Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Communication Systems Index Acronyms ……………………………………………………….1 Network types Cables(Coax-Fiber-Twist) Duplexing(Half-Full) Modulation(Analog-Digital-Pulse) Wireless basics(Sight Survay-Standards-SNR) DSL types(ADSL & Leased Line) 1 Table Of Contents : 2 Acronyms …………………………………………………………………………………………..3 All Type of Networks………………………………………………………………………………5 Acronyms ……………………………………..1 Acronyms ……………………………………..1 Acronyms ……………………………………..1 Acronyms ……………………………………..1 Acronyms 3 IEEE : Institute of Electrical & Electronics Engineers LAN : Local Area Network WLAN : Wireless Local Area Network WAN : Wide Area Network MAN : Metropolitan Area Network SAN : Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network CAN : Campus Area Network, Controller Area Network, or sometimes Cluster Area Network PAN : Personal Area Network DAN : Desk Area Network GSM - Global standard for digital mobile communication, common in most countries except South Korea and Japan PCS - Personal communication system - not a single standard, this covers both CDMA and GSM networks operating at 1900 MHz in North America ISM : industrial, scientific and medical 4 Mobitex - pager-based network in the USA and Canada, built by Ericsson, now used by PDAs such as the Palm VII and Research in Motion BlackBerry GPRS - General Packet Radio Service, upgraded packet-based service within the GSM framework, gives higher data rates and always-on service UMTS - Universal Mobile Telephone Service (3rd generation cell phone network), based on the W-CDMA radio access network AX.25 - amateur packet radio NMT - Nordic Mobile Telephony, analog system originally developed by PTTs in the Nordic countries AMPS - Advanced Mobile Phone System introduced in the Americas in about 1984. D-AMPS - Digital AMPS, also known as TDMA Wi-Fi -Wireless Fidelity, widely used for Wireless LAN, and based on IEEE 802.11 standards. Wimax - Worldwide Interoperability for Microwave Access. Canopy - A wide-area broadband wireless solution from Motorola. All Type of Networks Peer to Peer 5 Mesh 6 Star 7 Bus 8 Common Cables Coaxial Fiber Optic Ribbon cables Twisted Pair (Cat 5…) 9 Coaxial Cable Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield (See fig. 3). The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers. Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial. Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable is popular in school networks, especially linear bus networks. Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult to install. 10 11 12 13 Coaxial Cable Connectors The most common type of connector used with coaxial cables is the Baonye-Neill-Concelman (BNC) connector (See fig. 4). Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest points in any network. To help avoid problems with your network, always use the BNC connectors that crimp, rather than screw, onto the cable. 14 Fiber Optic 15 Fiber optics (optical fibers) are long, thin strands of very pure glass about the diameter of a human hair. They are arranged in bundles called optical cables and used to transmit light signals over long distances.Printronix Printer Repair - Nationwide coverage and 24 hour service of all Printronix products at a price that fits your budget. Our dedication to you is unparalleled. Our Printronix Printer repair experts and high-tech support team will let you sleep easy knowing your technology is protected. If you look closely at a single optical fiber, you will see that it has the following parts: Core -Thin glass center of the fiber where the light travels Cladding - Outer optical material surrounding the core that reflects the light back into the core Buffer coating - Plastic coating that protects the fiber from damage and moisture Hundreds or thousands of these optical fibers are arranged in bundles in optical cables. The bundles are protected by the cable's outer covering, called a jacket. Optical fibers come in two types: Single-mode fibers Multi-mode fibers Single-mode fibers have small cores (about 3.5 x 10-4 inches or 9 microns in diameter) and transmit infrared laser light (wavelength = 1,300 to 1,550 nanometers). Multi-mode fibers have larger cores (about 2.5 x 10-3 inches or 62.5 microns in diameter) and transmit infrared light (wavelength = 850 to 1,300 nm) from lightemitting diodes (LEDs). Some optical fibers can be made from plastic. These fibers have a large core (0.04 inches or 1 mm diameter) and transmit visible red light (wavelength = 650 nm) from LEDs. 16 Fiber Optic Connectors 17 18 19 Fiber Optic Sensor Any device in which variations in the transmitted power or the rate of transmission of light in optical fiber are the means of measurement or control. Fibers can be used to measure temperature, pressure, strain, voltage, current, liquid level, rotation and particle velocity. The small size and the fact that no electrical power is needed at the remote location gives the fiber optic sensor advantages to conventional electrical sensor in certain applications. Fiber Optic Sensor: This illustration shows a fiber optic sensor used for measuring moisure content (relative humidity - RH) in the ground. Specifically, the fiber is a pore pressure sensor- a porous-polymer fiber optic probe. It measures soil-water potential in unsaturated dry soils. Image courtesy of Sandia National Laboratories. 20 Fiber Optic Fusion Splicer Rentals 21 Twisted pair Category 5 The original specification for category 5 cable was defined in ANSI/TIA/EIA568-A, with clarification in TSB-95. These documents specified performance characteristics and test requirements for frequencies of up to 100 MHz. Category 5 cable includes four twisted pairs in a single cable jacket. This use of balanced lines helps preserve a high signal-to-noise ratio despite interference from both external sources and other pairs (this latter form of interference is called crosstalk). It is most commonly used for 100 Mbit/s networks, such as 100BASE-TX Ethernet, although IEEE 802.3ab defines standards for 1000BASE-T - Gigabit Ethernet over category 5 cable. Cat 5 cable typically has three twists per inch of each twisted pair of 24 gauge copper wires within the cable. 22 Cat5 Cable Connectors RJ-45 connector. RJ-45 is an eight-wire (four-pair) connector used for data transmission over unshielded twisted-pair (UTP) cable and leased telephone line connections. 23 RJ-11 RJ-11 A commonly used modular telephone connector. RJ-11 is a four-wire (twopair) connector most often used for voice communications. 24 25 Type Use Category 1 Voice Only (Telephone Wire) Category 2 Data to 4 Mbps (LocalTalk) Category 3 Data to 10 Mbps (Ethernet) Category 4 Data to 20 Mbps (16 Mbps Token Ring) Category 5 Data to 100 Mbps (Fast Ethernet) Ethernet Cable Summary 26 Specification Cable Type Maximum length 10BaseT Unshielded Twisted Pair 100 meters 10Base2 Thin Coaxial 185 meters 10Base5 Thick Coaxial 500 meters 10BaseF Fiber Optic 2000 meters 100BaseT Unshielded Twisted Pair 100 meters 100BaseTX Unshielded Twisted Pair 220 meters DB connector Any of several types of cable connectors used for parallel or serial cables.The number following the letters DB (for data bus) indicates the number of pins that the connector usually has; a DB-25 connector can have a maximum of 25 pins, and a DB-9 connector can have as many as 9. In practice, not all the pins (and not all the lines in the cable) may be present in the larger connectors. If your situation demands that all the lines be present, make sure you buy the right cable. 27 Common DB connectors include the following: DB-9 Defined by the RS-449 standard as well as the ISO (International Organization for Standardization). DB-25 A standard connector used with RS-232-C wiring, with 25 pins (13 on the top row and 12 on the bottom). DB-37 Defined as the RS-449 primary channel connector. DB-15, DB-19, and DB-50 connectors are also available. The accompanying illustration shows a male and female DB-25 connector. 28 DB25 29 DB37 30 DIP switch(dual in-line package) DIP switch A small switch used to select the operating mode of a device, mounted as a dual in-line package. DIP switches can be either sliding or rocker switches, and they are often grouped for convenience. They are used in printed circuit boards, dot-matrix printers, modems, and many other peripheral devices. 31 BandWidth(BW) 1. In communications, the difference between the highest and lowest frequencies available for transmission in any given range. 2. In networking, the transmission capacity of a computer or a communications channel, stated in megabits per second (Mbps). For example, FDDI (Fiber Distributed Data Interface) has a bandwidth of 100Mbps. To relate this to a real-world example,a complete page of text, in English,is approximately 16,000 bits. 32 Duplexing A duplex communication system is a system composed of two connected parties or devices which can communicate with one another in both directions. (The term duplex is not used when describing communication between more than two parties or devices.) Duplex systems are employed in nearly all communications networks, either to allow for a communication "two-way street" between two connected parties or to provide a "reverse path" for the monitoring and remote adjustment of equipment in the field. 