You are on page 1of 96

Bechtel Telecommunications

Technical Journal
An Independent Analysis of Current

Telecommunications Operational Issues January 2006


Global Headquarters
Bechtel Telecommunications Authors Contents
5295 Westview Drive
Frederick, Maryland 21703-8306

Bechtel Telecommunications Technical Journal


Tel: +1 301-228-7500 (Main) or v Foreword
Tel: +1 800-946-3632 (Toll Free)
vii Editorial
Fax: +1 301-694-6971
Timothy D. Statton and Jake MacLeod 1 Telecommunications Research and Development in the United States:
London A State of Crisis?
Bechtel Telecommunications
S. Rasoul Safavian, PhD 13 IP Multimedia Subsystems (IMS): A Standardized Approach to
245 Hammersmith Road
All-IP Converged Networks
Hammersmith
London W6 8DP Brian Coombe 37 A Survey of MEMS-Enabled Optical Devices – Applications and
United Kingdom Drivers for Deployment
Tel: +44 208-846-5093
Fax: +44 208-846-4938
Jungnam Yun, PhD 45 PHY/MAC Cross-Layer Issues in Mobile WiMAX
(POSDATA America R&D Center) and (Invited Paper)
Prof. Mohsen Kavehrad, PhD
(The Pennsylvania State University [CITCTR])
www.bechteltelecoms.com
Peter Moskal and Krishnamurthy Raghu 57 ANSI/TIA Standard 222 – Structural Standard for
Antenna Supporting Structures and Antennas:
A Comparison of Revisions F and G

Brian Perkins 65 Reducing the Amount of Fiber in Fiber-to-the-Home Networks

Esmael Dinan, PhD, and Aleksey A. Kurochkin 73 The Impacts of Antenna Azimuth and Tilt Installation Accuracy
on UMTS Network Performance

Glenn A. Torshizi 81 2.4 GHz Wi-FiTM Phased Array Antenna Evaluation

Volume 4, No. 1
2006

T ELECOMMUNICATIONS Volume 4 No. 1


T ELECOMMUNICATIONS
7211
Bechtel Offices

Abu Dhabi Houston Moscow Shanghai


Tel: (971-2) 631-8999 Tel: (1-713) 235-2000 Tel: (7-095) 961-3020 Tel: (86-21) 3305-4567
Fax: (971-2) 631-0091 Fax: (1-713) 960-9031 Fax: (7-095) 961-3015 Fax: (86-21) 6391-2999

Al Khobar, Saudi Arabia* Istanbul New Delhi Singapore


Tel: (966-3) 882-5288 Tel: (90-212) 278-2900 Tel: (94-124) 509-8000 Tel: (65) 6332-1220
Fax: (966-3) 882-5306 Fax: (90-212) 278-2913 Fax: (94-124) 234-3110 Fax: (65) 6332-1335

TURNKEY Bangkok Jakarta New York Taipei*


DEPLOYMENT Tel: (66-2) 545-7100 Tel: (62-21) 5291-6000 Tel: (1-212) 689-0100 Tel: (886-2) 2703-2880
SERVICES Fax: (66-2) 545-7777 Fax: (62-21) 5296-2278 Fax: (1-212) 689-4829 Fax: (886-2) 2703-2885

Network Planning Beijing Kuala Lumpur Oak Ridge, Tennessee Tokyo


and RF Tel: (86-10) 8453-9998 Tel: (603) 2078-2050 Tel: (1-865) 220-2000 Tel: (81-3) 3214-4481
Fax: (86-10) 8453-8303 Fax: (603) 2078-1950 Fax: (1-865) 220-2100 Fax: (81-3) 3214-2596
Engineering
Brisbane Lima Paris Toronto
Tel: (61-7) 3295-1400 Tel: (51-1) 445-8746 Tel: (33-1) 4720-5304 Tel: (1-905) 362-6600
Site Acquisition and
Fax: (61-7) 3295-1450 Fax: (51-1) 446-1255 Fax: (33-1) 4720-5506 Fax: (1-905) 362-6767
Right of Way

Buenos Aires London (Hammersmith Rd.) Rio de Janeiro Tysons Corner, Virginia
Procurement
Tel: (54-11) 4315-8000 Tel: (44-208) 846-5111 Tel: (55-21) 2579-2400 Tel: (1-703) 748-9300
and Contracting Fax: (54-11) 4315-0081 Fax: (44-208) 846-6940 Fax: (55-21) 2579-2413 Fax: (1-703) 748-9442

Construction and Cairo London (Pilgrim St.) Riyadh Warrington, England


Equipment Installation Tel: (20-2) 754-6763 Tel: (44-207) 651-7777 Tel: (966-1) 482-9051 Tel: (44-1925) 857-000
Fax: (20-2) 754-6804 Fax: (44-207) 651-7972 Fax: (966-1) 482-9563 Fax: (44-1925) 857-001
Integration and
Optimization Calgary Louisville San Diego Washington, D.C.
Tel: (1-403) 290-5000 Tel: (1-502) 244-2574 Tel: (1-619) 687-8700 Tel: (1-202) 828-5200
Fax: (1-403) 290-5050 Fax: (1-502) 244-2211 Fax: (1-619) 687-8787 Fax: (1-202) 785-2645

Frederick, Maryland Manila San Francisco *Joint-venture office

Tel: (1-301) 228-6000 Tel: (63-2) 751-1000 Tel: (1-415) 768-1234


Fax: (1-301) 228-2200 Fax: (63-2) 751-1005 Fax: (1-415) 768-9038

Glendale, Arizona Mexico City Santiago


Tel: (1-602) 368-1500 Tel: (52-55) 5201-3500 Tel: (56-2) 675-1000
Fax: (1-602) 368-1615 Fax: (52-55) 5202-1785 Fax: (56-2) 232-5208

Hong Kong Montreal Seoul


Tel: (852) 2970-7000 Tel: (1-514) 871-1711 Tel: (82-2) 512-2921
Fax: (852) 2840-1272 Fax: (1-514) 871-1392 Fax: (82-2) 512-2931
Bechtel
Telecommunications
Technical Journal
January 2006
Bechtel Telecommunications
Technical Journal
Volume 4, Number 1
Contents

ADVISORY BOARD Foreword v


Jake MacLeod, Principal Vice President and
Chief Technology Officer Editorial vii
S. Rasoul Safavian, PhD, Vice President of Technology,
Americas Regional Business Unit Telecommunications Research and Development 1
Aleksey A. Kurochkin, Deputy Manager, in the United States: A State of Crisis?
Site Development and Engineering
Timothy D. Statton and Jake MacLeod
Brian Coombe, Systems Engineer

IP Multimedia Subsystems (IMS): A Standardized Approach 13


EDITORIAL BOARD to All-IP Converged Networks
S. Rasoul Safavian, PhD, Editor-in-Chief S. Rasoul Safavian, PhD
Richard Peters, Senior Technical Editor
Teresa Baines, Senior Technical Editor A Survey of MEMS-Enabled Optical Devices – 37
Barbara Oldroyd, Technical Editor
Ruthanne Evans, Technical Editor
Applications and Drivers for Deployment
Brian Coombe
GRAPHICS/DESIGN
PHY/MAC Cross-Layer Issues in Mobile WiMAX 45
Keith Schools, Art Director (Invited Paper)
Daniel Kemp, Senior Graphic Designer
Jungnam Yun, PhD (POSDATA America R&D Center) and
John Cangemi, Graphic Designer
David Williams, Graphic Designer Prof. Mohsen Kavehrad, PhD (The Pennsylvania State University [CITCTR])
Susan Gann, Graphic Designer
Diane Cole, Desktop Publishing ANSI/TIA Standard 222 – Structural Standard for 57
Antenna Supporting Structures and Antennas:
The BTTJ is also available on the Web at A Comparison of Revisions F and G
www.bechteltelecoms.com/jsp/labs/pubs.jsp Peter Moskal and Krishnamurthy Raghu

Reducing the Amount of Fiber in Fiber-to-the-Home Networks 65


TRADEMARK ACKNOWLEDGMENTS Brian Perkins
All product or service names mentioned in this Bechtel
Telecommunications Technical Journal are trademarks of The Impacts of Antenna Azimuth and Tilt Installation Accuracy 73
their respective companies. Specifically:
on UMTS Network Performance
3GPP is a trademark of the European Telecommunications Esmael Dinan, PhD, and Aleksey A. Kurochkin
Standards Institute (ETSI) in France and other
jurisdictions.
2.4 GHz Wi-FiTM Phased Array Antenna Evaluation 81
AirMagnet is a trademark of AirMagnet, Inc.
Glenn A. Torshizi
Aironet is a trademark of Aironet Wireless Communications,
Inc.
Antenex is a registered trademark of Antenex, Inc.
cdma2000 is a registered trademark of the
Telecommunications Industry Association (TIA-USA).
PLS-POLE is a registered trademark of the Power Line
Systems, Inc.
Telcordia is a registered trademark of Telcordia
Technologies, Inc., in the United States, other countries,
or both.
© 2006 Bechtel Corporation. All rights reserved.
TOWER is a registered trademark of the Power Line
Systems, Inc. Bechtel Telecommunications is a business unit of the Bechtel group of companies, including Bechtel Corporation in
the United States.
UNIX is a registered trademark of The Open Group.
Wi-Fi is a trademark of the Wireless Ethernet Compatibility Bechtel welcomes inquiries concerning the BTTJ. For further information or for permission to reproduce any paper
included in this publication in whole or in part, please contact Bechtel Telecommunications, 5275 Westview Drive,
Alliance, Inc. Frederick, MD 21703, telephone 301-228-7500 or toll-free 800-946-3232, and ask for the Chief Technology Officer.

Although reasonable efforts have been made to check the papers included in the BTTJ, this publication should not
be interpreted as a representation or warranty by Bechtel Corporation of the accuracy of the information contained
in any paper, and readers should not rely on any paper for any particular application of any technology without
professional consultation as to the circumstances of that application. Similarly, the authors and Bechtel Corporation
T ELECOMMUNICATIONS disclaim any intent to endorse or disparage any particular vendors of any technology.

January 2006 • Volume 4, Number 1 iii


Foreword

I
t is with great pleasure that we bring you this latest issue of the Bechtel Telecommunications
Technical Journal (BTTJ). The BTTJ is a compilation of expert commentaries on global operational
issues important to wireless and wireline telecommunications systems operators.
This issue leads off with an interesting historical analysis of the impact in the United States of the Bell
Laboratories divestiture in the mid-1980s. Entitled “Telecommunications Research and Development
in the United States: A State of Crisis?,” the paper is not so much operationally focused as it is a
discussion of the importance of maintaining substantial emphasis on long-term telecommunications
research for the benefit of the global society. You’ll also find a paper by Peter Moskal and
Krishnamurthy Raghu entitled “ANSI/TIA Standard 222 – Structural Standard for Antenna
Supporting Structures and Antennas: A Comparison of Revisions F and G.” This paper is a significant
technical discussion of the importance of structural and mechanical standards for antenna
support structures.
This is the second issue in which we have invited guest authors to contribute. Dr. Jungnam Yun of
the POSDATA America R&D Center in Santa Clara, California, and Professor Mohsen Kavehrad,
PhD, of The Pennsylvania State University Center for Information and Communications Technology
Research in University Park, Pennsylvania, have collaborated on a very insightful technical
discussion of “PHY/MAC Cross-Layer Issues in Mobile WiMAX.” The paper provides an overview
of mobile WiMAX, especially on OFDMA/TDD systems, and addresses issues that need to be
resolved to increase throughput, cell coverage, and spectral efficiency.
My congratulations and sincere appreciation are extended to this issue’s authors and contributors.
A special level of gratitude goes to Dr. Rasoul Safavian, vice president of Technology, Americas
Regional Business Unit, for accepting the responsibility of editor-in-chief. Dr. Safavian brings
extensive technical knowledge and industry expertise to the BTTJ.
Thank you for your interest and your continued support. We encourage and welcome your
comments regarding the topics chosen. You can submit comments and suggestions for improving
the BTTJ by visiting the Bechtel Telecommunications Web site and clicking on the BTTJ
“Contact Us” section. Past issues can be downloaded from our technology Web site at
www.bechteltelecoms.com/jsp/labs/pubs.jsp.
May your new year be safe, productive, and prosperous.

Sincerely,

Jake MacLeod
Principal Vice President and Chief Technology Officer
Bechtel Telecommunications

January 2006 • Volume 4, Number 1 v


Editorial

W
elcome to the latest issue of the BTTJ! We focused our journal’s spotlight on the truly
exciting times in which we are living. Technical advances are occurring at a phenomenal
pace. The dot.com collapse and the telecommunications slowdown of the early 2000s have
been replaced by a burgeoning array of new offerings to put the latest news, sports, music, and games
right in the consumers’ hands.
In the arena of wireless telecommunications, 3G network deployments and R&D on even more
powerful technologies are both well underway. With the December 2005 ratification of the WiMAX
mobile standard (802.16e or 2005), vendors are energetically engaged in developing and testing new
WiMAX mobile infrastructures. The IMS promises to further revolutionize the mobile landscape by
merging the power of the Internet with the convenience of wireless services. And FMC is also picking
up significant momentum.
Significant wireline developments are also occurring. The MEMS-based optical components now
being deployed increase speed while reducing costs, power consumption, and size. The prospect of
reduced capital costs is spurring a closer look at ways to decrease FTTH waste by reconfiguring
serving areas and hub locations. Even antennas and their supporting structures are in the spotlight as
they are about to benefit from state-of-the-art practices incorporated into the latest building codes
and standards.
At the same time, I would like the readers to pay particular attention to this issue’s insightful lead
paper by Tim Statton and Jake MacLeod, which provides a thorough analysis of the state of
Telecommunications R&D in the U.S. The article puts U.S. efforts in perspective with global
R&D activities, and highlights the essential long-term R&D areas required for the benefit of the
global community.
I also encourage you to read the timely and perceptive paper contributed by our invited guest authors,
Dr. Yun and Professor Kavehrad, who put the spotlight on an overview of mobile WiMAX, especially
OFDMA/TDD systems and some of the PHY/MAC cross-layer issues, and possible resolutions
through radio resource management.
I hope you find this new issue of the BTTJ informative and useful. As always, we look forward to your
comments and contributions.

Happy reading!

Dr. S. Rasoul Safavian


Editor-in-Chief

January 2006 • Volume 4, Number 1 vii


TELECOMMUNICATIONS RESEARCH AND
DEVELOPMENT IN THE UNITED STATES:
A STATE OF CRISIS?

Issue Date: January 2006

Abstract—The United States of America has held a leadership position in telecommunications R&D for the
past several decades and has significantly contributed to the global community’s deployment of high quality
communications systems. As a result of the divestiture of the Bell System in the 1980s, Bell Laboratories—the
primary telecommunications R&D facility in the US—was divided and refocused to concentrate on producing
near-term profits for the Regional Bell Operating Companies. This paper examines the impact of the lack of a
centrally funded mechanism for telecommunications R&D in the US and the declining position of the US as a
global contributor to the telecommunications industry. Suggestions for resolving this matter are offered for
consideration to the telecommunications industry and to the federal government.

BACKGROUND Universal Service


n the 1907 American Telephone and Telegraph One objective of the development of the
I Corporation (AT&T) annual report, AT&T
president Theodore Vail promoted a position
telephone network in the early days was
“universal service.” Essentially, the Bell System
that, given the direction of the industry and the was charged with providing affordable, high
technology, the business of telephony would be quality, reliable telephone service to business and
much more efficiently and uniformly deployed to residential customers in cities and rural areas.
US citizens if telecommunications was treated as Universal service was partially defined in the US
a legally sanctioned monopoly. Vail suggested Communications Act of 1934: “For the purpose of
that regulation, “provided it is independent, regulating interstate and foreign commerce in
intelligent, considerate, thorough and just,” communications by wire and radio so as to make
would be the most effective approach versus a available, so far as possible, to all of the people of
business driven by market competition [1]. In the United States, without discrimination on the
1913, the US government accepted the basis of race, color, religion, national origin or sex,
proposition and formed an agreement, entitled a rapid, efficient, nation-wide and world-wide
the Kingsbury Commitment, wherein the Bell wire and radio communication service with
System was allowed to evolve as a natural adequate facilities at reasonable charges for the
monopoly whose focus was to deploy a uniform purpose of the national defense, for the purpose
telecommunications system to provide universal of promoting safety of life and property through
service to US citizens. Strict adherence to the the use of wire and radio communication….” [2]
technical uniformity of the network design The natural tendency of the corporate focus is to
specifications provided a foundation for reliable serve the more profitable market sectors and
communications that was unprecedented in the avoid the less profitable. Obviously, the more
global theater. The resulting telecommunications lucrative telephone customers are located in
network contributed significantly to the economic central business districts. However, to encourage
and social successes of the US through periods extension of telecommunications into rural and
of peacetime and periods of war and crisis. residential areas, the US government allowed the
Timothy D. Statton
The telecommunications network provided a Bell System to subsidize rural and residential
tstatton@bechtel.com
platform that was an essential element for sectors with the profits realized from the
developing an efficient and effective commercial business sector. The Bell System was also
Jake MacLeod and governmental environment. It formed provided a guaranteed rate of return on
jmacleod@bechtel.com the basis of what is known today as the investment on all capital expenditures involved
information highway.

© 2006 Bechtel Corporation. All rights reserved. 1


ABBREVIATIONS, ACRONYMS, AND TERMS
2.5G “second-and-a-half” generation, IPv4 Internet Protocol Version 4
a marketing designation for an
IPv6 Internet Protocol Version 6
intermediate level of digital
mobile phone service responding ITR information technology research
to demands for greater bandwidth
ITU International Telecommunication
3G third generation enhanced digital Union
mobile phone service at
laser light amplification by stimulated
broadband speeds enabling both
emission of radiation
voice and nonvoice data transfer
LSN large scale networking program
3GPP™ Third Generation Partnership
Project MIMO multiple input, multiple output
4G fourth generation, enhanced digital NIAP National Information Assurance
mobile phone service boosting data Partnership
transfer rates to 20–40 Mbps
NIST National Institute of Standards
AMPS advanced mobile phone service and Technology
ARIB Association of Radio Industries NSF National Science Foundation
and Businesses
NTIS National Technical Information
AT&T American Telephone and Service
Telegraph Corporation
OECD Organisation for Economic
ATIS Alliance for Telecommunications Co-operation and Development
Industry Solutions
OTP Office of Technology Policy
CCSA China Communications Standards
QoS quality of service
Association
R&D research and development
CD compact disk
radar radio detection and ranging
CEPT Conference of European Posts and
Telegraphs RBOC Regional Bell Operating
Company
CTO chief technology officer
RTD research and technological
CTR communications technology
development
research
SHRCWC Shanghai Research Centre for
DARPA Defense Advanced Research
Wireless Communications
Projects Agency
sonar sound navigation and ranging
DoD Department of Defense
SME subject matter expert
DSP digital signal processor
TA Technology Administration
EDGE enhanced data rates for GSM
(US Department of Commerce)
evolution
TDD time division duplex
ETSI European Telecommunications
Standards Institute TIA Telecommunications Industry
Association
EU European Union
TTA Telecommunications Technology
FDD frequency division duplex
Association
FP Framework Programme
TTC Telecommunications Technology
GPRS general packet radio service Committee
GSM global system for mobile U.S. United States Alliance for
communications A-TEAM Technology and Engineering for
Automotive Manufacturing
HSDPA high speed downlink packet access
UMTS universal mobile telephone
HSUPA high speed uplink packet access
service
IEEE Institute of Electrical and
USCAR United States Council for
Electronics Engineers
Automotive Research
IETF Internet Engineering Task Force
UTRA universal terrestrial radio access
IMT-2000 International Mobile
WCDMA wideband code division multiple
Telecommunications-2000
access

2 Bechtel Telecommunications Technical Journal


in deploying telephony networks. The more • Digital transmission and switching—
capital equipment the Bell System purchased and 1962—First digitally multiplexed
commissioned into service, the more profit the transmission of voice signals
Bell System would realize because the capital • Cellular telephone technology—1945:
expenditures were added to the rate base, cellular telephone concept developed;
thereby increasing the volume of the return. The January 1979: Bell System Technical Journal
formula worked quite well, and the telephone issued commercial design guidelines for
network expanded rapidly and uniformly across advanced mobile phone service (AMPS)
the nation, in cities and rural areas
simultaneously. The US led the world in • Communications satellites—1962—First
telecommunications technology as well as in orbiting communications satellite, Telestar I,
percentage of population penetration. built and successfully launched by Bell Labs
• Digital signal processors (DSPs)—1979— Bell Labs was a
It was recognized in 1925 that the development of
First single-chip digital signal processor built
telecommunications network technology and brain trust, a
by Bell Labs, launching numerous
equipment relied heavily on scientific research
multibillion-dollar businesses. DSPs are used national treasure,
and development [3]. Therefore, AT&T
in almost every aspect of our current daily wherein the nation’s
established Bell Laboratories for the sole purpose
lives, from compact disk (CD) players to cars best and brightest
of advancing telecommunications industry
and trucks.
technologies. Bell Labs was funded with a few telecommunications
cents from every telephone bill. This centrally • Touch tone telephone—1963—Replacement
research scientists
funded research and development (R&D) for the rotary dial telephone
organization was stable with regard to the source explored new
• UNIX® Operating System and C
of funding and secure in the sense that the Language—1969 and 1972, respectively— avenues of
scientists could depend on being employed by Made large-scale networking of diverse communications
Bell Labs for life. Bell Labs became a magnet for computing systems and the Internet practical technology.
the world’s leading scientists and engineers.
In addition, the following technologies were
The network’s continued success and either developed or significantly enhanced at
modernization were ensured by the Bell Labs:
telecommunications innovations that emanated
• Radar (radio detection and ranging)—
from Bell Labs. Bell Labs was a brain trust, a
Invented in Europe but further developed
national treasure, wherein the nation’s best and
and miniaturized for use in aircraft
brightest telecommunications research scientists
during WWII
explored new avenues of communications
technology. Bell Labs was intentionally isolated • Sonar (sound navigation and ranging)—
from the pressure for economic performance, to Enhanced by Bell Labs with data
stimulate the creativity of the scientists. As a compression and noise analysis techniques
result, Bell Labs produced an impressive list of • Hearing aid—Made possible in its modern
innovative products and discoveries: version by use of the junction transistor
• Transistor—1947—Revolutionized not only invented at Bell Labs
telephony, but the world • Artificial larynx—Invented by Bell Labs
• Laser (light amplification by stimulated in 1928
emission of radiation)—1958—Enabled new • Talking movies
multibillion-dollar industries within the
• Two-way television
fields of medicine, communications, and
consumer electronics Bell Labs has produced some of the world’s
leading scientists in several disciplines and
• Optical communications—Advances in
whose global recognition is evidenced by:
photonics extending from enhancement of
optical lasers to significant improvements in • 6 Nobel Prizes in physics shared by
the quality and capacity of optical fiber 11 scientists
• Data networking—1925: first fax; late 1940s: • 9 US Medals of Science
first remote operation of a computer—
• 7 US Medals of Technology
Continued significant developments in data
transport technology • 1 Draper Prize
• 6 Marconi International Fellowship Awards

