Professional Documents
Culture Documents
Technical Journal
An Independent Analysis of Current
Ron Menendez, PhD, and David Waring 55 Technology Options for Optical Access Networks
www.bechteltelecoms.com
(Telcordia Technologies) Offering Increased Bandwidth (Invited Paper)
Esmael Dinan, PhD, and 83 High-Speed Packet Access Technologies for UMTS Networks
Thrasivoulos (Sakis) Griparis
Construction and Cairo London (Hammersmith Rd.) Rio de Janeiro Warrington, England
Equipment Installation Tel: (20-2) 754-6763 Tel: (44-208) 846-5111 Tel: (55-21) 2579-2370 Tel: (44-208) 846-4000
Fax: (20-2) 754-6804 Fax: (44-208) 846-6940 Fax: (55-21) 2579-2413 Fax: (44-208) 846-5469
Integration and
Optimization Calgary (Bantrel) London (Pilgrim St.) Riyadh Washington, D.C.
Tel: (1-403) 290-5000 Tel: (44-207) 651-7777 Tel: (966-1) 277-1884 Tel: (1-202) 828-5200
Fax: (1-403) 290-5050 Fax: (44-207) 651-7972 Fax: (966-1) 278-0607 Fax: (1-202) 785-2645
Although reasonable efforts have been made to check the papers included in the BTTJ, this publication should not
be interpreted as a representation or warranty by Bechtel Corporation of the accuracy of the information contained
in any paper, and readers should not rely on any paper for any particular application of any technology without
professional consultation as to the circumstances of that application. Similarly, the authors and Bechtel Corporation
T ELECOMMUNICATIONS disclaim any intent to endorse or disparage any particular vendors of any technology.
T
he Bechtel Telecommunications Technical Journal provides a forum for addressing current
technology issues of concern to the communications industry—particularly issues affecting
operational and network performance. Bechtel Telecommunications is vendor-neutral and
technology agnostic, allowing us to provide an unbiased perspective of the technologies under
evaluation. This issue of the BTTJ addresses a broad spectrum of technologies ranging from
nanotechnology (as applied to communications networks) to ultra wideband (UWB) to mobile IPTV.
We are exceptionally pleased to have Dr. Ron Menendez and Mr. David Waring of Telcordia®
Technologies provide their expert opinion on “Technology Options for Optical Access Networks
Offering Increased Bandwidth.” Ron is a senior scientist on the technical staff of Telcordia’s
Broadband Networking Research department, and Dave is chief scientist and managing director of
Telcordia’s Applied Research organization. A special thanks to Dr. Adam Drobot, President and CTO
of Telcordia’s Advanced Technology Solutions, for coordinating this effort.
Bechtel Telecommunications provides continuous laboratory and field analysis for new and
promising technologies via our Bechtel Telecommunications Laboratories. We are very pleased to
announce that the BTL will host the 5th WiMAX Forum™ 802.16x Global Interoperability Plugfest at
its facilities in Frederick, Maryland, in September 2006. This represents the first time the plugfest will
be conducted in North America; previous plugfests were held in Beijing, China; Malaga, Spain; and
Sofia-Antipolis, France. The plugfest provides network equipment vendors a secure and neutral
environment in which to test their latest 802.16x equipment for interoperability with other vendors’
equipment. Deficiencies identified during the analyses can then be addressed and resolved before
formal certification testing. We at Bechtel Telecommunications are honored to have been asked to
sponsor such an important industry event. As a direct result of this event at the BTL, WiMAX Forum
members will be invited to supply papers on various aspects of WiMAX 802.16e development for the
next BTTJ.
In the meantime, it is with great pleasure that we bring you the latest BTTJ. As always,
we encourage and welcome your comments and suggestions for its improvement; simply
access the Bechtel Telecoms Web site at www.bechteltelecoms.com and click on the “Contact Us”
section. Past issues of the BTTJ can be downloaded from our Technology Web site at
www.bechteltelecoms.com/jsp/labs/pubs.jsp.
Wishing you a safe, productive, and enjoyable summer.
Sincerely,
Jake MacLeod
Principal Vice President and Chief Technology Officer
Bechtel Telecommunications
W
elcome to this latest issue of the BTTJ! After a period of telecommunications slowdown, the
industry is buzzing again with many new and exciting activities. Many enabling
technologies such as VoIP, IPv6, SIP, MIMO, EFM, MOBIKE, and nanotechnology are
opening new frontiers and creating new applications and services for customers, operators, and
manufacturers alike.
On the radio access network front, mobile WiMAX is moving full steam ahead, HSPA is gaining
deployment momentum, and the 3GPP™ has started work on long-term evolution (LTE). On the core
network front, the 3GPP IMS is quite stable, with first-generation deployments underway. And with
the onset of the fixed–mobile convergence, the long-awaited vision of global personal communication
systems is finally one step closer to reality!
Mirroring the upswing in activity, this issue examines a wide range of interesting, useful, and timely
topics; among them are IPv6 and mobile IPTV, the cybersecurity of PCS/SCADA networks, HSPA
design challenges, and experimental studies of various 3G signals in nonlinear transmitters.
I encourage you to pay particular attention to this issue’s timely and insightful invited paper by
Dr. Ron Menendez and Mr. David Waring of Telcordia Technologies on “Technology Options
for Optical Access Networks Offering Increased Bandwidth.” This is an important topic because—
even though PONs are finally being deployed and promise bandwidth performance superior
to that of DSL or cable—technologies with even greater bandwidth capacity will be needed in the
not-too-distant future!
I hope you find this new issue of the BTTJ informative and useful. Please share it with your
colleagues, and please share with us your thoughts and ideas for future issues.
Happy reading!
Abstract—The expansion of the information society within and beyond the walls of the office is driving
fundamental shifts in information management, communications, and security. IP convergence and explosive
demands for secure resource access cannot be satisfied by the legacy networks of yesterday. IPv6 offers
significant improvements over the 20-plus-year-old IPv4. However, a phased, multi-year implementation will
be needed to minimize disruption and reap early benefits as products and standards mature. The technology
environment is primed to start transforming enterprise communications for the future, using processes inherent
in well-run organizations. This paper examines five significant change vectors that will influence the timing and
characteristics of an organization’s IPv6 deployment: IPv4 Internet address depletion, IPv6 standards
maturity, IPv6 product maturity, global adoption of IPv6, and IPv6 innovations.
INTRODUCTION BACKGROUND
ueled by a combination of business and P components have continued to evolve since
F technical motivations, and concurrent with
the installation of new products, the transition to
I the early work of Robert E. Kahn and Vinton G.