33 Half-Duplex 34 A half-duplex system provides for communication in both directions, but only one direction at a time (not simultaneously). Typically, once a party begins receiving a signal, it must wait for the transmitter to stop transmitting, before replying. An example of a half-duplex system is a two-party system such as a "walkie-talkie" style two-way radio, wherein one must use "Over" or another previously designated command to indicate the end of transmission, and ensure that only one party transmits at a time, because both parties transmit on the same frequency. A good analogy for a half-duplex system would be a one lane road with traffic controllers at each end. Traffic can flow in both directions, but only one direction at a time with this being regulated by the traffic controllers. Full-Duplex 35 A full-duplex system allows communication in both directions, and unlike half-duplex, allows this to happen simultaneously. Land-line telephone networks are full-duplex since they allow both callers to speak and be heard at the same time. A good analogy for a full-duplex system would be a two lane road with one lane for each direction. Examples: Telephone, Mobile Phone, etc. Two way radios can be, for instance, designed as full-duplex systems, which transmit on one frequency and receive on a different frequency. This is also called frequency-division duplex. Frequency-division-duplex systems can be extended to farther distances using pairs of simple repeater stations, owing to the fact the communications transmitted on any one frequency always travels in the same direction. Full-duplex Ethernet connections work by making simultaneous use of all four physical pair of twisted cable (which are inside the insulation), where two pair are used for receiving packets and two pair are using for sending packets to a directly connected device. This effectively makes the cable itself a collision-free environment, and theoretically doubles the maximum bandwidth that can be supported by the connection. Conclusion: Full duplex means, connection that allows communication in two directions simultaneously at once. Benefits of full duplex i) Time is not wasted, no frames need to be retransmitted as there are no collisions. ii) Full bandwidth is available in both directions, because send and receive functions are separated. Iii) Stations/node do not have to wait till other operations complete their transmission, coz there is only one transmitter for each twisted pair. Emulation of full duplex in shared physical media Where channel access methods are used in point to multipoint networks such as cellular networks for dividing forward and reverse communication channels on the same physical communications medium, they are known as duplexing methods, such as: 36 1) Time division duplex 37 Time division duplex (TDD) is the application of time-division multiplexing to separate outward and return signals. It emulates full duplex communication over a half duplex communication link. Time division duplex has a strong advantage in the case where the asymmetry of the uplink and downlink data speed is variable. As the amount of uplink data increases, more bandwidth can dynamically be allocated to that and as it shrinks it can be taken away. Another advantage is that the uplink and downlink radio paths are likely to be very similar in the case of a slow moving system. This means that techniques such as beamforming work well with TDD systems. Examples of TDD systems are: The W-CDMA TDD mode (for indoor use) UMTS-TDD's TD-CDMA air interface The TD-SCDMA system DECT IEEE 802.16 WiMax TDD mode Half-duplex packet mode networks based on carrier sense multiple access, for example 2-wire or hubbed Ethernet, Wireless local area networks and Bluetooth, can be considered as TDD systems, albeit not TDMA with fixed frame length. 2) Frequency division duplex frequencies. The term is frequently used in ham radio operation, where an operator is attempting to contact a repeater station. The station must be able to send and receive a transmission at the same time, and does so by altering the frequency at which it sends and receives slightly. This mode of operation is referred to as duplex mode or offset mode. Uplink and downlink sub-bands are said to be separated by the "frequency offset". Frequency division duplex or frequency duplex is much more efficient in the case of symmetric traffic. In this case TDD tends to waste bandwidth during switch over from transmit to receive, has greater inherent latency, and may require more complex, more power-hungry circuitry. Another advantage of FDD is that it makes radio planning easier and more efficient since base stations do not "hear" each other (as they transmit and receive in different sub-bands) and therefore will normally not interfere each other. Conversely with TDD systems, care must be taken to keep guard bands between neighboring base stations (which decreases spectral efficiency) or to synchronize base stations so they will transmit and receive at the same time (which increases network complexity and therefore cost, and reduces bandwidth allocation flexibility as all base stations and sectors will be forced to use the same uplink/downlink ratio) Examples of FDD systems are: ADSL and VDSL Most cellular systems, including the UMTS/WCDMA FDD mode IEEE 802.16 WiMax FDD mode 38 Frequency division duplex (FDD)means that the radio transmitter and receiver operates at different Echo cancellation Echo cancellation can also implement full duplex communications over certain types 39 of shared media. In this configuration, both devices send and receive over the same medium at the same time. When processing the signal it receives, a transceiver removes the "echo" of the signal it sent, leaving, in theory, the other transceiver's signal only. Echo cancellation is at the heart of the V.32, V.34, V.56 and V.90 modem standards. Echo cancellers are available as both software and hardware solutions. They can be independent components in a communications system or integrated into the communication system's central processing unit. Devices that do not eliminate echo in the system will not produce good full duplex performance. Examples Telephone networks Mobile phone networks CB radio Internet Relay Chat Modulation 40 In telecommunications, modulation is the process of varying a periodic waveform, i.e. a tone, in order to use that signal to convey a message, in a similar fashion as a musician may modulate the tone from a musical instrument by varying its volume, timing and pitch. Normally a high-frequency sinusoid waveform is used as carrier signal. The three key parameters of a sine wave are its amplitude ("volume"), its phase ("timing") and its frequency ("pitch"), all of which can be modified in accordance with a low frequency information signal to obtain the modulated signal. A device that performs modulation is known as a modulator and a device that performs the inverse operation of modulation is known as a demodulator (sometimes detector or demod). A device that can do both operations is a modem (a contraction of the two terms). A simple example: A telephone line is designed for transferring audible sounds, for example tones, and not digital bits (zeros and ones). Computers may however communicate over a telephone line by means of modems, which are representing the digital bits by tones, called symbols.You could say that modems play music for each other. If there are four alternative symbols (corresponding to a musical instrument that can generate four different tones, one at a time), the first symbol may represent the bit sequence 00, the second 01, the third 10 and the fourth 11. If the modem plays a melody consisting of 1000 tones per second, the symbol rate is 1000 symbols/second, or baud. Since each tone represents a message consisting of two digital bits in this example, the bit rate is twice the symbol rate, i.e. 2000 bit per second. 41 The aim of digital modulation is to transfer a digital bit stream over an analog bandpass channel, for example over the public switched telephone network (where a filter limits the frequency range to between 300 and 3400 Hz) or a limited radio frequency band. The aim of analog modulation is to transfer an analog lowpass signal, for example an audio signal or TV signal, over an analog bandpass channel, for example a limited radio frequency band or a cable TV network channel. Analog and digital modulation facilitate frequency division multiplex (FDM), where several low pass information signals are transferred simultaneously over the same shared physical medium, using separate bandpass channels. The aim of digital baseband modulation methods, also known as line coding, is to transfer a digital bit stream over a lowpass channel, typically a non-filtered copper wire such as a serial bus or a wired local area network. The aim of pulse modulation methods is to transfer a narrowband analog signal, for example a phone call over a wideband lowpass channel or, in some of the schemes, as a bit stream over another digital transmission system. Analog modulation methods An audio signal (top) may be carried by an AM or FM radio wave. Common analog modulation techniques are: Amplitude modulation (AM) Double-sideband modulation (DSB) Double-sideband modulation with unsuppressed carrier (DSB-WC)(used on the radio AM band) Double-sideband suppressed-carrier transmission (DSB-SC) Double-sideband reduced carrier transmission (DSB-RC) Single-sideband modulation Single-sideband modulation (SSB, or SSB-AM), very similar to single-sideband suppressed carrier modulation (SSB-SC) Vestigial sideband modulation (VSB, or VSB-AM) Quadrature amplitude modulation (QAM) 42 Angle modulation Frequency modulation (FM) Phase modulation (PM) Double-sideband suppressed-carrier transmission (DSB-SC) (DSB-SC): transmission in which (a) frequencies produced by amplitude modulation are symmetrically spaced above and below the carrier frequency and (b) the carrier level is reduced to the lowest practical level, ideally completely suppressed. In the double-sideband suppressed-carrier transmission (DSB-SC) modulation, unlike AM, the wave carrier is not transmitted; thus, a great percentage of power that is dedicated to it is distributed between the sidebands, which implies an increase of the cover in DSB-SC, compared to AM, for the same power used. DSB-SC transmission is a special case of Double-sideband reduced carrier transmission. This is used for RDS (Radio Data System) due to the fact that it is difficult to decouple. 43 Spectrum This is basically an amplitude modulation wave without the carrier therefore reducing power wastage, giving it a 50% efficiency rate. 44 Generation DSBSC is generated by a mixer. This consists of an audio source combined with the frequency carrier. 45 Demodulation(DSBSC ) For demodulation the audio frequency and the carrier frequency must be exact otherwise we get distortion. 46 How it works This is best shown graphically. Below, is a message signal that one may wish to modulate onto a carrier, consisting of a couple of sinusoidal components. The equation for this message signal is 47 48 The carrier, in this case, is a plain 5 kHz ( ) sinusoid -- pictured below. The modulation is performed by multiplication in the time domain, which yields a 5 kHz carrier signal, whose amplitude varies in the same manner as the message signal. 49 The name "suppressed carrier" comes about because the carrier signal component is suppressed -- it does not appear (theoretically) in the output signal. This is apparent when the spectra of the output signal is viewed: 50 Double-sideband reduced carrier transmission (DSB-RC): transmission in which (a) the frequencies produced by amplitude modulation are symmetrically spaced above and below the carrier and (b) the carrier level is reduced for transmission at a fixed level below that which is provided to the modulator. Note: In DSB-RC transmission, the carrier is usually transmitted at a level suitable for use as a reference by the receiver, except for the case in which it is reduced to the minimum practical level, i.e. the carrier is suppressed. 