It can also be more bandwidth efficient. The scheduling algorithm also allows the base station to control QoS parameters by balancing the time-slot assignments among the application needs of the subscriber stations. Physical layer The original WiMAX standard (IEEE 802.16) specified WiMAX for the 10 to 66 GHz range. 802.16a, updated in 2004 to 802.16-2004, added specifications for the 2 to 11 GHz range. 802.16-2004 was updated to 802.16e in 2005 and uses scalable orthogonal frequency-division multiple access (SOFDMA) as opposed to the OFDM version with 47 256 sub-carriers (of which 200 are used) in 802.16d. More advanced versions including 802.16e also bring Multiple Antenna Support through Multiple-input multiple-output communications. This brings potential benefits in terms of coverage, self installation, power consumption, frequency re-use and bandwidth efficiency. 802.16e also adds a capability for full mobility support. The WiMAX certification allows vendors with 802.16d products to sell their equipment as WiMAX certified, thus ensuring a level of interoperability with other certified products, as long as they fit the same profile. Most commercial interest is in the 802.16d and .16e standards, since the lower frequencies used in these variants suffer less from inherent signal attenuation and therefore give improved range and in-building penetration. Already today, a number of networks throughout the World are in commercial operation using certified WiMAX equipment compliant with the 802.16d standard. Comparison with Wi-Fi Possibly due to the fact both WiMAX and Wi-Fi begin with the same two letters, and are based upon IEEE standards beginning with 802., and both have a connection to wireless connectivity and the Internet, comparisons and confusion between the two are frequent. Despite this, both standards are aimed at different applications. WiMAX is a long range (many kilometers) system that uses licensed or unlicensed spectrum to deliver a point-to-point connection to the Internet from an ISP to an end user. Different 802.16 standards provide different types of access, from mobile (analogous to access via a cellphone) to fixed (an alternative to wired access, where the end user's wireless termination point is fixed in location.) Wi-Fi is a shorter range (range is typically measured in hundreds of m) system that uses unlicensed spectrum to provide access to a network, typically covering only the network operator's own property. Typically Wi-Fi is used by an end user to access their own network, which may or may not be connected to the Internet. If WiMAX provides services analogous to a cellphone, Wi-Fi is more analogous to a cordless phone. WiMAX is highly scalable from what are called 'femto' scale remote stations to multi-sector 'maxi' scale base that handle complex tasks of management and mobile handoff functions and include MIMO-AAS smart antenna subsystems. Due to the ease and low cost with which Wi-Fi can be deployed, it is sometimes used to provide Internet access to third parties within a single room or building available to the provider, sometimes informally, and sometimes as part of a business relationship. For example, many coffee shops, hotels, and transportation hubs contain Wi-Fi access points providing access to the Internet for patrons. Spectrum Allocations issues The 802.16 specification applies across a wide swath of the RF spectrum. However, specification is not the same as permission to use. There is no uniform global licensed spectrum for WiMAX. In the US, the biggest segment available is around 2.5 GHz[3], and is already assigned, primarily to Sprint Nextel and Clearwire. Elsewhere in the world, the 48 most likely bands used will be around 3.5 GHz, 2.3/2.5 GHz, or 5 GHz, with 2.3/2.5 GHz probably being most important in Asia. Some countries in Asia like India, Vietnam and Indonesia will use 3.3 GHz. There is some prospect in the United States that some of a 700 MHz band might be made available for WiMAX use, but it is currently assigned to analog TV and awaits the complete rollout of digital TV before it can become available, likely by 2009. In any case, there will be other uses suggested for that spectrum when it actually becomes open. The FCC auction for this spectrum is scheduled for the end of 2007. It seems likely that there will be several variants of 802.16, depending on local regulatory conditions and thus on which spectrum is used, even if everything but the underlying radio frequencies is the same. WiMAX equipment will not, therefore, be as portable as it might have been - perhaps even less so than WiFi, whose assigned channels in unlicensed spectrum vary little from jurisdiction to jurisdiction. Manufacturers are compelled to provide multi-spectrum devices that can be used across different regions and regulatory requirements. WISOA is an organization that promotes roaming among service providers. However, this is no different than current mobile phones with dual band, triband and even quadband capabilities. Equipment vendors have already announced the development of multiband subscriber units. WiMax profiles define channel size, TDD/FDD and other necessary attributes in order to have interoperating products. The current fixed profiles define for both TDD and FDD profiles. At this point, all of the mobile profiles are TDD only. The fixed