Cerf in the 1970s [1]. As participants in the
Internet Protocol version 6 (IPv6) will begin Internet Society (ISOC) Interconnectivity and
before 2010 for most large enterprises. The IP Standards Development program, the Internet
evolution is following the patterns of previous Engineering Task Force (IETF) and the Internet
major technology shifts. Organizations have gone Architecture Board (IAB) are responsible for
through other network migrations in the past, developing the architecture of the Internet's
including the transition to Ethernet, transmission technical underpinnings. Through the efforts of
control protocol/IP (TCP/IP), domain name these organizations, broad-based consensus on
service (DNS), local area networks (LANs), and bringing technical change to the Internet is
wireless LANs (WLANs). Early adopters of IPv6 achieved [2].
will have the opportunity to lay a foundation for
The IETF is responsible for many standards,
a smooth transition and gain a competitive edge.
including IP standards. Over 10 years ago, IPv6
A solid vision and strategy are required to guide
an enterprise through the multi-year transition.
IPv6 migration is not just about the network.
Devices, applications, and services also have
an integrated function in the enterprise
environment. Organizations’ architectures,
planning, and deployments will be more
successful when the multiple external-facing
change vectors are understood and squarely
addressed. Although some aspects of the new
protocol and its implementation are not fully
mature, several commercial IPv6-enabled
Fred Wettling products are already available, with more on the
fred.wettling@bechtel.com
horizon. Broad, stable, and secure production
deployment of these first IPv6 building blocks
can start today with careful planning.
standards began their evolution to address legacy • Simplification through route aggregation,
IP version 4 (IPv4) deficiencies. Anticipating a use of simplified and extensible headers,
long transition and eventual IPv4 address elimination of network address translation
exhaustion, the IETF designed IPv6 standards to (NAT), etc.
serve the interest of ISOC’s international
• Transition from IPv4 to IPv6
membership in maintaining the Internet’s
viability and global scaling. The major • End-to-end interoperability
improvements offered by IPv6 cover several Networks are necessary plumbing that connect
broad areas: people, services, devices, and information.
“Connecting the dots” may involve a
• Global addresses
combination of internal and external constituents.
• Simplified auto-configuration of addresses Enterprises must consider all nodes and services
(“plug-and-play”) connected to the networks as the transition from
• Mobility IPv4 to IPv6 progresses. The transition will be
gradual for most organizations, starting with the
• Security (including authentication and
introduction of IPv6 onto existing IPv4 networks.
privacy)
Over time, a “dual-stack” environment will
• Strategic investments in the economic future The IT industry has emerged as a key driver in
of a country or region the Republic of Korea’s economy, accounting for
almost 30 percent of total exports. The country
• Global competitive positioning has ambitious but realistic national plans to
• IP convergence opportunities increase its trade surplus as well as the per capita
income of its citizens. The posture was clearly
• Development and delivery of new products stated by Minister Daeje Chin: “Today’s winner-
and services take-all society allows only a company or a
country with [the] world’s best technologies
• Government mandates
Abstract—The energetic growth in the demand for data services in a mobile environment requires immediate
attention to fulfill the capacity load. Although operators are still focused on expanding voice services with
satisfactory QoS, an effort to deploy data services to meet market needs is evident. The initial approaches
to providing mobile broadband services have been cdma2000 ® and UMTS. In the meantime, WiMAX
802.16e-2005 is on the verge of providing true mobile broadband service. Thus, wireless operators face a
challenging decision in making a significant and wise technology choice to deploy for voice and data
applications in advanced market segments as the migration from fixed to mobile continues.
In today’s commercially challenging environment, capital investments must be well vindicated. This is already
putting pressure on some networks and may lead to difficulties in sustaining satisfactory levels of service. This
paper assesses WiMAX 802.16e as a complement to or competitor of cdma2000 and UMTS/HSDPA for
mobile/portable broadband data services. The paper describes what each technology’s performance means to
networks capable of efficiently delivering high-speed portable and mobile data services.
application of the fast Fourier transform (FFT) where the QAM data symbol aim is sent on the mth
algorithm to the modulation and demodulation subcarrier of the ith OFDM symbol. The OFDM
process, which involves a technique that symbol index is omitted in the sequel.
assembles the input information into blocks of Figure 2 shows constellation diagrams of data
N complex numbers, one for each subchannel. An transmitted before and after channel estimation,
inverse FFT (IFFT) is performed on each block, taken from an actual measured waveform. This
and the result is transmitted serially. At the constellation shows a frame control header with
receiver, the information is recovered by binary phase-shift keying (BPSK) modulation—
performing an FFT on the received block of signal Downlink Burst 1 with quadrature phase-shift
samples. Figure 1 depicts OFDM modeling. keying (QPSK) modulation and Downlink Burst 2
An OFDM signal is the sum of N independent with 16 QAM. Because of amplitude scaling, the
modulated symbols mapped onto N different BPSK, QPSK, and 16 QAM decision points do not
subchannels with 1/T frequency separation, fall on top of one another.
where T is the OFDM symbol period. The discrete Each preamble, header, and burst is made up of
time-domain samples bi = (bi0 , bi1 ,… biN-1) to be at least one OFDM symbol. OFDM uses adaptive
transmitted are obtained by performing an modulation capable of handling BPSK, QPSK,
N-point IFFT on the complex quadrature 16 QAM, or 64 QAM. Signal conditions and
amplitude modulation (QAM) symbols block bandwidth (BW) requirements determine which
ai = (ai0 , ai1 ,… aiN-1): modulation is selected for individual data bursts.
N –1
The ability of the base transceiver station (BTS) to
Σ a im e j2π m n/N
1 use different modulation formats on each data
bmi = N
m=0
burst is particularly interesting.
• EMS: The enhanced messaging service constitute the PS domain. The 3G RAN consists of
(EMS) performs element management and Node B and a radio network controller (RNC).
operational functions for the WLAN. The common PS core comprises a serving general
• Local feature servers: These servers provide packet radio service (GPRS) support node (SGSN)
CDMA-operator-specific services. and a gateway GPRS support node (GGSN). PS
services are accessed over the radio interface
The access network for 3G (UMTS) packet using shared traffic channels (in the case of GPRS)
switched (PS) services consists of radio access or either dedicated or shared traffic channels,
network (RAN)-unique 3G and a common PS including HSDPA (with UMTS). IMS uses the PS
core network. Together, the RAN and the PS core domain to transport multimedia signaling and
downloading a feature-length movie on their 3G-based technology such as HSDPA. Within the
handheld for viewing at a later time. next few years, as WiMAX “e” becomes available,
it will be essential for WiMAX to add to and
While full-fledged mobile wireless broadband
complement 3G in rural areas as well. The
applications like these are not expected to be
primary difference is that in areas where 3G
readily available until 2007, fixed WiMAX
technology has struggled—such as benchmark
innovations will be aggressively deployed over
services and applications, backhaul, and
the next several months to complement existing
convergence—WiMAX can provide the necessary
technologies, such as 2G and 3G cellular systems,
support to help augment 3G so that it can
circuit voice, and higher-tier mobile broadband
overcome those challenges. This scenario will
access services. The most common deployments
provide mobile high-speed data service,
will allow universal mobility, with voice and
including technology permutations to convert
simple data carried on cellular spectrum and
from a 3G network to a WiMAX 802.16e network
advanced high-speed data on WiMAX. In big
seamlessly. The proposal here is to allow
cities, WiMAX spectrum will be coverage-
operators to choose from a blend of these
oriented, much like hot zones.
technologies to design high-speed data service
Regardless of how it is adopted and what according to demographic demand and to offer it
applications first take hold, WiMAX, as an at an affordable cost to consumers.