January 2006 • Volume 4, Number 1 3


• 7 Computer & Communication Prizes shared research; therefore, the corporate funds that are
by 12 scientists and engineers reluctantly allocated to the R&D equation are
• 28 IEEE Medal of Honor winners heavily weighted to the development (zero to
18 months) versus the research (24 to 60 months)
• 28,000 patents since 1925 portion of the equation. Although this formula
may be effective to produce short-term
Divestiture performance, when the momentum of the
On January 1, 1884, it was deemed necessary by previous research efforts reaches a zero state, the
the US government, via a decision by Federal results will unfortunately be very detrimental to
Judge Harold Greene, that the Bell System should the US economy.
be split apart and its monopolistic hold on the
We are at a point in history when the US is no
telecommunications industry be released. The
longer driving the technology and setting the
Centralized federal resulting seven Regional Bell Operating
direction of telecommunications. If the trend
funding of focused Companies (RBOCs) had specific market
continues and no immediate action is taken,
mandates for service, competition, and
telecommunications the US will simply remain a passenger on the
profitability, but the role of the centralized Bell
research has not bus of technology, dependent on others (notably,
Labs was uncertain. Bell Labs was not
Europe and the Asia Pacific countries) to take us
been supported by accustomed to the market pressures focused on
to destinations that may not be in the nation’s
the federal budget quarterly returns and profitability rather than
best interest. The most significant recent telecom-
providing a platform for visionaries developing
in past years. munications advancements have not originated
products for the future use of society. The RBOCs
from US R&D laboratories, but rather from
attempted to maintain the brain trust at Bell Labs
excellent, state-of-the-art laboratories abroad. No
by establishing a governing board that would
longer are US laboratories the primary magnet
jointly direct the efforts of the scientists, but
for exceptional scientific talent; in their place, the
eventually each RBOC had different business
secure, coordinated R&D focus of technical
objectives for the common pool of scientists. After
communities abroad is attracting the top talent.
much effort and wrangling, each RBOC
withdrew its proportional funding of Bell Labs
and the scientists were integrated into the various Federal Funding in the US
RBOCs to establish decentralized, RBOC-focused Centralized federal funding of focused
laboratory facilities. This disaggregation of the telecommunications research has not been
brain trust marked the end of Bell Labs as we supported by the federal budget in past years. As
knew it. The core teams were required to morph can be seen in Table 1, the US government
into several smaller profit-generating machines. budgeted approximately $2 billion for net-
working and information technology R&D for
fiscal years 2004 and 2005 [4]. The funding was
THE SITUATION TODAY spread across several agencies, so the focus of the
funded research was immediately diluted. The
oday the US depends on corporate budget
T allocations as its primary source of funding
for telecommunications R&D. The problem is
$2 billion represents less than 1.6 percent of the
$132 billion actually requested for R&D by all
agencies for 2005. Further, only $330 million of
that the US financial market demands near-term
the $2 billion was requested for the large-scale
performance to the detriment of long-term

Table 1. Agency Detail of Selected Interagency R&D Efforts ($ million) [6]

Networking and Information Dollar Change: Percent Change:


2003 Actual 2004 Estimate 2005 Proposed
Technology R&D 2004 to 2005 2004 to 2005

National Science Foundation 743 754 761 7 1


Health and Human Services 376 368 371 3 1
Energy 308 344 354 10 3
National Aeronautics and Space
213 275 259 –16 –6
Administration
Defense 296 252 226 –26 –10
Commerce 26 26 33 7 27
Environmental Protection Agency 2 4 4 0 0
Total 1,964 2,023 2,008 -15 -1

4 Bechtel Telecommunications Technical Journal


networking (LSN) program, which includes Table 2. Budgets for the EU Framework Programmes [8]
both computing and noncomputing (telecom-
Framework Time Funding
munications) research. Less than half of the LSN
Programme Frame (€ billion)
allocation was dedicated to telecommunications
R&D. Hence, less than one-tenth of total federal First 1984 to 1987 3.75
spending on networking and information
technology R&D was allocated for telecom- Second 1987 to 1991 5.36

munications research [5].


Third 1990 to 1994 6.60
Although the US has verbally recognized for
Fourth 1994 to 1998 13.12
several years the need (e.g., September 11, 2001;
Hurricane Katrina) for reliable, secure,
Fifth 1998 to 2002 14.96
interoperable, feature-rich communications, little
It is clearly evident
or no focused strategic funding mechanism has Sixth 2002 to 2006 17.50
materialized. Other countries have made that the EU
strategically focused, concerted efforts to enhance Seventh 2007 to 2013 72,726 recognizes the
telecommunications R&D by providing central criticality of
repositories to fund long-term initiatives.
For the upcoming Seventh Framework Program communications to
(FP7), entitled “ManuFUTURE Vision for 2020,” developing and
The European Centrally Funded Framework the period of funding has been extended from the
Model sustaining society
normal 4 years to 7. FP7’s concentrated focus over
The European Union (EU) has established a this period will be to develop innovations that and economic
coordinated multi-annual, multinational funding will integrate digital technologies into the stability.
mechanism, the Framework Programme, that manufacturing processes. Competitive advantage
helps to organize and financially support in the global market place is the objective. Of the
cooperation among universities, research centers, €72,726 billion that will be allocated to FP7,
and industries—including small and medium- €12,670 billion (17.4 percent) is focused on
sized enterprises. Oversight of this program is the Information Society research (see Table 3).
responsibility of the EU’s Research Directorate
General. It is clearly evident that the EU recognizes the
criticality of communications to developing and
The Research Directorate General’s mission is sustaining society and economic stability. The
summarized as follows: apparent lapse, on the other hand, in the US’s
recognition that all manner of commerce and
• “to develop the European Union’s policy
society rides on the back of communications
in the field of research and technological
technology, has caused us to lose our
development and thereby contribute to
commanding position in the telecommunications
the international competitiveness of
research community and will continue to
European industry;
diminish our global status if we do not establish a
• to coordinate European research activities strategic and focused mechanism to encourage
with those carried out at the level of the primary research.
Member States;
A partial listing of significant telecom-
• to support the Union’s policies in other fields
munications developments that have had their
such as environment, health, energy, regional
genesis in Europe or that have been heavily
development etc;
influenced by the excellent technologists in the
• to promote a better understanding of the role EU includes the following:
of science in modern societies and stimulate a
• GSM—In 1982, the Conference of European
public debate about research-related issues at
Posts and Telegraphs (CEPT) formed a study
European level.” [7]
group called the Groupe Spécial Mobile
As shown in Table 2, the First Framework (GSM) to study and develop a pan-European
Programme for research and technological public land mobile system that had to meet
development (RTD) was established in 1984 with certain criteria. In 1989, the responsibility for
a budget of €3.750 billion, while the current Sixth developing what is now known as the global
Framework Programme covering the period system for mobile communications (which
2002–2006 has a budget of €17.5 billion. retains the GSM acronym) was transferred
to the European Telecommunications

January 2006 • Volume 4, Number 1 5


Table 3. Budget Breakdown for the Seventh Framework Programme 2007–2013 [9]

Amount % %
Category Element
(€ million) Category Total
Health 8,317 18.72

Food, Agriculture, and Biotechnology 2,455 5.53

Information and Communications


Technologies 12,670 28.52
Nanosciences, Nanotechnologies, Materials and
new Production Technologies 4,832 10.88
Cooperation
Energy 2,931 6.60
Environment (including Climate Change) 2,535 5.71
Transport (including Aeronautics) 5,940 13.37
Socio-economic Sciences and the Humanities 792 1.78
Security and Space 3,960 8.91
Total Cooperation 44,432 61.10
Ideas European Research Council 11,862 100 16.31
People Marie Curie Actions 7,129 100 9.80
Research Infrastructures 3,961 53
Research for the Benefit of SMEs 1,901 25
Regions of Knowledge 158 2
Capacities
Research Potential 554 7
Science in Society 554 7
Activities of International Cooperation 358 5
Total Capacities 7,486 100 10.29
Nonnuclear Actions of the Joint Research Center 1,817 2.50
Total Budget 72,726

Standards Institute (ETSI). Phase I of the The original scope of 3GPP was to produce
GSM specifications was published in 1990, globally applicable technical specifications
and commercial service was started in 1991. and technical reports for a 3G mobile system
Today, GSM accounts for more than based on evolved GSM core networks and
75 percent of the world’s mobile telephone the radio access technologies that they
market (1.2 billion subscribers) and is used in support (i.e., universal terrestrial radio access
more than 210 countries and territories. [10] [UTRA], both frequency division duplex
• GPRS—General packet radio service is a [FDD] and time division duplex [TDD]
GSM-based mobile data service widely used modes). The scope was subsequently
throughout the world. It is commonly amended to include the maintenance and
referred to as 2.5G technology and provides development of the GSM technical
a transmission data speed of 171 kbps specifications and technical reports,
(54 kbps effective). including evolved radio access technologies
(e.g., GPRS and enhanced data rates for
• 3GPP™—Third Generation Partnership GSM evolution [EDGE]).
Project is a collaboration agreement that was
established in December 1998. The agreement • UMTS—Universal mobile telephone service,
brings together a number of globally located commonly referred to as 3G mobile
telecommunications standards bodies. These technology, is an advanced mobile
“Organizational Partners” are the communications technology that provides
Association of Radio Industries and enhanced features and functions at a reduced
Businesses (ARIB), China Communications network cost. UMTS was derived out of the
Standards Association (CCSA), ETSI, International Mobile Telecommunications-
Alliance for Telecommunications Industry 2000 (IMT-2000) and 3GPP effort at the
Solutions (ATIS), Telecommunications International Telecommunication Union
Technology Association (TTA), and Telecom- (ITU). At the end of 2004, there were in excess
munications Technology Committee (TTC). of 16 million 3G UMTS subscribers in

6 Bechtel Telecommunications Technical Journal


60 networks in 25 countries. The growth Economic and Social Development, examined
rate of UMTS is exceeding the GSM and approved by the Fifth Plenary Session of the
growth curves at the comparable stage of 15th Central Committee of the Communist Party
market introduction. of China, states, “We shall support, encourage
• HSDPA—High speed downlink packet and guide the healthy development of private
access is a packet-based data service in the enterprises, especially small and medium-sized
wideband code division multiple access technology-intensive companies.” The proposal
(WCDMA) downlink with data transmission also says, “The means of planning, finance and
speeds up to 14 Mbps (20 Mbps with multiple banking must be used comprehensively. The
input, multiple output [MIMO]) over 5 MHz leverage functions of price, tax, interest rates and
channel bandwidth. HSDPA enhances the exchange rates must be allowed to play their part,
data transmission capabilities of UMTS and so as to guide and promote economic
is expected to be widely deployed in 2006. restructuring and safeguard the stable growth of But in 2004,
the economy.” Additionally, the proposal noted the top 10 list,
• HSUPA—High speed uplink packet access, that promoting the application of information
like HSDPA, is an enhancement to the UMTS which included four
technology is a trend in current world economic
communications systems and will provide and social development and the key link to US companies,
data rates that will enable full-rate video upgrading China’s industrial structure and five Japanese
conferencing from mobile telephones. It is a realizing industrialization and modernization. companies, and
part of the 3GPP Release 6 standards.
China’s Ministry of Information Industry has one South Korean
• IPv6—Internet Protocol Version 6 is the next-
started compiling the 11th Five-Year Plan for company,
generation IP designed by the Internet
2006–2010. According to the ministry, the
Engineering Task Force (IETF) to replace was marked by
following projects are to be included in the plan:
IPv4. IPv6 will enhance IP features and the absence of
“information technology development in the next
functionality, will provide a tremendous
five to 10 years, domestic and overseas market, a domestic
increase in the number of available
third generation mobile communications, digital telecommunications
addresses, and will allow network
television, new display devices, software and
auto-configuration and quality-of-service company.
(QoS) levels. Table 4. Top Patenting Corporations [11, 12]

Company Patents
Patents
A statistical indication highlighting the erosion of 1977–1996
thought leadership in the US is the number of General Electric Corp. 16,206
patents filed in the US Patent and Trademark
International Business Machines Corp. 15,205
Office by US companies versus foreign
Hitachi Ltd. 14,500
companies. In the past, the statistics were heavily
weighted toward US companies, including Canon Kabushiki Kaisha 13,797
telecommunications companies like AT&T and Toshiba Corp. 13,413
Motorola (see Table 4). But in 2004, the top 10 list, Mitsubishi Denki Kabushiki Kaisha 10,192
which included four US companies, five Japanese
U.S. Philips Corp. 9,943
companies, and one South Korean company,
Eastman Kodak Co. 9,729
was marked by the absence of a domestic
telecommunications company. AT&T Corp. 9,380

Motorola Inc. 9,143

China’s Long-Term, Strategic Planning 2004


China is emerging as a significant world power in International Business Machines Corp. 3,248
the realm of telecommunications R&D. Like the
Matsushita Electric Industrial Co. Ltd. 1,934
EU, China has a coordinated, long-term, strategic
Canon Kabushiki Kaisha 1,805
plan with specific, focused objectives that
are centrally funded. According to recent Hewlett-Packard Development Company, L.P. 1,775

Organisation for Economic Co-operation and Micron Technology, Inc. 1,760


Development (OECD) reports, China’s total R&D Samsung Electronics Co. Ltd. 1,604
investments lag only those of the US and Japan in
Intel Corporation 1,601
absolute terms.
Hitachi Ltd. 1,514
The Proposal of the Central Committee of the Toshiba Corporation 1,310
Chinese Communist Party for Formulating the
Sony Corporation 1,305
10th Five-Year Plan (2001–2005) for National

January 2006 • Volume 4, Number 1 7


integrated circuits, automotive electronics, Potential Funding Mechanisms
communications laws and regulations, study of 1. Establish a National Technology Council,
telecom competitiveness, telecom network whose charter would be to define and guide
interoperation, value-added service and other strategic areas in communications that
issues concerning the telecom trade, network require further research critical to the future
and information security system, government growth of the US economy. Such a Council
online, e-commerce application and regional should include representation from different
information industry development.” If sustained, sectors, such as government, academia, and
this intense focus on telecommunications industry.
and information technologies will definitely
a. To use scarce financial resources effectively,
propel China into a leadership position in the
representatives from government, aca-
global telecommunications marketplace in the
demia, and industry should be sought to
China is solidly near term.
establish long-term priorities. Additional
focused on the Evidence of the strength of China’s strategy is seen research would help identify the
long-term benefits in Ericsson’s recent press announcement by CEO technologies likely to be most relevant to
of investing in Carl-Henric Svanberg announcing that, in a US economic growth and competitiveness.
strategic move in the field of R&D cooperation, b. This Council should be modeled after the
telecommunications
Ericsson has signed the first research agreement EU’s Sixth Framework Programme
R&D. with Shanghai Research Centre for Wireless initiative, wherein the Council receives
Communications (SHRCWC). Under the proposals from industry consortia
agreement, Ericsson will collaborate with regarding specific areas of focused research
SHRCWC in undertaking research projects on and development and has available
future telecommunications technology such as substantial funding from the government to
“Super 3G” and 4G. The agreement further help fund those proposals.
demonstrates Ericsson’s commitment to drive the
development of the telecoms industry in China. c. This Council should also borrow from the
During the Summit, Mats H. Olsson, president of United States Alliance for Technology and
Ericsson Greater China, confirmed Ericsson’s Engineering for Automotive Manufacturing
long-term commitment to the country, (U.S. A-TEAM), a partnership created
announcing a US$1 billion investment for the next between the US Department of Commerce’s
5 years [13]. Technology Administration (TA)
(consisting of the Office of Technology
China is solidly focused on the long-term benefits Policy [OTP], the National Institute of
of investing in telecommunications R&D. China is Standards and Technology [NIST], and the
not hindered by the unbalanced competitive National Technical Information Service
market pressures that unreasonably emphasize [NTIS]) and the United States Council for
near-term performance to the detriment of long- Automotive Research (USCAR). The U.S. A-
term investment. In forward-focused societies, TEAM brings together engineers from
enterprises are severely penalized if they do not government and industry bodies that are
have a long-term perspective to balance short-term parties to the agreement to facilitate
performance objectives. technological research and technology
policy analysis focused on improving the
manufacturing competitiveness of the US
SUGGESTED PATH FORWARD automotive industry.
he Telecommunications Industry Association
T (TIA), in coordination with its Chief
Technology Officer (CTO) Council, has carefully
d. The Council, in cooperation with industry,
would determine the priority of the specific
research initiatives of national concern.
considered several potential options to resolve the
2. Prioritize communications research funding
US’s R&D crisis and to re-establish the leadership
within Department of Defense (DoD) 6.1
position of the US telecommunications R&D
Basic Research Programs.
community. The TIA has distilled the numerous
options down to the following four mechanisms to a. In the 1990s, the DoD and the Defense
address the funding problem and then has Advanced Research Projects Agency
suggested five critical areas that require technical (DARPA) began to rely heavily on dual use
focus [14]. and industry research funding. Thus,
DoD funding became unavailable for

8 Bechtel Telecommunications Technical Journal


commercially available technologies. As a communications sector by creating
result, DoD restricted its research funding opportunities at the frontiers of
to military-unique needs, which was communications research and education.
acceptable at the time because private-
sector-led research was driving high end Recommended Areas of Research Focus
research. The following TIA-recommended areas of focused
b. With the communications downturn, how- research closely parallel the technology research
ever, the commercial sector has ceased to be budget recommendations by the Office of the
the major driver of high-end, long-term President of the United States [15]:
research. As a result, DoD and DARPA
1. Universal Broadband—Affordable broad-
need to increase their focus on and
band access and connectivity, using all
investment in dual-use technologies.
available media (copper, coax, fiber,
3. Prioritize communications research funding spectrum, etc.), carrying all services (voice,
within the National Institute of Standards data, video) to all customers everywhere
and Technology. (urban, suburban, rural, mobile) to enable a
greatly upgraded “superhighway.”
a. Miniaturization of electronic components in
communications devices continues, a. Broadband Internet access is critical to
resulting in faster, more powerful, more support technology convergence and
reliable products. Yet, the continued advanced communications. A forward-
shrinking of component parts at the looking US government should support
nanoscale is hindered by metrology and universal access for broadband Internet, as
manufacturing challenges. NIST programs well as policies that promote widespread
address some of these key issues and connectivity. Infrastructure upgrades create
should be adequately funded. increasing returns to our economy and
encourage the development of busi-
b. Additionally, the TIA supports the
nesses, entertainment, education, and
continuation of the National Information
e-government solutions and capabilities.
Assurance Partnership (NIAP), a collab-
oration between NIST and the National b. Additional federally funded research in this
Security Agency. The long-term goal of field is needed, particularly because special
NIAP is to help increase the level of trust technologies will be needed for rural access,
consumers have in their information and corporate and venture capital financing
systems and networks through the use of for research has dropped significantly over
cost-effective security testing, evaluation, the last several years. Extremely significant
and validation programs. cost reductions are necessary to meet the
technology needs of rural areas.
4. Prioritize communications research funding
Additionally, the provision of broadband
within National Science Foundation (NSF)
access in rural areas is costly due to
research programs.
challenges associated with terrain, low
a. Federal funding for physical sciences population density, etc.
research, the foundation of our nation’s
2. Security—New authentication, encryption,
economic competitiveness, has
and monitoring capabilities for all public
dramatically decreased. Technological
broadband networks to protect communi-
advances driving the economy require the
cations assets from attack.
reversal of this trend.
a. The US is a post-industrial information
b. The National Science Foundation Autho-
society and, as such, has a cyber-
rization Act of 2002 called for doubling the
infrastructure that is vulnerable to attack.
NSF budget over 6 years; fulfillment of that
goal is lagging. b. Continued research is needed to prevent
systemic attacks to infrastructure and may
c. In conjunction with increasing NSF’s
provide an opportunity for university-
budget, the TIA advocates for the creation
based “centers of excellence.”
of an NSF communications technology
research (CTR) program similar to the 3. Interoperable Mobility—The ability to access
information technology research (ITR) commercial mobile services and emergency
program that recently concluded. Such a services over any mobile network from any
program would greatly benefit the mobile instrument.