profiles have channel sizes of 3.5 MHz, 5 MHz, 7 MHz and 10 MHz. The mobile profiles are 5 MHz and 10 MHz. One of significant advantages of WiMax is spectrum efficiency. For example, 802.16-2004 (fixed) has a spectral efficiency of 3.7 bits/hertz. Compared to similar technologies that often are less than 1 bit/hertz efficient such as WiFi. Limitations A commonly held misconception is that WiMAX will deliver 70 Mbit/s, over 30 miles (48 kilometers). Each of these is true individually, given ideal circumstances, but they are not simultaneously true. In practice this means that in line-of-sight environments you could deliver symmetrical speeds of 10 Mbit/s at 10 km but in urban environments it is more likely that 30% of installations may be non-line-of-sight and therefore users may only receive 10 Mbit/s over 2 km. WiMAX has some similarities to DSL in this respect, where one can either have high bandwidth or long reach, but not both simultaneously. The other feature to consider with WiMAX is that available bandwidth is shared between users in a given radio sector, so if there are many active users in a single sector, each will get reduced bandwidth. However, unlike SDSL where contention is very noticeable at a 5:1 ratio (if you are sharing your connection with a large media firm for example), WiMAX does not have this problem. Typically each cell has a whole 100 Mbit/s backhaul so there is no contention here. In practice, many users will have a range of 2-, 4, 6-, 8- or 10 Mbit/s services and the bandwidth can be shared. If the network becomes busy the business model is more like GSM or UMTS than DSL. It is easy to predict capacity requirements as you add customers. Additional radio cards can be added on the same sector to increase the capacity. 49 Standards The current WiMax incarnation, Mobile WiMax, is based upon IEEE Std 802.16e2005[4], approved in December 2005. It is an amendment of IEEE Std 802.16-2004[5] and so the actual standard is 802.16-2004 as amended by 802.16e-2005 - the specifications need to be read together to understand them. IEEE Std 802.16-2004 addresses only fixed systems. It replaced IEEE Standards 802.162001, 802.16c-2002, and 802.16a-2003. IEEE 802.16e-2005 IEEE 802.16e-2005 improves upon IEEE 802.16-2004 by: Scaling of the Fast Fourier Transform (FFT) to the channel bandwidth in order to keep the carrier spacing constant across different channel bandwidths (1.25-20 MHz). Constant carrier spacing results in a higher spectrum efficiency in wide channels, and a cost reduction in narrow channels. Also known as Scalable OFDMA (SOFDMA). Improving NLOS coverage by utilizing advanced antenna diversity schemes, and hybrid-Automatic Retransmission Request (hARQ) Improving coverage by introducing Adaptive Antenna Systems (AAS) and Multiple Input Multiple Output (MIMO) technology Increasing system gain by use of denser sub-channelization, thereby improving indoor penetration Introducing high-performance coding techniques such as Turbo Coding and LowDensity Parity Check (LDPC), enhancing security and NLOS performance Introducing downlink sub-channelization, allowing administrators to trade coverage for capacity or vice versa Enhanced Fast Fourier Transform algorithm can tolerate larger delay spreads, increasing resistance to multipath interference Adding an extra QoS class (enhanced real-time Polling Service) more appropriate for VoIP applications. Adding support for mobility (soft and hard handover between base stations). This is seen as one of the most important aspects of 802.16e-2005, and is the very basis of 'Mobile WiMax'. 802.16d vendors point out that fixed WiMAX offers the benefit of available commercial products and implementations optimized for fixed access. It is a popular standard among alternative service providers and operators in developing areas due to its low cost of deployment and advanced performance in a fixed environment. Fixed WiMAX is also seen as a potential standard for backhaul of wireless base stations such as cellular, WiFi or even mobile WiMAX. SOFDMA (used in 802.16e-2005) and OFDM256 (802.16d) are not compatible so most equipment will have to be replaced if an operator wants or needs to move to the later standard. However, some manufacturers are planning to provide a migration path for older equipment to SOFDMA compatibility which would ease the transition for those 50 networks which have already made the OFDM256 investment. This affects a relatively small number users and operators. WiBro South Korea’s electronics and telecommunication industry spearheaded by Samsung Electronics and ETRI has developed its own standard, WiBro. In late 2004, Intel and LG Electronics have agreed on interoperability between WiBro and WiMAX. WiBro has South Korean government support with the requirement for each carrier to spend over US$1 billion for deployments. Korea sought to develop WiBro as a regional and potentially international alternative to 3.5G or 4G cellular systems. But given the lack of momentum as a standard, WiBro has joined WiMAX and agreed to harmonize with the similar OFDMA 802.16e version of the standard. What makes WiBro roll-outs a good 'test case' for the overall WiMAX effort is that it is mobile, well thought out for delivery of wireless broadband services, and the fact that the deployment is taking place in a highly sophisticated, broadband-saturated