IP-based technology, will provide more than just
By summer 2006, some vendors are expected to
a strong platform for convergence—it will
announce that they have been chosen to expand
provide the pathway for success by giving people
core network capabilities with new capabilities
what they want, when they want it, and where
designed to bridge the operator’s commercial
they want it.
UMTS wireless network with Wi-Fi networks
Since it is expected that 3G networks will be to provide seamless communications for
deployed in developed countries before WiMAX subscribers. The next step with today’s available
802.16e variant market availability, mobile technology will be for the UE to carry several
operators’ first choice for evolution to full technologies, including mobile WiMAX, to enable
mobility broadband services will likely be a a seamless inter-technology handoff.
cdma2000/1xEV-DO 400, WCDMA/UMTS 1800, 1900, <11 GHz (<6 GHz Practical)
Spectrum 800, 1700, 1800, 1900, and 2100 MHz Licensed (and Unlicensed)
and 2100 MHz
Table 2 compares the parameters of the three roaming support among these technologies is the
technologies—EV-DO, HSDPA, and WiMAX key to WiMAX becoming successful and, as a
802.16e—being implemented to provide result, complementing other technologies.
mobile/portable broadband services.
TRADEMARKS
CONCLUSIONS cdma2000 is a registered trademark of the
iMAX, 1xEV-DO, and HSDPA systems Telecommunications Industry Association (TIA-
W each have benefits and drawbacks. Each
technology provides innovative techniques to
USA).
efficiency and fixed FDD channel BWs. • T. Ojanpera and R. Prasad, “An Overview of Air
Interface Multiple Access for IMT 2000/UMTS,”
Mobile WiMAX offers greater QoS and gives IEEE Communications Magazine, September 1998.
operators an alternative for implementing • Motorola Seamless Mobility Connectivity
service level agreements to meet diverse Architecture, Motorola white paper.
consumer requirements. • Mobile WiMAX – Part I: A Technical Overview
and Performance Evaluation, WiMAX Forum,
Mobile WiMAX is truly capable of providing February 2006.
cable-like services with high data rates at low • CDMA2000 High Rate Packet Data Air Interface
cost. Furthermore, with end-to-end architecture, Specification, 3rd Generation Partnership Project 2
WiMAX supports VoIP, which diminishes the “3GPP2,” March 2004.
deployment cost for circuit switching. It can, • 3GPP TS 25.308, “High Speed Downlink Packet
Access (HSDPA) Overall Description,”
therefore, be concluded that, depending on September 2004.
the environment and the demand, each
• E. Dinan, A. Kurochkin, and S. Kettani, “UMTS
technology could compete to provide adequate Radio Interface System Planning and Optimization,”
services to meet consumer needs in a timely and Bechtel Telecommunications Technical Journal,
cost-effective manner. The ability to provide December 2002.
Abstract—DVB-H is the adaptation of DVB-T technology for use by handheld, battery-powered receivers. This
paper provides an overview of the functionalities that DVB-H technology must support and the enhancements
that allow it to meet these requirements. The paper also discusses the advantages of using an SFN rather than
an MFN when implementing DVB-H services.
SFN NETWORKS
VB-H is based on coded OFDM (COFDM).
D Since it has greater resistance to multipath
propagation, COFDM offers a better network by
increasing the number of channels with the
same frequency (this is called an SFN). One Figure 2. Conceptual Use of a DVB-H System (Sharing a MUX with MPEG-2 Services)
advantage of an SFN over
a multifrequency network
(MFN) is that the SFN
allows the same frequency
to be reused. This advantage
is made use of by
DVB-H, which operates by
having several cell sites
simultaneously transmit a
co-channel frequency.
When transmitting in an
SFN, each cell site must [7]: Figure 3. Delivering Audio and Video to a Receiver
Table 1. Sample Parameters for 2K, 4K, and 8K Modes on 16 QAM ½ (5 MHz) Modulation
Cyclic Prefix Time (µs) 89.636 44.818 179.272 89.636 358.543 179.272
Subcarrier Symbol Rate (symbol/s) 2,231.250 2,479.167 1,115.625 1,239.583 557.812 619.792
Delay Spread Tolerance (µs) 89.636 44.818 179.272 89.636 358.543 179.272
SFN Correlation Distance (mi) 16.71 8.35 33.42 16.71 66.84 33.42
Max Data Rate (Mbps) 4.664 5.182 6.218 6.909 6.218 6.909
As shown in Figure 2, DVB-H offers three For the 2K and 4K modes, the in-depth
transmission modes: 2K, 4K, and 8K. These interleavers increase the flexibility of symbol
modes give network operators the opportunity to interleaving by decoupling the choice of the inner
choose and design the SFN to different interleaver from the transmission mode used.
The 4K mode
advantages levels: This flexibility allows a 2K or 4K signal to benefit
is a tradeoff from the memory of an 8K symbol interleaver to
between coverage • 2K Mode: This mode is suitable for sites effectively quadruple (for 2K) or double (for 4K)
with a small cell radius. The 2K mode has a the symbol interleaver’s depth, which improves
and speed, limited transmitter distance, with a tolerance reception in fading channels. This also provides
compared with for self-interference of only up to 16.7 miles an extra level of protection against short noise
the 2K and at the ¼ guard interval. The 2K mode also impulses caused by, for example, vehicle
8K modes. has Doppler tolerance, which allows ignitions and various electrical appliances.
extremely high-speed reception. These
characteristics make the 2K mode Although 4K mode and in-depth interleavers
particularly suitable for use with DVB-H affect the physical layer, their implementation
when mobile reception is needed at does not imply a large increase in the number of
extremely high speeds (e.g., on high-speed either transmitters or receivers. A typical mobile
interstate highways and trains). demodulator already incorporates enough
random access memory (RAM) and logic to
• 4K Mode: This mode is suitable for sites
manage 8K signals, which exceed that required
with small and medium cell radiuses. The
for 4K operation.
self-interference limit increases to 33.42 miles
at the ¼ guard interval. The 4K mode also Multiple cell sites can take advantage of the SFN
has Doppler tolerance, again allowing very design to create natural positive echoes. This
high-speed reception. These characteristics allows the network to improve quality of service
provide the 4K mode with good potential for by creating SFN gain. At any given location, the
use with DVB-H in most scenarios where amount of gain achieved is a function of the
moving reception is a factor (e.g., on streets number of sites contributing to the signals.
and highways).
REFERENCES
[1] ETSI EN 302 304: “Digital Video Broadcasting
(DVB); Transmission System for Handheld
Terminals.” (DVB-H)
[2] ETSI EN 300 744: “Digital Video Broadcasting
(DVB); Framing Structure, Channel Coding and
Modulation for Digital Terrestrial Television.”