51 Single-sideband modulation (SSB) 52 Single-sideband modulation (SSB) is a refinement of amplitude modulation that more efficiently uses electrical power and bandwidth. It is closely related to vestigial sideband modulation (VSB) (see below). Amplitude modulation produces a modulated output signal that has twice the bandwidth of the original baseband signal. Single-sideband modulation avoids this bandwidth doubling, and the power wasted on a carrier, at the cost of somewhat increased device complexity. The first U. S. patent for SSB modulation was applied for on 1 December, 1915 by John Renshaw Carson. Patent 1,449,382, titled "Method and Means for Signaling with High Frequency Waves" was awarded to Carson on March 27, 1923 and assigned to AT&T. The U.S. Navy experimented with SSB over its radio circuits prior to World War I. SSB first entered commercial service in January 7, 1927 on the longwave transatlantic public radiotelephone circuit between New York and London. The high power SSB transmitters were located at Rocky Point, New York and Rugby, England. The receivers were in very quiet locations in Houlton, Maine and Cupar Scotland. SSB was also used over long-distance telephone lines, as part of a technique known as frequency-division multiplexing. (FDM) was pioneered by telephone companies in the 1930s. This enabled many voice channels to be sent down a single physical circuit. The use of SSB meant that the channels could be spaced (usually) just 4,000 Hz apart, while offering a speech bandwidth of nominally 300 – 3,400 Hz. Amateur radio operators began to seriously experiment with SSB after World War II. It has become a de facto standard for long-distance voice radio transmissions since then. Vestigial sideband (VSB) A vestigial sideband (in radio communication) is a sideband that has been only partly cut off or suppressed. Television broadcasts (in NTSC, PAL, or SECAM analog video format) use this method if the video is transmitted in AM, due to the large bandwidth used. It may also be used in digital transmission, such as the ATSC standardized 8-VSB. The Milgo 4400/48 modem (circa 1967) used vestigial sideband and phase-shift keying to provide 4800-bit/s transmission over a 1600 Hz channel. The video baseband signal used in TV in countries that use NTSC or ATSC has a bandwidth of 6 MHz.To conserve bandwidth, SSB would be desirable, but the video signal has significant low frequency content (average brightness) and has rectangular synchronising pulses. The compromise is vestigial sideband modulation. In vestigial sideband the full upper sideband of bandwidth W2 = 4 MHz is transmitted, but only W1 = 1.25 MHz of the lower sideband is transmitted, along with a carrier. This effectively makes the system AM at low modulation frequencies and SSB at high modulation frequencies. The absence of the lower sideband components at high frequencies must be compensated for, and this is done by the RF and IF filters. 53 Frequency modulation(FM) 54 In telecommunications, frequency modulation (FM) conveys information over a carrier wave by varying its frequency (contrast this with amplitude modulation, in which the amplitude of the carrier is varied while its frequency remains constant). In analog applications, the instantaneous frequency of the carrier is directly proportional to the instantaneous value of the input signal. Digital data can be sent by shifting the carrier's frequency among a set of discrete values, a technique known as frequency-shift keying. FM is commonly used at VHF radio frequencies for high-fidelity broadcasts of music and speech (see FM broadcasting). Normal (analog) TV sound is also broadcast using FM. A narrowband form is used for voice communications in commercial and amateur radio settings. The type of FM used in broadcast is generally called wide-FM, or W-FM. In two-way radio, narrowband narrow-fm (N-FM) is used to conserve bandwidth. In addition, it is used to send signals into space. FM is also used at intermediate frequencies by most analog VCR systems, including VHS, to record the luminance (black and white) portion of the video signal. FM is the only feasible method of recording video to and retrieving video from magnetic tape without extreme distortion, as video signals have a very large range of frequency components — from a few hertz to several megahertz, too wide for equalisers to work with due to electronic noise below -60 dB. FM also keeps the tape at saturation level, and therefore acts as a form of audio noise reduction, and a simple limiter can mask variations in the playback output, and the FM capture effect removes print-through and pre-echo. A continuous pilot-tone, if added to the signal — as was done on V2000 and many Hi-band formats — can keep mechanical jitter under control and assist timebase correction. FM is also used at audio frequencies to synthesize sound. This technique, known as FM synthesis, was popularized by early digital synthesizers and became a standard feature for several generations of personal computer sound cards. An example of frequency modulation. The top diagram shows the modulating signal superimposed on the carrier wave. The bottom diagram shows the resulting frequency-modulated signal. 55 Phase modulation(PM) Phase modulation (PM) is a form of modulation that represents information as variations in the instantaneous phase of a carrier wave. Unlike its more popular counterpart, frequency modulation (FM), PM is not very widely used. This is because it tends to require more complex receiving hardware and there can be ambiguity problems with determining whether, for example, the signal has 0° phase or 180° phase. 56 An example of phase modulation. The top diagram shows the modulating signal superimposed on the carrier wave. The bottom diagram shows the resulting phase-modulated signal. 57 Digital modulation methods In digital modulation, an analog carrier signal is modulated by a digital bit stream of 58 either equal length signals or varying length signals. This can be described as a form of analog-to-digital conversion. The changes in the carrier signal are chosen from a finite number of alternative symbols (the modulation alphabet). These are the most fundamental digital modulation techniques: In the case of CW, groupings of on-off keying of varying length signals are used. In the case of PSK, a finite number of phases are used. In the case of FSK, a finite number of frequencies are used. In the case of ASK, a finite number of amplitudes are used. In the case of QAM, an inphase signal (the I signal, for example a cosine waveform) and a quadrature phase signal (the Q signal, for example a sine wave) are amplitude modulated with a finite number of amplitudes. It can be seen as a two channel system. The resulting signal is a combination of PSK and ASK, with a finite number of at least two phases, and a finite number of at least two amplitudes. 59 Each of these phases, frequencies or amplitudes are assigned a unique pattern of binary bits. Usually, each phase, frequency or amplitude encodes an equal number of bits. This number of bits comprises the symbol that is represented by the particular phase. If the alphabet consists of M = 2N alternative symbols, each symbol represents a message consisting of N bits. If the symbol rate (also known as the baud rate) is fS symbols/second (or baud), the data rate is NfS bit/second. For example, with an alphabet consisting of 16 alternative symbols, each symbol represents 4 bits. Thus, the data rate is four times the baud rate. In the case of PSK, ASK and QAM, the modulation alphabet is often conveniently represented on a constellation diagram, showing the amplitude of the I signal at the x-axis, and the amplitude of the Q signal at the y-axis, for each symbol. PSK and ASK, and sometimes also FSK, can be generated and detected using the principle of QAM. The I and Q signals can be combined into a complex valued signal called the equivalent lowpass signal or equivalent baseband signal. This is a representation of the valued modulated physical signal (the so called passband signal or RF signal). The most common digital modulation techniques are: 60 Phase-shift keying (PSK) Frequency-shift keying (FSK) (see also audio frequency-shift keying (AFSK)) Amplitude-shift keying (ASK) and its most common form, on-off keying (OOK) Quadrature amplitude modulation (QAM) a combination of PSK and ASK Polar modulation like QAM a combination of PSK and ASK. Continuous phase modulation (CPM) Minimum-shift keying (MSK) Gaussian minimum-shift keying (GMSK) Orthogonal frequency division multiplexing (OFDM) modulation, also known as discrete multitone (DMT). Wavelet modulation Trellis coded modulation (TCM) also known as trellis modulation Phase-shift keying (PSK) Phase-shift keying (PSK) is a digital modulation scheme that conveys data by changing, or modulating, the phase of a reference signal (the carrier wave). Any digital modulation scheme uses a finite number of distinct signals to represent digital data. PSK uses a finite number of phases, each assigned a unique pattern of binary bits. Usually, each phase encodes an equal number of bits. Each pattern of bits forms the symbol that is represented by the particular phase. The demodulator, which is designed specifically for the symbol-set used by the modulator, determines the phase of the received signal and maps it back to the symbol it represents, thus recovering the original data. This requires the receiver to be able to compare the phase of the received signal to a reference signal — such a system is termed coherent. Alternatively, instead of using the bit patterns to set the phase of the wave, it can instead be used to change it by a specified amount. The demodulator then determines the changes in the phase of the received signal rather than the phase itself. Since this scheme depends on the difference between successive phases, it is termed differential phase-shift keying (DPSK). DPSK can be significantly simpler to implement than ordinary PSK since there is no need for the demodulator to have a copy of the reference signal to determine the exact phase of the received signal (it is a noncoherent scheme). In exchange, it produces more erroneous demodulations. The exact requirements of the particular scenario under consideration determine which scheme is used. 61 Applications 62 Owing to PSK's simplicity, particularly when compared with its competitor