market. WiBro will go up against 3G and very high bandwidth wire-line services rather than as gap-filler or rural under-served market deployments as is often exampled as the 'best fit' markets for WiMAX. Associations WiMAX Forum The WiMAX Forum is the organization dedicated to certifying the interoperability of WiMAX products. Those that pass conformance and interoperability testing achieve the "WiMAX Forum Certified" designation and can display this mark on their products and marketing materials. Some vendors claim that their equipment is "WiMAX-ready", "WiMAX-compliant", or "pre-WiMAX", if they are not officially WiMAX Forum Certified. [6] WiMAX Spectrum Owners Alliance - WiSOA WiSOA is the first global organization composed exclusively of owners of WiMAX spectrum without plans to deploy WiMAX technology in those bands. WiSOA is focussed on the regulation, commercialisation, and deployment of WiMAX spectrum in the 2.3–2.5 GHz and the 3.4–3.5 GHz ranges. WiSOA are dedicated to educating and 51 informing its members, industry representatives and government regulators of the importance of WiMAX spectrum, its use, and the potential for WiMAX to revolutionise broadband.[7] Competing technologies Within the marketplace, WiMAX's main competition comes from existing widely deployed wireless systems such as UMTS and CDMA2000, as well as a number of Internet oriented systems such as HIPERMAN and WiBro. 3G and 4G Cellular Phone Systems Both of the two major 3G systems, CDMA2000 and UMTS, compete with WiMAX. Both offer DSL-class Internet access in addition to phone service. UMTS has also been enhanced to compete directly with WiMAX in the form of UMTS-TDD, which can use WiMAX oriented spectrum and provides a more consistent, if lower bandwidth at peak, user experience than WiMAX. 3G cellular phone systems usually benefit from already having entrenched infrastructure, being upgrades from earlier systems. Users can usually fall back to older systems when they move out of range of upgraded equipment, often relatively seamlessly. The major cellular standards are being evolved to so-called 4G, high bandwidth, low latency, all-IP networks with voice services built on top. With GSM/UMTS, the move to 4G is the 3GPP Long Term Evolution effort. For AMPS/TIA derived standards such as CDMA2000, a replacement called Ultra Mobile Broadband is under development. In both cases, existing air interfaces are being discarded, in favour of OFDMA for the downlink and a variety of OFDM based solutions for the uplink. These will bring Internet access speeds comparable to, or better than, WiMAX. In some areas of the world the wide availability of UMTS and a general desire for standardization has meant spectrum has not been allocated for WiMAX: in July 2005, the EU-wide frequency allocation for WiMAX was blocked. 52 Comparison of Mobile Internet Access methods Standard Family Primary Use Radio Tech Notes Quoted speeds only achievable at very short ranges, more practically 10 Mbps at 10 km. 70 70 HIPERMAN Mobile Internet OFDM 56.9 56.9 WiBro WiBro 50 50 Mobile range (900 m) iBurst iBurst 802.20 Mobile Internet HC-SDMA 64 64 3-12 km .384 5.76 HSDPA widely deployed. Typical downlink rates today 12Mbps, ~200kbps uplink; future downlink up to 28.8Mbps. 16 Reported speeds according to IPWireless using 16QAM modulation similar to HSDPA+HSUPA >50 Still in development 802.16e HIPERMAN WiMAX Mobile Internet MIMO-SOFDMA Downlink Uplink (Mbps) (Mbps) Mobile Internet OFDMA UMTS WUMTS/3GSM Mobile phone CDMA HSDPA+HSUPA CDMA/FDD UMTS-TDD UMTS/3GSM Mobile Internet CDMA/TDD LTE UMTS UMTS/4GSM General 4G .384 14.4 16 OFDMA/MIMO/SC>100 FDMA (HSOPA) 53 1xRTT EVDO 1x Rev. 0 EVDO 1x Rev.A EV-DO Rev.B CDMA2000 CDMA2000 Mobile phone CDMA Mobile Internet CDMA/FDD 0.144 2.45 3.1 4.9xN 0.144 Obsoleted by EV-DO 0.15 1.8 1.8xN Rev B note: N is the number of 1.25 MHz chunks of spectrum used. Not yet deployed. Mobile Broadband Wireless Access Mobile Broadband Wireless Access (MBWA) is a technology being developed by IEEE 802.20 and is a aimed at wireless mobile broadband for operations from 120 to 350 km/h. The 802.20 standard has taken on many of the methods behind Mobile WiMAX, including high speed dynamic modulation and similar scalable OFDMA capabilities. It apparently retains fast hand-off, Forward Error Correction (FEC) and cell edge enhancements. The Working Group was temporarily suspended in mid 2006 by the IEE-SA Standards Board since it had been the subject of a number of appeals, and a preliminary investigation of one of these "revealed a lack of transparency, possible 'dominance,' and other irregularities in the Working Group" [8]. In September 2006 the IEE-SA Standards Board approved a plan to enable the working group to continue under new conditions, and the standard is now expected to be finalized in Q4 2007. Internet Oriented Systems Early WirelessMAN standards, the European standard HIPERMAN and Korean standard WiBro have been harmonized as part of WiMAX and are no longer seen as competition but as complementary. All networks now being deployed in South Korea, the home of the Wibro standard, are now WiMAX. As a short-range mobile internet solution, such as in cafes and at transportation hubs like airports, the popular WiFi 802.11b/g system is widely deployed, and provides enough coverage for some users to feel