(DVB-T)
[3] ETSI EN 300 468: “Digital Video Broadcasting
(DVB); Specification for Service Information (SI) Figure 6. SFN Coverage
in DVB Systems.” (DVB-SI)
[4] ETSI EN 301 192: “Digital Video Broadcasting
(DVB); DVB Specification for Data Broadcasting.”
(DVB-DATA)
[5] ETSI TS 101 191: “Digital Video Broadcasting
(DVB); DVB Mega-frame for Single Frequency
Network (SFN) Synchronization.”
[6] ISO/IEC 7498-1: “Information Technology –
Open Systems Interconnection – Basic Reference
Model: The Basic Model.”
[7] Gerard Faria TeamCast white paper,
“The Magic of Terrestrial Digital TV,”
(http://www.teamcast.com/).
Abstract—As the number of network-enabled devices in critical infrastructure control systems increases,
vulnerabilities in these systems also tend to increase. The creation of national cybersecurity and protection
strategies, along with work being performed by national laboratories, is an exceptional start to assessing and
addressing critical infrastructure vulnerabilities. With a myriad of threats now identified and a diversity of
control and data acquisition systems in operation, the industry is begging for security to be “baked in” to the
next generation of PCS/SCADA network software and hardware. Suppliers will face a number of challenges in
providing this security, and critical infrastructure owners will continuously be challenged to understand and
mitigate vulnerabilities.
Type of Attack
Description Comments
(see also Figure 2)
1. Spear Phishing Attack A well-crafted e-mail specifically addressing When the user accesses the Web site, an
a profession or subject of interest to the user exploit is launched that obtains control of
to lead the user to an exact copy of a trusted the user’s machine and then calls out to
Web site (e.g., www.IEEE.org). the hacker over the Internet (i.e., this
attack opens the locked door from within).
2. SQL Injection A technique for exploiting Web applications The attacker carefully crafts a query with
(Web Application Exploit) that allows client-supplied SQL queries extra SQL commands that fool the
to access relational database information. application into authenticating the attacker.
3. ARP Poisoning An attack method that sends fake media Packets are redirected to the attacker using
access control (MAC) addresses to a switch ARP poisoning for manipulation.
on an Ethernet LAN and then fools the switch
into routing packets to the wrong machine.
4. MitM Attack An attack method that uses ARP poisoning The attacker first listens to communication
to allow packets from one machine to be between the master database (DB) and
redirected to another user before being the slave DB. The slave DB is not directly
forwarded to their intended destination. controlled; instead, packets are captured
and the protocol is reverse-engineered to
look like valid traffic from the slave DB.
A “root kit” is then sent to the master DB
using SQL injection to obtain control.
5. ARP Poisoning Same as above The same technique is used again to allow
the attacker to get between the human-
machine interface (HMI) and the PLC.
6. MitM Attack Same as above The same technique is re-used along with
ARP poisoning to allow the attacker to get
between the HMI and the PLC.
7. Hacker Controls Plant A screen shot of the HMI that sometimes If the HMI cannot be compromised, the
can be obtained by the attacker. Controlling attacker will require specific knowledge
the plant is easy once the graphical user of proprietary PLC protocols. The attacker
interface (GUI) is revealed. can purchase manuals via the Internet
that provide this information once the
manufacturer is discovered.
level sensors, and pressure relief valves as a sensors and cameras do not count in
last-resort line of defense. Using a silicon providing cyber intrusion detection. Do not
sealant to physically seal unused Ethernet assume that one IDS on a corporate LAN will
and universal serial bus (USB) ports in the catch all intrusions. Allocate sufficient
field is very effective in protecting against budget for extra detection in critical control
local vulnerabilities. system sub-networks. Carefully follow
• Secure the endpoints. Assume that the the National Security Agency’s recommen-
network is hostile. Install secure identity and dations for placing IDS sensors [5],
access management services for nodes and recognizing that proper placement and use
services. of correct types of sensors are critical for
proper detection.
• Add intrusion detection and/or prevention
systems. Add properly configured IDSs • Use “least privileges” firewall policy. Use
and/or IPSs such as Snort®. Note that video a compact set of firewall rules that deny
access to all but specific, essential traffic.
Abstract—FMC is providing a new direction for the future of telecommunications, with a potentially profound
impact on various segments and industries. As the boundaries between various services blur, so do the rules of
engagement of various industries. The impact is more than purely technical. FMC could potentially redefine
the nature of telecommunications, information, and entertainment services and how various types of service
providers compete. This paper looks into FMC drivers; various technical aspects of FMC; and the current
evolutionary steps toward FMC implementation, such as GAN, cellular–WLAN integration, and NGNs.
More specifically, FMC can provide: The security requirements of FMC also pose a
concern. These requirements are currently based
• Benefits for network operators—For operators
on IMS requirements, which may be challenging
that own both fixed and mobile networks,
for FNOs to meet. Security issues are addressed
FMC makes it easier and cheaper to launch Current
in more detail later in this paper.
new services. It provides service continuity legacy networks
for customers, raising their network are basically
performance experience and thus reducing What Does FMC Bring to Pre-Convergence
churn, thereby maintaining or increasing Networks? single-purpose
revenue. FMC also makes it easier to manage Current legacy networks are basically single- networks
services, thereby leading to potential purpose networks that provide silo solutions.
that provide
reduction in OPEX. For operators that have These are also referred to as vertically integrated
networks. Each provides its own services: A fixed silo solutions.
either fixed or mobile networks, FMC builds
new services that leverage on the other network offers fixed services, a mobile network These are also
network, thereby providing service offers mobile services, an entertainment network referred to as
differentiators. This becomes particularly offers entertainment services. A user who wants
vertically integrated
important where there are no longer just to access different services must go back and forth
between these silos to get the complete set. This is networks.
MNOs competing with MNOs or FNOs
competing with FNOs and the focus shifts called the “spaghetti” solution (see Figure 1). In
from delivering connectivity to delivering the FMC approach, applications and services are
cost-effective services. Furthermore, MNOs placed in one layer, there is a service control
can realize a reduction in CAPEX brought layer, and all users, regardless of access
about by a) less spectrum being required as technology, can access the applications or
they employ wireless fidelity (WiFi™) services using the service control layer. The
technology to offload traffic from cellular obvious benefits of this horizontally layered
networks to WLANs and b) fewer cell sites, approach (called the “lasagna” solution) include
repeaters, etc., being needed as, for example, the capacity to provide all services to all
they leverage fixed networks via WLANs. eligible subscribers; the diversity to provide
market/service differentiators for different
• Benefits for equipment vendors—Original operators; the consistency to use standard
equipment manufacturers (OEMs) benefit technologies such as IP, SIP, IMS, etc.; and the
from FMC through developing common ability to reduce the OPEX explosion.
products (reusable software/hardware
components); gaining a larger addressable
market (increased revenue); and producing
better, richer, more cost-effective products.
• Benefits for customers—FMC provides
customers with new services, continuity of
service, personalized services (same
ergonomics, same feel and look), mobility,
simplicity (via a single number independent
of network connectivity and via single
billing), guaranteed QoS, security, and single
customer care interface.