quadrature amplitude modulation, it is widely used in existing technologies. The most popular wireless LAN standard, IEEE 802.11b[1][2], uses a variety of different PSKs depending on the data-rate required. At the basic-rate of 1 Mbit/s, it uses DBPSK. To provide the extended-rate of 2 Mbit/s, DQPSK is used. In reaching 5.5 Mbit/s and the full-rate of 11 Mbit/s, QPSK is employed, but has to be coupled with complementary code keying. The higher-speed wireless LAN standard, IEEE 802.11g[1][3] has eight data rates: 6, 9, 12, 18, 24, 36, 48 and 54 Mbit/s. The 6 and 9 Mbit/s modes use BPSK. The 12 and 18 Mbit/s modes use QPSK. The fastest four modes use forms of quadrature amplitude modulation. Because of its simplicity BPSK is appropriate for low-cost passive transmitters, and is used in RFID standards such as ISO 14443 which has been adopted for biometric passports, credit cards such as American Express's ExpressPay, and many other applications. Bluetooth 2 will use π / 4-DQPSK at its lower rate (2 Mbit/s) and 8-DPSK at its higher rate (3 Mbit/s) when the link between the two devices is sufficiently robust. Bluetooth 1 modulates with Gaussian minimum-shift keying, a binary scheme, so either modulation choice in version 2 will yield a higher data-rate. A similar technology, IEEE 802.15.4 (the wireless standard used by ZigBee) also relies on PSK. IEEE 802.15.4 allows the use of two frequency bands: 868–915 MHz using BPSK and at 2.4 GHz using OQPSK. Notably absent from these various schemes is 8-PSK. This is because its error-rate performance is close to that of 16-QAM — it is only about 0.5 dB better[citation needed] — but its data rate is only three-quarters that of 16-QAM. Thus 8-PSK is often omitted from standards and, as seen above, schemes tend to 'jump' from QPSK to 16-QAM (8-QAM is possible but difficult to implement). Binary phase-shift keying (BPSK) Constellation diagram for BPSK. BPSK is the simplest form of PSK. It uses two phases which are separated by 180° and so can also be termed 2-PSK. It does not particularly matter exactly where the constellation points are positioned, and in this figure they are shown on the real axis, at 0° and 180°. This modulation is the most robust of all the PSKs since it takes serious distortion to make the demodulator reach an incorrect decision. It is, however, only able to modulate at 1 bit/symbol (as seen in the figure) and so is unsuitable for high data-rate applications when bandwidth is limited. 63 Frequency-shift keying (FSK) Frequency-shift keying (FSK) is a modulation scheme in which digital information is transmitted through discrete frequency changes of a carrier wave. The most common form of frequency shift keying is 2-FSK. As suggested by the name, 2-FSK uses two discrete frequencies to transmit binary (0's and 1's) information. With this scheme, the "1" is called the mark frequency and the "0" is called the space frequency. The time domain of an FSK modulated carrier is illustrated in the figures at right. 64 One interesting facet of the 2-FSK (binary FSK) modulation scheme is that when it is generated using a quadrature modulator (see Quadrature phase), the baseband waveform consists of two sinusoids which use phase shifting to move from one symbol to the next. In this scenario, baseband I and Q signals adjust from 90 degrees to 270 degrees out of phase to mark each each symbol of the FSK baseband waveform. For that reason, the binary FSK modulation scheme is sometimes referred to as "phase reversal" as well. An example of binary FSK 65 Audio frequency-shift keying (AFSK) Audio frequency-shift keying (AFSK) is a modulation technique by which digital data is represented as changes in the frequency (pitch) of an audio tone, yielding an encoded signal suitable for transmission via radio or telephone. Normally, the transmitted audio alternates between two tones: one, the "mark", represents a binary one; the other, the "space", represents a binary zero. AFSK differs from regular frequency-shift keying in that the modulation is performed at baseband frequencies. In radio applications, the AFSK-modulated signal is normally used to modulate an RF carrier (using a conventional technique, such as AM FM or ACSSB(R)(LM Mode(R)) for transmission. AFSK is not generally used for high-speed data communications, as it is much less efficient in both power and bandwidth than most other modulation modes. In addition to its simplicity, however, AFSK has the advantage that encoded signals will pass through AC-coupled links, including most equipment originally designed to carry music or speech. 66 Applications Most early telephone-line modems used audio frequency-shift keying to send and receive data, up to rates of about 300 bits per second. The common Bell 103 modem used this technique, for example. Some early microcomputers used a specific form of AFSK modulation, the Kansas City standard, to store data on audio cassettes. AFSK is still widely used in amateur radio, as it allows data transmission through unmodified voiceband equipment. Radio control gear uses FSK, but calls it FM and PPM instead. AFSK is also used in the United States' Emergency Alert System to transmit warning information. It is used at higher bitrates for Weathercopy used on Weatheradio by NOAA in the U.S., and more extensively by Environment Canada. The CHU shortwave radio station in Ottawa, Canada broadcasts an exclusive digital time signal encoded using AFSK modulation. 67 Amplitude-shift keying (ASK) Amplitude-shift keying (ASK) is a form of modulation that represents digital data as variations in the amplitude of a carrier wave. The amplitude of an analog carrier signal varies in accordance with the bit stream (modulating signal), keeping frequency and phase constant. The level of amplitude can be used to represent binary logic 0s and 1s. We can think of a carrier signal as an ON or OFF switch. In the modulated signal, logic 0 is represented by the absence of a carrier, thus giving OFF/ON keying operation and hence the name given. Like AM, ASK is also linear and sensitive to atmospheric noise, distortions, propagation conditions on different routes in PSTN, etc. Both ASK modulation and demodulation processes are relatively inexpensive. The ASK technique is also commonly used to transmit digital data over optical fiber. For LED transmitters, binary 1 is represented by a short pulse of light and binary 0 by the absence of light. Laser transmitters normally have a fixed "bias" current that causes the device to emit a low light level. This low level represents binary 0, while a higher-amplitude lightwave represents binary 1. 68 Minimum frequency-shift keying (MSK) Minimum frequency-shift keying or minimum-shift keying (MSK) is a particularly spectrally efficient form of coherent frequency-shift keying. In MSK the difference between the higher and lower frequency is identical to half the bit rate. As a result, the waveforms used to represent a 0 and a 1 bit differ by exactly half a carrier period. This is the smallest FSK modulation index that can be chosen such that the waveforms for 0 and 1 are orthogonal. A variant of MSK called GMSK is used in the GSM mobile phone standard. FSK is commonly used in Caller ID and remote metering applications. 69 Gaussian minimum-shift keying(GMSK ) In digital communication, Gaussian minimum shift keying or GMSK is a continuous-phase frequency-shift keying modulation scheme. It is similar to standard minimum-shift keying (MSK); however the digital data stream is first shaped with a Gaussian filter before being applied to a frequency modulator. This has the advantage of reducing sideband power, which in turn reduces out-of-band interference between signal carriers in adjacent frequency channels. However, the Gaussian filter increases the modulation memory in the system and causes intersymbol interference, making it more difficult to discriminate between different transmitted data values and requiring more complex channel equalization algorithms such as an adaptive equalizer at the receiver. GMSK is most notably used in the Global System for Mobile Communications (GSM). 70 Orthogonal frequency-division multiplexing (OFDM) Orthogonal Frequency-Division Multiplexing (OFDM) — essentially identical to Coded OFDM (COFDM) — is a digital multi-carrier modulation scheme, which uses a large number of closelyspaced orthogonal sub-carriers. Each sub-carrier is modulated with a conventional modulation scheme (such as quadrature amplitude modulation) at a low symbol rate, maintaining data rates similar to conventional single-carrier modulation schemes in the same bandwidth. In practice, OFDM signals are generated and detected using the Fast Fourier transform algorithm. OFDM has developed into a popular scheme for wideband digital communication, wireless as well as over copper wires. The primary advantage of OFDM over single-carrier schemes is its ability to cope with severe channel conditions — for example, attenuation of high frequencies in a long copper wire, narrowband interference and frequency-selective fading due to multipath — without complex equalization filters. Channel equalization is simplified because OFDM may be viewed as using many slowly-modulated narrowband signals rather than one rapidly-modulated wideband signal. Low symbol rate makes the use of a guard interval between symbols affordable, making it possible to handle time-spreading and eliminate inter-symbol interference (ISI). 