January 2006 • Volume 4, Number 1 9


a. Interoperable mobility enables public safety c. Advances will reduce cost; increase
and law enforcement officials to use the mobility; decrease power consumption; and
various public safety and cellular mobile improve healthcare, homeland security,
networks while avoiding the necessity of and public safety.
carrying multiple mobile devices. It also
promotes coordinated communications
among various public service agencies and CONCLUSIONS
allows higher priority use of scarce he US has recently experienced the migration
spectrum resources for emergency use.
b. Federally funded research is necessary
T of manufacturing services to regions of the
world where total costs of manufacturing are
because the emergency services market is much reduced. Now the US is witnessing
critical for the common good. Also, bringing a similar migration of the communications
It is time for the US commercial technologies and emergency research initiatives to Europe and Asia Pacific.
to stop eating the services technologies closer together will Pre-competitive communications research is
seed corn and to result in lower costs and more advanced migrating to laboratories abroad for three
features for critical emergency services. basic reasons:
begin to plant for
future harvest. 4. Communications Research for Homeland • The total cost of conducting communications
Security, including interoperability, security, research is lower in emerging countries.
survivability, and encryption.
• The financial pressure on public companies
a. Homeland Security is a superset of several to generate near-term profit severely
other visions. Security technologies can limits the allocation of budget to pre-
help protect public networks and other competitive research.
public infrastructure from malicious
• There is a lack of stable, centrally funded and
attacks. A large amount of economic
focused communications research programs
activity today depends on the continued
in the US.
availability of public broadband networks
and infrastructure. Successful attacks can The US began to lose its research leadership
slow national economic activity position in communications with the dissolution
significantly and can have other disastrous of Bell Laboratories in the mid-1980s when market
consequences (e.g., in case of identity theft). forces and the pressure on delivery of short-term
earnings replaced “cost-of-service” rate-based
b. Research is needed in all areas
monopolies. The erosion of the research leadership
(interoperability, security, survivability,
position has continued and will continue at an
and encryption) because the needs of first
accelerated rate unless immediate and decisive
responders and critical infrastructure
action is taken. In the near to medium term, the US
protection far exceed the needs of “typical”
will likely remain the dominant consumer of
commercial applications. Further research
externally developed and manufactured goods,
is also needed because new worms and
but the voice of the US will dwindle to a whisper
viruses are constantly being invented, and
regarding its influence on the product
new techniques are needed to prevent
development and evolution. The US must choose
attacks before there is significant resulting
its areas of emphasis and importance. Consumer-
damage.
focused product development and manufacture is
c. The country needs a broad program to an area unlikely to hold promise for revitalization
address our vulnerabilities and ensure the in the US. The US should, however, consider
integrity of first responder systems. The funding pre-competitive research on commu-
government should support these “extreme nications products and technologies that involve
case” applications, since they are unlikely to national security (including cyber security),
be sufficiently developed in normal personal health, and safety and disaster recovery.
commercial systems. The suggestions offered by the TIA CTO Council
5. Nanotechnology address exactly those issues.

a. Many communications advances have been The aforementioned suggestions are offered for
driven by fundamental scientific serious consideration and discussion . . . and
discoveries of nanoscale materials. action. It is time for the US to stop eating the seed
b. Examples of important research areas corn and to begin to plant for future harvest. 
include sensors, displays, power systems,
radio frequency, and nanomicrophones.

10 Bechtel Telecommunications Technical Journal


TRADEMARKS ADDITIONAL READING
3GPP is a trademark of the European dditional information sources used to
Telecommunications Standards Institute (ETSI) in
France and other jurisdictions.
A develop this paper include:
• The Task Force on The Future of American
Innovation, The Knowledge Economy: Is the United
UNIX is a registered trademark of The Open States Losing Its Competitive Edge?, February 16, 2005.
Group. • N. Gehani, Bell Labs, Life in the Crown Jewel,
Silicon Press, 2003, ISBN 0 929306-27-9.

REFERENCES
BIOGRAPHIES
[1] A Brief History: The Bell System Tim Statton is president of
(http://www.att.com/history/history3. html). Bechtel Telecommunications
[2] Communications Act of 1934, Title 1, Section 1 and an executive vice president
(http://www.fcc.gov/reports/1934new.pdf). and member of the Board of
Directors of Bechtel Group, Inc.
[3] Capsule History of the Bell System
(http://www.bellsystemmemorial.com/ Before his present appointment,
capsule_bell_system.html). Tim was president of Bechtel
Enterprises (BEn), the company’s
[4] Office of Science and Technology Policy, project development, financing,
Executive Office of the President, 2005 Budget
and ownership subsidiary.
Summary (http://www.ostp.gov/html/
budget/2005/ap05.pdf). Before joining BEn, Tim was a member of the
[5] National Coordination Office for Networking Chairman’s Leadership Council and president of
and Information Technology Research and Bechtel Energy, leading all energy-related engineering
Development (http://www.itrd.gov/pubs/ and construction activities within the company. Before
2006supplement/2006supplement.pdf). this, he was managing director for energy and water
[6] Office of Science and Technology Policy, development at BEn. He also served as manager of Asia
Executive Office of the President, 2005 Budget Pacific operations, representing Bechtel’s engineering
Summary, page 62 (http://www.ostp.gov/ and construction interests in the region. During his
html/budget/2005/ap05.pdf). extensive career in the power sector of the company,
[7] European Commission, Research Directorate- Tim held numerous field and home office positions, was
General (http://europa.eu.int/comm/dgs/ a project manager and business development manager,
research/index_en.html). and was eventually elevated to president of Bechtel’s
[8] European Commission Research Presentation, power and industrial company.
Towards the Sixth Framework Programme, Tim has been a member of the Board of the United
page 9 of 62 (http://www.lnl.infn.it/pages/
States Energy Association (USEA), the leading energy
Conferenze/Ferrini.pdf).
trade organization in the US, and has volunteered for
[9] Budget Breakdown for Seventh Framework numerous charitable and community activities. He also
Programme (http://www.cordis.lu/fp7/ served as chairman of the Board of Nexant, an energy
breakdown.htm). consulting business, and was a member of the Board
[10] GSM World; GSM Facts and Figures of Control of InterGen, an independent power
(http://www.gsmworld.com/news/ development company. He currently sits on the United
statistics/index.shtml). States Telecommunications Training Institute (USTTI)
[11] Top Patenting Corporations Board of Directors.
(http://www.nsf.gov/sbe/srs/seind04/
c6/tt0603.htm). Tim received his BS in Mechanical Engineering from
San Francisco State University, California, and his
[12] US Patent and Trademark Office Calendar Year
BS in Business/Economics from Juniata College,
2004, Preliminary List of Top Patenting
Pennsylvania. He is a member of the American
Organizations (http://www.uspto.gov/web/
offices/ac/ido/oeip/taf/top04cos.htm). Cogeneration Society and the U.S. Energy Association.

[13] Ericsson Press Release, September 7, 2005 Jake MacLeod is the chief
(http://www.3g.co.uk/PR/Sept2005/1867.htm). technology officer, Engineering
[14] Telecommunications Industry Association White and Technology, for Bechtel
Paper, Investing in Communications for Tomorrow’s Telecommunications and a
Innovations: The Case for Increased Communications Bechtel principal vice president.
Research Funding, September 2005.
Jake joined Bechtel in
[15] Executive Office of the President – Office of May 2000 and is responsible
Science and Technology Policy, Memorandum for
for expanding the scope of
the Heads of Executive Departments and Agencies, re:
Bechtel’s telecommunications
FY 2007 Administration Research and Development
Budget Priorities, July 8, 2005. engineering services to include
all aspects of technical design, from network planning
to commercial system optimization. Jake initiated and
developed Bechtel’s RF and Network Planning
team, which has grown to over 150 world-class

January 2006 • Volume 4, Number 1 11


engineers. He also designed and established Bechtel’s Jake started his career in the telecommunications
two world-class telecommunications laboratories to industry in 1978, beginning in transmission engineering
provide clients with applied research and development with Southwestern Bell Telephone Company (SWBTC)
services ranging from interoperability testing to in San Antonio, Texas. His responsibilities at SWBTC
product characterization. included design and implementation of radio systems
in Texas west of Ft. Worth. He participated in the
Jake was the first Bechtel Telecommunications person to original cellular telephone system designs for SWBTC
enter Baghdad in 2003, immediately after the conflict in San Antonio, Dallas, and Austin. After SWBTC, Jake
paused. He and his teams assessed the Iraqi became the second employee for PageNet/CellNet and
telecommunications network, then designed and vice president of Engineering for their cellular division.
replaced 12 wire centers (equivalent to 240,000 POTS He designed over 135 cellular network systems,
lines) in a period of 4 months, an unprecedented including San Francisco’s, and filed them with the FCC.
achievement in telephony. Jake and his teams also In addition to his responsibilities at PageNet/CellNet,
analyzed and replaced the air traffic control system at Jake was asked to chair the FCC’s Operational
Baghdad International Airport. Under Jake’s purview, Relationships Committee.
Bechtel’s technology teams are currently in the final
stages of developing the Virtual Survey Tool, an Jake has held executive management positions with
automated network planning tool that has the potential NovAtel (Calgary), NovAtel (Atlanta), Western
to radically change the conventional methods of Communications, and West Central Cellular. More
network design. Jake’s laboratories are currently recently, Jake spent 9 years with Hughes Network
working with two global wireless equipment Systems (HNS), where he was instrumental in
manufacturers to analyze and characterize UMTS, establishing their cellular division. He designed and
HSDPA, Node B hotels, WiMAX, and intuitive established cellular and WLL systems in areas
networks. Under Jake’s direction, the laboratories ranging from central Russia to Indonesia, as well as
annually produce two issues of the Bechtel in 57 US markets.
Telecommunications Technical Journal, an authoritative
technical publication focused on operational matters. Jake holds a BS degree from the University of Texas
The laboratories also host semi-annual global in Austin.
technology debates focused on the pros and cons of
the most advanced telecommunications technologies.
Jake, himself, provides an average of six to eight
keynote and technology-based presentations per year at
industry conferences.

12 Bechtel Telecommunications Technical Journal


IP MULTIMEDIA SUBSYSTEMS (IMS):
A STANDARDIZED APPROACH TO
ALL-IP CONVERGED NETWORKS

Issue Date: January 2006

Abstract—The IMS is a standardized approach to offering Internet services anywhere at any time using
cellular technology. The first release of the IMS is tailored for GPRS/UMTS, whereas later releases will allow
access independence, including WLANs and even fixed networks such as xDSL and cable modem.
The IMS is based on open interfaces and common elements that make it possible to provide integrated, secure,
IP-based, multimedia, multisession applications to mobile and fixed users, with guaranteed end-to-end QoS and
roaming capabilities, while providing the same services as the home network, and across different access
technologies. The IMS also allows a single sign-on authentication and provides a flexible architecture for
charging and billing. Deployment of the first version of IMS products is expected in early 2006.

INTRODUCTION
n recent years, both the Internet and wireless The 3GPP, formed in December 1998, is a
I communications have experienced a surge of
activities and successes. The success of the
collaboration of telecommunications industry
organizations to produce globally applicable
Internet stems from two main facts: It provides technical specifications for 3G mobile
useful applications such as e-mail, World Wide systems and to maintain and develop GSM
Web (www), and instant messaging (IM), and it standards. Participants include major regional
uses readily available open protocols that telecommunications standards bodies such
promote and facilitate the development of as ARIB of Japan, CSCA in China, Committee
various services and applications. The success of T1 of the US, and TTA of Korea, as well as
mobile communications is self-evident. This market representatives such as the UMTS
technology has experienced explosive growth forum, 3G America, GSM associations, and
and provides wide coverage, touching almost the IPv6 forum.
every aspect of peoples’ lives. Currently, there are
more than 1 billion mobile customers, and this universal mobile telecommunications system
number is growing! (UMTS). Release 6 of the UMTS, introduced in
Wireless systems dubbed as beyond third- March 2005, provided some enhancements to
generation (3G+) seek to merge these two the first release and introduced new concepts,
successful communications modes to provide the such as support for access independence, wireless
power of the Internet—and all of its services and local area network (WLAN) integration, and
applications—with the convenience of ubiquitous IM and presence services. Release 7, under
wireless access. The new architecture expected to development with an expected release in mid-
accomplish this, the Internet Protocol (IP) 2007, will focus primarily on fixed and mobile
multimedia subsystem (IMS), is defined in a convergence issues.
standard created by the Third Generation The Third Generation Partnership Project 2
Partnership Project (3GPP™), one of the main (3GPP2), the main standardization body for 3G
standards organizations for 3G networks. networks based on cdma2000®, has established
Different aspects of the IMS (call control, the multimedia domain (MMD), its own version
Rasoul of the IMS specification. The IMS and the MMD
Safavian, PhD charging, roaming, etc.) have been formalized
and published in various 3GPP technical are very similar, with the main differences
srsafavi@bechtel.com centering on two issues:
specifications [1–15]. The first version of the IMS
was published by the 3GPP in Release 5 of the

© 2006 Bechtel Corporation. All rights reserved. 13


ABBREVIATIONS, ACRONYMS, AND TERMS
2G second generation, the original COPS common open policy service
digital mobile phone service CS circuit switched
2.5G “second-and-a-half” generation, CSCF call SCF
a marketing designation for an
intermediate level of digital CSEQ context sequence (number)
mobile phone service responding DEC decision
to demands for greater bandwidth
Diameter A protocol that provides a
3G third generation, enhanced digital framework for any services
mobile phone service at requiring AAA/policy support
broadband speeds enabling both across many networks and that
voice and nonvoice data transfer primarily supports mobile IP,
3G+ beyond 3G, envisioned as all- accounting, network access,
digital, entirely packet-switched and strong security
radio networks involving hybrid DiffServ differentiated services
networking and access technologies
that globally integrate services and DNS domain name system
technology while providing the DSCP differentiated services code point
multiple QoS of an ATM network
ECF event charging function
and the flexibility of an IP network
FTP file transfer protocol
AAA authentication, authorization, and
accounting GGSN gateway GPRS support node
ACA accounting answer GPRS general packet radio service
ACR accounting request GSM/gsm global system for mobile
communication
AoR address of record
GTP GPRS tunneling protocol
API application program interface
HLR home location register
AS application server
HSS home subscriber server
ATM asynchronous transfer mode
HTTP hypertext transport protocol
AUC authentication center
I-CSCF interrogating CSCF
AUTN authentication token
Ik integrity key
AV authentication vector
IKE Internet exchange key
BGCF breakout gateway control function
IM instant messaging
BICC bearer independent call control
IMS IP multimedia subsystem
CAMEL customized application for mobile
network enhanced logic IM-SSF IP multimedia service switching
function
CAP CAMEL application part
IntServ integrated services
capex capital expense
IP Internet Protocol
CCA credit control answer
IP-CAN IP connectivity access network
CCC credit control client
IPSec IP security
CCF charging collection function
IPv4 Internet Protocol version 4
CCR credit control request
IPv6 Internet Protocol version 6
CDF charging data function
ISC IMS service control (interface)
cdma2000® A family of standards, developed
through comprehensive proposals ISDN integrated services digital network
from Qualcomm, describing the ISIM IMS subscriber identity module
use of code division multiple
access technology to meet 3G ISUP ISDN user part
requirements for wireless IWF interworking function
communication systems
MAA multimedia authentication answer
CDR charging data record
MAP mobile application part
CGF charging gateway function
MAR multimedia authentication request
Ck cipher key
Megaco media gateway control

14 Bechtel Telecommunications Technical Journal


MGCF media gateway control function SCS service capability server
MGW media gateway S-CSCF serving CSCF
MIME multipurpose Internet mail extension SCTP streaming control transmission
MMD multimedia domain protocol

MRF multimedia resource function SDP session description protocol

MRFC MRF control SEG security gateway

MRFP MRF processor SGSN serving GPRS support node

MSC mobile switching center SGW signaling gateway

MTP message transfer part SIM subscriber identity module

NAI network access identifier SIP session initiation protocol

OCF online charging function SLF subscriber location function

opex operating expense SMS short message service

OSA open service access SMTP simple mail transfer protocol

OTA over the air SS7 Signaling System Number 7, a


common channel signaling system
PCM pulse code modulation defined by the ITU and used to
PCS personal communication system provide a suite of protocols that
enables circuit and noncircuit-
P-CSCF proxy CSCF related information to be
PDA personal digital assistant routed about and between
telecommunications networks
PDF policy decision function (same as
policy decision point [PDP]) SSP subscriber service profile
PDG packet data gateway TCP transmission control protocol
PDP packet data protocol; also: policy THIG topology hiding internetwork
decision point (same as PDF) gateway
PEP policy enforcement point TLS transport layer security
PHB per-hop behavior TUP telephone user part
PLMN public land mobile network UA user agent
PS packet switched UAA user authorization answer
PSTN public switched telephone network UAC UA client
PTT push to talk UAR user authorization request
QoS quality of service UAS UA server
RADIUS remote authentication dial-in user UDP user datagram protocol
service UICC UMTS integrated circuit card
RAND random number UMTS universal mobile
REQ request telecommunications system
RES response URI uniform resource identifier
RFC Request for Comments URL uniform resource locator
RSVP resource reservation protocol USIM UMTS subscriber identity module
RTCP real-time transport control protocol VoIP voice over IP
RTP real-time transport protocol WiMAX worldwide interoperability for
microwave access
RTSP real-time streaming protocol
WLAN wireless local area network
SA security association
www World Wide Web
SAA server assignment answer
xDSL term used for all forms of
SAR server assignment request
technology using a digital
SBLP service-based local policy subscriber line
SCF session control function XRES expected response
SCP service control point

January 2006 • Volume 4, Number 1 15


• Mobility. The 3GPP2’s MMD is built on top of OVERVIEW OF THE IMS AND WHY IT IS NEEDED
mobile IP, whereas the 3GPP’s IMS manages s defined by the 3GPP, the IMS is a new
mobility through general packet radio
service (GPRS), which provides a Layer 2
A subsystem that enables convergence of data,
speech, and mobile network technology over an
tunneling mechanism. IP-based infrastructure. It provides an integrated
• IP versions supported. The MMD supports service control platform that allows the creation
both IPv4 and IPv6, whereas the IMS initially of multimedia and multisession applications
supported only IPv6. However, due to using wireless (and recently wireline) transport
pressure from telecommunications operators, capabilities. It is a combination of new network
newer versions of the IMS also support both elements and interfaces, i.e., a new core network
IPv4 and IPv6. domain, which creates a new service delivery
environment.
The need to deploy
The need to deploy a new domain may naturally
a new domain ORGANIZATIONS MENTIONED IN THIS PAPER
be questioned, especially at a time when network
may naturally be 3GPP™ Third Generation Partnership
operators are struggling with costs of deploying
Project, formed in December
questioned, 1998 as a collaboration 3G networks and are also facing reduced voice
especially at a time agreement bringing together a revenues. After all, second-generation (2G)
number of telecommunication terminals can act as modems to transmit IP
when network
standards bodies to produce packets over a circuit, and 2G and 3G terminals
operators are globally applicable technical can use native packet-switched (PS) technology to
struggling with costs specifications for 3G mobile perform data communications. To evaluate the
systems and to maintain and
of deploying 3G need to deploy the IMS, the following discussion
develop GSM standards
examines conventional network domains, the
networks and are
3GPP2 A sister project to 3GPP that is a services they can offer, and how they handle
also facing reduced collaboration agreement dealing various new service offerings. The end users’
voice revenues. with North American and Asian
experiences are also considered.
interests regarding 3G mobile
networks based on cdma2000
Shortcomings of Conventional Network Domains
ARIB Association of Radio Industries
and Businesses (Japan) The circuit switched (CS) domain is used by
traditional CS networks, which offer simple user-
CSCA Consortium on Standards and to-user voice services or short-message services
Conformity Assessment (China) (SMSs). Even though voice services were, and
IETF Internet Engineering Task Force perhaps to some degree will continue to be, a
major source of revenue for network operators,
ITU International
Telecommunications Union voice revenues have been dropping in the last
few years, mainly due to increased competition
TTA Telecommunications for existing subscribers.
Technology Association (Korea)
Operators have been looking for ways to
differentiate themselves by offering new and
This paper focuses on the 3GPP’s IMS. The creative data services. The PS domain of PS
discussion opens with an overview of IMS and networks or basically 2.5 and 3G networks has
the advantages it holds for network operators. helped PS network operators to introduce user-to-
Since an IMS network is basically an advanced server data services, where a user directly
mobile session initiation protocol (SIP) network, addresses a specific server to execute the service
the paper then explores SIP networks and their in question; furthermore, these services take
main features and functionalities. Next, IMS basic advantage of IP transport and provide “always
architecture, components, interfaces, etc., are on” connectivity. Unfortunately, PS networks
examined. The discussion then turns to IMS have not been very successful, perhaps due to
functionalities and operations issues, such as IMS insufficient bandwidth, lack of enticing
prerequisites, registration, session setup, applications, confusing charging schemes, long
roaming, security, quality of service (QoS), delays in service offerings, etc. Furthermore,
and charging. Finally, key benefits offered increasing the bandwidth alone may not prove
by the IMS approach are summarized in the sufficient to enable the plethora of new and
concluding remarks. desirable services that customers may demand.

16 Bechtel Telecommunications Technical Journal


Also, network operators, in a rush to offer nor provides synergy among the applications.
data services, deployed specialized isolated Furthermore, use of this traditional approach
island solutions that often did not integrate well increases not only capital expense (capex), but
with the other services. These dedicated solutions also operating expense (opex), since each
are typically proprietary and use dedicated application may have different operating and
components and interfaces that cannot be used maintenance requirements [16–18].
for other applications. This is particularly true
Thus, a new platform or domain is needed with
when the applications are provided by different
unified features; common elements; and open,
vendors. The island solutions also typically do
standardized interfaces that can be used by all
not support roaming. While the island approach,
existing and future applications and services. The
also known as the vertical application platform,
IMS—the domain of services—meets this need.
may be acceptable for deploying small-scale data
Figure 1 shows the position of the three domains
applications or services, it neither scales well in Thus, a new
(CS, PS, and IMS) in a mobile network [17].
deploying many diverse services or applications, platform or domain
is needed with
unified features;
common elements;
and open,
standardized
interfaces that can
be used by all
existing and future
applications and
services. The IMS—
the domain of
services—meets
this need.