UMA development work was transferred to • Third, there is also an optional additional
3GPP in April 2005 and renamed GAN [1]. application level security mechanism that
may be employed in the packet-switched (PS)
In addition to improving and extending the UMA
domain to secure end-to-end communication
standard, the GAN specification allows any
between the handset and the application
generic IP-based access network to provide
server (AS).
connectivity between the handset and the GAN
controller (GANC), through the Up interface. The
GANC also includes a security gateway (SEGW)
that terminates secure remote access tunnels from
the handset. The SEGW interfaces with the
authentication, authorization, and accounting
(AAA) proxy-server via the Wm interface, and the
AAA proxy-server retrieves the user information
from the home location register (HLR). GAN
(UMA) functional architectural is shown in
Figure 3.
Non-Repudiation The prevention of the ability to deny that an activity on the network occurred
ITU-T Recommendation X.800 [16] provides a ITU-T Recommendation X.805 [17] defines the
systematic way of defining security requirements. security architecture for systems providing
It defines security services in the five major end-to-end communications. This security
categories of authentication, access control, data architecture was created to address the global
confidentiality, data integrity, and non- security challenges of service providers,
repudiation, and it defines five threat models, as enterprises, and consumers and is applicable to
listed in Table 1. wireless and wireline, including optical and
converged networks. The security architecture
Table 1. Threat Models Defined by
logically divides the complex set of end-to-end
ITU-T Recommendation X.800
network-security-related features into separate
Model Definition/Description Attack On
architectural components: security dimensions,
security layers, and security planes as follows:
Destruction of information • Security dimensions—A security dimension is
Destruction Availability
and/or network resources
a set of security measures designed to
Unauthorized tampering address a particular aspect of network
Corruption Integrity
with an asset security. Recommendation X.805 identifies
Theft, removal, or loss eight sets of dimensions that protect
Removal of information and/or Availability against all major security threats. These
other resources eight sets are: access control, authentication,
Unauthorized access to non-repudiation, data confidentiality,
Disclosure Confidentiality
an asset communication security, data integrity,
availability, and privacy.
Unavailability or unusability
Interruption Availability
of the network
Abstract—The marketplace is currently on the cusp of the mass deployment of fiber-based broadband access
directly to individual residences. Optical access networks take a variety of forms that will extend optical fibers
all the way to or near the residence. Architectures known as PONs are likely to play a dominant role in optical
access in the near term. However, broadband services, which ultimately drive the bandwidth requirements for
the access network, are growing steadily and in the coming years may exhaust the capacity of these first-
generation PON deployments. This paper examines several promising next-generation technology options for
optical networks with even greater bandwidth capacity.
(FTTCab). Other broadband access technologies, The range of current interactive residential
such as direct satellite or powerline carrier, services (see Figure 1) includes plain old
are expected to remain niche applications. telephone service (POTS) (in digital format,
Broadband wireless access (with fiber backbone 64 kb/s, originally 50 msec latency for T1) and
networks) remains a potentially disruptive data services, primarily Internet access, which is
entrant into the race to deploy broadband access, used for a variety of services such as Web
but its deployment is minimal at present. access/browsing/e-mail and online gaming.
Until recently, most video services were not
network is illustrated in Figure 2, which shows Thus, the FTTC, FTTCab, FWA, and FSO
some leading options for the physical layout of architectures are active, and there is an active
the plant. These network options can be variety of all-fiber architectures in which fiber
categorized in many ways, including alternatives links the CO equipment to an optical/
that completely or partially extend fibers to the electrical/optical (O/E/O) node, which is
end users and are built on a passive or active followed by a second fiber link to the end user.
infrastructure. On the left of Figure 2, the options A number of municipality-operated networks,
are divided into two sets—all-fiber and fiber- such as Project Utopia1 [2], are based on active,
plus-other-media options. In the all-fiber option, all-fiber networks.
a single-mode fiber extends all the way to the end
Figure 3 compares the upstream and downstream
user’s premises. Examples of the all-fiber option
data capacities of several broadband access
include FTTP and fiber to the business (FTTB).
networks: ADSL/very high data rate DSL
In the fiber-plus-other-media option, the fiber
(VDSL), HFC, two types of PON systems, and
link stops short of the end user’s premises, at
dedicated gigabit Ethernet (GbE) links. For each
an optical/electrical (O/E) node, and other
system, the peak data rates obtainable
broadband technologies span the remaining gap.
(logarithmic vertical axis) and the average or
Examples of these architectures include FTTC,
sustainable data for both upstream and
FTTCab, and hybrid fiber coax (HFC), all of
downstream traffic (logarithmic horizontal axis)
which employ metallic media (unshielded
are plotted. Peak rates are important for bursty
twisted pair and/or coaxial cable) for the final
services, since they are indicative of the
link beyond the O/E node. For the sake of
maximum achievable performance experienced
completeness, fixed wireless access (FWA) and
by an end user. Average rates are more
free space optics (FSO), which use wireless links
representative of the capabilities under heavy
in the radio frequency (RF) and photonic
usage or sustained traffic such as video.
domains, respectively, are also included.
Figure 3. Comparison of Peak and Average Upstream/Downstream Data Capacities of Access Architectures
Figure 4. Higher Capacity TDM/TDMA PON Operating Over Distributive/Power Splitter Network
Optical challenges remain before such WDM- Finally, a WDM-PON with dedicated channels is
PONs can be ready for deployment. In both the largely incompatible with any sort of broadcast
upstream and downstream directions, ONT/OLT video overlay. As with the enhanced TDM-PON,
transmissions must be wavelength-aligned with one might argue that such data delivery
the appropriate WDM channel passband at the capabilities make such an overlay unnecessary.
WDM mux/demux. The difficulty is that the Nevertheless, the absence of this capability makes
WDM mux/demux is situated in the OSP and it more difficult to implement this architecture as
subject to very large temperature variations (and an upgrade to an existing first-generation PON.
therefore wavelength changes) if careful
Several other architectures are being studied,
compensations are not made.
including hybrid WDM-PON and TDM systems,
The wavelength alignment problem is broadcast hybrid WDM-PON plus TDMA
particularly acute for the ONT transmitter, which systems, and extended reach systems that are of
can also be subject to OSP temperature variations interest to some operators. The following
but must align to the channel passbands in the discussion examines advances in component
WDM. Unlike the OLT cards, which must optical technologies that will not only support
generate all of the N wavelengths, the ONTs WDM systems, but lead to the possibility of novel
ideally should generate only one channel new architectures such as optical code division
for upstream transmission. This one channel multiple access (OCDMA)-PON systems.
must be different for each ONT; yet, for inventory
reasons, all ONTs should be identical (no
“colored” ONTs). COMPONENT NEEDS FOR WDM-PONs
he deployment of broadband access
Proposed solutions to the ONT wavelength
alignment problem include using tunable laser T infrastructures is driven by service demand,
but the technologies developed for core and
technology, reusing a downstream channel
arriving at the ONT, or using a broadband metro networks generally are the innovation
(“white light”) source and exploiting the spectral engine for developing future access systems. In
slicing capabilities of the WDM mux. The tunable general, technologies for some access networks
laser option is attractive from a loss perspective are typically developed first for core and metro
AVERAGE BROADCAST
PEAK COMPATIBILITY LIMITING
DATA RATE LATENCY OVERLAY
DATA RATES WITH OSP FACTORS
PER USER POSSIBLE?
