Professional Documents
Culture Documents
Technical Journal
An Independent Analysis of Current
Esmael Dinan, PhD, and Aleksey A. Kurochkin 73 The Impacts of Antenna Azimuth and Tilt Installation Accuracy
on UMTS Network Performance
Volume 4, No. 1
2006
Buenos Aires London (Hammersmith Rd.) Rio de Janeiro Tysons Corner, Virginia
Procurement
Tel: (54-11) 4315-8000 Tel: (44-208) 846-5111 Tel: (55-21) 2579-2400 Tel: (1-703) 748-9300
and Contracting Fax: (54-11) 4315-0081 Fax: (44-208) 846-6940 Fax: (55-21) 2579-2413 Fax: (1-703) 748-9442
Although reasonable efforts have been made to check the papers included in the BTTJ, this publication should not
be interpreted as a representation or warranty by Bechtel Corporation of the accuracy of the information contained
in any paper, and readers should not rely on any paper for any particular application of any technology without
professional consultation as to the circumstances of that application. Similarly, the authors and Bechtel Corporation
T ELECOMMUNICATIONS disclaim any intent to endorse or disparage any particular vendors of any technology.
I
t is with great pleasure that we bring you this latest issue of the Bechtel Telecommunications
Technical Journal (BTTJ). The BTTJ is a compilation of expert commentaries on global operational
issues important to wireless and wireline telecommunications systems operators.
This issue leads off with an interesting historical analysis of the impact in the United States of the Bell
Laboratories divestiture in the mid-1980s. Entitled “Telecommunications Research and Development
in the United States: A State of Crisis?,” the paper is not so much operationally focused as it is a
discussion of the importance of maintaining substantial emphasis on long-term telecommunications
research for the benefit of the global society. You’ll also find a paper by Peter Moskal and
Krishnamurthy Raghu entitled “ANSI/TIA Standard 222 – Structural Standard for Antenna
Supporting Structures and Antennas: A Comparison of Revisions F and G.” This paper is a significant
technical discussion of the importance of structural and mechanical standards for antenna
support structures.
This is the second issue in which we have invited guest authors to contribute. Dr. Jungnam Yun of
the POSDATA America R&D Center in Santa Clara, California, and Professor Mohsen Kavehrad,
PhD, of The Pennsylvania State University Center for Information and Communications Technology
Research in University Park, Pennsylvania, have collaborated on a very insightful technical
discussion of “PHY/MAC Cross-Layer Issues in Mobile WiMAX.” The paper provides an overview
of mobile WiMAX, especially on OFDMA/TDD systems, and addresses issues that need to be
resolved to increase throughput, cell coverage, and spectral efficiency.
My congratulations and sincere appreciation are extended to this issue’s authors and contributors.
A special level of gratitude goes to Dr. Rasoul Safavian, vice president of Technology, Americas
Regional Business Unit, for accepting the responsibility of editor-in-chief. Dr. Safavian brings
extensive technical knowledge and industry expertise to the BTTJ.
Thank you for your interest and your continued support. We encourage and welcome your
comments regarding the topics chosen. You can submit comments and suggestions for improving
the BTTJ by visiting the Bechtel Telecommunications Web site and clicking on the BTTJ
“Contact Us” section. Past issues can be downloaded from our technology Web site at
www.bechteltelecoms.com/jsp/labs/pubs.jsp.
May your new year be safe, productive, and prosperous.
Sincerely,
Jake MacLeod
Principal Vice President and Chief Technology Officer
Bechtel Telecommunications
W
elcome to the latest issue of the BTTJ! We focused our journal’s spotlight on the truly
exciting times in which we are living. Technical advances are occurring at a phenomenal
pace. The dot.com collapse and the telecommunications slowdown of the early 2000s have
been replaced by a burgeoning array of new offerings to put the latest news, sports, music, and games
right in the consumers’ hands.
In the arena of wireless telecommunications, 3G network deployments and R&D on even more
powerful technologies are both well underway. With the December 2005 ratification of the WiMAX
mobile standard (802.16e or 2005), vendors are energetically engaged in developing and testing new
WiMAX mobile infrastructures. The IMS promises to further revolutionize the mobile landscape by
merging the power of the Internet with the convenience of wireless services. And FMC is also picking
up significant momentum.
Significant wireline developments are also occurring. The MEMS-based optical components now
being deployed increase speed while reducing costs, power consumption, and size. The prospect of
reduced capital costs is spurring a closer look at ways to decrease FTTH waste by reconfiguring
serving areas and hub locations. Even antennas and their supporting structures are in the spotlight as
they are about to benefit from state-of-the-art practices incorporated into the latest building codes
and standards.
At the same time, I would like the readers to pay particular attention to this issue’s insightful lead
paper by Tim Statton and Jake MacLeod, which provides a thorough analysis of the state of
Telecommunications R&D in the U.S. The article puts U.S. efforts in perspective with global
R&D activities, and highlights the essential long-term R&D areas required for the benefit of the
global community.
I also encourage you to read the timely and perceptive paper contributed by our invited guest authors,
Dr. Yun and Professor Kavehrad, who put the spotlight on an overview of mobile WiMAX, especially
OFDMA/TDD systems and some of the PHY/MAC cross-layer issues, and possible resolutions
through radio resource management.
I hope you find this new issue of the BTTJ informative and useful. As always, we look forward to your
comments and contributions.
Happy reading!
Abstract—The United States of America has held a leadership position in telecommunications R&D for the
past several decades and has significantly contributed to the global community’s deployment of high quality
communications systems. As a result of the divestiture of the Bell System in the 1980s, Bell Laboratories—the
primary telecommunications R&D facility in the US—was divided and refocused to concentrate on producing
near-term profits for the Regional Bell Operating Companies. This paper examines the impact of the lack of a
centrally funded mechanism for telecommunications R&D in the US and the declining position of the US as a
global contributor to the telecommunications industry. Suggestions for resolving this matter are offered for
consideration to the telecommunications industry and to the federal government.
Amount % %
Category Element
(€ million) Category Total
Health 8,317 18.72
Standards Institute (ETSI). Phase I of the The original scope of 3GPP was to produce
GSM specifications was published in 1990, globally applicable technical specifications
and commercial service was started in 1991. and technical reports for a 3G mobile system
Today, GSM accounts for more than based on evolved GSM core networks and
75 percent of the world’s mobile telephone the radio access technologies that they
market (1.2 billion subscribers) and is used in support (i.e., universal terrestrial radio access
more than 210 countries and territories. [10] [UTRA], both frequency division duplex
• GPRS—General packet radio service is a [FDD] and time division duplex [TDD]
GSM-based mobile data service widely used modes). The scope was subsequently
throughout the world. It is commonly amended to include the maintenance and
referred to as 2.5G technology and provides development of the GSM technical
a transmission data speed of 171 kbps specifications and technical reports,
(54 kbps effective). including evolved radio access technologies
(e.g., GPRS and enhanced data rates for
• 3GPP™—Third Generation Partnership GSM evolution [EDGE]).