Figure 1. CS, PS, and IMS Domains in a Mobile Network (After [16])

January 2006 • Volume 4, Number 1 17


Desirable Characteristics of the IMS i.e., its mobility management; (2) its signaling
The desirable features, requirements, and abilities allowing servers to act as user agents
architecture for this new domain are delineated in (UAs), i.e., initiating and receiving SIP messages;
the 3GPP’s technical specification for IMS service and (3) its ability to integrate SIP-based enabling
requirements [1, 2]. services such as IM and presence. Server-to-user
services include click-to-dial, dynamic push
The IMS domain supports the following key
services, etc., and could be based on presence,
requirements:
status, geographic location, device type and
• IP multimedia sessions, i.e., delivery of capabilities, media preference, etc. To fully
multimedia sessions over PS networks appreciate these capabilities, a more thorough
understanding of SIP and SIP networks is needed.
• A mechanism to negotiate and enforce QoS
Therefore, a discussion of SIP networks has been
• Integration with Internet and CS networks provided in the next section of this paper.
such as public switched telephone networks
(PSTNs) and existing cellular networks Using IMS, end users also have much more
control over the services than they do under the
• Full roaming capabilities
CS and PS domains. For instance, an end user can
• Single sign-on and authentication initiate multiple services within a single session,
• Single converged billing also known as dynamic media control; add or
modify some components of a session (e.g., by
• Strong operator controls with respect to adding a video component to an ongoing voice
services delivered to end users call); or add or drop a user during an ongoing
• Rapid service creation without requiring conference call or chat session. In summary, IMS,
standardization while not designed to create new services, offers
all the services, current and future, that the
• Access independence, i.e., allows access
Internet provides.
technologies other than GPRS and UMTS
(e.g., WLANs and x-type digital subscriber
line technology [xDSL]) Protocols Used in the IMS
In any communications network, protocols used
The IMS also provides improved end-user
fall into two basic categories: signaling and
experience over that offered by the other two
control plane, and media or user plane. The IMS
domains. CS domain users can access only one
is built based on IP protocols, and signaling and
type of service per bearer or session. And while
control protocols for session initiation and control
multiple, parallel IP sessions may be available to
are based on the SIP (Request for Comments,
PS domain users, bandwidth, QoS, and charging
[RFC] 3261 [19]) and session description protocol
issues may hinder effectiveness. Implementation
(SDP) (RFC 2327 [20]). To transport IMS signaling
of the IMS infrastructure will enable three general
protocols, the reliable streaming control trans-
types of services to be offered:
mission protocol (SCTP) or transmission control
• User-to-user protocol (TCP) is used. Media plane protocols
• Multiuser used for media delivery are based on the real-
time transport protocol/ real-time control
• Server-to-user protocol (RTP/RTCP) (RFC 3550 [21]) for
The user-to-user services enabled by IMS extend transporting real-time media such as audio or
beyond today’s simple voice call or SMS text video. Near-real-time streaming media are
messaging to include services such as voice over transported using the real-time streaming
IP (VoIP), video telephony, chat sessions, and protocol (RTSP). Both RTP/RTCP and RTSP
push-to-talk (PTT). The IMS multiuser services typically use the user datagram protocol
include one-to-many and many-to-one services (UDP) as the transport protocol to avoid TCP’s
such as multimedia conferencing, group chat setup, teardown, and retransmission delays.
sessions, and multiuser PTT services. These Non-real-time media are delivered using hyper-
services are enabled in the IMS via a dedicated text transport protocol (HTTP) (RFC 2616),
media server, the multimedia resource function simple mail transport protocol (SMTP), or
(MRF), which is discussed in the section of this file transfer protocol (FTP), with TCP as the
paper on IMS architecture. Finally, deploying transport protocol.
IMS enables operators to introduce many
IP protocols are developed mainly by the IETF
innovative server-to-user services by virtue of
and the ITU and are published by their respective
(1) its ability to locate users within the network,
organizations as RFCs and ITU-T documents.

18 Bechtel Telecommunications Technical Journal


Other protocols used in the IMS include: policy decision is needed. The PDF
makes the decision and communicates
• CS call control
this information to the PEP for
— Telephony user part (TUP) (ITU-T Q.721) enforcement. In the configurable or
— Integrated services digital network provisioning mode, the PDF configures
(ISDN) signaling user part (ISUP) (ITU-T the PEP with the enforcement policy,
Q.761) which the PEP stores and uses for
current and future decisionmaking.
— Bearer independent call control (BICC)
(ITU-T Q.1901). An evolution of ISUP, Since the main protocols used for session
BICC completely separates the signaling initiation, description, control, modification, and
plane from the media plane and can run termination in IP networks are SIP and SDP, the
over asynchronous transfer mode (ATM), IMS is considered basically an advanced mobile
SIP network. The essentials of SIP/SDP and SIP
In short, SIP
Signaling System Number 7 (SS7), or IP.
networks are examined next. supports the basic
• Multimedia session establishment and
aspects of the
control
multimedia session:
— Packet-based multimedia communica- SIP NETWORKS
tions systems ITU-T H.323. Unlike BICC, user location,
this protocol is designed from scratch to Purpose of SIP user availability,
support IP technologies in establishing SIP is a general-purpose application-layer user capabilities,
multimedia sessions. protocol designed to establish, modify, and session negotiation,
— Media gateway control (Megaco) (ITU-T terminate multimedia sessions in IP networks [25,
and session
H.248). This protocol is used to control 26]. It also allows other participants to be invited
to ongoing sessions. The main goal of SIP is to management.
the IMS media gateway (MGW).
deliver a session description to a user at the user’s
• Authentication, authorization, and
current location. Once the user has been located
accounting (AAA)
and the initial session description delivered, SIP
— Diameter (RFC 3588 [22]). An evolution can deliver new session descriptions to modify
of remote authentication dial-in user the characteristics of the ongoing session or to
service (RADIUS) (RFC 2866 [23]), terminate the session. In short, SIP supports the
Diameter: basic aspects of the multimedia session: user
– Is used by the network and the user location, user availability, user capabilities,
to authenticate and authorize each session negotiation, and session management.
other
Session Descriptions
– Has a base protocol, complemented
A session description contains enough
by so-called Diameter applications
information for a remote user to be able to
that are customized extensions to the
establish, join, modify, or terminate a session. A
base Diameter to suit a particular
session description could include information
application in a given environment
such as the IP addresses and port numbers to
– Interacts with SIP during session which the media services need to be sent and the
setup in one application, performs coder-decoders (codecs) used to encode the voice,
credit control accounting in another image, and video elements. SIP uses SDP, the
application, etc. most common format to describe a multimedia
• Policy and QoS control session. SDP has a text-based format and consists
of two basic parts: session-level information and
— Common open policy service (COPS)
media-level information.
(RFC 2748 [24]). This is a request/
response protocol used between the Even though SIP uses SDP to transport the
policy server (the policy decision session description, SIP is completely
function [PDF], also known as the policy independent of the format of the objects it
decision point [PDP]) and the policy transports. Objects that SIP transports could be
client (the policy enforcement point session descriptions written in formats other than
[PEP]). COPS supports two modes: SDP, or any other piece of information.
outsourcing and configurable or
SIP is a two-way session description exchange
provisioning. In the outsourcing mode,
protocol, also known as the offer/answer or
the PEP contacts the PDF each time a
request/response transaction model. Since SIP is

January 2006 • Volume 4, Number 1 19


based on HTTP, it is text-based, which makes SIP Table 1. Sample SIP Methods
easier to debug and to extend, but less efficient
in terms of size and required time/bandwidth Method Description
to transmit.
INVITE Establishes a session

SIP Transactions ACK Acknowledges the establishment of the session


A SIP transaction consists of a request from a
CANCEL Cancels a pending request
client or user agent (UA), usually referred to as a
UA client (UAC); zero or more provisional REGISTER Maps a public URI with the user’s current location
responses; and a final response from a server,
usually referred to as a UA server (UAS). SIP UPDATE Modifies characteristics of a session

messages begin with a start line, a header field, MESSAGE Carries an instant message
SIP uses a SIP URI and a message body [26].
(RFC 3261) to SUBSCRIBE Subscribes to an event
Start Line
identify users. A SIP The start line is also called a request line in the NOTIFY Notifies an IMS terminal about a certain event
URI is similar to an request message and a response line in the
BYE Terminates the session
e-mail address and response message. It consists of a method name, the
consists of request-uniform resource identifier (URI), and the
protocol version, currently SIP/2.0. The method
the user’s name name indicates the purpose of the request, and Message Body
and the domain the request-URI contains the destination address The message body carries multipurpose Internet
name of the home of the request. The response line consists of the mail extension (MIME) encoded messages.
protocol version (e.g., SIP/2.0) and the status of the Message bodies starting with Content-Disposition
network operator.
transaction, including both a number and its are session descriptions. Message bodies are sent
equivalent readable phrase (e.g., 100 TRYING). A in their entirety, i.e., they are not parsed at proxy
sample SIP transaction is shown in Figure 2. In servers in between and may be encrypted by
this transaction, (1) a request is made by a UAC the UAC.
(Bob) to establish a session with a UAS (Alice) via
an INVITE request (method), and (2) the reply User Identification
from the UAS (Alice) is 100 TRYING, confirming SIP uses a SIP URI (RFC 3261) to identify users.
that Bob’s request has been received. A SIP URI is similar to an e-mail mail address and
consists of the user’s name and the domain name
Some of the major SIP methods (request types)
of the home network operator. It may also include
are listed in Table 1.
optional descriptions placed after a semicolon.
Header Field An example of a SIP URI is:
Following the start line is the header field, which
Alice.Smith@domain.com
is composed of a mandatory part and an optional
part. The mandatory part contains fields such as This address, the public user identity, is assigned
To, which carries the destination URI; From, by the home network operator. Public user
which carries the originator’s URI; and Content identities are used to route SIP signaling.
Sequence (CSEQ), which includes the sequence
number and method name used to match replies Since the PSTN can only interpret digits, and
to requests. since the PSTN is going to be in use for the
foreseeable future, the IMS also accommodates
public user identity telephone uniform resource
locators (URLs) (RFC 2806), which carry a
telephone number. An example of a telephone
URL is:

+1-123-456-7890

IMS operators typically assign at least one SIP


URI and one telephone URL to each subscriber.
Operators may assign more than one public user
identity to a user, i.e., one or more for personal
use and one or more for business use.
Figure 2. SIP Transaction: (1) INVITE Request Message and
(2) 100 TRYING Reply Message

20 Bechtel Telecommunications Technical Journal


Along with a public user identity, subscribers • Redirect server. This entity receives SIP
also receive a private user identity—basically a requests and returns an alternative location
user name and a password—that takes the form where the user may be available.
of a network access identifier (NAI) (RFC 2486).
The private user identity is not used to route SIP SIP Registration
signals, but only to authenticate subscribers. Registration is the process by which a user
Private user identity is usually stored in the IMS identifies himself/herself and his/her current
terminal’s UMTS integrated circuit card (UICC). location to the network. To illustrate how this
The UICC typically contains a subscriber identity works, the basic registration process performed
module (SIM) card needed for a global system for in a SIP (not necessarily mobile or IMS) network
mobile communication (GSM) call, a UMTS is outlined for a hypothetical user, Alice Smith
subscriber identity module (USIM) card needed [26]. Alice has a public user identity—also
for UMTS calls, and an IMS subscriber identity known as her address of record (AoR)—of
module (ISIM) card needed for IMS calls. Without Alice.Smith@domain.com, where domain is the
a UICC, only emergency calls can be placed using domain of Alice’s home network operator. This
the terminal. address is used by Alice no matter where she logs
on. When Alice logs on at her computer at work,
The ISIM card not only stores the user’s private
her workplace SIP URI is asmith@company.com;
user identity, but also public user identity, home
when she logs on at her computer at school, she
network domain URI, and long-term secrets. The
uses a SIP URI of alice@university.edu. Alice’s
long-term secret is used for authentication and for
AoR is the address known by the public, i.e.,
calculating the integrity key (Ik) and cipher key
the address that anyone trying to contact Alice
(Ck) used between the terminal and the network.
would use. Alice must always register her
The IMS terminal uses the Ik to protect SIP
current location with the registrar so that the
signaling integrity between the IMS terminal and
registrar knows where to forward incoming
the network. IMS security is discussed in detail in
requests to Alice.
the IMS Operations section of this paper.
All SIP requests arrive at the proxy server, which
SIP Network Extensions and Entities may or may not be co-located with the registrar.
In the IMS, extensions are (and continue to be) If the two are co-located, SIP messages arriving at
made to SIP. New methods and header fields can the proxy server are directly forwarded to Alice’s
be defined and easily integrated into the core new location. If the proxy server and the
protocol. For instance, SIP has an extension to registrar—more specifically, the location server of
deliver instant messages and an extension to the registrar—are separate, then the proxy server
handle subscriptions to events. SIP uses either needs to first contact the location server to learn
TCP or UDP as the transport protocol. UDP is the current location of Alice, and then forward
usually preferred, because it does not have the the message. Figure 3 illustrates the latter process.
overhead associated with TCP setup, teardown,
and retransmission.

The main entities in a SIP network are:

• UA. The UA—that is, the SIP endpoint—is


the entity that initiates and receives SIP
requests and generates the provisional and
final responses.
• Registrar server. This entity keeps track of user
locations. The UA sends a registration
message to the registrar. This information is
saved in a location server for future use; this
server may or may not be co-located with the
registrar.
• Proxy server. This entity is simply a SIP router
that receives, processes, and forwards SIP
requests and responses. It receives SIP
messages from a UA or from another proxy
and routes them to its destination UA or Figure 3. Proxy Server and Registrar (including Registrar’s Location Server)
another proxy.

January 2006 • Volume 4, Number 1 21


Conducting a SIP Session Setup 7. The proxy server forwards this 200 OK reply
Having covered the basic SIP transactions, the message along with the SDP to Bob.
discussion turns to setup of a multimedia session
8. Bob sends an ACK message directly to Alice.
using SIP. Returning to the hypothetical user
At this point, Bob and Alice can initiate a
example, Bob and Alice are assumed to have
session, say, an audio session.
already registered their current locations with the
network; now, Bob wants to establish a session 9. Bob decides to terminate the session and
with Alice. Alice is using her personal digital sends a BYE message directly to Alice.
assistant (PDA), and the proxy server, registrar,
and location server are all co-located. The 10. Alice sends an OK reply directly back to Bob
following process takes place (see Figure 4): and the session terminates.

1. Bob sends an INVITE request to Alice’s AoR Note that if, in the middle of the session, either
The IMS network Bob or Alice wants to modify the session (for
at the proxy server.
can basically instance, by adding a video component), he or
2. The proxy server sends a receipt via a she can send either an UPDATE request or
be divided into
100 TRYING message. another INVITE request with an updated
three layers:
session description.
3. The proxy server looks up Alice’s current
• Application or location and forwards the request to Building on the foregoing discussion of SIP
service layer Alice’s PDA. networks, the following sections examine the
IMS network’s architecture; the entities
4. Alice’s PDA sends a confirmation reply via a
• Control or involved in the IMS; and the performance of
100 TRYING message.
signaling layer various operations such as registration, session
5. Alice’s PDA sends a 180 RINGING message setups, roaming, security, QoS and policy
• Access or indicating that it has been alerted to the support, and charging.
connectivity request to establish a session.
layer 6. Alice’s PDA sends a 200 OK reply message
IMS ARCHITECTURE
back to the proxy server. This reply includes
s depicted in Figure 5, the IMS network can
a Contact header field in the message (so
that Bob can use this URI to contact Alice A basically be divided into three layers:
directly for all future transactions), along • Application or service layer
with an SDP message describing Alice’s
PDA session components such as audio and • Control or signaling layer
video; the codec used for each session • Access or connectivity layer
component; and the transport information
The application or service layer contains
such as port numbers, IP addresses, and
application servers (ASs) such as the SIP AS,
transport protocol.

Figure 4. Conducting a SIP Session

22 Bechtel Telecommunications Technical Journal


The heart of the
control layer
consists of the
CSCF servers,
also known as
SIP servers.

Figure 5. IMS Network Architecture (After [26])

third-party open service access (OSA) AS, and The control layer contains signaling network
legacy service control point (SCP) AS. The IMS elements or control servers for session setup,
controls service via the subscriber’s home modification, and termination or for managing
network and those signaling network elements calls. The heart of the control layer consists of the
distributed in the application layer and the call session control function (CSCF) servers, also
control layer. This arrangement enables known as SIP servers. This layer also includes the
subscribers to receive the same types of services home subscriber server (HSS) database,
while they are roaming. subscriber location function (SLF) database, PDF,
and breakout gateway control function (BGCF).

January 2006 • Volume 4, Number 1 23


Next, elements of each layer are examined along
COMMONLY USED IMS INTERFACE with their respective roles or functions in
DESIGNATORS establishing, modifying, and terminating a
Cx between HSS and I-CSCF/ session; supporting roaming; providing desired
S-CSCF QoS; providing charging information; etc. The
Dx between SLF and I-CSCF/ discussion begins with the control layer elements,
S-CSCF since the IMS calls basically start from this point:

Gm between I-CSCF/S-CSCF and • CSCF server is also known as the SIP server,
user equipment since it processes SIP signaling. There are
Go between PDF and PEP three types of CSCFs: proxy (P-CSCF),
interrogating (I-CSCF), and serving
Gq between PDF and P-CSCF (S-CSCF).
Mb between IM-MGW and entities — P-CSCF is the first point of contact, in
such as user terminal, MRFP, AS
the signaling plane, between the IMS
Mi between BGCF and I-CSCF/ terminal and the IMS network. From
S-CSCF the SIP point of view, the P-CSCF acts
Mj between BGCF and MGCF as a SIP proxy server, i.e., all requests
initiated by the IMS terminal or destined
Mk within a given BGCF for the IMS terminal traverse the P-CSCF,
(intra-BGCF)
which provides data integrity and
Mn between MGCF and MGW confidentiality by using IP security
(IPSec) to maintain a security association
Mp between MRFC and MRFP
between itself and each IMS terminal.
Mw between CSCFs within the The P-CSCF handles the charging
same network records for billing purposes by creating
Ro between OCF and S-CSCF, and maintaining a charging data record
MRFC, SIP-AS, et al. (CDR) that can be consolidated at a
charging gateway function (CGF). The
Sh between HSS and AS
(SIP-AS or OSA-SCS) P-CSCF also provides QoS authorization
and control by providing the necessary
Si between HSS and IM-SSF information to the PDF for resource
Za between security domains authorization and QoS control. The IMS
(inter-domain) also supports roaming services via the
P-CSCF. (Roaming, QoS, charging, etc.,
Zb within a given security domain
(intra-domain) are discussed in more detail in the IMS
Operations section of this paper). Also,
Note: X/(Y) notation on the interfaces once the P-CSCF authenticates the user,
indicates that the interface is X and the
it asserts the identity of the user to the
protocol used on that interface is Y.
rest of the nodes (or IMS elements) in
the network, so those nodes do not
need to authenticate the user again.
The connectivity or access layer is used to
IMS networks usually have several
transport signaling traffic and media streams.
P-CSCFs for the sake of scalability and
This layer contains switches, router, and media-
redundancy, and each P-CSCF serves a
processing entities (MGWs, signaling gateways
certain number of IMS terminals, based
[SGWs], MRF controls [MRFCs], and MRF
on its capacity.
processors [MRFPs]). Since IMS is designed to be
access independent, it can connect to different — I-CSCF is a proxy server that is located
types of existing and emerging access networks at the edge of an administrative domain
as long as they have IP connectivity. Access and that interfaces with SLF and HSS
networks that can connect with the IMS include databases. These interfaces are based
GPRS/UMTS, 2G networks such as GSM via on the Diameter protocol. The I-CSCF
gateways, PSTNs via gateways, enterprise fixed retrieves user location information
networks via IP Centrex, residential fixed and routes the SIP requests to their
networks via xDSL or cable modem, WLANs, appropriate destinations, typically an
and worldwide interoperability for microwave S-CSCF. The I-CSCF also assigns an
access (WiMAX). S-CSCF if there is more than one. The

24 Bechtel Telecommunications Technical Journal


I-CSCF selects the S-CSCF based on the • SLF is a Diameter-based redirect agent or
information queried from the HSS server that maps the user’s address to a
through the Diameter-based Cx interface. specific HSS. A network with a single HSS
If there are multiple HSSs, the I-CSCF does not require an SLF.
must first contact the SLF (explained • PDF may be part of the P-CSCF or a
below) through the Diameter-based Dx standalone entity. It interacts with the
interface to obtain the HSS addresses. P-CSCF via the Diameter-based Gq interface
The I-CSCF may also act as a topology and with the PEP at the packet data gateway
hiding internetwork gateway (THIG) by (PDG) via the COPS-based Go interface. The
hiding sensitive information about the PDG for the GPRS/UMTS network is the
domain, such as the number of servers, gateway GPRS support node (GGSN).
their domain name system (DNS) names,
and their capacities. An IMS network • AS is a SIP entity that hosts and executes An application
may have several I-CSCFs for the sake services. New IMS-specific services are
server is a
of scalability and redundancy. expected to be developed in SIP ASs. An AS
may host several different applications. SIP entity that
— S-CSCF is essentially a SIP proxy that hosts and executes
relays SIP messages, a SIP UA that • IP multimedia service switching function
(IM-SSF) is a specialized AS that allows reuse services. New
initiates and terminates SIP transactions,
and a SiP registrar that authenticates of a GSM network’s customized application IMS-specific
users during registration. Most for mobile network enhanced logic (CAMEL) services are
importantly, the S-CSCF controls the services in the IMS. The IM-SSF allows the
gsmSCF to control an IMS session.
expected to be
session. The S-CSCF interfaces with
developed in
the HSS via Diameter protocol and • MRF provides the source for media in the
downloads the user’s profile and home network. It enables the home network SIP ASs. An AS
authentication vector (AV) to be used to play announcements, mix media streams, may host several
in user authentication. The user profile transcode between different codecs, perform different
includes the subscriber service profile media analyses, and provide statistics. The
applications.
(SSP), which has trigger points and MRF is divided into two parts: MRFC and
user-specific filter criteria. The S-CSCF MRFP. MRFC acts as a SIP UA and contains
uses this information to control a user’s an interface with the S-CSCF. It also controls
access to different ASs. The S-CSCF resources in the MRFP via a Megaco
also collects data for charging purposes. interface. The MRFP implements all media-
An IMS network may have several related functions, such as playing media.
S-CSCFs for the sake of scalability and
• BGCF is the SIP server with routing
redundancy. Both the S-CSCF and the
functionality based on telephone numbers.
P-CSCF maintain session timers, i.e.,
It is used in sessions that are initiated
they are stateful proxies.
by IMS terminals and addressed to users
• HSS is a stateless Diameter server and a in a CS network such as PSTN or other
database that holds all of the subscriber’s cellular network. The BGCF’s main
information. It is basically an advanced home functionality is to select an appropriate
location register (HLR) that holds user PSTN/CS gateway.
information, including location, security data
• Media gateway control function (MGCF) is
(AV), user profile SSP, trigger points and
the main node of the PSTN/CS gateway.
filter criteria, and the user’s allocated
It has two primary functions: (1) to perform
S-CSCF. The HSS may also support HLR/
control signal protocol conversion from SIP
authentication center (AUC) functionality
to BICC or ISUP with the SGW, and (2) to
and mobile-application-part (MAP)-based
control the resources in the MGW. The MGW
interfaces for legacy 2G and 2.5G networks.
converts the media formats between RTP on
Subscriber data stored in the HSS is the
the SIP side and pulse code modulation
key enabler for service mobility across
(PCM) on the PSTN side.
different types of access networks and for
user roaming between different network
operators. A network may require more than
IMS OPERATIONS
one HSS due to the number of subscribers
ome of the more important issues in IMS
and the capacity of the HSS. Because of its
importance, the HSS is always implemented S network operations, such as prerequisites,
registration, session setup, security, QoS and
in redundant configuration.