subscription to a WiMAX service is unnecessary. The following table should be treated with caution as it only shows peak rates which are potentially very misleading. Comparison Main article: Comparison of wireless data standards 54 v•d•e Notes: All speeds are theoretical maximums and will vary by a number of factors, including the use of external antennae, distance from the tower and the ground speed (i.e. communications on a train may be poorer than when standing still.) Usually the bandwidth is shared between several terminals. The performance of each technology is determined by a number of constraints, including the spectral efficiency of the technology, the cell sizes used, and the amount of spectrum available. For more information, see Comparison of wireless data standards. Future Development Mobile WiMAX based upon 802.16e-2005 has been proposed as IP-OFDMA for inclusion as the sixth wireless link system under IMT-2000. If accepted in September 2007 ITU session, which looks likely, this stands to hasten acceptance by regulatory authorities for use in cellular spectrum. WiMAX II, 802.16m will be proposed for IMTAdvanced 4G. The goal for the long term evolution of both WiMAX and LTE is to achieve 100 Mbit/s mobile and 1 Gbit/s fixed-nomadic bandwidth as set by ITU for 4G NGMN (Next Generation Mobile Network) systems through the adaptive use of MIMO-AAS and smart, granular network topologies. 3GPP LTE and WiMAX-m are concentrating much effort on MIMO-AAS, mobile multi-hop relay networking and related developments needed to deliver 10X and higher Co-Channel reuse multiples. Since the evolution of core air-link technologies has approached the practical limits imposed by Shannon's Theorem, the evolution of wireless has embarked on pursuit of the 3X to 10X+ greater bandwidth and network efficiency gains that are expected by advances in the spatial and smart wireless broadband networking technologies. What will clearly define 4G more than either WCDMA or OFDMA wireless link methods will be wireless networks that more effectively adapt to and take advantage of available spectrum. Current Deployments Main article: List of Deployed WiMAX networks (Country by Country List) The WiMAX Forum now lists over 250 WiMAX trials and deployments. Current and planned deployments and the bands in which they operate and the standards they use are listed in above article. On May 1, 2007, FCC Approves First WIMAX-class Laptop Card. [9] 55 IEEE 802.16 From Wikipedia, the free encyclopedia Jump to: navigation, search The IEEE 802.16 Working Group on Broadband Wireless Access Standards, which was established by IEEE Standards Board in 1999, aims to prepare formal specifications for the global deployment of broadband Wireless Metropolitan Area Networks. The Workgroup is a unit of the IEEE 802 LAN/MAN Standards Committee. A related future technology Mobile Broadband Wireless Access (MBWA) is under development in IEEE 802.20. Although the 802.16 family of standards is officially called WirelessMAN, it has been dubbed “WiMAX” (from "Worldwide Interoperability for Microwave Access") by an industry group called the The WiMAX Forum. The mission of the Forum is to promote and certify compatibility and interoperability of broadband wireless products. 802.16 standards The first 802.16 standard was approved in December 2001. It delivered a standard for point to multipoint Broadband Wireless transmission in the 10-66 GHz band, with only a Line of Sight (LOS) capability. It uses a single carrier (SC) physical (PHY) standard. 802.16a was an amendment to 802.16 and delivered a point to multipoint capability in the 2-11 GHz band. For this to be of use, it also required a non line of sight (NLOS) capability, and the PHY standard was therefore extended to include Orthogonal Frequency Division Multiplex (OFDM) and Orthogonal Frequency Division Multiple Access (OFDMA). 802.16a was ratified in January 2003 and was intended to provide "last mile" fixed broadband access. 802.16c, a further amendment to 802.16, delivered a system profile for the 10-66 GHz 802.16 standard. In September 2003, a revision project called 802.16d commenced aiming to align the standard with aspects of the European Telecommunications Standards Institute (ETSI) HIPERMAN standard as well as lay down conformance and test specifications. This project concluded in 2004 with the release of 802.16-2004 and the withdrawal of the earlier 802.16 documents, including the a/b/c amendments. An amendment to 802.16-2004, IEEE 802.16e-2005 (formerly known as IEEE 802.16e), addressing mobility, was concluded in 2005. This implemented a number of enhancements to 802.16-2004, including better support for Quality of Service and the use of Scalable OFDMA, and is sometimes called “Mobile WiMAX”, after the WiMAX forum for interoperability. 56 Amendments in progress Active amendments: 802.16f – Management Information Base Amendments under development: 802.16g - Management Plane Procedures and Services Amendments at pre-draft stage: 802.16h - Improved Coexistence Mechanisms for License-Exempt Operation 802.16i - Mobile Management Information Base 802.16j - Multihop Relay Specification 802.16k - Bridging of 802.16 802.16 m - Advanced Air Interface. Data rates of 100 Mbit/s for mobile applications and 1 Gbit/s for fixed applications, cellular, macro and micro cell coverage, with currently no restrictions on the RF bandwidth (which is expected to be 20 MHz or higher). [1]. The proposed work plan would allow completion of the standard by Sept 2008 for approval by Dec 2008. 