Project is a collaboration agreement that was
established in December 1998. The agreement • UMTS—Universal mobile telephone service,
brings together a number of globally located commonly referred to as 3G mobile
telecommunications standards bodies. These technology, is an advanced mobile
“Organizational Partners” are the communications technology that provides
Association of Radio Industries and enhanced features and functions at a reduced
Businesses (ARIB), China Communications network cost. UMTS was derived out of the
Standards Association (CCSA), ETSI, International Mobile Telecommunications-
Alliance for Telecommunications Industry 2000 (IMT-2000) and 3GPP effort at the
Solutions (ATIS), Telecommunications International Telecommunication Union
Technology Association (TTA), and Telecom- (ITU). At the end of 2004, there were in excess
munications Technology Committee (TTC). of 16 million 3G UMTS subscribers in
Company Patents
Patents
A statistical indication highlighting the erosion of 1977–1996
thought leadership in the US is the number of General Electric Corp. 16,206
patents filed in the US Patent and Trademark
International Business Machines Corp. 15,205
Office by US companies versus foreign
Hitachi Ltd. 14,500
companies. In the past, the statistics were heavily
weighted toward US companies, including Canon Kabushiki Kaisha 13,797
telecommunications companies like AT&T and Toshiba Corp. 13,413
Motorola (see Table 4). But in 2004, the top 10 list, Mitsubishi Denki Kabushiki Kaisha 10,192
which included four US companies, five Japanese
U.S. Philips Corp. 9,943
companies, and one South Korean company,
Eastman Kodak Co. 9,729
was marked by the absence of a domestic
telecommunications company. AT&T Corp. 9,380
a. Many communications advances have been The aforementioned suggestions are offered for
driven by fundamental scientific serious consideration and discussion . . . and
discoveries of nanoscale materials. action. It is time for the US to stop eating the seed
b. Examples of important research areas corn and to begin to plant for future harvest.
include sensors, displays, power systems,
radio frequency, and nanomicrophones.
REFERENCES
BIOGRAPHIES
[1] A Brief History: The Bell System Tim Statton is president of
(http://www.att.com/history/history3. html). Bechtel Telecommunications
[2] Communications Act of 1934, Title 1, Section 1 and an executive vice president
(http://www.fcc.gov/reports/1934new.pdf). and member of the Board of
Directors of Bechtel Group, Inc.
[3] Capsule History of the Bell System
(http://www.bellsystemmemorial.com/ Before his present appointment,
capsule_bell_system.html). Tim was president of Bechtel
Enterprises (BEn), the company’s
[4] Office of Science and Technology Policy, project development, financing,
Executive Office of the President, 2005 Budget
and ownership subsidiary.
Summary (http://www.ostp.gov/html/
budget/2005/ap05.pdf). Before joining BEn, Tim was a member of the
[5] National Coordination Office for Networking Chairman’s Leadership Council and president of
and Information Technology Research and Bechtel Energy, leading all energy-related engineering
Development (http://www.itrd.gov/pubs/ and construction activities within the company. Before
2006supplement/2006supplement.pdf). this, he was managing director for energy and water
[6] Office of Science and Technology Policy, development at BEn. He also served as manager of Asia
Executive Office of the President, 2005 Budget Pacific operations, representing Bechtel’s engineering
Summary, page 62 (http://www.ostp.gov/ and construction interests in the region. During his
html/budget/2005/ap05.pdf). extensive career in the power sector of the company,
[7] European Commission, Research Directorate- Tim held numerous field and home office positions, was
General (http://europa.eu.int/comm/dgs/ a project manager and business development manager,
research/index_en.html). and was eventually elevated to president of Bechtel’s
[8] European Commission Research Presentation, power and industrial company.
Towards the Sixth Framework Programme, Tim has been a member of the Board of the United
page 9 of 62 (http://www.lnl.infn.it/pages/
States Energy Association (USEA), the leading energy
Conferenze/Ferrini.pdf).
trade organization in the US, and has volunteered for
[9] Budget Breakdown for Seventh Framework numerous charitable and community activities. He also
Programme (http://www.cordis.lu/fp7/ served as chairman of the Board of Nexant, an energy
breakdown.htm). consulting business, and was a member of the Board
[10] GSM World; GSM Facts and Figures of Control of InterGen, an independent power
(http://www.gsmworld.com/news/ development company. He currently sits on the United
statistics/index.shtml). States Telecommunications Training Institute (USTTI)
[11] Top Patenting Corporations Board of Directors.
(http://www.nsf.gov/sbe/srs/seind04/
c6/tt0603.htm). Tim received his BS in Mechanical Engineering from
San Francisco State University, California, and his
[12] US Patent and Trademark Office Calendar Year
BS in Business/Economics from Juniata College,
2004, Preliminary List of Top Patenting
Pennsylvania. He is a member of the American
Organizations (http://www.uspto.gov/web/
offices/ac/ido/oeip/taf/top04cos.htm). Cogeneration Society and the U.S. Energy Association.
[13] Ericsson Press Release, September 7, 2005 Jake MacLeod is the chief
(http://www.3g.co.uk/PR/Sept2005/1867.htm). technology officer, Engineering
[14] Telecommunications Industry Association White and Technology, for Bechtel
Paper, Investing in Communications for Tomorrow’s Telecommunications and a
Innovations: The Case for Increased Communications Bechtel principal vice president.
Research Funding, September 2005.
Jake joined Bechtel in
[15] Executive Office of the President – Office of May 2000 and is responsible
Science and Technology Policy, Memorandum for
for expanding the scope of
the Heads of Executive Departments and Agencies, re:
Bechtel’s telecommunications
FY 2007 Administration Research and Development
Budget Priorities, July 8, 2005. engineering services to include
all aspects of technical design, from network planning
to commercial system optimization. Jake initiated and
developed Bechtel’s RF and Network Planning
team, which has grown to over 150 world-class
Abstract—The IMS is a standardized approach to offering Internet services anywhere at any time using
cellular technology. The first release of the IMS is tailored for GPRS/UMTS, whereas later releases will allow
access independence, including WLANs and even fixed networks such as xDSL and cable modem.