71 Pulse modulation methods 72 Pulse modulation schemes aim at transferring a narrowband analog signal over an analog lowpass channel as a two-level quantized signal, by modulating a pulse train. Some pulse modulation schemes also allow the narrowband analog signal to be transferred as a digital signal (i.e. as a quantized discrete-time signal) with a fixed bit rate, which can be transferred over an underlying digital transmission system, for example some line code. They are not modulation schemes in the conventional sense since they are not channel coding schemes, but should be considered as source coding schemes, and in some cases analog-to-digital conversion techniques. Pulse-code modulation (PCM) (Analog-over-digital) Pulse-width modulation (PWM) (Analog-over-analog) Pulse-amplitude modulation (PAM) (Analog-over-analog) Pulse-position modulation (PPM) (Analog-over-analog) Pulse-density modulation (PDM) (Analog-over-analog) Sigma-delta modulation (∑Δ) (Analog-over-digital) Adaptive-delta modulation (ADM)(Analog-over-digital) Direct-sequence spread spectrum (DSSS) is based on pulse-amplitude modulation. Pulse-code modulation (PCM) Pulse-code modulation (PCM) is a digital representation of an analog signal where the magnitude of the signal is sampled regularly at uniform intervals, then quantized to a series of symbols in a digital (usually binary) code. PCM has been used in digital telephone systems and is also the standard form for digital audio in computers and the compact disc red book format. It is also standard in digital video, for example, using ITU-R BT.601. However, straight PCM is not typically used for video in consumer applications such as DVD or DVR because it requires too high a bit rate (PCM audio is supported by the DVD standard but rarely used). Instead, the data are normally converted to compressed formats which approximate the PCM with lower bit rates. However, many Blu-ray Disc and HD-DVD movies use uncompressed PCM for audio. Very frequently, PCM encoding facilitates digital transmission from one point to another (within a given system, or geographically) in serial form. 73 Sampling and quantization of a signal (red) for 4-bit PCM In the Diagram, a sine wave (red curve) is sampled and quantized for PCM. The sine wave is sampled at regular intervals, shown as ticks on the x-axis. For each sample, one of the available values (ticks on the y-axis) is chosen by some algorithm (in this case, the floor function is used). This produces a fully discrete representation of the input signal (shaded area) that can be easily encoded as digital data for storage or manipulation. For the sine wave example at right, we can verify that the quantized values at the sampling moments are 9, 11, 12, 13, 14, 14, 15, 15, 15, 14, etc. Encoding these values as binary numbers would result in the following set of nibbles: 1001, 1011, 1100, 1101, 1110, 1110, 1111, 1111, 1111, 1110, etc. These digital values could then be further processed or analyzed by a purpose-specific digital signal processor or general purpose CPU. Several Pulse Code Modulation streams could also be multiplexed into a larger aggregate data stream, generally for transmission of multiple streams over a single physical link. This technique is called time-division multiplexing, or TDM, and is widely used, notably in the modern public telephone system. 74 History of PCM 75 In retrospect, PCM, like many other great inventions, appears to be simple and obvious. In the history of electrical communications, the earliest reason for sampling a signal was to interlace samples from different telegraphy sources, and convey them over a single telegraph cable. Telegraph time-division multiplexing (TDM) was conveyed as early as 1853, by the American inventor M.B. Farmer. The electrical engineer W.M. Miner, in 1903, used an electro-mechanical commutator for time-division multiplex of multiple telegraph signals, and also applied this technology to telephony. He obtained intelligible speech from channels sampled at a rate above 3500–4300 Hz: below this was unsatisfactory. This was TDM, but pulse-amplitude modulation (PAM) rather than PCM. Paul M. Rainey of Western Electric in 1926 patented a facsimile machine using an optical mechanical analog to digital converter.The machine did not go into production. British engineer Alec Reeves, unaware of previous work, conceived the use of PCM for voice communication in 1937 while working for International Telephone and Telegraph in France. He described the theory and advantages, but no practical use resulted. Reeves filed for a French patent in 1938, and his U.S. patent was granted in 1943. The first transmission of speech by digital techniques was the SIGSALY vocoder encryption equipment used for high-level Allied communications during World War II from 1943. It was not until about the middle of 1943 that the Bell Labs people who designed the SIGSALY system, became aware of the use of PCM binary coding as already proposed by Alec Reeves. PCM in the 1950s used a cathode-ray coding tube with a grid having encoding perforations. As in an oscilloscope, the beam was swept horizontally at the sample rate while the vertical deflection was controlled by the input analog signal, causing the beam to pass through higher or lower portions of the perforated grid. The grid interrupted the beam, producing current variations in binary code. Rather than natural binary, the grid was perforated to produce Gray code lest a sweep along a transition zone produce glitches. Trellis Coded Modulation(TCM) In telecommunication, trellis modulation (also known as trellis coded modulation, or simply TCM) is a modulation scheme which allows highly efficient transmission of information over band-limited channels such as telephone lines. Trellis modulation was invented by Gottfried Ungerboeck. In the late 1980s, modems operating over plain old telephone service ("POTS") typically achieved 9.6 kbit/s by employing 4 bits per symbol QAM modulation at 2400 baud (symbols/second). This bit rate ceiling existed despite the best efforts of many researchers, and some engineers predicted that without a major upgrade of the public phone infrastructure, the maximum achievable rate for a POTS modem might be 9.6k for two-way communication. However, 9.6 kbit/s is only 30% of the theoretical maximum bit rate predicted by Shannon's Theorem for POTS lines (approximately 35 kbit/s). 76 A new modulation method 77 The name "trellis" was coined because a state diagram of the technique, when drawn on paper closely resembles the trellis lattice used in rose gardens. The scheme is basically a convolutional code of rates (r,r+1). Ungerboeck's unique contribution is to apply the parity check on a per symbol basis instead of the older technique of applying it to the bit stream then modulating the bits. The key idea he termed Mapping by Set Partitions. This idea was to group the symbols in a tree like fashion then separate them into two limbs of equal size. At each limb of the tree, the symbols were further apart. Although in multi-dimensions, it is hard to visualize, a simple one dimension example illustrates the basic procedure. Suppose the symbols are located at [1,2,3,4,...]. Then take all odd symbols and place them in one group, and the even symbols in the second group. This is not quite accurate because Ungerboeck was looking at the two dimensional problem, but the principle is the same, take every other one for each group and repeat the procedure for each tree limb. He next described a method of assigning the encoded bit stream onto the symbols in a very systematic procedure. Once this procedure was fully described, his next step was to program the algorithms into a computer and let the computer search for the best codes. The results were astonishing. Even the most simple code (4 state) produced error rates nearly 1000 times lower than an equivalent uncoded system. For two years Ungerboeck kept these results private and only conveyed them to close colleagues. Finally, in 1982, Ungerboeck published a paper describing the principles of trellis modulation. A flurry of research activity ensued, and by 1990 the International Telecommunication Union had published modem standards for the first trellis-modulated modem at 14.4 kbit/s (2400 baud and 6 bits per symbol). Over the next several years further advances in encoding, plus a corresponding symbol rate increase from 2400 to 3429 baud, allowed modems to achieve rates up to 34.3 kbit/s (limited by maximum power regulations to 33.8k). Today, the most common trellis-modulated V.34 modems use a 4-dimensional set partition which is achieved by treating two 2-dimensional symbols as a single lattice. This set uses 8, 16, or 32 state convolutional codes to squeeze the equivalent of 6 to 10 bits into each symbol sent by the modem (example: 2400 baud * 8 bits/symbol == 19,200 bits per second). Once manufacturers introduced modems with trellis modulation, transmission rates increased to the point where interactive transfer of multimedia over the telephone became feasible (a 200 kilobyte image and a 5 megabyte song could be downloaded in less than 1 minute and 30 minutes, respectively). Sharing a floppy disk via a BBS could be done in just a few minutes, instead of an hour. Thus Ungerboeck's invention played a key role in the Information Age. Pulse-width modulation (PWM) An example of PWM: the supply voltage (blue) modulated as a series of pulses results in a sine-like flux density waveform (red) in a magnetic circuit of electromagnetic actuator. The smoothness of the resultant waveform can be controlled by the width and number of modulated impulses (per given cycle) Pulse-width modulation (PWM) of a signal or power source involves the modulation of its duty cycle, to either convey information over a communications channel or control the amount of power sent to a load. 78 Pulse-amplitude modulation(PAM) Principle of PAM; (1) original Signal, (2) PAM-Signal, (a) Amplitude of Signal, (b) Time 79 Pulse-amplitude modulation, acronym PAM, is a form of signal modulation where the message information is encoded in the amplitude of a series of signal pulses. Example: A two bit modulator (PAM-4) will take two bits at a time and will map the signal amplitude to one of four possible levels, for example −3 volts, −1 volt, 1 volt, and 3 volts. Demodulation is performed by detecting the amplitude level of the carrier at every symbol period. Pulse-amplitude modulation is widely used in baseband transmission of digital data, with nonbaseband applications having been largely superseded by pulse-code modulation, and, more recently, by pulse-position modulation. In particular, all telephone modems faster than 300 bit/s use quadrature amplitude modulation (QAM). (QAM uses a two-dimensional constellation). It should be noted, however, that the widely popular Ethernet communication standard is a good example of PAM usage. In particular, 100BASE-T2 (running at 100Mb/s) Ethernet medium is utilizing 5 level PAM modulation running at 25 megapulses/sec over two wire pairs. A special technique is used to reduce inter-symbol interference between the unshielded pairs. Later, 1000BASE-T medium raised the bar to use 4 pairs of wire running each at 125 megapulses/sec to achieve 1000Mb/s data rates, still utilizing PAM-5 for each pair. The IEEE 802.3an standard defines the wire-level modulation for 10GBASE-T as a Tomlinson-Harashima Precoded (THP) version of pulse-amplitude modulation with 16 discrete levels (PAM-16), encoded in a two-dimensional checkerboard pattern known as DSQ128. Several proposals were considered for wire-level modulation, including PAM with 12 discrete levels (PAM-12), 10 levels (PAM-10), or 8 levels (PAM-8), both with and without Tomlinson-Harashima Precoding (THP). To achieve full-duplex operation, parties must ensure that their transmitted pulses do not coincide in time. This makes use of bus topology (featured by older Ethernet implementations) practically impossible with these modern Ethernet mediums. This technique is called Carrier Sense Multiple Access and is used in some home networking protocols such as HomePlug. More modern protocols use Time Division Multiple Access instead, which performs better under heavy traffic loading conditions. 