802.16e-2005 Technology The 802.16 standard essentially standardizes 2 aspects of the air interface - the physical layer (PHY) and the Media Access Control layer (MAC). This section provides an overview of the technology employed in these 2 layers in the current version of the 802.16 specification (which is strictly 802.16-2004 as amended by 802.16e-2005, but which will be referred to as 802.16e for brevity). PHY 802.16e uses Scalable OFDMA to carry data, supporting channel bandwidths of between 1.25 MHz and 20 MHz, with up to 2048 sub-carriers. It supports adaptive modulation and coding, so that in conditions of good signal, a highly efficient 64 QAM coding scheme is used, whereas where the signal is poorer, a more robust BPSK coding mechanism is used. In intermediate conditions, 16 QAM and QPSK can also be employed. Other PHY features include support for Multiple-in Multiple-out (MIMO) antennas in order to provide good NLOS characteristics (or higher bandwidth) and Hybrid automatic repeat request (HARQ) for good error correction performance. MAC The 802.16 MAC describes a number of Convergence Sublayers which describe how wireline technologies such as Ethernet, ATM and IP are encapsulated on the air interface, and how data is classified, etc. It also describes how secure communications are delivered, by using secure key exchange during authentication, and encryption using AES or DES as the encryption mechanism) during data transfer. Further features of the MAC 57 layer include power saving mechanisms (using Sleep Mode and Idle Mode) and handover mechanisms. A key feature of 802.16 is that it is a connection oriented technology. The subscriber station (SS) cannot transmit data until it has been allocated a channel by the Base Station (BS). This allows 802.16e to provide strong support for Quality of Service (QoS). QoS QoS in 802.16e is supported by allocating each connection between the SS and the BS (called a service flow in 802.16 terminology) to a specific QoS class. In 802.16e, there are 5 QoS classes: 802.16e-2005 QoS classes Service Abbrev Definition Typical Applications Unsolicited Grant UGS Service Real-time data streams comprising fixed-size data packets issued at periodic intervals T1/E1 transport Extended Realtime Polling Service Real-time service flows that generate variable-sized data packets on a periodic basis VoIP Real-time Polling rtPS Service Real-time data streams comprising variable-sized data packets that are issued at periodic intervals MPEG Video Non-real-time Polling Service nrtPS Delay-tolerant data streams FTP with guaranteed comprising variable-sized data packets minimum for which minimum data rate is throughput required BE Data streams for which no minimum service level is required and therefore may be handled on a space-available basis Best Effort ertPS HTTP The BS and the SS use a service flow with an appropriate QoS class (plus other parameters, such as bandwidth and delay) to ensure that application data receives QoS treatment appropriate to the application. Certification Because the IEEE only sets specifications but does not test equipment for compliance with them, the WiMAX Forum runs a certification program wherein members pay for certification. WiMAX certification by this group is intended to guarantee compliance 58 with the standard and interoperability with equipment from other manufacturers. The mission of the Forum is to promote and certify compatibility and interoperability of broadband wireless products. 59 Mesh networking From Wikipedia, the free encyclopedia Image showing mesh network layout Mesh networking is a way to route data, voice and instructions between nodes. It allows for continuous connections and reconfiguration around broken or blocked paths by “hopping” from node to node until the destination is reached. A mesh network whose nodes are all connected to each other is a fully connected network. Mesh networks differ from other networks in that the component parts can all connect to each other via multiple hops, and they generally are not mobile. Mesh networks can be seen as one type of ad hoc network. Mobile ad-hoc networking (MANet), and mesh networking are therefore closely related, but mobile ad hoc networks also has to deal with the problems introduced by the mobility of the nodes. Mesh networks are self-healing: the network can still operate even when a node breaks down or a connection goes bad. As a result, a very reliable network is formed. This concept is applicable to wireless networks, wired networks, and software interaction. Examples A MIT project is developing the XO-1 laptop or "Children's Machine" which is intended for under-privileged schools in developing nations and plans to use mesh networking to create a robust and inexpensive infrastructure. The instantaneous connections made by the laptops are claimed by the project to reduce the need for an external infrastructure such as the internet to reach all areas, because a connected node could share the connection with nodes nearby. A similar concept has also been implemented by Greenpacket by its application called SONbuddy. In Cambridge, UK, on the 3rd June 2006, mesh networking was used at the “Strawberry Fair” to run mobile live television, radio and internet services to an estimated 80,000 people. The Champaign-Urbana Community Wireless Network (CUWiN) project is developing mesh networking software based on open source implementations of the Hazy-Sighted Link State Routing Protocol and Expected Transmission Count metric. 