The IMS is based on open interfaces and common elements that make it possible to provide integrated, secure,
IP-based, multimedia, multisession applications to mobile and fixed users, with guaranteed end-to-end QoS and
roaming capabilities, while providing the same services as the home network, and across different access
technologies. The IMS also allows a single sign-on authentication and provides a flexible architecture for
charging and billing. Deployment of the first version of IMS products is expected in early 2006.
INTRODUCTION
n recent years, both the Internet and wireless The 3GPP, formed in December 1998, is a
I communications have experienced a surge of
activities and successes. The success of the
collaboration of telecommunications industry
organizations to produce globally applicable
Internet stems from two main facts: It provides technical specifications for 3G mobile
useful applications such as e-mail, World Wide systems and to maintain and develop GSM
Web (www), and instant messaging (IM), and it standards. Participants include major regional
uses readily available open protocols that telecommunications standards bodies such
promote and facilitate the development of as ARIB of Japan, CSCA in China, Committee
various services and applications. The success of T1 of the US, and TTA of Korea, as well as
mobile communications is self-evident. This market representatives such as the UMTS
technology has experienced explosive growth forum, 3G America, GSM associations, and
and provides wide coverage, touching almost the IPv6 forum.
every aspect of peoples’ lives. Currently, there are
more than 1 billion mobile customers, and this universal mobile telecommunications system
number is growing! (UMTS). Release 6 of the UMTS, introduced in
Wireless systems dubbed as beyond third- March 2005, provided some enhancements to
generation (3G+) seek to merge these two the first release and introduced new concepts,
successful communications modes to provide the such as support for access independence, wireless
power of the Internet—and all of its services and local area network (WLAN) integration, and
applications—with the convenience of ubiquitous IM and presence services. Release 7, under
wireless access. The new architecture expected to development with an expected release in mid-
accomplish this, the Internet Protocol (IP) 2007, will focus primarily on fixed and mobile
multimedia subsystem (IMS), is defined in a convergence issues.
standard created by the Third Generation The Third Generation Partnership Project 2
Partnership Project (3GPP™), one of the main (3GPP2), the main standardization body for 3G
standards organizations for 3G networks. networks based on cdma2000®, has established
Different aspects of the IMS (call control, the multimedia domain (MMD), its own version
Rasoul of the IMS specification. The IMS and the MMD
Safavian, PhD charging, roaming, etc.) have been formalized
and published in various 3GPP technical are very similar, with the main differences
srsafavi@bechtel.com centering on two issues:
specifications [1–15]. The first version of the IMS
was published by the 3GPP in Release 5 of the
Figure 1. CS, PS, and IMS Domains in a Mobile Network (After [16])
messages begin with a start line, a header field, MESSAGE Carries an instant message
SIP uses a SIP URI and a message body [26].
(RFC 3261) to SUBSCRIBE Subscribes to an event
Start Line
identify users. A SIP The start line is also called a request line in the NOTIFY Notifies an IMS terminal about a certain event
URI is similar to an request message and a response line in the
BYE Terminates the session
e-mail address and response message. It consists of a method name, the
consists of request-uniform resource identifier (URI), and the
protocol version, currently SIP/2.0. The method
the user’s name name indicates the purpose of the request, and Message Body
and the domain the request-URI contains the destination address The message body carries multipurpose Internet
name of the home of the request. The response line consists of the mail extension (MIME) encoded messages.
protocol version (e.g., SIP/2.0) and the status of the Message bodies starting with Content-Disposition
network operator.
transaction, including both a number and its are session descriptions. Message bodies are sent
equivalent readable phrase (e.g., 100 TRYING). A in their entirety, i.e., they are not parsed at proxy
sample SIP transaction is shown in Figure 2. In servers in between and may be encrypted by
this transaction, (1) a request is made by a UAC the UAC.
(Bob) to establish a session with a UAS (Alice) via
an INVITE request (method), and (2) the reply User Identification
from the UAS (Alice) is 100 TRYING, confirming SIP uses a SIP URI (RFC 3261) to identify users.
that Bob’s request has been received. A SIP URI is similar to an e-mail mail address and
consists of the user’s name and the domain name
Some of the major SIP methods (request types)
of the home network operator. It may also include
are listed in Table 1.
optional descriptions placed after a semicolon.
Header Field An example of a SIP URI is:
Following the start line is the header field, which
Alice.Smith@domain.com
is composed of a mandatory part and an optional
part. The mandatory part contains fields such as This address, the public user identity, is assigned
To, which carries the destination URI; From, by the home network operator. Public user
which carries the originator’s URI; and Content identities are used to route SIP signaling.
Sequence (CSEQ), which includes the sequence
number and method name used to match replies Since the PSTN can only interpret digits, and
to requests. since the PSTN is going to be in use for the
foreseeable future, the IMS also accommodates
public user identity telephone uniform resource
locators (URLs) (RFC 2806), which carry a
telephone number. An example of a telephone
URL is:
+1-123-456-7890
1. Bob sends an INVITE request to Alice’s AoR Note that if, in the middle of the session, either
The IMS network Bob or Alice wants to modify the session (for
at the proxy server.
can basically instance, by adding a video component), he or
2. The proxy server sends a receipt via a she can send either an UPDATE request or
be divided into
100 TRYING message. another INVITE request with an updated
three layers:
session description.
3. The proxy server looks up Alice’s current
• Application or location and forwards the request to Building on the foregoing discussion of SIP
service layer Alice’s PDA. networks, the following sections examine the
IMS network’s architecture; the entities
4. Alice’s PDA sends a confirmation reply via a
• Control or involved in the IMS; and the performance of
100 TRYING message.
signaling layer various operations such as registration, session
5. Alice’s PDA sends a 180 RINGING message setups, roaming, security, QoS and policy
• Access or indicating that it has been alerted to the support, and charging.
connectivity request to establish a session.
layer 6. Alice’s PDA sends a 200 OK reply message
IMS ARCHITECTURE
back to the proxy server. This reply includes
s depicted in Figure 5, the IMS network can
a Contact header field in the message (so
that Bob can use this URI to contact Alice A basically be divided into three layers:
directly for all future transactions), along • Application or service layer
with an SDP message describing Alice’s
PDA session components such as audio and • Control or signaling layer
video; the codec used for each session • Access or connectivity layer
component; and the transport information
The application or service layer contains
such as port numbers, IP addresses, and
application servers (ASs) such as the SIP AS,
transport protocol.
third-party open service access (OSA) AS, and The control layer contains signaling network
legacy service control point (SCP) AS. The IMS elements or control servers for session setup,
controls service via the subscriber’s home modification, and termination or for managing
network and those signaling network elements calls. The heart of the control layer consists of the
distributed in the application layer and the call session control function (CSCF) servers, also
control layer. This arrangement enables known as SIP servers. This layer also includes the
subscribers to receive the same types of services home subscriber server (HSS) database,
while they are roaming. subscriber location function (SLF) database, PDF,
and breakout gateway control function (BGCF).