January 2006 • Volume 4, Number 1 25


policy support, and charging, are examined in performs the integrity and confidentiality
this section. protection of the messages.

The authentication process begins after the


IMS Operation Prerequisites primary PDP context activation, when the IMS
Before a user can access IMS service, the terminal sends a SIP register request to the
IMS terminal must perform three major tasks: CSCF. The CSCF contacts the HSS and obtains the
Access the IMS home or visited network via the user’s AV. The AV is composed of a random
IP connectivity access network (IP-CAN), number (RAND) challenge, an authentication
discover the P-CSCF address, and perform token (AUTN), the expected response (XRES), the
IMS level registration. Ck, and the Ik. The XRES is calculated based on a
The IP-CAN could be GPRS/UMTS, WLAN, or known algorithm RAND and a stored secret.
xDSL, although Release 5 of the 3GPP (the first The CSCF replies with a SIP 401 message and
To provide
release of the IMS) supports only GPRS/UMTS. includes both the RAND and the AUTN. Upon
integrity and receiving this message, the IMS terminal
Thus, the IMS terminal must perform a GPRS
confidentiality, Attach with the serving GPRS support node computes its own response (RES) based on the
the P-CSCF and (SGSN) and perform bearer level authentication received RAND, the same known algorithm used
with the HLR. To discover the IP address of the by the CSCF, and the secret keys retrieved
the IMS terminal
P-CSCF, which is stored at the GGSN, the from its ISIM card. The IMS terminal sends
establish another SIP register request message that
terminal must perform a packet data protocol
two IPSec SAs (PDP) context activation with the GGSN. Finally, includes its own RES. Upon receiving this
between the terminal must perform IMS level registration message, the CSCF compares the XRES with the
with the CSCF and the HSS. At this point, the IMS RES, and, if they agree, the CSCF replies with the
themselves.
terminal can access various applications on ASs SIP 200 OK message. This process is summarized
via the CSCF. in Figure 6.

To provide integrity and confidentiality, the


IMS User Authentication and Security P-CSCF and the IMS terminal establish two IPSec
Associations security associations (SAs) between themselves.
Before a user can complete IMS level registration, One SA is established from the terminal’s client-
the user must perform user authentication protected port to the P-CSCF’s server-protected
and establish security associations. User port, and the other SA is established from the
authentication in the IMS is based on a P-CSCF’s client-protected port to the terminal’s
challenge/response algorithm and the secrets server-protected port. Both SAs support traffic in
stored in the ISIM part of the UICC and in the both directions. The P-CSCF and the IMS terminal
HSS. The S-CSCF is the entity that performs the need to agree on a set of parameters to establish
authentication, and the P-CSCF is the entity that the two IPSec SAs. The P-CSCF obtains the Ck
and the Ik in the SIP 401 unauthorized reply
message from the S-CSCF. The P-CSCF
removes both keys before relaying the
message to the IMS terminal. To negotiate
the rest of the IPSec parameters, the P-CSCF
and the IMS terminal use the same two SIP
register messages that are used for
authentication. After these steps are
completed, IPSec is permanently set up for
the duration of the session hop-by-hop
between the P-CSCF and I-CSCF, I-CSCF and
S-CSCF, S-CSCF and AS, AS and HSS,
P-CSCF and S-CSCF, and S-CSCF and other
entities such as BGCF and MGCF. Along
with the foregoing actions, encryption may
also take place between the IMS terminal and
the GGSN on the radio bearer end. This
process is shown in Figure 7.

Figure 6. IMS User Authentication

26 Bechtel Telecommunications Technical Journal


IMS Level Registration Step 4: The HSS replies with a user authori-
IMS level registration involves the following zation answer (UAA) message that
basic actions: includes a list of all available
S-CSCFs.
• The P-CSCF and the S-CSCF are assigned to
the IMS terminal, and a path is established Step 5: The I-CSCF selects one S-CSCF and
between them. forwards the register request to the
• The IMS terminal is authenticated. selected S-CSCF.

• Integrity and confidentiality security Steps 6–7: The S-CSCF retrieves the user AV
associations are set up. from the HSS via a Diameter-based
multimedia authentication request
• The S-CSCF downloads the user profile
(MAR) message and a Diameter-
from the HSS.
based multimedia authentication
• The S-CSCF stores the address information answer (MAA) message.
in the HSS.
Steps 8–10: From the AV, the S-CSCF computes
Specific steps in the IMS level registration process the user-specific challenge data and
are as follows: sends this information via a 401
Step 1: The IMS terminal sends a SIP UNAUTHORIZED message to the
register request message to the IMS terminal through the I-CSCF,
P-CSCF and compresses this P-CSCF, and IMS terminal.
message to save transmission Steps 11–15: The IMS terminal computes its
bandwidth and minimize signaling authentication response and sends
delays. The receiving P-CSCF it to the S-CSCF via another register
decompresses the request message. request message.
Step 2: If there are multiple S-CSCFs, the Steps 16–17: The S-CSCF verifies the response
P-CSCF forwards the request to and, if correct, downloads the
the I-CSCF, so that the I-CSCF subscriber profile from the HSS via
can select an S-CSCF to serve the Diameter-based server assignment
user’s session. request (SAR) and server assign-
Step 3: The I-CSCF sends a Diameter-based ment answer (SAA) messages. The
user authorization request (UAR) S-CSCF may contact an AS (or ASs)
message to the HSS, requesting the for service control as specified in
addresses of all available S-CSCFs. the SSP.

Figure 7. IMS Security Associations

January 2006 • Volume 4, Number 1 27


Steps 18–20: Finally, the S-CSCF sends a 200 OK For access security, as indicated in the earlier
message back to the IMS terminal discussion of IMS level registration, an IMS
via the I-CSCF and the P-CSCF. terminal request message travels through the
P-CSCF and the S-CSCF during the registration
A graphic representation of the above steps is
process. The S-CSCF performs the authenti-
shown in Figure 8.
cation, and the P-CSCF establishes two IPSec
associations to protect the traffic to and from
IMS Session Setup the terminal.
Session setup is the process of discovering
network nodes and signaling paths. To provide network security, all traffic entering
or leaving a security domain passes through a
Building on the SIP session setup functionality security gateway (SEG), as shown in Figure 9.
detailed earlier in this paper, the IMS Security associations between SEGs are
Within a security offers additional functionality, including established and maintained using the Internet
domain, network SIP signaling compression, SIP message key exchange (IKE) protocol (RFC 2409). The
nodes use IPSec to integrity/confidentiality protection, QoS-related traffic between SEGs is protected using IPSec
capabilities and features, routing capabilities to encapsulation security payload (ESP) (RFC 2406)
exchange traffic
the PSTN/CS networks, tracking and recording running a tunnel mode.
with each other and of charging information, etc.
with the SEG. Within a security domain, network nodes use
IPSec to exchange traffic with each other and with
IMS Security
the SEG. The inter-domain interfaces, Za, require
IMS security can be divided into two areas
mandatory authentication, integrity protection,
[9, 10, 26]: access security and network security.
and encryption. The intra-domain interfaces, Zb,
Access security involves authentication of users
carry only intra-domain signaling traffic and
and networks and protection of traffic between
require mandatory integrity protection.
IMS terminals and networks. Network security
Encryption on these interfaces is optional.
involves protection of traffic between security
Figure 10 illustrates this process.
domains. (A security domain is a network
managed by a single administrative authority.)

Figure 8. IMS Level Registration

28 Bechtel Telecommunications Technical Journal


Figure 9. Network Security Between Domains

Since CS
networks and the
PSTN will remain
in use for the
foreseeable future,
the IMS
also provides
interworking
capabilities with
BICC- and
ISUP-based
Figure 10. Intra-Domain and Inter-Domain Network Security
legacy networks.
In addition to the mandatory network layer appropriate CS/PSTN gateway, if interworking
security (IPSec), the IMS also provides optional will take place in the same network in which the
transport layer security (TLS) and application BGCF resides. The MGCF is the component that
layer security (e.g., HTTP digest authentication controls the IM-MGW and that performs SIP-to-
for SIP). BICC or SIP-to-ISUP call-related signaling

The IMS also contains three interfaces, Cx, Dx, and


Sh, that use authentication functions. Interface Dx
is the interface between the SLF and the I-CSCF
and P-CSCF. Interface Cx is the interface between
the HSS and the I-CSCF and P-CSCF. And
interface Sh is the interface between the HSS and
the ASs. In all three interfaces, Diameter is the
authentication protocol. Diameter runs over
reliable transport protocols such as TCP and
streaming control transmission protocol (SCTP).

IMS-CS Interworking
Since CS networks and the PSTN will remain in
use for the foreseeable future, the IMS also
provides interworking capabilities with BICC-
and ISUP-based legacy networks (e.g., PSTN,
ISDN, and CS public land mobile networks
[PLMNs]). The main IMS functional entities
involved are the BGCF, MGCF, IM-MGW, and
SGW. IMS-CS interworking architecture is shown
in Figure 11.

The BGCF’s main functionality is to select an


appropriate network in which interworking with
the CS domain will take place, or to select an Figure 11. IMS-CS Interworking Architecture (Source [11])

January 2006 • Volume 4, Number 1 29


interworking. The IM-MGW converts media (RFC 2215 [27]) and differentiated services
formats provided in one type of network to the (DiffServ) (RFC 3260 [28]).
format required in another type of network; for
IntServ is designed to provide end-to-end QoS
instance, it provides the interface between the PS
with two classes of services: controlled load and
domain and the CS domain. The IM-MGW may
guaranteed. IntServ uses resource reservation
also be connected via the Mb interface to various
protocol (RSVP) to reserve resources with the
network entities such as a user terminal (via a
desired QoS. RSVP also ensures that the routers
GPRS tunneling protocol [GTP] tunnel to a
receiving resource reservation requests are the
GGSN), an MRFP, or an AS. The SGW performs
routers that will actually route the packets. This
the call-related signaling conversion to or from
function is performed via a two-way handshake,
the BICC/ISUP-based MTP transport networks to
in which one endpoint (endpoint A) sends a
the BICC/ISUP-based SCTP/IP transport
PATH message to the other endpoint (endpoint
The main drawback networks and forwards the converted signaling
B), recording all the visited intermediate nodes.
of IntServ is that to or from the MGCF. The SGW may be
Then, in the reverse direction starting at endpoint
implemented as a standalone entity or located in
it does not scale B, a RES message is sent through all the nodes
another entity in the CS network or the IM-MGW.
well. This is recorded in the PATH message, this time actually
reserving the resources.
primarily because IMS QoS Support Mechanism
(1) the network The QoS support mechanism ensures that the Note that a router in the path can reject a resource
critical elements of IP transmission such as reservation request either because it does not
needs to store a
transmission rate, gateway delays, and error rates have the required resources or because the
large amount of requester does not have the permissions to
can be measured and guaranteed in advance. This
information, and function is performed mainly via the PDF, which reserve those resources. Thus, RSVP can be
(2) routers need to interacts with and controls the underlying packet considered as not only a resource reservation
network (i.e., the access network resources) via protocol, but also an admission control protocol.
look up large tables
the Go interface with an element in the PDG The main drawback of IntServ is that it does not
before they can
called the PEP. The PDG for the GPRS/UMTS is scale well. This is primarily because (1) the
route the packets. the GGSN, which hosts the PEP. Policy-related network needs to store a large amount of
information is transmitted between the PDF and information, and (2) routers need to look up
the PEP using COPS (RFC 2478). large tables before they can route the packets.
Currently, two basic methods support QoS To address these issues, DiffServ architecture
on the Internet: integrated services (IntServ) was proposed.

Figure 12. QoS Authorization

30 Bechtel Telecommunications Technical Journal


In DiffServ, routers identify packet treatment Step 7: The GGSN extracts the token and
without the need for table lookup. Packet the packet flow identifier and sends
treatments, known as per-hop behaviors (PHBs), this information to the PDF using
are identified by 8-bit codes called differentiated the COPS REQ (request) message.
services code points (DSCPs). Packets are marked The packet flow identifier contains
at the edge of the network with a certain DSCP, so the source address, the destination
that routers in the path apply the correct PHB to address, the source port number,
them. DSCPs are encoded in the Types of Service the destination port number, and
field of IPv4 and the Traffic Classes field of IPv6. the transport protocol used.
Two examples of PHBs are expedited forwarding
Step 8: The PDF responds to the GGSN
and assured forwarding. In expedited forwarding
with a COPS DEC (decision)
PHB, packets never experience congestion in
message that contains the QoS
the network. In assured forwarding PHB, On the GPRS/UMTS
characteristics of the IMS terminal’s
packet-drop precedence is determined, allowing access network,
authorized session. This is known
low priority packets to be discarded before
as service-based local policy (SBLP) the link-layer
high priority packets; some packets may in fact
information. The GGSN uses this resource reservation
be discarded.
information to install packet filters
is performed via
In the IMS, end-to-end QoS involves both QoS that allow only authorized packet
over the access network and QoS in the core flows to be transmitted over a given PDP context
network. This implies that QoS-required PDP context. activation, and the
resources have to be provisioned and enforced on GGSN maps link
Step 9: The GGSN (actually the PEP
both sides. This can be done by using a link-layer
residing in the GGSN) sends an layer resource
RSVP on the access network side and the DiffServ
RTP message to the PDF indicating reservation flows
method (or RSVP) on the network side. On the
that it will comply with the
GPRS/UMTS access network, the link-layer to DiffServ code
PDF’s policy.
resource reservation is performed via PDP points in the
context activation, and the GGSN maps link layer Step 10: The GGSN sends a PDP context network.
resource reservation flows to DiffServ code points response message back to the
in the network [7, 8, 26]. SGSN, authorizing the SGSN for the
requested PDP context.
Specific steps in the QoS provisioning process are
described below. Step 11: The SGSN forwards this response to
the IMS terminal.
For inbound sessions:
Figures 12 and 13 summarize the above process.
Step 1: An INVITE request message arrives
at the P-CSCF/PDF. For outbound sessions of the QoS provisioning
process, only the initial steps differ from those for
Step 2: The P-CSCF adds a media
inbound sessions. Replacing Steps 1 and 2 of
authorization token to the message
inbound sessions, the corresponding steps
and forwards this message to the
involved in outbound sessions are:
IMS terminal.
Step 1a: The IMS terminal sends an
Step 3: The IMS terminal creates a PDP
INVITE request message to the
context activation request message
P-CSCF/PDF.
and sends it to the SGSN.
Step 1b: The P-CSCF/PDF forwards this
Steps 4–6: The SGSN receives this message
message to the callee.
and checks the user’s subscription
information stored in the HSS using Step 2a: The P-CSCF sends a session
mobile application part (MAP) progress message to the callee.
protocol. If the IMS terminal
Step 2b: The P-CSCF also adds the
requests more resources than it is
authorization token to this message
allowed to use, the SGSN adjusts
and forwards it to the IMS terminal.
the requested resources to the
appropriate level and sends a PDP Steps 3 through 11 of outbound sessions are
context request message to the identical to those of inbound sessions of the QoS
GGSN, along with the authorization provisioning process.
token.

January 2006 • Volume 4, Number 1 31


As was mentioned earlier, the GGSN/PEP must Service control in the IMS is home network based,
also play the role of a DiffServ edge router and which means that the user receives the same
map the required QoS to the appropriate DSCP to services whether operating in the home network
provide the desired QoS on the core network side, or roaming into a visited network.
assuming DiffServ is used there.
IMS Roaming
IMS Service Delivery As indicated earlier, roaming is handled via the
One of the main features of the IMS is its service P-CSCF. The P-CSCF is the only node or element
delivery capabilities. The primary IMS network in the IMS that must be located in either the home
elements involved in service delivery are the network or the visited network. Also, when IP
S-CSCF, which acts as the central session control connectivity access is via GPRS or UMTS, the
point; the ASs, where the actual services reside location of the P-CSCF is subordinate to the
The IMS employs and service-specific SIP processing is performed; location of the GGSN. In roaming scenarios,
three types of the HSS, which provides information on the GPRS and UMTS allow the GGSN to be located
service delivery services and qualities accessible to the IMS user; either in the home network or the visited
and the MRF (along with MRFC and MRFP), network, while the SGSN is always located in the
platforms: SIP-AS,
which controls the media resources. home network. Furthermore, in the IMS, both the
OSA-AS, and GGSN and the P-CSCF share the same network,
The IMS employs three types of service delivery
legacy SCP. and the P-CSCF controls the GGSN via the
platforms: SIP-AS, OSA-AS, and legacy SCP. The
Go interface.
subscriber’s S-CSCF interacts with the service
platforms through a SIP-based, intra-operator Currently, the IMS allows two configurations for
interface known as the IMS service control (ISC). roaming. In the first configuration, shown in
ASs may access user data in the HSS for Figure 14a, the P-CSCF (and the GGSN) are
application-specific information via the Sh located in the home network. This arrangement
interface; as mentioned earlier, the S-CSCF would probably be used in the early stages of IMS
determines whether to invoke a particular AS deployment. In this configuration, the visited
based on specific filter criteria from the user’s SSP network is not required to have an IMS-compliant
stored in the HSS. Multiple applications can (i.e., 3GPP Release 5 or newer) GGSN. The visited
reside on a single AS. network only provides the radio bearers and the
SGSN services for the roaming terminal. The only

Figure 13. QoS Authorization Flow (Inbound Session)

32 Bechtel Telecommunications Technical Journal


The IMS supports
both offline
Figure 14a. P-CSCF and GGSN Located in a Home Network (After [26]) (or post-paid)
and online (or
real-time pre-paid)
charging services.

Figure 14b. P-CSCF and GGSN Located in a Visited Network (After [26])

negative aspect of this configuration is that media The CCF/CDF is a stateless Diameter-based AS
are first routed to the home network and then to that does not maintain session states, but keeps
their destination, introducing unnecessary and track of transaction states. It creates, updates, and
undesirable delays. This configuration, however, closes charging data records (CDRs) based on
allow immediate deployment of the IMS and accounting request (ACR) messages it receives
IMS roaming [26]. from IMS elements. There are three types of ACR
messages: ACR (Start) to generate the CDR and
In the second configuration, shown in Figure 14b,
start accounting, ACR (Update) to update the
the P-CSCF and the GGSN are located in the
CDR, and ACR (Stop) to update and close the
visited network, i.e., the visited network has an
CDR. Figure 16 depicts the signaling flow for a
IMS-compliant GGSN. There may be a move to
session-based offline charging scenario in which
this configuration after initial IMS deployment.
an ACR (Start) is triggered upon receipt of an
INVITE request message to start a session; an
IMS Charging ACR (Update) is started when the interim period
The IMS supports both offline (or post-paid) and elapses, and an ACR (Stop) is triggered upon
online (or real-time pre-paid) charging services. receipt of a session termination BYE request
The IMS charging architecture is shown in message.
Figure 15 [12–14, 29].
The OCF is a stateful Diameter-based AS that
The online charging services are handled by maintains both session states and transaction
the online charging function (OCF) AS; the states for online charging. IMS elements
offline charging services are handled by interacting via the Ro interface with the OCF
the charging collection function (CCF) AS. In include the S-CSCF, MRFC, and SIP ASs. The
Release 6, the CCF is upgraded to the charging S-CSCF interacts with the SCF of the OCF for
data function (CDF). session-based pre-paid service control, while the

January 2006 • Volume 4, Number 1 33


Figure 15. IMS Charging Architecture

SIP AS and the MRFC interact with the event


charging function (ECF) of the OCF for content-
based pre-paid control. The SIP-Diameter
interworking function (IWF) provides SIP
to/from Diameter format conversion and also
acts as a credit control client (CCC).

Depending on the received SIP messages and the


service usage condition, the CCC sends a
Diameter-based credit control request (CCR)
message to the OCF/SCF, and the OCF/SCF
sends a credit control answer (CCA) reply
message. There are basically three types of CCRs
(and CCAs): CCR (Start), CCR (Update), and
CCR (Stop).