60 Cognitive radio From Wikipedia, the free encyclopedia Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently without interfering with licensed users. This alteration of parameters is based on the active monitoring of several factors in the external and internal radio environment, such as radio frequency spectrum, user behaviour and network state. History The idea of cognitive radio was first presented officially in an article by Joseph Mitola III and Gerald Q. Maguire, Jr. [1]. It was a novel approach in wireless communications that Mitola later described as: The point in which wireless personal digital assistants (PDAs) and the related networks are sufficiently computationally intelligent about radio resources and related computer-to-computer communications to detect user communications needs as a function of use context, and to provide radio resources and wireless services most appropriate to those needs.[2] It was thought of as an ideal goal towards which a software-defined radio platform should evolve: a fully reconfigurable wireless black-box that automatically changes its communication variables in response to network and user demands. Regulatory bodies in various countries (including the Federal Communications Commission in the United States) found that most of the Radio frequency spectrum was inefficiently utilized [3]. For example, cellular network bands are overloaded in most parts of the world, but amateur radio and paging frequencies are not. Independent studies performed in some countries confirmed that observation [4], [5] and concluded that spectrum utilization depends strongly on time and place. Moreover, fixed spectrum allocation prevents rarely used frequencies (those assigned to specific services) from being used by unlicensed users, even when their transmissions would not interfere at all with the assigned service. This was the reason for allowing unlicensed users to utilize licensed bands whenever it would not cause any interference (by avoiding them whenever legitimate user presence is sensed). This paradigm for wireless communication is known as Cognitive Radio. Terminology Depending on the set of parameters taken into account in deciding on transmission and reception changes, and for historical reasons, we can distinguish certain types of cognitive radio. The main two are: Full Cognitive Radio ("Mitola radio"): in which every possible parameter observable by a wireless node or network is taken into account. Spectrum Sensing Cognitive Radio: in which only the radio frequency spectrum is considered. 61 Also, depending on the parts of the spectrum available for cognitive radio, we can distinguish: Licensed Band Cognitive Radio: in which cognitive radio is capable of using bands assigned to licensed users, apart from unlicensed bands, such as UNII band or ISM band. One such system is described in the IEEE 802.15 Task group 2 [6] specification. Unlicensed Band Cognitive Radio: which can only utilize unlicensed parts of radio frequency spectrum. An example of Unlicensed Band Cognitive Radio is IEEE 802.19 [7]. Technology Although cognitive radio was initially thought of as a software-defined radio extension (Full Cognitive Radio), most of the research work is currently focusing on Spectrum Sensing Cognitive Radio, particularly in the TV bands. The essential problem of Spectrum Sensing Cognitive Radio is in designing high quality spectrum sensing devices and algorithms for exchanging spectrum sensing data between nodes. It has been shown [8] that a simple energy detector cannot guarantee the accurate detection of signal presence, calling for more sophisticated spectrum sensing techniques and requiring information about spectrum sensing to be exchanged between nodes regularly. Increasing the number of cooperating sensing nodes decreases the probability of false detection [9]. Filling free radio frequency bands adaptively (OFDM) seems to be the ideal approach. In fact, Timo A. Weiss and Friedrich K. Jondral of the University of Karlsruhe proposed a Spectrum Pooling system [10] in which free bands sensed by nodes were immediately filled by OFDM subbands. Applications of Spectrum Sensing Cognitive Radio include emergency networks and WLAN higher throughput and transmission distance extensions. The main functions of Cognitive Radios are [11]: Spectrum Sensing: detecting the unused spectrum and sharing it without harmful interference with other users, it is an important requirement of the Cognitive radio network to sense spectrum holes, detecting primary users is the most efficient way to detect spectrum holes. Spectrum sensing techniques can be classified into three categories: o Transmitter detection: cognitive radios must have the capability to determine if a signal from a primary transmitter is locally present in a certain spectrum, there are several approaches proposed: matched filter detection energy detection cyclostationary feature detection o Cooperative detection: refers to spectrum sensing methods where information from multiple Cognitive radio users are incorporated for primary user detection. o Interference based detection. 