Gm between I-CSCF/S-CSCF and • CSCF server is also known as the SIP server,
user equipment since it processes SIP signaling. There are
Go between PDF and PEP three types of CSCFs: proxy (P-CSCF),
interrogating (I-CSCF), and serving
Gq between PDF and P-CSCF (S-CSCF).
Mb between IM-MGW and entities — P-CSCF is the first point of contact, in
such as user terminal, MRFP, AS
the signaling plane, between the IMS
Mi between BGCF and I-CSCF/ terminal and the IMS network. From
S-CSCF the SIP point of view, the P-CSCF acts
Mj between BGCF and MGCF as a SIP proxy server, i.e., all requests
initiated by the IMS terminal or destined
Mk within a given BGCF for the IMS terminal traverse the P-CSCF,
(intra-BGCF)
which provides data integrity and
Mn between MGCF and MGW confidentiality by using IP security
(IPSec) to maintain a security association
Mp between MRFC and MRFP
between itself and each IMS terminal.
Mw between CSCFs within the The P-CSCF handles the charging
same network records for billing purposes by creating
Ro between OCF and S-CSCF, and maintaining a charging data record
MRFC, SIP-AS, et al. (CDR) that can be consolidated at a
charging gateway function (CGF). The
Sh between HSS and AS
(SIP-AS or OSA-SCS) P-CSCF also provides QoS authorization
and control by providing the necessary
Si between HSS and IM-SSF information to the PDF for resource
Za between security domains authorization and QoS control. The IMS
(inter-domain) also supports roaming services via the
P-CSCF. (Roaming, QoS, charging, etc.,
Zb within a given security domain
(intra-domain) are discussed in more detail in the IMS
Operations section of this paper). Also,
Note: X/(Y) notation on the interfaces once the P-CSCF authenticates the user,
indicates that the interface is X and the
it asserts the identity of the user to the
protocol used on that interface is Y.
rest of the nodes (or IMS elements) in
the network, so those nodes do not
need to authenticate the user again.
The connectivity or access layer is used to
IMS networks usually have several
transport signaling traffic and media streams.
P-CSCFs for the sake of scalability and
This layer contains switches, router, and media-
redundancy, and each P-CSCF serves a
processing entities (MGWs, signaling gateways
certain number of IMS terminals, based
[SGWs], MRF controls [MRFCs], and MRF
on its capacity.
processors [MRFPs]). Since IMS is designed to be
access independent, it can connect to different — I-CSCF is a proxy server that is located
types of existing and emerging access networks at the edge of an administrative domain
as long as they have IP connectivity. Access and that interfaces with SLF and HSS
networks that can connect with the IMS include databases. These interfaces are based
GPRS/UMTS, 2G networks such as GSM via on the Diameter protocol. The I-CSCF
gateways, PSTNs via gateways, enterprise fixed retrieves user location information
networks via IP Centrex, residential fixed and routes the SIP requests to their
networks via xDSL or cable modem, WLANs, appropriate destinations, typically an
and worldwide interoperability for microwave S-CSCF. The I-CSCF also assigns an
access (WiMAX). S-CSCF if there is more than one. The
• Integrity and confidentiality security Steps 6–7: The S-CSCF retrieves the user AV
associations are set up. from the HSS via a Diameter-based
multimedia authentication request
• The S-CSCF downloads the user profile
(MAR) message and a Diameter-
from the HSS.
based multimedia authentication
• The S-CSCF stores the address information answer (MAA) message.
in the HSS.
Steps 8–10: From the AV, the S-CSCF computes
Specific steps in the IMS level registration process the user-specific challenge data and
are as follows: sends this information via a 401
Step 1: The IMS terminal sends a SIP UNAUTHORIZED message to the
register request message to the IMS terminal through the I-CSCF,
P-CSCF and compresses this P-CSCF, and IMS terminal.
message to save transmission Steps 11–15: The IMS terminal computes its
bandwidth and minimize signaling authentication response and sends
delays. The receiving P-CSCF it to the S-CSCF via another register
decompresses the request message. request message.
Step 2: If there are multiple S-CSCFs, the Steps 16–17: The S-CSCF verifies the response
P-CSCF forwards the request to and, if correct, downloads the
the I-CSCF, so that the I-CSCF subscriber profile from the HSS via
can select an S-CSCF to serve the Diameter-based server assignment
user’s session. request (SAR) and server assign-
Step 3: The I-CSCF sends a Diameter-based ment answer (SAA) messages. The
user authorization request (UAR) S-CSCF may contact an AS (or ASs)
message to the HSS, requesting the for service control as specified in
addresses of all available S-CSCFs. the SSP.
Since CS
networks and the
PSTN will remain
in use for the
foreseeable future,
the IMS
also provides
interworking
capabilities with
BICC- and
ISUP-based
Figure 10. Intra-Domain and Inter-Domain Network Security
legacy networks.
In addition to the mandatory network layer appropriate CS/PSTN gateway, if interworking
security (IPSec), the IMS also provides optional will take place in the same network in which the
transport layer security (TLS) and application BGCF resides. The MGCF is the component that
layer security (e.g., HTTP digest authentication controls the IM-MGW and that performs SIP-to-
for SIP). BICC or SIP-to-ISUP call-related signaling
IMS-CS Interworking
Since CS networks and the PSTN will remain in
use for the foreseeable future, the IMS also
provides interworking capabilities with BICC-
and ISUP-based legacy networks (e.g., PSTN,
ISDN, and CS public land mobile networks
[PLMNs]). The main IMS functional entities
involved are the BGCF, MGCF, IM-MGW, and
SGW. IMS-CS interworking architecture is shown
in Figure 11.