CCR (Start) corresponds to the initial CCR


message to start a session and is triggered when
the CCC receives an INVITE request to start the
session. Via this CCR message, the CCC checks
with the OCF/SCF to verify that the IMS terminal
has enough credit left for session initiation and
usage and then reports back in the CCA reply
message. At this point, the IWF/CCC starts
timing or counting session usage. When the
granted units or account balances near depletion,
the CCC sends a CCR (Update) message to the
OCF/SCF to request more credit. The OCF/SCF
replies to this request via a CCA and includes the
amount of additional credit, if any. Finally, if a
Figure 16. Session-Based Offline Charging termination request is received via a BYE request
message, the CCC sends a CCR (Stop) message to

34 Bechtel Telecommunications Technical Journal


the OCF/SCF and reports the amount of credit [8] 3GPP TS 29.208, “End-to-End Quality of Service
used and the amount left over. Of course, if the (QoS) Signaling Flows.”
credit is depleted before a SIP termination request [9] 3GPP TS 33.203, “3G Security; Access Security
for IP-Based Services.“
arrives, and additional credit cannot be obtained,
[10] 3GPP TS 33.210, “Security Requirements.”
the CCC can force the session to be terminated.
[11] 3GPP TS 29.163, “Interworking Between the IP
Multimedia (IM) Core Network (CN) Subsystem
and Circuit Switched (CS) Networks.”
CONCLUSIONS [12] 3GPP TS 32.225, “Telecommunication
Management; Charging Management; Charging
he IMS allows an evolutionary move to
T all-IP converged networks. But in terms of
capabilities and features offered, the IMS is
Data Description for the IP Multimedia
Subsystem (IMS).”
[13] 3GPP TS 32.260, “Telecommunication
truly a revolutionary approach to multimedia, Management; Charging Management; IP
multisession service deployment. It provides
Multimedia Subsystem (IMS) Charging.” The IMS allows
[14] 3GPP TS 32.295, “Telecommunication an evolutionary
flexible session control with desirable features
Management; Charging Management; Charging
such as guaranteed end-to-end QoS, roaming Data Record (CDR) Transfer.” move to all-IP
capabilities, security, and easy and convenient [15] 3GPP TS 32.260, “IP Multimedia Subsystem converged networks.
charging. It also allows horizontal service (IMS) Charging.”
deployment by offering a common platform with [16] “Siemens IP Multimedia Subsystems (IMS),” But in terms of
reusable components and open interfaces. For Siemens White Paper. capabilities and
instance, the IMS will be able to offer PTT [17] “IP Multimedia Subsystem IMS Overview and
Applications,” 3G America White Paper.
features offered,
with almost immediate user access. Deploying
[18] “IMS–IP Multimedia Subsystem,” Ericsson the IMS
PTT service will be as easy as uploading the White Paper, October 2004.
AS software in an AS and uploading the is truly a
[19] RFC 3261, “SIP: Session Initiation Protocol,”
client application software over the air (OTA) to June 2002. revolutionary
the user’s terminal. With the IMS in place, [20] RFC 2327, “SDP: Session Description Protocol,” approach to
services and applications can be deployed more April 1998.
multimedia,
quickly, easily, and economically than ever [21] RFC 3550, “RTP/RTCP: Real Time Protocol/
before. Thanks to the IMS, the vision of a personal Real Time Control Protocol,” July 2003. multisession service
communication system (PCS) can finally become [22] RFC 3588, “Diameter,” September 2003. deployment.
a reality!  [23] RFC 2866, “RADIUS: Remote Authentication
Dial-In User Services,” June 2000.
[24] RFC 2478, “COPS: Common Open Policy
Services,” January 2000.
TRADEMARKS [25] G. Camarillo, SIP Demystified, McGraw-Hill,
3GPP is a trademark of the European 2001.
Telecommunications Standards Institute (ETSI) [26] G. Camarillo and M.–A. Garcia-Martin, The 3G IP
Multimedia Subsystems (IMS): Merging the Internet
in France and other jurisdictions.
and the Cellular World, John Wiley & Sons,
August 2004.
cdma2000 is a registered trademark of
[27] RFC 2215, “IntServ: Integrated Service,”
the Telecommunications Industry Association
September 1997.
(TIA-USA).
[28] RFC 3260, “DiffServ: Differentiated Services,”
April 2002.
[29] “IMS Signaling Architecture,” Ulticom White
REFERENCES Paper, 2005.

[1] 3GPP TS 23.228, “Service Requirements for the


Internet Protocol (IP) Multimedia Core Network
Subsystem (IMS), Stage 1.” BIOGRAPHY
[2] 3GPP TS 23.228, “IP Multimedia Subsystem Rasoul Safavian brings more
(IMS); Stage 2.” than 15 years of experience
[3] 3GPP TS 24.229, “IP Multimedia Call Control in the wired and wireless
Protocol Based on SIP and SDP.” communications industry to
[4] 3GPP TS 23.002, “Network Architecture.” his position as Bechtel
Telecommunications’ new vice
[5] 3GPP TS 32.299, “Diameter Charging
Applications.” president of Technology,
Americas Regional Business
[6] 3GPP TS 24.228, “Signaling Flows for the IP Unit. He is charged with
Multimedia Call Control Based on SIP and SDP.” establishing the overall
[7] 3GPP TS 23.207, “End-to-End Quality of Service technical vision for Bechtel’s American markets and
(QoS) Concept and Architecture.” providing guidance and direction to its specific

January 2006 • Volume 4, Number 1 35


technological activities. In fulfilling this responsibility,
he will be well served by his background
in cellular/PCS, fixed microwave, satellite
communications, wireless local loops, and fixed
networks; his working experience with major 2G, 2.5G,
3G, and 4G technologies; his exposure to the leading
facets of technology development as well as its
financial, business, and risk factors; and his extensive
academic, teaching, and research experience.
Before joining Bechtel in June 2005, Dr. Safavian
oversaw advanced technology research and
development activities, first as vice president of the
Advanced Technology Group at Wireless Facilities, Inc.,
then as chief technical officer and vice president of
engineering at GCB Services. Earlier, over an 8-year
period at LCC International, Inc., he progressed
through several positions. Initially, as principal
engineer at LCC’s Wireless Institute, he was in charge of
CDMA-related programs and activities. Next, as lead
systems engineer/senior principal engineer, he
provided nationwide technical guidance for LCC’s XM
satellite radio project. Then, as senior technical
manager/senior consultant, he assisted key clients with
the design, deployment, optimization, and operation of
3G wireless networks.
Dr. Safavian is quite familiar with the Electrical
Engineering departments of four universities: The
George Washington University, where he has been an
adjunct professor for several years; The Pennsylvania
State University, where he is an affiliated faculty
member; Purdue University, where he received his
PhD in Electrical Engineering, was a graduate research
assistant, and was later a member of the visiting faculty;
and the University of Kansas, where he received both
his BS and MS degrees in Electrical Engineering and
was a teaching and a research assistant. He is a senior
member of the IEEE and a past official reviewer of
various transactions and journals.

36 Bechtel Telecommunications Technical Journal


A SURVEY OF MEMS-ENABLED OPTICAL
DEVICES – APPLICATIONS AND DRIVERS
FOR DEPLOYMENT

Issue Date: January 2006

Abstract—Telecommunications equipment manufacturers are deploying MEMS-based optical components in


next-generation equipment. These components, whether active or passive, enable gains in speed and reductions
in cost, power consumption, and size. They also can enable carriers to offer new services and reduce the cost of
deploying existing services. Components include VOAs, ROADMs, and optical switches. Carriers will face new
challenges, however, when deploying these devices.

BACKGROUND benefit of being a mature technology, as MEMS-


he beginning of this decade was marked by based technology is widely deployed in other
T tales of the coming unlimited capacity and
endless bandwidth to be provided by ultra-fast,
industries, including the automotive, aerospace,
and medical fields.
ultra-cheap optical equipment. Multiple Unfortunately for the proponents of all-optical
equipment manufacturers launched new networks and photonic switches, MEMS-based
photonic, or all-optical, switches, promising the and otherwise, the next few years were marked
ability to switch hundreds of wavelengths at a by the largest downturn in the history of the
time—in fractions of the space and power, and at telecommunications industry. Overcapacities on
a fraction of the cost—of existing equipment. The routes, abundances of dark fiber, and excess
components that made up the core of these new equipment in the network were noted time and
switches would not be semiconductors based on again, and the once emerging desires for huge
silicon, as in existing technologies, but novel optical switches disappeared. Equipment
materials that enabled the devices to redirect the manufacturers scrapped photonic switch designs,
path of light. This would eliminate optical- placed upgrades on hold, or even disappeared
electrical-optical (OEO) conversions, which entirely, as carriers suddenly realized their
account for the bulk of the cost, as well as the growth forecasts were upside-down.
space and power consumption, in a modern
optical network [1].

Several novel techniques for controlling and


directing an optical signal were proposed by
various manufacturers. These methods included
using polarized thin films, ceramic or polymer
materials, liquid crystals, or even bubbles.
However, the most popular method for optical
switching, micro-electrical mechanical systems
(MEMS), used tiny arrays of tilting mirrors.
Controlled electrical signals were used to adjust
the arrays of mirrors to the proper angle,
allowing for the desired output signal to appear
on the correct port. Figure 1 illustrates the MEMS
Brian Coombe mirror used in one manufacturer’s optical switch.
bcoombe@bechtel.com
MEMS-based systems allowed significantly
higher port-count switches than competing
technologies. These systems also offered the Figure 1. Optical MEMS Mirror Used in an Optical Switch [2]

© 2006 Bechtel Corporation. All rights reserved. 37


leaner operating models, trying to do more with
ABBREVIATIONS, ACRONYMS, AND TERMS less. This is driving network operators to consider
2D MEMS two-dimensional (axes) a new set of requirements when evaluating optical
MEMS equipment. Features of interest now include
3D MEMS three-dimensional (axes) automatic provisioning, remote configurability,
MEMS and reduced power and space needs. These drive
the all-important reductions in operating expenses
DWDM dense WDM
that are key to positive cash flows [3].
FTTX fiber-based access network
topologies that include The need for reduced operating expenses does not
fiber-to-the-home/premise, enable equipment providers to sell “gold-plated”
fiber-to-the-curb, and equipment to carriers for their networks. The
fiber-to-the-node competitive landscape has also driven carriers’
Equipment GMPLS generalized MPLS capital budgets to lower levels, especially in core
providers must find networking and optical transports. Equipment
MEMS micro-electrical mechanical
systems providers must find ways to reduce their
ways to reduce
customers’ operational expenses, with less
their customers’ MPLS multiprotocol label switching expensive equipment.
operational ODF optical distribution frame
With the overbuilt core, carriers are paying more
expenses, with OEO optical-electrical-optical attention to access—literally the “on-ramps” to the
less expensive ROADM reconfigurable optical core network. Nearly every major local carrier has
equipment. add-drop multiplexer announced a fiber-to-the-node, fiber-to-the-curb,
VOA variable optical attenuator or fiber-to-the-home/premise (collectively known
as FTTX) strategy, with some carriers beginning
WDM wavelength division
construction, and others even offering services
multiplexing
over these networks. The sheer amount of data
that can be delivered over these networks will
As market demands catch up to the glut of drive capacity increases in the core transport
network capacity, carriers are beginning to build mechanisms as well. The new fiber infrastructures
out newer infrastructure. Not only must this put in place by these efforts will also require new
infrastructure support new bandwidth, it must methods of supervision and surveillance, as
also support new services, with reduced carriers have never managed this scale of optical
provisioning intervals and lower capital and connectivity.
operational costs. Together, these capabilities
make up what are known as “intelligent optical
networks.” New systems and subsystems are MEMS-BASED OPTICAL COMPONENTS
making use of the properties of MEMS to enable ptical networking systems manufacturers are
carriers to build these networks. O now using MEMS in a variety of components,
beyond the large, scalable optical switches that
This paper outlines several technologies based on
MEMS components, including optical switches, were seen in previous generations of equipment.
attenuation and equalization devices, and tunable MEMS components can be used to perform a
components. The applications and drivers for variety of functions, including redirecting,
deployment of these devices and systems are reflecting, and attenuating light. The systems
detailed. Included in the discussion are the made up by these components can be divided into
challenges, issues, and risks that network several subsets: core optical switches, automated
operators face in deploying these technologies. fiber management platforms, variable optical
attenuators (VOAs), and reconfigurable optical
add-drop multiplexers (ROADMs).
OPTICAL NETWORK MARKET DRIVERS
ith bankruptcy, consolidation, and Core Optical Switches
W overcapacity woes in carriers’ pasts, the
former glut of optical capacity has disappeared.
The initial application of MEMS components,
core optical switches, is still relevant; however,
Shifts in carriers’ business drivers and operating the opportunities for deployment are reduced
models have changed their requirements for from the initial projections. Optical switches can
optical equipment; no longer is there an outcry for enable extremely high bandwidth connections
larger and larger systems, handling endless and services, supporting high-performance
amounts of capacity. Instead, carriers are adopting applications such as high-speed simulation,

38 Bechtel Telecommunications Technical Journal


visualization, and grid computing (super- Figure 2 illustrates the operation of 2D and 3D
computing technology using the resources of MEMS switches.
many disparate networked computers).
Photonic switches can provide significant cost
Photonic switches use MEMS-based core savings over traditional OEO optical switches, as
materials to provide all-optical light switching. a certain percentage of traffic at any node is
Tiny reflective components, resembling mirrors, “express” traffic, i.e., it does not terminate locally.
are adjusted to steer an optical signal. MEMS In a traditionally designed OEO switch, this
switch cores come in two designs: 2D MEMS, traffic would be regenerated electrically before
where the mirrors are arrayed on a single level being transmitted to its next destination. Photonic
(and therefore can be adjusted only in two switches can direct this traffic to the proper
dimensions), and 3D MEMS, where the mirrors interface without regeneration. The traffic
are on multiple planes. More flexible and scalable destined for local equipment can be connected to
than the 2D systems, 3D MEMS allow for more a smaller OEO switch, sized just to handle the Photonic switches
lightpaths through the switch. However, local traffic, as shown in Figure 3. This hybrid can ensure that a
3D MEMS are more complex and costly than the implementation can offer lower capital expenses
carrier’s investment
generally smaller and easier-to-manufacture and a lower cost of ownership by reducing space
2D design [3]. These devices are usually referred and power consumption. will be viable for a
to as A x A in size, where A is the number of input longer term.
Another driver for photonic and hybrid
and output ports. Thus, a 32 x 32 switch can direct
OEO/photonic switch applications is the
any of 32 input signals to any of 32 output signals.
“agnostic” feature of photonic switches. A
Due to their complexity, 3D MEMS devices
photonic switch will direct a stream of light,
typically support much larger switch core sizes.
regardless of the number of wavelengths
or “color” of that stream, the underlying
protocol, the bitrate, etc. As such, photonic
switches are considered more future-proof, as
different OEO devices are required for different
wavelengths, different protocols, different
bitrates, etc. When new protocols or higher
bandwidth services are deployed, existing OEO
infrastructure can become worthless, requiring
new equipment to be purchased. Photonic
switches can ensure that a carrier’s investment
will be viable for a longer term.

Photonic switches also enable the framework for


generalized multiprotocol label switching
(GMPLS). GMPLS is an extension of the signaling
protocols of MPLS to lower-layer entities in the
network, including optical and physical layer
devices. GMPLS-enabled photonic switches allow
automated provisioning and bandwidth-on-
demand services, as well as new services like
optical virtual private networks.
Figure 2a. 2D MEMS Operation [4]

Figure 2b. 3D MEMS Operation [4]

January 2006 • Volume 4, Number 1 39


GMPLS-enabled
photonic switches
allow automated
provisioning and
bandwidth-on-
demand services, as
well as new services
like optical virtual
private networks.

Figure 3. Photonic Switch Integration Used to Terminate Local Traffic

Although the applications and drivers for replaced quickly has hindered deployment.
photonic switches are strong, several pitfalls have Finally, carriers have cited concerns about dust,
hindered their deployment. Carriers must dirt, and even resiliency in the face of vibration,
consider the loss across the fabric of the switch. such as in an earthquake zone. Several manu-
Each component does have a finite loss, and this facturers of optical components are countering
loss must be carefully calculated into the link this claim by certifying their equipment with
budget of the optical path. This often has the standards institutes or organizations, such as
unintended consequence of requiring additional Telcordia® Technologies, Inc.
amplification, or worse, OEO regeneration—a
Table 1 summarizes the similarities and
problem for designers, who had sought to avoid
differences between optical and photonic
the need for OEO regeneration in the first place!
switches.
The complexity of MEMS-based devices is also an
issue—each mirror needs very complex Table 1. Optical Versus Photonic Switches
electronics to drive its movement and stabilize its
position. These devices add cost to the system as Optical Photonic
Characteristic
well, counteracting some of the potential cost Switch Switch

savings of the technology. Another complexity Cost per port Higher Lower
consideration is the finite switching time
involved in repositioning the reflective Limited by size of
Capacity Virtually unlimited
switch core
components. This time must be carefully
considered when examining applications, as the Granularity Circuit Wavelength
switching for these devices is not “wire speed”
Wire-speed,
(data processed or switched at its native rate). Switching/Routing Out-of-band
processes signals

Complexity is also cited as an issue in terms of Deployed in large


Maturity Limited deployments
numbers
durability. While the photonic core is future-
proof, concern that the equipment controlling Limited by granularity
Flexibility Future-proof
of core
the core configuration may need to be

40 Bechtel Telecommunications Technical Journal


Automated Fiber Management Platforms where it takes place. This can virtually eliminate
Photonic switches can be used for more than just the outages that result when the “wrong” fiber
core optical nodes; a new application is emerging pair is disconnected. In addition, remote,
for MEMS-based switching systems. As carriers automated testing as well as test equipment
deploy FTTX technologies and continue to consolidation is made possible. A single piece of
extend the reach of their optical infrastructure, test equipment can be used in one site, and the
they face the challenge of managing literally automated fiber management platform can be
hundreds of fiber interfaces in a single location. used on the tested fibers to direct the signals from
Managing these interfaces is typically done that site to the correct strands [5].
manually via an optical distribution frame (ODF)
While automated fiber management is a potential
or patch panel. Manual patch cords are installed
beneficial application for carriers, several
by a technician, placing the proper signal on the
obstacles may hinder its deployment. ODF panels
proper interface. Any moves, additions, or Systems
are entirely passive components—the only active
changes must be done manually, and manufacturers will
component is the technician who is cabling
configuration records are often developed by
them—while these platforms are active. This have to justify a
hand as well. Testing of fiber cables terminated
means that the system will require power and large gap in capital
on the ODF panel is also done manually, and a
telemetry and that, typically, some experience in
costly error can occur if the technician savings with a much
using its management platform will be necessary.
accidentally tests an in-service fiber pair! lower cost of
Carrier personnel will require training in using
This manual work is costly and labor-intensive this equipment as opposed to the ODF panel, ownership, or
and also introduces many opportunities for which requires a very low skill level. reduce that gap
errors. In the case of an unmanned site,
Figure 4 highlights the differences between with maturing,
repairs, testing, and provisioning cannot occur
automated and manual fiber management. mass-produced
until a technician arrives on site. This delay can
increase the mean time to repair or time to A final hurdle is deployment cost. While carriers technology.
turn-up a new circuit. are eager to reduce operational expenses, which
clearly is possible with this platform, they are
Automated fiber management systems make use
unlikely to pay a premium for equipment
of MEMS components to mechanize this process.
functions to do so. Systems manufacturers will
Traffic can be switched or rerouted electronically
have to justify a large gap in capital savings with
and remotely. Since signals do not need to be
a much lower cost of ownership, or reduce that
switched dynamically or in real time, lower speed
gap with maturing, mass-produced technology.
(and lower cost) components are used.

Automated fiber management platforms also


enable advanced features. They allow for a circuit VOAs
layout inventory to be developed electronically, OAs are components that allow the
so carriers can monitor exactly what signal or
circuit is riding on what fiber, and when and
V attenuation of selected optical signals or
wavelengths. These components are integral in

Figure 4. Automated Versus Manual Fiber Management

January 2006 • Volume 4, Number 1 41


dense wavelength division multiplexing
(DWDM) systems, as they are used to
dynamically compensate for skewed gains in
network wavelength amplification. The
amplifiers used in typical DWDM systems
have varying degrees of “flatness”—signals of
certain wavelengths are amplified more or
less than signals of other wavelengths. After
several chains of amplification, the wavelengths
receiving the most amplification may be
powerful enough to saturate the receive
electronics, while the wavelengths receiving the
Potential least amplification are just strong enough to
applications for register at the receiver. VOA components can Figure 5. MEMS-Based VOA [6]
then attenuate only the most powerful
MEMS-based
wavelengths, bringing the entire signal into electronics, which adds cost, complexity, power
components in conformance with DWDM receiver specifications. consumption, and real estate requirements to the
distribution component. Temperature control requirements
VOA components are also crucial in protection
environments switching functions, as a cable cut can reduce the also typically prevent non-MEMS-based VOA
include amplifiers number of aggregate wavelengths on a fiber. components from being deployed outside
Optical amplifiers have a fixed amount of the central office or other controlled,
for cable television
amplification, which is typically linked to telecommunications-oriented environment. On
systems, and gain the other hand, MEMS-based VOA components
amplifier pump laser current; the amplification
control devices for is then spread across all of the relevant can be deployed in a wider variety of
active FTTX wavelengths. If a broken or disconnected fiber environments, including outside plant and access
results in the amount of wavelengths being cut in networks. Potential applications for MEMS-based
deployments.
half, the remaining wavelengths will be amplified components in distribution environments include
twice as much. This effect is often cascaded amplifiers for cable television systems, and gain
through multiple amplifiers; the end receiver control devices for active FTTX deployments.
component may then receive a signal that is For these reasons, MEMS VOA components are
significantly higher than the component’s experiencing widespread market acceptance;
operating specification for optical power, several design wins have been announced in
rendering the received signal unintelligible. VOA recent months. Systems designers must consider
components can prevent failure during a other issues in addition to the cost and
protection switching event by attenuating the complexity of this particular subsystem. The
offending wavelengths until they are in the electronics required to control and drive these
operating range for receiver input power. devices must also be assessed and taken into
MEMS-based devices use tuned components that account as part of an entire design. When
can be adjusted, typically by raising or lowering evaluating a particular design or component, the
them, to accomplish attenuation by partially or system architect must also examine items such as
completely blocking a stream of light. These scalability. Unlike wideband optical components
components can be thought of as being very such as optical switches, these devices may have
similar to a mechanized camera shutter, albeit on to attenuate individual wavelengths or small
a much smaller scale. Multiple actuators can be bands of wavelengths. Systems designers must
used to provide a very highly resolved range of ask themselves: Will one device be sufficient as
attenuation; this arrangement is potentially larger numbers of wavelengths are deployed?
superior to alternative optical attenuation
technologies. Figure 5 illustrates a MEMS-based
VOA. The cylindrical items are two optical fibers; ROADMs
attenuation is achieved by raising a metallic OADMs have received significant attention
shutter in the gap [6]. R from carriers in recent months. These
components allow for remote provisioning and
As they are significantly smaller and less power-
management of DWDM systems. Selected
hungry than competing technologies, MEMS-
wavelengths can be transparently transported or
based devices do not require temperature
serviced—added to and dropped from client
compensation, which affords several advantages.
equipment—at particular nodes. Changes can
Temperature control requires additional

42 Bechtel Telecommunications Technical Journal


be made remotely and in real time via an metropolitan networks grow, systems designers
integrated control plane such as GMPLS. These typically increase wavelength counts by
components hold great implications for interleaving channels in between existing
improving service velocity and reducing channels, allowing for retention of amplifier
operational expenses. Figure 6 illustrates the components. This approach presents a problem
functionality of a ROADM [7]. for silicon-based ROADMs, as flatness
requirements for these interleaved systems are
In addition to these advantages, several ROADM
generally higher. Additionally, ROADM
designs offer further benefits, such as remote
applications are being proposed for long-haul
wavelength testing, dynamic power balancing
networks. Long-haul networks typically feature
(also known as equalization), and remote signal
higher capacity, higher channel count
surveillance. The dynamic power balancing
wavelength division multiplexing (WDM)
feature of a ROADM may seem very similar to ROADM designs
systems, which present the same challenges as the
the features of a VOA; this is not entirely
interleaved metropolitan systems [9]. offer further
coincidental. VOAs are one of the components
that make up a typical ROADM. MEMS-based wavelength-selective switches are benefits, such as
emerging that provide solutions to this flatness remote wavelength
Two types of component subsystems are used
problem. Subsystems are based on either testing, dynamic
in ROADMs—wavelength blockers and
diffractive MEMS components or MEMS mirrors.
wavelength-selective switches. Wavelength power balancing
Diffractive MEMS components use arrays of
blockers are devices offering the capacity to (also known as
piezoelectric materials suspended over a
add/drop wavelengths and that have some
substrate; in this condition, the device “looks” equalization), and
tunability—the ability to add/drop selected
like a mirror to light. Applying a voltage to the remote signal
wavelengths. Wavelength-selective switches are
materials causes them to move in the direction of
more widely tunable and flexible. Most surveillance.
the substrate and thus become a diffraction
wavelength-selective switches can be configured
grating, attenuating a specific frequency of light.
to add/drop or pass through any number or
Arrays of MEMS materials can be used to
combination of wavelengths at a node, allowing
selectively reflect or attenuate specific channels.
for more modularity and deployment ease while
reducing spacing requirements. It should be Diffractive MEMS do not require contact to
noted that this flexibility typically comes at a actuate (instead relying on applied voltage) and
price premium [8]. are relatively simple to manufacture. They are
also more reliable than mirror-based MEMS, due
ROADM technologies were first deployed in
to the lack of moving parts, and can be packaged
metropolitan networks, where channel counts are
in a smaller subsystem. The only limitation is
low and wavelength spacing is accordingly high.
scalability—arrays of tuned components become
Integrated silicon components, using no moving
more complex by orders of magnitude when
parts, perform well for these applications. As
channel counts increase.