80 Digital baseband modulation or line coding The term digital baseband modulation is synonymous to line codes, which are methods to transfer a digital bit stream over an analog lowpass channel using a discrete number of signal levels, by modulating a pulse train (a square wave instead of a sinusoidal waveform). Common examples are unipolar, non-return-to-zero (NRZ), Manchester and alternate mark inversion (AMI) coding. 81 modulator 1) Group the incoming data into codewords; 2) Map the codewords to attributes, for example amplitudes of the I and Q signals (the 82 equivalent low pass signal), or frequency or phase values. 3) Adapt pulse shaping or some other filtering to limit the bandwidth and form the spectrum, typically using digital signal processing 4) Digital-to-analog conversion (DAC) of the I and Q signals (since today all of the above is normally achieved using digital signal processing, DSP). Sometimes the next step is also achieved using DSP, and then the DAC should be done after that. 5) Modulate the high-frequency carrier waveform, resulting in that the equivalent low pas signal is frequency shifted into a modulated passband signal or RF signal 6) Amplification and analog bandpass filtering to avoid harmonic distortion and periodic spectrum Demodulator 83 1)Bandpass filtering 2)Automatic gain control, AGC (to compensate for attenuation) 3)Frequency shifting of the RF signal baseband I and Q signals, or to an intermediate frequency (IF) signal, or 4)Sampling and analog-to-digital conversion (ADC) (Sometimes before the above point) 5)Equalization filtering 6)Detection of the amplitudes of the I and Q signals, or the frequency or phase of the IF signal; 7)Quantization of the amplitudes, frequencies or phases to the nearest allowed values, using mapping. 8)Map the quantized amplitudes, frequencies or phases to codewords (bit groups); 9)Parallel-to-serial conversion of the codewords into a bit stream 10)Pass the resultant bit stream on for further processing such as removal of any error-correcting codes. Summation + 84 = Multiplication 85 Summation + 86 Wireless Basics 87 Wireless Lan One type of wireless network is a WLAN or Wireless Local Area Network. Similar to other wireless devices, it uses radio instead of wires to transmit data back and forth between computers on the same network. Screenshots of wireless LAN Networks. Figure 1, left, shows that not all networks are encrypted (locked unless you have the code), which means anyone can get onto them. Figures 2 and 3, middle and right, however, show that a lot of networks are encrypted. Wi-Fi Wi-Fi is a commonly used wireless network in computer systems which enable connection to the internet or other machines that have Wi-Fi functionalities. Wi-Fi networks broadcast radio waves that can be picked up by WiFi receivers that are attached to different computers. Fixed Wireless Data Fixed wireless data is a type of wireless data network that can be used to connect two or more buildings together in order to extend or share the network bandwidth without physically wiring the buildings together. Wireless Man A type of wireless network that connects several Wireless LANs. WiMax WiMAX is the term used to refer to wireless MANs. ISM band 88 The industrial, scientific and medical (ISM) radio bands were originally reserved internationally for the use of RF electromagnetic fields for industrial, scientific and medical purposes other than communications. In general, communications equipment must accept any interference generated by ISM equipment The ISM bands are defined by the ITU-R in 5.138, 5.150, and 5.280 of the Radio Regulations. Individual countries' use of the bands designated in these sections may differ due to variations in national radio regulations. Because communication devices using the ISM bands must tolerate any interference from ISM equipment, these bands are typically given over to uses intended for unlicensed operation, since unlicensed operation typically needs to be tolerant of interference from other devices anyway. In the United States of America ISM uses of the ISM bands are governed by Part 18 of the FCC rules, while Part 15 Subpart B contains the rules for unlicensed communication devices, even those that use the ISM frequencies. Thus, designers of equipment for use in the United States in the ISM bands should be familiar with the relevant portions of both Part 18 and Part 15 Subpart B of the FCC Rules. ITU regions 89 The International Telecommunication Union (ITU), in its International Radio Regulations, divides the world into three ITU regions for the purposes of managing the global radio spectrum. Each region has its own set of frequency allocations, the main reason for defining the regions. Region 1 comprises Europe, Greenland, Africa, the Middle East west of the Persian Gulf and including Iraq, the former Soviet Union and Mongolia. Region 2 covers the Americas but Greenland and some of the eastern Pacific Islands. Region 3 contains most of non-former-Soviet-Union Asia, east of and including Iran, and most of Oceania. Beamwidth The main lobe, or main beam, of an antenna radiation pattern is the lobe containing the maximum power. This is the lobe that exhibits the greatest field strength. The horizontal radiation pattern, that which is plotted as a function of azimuth about the antenna, is usually specified. The width of the main lobe is usually specified as the angle encompassed between the points where the power has fallen 3 dB below the maximum value. The vertical radiation pattern, that which is plotted as a function of elevation from a specified azimuth, is also of interest and may be similarly specified. This article contains material from the Federal Standard 1037C (in support of MIL-STD-188), which, as a work of the United States Government, is in the public domain 90 Wireless Standars Standard Release Date Operation Frequency Throughput Data Rate Modulation 802.11a 1999 5 GHz 23 Mbit/s 54 Mbit/s OFDM 802.11b 1999 2.4 GHz 4.3 Mbit/s 11 Mbit/s DSSS 802.11g 2003 2.4 GHz 74 Mbit/s 54 Mbit/s OFDM 802.11n Sept 2008 2.4 GHz & 5 GHz 74 Mbit/s 248 Mbit/s MIMO 802.11y March 2008 3.7 GHz 23 Mbit/s 54 Mbit/s QPSK 802.16 Bluetooth 91 2 GHz to 66 GHz 2003-2004 2.4 to 2.485 GHz OFDMaA 721 Kbps V1.2 1Mbps V2.0 3Mbps GFSK 802.11a The 802.11a standard uses the same core protocol as the original standard, operates in 5 GHz band with a maximum raw data rate of 54 Mbit/s, which yields realistic net achievable throughput in the mid-20 Mbit/s. Since the 2.4 GHz band is heavily used to the point of being crowded, using the relatively un-used 5 GHz band gives 802.11a a significant advantage. However, this high carrier frequency also brings a slight disadvantage: The effective overall range of 802.11a is slightly less than that of 802.11b/g; 802.11a signals cannot penetrate as far as those for 802.11b because they are absorbed more readily by walls and other solid objects in their path. 92 802.11b 802.11b has a maximum raw data rate of 11 Mbit/s and uses the same media access method defined in the original standard. 802.11b products appeared on the market in early 2000, since 802.11b is a direct extension of the modulation technique defined in the original standard. The dramatic increase in throughput of 802.11b (compared to the original standard) along with simultaneous substantial price reductions led to the rapid acceptance of 802.11b as the definitive wireless LAN technology. 802.11b devices suffer interference from other products operating in the 2.4 GHz band. Devices operating in the 2.4 GHz range include: microwave ovens, Bluetooth devices, baby monitors and cordless telephones. Interference issues, and user density problems within the 2.4 GHz band have become a major concern and frustration for users. 93 802.11g In June 2003, a third modulation standard was ratified: 802.11g. This works in the 2.4 GHz band (like 802.11b) but operates at a maximum raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput. 802.11g hardware is fully backwards compatible with 802.11b hardware. The then-proposed 802.11g standard was rapidly adopted by consumers starting in January 2003, well before ratification, due to the desire for higher speeds, and reductions in manufacturing costs. By summer 2003, most dual-band 802.11a/b products became dual-band/tri-mode, supporting a and b/g in a single mobile adapter card or access point. Details of making b and g work well together occupied much of the lingering technical process; in an 802.11g network, however, the presence of a legacy 802.11b participant will significantly reduce the speed of the overall 802.11g network. 802.11g devices suffer interference from other products operating in the 2.4 GHz band. Devices operating in the 2.4 GHz range include: microwave ovens, Bluetooth devices, baby monitors and cordless telephones. Interference issues, and user density problems within the 2.4 GHz band have become a major concern and frustration for users. 94 95 802.11n 802.11n is a proposed amendment which builds on the previous 802.11 standards by adding multiple-input multiple-output (MIMO). Though there are already many products on the market based on Draft 2.0 of this proposal, the TGn workgroup is not expected to finalize the amendment until November 2008. An 802.11 access point may operate in one of three modes: Legacy (only 802.11a, and b/g) Mixed (802.11a, b/g, and n) Greenfield (only 802.11n) - maximum performance 96 802.11y The US 3650MHz rules allow for registered stations to operate at much higher power than traditional Wi-Fi gear (Up to 20 watts equivalent isotropically radiated power). The combination of higher power limits and enhancements made to the MAC timing in 802.11-2007, will allow for the development of standards based 802.11 devices that could operate at distances of 5km or more. IEEE 802.11y adds three new concepts to 802.11-2007: Contention based protocol (CBP)- enhancements have been made to the carrier sensing and energy detection mechanisms of 802.11 in order to meet the FCC's requirements for a contention based protocol. Extended channel switch announcement (ECSA)- provides a mechanism for an access point to notify the stations connected to it of its intention to change channels or to change channel bandwidth. This mechanism will allow for the WLAN to continuously choose the channel that is the least noisy and the least likely to cause interference. This mechanism will also be used in 802.11n, which will allow devices to switch between .11y operation and .11n operation in the 2.4 and 5 GHz bands. 