Figure 14b. P-CSCF and GGSN Located in a Visited Network (After [26])
negative aspect of this configuration is that media The CCF/CDF is a stateless Diameter-based AS
are first routed to the home network and then to that does not maintain session states, but keeps
their destination, introducing unnecessary and track of transaction states. It creates, updates, and
undesirable delays. This configuration, however, closes charging data records (CDRs) based on
allow immediate deployment of the IMS and accounting request (ACR) messages it receives
IMS roaming [26]. from IMS elements. There are three types of ACR
messages: ACR (Start) to generate the CDR and
In the second configuration, shown in Figure 14b,
start accounting, ACR (Update) to update the
the P-CSCF and the GGSN are located in the
CDR, and ACR (Stop) to update and close the
visited network, i.e., the visited network has an
CDR. Figure 16 depicts the signaling flow for a
IMS-compliant GGSN. There may be a move to
session-based offline charging scenario in which
this configuration after initial IMS deployment.
an ACR (Start) is triggered upon receipt of an
INVITE request message to start a session; an
IMS Charging ACR (Update) is started when the interim period
The IMS supports both offline (or post-paid) and elapses, and an ACR (Stop) is triggered upon
online (or real-time pre-paid) charging services. receipt of a session termination BYE request
The IMS charging architecture is shown in message.
Figure 15 [12–14, 29].
The OCF is a stateful Diameter-based AS that
The online charging services are handled by maintains both session states and transaction
the online charging function (OCF) AS; the states for online charging. IMS elements
offline charging services are handled by interacting via the Ro interface with the OCF
the charging collection function (CCF) AS. In include the S-CSCF, MRFC, and SIP ASs. The
Release 6, the CCF is upgraded to the charging S-CSCF interacts with the SCF of the OCF for
data function (CDF). session-based pre-paid service control, while the
Although the applications and drivers for replaced quickly has hindered deployment.
photonic switches are strong, several pitfalls have Finally, carriers have cited concerns about dust,
hindered their deployment. Carriers must dirt, and even resiliency in the face of vibration,
consider the loss across the fabric of the switch. such as in an earthquake zone. Several manu-
Each component does have a finite loss, and this facturers of optical components are countering
loss must be carefully calculated into the link this claim by certifying their equipment with
budget of the optical path. This often has the standards institutes or organizations, such as
unintended consequence of requiring additional Telcordia® Technologies, Inc.
amplification, or worse, OEO regeneration—a
Table 1 summarizes the similarities and
problem for designers, who had sought to avoid
differences between optical and photonic
the need for OEO regeneration in the first place!
switches.
The complexity of MEMS-based devices is also an
issue—each mirror needs very complex Table 1. Optical Versus Photonic Switches
electronics to drive its movement and stabilize its
position. These devices add cost to the system as Optical Photonic
Characteristic
well, counteracting some of the potential cost Switch Switch
savings of the technology. Another complexity Cost per port Higher Lower
consideration is the finite switching time
involved in repositioning the reflective Limited by size of
Capacity Virtually unlimited
switch core
components. This time must be carefully
considered when examining applications, as the Granularity Circuit Wavelength
switching for these devices is not “wire speed”
Wire-speed,
(data processed or switched at its native rate). Switching/Routing Out-of-band
processes signals
To achieve an While optical systems using ROADM [5] C. Matsumoto, “Calient Patches Its Strategy,”
technologies are an enabler for scalable, Light Reading, February 14, 2005
optimum network (http://www.lightreading.com/document.asp?
dynamically reconfigurable networks, systems site= lightreading&doc_id=68031).
design, network designers must pay additional attention to [6] D. Horsley, “Image Gallery”
engineers must implementation details. Granular power (http://mae.ucdavis.edu/faculty/
measurement and control are required for each horsley/photoalbum.html).
continue to use
wavelength. Fault isolation at the wavelength [7] “ROADM Architectures and Implementations,”
strong planning Metconnex
and component level is a necessity, since a single (http://www.metconnex.com/Products-
methodologies, misdiagnosed fault can cause networkwide page/roadm.htm).
combined with instability. Additional hardware and software [8] C. Matsumoto, “ROADMs: Almost Famous,”
required to perform these functions can entail Light Reading, May 20, 2005
detailed knowledge (http://www.lightreading.com/document.asp?
additional cost, real estate, and complexity. As doc_id=74210).
of ideal applications
such, ROADM technologies may hold a “first-
[9] C. Matsumoto, “ROADMs Roll On,”
for various cost” penalty for smaller, lower channel-count Light Reading, June 7, 2005
technologies and networks when compared to more mature (http://www.lightreading.com/document.asp?
doc_id=75148&site=supercomm).
the associated technologies. Carriers must consider the growth
forecast and timeframe when evaluating choices
cost-versus-benefit
for new optical networks.
tradeoffs. BIOGRAPHY
Brian Coombe joined Bechtel
Telecommunications in 2003.
CONCLUSIONS Currently, he is a systems
engineer for the federal
fter much early hype, MEMS-based optical
A devices are experiencing continued
deployment in next-generation optical networks.
telecommunications group
within Bechtel National, Inc.,
Bechtel’s government sub-
These components enable a number of advanced sidiary. He designs and
analyzes carrier, large-scale
networking features, such as dynamic
enterprise, and government and
reconfigurability, while potentially reducing military communications systems.
power consumption, network real estate, and
Previously, as a lead Bechtel Telecommunications
capital and operational expenses. The benefits
engineer for the Verizon fiber-to-the-premises program,
offered by systems using these components often Brian managed the planning and network design of two
come at a cost, however. Also, not every wire centers. His Bechtel experience also includes work
application or deployment is suitable for MEMS- as an RF engineer providing design solutions for the
AT&T Wireless GSM overlay program.
based systems. To achieve an optimum network
design, network engineers must continue to use Before joining Bechtel, Brian was a systems engineer
strong planning methodologies, combined with and applications specialist at Tellabs®, an optical
networking equipment manufacturer. He was a
detailed knowledge of ideal applications for
member of the team that launched Tellabs’ DWDM
various technologies and the associated cost- platform and supported Tellabs’ first DWDM customer.
versus-benefit tradeoffs.
Brian received a BS with honors in Electrical
Engineering from The Pennsylvania State University.
He is a member of the Institute of Electrical and
TRADEMARKS Electronics Engineers and also Eta Kappa Nu, the
national electrical engineering honor society. Brian
Telcordia is a registered trademark of Telcordia authored “Reliable Electric Power Transmission and
Technologies, Inc., in the United States, other Distribution under National Restructuring,” which
countries, or both. appeared in the IEEE/WISE Journal of Engineering and
Public Policy in August 1999.