Figure 6. ROADM Subsystem Functionality [7]

January 2006 • Volume 4, Number 1 43


Mirror-based MEMS subsystems, long used for REFERENCES
optical switches, can be built for much higher [1] T. Freeman, “MEMS Devices Put Their Stamp on
channel-count applications. Designers have to Optical Networking,” Fibre Systems Europe,
contend with the same challenges found in September 2004.
optical switches—cost, complexity, reliability, [2] J. Ford, J. Walker, and K. Goosen, “Optical
MEMS: Overview and MARS Modulator,”
and size. Systems designers are now developing Presentation made by Lucent Technologies.
hybrid techniques in an attempt to take
[3] Goldman Sachs and McKinsey & Company, “US
advantage of the positives of both technologies. Communications Infrastructure at a Crossroads:
Several manufacturers now offer hybrid Opportunities Amid the Gloom,” August 2001.
diffractive MEMS/mirror MEMS wavelength [4] M. Fernandez and E. Kruglic, “MEMS Technology
selective switches. Ushers in a New Age in Optical Switching,”
Lightwave, August 2000.

To achieve an While optical systems using ROADM [5] C. Matsumoto, “Calient Patches Its Strategy,”
technologies are an enabler for scalable, Light Reading, February 14, 2005
optimum network (http://www.lightreading.com/document.asp?
dynamically reconfigurable networks, systems site= lightreading&doc_id=68031).
design, network designers must pay additional attention to [6] D. Horsley, “Image Gallery”
engineers must implementation details. Granular power (http://mae.ucdavis.edu/faculty/
measurement and control are required for each horsley/photoalbum.html).
continue to use
wavelength. Fault isolation at the wavelength [7] “ROADM Architectures and Implementations,”
strong planning Metconnex
and component level is a necessity, since a single (http://www.metconnex.com/Products-
methodologies, misdiagnosed fault can cause networkwide page/roadm.htm).
combined with instability. Additional hardware and software [8] C. Matsumoto, “ROADMs: Almost Famous,”
required to perform these functions can entail Light Reading, May 20, 2005
detailed knowledge (http://www.lightreading.com/document.asp?
additional cost, real estate, and complexity. As doc_id=74210).
of ideal applications
such, ROADM technologies may hold a “first-
[9] C. Matsumoto, “ROADMs Roll On,”
for various cost” penalty for smaller, lower channel-count Light Reading, June 7, 2005
technologies and networks when compared to more mature (http://www.lightreading.com/document.asp?
doc_id=75148&site=supercomm).
the associated technologies. Carriers must consider the growth
forecast and timeframe when evaluating choices
cost-versus-benefit
for new optical networks.
tradeoffs. BIOGRAPHY
Brian Coombe joined Bechtel
Telecommunications in 2003.
CONCLUSIONS Currently, he is a systems
engineer for the federal
fter much early hype, MEMS-based optical
A devices are experiencing continued
deployment in next-generation optical networks.
telecommunications group
within Bechtel National, Inc.,
Bechtel’s government sub-
These components enable a number of advanced sidiary. He designs and
analyzes carrier, large-scale
networking features, such as dynamic
enterprise, and government and
reconfigurability, while potentially reducing military communications systems.
power consumption, network real estate, and
Previously, as a lead Bechtel Telecommunications
capital and operational expenses. The benefits
engineer for the Verizon fiber-to-the-premises program,
offered by systems using these components often Brian managed the planning and network design of two
come at a cost, however. Also, not every wire centers. His Bechtel experience also includes work
application or deployment is suitable for MEMS- as an RF engineer providing design solutions for the
AT&T Wireless GSM overlay program.
based systems. To achieve an optimum network
design, network engineers must continue to use Before joining Bechtel, Brian was a systems engineer
strong planning methodologies, combined with and applications specialist at Tellabs®, an optical
networking equipment manufacturer. He was a
detailed knowledge of ideal applications for
member of the team that launched Tellabs’ DWDM
various technologies and the associated cost- platform and supported Tellabs’ first DWDM customer.
versus-benefit tradeoffs. 
Brian received a BS with honors in Electrical
Engineering from The Pennsylvania State University.
He is a member of the Institute of Electrical and
TRADEMARKS Electronics Engineers and also Eta Kappa Nu, the
national electrical engineering honor society. Brian
Telcordia is a registered trademark of Telcordia authored “Reliable Electric Power Transmission and
Technologies, Inc., in the United States, other Distribution under National Restructuring,” which
countries, or both. appeared in the IEEE/WISE Journal of Engineering and
Public Policy in August 1999.

44 Bechtel Telecommunications Technical Journal


I N V I T E D PA P E R

PHY/MAC CROSS-LAYER ISSUES


IN MOBILE WiMAX

Issue Date: January 2006

Abstract—After the IEEE 802.16-2004 standard was published, much attention was drawn to providing
broadband access in rural and developing areas over fixed wireless channels. Now, the IEEE 802.16e standard
for Mobile WiMAX is about to be published. It is known that Mobile WiMAX will incorporate error-correction
capability and will be an enhanced version of the IEEE 802.16 standard with mobility support. Therefore, it is
expected that Mobile WiMAX will not only compete with the broadband wireless market share in urban areas
with DSL, cable, and optical fibers, but also threaten the hot-spot-based Wi-Fi™ and even the voice-oriented
cellular wireless market. This paper first provides an overview of Mobile WiMAX, especially on OFDMA/TDD
systems. Then, the paper addresses some PHY/MAC cross-layer issues that need to be resolved through radio
resource management to increase throughput, cell coverage, and spectral efficiency.

INTRODUCTION data rates of 5 Mbps or better. Hence, Mobile


EEE 802.16e, the standard for Mobile WiMAX, WiMAX is not only expected to compete with
I is expected to be published by the end of 2005,
and Mobile WiMAX service will launch in South
other last-mile connections such as fiber, cable,
and DSL; it also threatens Wi-Fi™ and code
Korea and possibly in North America in late 2006 division multiple access (CDMA) voice
or early 2007. Originally, the IEEE 802.16 communications with voice-over-Internet-
standard was developed for fixed wireless in the Protocol (VoIP) services.
search for a new tool to allow homes and Unlike wired networks, wireless networks are
businesses to link with the worldwide core highly dependent on communications channels;
networks. It was envisioned that the IEEE 802.16 radio channels are dynamic, correlated,
standard would offer a better solution for last- unreliable, and very expensive. This is why
mile connections, compared to fiber, cable, or performance will be highly dependent on how
digital subscriber line (DSL) links, because well radio resource management supports
wireless systems are less costly to deploy over quality-of-service (QoS) requirements, even if
wide geographic areas. The publication in QoS might be a luxury in the early stages of the
June 2004 of the IEEE 802.16d (IEEE Mobile WiMAX market. Therefore, several cross-
802.16-2004) standard provided assurance that layer issues between the medium access control
the WiMAX market and its competitiveness for (MAC) layer and the physical (PHY) layer need to
non-line-of-sight (NLOS) wireless broadband be optimally resolved on the radio resource
access are maturing [1–4]. management side of Mobile WiMAX systems.
Jungnam Yun, PhD Since the IEEE 802.16e standard (the mobile In multiuser environments, especially on wireless
POSDATA America version of the IEEE 802.16-2004 standard) will be fading channels, multiuser diversity is a key radio
R&D Center published soon, the focus of WiMAX is expected resource management element for maximizing
jnyun@posdata-usa.com to shift from fixed subscribers to mobile throughput. Multiuser diversity is a form of
subscribers with various form factors: personal selection diversity. Since different users
Professor Mohsen digital assistant (PDA), phone, or laptop. The experience independent time-varying fading
Kavehrad, PhD IEEE 802.16e standardization group promises to channels in wireless networks, resources are
The Pennsylvania support mobility at speeds of up to
State University allocated to the user with the best channel quality
(CITCTR) approximately 40 to 50 mph; some vendors are to maximize system throughput. Multiuser
mkavehrad@psu.edu already claiming success in testing prototype diversity has drawn attention since tracking user
systems with mobility at speeds over 50 mph for channel fluctuations is becoming more accurate

© 2006 Bechtel Corporation. All rights reserved. 45


ABBREVIATIONS, ACRONYMS, AND TERMS
AAS adaptive antenna system MPEG Moving Picture Experts Group
AMC adaptive modulation and coding MS mobile station
ARQ automatic repeat request MSB most significant bit
ASCA adjacent subcarrier allocation NLOS non-line of sight
ATM asynchronous transfer mode nrtPS non-real-time polling service
BE best effort OFDM orthogonal frequency division
multiplexing
BS base station
OFDMA orthogonal frequency division
CC convolutional coding
multiple access
CDMA code division multiple access
OFUSC optional full usage of
CP cyclic prefix subchannels
CQI channel quality indicator OPUSC optional partial usage of
subchannels
CRC cyclic redundancy code
PDA personal digital assistant
CS convergence sublayer
PDU protocol data unit
CTC convolutional turbo coding
PHY physical
DC direct current
PMP point to multipoint
DCD downlink coding descriptor
PN pseudorandom noise
DHCP dynamic host configuration
protocol PUSC partial usage of subchannels
DL downlink QoS quality of service
DLFP DL frame prefix QAM quadrature amplitude
modulation
DSCA distributed subcarrier allocation
QPSK quadrature phase shift keying
DSL digital subscriber line
RTG receive/transmit transition gap
D-TDD dynamic TDD
rtPS real-time polling service
ertPS extended real-time polling service
SDU service data unit
FEC forward error correction
SINR signal-to-interference+noise
FBSS fast BS switching
ratio
FCH frame control header
SISO single input, single output
FDD frequency division duplex
SNR signal-to-noise ratio
FRF frequency reuse factor
STC space-time coding
FUSC full usage of subchannels
TDD time division duplex
HARQ hybrid ARQ
TSA time slot allocation
H-FDD half-duplex FDD
TTG transmit/receive transition gap
HO handover
TUSC tile usage of subchannels
HT header type
UBC uplink coding descriptor
IR incremental redundancy
UGS unsolicited grant service
LDPC low density parity check
UL uplink
LSB least significant bit
VoIP voice over Internet Protocol
MAC medium access control
Wi-FiTM wireless fidelity
MAN metropolitan area network
WiMAX worldwide interoperability for
MAP mobile application part microwave access
MIMO multiple input, multiple output
MISO multiple input, single output

46 Bechtel Telecommunications Technical Journal


and faster. Hence, diversity gain increases when OFDMA. The WiMAX Forum’s Mobile Task
the dynamic range of the fluctuation increases, Group is developing a Mobile WiMAX profile
but the gain is limited in environments with slow based on the OFDMA PHY layer only [1–4]. At
fading [5]. In slow fading, multiuser diversity the same time, the WiMAX Forum’s Evolution
hardly satisfies all QoS parameters at the same Task Group is developing technical specifications
time, especially fairness among users. Ultimately, for the evolution of OFDM-based networks from
radio resource management needs to implement fixed to nomadic connections. Hence, the
a combined form of multiuser diversity and OFDMA PHY layer will be the baseline for
fairness scheduling [6]. Mobile WiMAX.

As broadband wireless networks encompass


various services such as World-Wide Web OFDMA
(www), voice, video, and data, network traffic The wireless metropolitan area network (MAN)-
OFDMA PHY layer based on OFDM modulation OFDMA can
becomes very dynamic and unbalanced between
the uplink (UL) and downlink (DL) stream is designed for NLOS operation in the frequency fully use multiple
volumes. To provide the highest transport bands below 11 GHz. OFDMA inherits OFDM’s user channel
efficiency in broadband networks, time division immunity to intersymbol interference and
variations via
duplex (TDD) is preferred over frequency frequency selective fading.
two-dimensional
division duplex (FDD) because it offers more An inverse Fourier transform may be used to
flexibility in changing the UL and DL band- resource
synthesize the OFDMA waveform during a
width ratio according to the dynamic traffic symbol time. A small end-portion of the symbol allocation.
pattern [7]. It has been assumed that the time, called a cyclic prefix (CP), is copied at the
switching points for the UL and DL of TDD beginning of the symbol time duration to collect
schemes are determined by network operators multipath while maintaining orthogonality
and are not changeable. Moreover, switching among the subcarriers.
points in adjacent cells have been synchronized
to avoid severe inter-cell interference. Having the Within the OFDMA symbol time frame, the
same switching points in adjacent cells, a active subcarriers are split into subsets of
centralized controller could set switching points subcarriers; each subset is termed a subchannel.
for all cells by observing the traffic characteristics On the DL, a subchannel may be intended
[8]. For the duplex scheme, FDD, TDD, and half- for different (groups of) receivers. On the UL,
duplex FDD (H-FDD) are all available options in a transmitter may be assigned one or
Mobile WiMAX. This paper addresses only the more subchannels and several transmitters
TDD mode for the orthogonal frequency division may transmit simultaneously. The subcarriers
multiple access (OFDMA) PHY layer. Even forming one subchannel may, but need
though it seems too early to adopt dynamic not, be neighbors. A slot—the minimum
changes in the DL/UL ratio for Mobile WiMAX possible OFDMA data allocation unit—
systems, several investigations show that consists of one or more symbols in the time
appropriate time slot allocation (TSA) and beam domain by one subchannel in the frequency
forming can bring higher spectral efficiency in domain. Hence, OFDMA can fully use multiple
dynamic TDD (D-TDD) systems compared to user channel variations via two-dimensional
conventional TDD systems [9, 10, 11]. resource allocation.

This paper first describes the general PHY


TDD
and MAC layers and then provides views on
The three different duplex modes for OFDMA
several cross-layer issues related to Mobile
Mobile WiMAX systems are TDD, FDD, and
WiMAX, specifically focusing on the point-to-
H-FDD (see Figure 1). TDD systems use the same
multipoint (PMP) mode of OFDMA/TDD
frequency band for DL and UL, and the frame is
systems, multiuser diversity, zone adaptation for
divided into DL subframes and UL subframes in
interference cancellation, hybrid automatic
the time domain. FDD systems use different
repeat request (HARQ), and variable DL/UL
frequency bands, and DL and UL subframes are
ratio or D-TDD.
overlapped in the time domain. H-FDD systems
have two different frequency bands for DL and
UL, and DL and UL subframes do not overlap in
PHY LAYER IN OFDMA/ TDD MOBILE WiMAX
the time domain.
he three different PHY layers in Mobile
T WiMAX are single carrier, orthogonal
frequency division multiplexing (OFDM), and
Mobile WiMAX has an optional channel-
sounding feature for TDD systems. Channel

January 2006 • Volume 4, Number 1 47


Figure 1. Duplex Modes TDD, FDD, and H-FDD

sounding is a signaling mechanism that There are two main types of subcarrier allocation
There are
enables the base station (BS) to estimate BS-to- techniques: distributed and adjacent. In general,
two main types mobile station (MS) channel response based on the distributed allocations perform very well in
of subcarrier the UL signals transmitted by the MS. Channel mobile applications, while adjacent subcarrier
allocation sounding works only under the assumption of permutations can be properly used for fixed,
TDD reciprocity. portable, or low mobility environments. These
techniques:
options enable the system designers to trade
distributed and Due to channel reciprocity and DL/UL ratio
mobility for throughput.
adaptability, TDD is the most favored duplex
adjacent.
mode in Mobile WiMAX [7]. It is the only mode Distributed Subcarrier Allocation
addressed in this paper. In a distributed subcarrier allocation (DSCA),
multiple data subcarriers are grouped into a
OFDMA/TDD Frame Structure subchannel. Although subcarriers in a
Figure 2 shows an example of the OFDMA frame subchannel are not usually adjacent to each other,
structure for the TDD mode. Each frame is they may be in some cases. DSCAs for the DL are
divided into DL and UL subframes by DL-partial usage of subchannels (PUSC), full
transmit/receive transition gaps (TTGs) and usage of subchannels (FUSC), optional FUSC
receive/transmit transition gaps (RTGs). Each DL (OFUSC), and tile usage of subchannels (TUSC)
subframe has a preamble in the first OFDMA 1 and 2. DSCAs for the UL are UL-PUSC and
symbol and then starts with the frame control UL-optional PUSC (OPUSC).
header (FCH) in the second symbol. The FCH • DL-PUSC: The default DL subcarrier
specifies the subchannel groups used for the allocation method. All DL subframes start in
segment, the burst profile, and the length of the the DL-PUSC zone. Subchannels are grouped
DL-mobile application part (MAP) message, into six major groups and assigned to three
which directly follows the FCH. The UL-MAP segments (three sectors) of a cell. Assigning
message is carried by the first burst allocated in two major groups to each segment, the cell
the DL-MAP. Each UL subframe may have one or can be viewed as frequency reused by a
more ranging slots, which are used for the factor of three. By switching to a DL-PUSC
network entry procedure. UL subframes may zone that assigns all subchannel groups to
have fast feedback channels for fast channel each segment, the cell can realize a frequency
quality indicator (CQI) reports or other fast reuse factor of one. DL-PUSC is designed to
operational requests or responses. (Fast feedback minimize the probability of using the same
channels are not shown in Figure 2.) subcarrier in adjacent sectors or cells.
• FUSC: Uses all subchannels and minimizes
Subcarrier Allocation the performance degradation of fading
There are three types of subcarriers: data, pilot, channels by frequency diversity. FUSC is also
and null. Data subcarriers are used for data designed to minimize the probability of
transmissions, pilot subcarriers are used for using the same subcarrier in adjacent sectors
channel estimation and various synchronization or cells. FUSC pilots are in both variable and
purposes, and null subcarriers are used for the fixed positions.
direct current (DC) carrier and guard bands
transmitting no signals. Multiple data sub- • OFUSC: Also designed to fully use
carriers are grouped into a subchannel, and a frequency diversity. One difference from
subchannel forms a slot with one or more FUSC is that OFUSC uses a bin structure
OFDMA symbols. A slot is a channel and MAP like band adaptive modulating and coding
allocation unit; it contains 48 data subcarriers. (AMC).