62 Spectrum Management: Capturing the best available spectrum to meet user communication requirements. Cognitive radios should decide on the best spectrum band to meet the Quality of service requirements over all available spectrum bands, therefore spectrum management functions are required for Cognitive radios, these management functions can be classified as: o spectrum analysis o spectrum decision Spectrum Mobility: is defined as the process when a cognitive radio user exchanges its frequency of operation. Cognitive radio networks target to use the spectrum in a dynamic manner by allowing the radio terminals to operate in the best available frequency band, maintaining seamless communication requirements during the transition to better spectrum Spectrum Sharing: providing the fair spectrum scheduling method, one of the major challenges in open spectrum usage is the spectrum sharing. It can be regarded to be similar to generic media access control MAC problems in existing systems 63 IEEE 802.20 From Wikipedia, the free encyclopedia IEEE 802.20 (IEEE802.20) or Mobile Broadband Wireless Access (MBWA) Working Group, the establishment of which was approved by IEEE Standards Board on December 11, 2002, aims to prepare a formal specification for a packet-based air interface designed for IP-based services. It is hoped that such an interface will allow the creation of low-cost, always-on, and truly mobile broadband wireless networks, nicknamed as Mobile-Fi. IEEE 802.20 will be specified according to a layered architecture, which is consistent with other IEEE 802 specifications. The scope of the working group consists of the physical (PHY), medium access control (MAC), and logical link control (LLC) layers. The air interface will operate in bands below 3.5 GHz and with a peak data rate of over 1 Mbit/s. The goals of 802.20 and 802.16e, the so-called "mobile WiMAX", are similar. A draft 802.20 specification was balloted and approved on January 18th, 2006. The baseline specifications that have been proposed for this specification aim considerably higher than those available on our current mobile architecture. The draft standard's proposed benefits: IP roaming & handoff (at more than 1 Mbit/s) New MAC and PHY with IP and adaptive antennas Optimized for full mobility up to vehicular speeds of 250 km/h Operates in Licensed Bands (below 3.5 GHz) Utilizes Packet Architecture Low Latency On 8 June 2006, the IEEE-SA Standards Board directed that all activities of the 802.20 Working Group be temporarily suspended. This suspension is effective immediately and will continue in effect until 1 October 2006. [1] [2] On 15 September 2006, the IEE-SA Standards Board approved a plan to enable the IEEE 802.20 Working Group to move forward with its work to develop a mobile broadband wireless access standard and provide the best opportunity for its completion and approval. [3] 64 IEEE 802.22 From Wikipedia, the free encyclopedia IEEE 802.22 is a new working group of IEEE 802 LAN/MAN standards committee which aims at constructing Wireless Regional Area Network utilizing white spaces (channels that are not used in the frequency band) in the already allocated TV frequency spectrum. The use of the spectrum will be used in an opportunistic way in order not interfere with any TV channel that is transmitting. Technology The IEEE 802.22 working group on Wireless Regional Area Networks (WRAN) is the youngest group of the IEEE 802 LAN/MAN standards committee. Its project, formally called as Standard for Wireless Regional Area Networks (WRAN) - Specific requirements - Part 22: Cognitive Wireless RAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Policies and procedures for operation in the TV Bands focuses on constructing a consistent, national fixed point-to-multipoint WRAN that will utilize UHF/VHF TV bands between 54 and 862 MHz. Specific TV channels as well as the guard bands of these channels are planned to be used for communication in IEEE 802.22. Because the IEEE 802.22 working group was formed in 2004, nothing has yet been specified regarding the particular functionalities of PHY/MAC layer. However the IEEE, together with the FCC, is pursuing a centralized approach for available spectrum discovery. Specifically each Access Point (AP) would be armed with a GPS receiver which would allow its position to be reported. This information would be sent back to centralized servers (in the USA these would be managed by the FCC), which would respond with the information about available free TV channels and guard bands in the area of the AP. Other proposals would allow local spectrum sensing only, where the AP would decide by itself which channels are available for communication. A combination of these two approaches is also envisioned. Overview of the WRAN Topology 802.22 specifies that the network should operate in a point to multipoint basis (P2MP). The system will be formed by base stations (BS) and customer premise equipments (CPE, above mentioned as Access Points, AP's). The CPE's will be attached to a BS via a wireless link in the frequencies mentioned above. The BS's will control the medium access for all the CPE's attached to it. One key feature of the WRAN Base Stations