Abstract—After the IEEE 802.16-2004 standard was published, much attention was drawn to providing
broadband access in rural and developing areas over fixed wireless channels. Now, the IEEE 802.16e standard
for Mobile WiMAX is about to be published. It is known that Mobile WiMAX will incorporate error-correction
capability and will be an enhanced version of the IEEE 802.16 standard with mobility support. Therefore, it is
expected that Mobile WiMAX will not only compete with the broadband wireless market share in urban areas
with DSL, cable, and optical fibers, but also threaten the hot-spot-based Wi-Fi™ and even the voice-oriented
cellular wireless market. This paper first provides an overview of Mobile WiMAX, especially on OFDMA/TDD
systems. Then, the paper addresses some PHY/MAC cross-layer issues that need to be resolved through radio
resource management to increase throughput, cell coverage, and spectral efficiency.
sounding is a signaling mechanism that There are two main types of subcarrier allocation
There are
enables the base station (BS) to estimate BS-to- techniques: distributed and adjacent. In general,
two main types mobile station (MS) channel response based on the distributed allocations perform very well in
of subcarrier the UL signals transmitted by the MS. Channel mobile applications, while adjacent subcarrier
allocation sounding works only under the assumption of permutations can be properly used for fixed,
TDD reciprocity. portable, or low mobility environments. These
techniques:
options enable the system designers to trade
distributed and Due to channel reciprocity and DL/UL ratio
mobility for throughput.
adaptability, TDD is the most favored duplex
adjacent.
mode in Mobile WiMAX [7]. It is the only mode Distributed Subcarrier Allocation
addressed in this paper. In a distributed subcarrier allocation (DSCA),
multiple data subcarriers are grouped into a
OFDMA/TDD Frame Structure subchannel. Although subcarriers in a
Figure 2 shows an example of the OFDMA frame subchannel are not usually adjacent to each other,
structure for the TDD mode. Each frame is they may be in some cases. DSCAs for the DL are
divided into DL and UL subframes by DL-partial usage of subchannels (PUSC), full
transmit/receive transition gaps (TTGs) and usage of subchannels (FUSC), optional FUSC
receive/transmit transition gaps (RTGs). Each DL (OFUSC), and tile usage of subchannels (TUSC)
subframe has a preamble in the first OFDMA 1 and 2. DSCAs for the UL are UL-PUSC and
symbol and then starts with the frame control UL-optional PUSC (OPUSC).
header (FCH) in the second symbol. The FCH • DL-PUSC: The default DL subcarrier
specifies the subchannel groups used for the allocation method. All DL subframes start in
segment, the burst profile, and the length of the the DL-PUSC zone. Subchannels are grouped
DL-mobile application part (MAP) message, into six major groups and assigned to three
which directly follows the FCH. The UL-MAP segments (three sectors) of a cell. Assigning
message is carried by the first burst allocated in two major groups to each segment, the cell
the DL-MAP. Each UL subframe may have one or can be viewed as frequency reused by a
more ranging slots, which are used for the factor of three. By switching to a DL-PUSC
network entry procedure. UL subframes may zone that assigns all subchannel groups to
have fast feedback channels for fast channel each segment, the cell can realize a frequency
quality indicator (CQI) reports or other fast reuse factor of one. DL-PUSC is designed to
operational requests or responses. (Fast feedback minimize the probability of using the same
channels are not shown in Figure 2.) subcarrier in adjacent sectors or cells.
• FUSC: Uses all subchannels and minimizes
Subcarrier Allocation the performance degradation of fading
There are three types of subcarriers: data, pilot, channels by frequency diversity. FUSC is also
and null. Data subcarriers are used for data designed to minimize the probability of
transmissions, pilot subcarriers are used for using the same subcarrier in adjacent sectors
channel estimation and various synchronization or cells. FUSC pilots are in both variable and
purposes, and null subcarriers are used for the fixed positions.
direct current (DC) carrier and guard bands
transmitting no signals. Multiple data sub- • OFUSC: Also designed to fully use
carriers are grouped into a subchannel, and a frequency diversity. One difference from
subchannel forms a slot with one or more FUSC is that OFUSC uses a bin structure
OFDMA symbols. A slot is a channel and MAP like band adaptive modulating and coding
allocation unit; it contains 48 data subcarriers. (AMC).
Figure 2. Example of the OFDMA Frame Structure for the TDD Mode
hardly satisfies all QoS parameters at the same should be matched to the ratio of DL and UL
time, especially fairness among users. Ultimately, traffic. Moreover, FDD channel bands cannot be
radio resource management should follow a adjusted dynamically in response to the varying
combined form of multiuser diversity and ratio of DL and UL traffic, due to hardware
fairness scheduling. limitations. The ratio of UL to DL streams is fixed
for FDD.
Figure 4 illustrates the deployment of multiuser
diversity with a band AMC zone. Similarly, It has been assumed that network operators
multiuser diversity can also be deployed with a determine the switching points for TDD UL and
DSCA zone such as PUSC, FUSC, optional FUSC, DL schemes and that once such systems are
and TUSC. The only thing different from a band deployed, the DL/UL ratio is not changeable.
AMC zone is that the multiuser diversity gain can Moreover, switching points in adjacent cells
be obtained only from time domain allocations. must be synchronized to avoid severe inter-
cell interference.
Dynamic TDD Usage Figure 5 shows various co-channel interference
Each MS and BS experiences not only different cases. In conventional TDD systems, only DL/DL
channel characteristics, but also various data and UL/UL cases can occur. However, if the
traffic. In other words, UL and DL stream DL/UL ratio is changed dynamically frame by
volumes that have been considered symmetrical frame and independently cell by cell, co-channel
for conventional voice transmissions are interference can exist in all four cases.
unbalanced, and the ratio is time varying. To
provide the highest transport efficiency in A cross-layer D-TDD scheme considering traffic
broadband networks, TDD is preferred to FDD and channel condition together may be adopted.
because it enables real-time adaptation of UL and Since each cell can have different offered loads for
DL bandwidth according to the dynamic traffic UL and DL, cell switching points are set
pattern. Even though FDD can also be used for independently. Although this may cause severe
asymmetric traffic, DL and UL channel bands co-channel interference at time slots around the
DL/DL UL/UL
DL/UL UL/DL
Abstract—A new revision of ANSI/TIA Standard 222 will take effect on January 1, 2006. The new standard—
Revision G—is the most comprehensive revision of Standard 222 since its first publication in 1949. A revision
on this order can cause anxiety in the industry as to its impact on tower design and can raise questions.
This paper explains the differences in the basic design philosophies of the standard (Revision F) and the new
Revision G. It also discusses the impetus behind this major revision triggered by the latest understanding and
state-of-the-art practices of the current codes and standards in the building industry.