OCDMux 0.1–10G Synch 0.1–10G Low Works with Yes Cost of MLLs and
Existing OSP Coders
Splitters
OCDMA 0.1–10G Asynch 0.1–10G
(Slotted?)
BIOGRAPHIES
Ron Menendez is a senior
scientist on the technical staff of
the Broadband Networking
Research department at
Telcordia Technologies. For
much of his tenure at Telcordia,
Bellcore, and Bell Laboratories,
his focus has been on
investigating full-service access
networks, including xDSL
systems, HFC, and FTTC/FTTH systems. In past years,
he has been involved in efforts to define the domains of
applicability of these architectures and has participated
in international standards efforts to define a family
of full-service next-generation fiber-based access
architectures based on PONs. Dr. Menendez has
recently contributed to Telcordia’s optical networking
simulation development and is playing a major role in
the simulation of OCDMA systems and associated
coding studies.
Researchers are using another novel method for NANOTECHNOLOGY AND QUANTUM COMPUTING
nanoscale silicon that increases performance and eyond extensions of current devices and
reduces power: adding another dimension. The
last 40 years of semiconductor development have
B molecular devices are quantum computers,
which use qubits—the spin of individual atoms—
always featured planar, or “flat,” transistors with to represent information. Two properties
two-dimensional features. A new technique of quantum mechanics, superposition and
implements a three-dimensional “tri-gate” entanglement, generally referred to as “spooky”
transistor designed to overcome leakage current by the scientific population, make the use of
issues that plague devices with features less than qubits unique and potentially very powerful for
30 nm wide. The tri-gate device inherently computing applications.
provides electronic signals three “roads” to travel
on—one along the face of the transistor, as in Superposition enables a qubit to be both a “1” and
typical silicon, and one on each side of the device. a “0” at the same time, as shown in Figure 6, a
The new transistor uses the same amount of “real construct that is impossible with traditional
estate,” but with less overall power. A tri-gate electronics. As stated in Heisenberg’s uncertainty
transistor is shown in Figure 5 [9]. principle, the qubit will always read as a “1” or
“0” when measured, even if it represents many
It is imagined that a combination of the above
techniques will be used to deploy commercial
silicon that operates at the lowest possible
power. Nanowires, high-k dielectrics, and
three-dimensional circuitry are all compatible
design techniques that can be used together
harmoniously to produce chipsets that
overcome the power density limitations of
today’s data centers.
Figure 6. Qubits
Abstract—HSDPA is a WCDMA key feature that provides high data rate transmission to enhance UMTS
support of multimedia services. HSDPA offers many advanced features to both operators and end users. In
practice, it provides higher data rates for end users, higher capacity in the radio network, and the opportunity
for network operators to deliver services (both existing and new) at a lower cost by supporting a large number
of high data rate users with significant spectral efficiency. HSDPA offers maximum bit rates of 14.4 Mbps (with
15 spreading codes and no channel coding) in a 5 MHz channel. Moreover, packet data throughput is improved
significantly in HSDPA, compared with standard UMTS. This paper discusses specific issues regarding
HSDPA RAN dimensioning and describes some considerations for HSDPA performance monitoring and
related KPIs.
These parameters can serve as independent The HSDPA peak data rate calculation is based
dimensioning targets. It should be noted that they on the following main parameters:
are difficult to align and yield different results.
• Path loss as calculated by the HSDPA link
Because the first two parameters are independent
budget
of the number of users, they are most commonly
used for network dimensioning. • Percentage of Node B power allocated to
HSDPA data users—Because HSDPA and
HSDPA Link Budget Parameters UMTS channels operate on the same
Since HSDPA is expected to be overlaid on a frequency, power sharing becomes an
wideband code division multiple access important issue for UMTS operators, who
(WCDMA) network, the objective of HSDPA link must find a good tradeoff between voice
budgeting is to estimate the maximum data rate capacity, data sector throughput, and offered
achievable in the DL at the cell edge, assuming data rates.
that coverage is uplink (UL) limited. A sample • Scheduler margin—For HSDPA, the
HSDPA link budget is shown in Table 1. In this adaptive modulation and coding (AMC)
sample budget, the fading margins and combination allows different operating
penetration losses are not shown. By considering points to be selected based on initial
these two parameters for different morphology transmission power. It is, therefore, possible
types and the propagation model, the to adopt either a more conservative strategy
corresponding cell radius can be calculated. that uses more power but results in fewer
β Interference Margin 9 dB
where:
Interference Floor –91 dB
SFDSCH = spreading factor of the DSCH; Minimum Ec/Io –14 dB
fixed at 16
Orthogonality Factor 0.2
PtxDSCH = transmit power of the DSCH
β –4.4 dB
Ptot = total BTS power, including SINR 1.3 dB
DSCH power
DSCH SF 12.0 dB 16
α = orthogonality factor Rx Antenna Gain 0 dB
System Counters
Every vendor equips its system with counters
While stability
that measure events of interest (e.g., alarms) for
monitoring is the purpose of monitoring and analyzing
somewhat performance and stability. While stability
straightforward and monitoring is somewhat straightforward and
generally not of much interest, performance
generally not of
monitoring is a truly differentiating factor among
much interest, vendors, and the implementation of the counter
performance structure should be carefully considered when
monitoring is a truly selecting a vendor.
differentiating Performance counters usually measure
factor among predefined events such as signals in the data flow
vendors, and the or event triggered. Each counter is defined by two
quantities: Figure 1. Example of Counters in an HSDPA Connection
implementation
Setup Signal Flow
of the counter • The trigger point, which can be anything
from a signal to a customizable event
structure should be
carefully considered • The measurement frequency, which dictates
counters 1, 2, and 3 increase every time an
how often the counter value is probed by the
when selecting RRC_Connection_Request message is received
network management system and saved at
a vendor. via the random access channel (RACH) at the
the database
RNC. Each counter’s number increases for a
For a 3G UMTS terrestrial radio access network different RACH connection request type, such as
(UTRAN), counters are traditionally split into the voice, video, or packet switched (PS). Counter 4
following categories: in the example, however, increases when an
RRC_Connection_Setup_Complete message is
• Cell level, where cell-related functions are sent from the RNC to the UE.
captured
Literally hundreds of vendor-specific counters
• BTS level accompany each network element, giving
• Iub interface level optimization and performance management
engineers the ability to implement KPIs that help
• RNC level monitor, optimize, and benchmark the network.