97 98 Dependent station enablement (DSE)- is the mechanism by which an operator extends and retracts permission to license exempt devices (referred to as dependent STAs in .11y) to use licensed radio spectrum. Fundamentally, this process satisfies a regulatory requirement that dictates that a dependent STAs operation is contingent upon its ability to receive periodic messages from a licensees base station, but DSE is extensible to other purposes in regards to channel management and coordination. Some of the benefits of DSE include: -The enabling station (aka the licensee's base station) may or may not be the access point that the dependent STA connects to. In fact, an enabling station may enable both an access point and its clients. Also, although the dependent STAs are required by regulation to receive information from the enabling station over the air, they are not required transmit over the air to complete the DSE process. A dependent STA may connect to a nearby Access Point for a short period of time and use the internet or some other means to complete the channel permissioning process with the enabling station. This flexibility reduces the likelihood of a dependent STA causing interference while attempting to connect to a far off enabling station. -The personal privacy and security of end users are ensured while, at the same time, licensees will have the information necessary to resolve disputes. All .11y devices transmit a unique identifier for the purpose of resolving interference. The high powered fixed stations and enabling stations transmit the location that they are operating from as their unique identifier. This location is also registered in an FCC database that will identify the licensee. The dependent STAs broadcast the location of the station that enabled it plus a unique string supplied by the enabling station. This ensures that the responsible party, the licensee, is contacted to resolve disputes. This mechanism also alleviates the problems associated with having the dependent STA broadcasting its location. Requiring all devices to have GPS or some other means of verifying their location would increase the cost and complexity of devices, and this solution may be inadequate indoors. This method also resolves fears that a mobile devices that constantly beacons its location could be used inappropriately by third parties to track a users location. 802.16 99 The first 802.16 standard was approved in December 2001. It delivered a standard for point to multipoint Broadband Wireless transmission in the 10-66 GHz band, with only a line-of-sight (LOS) capability. It uses a single carrier (SC) physical (PHY) standard. 802.16a was an amendment to 802.16 and delivered a point to multipoint capability in the 2-11 GHz band. For this to be of use, it also required a non line-of-sight (NLOS) capability, and the PHY standard was therefore extended to include Orthogonal Frequency Division Multiplex (OFDM) and Orthogonal Frequency Division Multiple Access (OFDMA). 802.16a was ratified in January 2003 and was intended to provide "last mile" fixed broadband access. 802.16c, a further amendment to 802.16, delivered a system profile for the 10-66 GHz 802.16 standard. In September 2003, a revision project called 802.16d commenced aiming to align the standard with aspects of the European Telecommunications Standards Institute (ETSI) HIPERMAN standard as well as lay down conformance and test specifications. This project concluded in 2004 with the release of 802.16-2004 which superseded the earlier 802.16 documents, including the a/b/c amendments. An amendment to 802.16-2004, IEEE 802.16e-2005 (formerly known as IEEE 802.16e), addressing mobility, was concluded in 2005. This implemented a number of enhancements to 802.16-2004, including better support for Quality of Service and the use of Scalable OFDMA, and is sometimes called “Mobile WiMAX”, after the WIMAX forum for interoperability. Amendments in progress 100 Active amendments: 802.16e-2005 — Mobile 802.16 802.16f-2005 — Management Information Base 802.16g-2007 — Management Plane Procedures and Services 802.16k-2007 — Bridging of 802.16 (an amendment to 802.1D) Amendments under development: 802.16h — Improved Coexistence Mechanisms for License-Exempt Operation 802.16i — Mobile Management Information Base 802.16j — Multihop Relay Specification 802.16Rev2 — Consolidate 802.16-2004, 802.16e, 802.16f, 802.16g and possibly 802.16i into a new document. Amendments at pre-draft stage: 802.16m — Advanced Air Interface. Data rates of 100 Mbit/s for mobile applications and 1 Gbit/s for fixed applications, cellular, macro and micro cell coverage, with currently no restrictions on the RF bandwidth (which is expected to be 20 MHz or higher).[1] The proposed work plan would allow completion of the standard by Sept 2008 for approval by Dec 2008. Radio Devices Some Brands Senao Micronet Teletronics Alcon Proxim Lobometric Motorola(Ortogon) Dragonwave Ericsson Siemens Nokia 101 Sight Survay(propagation) Line-of-sight Non-line-of-sight Near-line-of-sight 102 Line-of-sight propagation 103 Line-of-sight propagation refers to electro-magnetic radiation or electro-magnetic waves travelling in a straight line. The rays or waves are deviated or reflected by obstructions and cannot travel over the horizon or behind obstacles. Beyond that, material disperses the rays respectively the energy of the waves. Radio signals, like all electromagnetic radiation, travel in straight lines. At low frequencies (below approximately 2 MHz or so) ground effect transmission causes significant diffraction, allowing photons to partially follow the Earth's curvature along multiply deflected straight lines, thus enabling AM radio signals in low-noise environments to be received well after the transmitting antenna has dropped below the horizon. Additionally, frequencies between approximately 1 and 30 MHz, can be reflected by the F1/F2 Layer, thus giving radio transmissions in this range a potentially global reach (see shortwave radio), again along multiply deflected straight lines. However, electro-magnetic radiation never propagates other but along straight lines. Just the effects of multiple diffraction or deflection serve for macroscopically "quasi-curved paths". However, at higher frequencies and in lower levels of the atmosphere, neither of these effects apply. Thus any obstruction between the transmitting antenna and the receiving antenna will block the signal, just like the light that the eye senses. Therefore, as the ability to visually sight a transmitting antenna (with regards to the limitations of the eye's resolution) roughly corresponds with the ability to receive a signal from it, the propagation characteristic of high-frequency radio is called "line-of-sight" as per radio wave propagation is called as "radio horizon". In practice, the propagation characteristics of these radio waves vary substantially depending on the exact frequency and the strength of the transmitted signal (a function of both the transmitter and the antenna characteristics). Broadcast FM radio, at comparatively low freqencies of around 100 MHz using immensely-powerful transmitters, easily propagates through buildings and forests. Non-line-of-sight (NLOS) or near-line-of-sight 104 Many types of radio transmissions depend, to varying degrees, on line of sight between the transmitter and receiver. Obstacles that commonly cause NLOS conditions include buildings, trees, hills, mountains, and, in some cases, high voltage electric power lines. Some of these obstructions reflect certain radio frequencies, while some simply absorb or garble the signals; but, in either case, they limit the use of many types of radio transmissions, including most of those used for Wi-Fi. How to achieve effective NLOS networking has become one of the major questions of modern computer networking. Currently, the most common method for dealing with NLOS conditions on wireless computer networks is simply to place relays at additional locations, sending the content of the radio transmission around the obstructions. Some more advanced NLOS transmission schemes now use multipath signal propagation, bouncing the radio signal off other nearby objects to get to the receiver. Non Line-of-Sight (NLOS) is a term often used in radio communications to describe a radio channel or link where there is no visual line of sight (LOS) between the transmitting antenna and the receiving antenna. In this context LOS is taken either as a straight line free of any form of visual obstruction, even if it is actually too distant to see with the unaided human eye as a virtual LOS i.e. as a straight line through visually obstructing material, thus leaving sufficient transmission for radio waves to be detected. 105 There are many electrical characteristics of the transmission media that affect the radio wave propagation and therefore the quality of operation of a radio channel, if it is possible at all, over an NLOS path. The acronym NLOS has become more popular in the context of wireless local area networks (WLANs) such as WiFi and WiMax because the capability of such links to provide a reasonable level of NLOS coverage greatly improves their marketability and versatility in the typical urban environments in which they are most frequently used. However NLOS contains many other subsets of radio communications. The influence of a visual obstruction on a NLOS link may be anything from negligible to complete suppression. An example might apply to a LOS path between a television broadcast antenna and a roof mounted receiving antenna. If a cloud passed between the antennas the link could actually become NLOS but the quality of the radio channel could be virtually unaffected. If, instead, a large building was constructed in the path making it NLOS, the channel may be impossible to receive. NLOS links may either be simplex (transmission is in one direction only), duplex (transmission is in both directions simultaneously) or half-duplex (transmission is possible in both directions but not simultaneously). Under normal conditions all radio links including NLOS are reciprocal which means that the effects of the propagation conditions on the radio channel are identical whether it operates in simplex, duplex or half-duplex. Fresnel zone Fresnel zone. d is the distance between the transmitter and the receiver, b is the radius of the Fresnel zone. In optics and radio communications, a Fresnel zone (pronounced FRA-nel Zone), named for physicist Augustin-Jean Fresnel, is one of a (theoretically infinite) number of concentric ellipsoids of revolution which define volumes in the radiation pattern of a (usually) circular aperture. Fresnel zones result from diffraction by the circular aperture. The cross section of the first Fresnel zone is circular. Subsequent Fresnel zones are annular in cross section, and concentric with the first. To maximize receiver strength, one needs to minimize the effect of the out of phase signals by removing obstacles from the RF Line of Sight (RF LoS). The strongest signals are on the direct line between transmitter and receiver and always lie in the 1st Fresnel Zone. 106 Several examples of how the Fresnel zone can be disrupted. where, Fn = The nth Fresnel Zone radius in metres d1 = The distance of P from one end in metres d2 = The distance of P from the other end in metres λ = The wavelength of the transmitted signal in metres 107 The cross section radius of the first Fresnel zone is the highest in the center of the RF LoS which can be calculated as: where r = radius in metres D = total distance in kilometres f = frequency transmitted in gigahertz. 