DESIGN METHOD
φRn = ∑Q
significant change in the standard reflects (1)
A the migration from the typical working
stress design to the contemporary limit-states
γ i
design approach for structural steel. This brings In this elastic design approach, all loads Qi are
the standard into compliance with current codes. assumed to have the same variability, and the
term φ/γ may be thought of as the safety factor
applied to the material resistance. For materials in
direct tension, the allowable stress is limited to
0.60 times the material yield strength. This results
in a safety factor of 1/0.60 = 1.67. The AISC
specification defines the allowable stresses
for tension members, columns and other
compression members, beams and other flexural
members, plate girders, bolts, and welds.
φRn = ∑ γi Qi (2)
Figure 2. Reliability Index β
Figure 5. Coaxial cable is a major contributor of wind load Figure 6. Towers can be loaded with a very complex array
on a tower. Wind computations are handled of coaxial cable. Revision G addresses
in detail in Revision G. several load scenarios.
BIOGRAPHY
Peter Moskal is chief engineer,
civil, structures, and architecture,
for Bechtel Telecommunications.
He is responsible for the wire-
less and wire line infrastructure
engineering deliverables, the
people who prepare those
deliverables, the processes
employed, and the tools used to
execute the work on behalf of
Bechtel Telecommunications customers. He oversees
the work of civil engineers, structural engineers,
architects, and CAD designers and drafters within the
Telecommunications organization.
Abstract—Reducing the amount of unnecessary fiber deployed in fiber-to-the-home networks can significantly
reduce capital costs. Two principal causes of fiber waste—excessive serving area size and poor hub location—
are examined. Methods to detect and quantify excessive fiber usage attributable to these causes are developed.
•Poor hub
location
increases, lowering the cost per subscriber. linear serving areas of any size n, the total fiber
However, there is a penalty to be paid for TFl required is:
increasing serving area size. A larger serving area
requires additional fiber per household to be
⎞ n2 ⎞
installed. This principle is easily demonstrated TFl = ⎟⎠ 4 – n⎟⎠ x (1)
and quantified with two simplistic examples.
X
In general, the total fiber TFim required for an
ideal mesh serving area is:
ONT ONT ONT ONT
X
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
X
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
TFim = ⎞ n – 2⎞ x
n ⎟⎠ ⎟⎠
F$ TF$ • 1
Equipment Cost per Subscriber
sub = n τ (5)
Where:
TF$ = total fiber cost
n = number of households in serving area
τ = expected take rate
Using the models, the fiber cost per subscriber 32 132 232 332 432 532
can now be extrapolated for any serving area size, Serving Area Size
as shown in Figure 8.
Figure 9. Equipment Cost per Subscriber Versus Serving Area Size
An equipment cost per subscriber plotted against
serving area size can be derived from equipment
cost and calculated utilization (see Figure 9).
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
Figure 11. Linear Serving Area with 24 Households with Hub Off-Center
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
ONT ONT ONT ONT ONT ONT HUB ONT ONT ONT ONT ONT ONT
Figure 12. Ideal Mesh Serving Area with 144 Households with Hub Off-Center
The plot suggests a good correlation between the excess fiber—over 50 percent in some instances.
HC metric and the amount of excess fiber. A very The decision to find a more suitable hub location
low HC metric indicates a significant amount of or alter serving area boundaries to center the hub
Abstract—Inconsistencies in setting up antenna azimuth and tilt during installation may reduce overall
network performance. However, the degree of quality degradation depends on the amount of the discrepancy
between the designed and installed parameters. The paper investigates the effect of these errors on UMTS
RF KPIs, including coverage, signal quality (Ec /Io), and soft-handoff areas. Two examples are studied that
include real measurement data. The studies show the effect of azimuth and tilt installation inaccuracies on
UMTS network quality.
installation
processes and
human and Positive Error
Field Azimuth
instrumentation
errors.
Designed Azimuth
(a) (b)
Target A
True North
Optical
50° Actual Bearing
Alignment Tool
le
ng
tA
f fse
°O
40
Antenna Aim Point
Error = β Error = ∝
Scenario A Scenario B
(a) (b)
Single Site Coverage Versus Antenna Azimuth Error Single Site Coverage Versus Antenna Tilt Error
100 105
RSCP < –86 dBm RSCP < –86 dBm
99.5 100
99
Normalized Coverage Area
95
98.5
90
98
85
97.5
80
97
96.5 75
96 70
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error
(a) (b)
Figure 5. Network Performance Versus Antenna Azimuth and Tilt Installation Error in a Single-Site Configuration
(a) Azimuth Error; (b) Tilt Error
3 6
4
2
2
1
0
0 –2
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error
(a) Area with RSCP < –86 dBm = 12.32%, Area with RSCP < –92 dBm = 4.80%
QoS Gap Versus Antenna Azimuth Error QoS Gap Versus Antenna Tilt Error
4.5 2.5
Ec /Io < –12 dB, A Ec /Io < –12 dB
4 Ec /Io < –12 dB, B
Increase in Service Quality Gap (Percentage)
3 1.5
2.5
1
2
1.5 0.5
1
0
0.5
0 –0.5
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error
(b) Area with Ec /Io < –12 dB = 4.0%, Area with Ec /Io < –13 dB = 1.01%
Soft Handoff Area Versus Antenna Azimuth Error Soft Handoff Area Versus Antenna Tilt Error
10 1
SHO Margin = 3 dB
9 SHO Margin = 5 dB, A SHO Margin = 5 dB
Increase in Soft Handoff Area (Percentage)
0
SHO Margin = 3 dB, A
8
SHO Margin = 3 dB, B
7 –1
6
–2
5
–3
4
3 –4
2
–5
1
0 –6
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error
1 3
0.8 2
0.6
1
0.4
0
0.2
0 –1
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error
(a) Area with RSCP < –86 dBm = 5.76%, Area with RSCP < –92 dBm = 2.0%
QoS Gap Versus Antenna Azimuth Error QoS Gap Versus Antenna Tilt Error
4.5 4
Ec /Io < –12 dB, A Ec /Io < –12 dB
4 3.5
Increase in Service Quality Gap (Percentage)
0.5 0.5
0 0
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error
(b) Area with Ec /Io < –12 dB = 4.42%, Area with Ec /Io < –13 dB = 0.94%
Soft Handoff Area Versus Antenna Azimuth Error Soft Handoff Area Versus Antenna Tilt Error
8 1
SHO Margin = 5 dB, A
SHO Margin = 5 dB, B SHO Margin = 3 dB
7 SHO Margin = 3 dB, A 0
Increase in Soft Handoff Area (Percentage)
SHO Margin = 5 dB
Increase in Soft Handoff Area (Percentage)
–4
2
1 –5
0 –6
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error
Aleksey Kurochkin is
currently senior director,
ACKNOWLEDGMENTS Site Development and
he authors would like to thank Lacy Kiser Engineering, in the Bechtel
T from the Bechtel Six Sigma Team and Jeff
Bryson from the Bechtel Construction Team for
Telecommunications
Technology group, a group
the valuable data and information they provided. that he originated. He is
Special thanks go to Radioplan GmbH for experienced in international
providing WiNeS software for this study. telecommunications
business management and network imple-
mentation. Before joining Bechtel, he worked
REFERENCES at Hughes Network Systems, where he built
an efficient multi-product team focused on
[1] Six Sigma PIP TI-81, Report and Data Analysis,
Bechtel Telecommunications, 2005.