These broad categories can be further divided to
offer additional visibility for UTRAN KPIs
performance analysis (e.g., call level, user level, Counters are a vendor’s intellectual property for
cell/BTS/RNC traffic level, radio resource monitoring system performance, and operators
controller [RRC] signaling). The structure define and implement KPIs using the offered
depends entirely on vendor system counters. KPIs, on the other hand, are an
implementation. operator’s intellectual property with regard to
network maintenance and optimization. Indeed
Figure 1 illustrates the deployment of counters in
the formulas, measurement methodologies, and
a connection setup signal flow between user
implementations of operator KPIs constitute a
equipment (UE), a BTS, and an RNC.
major differentiation factor in determining
The counters in the example are related to 3G network quality.
RRC signaling measurements; more specifically,
⎞⎟⎠ Σ Σ RRC_Connection_Setup_
⎞⎟⎠
number of users who successfully establish a data
WD Cell Complete_for_All_Cause channel can also be measured. By comparing
1– =
Σ Σ RRC_Connection_
WD Cell Request_for_All_Cause
these three KPIs, an engineer can quickly
pinpoint where the problem lies. Then, by cross-
(4) checking with other KPIs, such as RACH usage
⎞⎟⎠ Σ Σ COUNTER 4
⎞⎟⎠
and coverage levels, the engineer can make a By measuring
WD Cell decision regarding the nature of the problem and accessibility,
1– choose a course of action.
Σ Σ COUNTER 1 to3
WD Cell Retainability
an operator can
determine the
Retainability relates to successfully allocated
probability of user
HSDPA Counters and KPIs HS_DSCH NRT traffic.
Currently, the number of counters provided by
success in getting
An example KPI is abnormal release rate. This
vendors for monitoring HSDPA performance is onto the system.
metric can be given by:
small compared to the number of normal DCH
connections, thus limiting the creation of KPIs. Σ HS_DSCH_Abnormal_Release * 100%
(6)
Nevertheless, HSDPA counters cover the
following broad categories:
Σ HS_DSCH_Successfully_Established
Alternatively, a similar metric can be established
• Accessibility, where the ability to
by:
successfully establish a network connection
is assessed
⎞⎟⎠1 – HS_DSCH_Normal_Release
HS_DSCH_Successfully_Established
⎞⎟⎠ *100% (7)
• Retainability, where the ability of
maintaining a link is measured
As with the accessibility example, different
• Usage, where all traffic volume is measured variations of this generic retainability KPI can
help with system debugging. An engineer might
• Mobility, where all handover statistics are
choose to view the last message before connection
delivered
release and, by statistically analyzing the reasons
Accessibility for release, trace the problem.
The metric for HSDPA accessibility for non-real-
Usage
time (NRT) traffic is given by:
KPIs in the usage field can measure the usage of
⎞⎟⎠ Σ
⎞⎟⎠
HS_DSCH_ the shared channel in terms of throughput, in
Cell Establishment_Success terms of the number of connections over time, or
1– * 100% (5)
Σ HS_DSCH_ in terms of code tree usage (the number of
Cell Establishment_Request HSDPA preassigned codes allocated over time).
Abstract—This paper presents technologies developed to enable operators to provide high-speed wireless
access and to cost-effectively evolve their networks to support broadband multimedia packet-based services.
Technology evolution in the access portion of the UMTS network is presented, including HSDPA, HSUPA,
MIMO, OFDM, IMS, and broadcasting. As operators compete for subscribers and strive to differentiate
themselves with the most broadband multimedia services, these technologies are becoming an essential part of
their infrastructure.
UMTS EVOLUTION PATH This paper focuses on features related to the radio
apid growth in the availability of universal access network (RAN).
R mobile telecommunications system (UMTS)
services has contributed to the evolution of UMTS
While Release 4 (R4) of the Third Generation
Partnership Project (3GPP™) standards enhanced
through Releases 4, 5, 6, 7, and beyond. Each the transport, radio interface, and other features
release has included many new core and access defined in Release 99 (R99), Release 5 (R5) has
features (see Table 1), incorporated in hundreds many important enhancements that are easy
of individual standards documents, each of upgrades to the currently deployed R99 UMTS
which may have been through many revisions. networks and that have been deployed in many
FDD and TDD at 3.84 Mbps TDD at 1.28 Mbps Evolution of UTRAN Transport to IP
Support for Multicall Location Services over Network Interfaces Reliable QoS for PS Domain
trial systems. UMTS R5 provides wireless station; this enables true broadband experience
operators and consumers with improvements by offering near-symmetrical throughput
that enable higher speed wireless data services for applications such as interactive mobile
with vastly improved spectral efficiencies. It does gaming, two-way file transfers, camera-phone
this via high-speed downlink packet access picture transmission, and voice over Internet
(HSDPA), which enables much greater Protocol (VoIP). Release 6 (R6) addresses this
throughput by providing a faster downlink (DL) enhancement by introducing high-speed UL
from the base station to the mobile. packet access (HSUPA), along with major
enhancements in the radio link—including
The next enhancement is faster uplink (UL)
multimedia broadcast multicast service—and
throughput from the mobile to the base
the deployment of and using the HARQ protocol to increase deployment of services that require high-speed
services that require radio interface robustness. The key technical access in both DL and UL—such as VoIP—and
high-speed access capabilities introduced with HSUPA are: interactive multimedia services.
in both DL and UL. • New dedicated UL channel and associated
control channels—A series of new signaling
and traffic channels is introduced (see UMTS PHYSICAL LAYER EVOLUTION
Figure 1) to improve overall UL capabilities. BEYOND HSDPA/HSUPA
ireless mobile radio communication
• Introduction of HARQ in the UL and fast
Node-B scheduling—This is similar to the
W generates an endless demand for increased
capacity and improved quality. With HSDPA
mechanisms developed for HSDPA.
about to launch, new technologies promise even
Overall, HSUPA improves coverage and more bandwidth and new services, such as
throughput and reduces UL channel transmission HSUPA in R6, MIMO in R7, and OFDM in the
delay. HSUPA baseline requirements are similar LTE of 3GPP radio access technology, which is
to those of HSDPA; however, some major currently under investigation in the RAN
differences exist: Working Group. Accommodating the very high
bit rates achievable by OFDM-MIMO requires
• In the UL, buffers are distributed in the
architectural improvements such as moving even
mobile terminals and transmissions must be
more functionalities to the BTS and having a
remotely controlled by the scheduler in the
many-to-many relationship among BTSs and
base transceiver station (BTS), adding
RNCs, based on a meshed IP network. Some of
complexity to the system. Unlike HSDPA,
the major UMTS technologies in the evolution
HSUPA remains based on a dedicated
toward faster access data rates are presented here.
channel (DCH) in the UL.
BIOGRAPHIES
Esmael Dinan is principal
engineer/technologist—Bechtel
Telecommunications. A key
specialist for Bechtel’s Global
Technology Team, he has been
leading the effort to support
customers with plans for
WiMAX equipment inter-
operability and conformance
testing. He has performed
numerous key wireless technology assignments and has
been instrumental in many aspects of the business unit’s
research activities, as well as on the Cingular RF
engineering project. Dr. Dinan designed and
engineered an RF engineering data management
system, developed Cingular project RF engineering
processes and procedures, designed and optimized
UMTS networks, and verified and tested Dupont
cryogenic TMA performance.