108 SNR(Signal-to-noise ratio) Signal-to-noise ratio (often abbreviated SNR or S/N) is an electrical engineering concept, also used in other fields (such as scientific measurements, biological cell signaling and oral lore), defined as the ratio of a signal power to the noise power corrupting the signal. In less technical terms, signal-to-noise ratio compares the level of a desired signal (such as music) to the level of background noise. The higher the ratio, the less obtrusive the background noise is. 109 Technical sense In engineering, signal-to-noise ratio is a term for the power ratio between a signal (meaningful information) and the background noise: where P is average power and A is RMS amplitude. Both signal and noise power (or amplitude) must be measured at the same or equivalent points in a system, and within the same system bandwidth. Because many signals have a very wide dynamic range, SNRs are usually expressed in terms of the logarithmic decibel scale. In decibels, the SNR is, by definition, 10 times the logarithm of the power ratio. If the signal and the noise is measured across the same impedance then the SNR can be obtained by calculating 20 times the base-10 logarithm of the amplitude ratio: 110 Antenna types Solid(Dish) Parabilic Grid Omni Yagi 111 Omni Directional Antenna 112 Omni Radiation Pattern 113 Parabolic Antenna(Grid) 114 Parabolic Antenna(Grid) 115 Parabolic Antenna(Solid) 116 Parabolic Radiation Pattern 117 Yagi Antenna 118 Yagi Antenna 119 Yagi Radiation Pattern 120 Yagi Radiation Pattern 121 RF connector 122 An RF connector is an electrical connector designed to work at radio frequencies in the multimegahertz range. RF connectors are typically used with coaxial cables and are designed to maintain the shielding that the coaxial design offers. Better models also minimize the change in transmission line impedance at the connection. Mechanically they provide a fastening mechanism (thread, bayonet, braces, push pull) and springs for a low ohmic electric contact while sparing the gold surface thus allowing above 1000 reconnects and reducing the insertion force. research activity in the area of radio-frequency (RF) circuit design has surged in the last decade in direct response to the enormous market demand for inexpensive, high data rate wireless transceivers. RF Connectors 123 N type RF Connector (Pic Tail) 124 Power When referring to measurements of power or intensity, a ratio can be expressed in decibels by evaluating ten times the base10 logarithm of the ratio of the measured quantity to the reference level. Thus, XdB is calculated using the formula: 125 Converting X(w) to X(db) 126 dBm dB(mW) — power relative to 1 milliwatt. dBμ or dBu dB(μV/m) — electric field strength relative to 1 microvolt per metre. dBf dB(fW) — power relative to 1 femtowatt dBW dB(W) — power relative to 1 watt. dBk dB(kW) — power relative to 1 kilowatt. 127 Commercial Satellites Orbit 1) Geosynchronous Orbit (GEO) 2) Medium Earth Orbit (MEO) 3) Low Earth Orbit (LEO) 128 1) Geosynchronous Orbit (GEO): 35,786 km above the earth Orbiting at the height of 22,282 miles above the equator (35,786 km), the satellite travels in the same direction and at the same speed as the Earth's rotation on its axis, taking 24 hours to complete a full trip around the globe. Thus, as long as a satellite is positioned over the equator in an assigned orbital location, it will appear to be "stationary" with respect to a specific location on the Earth. A single geostationary satellite can view approximately one third of the Earth's surface. If three satellites are placed at the proper longitude, the height of this orbit allows almost all of the Earth's surface to be covered by the satellites. 129 Medium Earth Orbit (MEO): 8,000-20,000 km above the earth These orbits are primarily reserved for communications satellites that cover the North and South Pole Unlike the circular orbit of the geostationary satellites, MEO's are placed in an elliptical (oval-shaped) orbit 130 Low Earth Orbit (LEO): 500-2,000 km above the earth These orbits are much closer to the Earth, requiring satellites to travel at a very high speed in order to avoid being pulled out of orbit by Earth's gravity At LEO, a satellite can circle the Earth in approximately one and a half hours 131 What’s DSL DSL or xDSL, is a family of technologies that provide digital data transmission over the wires of a local telephone network. DSL originally stood for digital subscriber loop, although in recent years, many[attribution neededhave adopted digital subscriber line as a more marketing-friendly term for the most popular version of consumer-ready DSL, ADSL. Typically, the download speed of consumer DSL services ranges from 256 kilobits per second (kbit/s) to 24,000 kbit/s, depending on DSL technology, line conditions and service level implemented. Typically, upload speed is lower than download speed for Asymmetric Digital Subscriber Line (ADSL) and equal to download speed for Symmetric Digital Subscriber Line (SDSL). 132 ADSL 133 Voice and data Some variants of DSL connections, like ADSL and very high speed DSL (VDSL), typically work by dividing the frequencies used in a single phone line into two primary 'bands'. The ISP data is carried over the high frequency band (25 kHz and above) whereas the voice is carried over the lower frequency band (4 kHz and below). (See the ADSL article on how the high frequency band is subdivided). The user typically installs a DSL filter on each phone. This filters out the high frequencies from the phone, so that the phone only sends or receives the lower frequencies (the human voice), creating two independent 'bands'. Thus the DSL modem and the phone can simultaneously use the same phone line without interfering with each other. 134 Transmission methods 2B1Q: Two-binary, one-quaternary, used for IDSL and HDSL CAP: Carrierless Amplitude Phase Modulation - deprecated in 1996 for ADSL, used for HDSL DMT: Discrete Multitone Modulation, the most numerous kind, otherwise known as OFDM OFDM: Orthogonal Frequency-Division Multiplexing 135 Type Of DSL 136 DSL Type Description IDSL ISDN Digital Subscriber Line CDSL Consumer DSL from Rockwell HDSL High bit-rate Digital Subscriber Line SHDSL Symmetric High bit-rate Digital Subscriber Line ADSL Asymmetric Digital Subscriber Line SDSL Symmetric Digital Subscriber Line UDSL Unidirectional DSL proposed by a company in Europe VDSL Very high Digital Subscriber Line Data Rate 137 Difference between ADSL and ADSL2+ ADSL ADSL stands for Asymmetric Digital Subscriber Line service. It is called asymmetric because the download and upload speeds are not symmetrical (download is faster than upload). ADSL2 ADSL2 (ITU G.992.3 and G.992.4) adds new features and functionality targeted at improving performance and interoperability and adds support for new applications and services. Among the changes are improvements in ADSL's data rate, an increase in the distance ADSL can reach from the local telephone exchange, dynamic data rate adaptation, better resistance to noise, diagnostics, and a stand-by mode to save power. ADSL2 also reduces the initialisation time from more than 10 seconds (as is required for ADSL) to less than 3 seconds. ADSL2 has the same signal footprint as ADSL. ADSL2+ ADSL2+ (ITU G.992.5) doubles the bandwidth used for downstream data transmission, effectively doubling the maximum downstream data rates, and achieving rates of 20 Mbps on telephone lines as long at 5,000 feet. ADSL2+ solutions will interoperate with ADSL and ADSL2, as well as with ADSL2+. ADSL2+ will include all the feature and performance benefits of ADSL2 while maintaining the capability to interoperate with legacy ADSL equipment. 138 Leased Line A leased line is a symmetric telecommunications line connecting two locations. It is sometimes known as a 'Private Circuit' or 'Data Line' in the UK. Unlike traditional PSTN lines it does not have a telephone number, each side of the line being permanently connected to the other. Leased lines can be used for telephone, data or Internet services. Some are ringdown services, and some connect two PBXes. A permanent telephone connection between two points set up by a telecommunications common carrier. Typically, leased lines are used by businesses to connect geographically distant offices. Unlike normal dial-up connections, a leased line is always active. The fee for the connection is a fixed monthly rate. The primary factors affecting the monthly fee are distance between end points and the speed of the circuit. Because the connection doesn't carry anybody else's communications, the carrier can assure a given level of quality. For example, a T-1 channel is a type of leased line that provides a maximum transmission speed of 1.544 Mbps.You can divide the connection into different lines for data and voice communication or use the channel for one high speed data circuit. Dividing the connection is called multiplexing. Increasingly, leased lines are being used by companies, and even individuals, for Internet access because they afford faster data transfer rates and are cost-effective if the Internet is used heavily. 139 Leased Line Modems 140 141 Mohammad Zargari 142