RF planning and system engineering. His
engineering and marketing background has
[2] E. Dinan, “UMTS RF Network Optimization
Process,” Document Number 3DP-T04G-50009, given him both theoretical and hands-on
Bechtel Telecommunications Network Planning knowledge of most wireless technologies.
Department, 2005.
Aleksey has an MSEE/CS degree in Automatic
Telecommunications from Moscow Technical
University of Communications and Informatics,
Russia.
Abstract—This paper examines the application, coverage, and security of a 2.4 GHz IEEE 802.11b (Wi-Fi TM)
phased array antenna system. Two antennas are installed in real-world scenarios. One antenna provides
outdoor-to-indoor and outdoor-to-outdoor coverage, and the other antenna provides outdoor-to-outdoor coverage
only. Throughput is measured using a variety of typical application methods. The results show both the
advantages and disadvantages of using a phased array antenna system.
Outdoor-to-Outdoor Measurements
Figure 6 shows the outdoor measurements for
Antenna 1 around BP2. Signal strength was
measured at several points in the front and back
and on the roof of BP2. The measurements show
that there is a good signal just outside of BP2 on
the ground facing Antenna 1 and on the roof of
BP2. However, the signal did not completely
penetrate through the building, resulting in little
or no coverage immediately behind BP2 at ground
level. At roof level, if the signal was blocked by
Figure 6. Outdoor Measurements for Antenna 1 Around BP2
the metal skirt around the air conditioning
system, the signal degraded noticeably.
Otherwise, the signal level was the same or better.
Outdoor measurements for Antennas 1 and 2 • At other locations away from Antennas 1
were taken at several locations off of the Bechtel and 2, the signal was very weak. At several
campus. Figure 7 shows the outdoor-to-outdoor locations, the signal level was adequate,
measurement points from Antenna 1, and but connectivity to the test laptop could
Figure 8 shows the outdoor-to-outdoor points for not be established using just the wireless
Antenna 2. local area network (WLAN) adapter. When
an Antenex antenna was used, connectivity
The test locations were chosen so that line of
was established.
sight (LOS) or near LOS could be maintained.
To ensure that LOS existed, point-to-point • Many IEEE 802.11 applications are already
profiles were evaluated and examined for all being used around the test locations.
measurement points. Figure 9 is an example of • The Antenex antenna greatly enhanced the
one of these profiles. performance in low signal strength areas.
Figure 10 shows the measurement results • In marginal areas, the AES algorithm
from points B, C, and G. The following are degraded performance beyond use.
worth noting:
REFERENCES
[1] C.E. Shannon, “A Mathematical Theory of
Figure 10. Measurement Results from Points B, C, and G
Communication,” Bell System Technical Journal,
Vol. 27, pp. 379–423 and pp. 623–656, 1948.
[2] S.H. Simon, A.L. Moustakas, M. Stoytchev, and
CONCLUSIONS H. Safar, “Communication in a Disordered
World,” Physics Today online, 2001.
his paper examined the use of phased array
T antennas for outdoor-to-indoor and outdoor-
to-outdoor applications using extensive
[3] Cranite Systems, Inc., “Best Practices: Wireless
LAN Design, Implementation and Management,”
White Paper, September 2003.
measurements at several indoor and outdoor [4] W.A. Arbaugh, N. Shankar, Y.C.J. Wan, and
points. As the experimental results reveal, Z. Kan, “Your 802.11 Wireless Network Has
No Clothes,” IEEE Transactions on Wireless
using the system has both advantages and Communications, December 2002, Vol. 9, No. 6,
disadvantages; these are mainly application pp. 44–51.
specific. The system is conveniently easy and fast [5] T. Karygiannis and L. Owens, “Wireless Network
to install, and it appears to be the only choice for Security: 802.11, Bluetooth and Handheld
Devices,” NIST Special Publication 800-48,
applications such as a marina. For the outdoor-to- November 2002.
indoor scenarios, it is a good choice for narrow [6] D.J. Welch and S.D. Lathrop, “A Survey of
multistory buildings. The signal degrades toward 802.11a Wireless Security Threats and Security
the inside of wide buildings (such as BP2). Use Mechanisms,” Army G6 Technical Report
ITOC-TR-2003-101, 2003.
of repeaters is recommended to enhance the
signal in deep building areas that are not covered.
Phased array antennas are also a good choice for
outdoor-to-outdoor scenarios where LOS can be
maintained; however, since the frequency is
unlicensed, interference is an issue over an
extended range. When security is enhanced using
the AES algorithm, there is also a tradeoff
between the level of security in the system
and throughput.
J. S. (JAKE) MACLEOD
Principal Vice President and
Chief Technology Officer
LEE LUSHBAUGH
Principal Vice President and
General Manager, Americas
RICK ASTLEFORD
Principal Vice President and
General Manager, Europe, Africa,
Middle East, Asia, and Asia-Pacific
88
Bechtel Offices
Buenos Aires London (Hammersmith Rd.) Rio de Janeiro Tysons Corner, Virginia
Procurement
Tel: (54-11) 4315-8000 Tel: (44-208) 846-5111 Tel: (55-21) 2579-2400 Tel: (1-703) 748-9300
and Contracting Fax: (54-11) 4315-0081 Fax: (44-208) 846-6940 Fax: (55-21) 2579-2413 Fax: (1-703) 748-9442
Esmael Dinan, PhD, and Aleksey A. Kurochkin 73 The Impacts of Antenna Azimuth and Tilt Installation Accuracy
on UMTS Network Performance
Volume 4, No. 1
2006