is that they will be capable of performing a distributed sensing. This is that the CPE's will be sensing the spectrum and will be sending periodically reports to the BS informing it about what they sense. The BS, with the information gathered, will evaluate if it is necessary a change in the utilized channel, or on the contrary, stay transmitting and receiving in the same one. 65 An approach to the PHY layer The goal of this layer is to provide an excellent performance while keeping a simple complexity. The PHY layer must be able to adapt to the different conditions and also needs to be flexible for jumping from channel to channel without errors in transmission or losing clients (CPE's). This flexibility is also required for being able to dynamically adjust the bandwidth, modulation and coding schemes. OFDMA will be the modulation scheme for transmission in up and downlinks. With OFDMA it will be possible to achieve this fast adaptation needed for the BS's and CPE's. By using just one TV channel (a TV channel has a bandwidth of 6 MHz, in some countries they can be of 7 or 8 MHz) the approximate maximum bit rate is 19 Mbps at a 30 km distance. The speed and distance achieved is not enough to fulfil the requirements of the standard. The feature Channel Bonding deals with this problem. Channel Bonding consists in utilizing more than one channel for Tx / Rx. This allows the system to have a bigger bandwidth which will be reflected in a better system performance. An approach to the MAC layer This layer will be based in Cognitive Radio Technology. It needs to be also able to adapt dynamically to changes in the environment by sensing the spectrum. The MAC layer will consist of two structures: Frame and Superframe. A superframe will be formed by many frames. The superframe will have a SCH (Superframe Control Header) and a preamble. These will be sent by the BS in every channel that it's possible to transmit and not cause interference. When a CPE is turned on, it will sense the spectrum, find out which channels are available and will receive all the needed information to attach to the BS. Two different types of spectrum measurement will be done by the CPE: in-band and outof-band. The in-band measurement consists in sensing the actual channel that is being used by the BS and CPE. The out-of-band measurement will consist in sensing the rest of the channels. The MAC layer will perform two different types of sensing in either inband or out-of-band measurements: fast sensing and fine sensing. Fast sensing will consist in sensing at speeds of under 1ms per channel. This sensing is performed by the CPE and the BS and the BS's will gather all the information and will decide if there is something new to be done. The fine sensing takes more time (aprox. 25 ms per channel or more) and it is utilized based on the outcome of the previous fast sensing mechanism. These sensing mechanisms are primarily used to identify is there is an incumbent transmitting, and if there is to avoid interfering with it. 66 IEEE 802 From Wikipedia, the free encyclopedia Jump to: navigation, search IEEE 802 refers to a family of IEEE standards dealing with local area networks and metropolitan area networks. More specifically, the IEEE 802 standards are restricted to networks carrying variable-size packets. (By contrast, in cell-based networks data is transmitted in short, uniformly sized units called cells. Isochronous networks, where data is transmitted as a steady stream of octets, or groups of octets, at regular time intervals, are also out of the scope of this standard.) The number 802 was simply the next free number IEEE could assign, though "802" is sometimes associated with the date the first meeting was held - February 1980. The services and protocols specified in IEEE 802 map to the lower two layers (Data Link and Physical) of the seven-layer OSI networking reference model. In fact, IEEE 802 splits the OSI Data Link Layer into two sub-layers named Logical Link Control (LLC) and Media Access Control, so that the layers can be listed like this: Data link layer o LLC Sublayer o MAC Sublayer Physical layer The IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC). The most widely used standards are for the Ethernet family, Token Ring, Wireless LAN, Bridging and Virtual Bridged LANs. An individual Working Group provides the focus for each area. See its working groups: IEEE 802.1 Higher layer LAN protocols IEEE 802.2 Logical link control IEEE 802.3 Ethernet IEEE 802.4 Token bus (disbanded) IEEE 802.5 Token Ring IEEE 802.6 Metropolitan Area Networks (disbanded) IEEE 802.7 Broadband LAN using Coaxial Cable (disbanded) IEEE 802.8 Fiber Optic TAG (disbanded) IEEE 802.9 Integrated Services LAN (disbanded) IEEE 802.10 Interoperable LAN Security (disbanded) IEEE 802.11 Wireless LAN (Wi-Fi certification) IEEE 802.12 demand priority IEEE 802.13 (not used) IEEE 802.14 Cable modems (disbanded) IEEE 802.15 Wireless PAN o IEEE 802.15.1 (Bluetooth certification) o IEEE 802.15.4 (ZigBee certification) 67 IEEE 802.16 Broadband Wireless Access (WiMAX certification) o IEEE 802.16e (Mobile) Broadband Wireless Access IEEE 802.17 Resilient packet ring IEEE 802.18 Radio Regulatory TAG IEEE 802.19 Coexistence TAG IEEE 802.20 Mobile Broadband Wireless Access IEEE 802.21 Media Independent Handoff IEEE 802.22 Wireless Regional Area Network 68