Figure 3. Example of HSDPA/HSUPA Implementation Before joining Bechtel in 2002, Dr. Dinan was product
manager for the GMPLS control plane of the RAYStar
DWDM optical switch at Movaz Networks, and lead
network architect at Worldcom. He has conducted
research and development on access methods and
performance modeling of 3G wireless communications
and high-speed optical networks.
Abstract—While RF communication signal distortions in nonlinear transmission paths have been predicted
theoretically and studied experimentally for various signals, it is interesting to examine a wideband nonlinear
system reaction to a wideband 3G signal and a narrowband 2G signal. Research and testing have demonstrated
that, while most vital signal parameters remain within the limits specified by applicable standards even if
composite signal power approaches specified maximum power, a relatively high level of spurious emissions
caused by cross- and intermodulation can result. To avoid degrading both existing and new systems, this and
other signal quality issues must be considered when designing and deploying multitechnology systems.
1850 1930
BS/DAS SU
1865 1945
Max Amplifier Output CW Power (dBW) 0 Amplifier Output Max (W) 0.2
Power BO (dB) 7
Number of RF Channels/Antenna 2
FW Max Allowable Path Loss (dB) 134.9 RV Max Allowable Path Loss (dB) 138.5
Abstract—UWB is a radio communications technology that promises very high data rates over short distances.
Although the concept has been around since the early 1970s, recent advances in semiconductor electronics have
made UWB devices a reality. This paper undertakes an exploration of the technology and discusses some of its
more significant applications.
BACKGROUND
nce techniques were
O developed to directly
observe and measure the impulse
response of microwave
networks, they were quickly
applied to the design of short-
pulse radar and communications
systems. The invention of a
sensitive short-pulse receiver
further accelerated system
development. The first UWB
communications patent was
awarded to Sperry in 1973 [1].
Murtaza Penwala The term “ultra-wideband” was
mspenwal@bechtel.com applied around 1989 by the US
Department of Defense. By then,
UWB theory, techniques, and
Figure 1. Timeline of UWB Development [adapted from 2]
APPLICATIONS
WB system applications include [3]:
U
• Wireless communications systems
— Military communications
— Local area networks (LANs) and PANs
— Roadside information stations
Figure 6. Uniform Pulse Train with No Modulation or Dithering [3] — Short-range radios
• Radar and sensing
— Vehicular radar (proximity detection,
aid for airbag/restraint deployment,
resolution to distinguish objects, road
condition sensing)
— GPR
— Through-the-wall imaging (police, fire,
rescue)
Figure 7. Pseudo-Random Positioning of Pulse Within Frame for Time Hopping [3] — Medical imaging
— Surveillance
SHORTCOMINGS
s with any other technology, UWB’s strong
A points determine its shortcomings. UWB
emissions can potentially interfere with many
other users. Supporters of GPS, particularly those
who use GPS data for navigation and landing,
have serious reservations about mobile devices
that introduce even very low levels of
Figure 10. Simplified Block Diagram of AWICS System [7] interference into the 1.2 GHz and 1.5 GHz
BIOGRAPHY
TRADEMARKS
Murtaza (Taz) Penwala joined
Bluetooth is a trademark owned by the Bluetooth Bechtel in September 2004.
Special Interest Group, USA. Currently, as an RF field
engineer with the New Site
MSSI is a registered trademark of Multispectral Builds team on the Cingular
Genesis project in the NY/NJ
Solutions, Inc.
market, he is involved in
Wi-Fi is a trademark of the Wireless Ethernet designing the GSM network in
the tri-state area for Cingular.
Compatibility Alliance, Inc. On previous assignments he
was actively involved with the DAS Testing project
for Cingular in the TDR Laboratory and also worked
with the Special Projects team for Cingular in the
REFERENCES
NY/NJ market, involved in overlay and capacity
[1] X. Gu and L. Taylor, “Ultra-wideband and its growth of cell sites.
Capabilities,” BT Technology Journal, Vol. 21,
No. 3, July 2003. Prior to joining Bechtel, Taz was a BSS team lead with
BPL Mobile Communications Ltd., Bombay, India,
[2] R.J. Fontana, “Recent Developments in Short
where he was responsible for the optimization and
Pulse Electromagnetics, or UWB the Old-
preventive/corrective maintenance of GSM cell sites
fashioned Way?,” invited presentation to the
IEEE Microwave Theory and Techniques Society and microwave equipment.
and the Northern Virginia Communications Taz holds an MS degree in Electrical Engineering from
Society, March 9, 2004.
The Pennsylvania State University and a bachelor’s
[3] J. Reed, R.M. Buehrer, and D.S. Ha, “Introduction degree in Electronics and Telecom Engineering from
to UWB: Impulse Radio for Radar and Wireless Bombay University, India.
Communications,” www.mprg.org, MPRG,
Virginia Polytechnic University.
[4] Y.M. Kim, “Ultra Wideband Technology and
Applications,” NEST Group, Ohio State
University, July 2003.
Bechtel has continually set the bar for telecom- MIKE HICKEY
munications network project deployment for clients Principal Vice President and
throughout the world. Due to our success with tight Manager of Functional Operations
schedules and cost effective delivery, we are currently
managing network expansions and upgrades for major
operators in the U.S., Europe, and the Asia-Pacific JAMES A. IVANY
region. Signature record-breaking projects include Principal Vice President and
Cingular, AT&T Wireless, Vodafone, Verizon, Chief Financial Officer
Metromedia Fiber Networks, XO, WINFirst, Viatel,
Pangea, and Equinix.
J. S. (JAKE) MACLEOD
Principal Vice President and
Chief Technology Officer
LEE LUSHBAUGH
Principal Vice President and
General Manager, Americas
RICK ASTLEFORD
Principal Vice President and
General Manager, Europe, Africa,
Middle East, Asia, and Asia-Pacific
108
Bechtel Offices Worldwide
Construction and Cairo London (Hammersmith Rd.) Rio de Janeiro Warrington, England
Equipment Installation Tel: (20-2) 754-6763 Tel: (44-208) 846-5111 Tel: (55-21) 2579-2370 Tel: (44-208) 846-4000
Fax: (20-2) 754-6804 Fax: (44-208) 846-6940 Fax: (55-21) 2579-2413 Fax: (44-208) 846-5469
Integration and
Optimization Calgary (Bantrel) London (Pilgrim St.) Riyadh Washington, D.C.
Tel: (1-403) 290-5000 Tel: (44-207) 651-7777 Tel: (966-1) 277-1884 Tel: (1-202) 828-5200
Fax: (1-403) 290-5050 Fax: (44-207) 651-7972 Fax: (966-1) 278-0607 Fax: (1-202) 785-2645
Ron Menendez, PhD, and David Waring 55 Technology Options for Optical Access Networks
www.bechteltelecoms.com
(Telcordia Technologies) Offering Increased Bandwidth (Invited Paper)
Esmael Dinan, PhD, and 83 High-Speed Packet Access Technologies for UMTS Networks
Thrasivoulos (Sakis) Griparis