48 Bechtel Telecommunications Technical Journal


• TUSC: For use in the adaptive antenna selective slow fading channels, ASCAs can gain
system (AAS) zone; similar in structure to multiuser diversity in frequency non-selective
UL-PUSC. fading channels. In the adjacent subcarrier
• UL-PUSC: The default UL subcarrier permutation, symbol data within a subchannel is
allocation method. It is not necessary to start assigned to adjacent subcarriers, and the pilot and
the UL subframe in the UL-PUSC zone. data subcarriers are assigned fixed positions in
UL-PUSC has a tile structure, with each the frequency domain within an OFDMA symbol.
tile comprising four subcarriers by three This permutation is the same for both the UL
symbols. The four corner subcarriers are used and DL.
as pilots, and the remaining eight subcarriers • Band AMC: In defining a band AMC
are used as data subcarriers. allocation, a bin—the set of nine contiguous
• OPUSC: Also has a tile structure, with each subcarriers within an OFDMA symbol—is
While DSCAs
tile comprising three subcarriers by three the basic allocation unit on both the DL and
symbols. The center subcarrier is used as a UL. A group of four rows of bins is called a can gain
pilot, and the remaining eight subcarriers are physical band. An AMC slot consists of six frequency diversity
used as data subcarriers. contiguous bins in the same band, and four in frequency
types of AMC slots are defined in the IEEE
On the DL side, DL-PUSC with all subchannel selective slow
802.16-2004 standard. But in Mobile WiMAX,
groups performs similarly to FUSC and to DL- fading channels,
only one type of slot, defined as two bins by
PUSC with partial subchannel groups, which can
three symbols, is used. ASCAs can gain
avoid co-channel interference by deploying a
frequency reuse factor of three. On the UL side, • PUSC-ASCA: PUSC-ASCA uses distributed multiuser diversity
UL-PUSC, with its four pilot subcarriers, has a clusters for the PUSC mode. The symbol in frequency
better channel estimation performance than structure uses the same parameters as those
non-selective
OPUSC. However, OPUSC has more data slots of the regular PUSC, and the same cluster
structure is maintained; only the subcarrier fading channels.
than UL-PUSC because it has a smaller tile size
with the same number of data subcarriers. allocation per cluster is different from that of
the regular PUSC.
Adjacent Subcarrier Allocation
Band AMC and PUSC-adjacent subcarrier allo- Adjacent subcarrier allocations are preferred in
cation (ASCA) are ASCA techniques. While the AAS zone.
DSCAs can gain frequency diversity in frequency

Figure 2. Example of the OFDMA Frame Structure for the TDD Mode

January 2006 • Volume 4, Number 1 49


Ranging interleaving, and modulation. A pseudorandom
For the purposes of network entry, connection noise (PN) sequence generator is used to
maintenance, bandwidth request, and efficient randomize each FEC data block. Multiple FEC
handover (HO), Mobile WiMAX provides types are available for encoding randomized
ranging channels with CDMA-like signaling. A data: tail-biting convolutional coding (CC), zero-
maximum of 256 sets of 144-bit pseudo-noise tailed CC, convolutional turbo coding (CTC), and
ranging codes are generated and divided into low density parity check (LDPC). Among these
four groups: initial, periodic, bandwidth request, channel coding schemes, tail-biting CC and CTC
and HO ranging. are mandatory; the others are optional. CC is
used for the FCH DL frame prefix (DLFP) and is
One or more groups of six subchannels (for
mandatory. Except for the FCH, it is highly likely
PUSC) or eight subchannels (for OPUSC)
that CTC will be used for all control information
constitute a ranging channel. For initial and HO
MIMO and AAS and data bursts. FEC encoded data is interleaved
ranging, two OFDMA symbols are used, and the
are seriously in two steps: the scattering step and the least-
same ranging code is transmitted on the ranging
significant-bit (LSB)/most-significant-bit (MSB)
being considered channel during each symbol, with no phase
switching step. For modulation in OFDMA
for implementation discontinuity between the two symbols. Hence,
systems, quadrature phase shift keying (QPSK)
initial and HO ranging have a wide range for the
in the early stage and 16 and 64 quadrature amplitude modulation
purpose of timing adjustments. Meanwhile,
to boost spectral (QAM) are available.
periodic and bandwidth request ranging are
efficiency and to transmitted over one OFDMA symbol because
active MSs are aligned mostly via frame time and Multiple Input, Multiple Output/Adaptive Antenna
promote success
the timing deviations are very small. System
in the broadband Since single input, single output (SISO) systems
wireless market. cannot achieve high spectral efficiency, multiple
HARQ
input, multiple output (MIMO) systems draw
HARQ greatly increases the data rate when the
much attention, and they are included in the
signal-to-noise ratio (SNR) is very low; hence, it
WiMAX profile as optional features. MIMO
increases the coverage of Mobile WiMAX
systems have various advantages over SISO and
systems. The major difference between
multiple input, single output (MISO) systems;
conventional ARQ and HARQ is that a
these include multiplexing gain, diversity gain,
conventional ARQ discards erroneous packets
interference suppression, and array gain. In a
when retransmitting lost and/or subsequent
highly scattering channel, transmitting inde-
packets, whereas an HARQ does not discard the
pendent data from different antennas increases
erroneous packets, but combines them with
capacity linearly. Also, there are receiver
retransmitted packets to gain time diversity. For
diversity gains with multiple receiver antennas
every MS, each packet transmission over a radio
and space-time coding (STC) gains with multiple
channel faces different channel characteristics.
transmitter antennas. As is true of smart antenna
Therefore, HARQ can also be used to maximize
systems, beam forming is also an advantage in
the throughput from the time diversity gain.
MIMO systems when channel information is
There are two types of HARQ: chase and available.
incremental redundancy (IR). For chase HARQ,
Even though MIMO and AAS are optional Mobile
each retransmission is identical to the original
WiMAX features, they are seriously being
transmission; hence, implementation complexity
considered for implementation in the early stage
is lower than for IR HARQ. Meanwhile, an IR
to boost spectral efficiency and to promote
HARQ transmits a different redundancy version
success in the broadband wireless market.
for different subpackets. An IR HARQ is flexible
in adapting the subpacket transmission rate
according to the most recent channel quality
MAC LAYER IN OFDMA/ TDD MOBILE WiMAX
feedback; this obviously has the potential of
he MAC layer of Mobile WiMAX provides a
achieving better performance than that of a chase
HARQ. However, chase HARQ using CTC is the T medium-independent interface to the PHY
layer and is designed to support the wireless PHY
preferred HARQ option because it is less complex
than IR HARQ using CTC. layer by focusing on efficient radio resource
management. The MAC layer supports both PMP
and mesh network modes; this paper focuses only
Channel Coding
on the PMP mode.
Mobile WiMAX has four channel coding steps:
randomization, forward error correction (FEC),

50 Bechtel Telecommunications Technical Journal


The MAC layer schedules data transmission (1) The MS first scans for a channel in the defined
based on connections. Each MS creates one or carrier frequency list and detects its frame
more connections having various service classes: synchronization, using the preamble at the PHY
unsolicited grant service (UGS), real-time polling layer. (2) Once the PHY level is synchronized, the
service (rtPS), extended real-time PS (ertPS), non- MS can obtain the DL-MAP, downlink coding
real-time PS (nrtPS), and best effort (BE) service. descriptor (DCD), and uplink coding descriptor
The MAC layer is intended to manage radio (UCD) for the DL and UL parameters. When the
resources efficiently to support QoS for each MS has all parameters and information regarding
connection; to maintain link performance using the UL ranging allocation, it starts sending a
AMC, ARQ, and other methods; and to maximize CDMA ranging code, followed by several MAC
throughput. The MAC layer handles network messages, and then adjusts timing and power
entry for the MS and creates the MAC protocol according to the BS command. (3) After initial
data unit (PDU). Finally, the MAC layer provides ranging is completed, the MS negotiates with the There are
two convergence sublayer (CS) specifications: BS regarding its modulation level, coding five service classes
asynchronous transfer mode (ATM) CS and scheme, MAP support, and other capabilities, so
in Mobile WiMAX:
packet CS. that the BS knows exactly what the MS is capable
of and can allocate resources efficiently. (4) Once UGS, rtPS, ertPS,
Service Classes capabilities are negotiated, the BS authenticates nrtPS, and BE.
When created, each connection is assigned to a the MS and sends important key material for data
certain service class based on the type of ciphering. (5) After the MS is authenticated, it
QoS guarantees required by the application. The finally registers onto the networks and starts the
IEEE 802.16e standard provides the following dynamic host configuration protocol (DHCP) to
service classes: obtain the IP address and other parameters
needed to establish IP connectivity. (6) After that,
• UGS: Designed to support real-time service transport connections are made. The BS initiates
flows that periodically generate fixed-size the establishment of pre-provisioned connections
data packets, such as T1/E1 and VoIP while the MS initiates the establishment of non-
without silence suppression. pre-provisioned connections. (7) Finally, the MS
• rtPS: Designed to support real-time service conducts periodic ranging as needed.
flows that periodically generate variable-size
data packets, such as Moving Picture Experts MAC PDU Construction and Transmission
Group (MPEG) video. The MAC layer of Mobile WiMAX supports both
• ertPS: A scheduling mechanism that builds fragmentation and packing of MAC service data
on the efficiency of both UGS and rtPS. The units (SDUs) for ARQ-enabled and non-ARQ-
BS provides unsolicited unicast grants as in enabled connections. Also, multiple MAC PDUs
UGS, thus saving the latency of a band- can be concatenated into a single transmission of
width request. However, UGS allocations either DL or UL connections. For ARQ-enabled
are fixed in size, whereas ertPS allocations connections, fragments are formed for each
are dynamic. transmission by concatenating sets of ARQ blocks
with consecutive sequence numbers. Even
• nrtPS: Offers regular unicast polls, which
though ARQ implementation is mandatory, ARQ
ensures that the service flow receives request
may be enabled on a per-connection basis.
opportunities even during network
Furthermore, a connection cannot have both ARQ
congestion.
and non-ARQ traffic. A service flow may require
• BE: Intended to provide efficient service for that a cyclic redundancy code (CRC) be added to
BE traffic. Typical BE service is Web surfing. each MAC PDU carrying data for that service
flow. In this case, for each MAC PDU with header
type (HT) = 0, a CRC32 is appended to the
payload of the MAC PDU; i.e., request MAC
Network Entry
PDUs are unprotected. The CRC covers the
When an MS wants to enter the network,
generic MAC header and the payload of the MAC
it follows the network entry process: (1) down-
PDU. The CRC32 calculation methods for the
link channel synchronization, (2) initial ranging,
OFDM mode and the OFDMA mode are
(3) capabilities negotiation, (4) authen-
different, which makes fixed wireless OFDM
tication message exchange, (5) registration,
systems using the IEEE 802.16d standard and
(6) IP connectivity, and (7) periodic ranging
Mobile WiMAX (mobile OFDMA systems) using
afterwards. The following paragraph amplifies
the IEEE 802.16e standard incompatible.
this process.

January 2006 • Volume 4, Number 1 51


Packet Scheduling and Radio Resource likely to be implemented in the early stage of
Management Mobile WiMAX service.
The main goal of packet scheduling and radio
To prepare and expedite a potential HO in the
resource management is to maximize throughput
near future, the MS should be able to scan nearby
while satisfying QoS requirements.
BS signals and associate with possible target BSs
The BS packet scheduler works closely with the to acquire and record ranging parameters and
radio resource management entity to guarantee service availability information.
QoS while maximizing throughput by efficiently
using the opportunistic characteristics of wireless
channels. Meanwhile, the MS packet scheduler PHY/MAC CROSS-LAYER ISSUES IN MOBILE
only schedules packets from the connection WiMAX
queues into the transmission buffer so that the he challenges inherent in implementing
The addition of
an HO scheme
MS can transmit packets when the BS allocates
bandwidth in certain frames.
T Mobile WiMAX arise from its deployment
of a frequency reuse of one and its adoption of
makes Mobile many state-of-the-art technologies such as
Radio resource management is the main task of
WiMAX much the scheduler, whose functions are to allocate HARQ, MIMO, and AAS. This section describes
different from DL and UL bandwidth, construct MAPs in the some cross-layer issues that need to be addressed
DL and UL subframes, and decide on the best in the radio resource allocation management of
fixed broadband
burst profile for each connection. Bandwidth Mobile WiMAX.
wireless systems.
allocation and MAP construction should be done
jointly, and the burst profile should be Zone Switch and Frequency Reuse
determined per connection beforehand, based on Since the OFDMA PHY layer has many choices
the signal-to-interference+noise ratio (SINR) of subcarrier allocation methods, multiple zones
report from each MS. For MAP construction, DL can use different subcarrier allocation methods
and UL subframes can be divided by multiple to divide each subframe. One benefit of using
zones, i.e., a normal zone with multiple choices of zone switching is that different frequency reuse
subcarrier allocation, STC, AAS, and MIMO, factors (FRFs) can be deployed in a cell (or
based on how the optional features may be sector), dynamically.
implemented and used.
Figure 3 shows an example of deploying different
FRFs in one frame. For the first half of each frame,
Handover the entire frequency band is divided by three and
The addition of an HO scheme makes Mobile allocated in each sector. For the second half of
WiMAX much different from fixed broadband each frame, the whole same frequency band is
wireless systems. Seamless HO is a must when used in each sector. The benefits of deploying
the connection is for real-time service such as different FRFs in one frame are: (1) the FCH and
VoIP. There are three types of HO: hard HO, fast DL-MAP are highly protected from severe
BS switching (FBSS), and macro-diversity HO. co-channel interference; (2) edge users, who are
Also, either the MS or the BS can initiate HO. The receiving co-channel interference from other
first type of HO, hard HO, disconnects the MS sectors in other cells, also have suppressed
from the previous serving BS before the MS co-channel interference; and (3) users around
connects with the target BS. The second type of the cell center have the full frequency band
HO, FBSS, uses a fast switching mechanism to because they are relatively less subject to
improve HO quality. The MS can only co-channel interference.
transmit/receive data to/from one active BS at
any given frame, and all active BSs should
Multiuser Diversity
be ready for downlink data for the specific MS at
In the wireless multiuser environment, it is well
any frame. For FBSS, all BSs should be
known that multiuser diversity is a very
synchronized based on a common time source
important leveraging factor of resource allocation
and use the same frequency channel. The BSs are
management [5, 6, 12]. Each MS faces a different
also required to share or transfer MAC context
fading channel; hence, radio resource
through networks. The third type of HO, macro-
management can use multiuser diversity to
diversity HO, allows one or more BSs to transmit
maximize system throughput. The difficulty lies
the same MAC/PHY PDUs to the MS so that the
in the fact that radio resource allocation also
MS can perform diversity combining. This macro-
should satisfy fairness among subscribers.
diversity HO is also called a soft HO. Due to the
Moreover, in slow fading, multiuser diversity
complexity of the macro-diversity HO, it is not

52 Bechtel Telecommunications Technical Journal


Ultimately,
radio resource
management
should follow a
combined form
of multiuser
diversity and
fairness
scheduling.

Figure 3. Zone Switch for FRF Change

hardly satisfies all QoS parameters at the same should be matched to the ratio of DL and UL
time, especially fairness among users. Ultimately, traffic. Moreover, FDD channel bands cannot be
radio resource management should follow a adjusted dynamically in response to the varying
combined form of multiuser diversity and ratio of DL and UL traffic, due to hardware
fairness scheduling. limitations. The ratio of UL to DL streams is fixed
for FDD.
Figure 4 illustrates the deployment of multiuser
diversity with a band AMC zone. Similarly, It has been assumed that network operators
multiuser diversity can also be deployed with a determine the switching points for TDD UL and
DSCA zone such as PUSC, FUSC, optional FUSC, DL schemes and that once such systems are
and TUSC. The only thing different from a band deployed, the DL/UL ratio is not changeable.
AMC zone is that the multiuser diversity gain can Moreover, switching points in adjacent cells
be obtained only from time domain allocations. must be synchronized to avoid severe inter-
cell interference.
Dynamic TDD Usage Figure 5 shows various co-channel interference
Each MS and BS experiences not only different cases. In conventional TDD systems, only DL/DL
channel characteristics, but also various data and UL/UL cases can occur. However, if the
traffic. In other words, UL and DL stream DL/UL ratio is changed dynamically frame by
volumes that have been considered symmetrical frame and independently cell by cell, co-channel
for conventional voice transmissions are interference can exist in all four cases.
unbalanced, and the ratio is time varying. To
provide the highest transport efficiency in A cross-layer D-TDD scheme considering traffic
broadband networks, TDD is preferred to FDD and channel condition together may be adopted.
because it enables real-time adaptation of UL and Since each cell can have different offered loads for
DL bandwidth according to the dynamic traffic UL and DL, cell switching points are set
pattern. Even though FDD can also be used for independently. Although this may cause severe
asymmetric traffic, DL and UL channel bands co-channel interference at time slots around the

January 2006 • Volume 4, Number 1 53


Although D-TDD
is complex,
it has the
potential of
offering higher
bits-per-hertz
efficiency when
needed.

Figure 4. Usage of a Band AMC Zone Based on Multiuser Diversity

DL/DL UL/UL

DL/UL UL/DL

Figure 5. Various Co-channel Interference Cases

54 Bechtel Telecommunications Technical Journal


switching points, it still produces more
throughput than the conventional TDD scheme
with a fixed DL/UL ratio.

Switching points can be updated daily or by


frame. In the daily approach, the network
operator monitors for a certain amount of
time, then updates the switching point to allocate
resources based on switching point information.
In the frame approach (used in this paper), the
switching point is changed dynamically for each
frame based on traffic characteristics and channel
status. Based on the resource allocation Mobile WiMAX
algorithm, each user is given a number of time Figure 6. Various DL/UL Ratios for Different Cells
slots, with corresponding indices and a
is expected to
modulation format. Modulation is determined by bring fast, broad,
the estimated channel state, and the time slot TRADEMARKS seamless data
indices are determined by the TSA algorithm. Wi-Fi is a registered trademark of the Wireless communications,
Figure 6 illustrates the deployment of different Ethernet Compatibility Alliance, Inc. not only for fixed
DL/UL ratios for different cells. In this example, home and small
for the early symbols of the UL subframe in
Cell 2, the BS experiences severe co-channel REFERENCES business
interference coming from Cells 1 and 3 because [1] Wireless MAN Working Group subscribers, but
they are all in the DL period and signals from (http://www.wirelessman.org/). also for mobile
their BSs interfere with the UL signals of users in [2] IEEE Std 802.16-2004, “IEEE Standard for Local
and Metropolitan Area Networks – Part 16:
subscribers.
Cell 2. To suppress interference in this case, a
Air Interface for Fixed Broadband Wireless
good TSA algorithm with beam forming is Access Systems,” October 2004.
necessary. Several investigations of TSA [3] IEEE P802.16-Cor1/D5, “Draft Corrigendum
algorithms show that D-TDD systems out- to IEEE Standard for Local and Metropolitan
perform conventional TDD systems when the Area Networks – Part 16: Air Interface for
Fixed Broadband Wireless Access Systems,”
dynamic traffic has unbalanced DL/UL September 2005.
characteristics [9, 11]. Although the complexity [4] IEEE P802.16e/D11, “Draft Amendment to
of D-TDD makes its adoption in the early IEEE Standard for Local and Metropolitan Area
stages of Mobile WiMAX unlikely, it has the Networks – Part 16: Air Interface for Fixed and
Mobile Broadband Wireless Access Systems —
potential of offering higher bits-per-hertz Amendment for Physical and Medium Access
efficiency when needed. Control Layers for Combined Fixed and Mobile
Operation in Licensed Bands,” September 2005.
[5] P. Viswanath, D.N.C. Tse, and R. Laroia,
“Opportunistic Beamforming Using Dumb
CONCLUSIONS Antennas,” IEEE Transactions on Information
his paper has provided an overview of the Theory, Vol. 48, No. 6, pp. 1277–1294, June 2002.
T IEEE 802.16e standard and Mobile WiMAX
and has provided some simple suggestions to
[6] H. Fattah and C. Leung, “An Overview of
Scheduling Algorithms in Wireless Multimedia
Networks,” IEEE Wireless Communications,
address certain PHY/MAC cross-layer issues. pp. 76-83, October 2002.
[7] TDD Coalition white paper, “The Advantages
Mobile WiMAX is expected to bring fast, broad, and Benefits of TDD Broadband Wireless Access
seamless data communications, not only for fixed Systems,” September 2001.
home and small business subscribers, but also for [8] D.G. Jeong and W.S. Jeon, “Time Slot Allocation
mobile subscribers. Mobile WiMAX will begin in CDMA/TDD Systems for Mobile Multimedia
Services,” IEEE Communications Letters, Vol. 4,
competing in fixed broadband markets to link No. 2, February 2000.
homes and businesses with worldwide core
[9] J. Li, S. Farahvash, M. Kavehrad, and
networks, before ultimately penetrating mobile R. Valenzuela, “Dynamic TDD and Fixed
communication market shares. To strengthen the Cellular Networks,” IEEE Communications
Letters, Vol. 4, pp. 218–220, July 2000.
market power of Mobile WiMAX, radio resource
management that deals with PHY/MAC cross- [10] W.C. Jeong and M. Kavehrad, “Co-channel
Interference Reduction in Dynamic-TDD Fixed
layer issues needs to be developed accurately and Wireless Applications, Using Time Slot
close to optimally.  Allocation Algorithms,” IEEE Transactions on
Communications, Vol. 50, No. 10, pp. 1627–1636,
October 2002.

January 2006 • Volume 4, Number 1 55


[11] J. Yun and M. Kavehrad, “Adaptive Resource Dr. Kavehrad has been a consultant to a score of major
Allocations for D-TDD Systems in Wireless corporations and government agencies. He has
Cellular Networks,” Proceedings of MILCOM, published over 300 refereed journal and conference
Vol. 2, pp. 1047–1053, November 2004. papers, several book chapters, and books. His research
[12] M. Ergen, S. Coleri, and P. Varaiya, “QoS Aware interests are in the areas of technologies, systems,
Adaptive Resource Allocation Techniques for and network architectures that enable the vision
Fair Scheduling in OFDMA Based Broadband of the information age, e.g., broadband wireless
Wireless Access Systems,” IEEE Transactions on communications systems and networks and optical
Broadcasting, Vol. 49, No. 4, pp. 362–370, fiber communications systems and networks. He holds
December 2003. several key issued patents in these areas.

Dr. Kavehrad received three Exceptional Technical


Contributions Awards for his work on wireless
BIOGRAPHIES communications systems while he was with Bell
Jungnam Yun is a member of Laboratories; the 1990 TRIO Feedback Award for his
the Technical Staff at the patent on a “Passive Optical Interconnect”; the 2001
POSDATA America R&D IEEE Vehicular Technology Society Neal Shepherd Best
Center, Santa Clara, California, Propagation Paper Award; three IEEE Lasers and
where he works as a system Electro-Optics Society Best Paper Awards; and a
engineer for the OFDMA PHY Canada National Science and Engineering Research
algorithm and MAC scheduler. Council (NSERC) PhD dissertation Gold Medal award,
His research interests are signal jointly with his former graduate students, for work on
processing, communication wireless and optical systems. He is a fellow of the IEEE
theories, and cross-layer and has lectured worldwide as an IEEE distinguished
optimization for radio resource allocations in lecturer and as a plenary and keynote speaker at
broadband wireless communication systems. leading conferences.
Dr. Yun received his BS and MS in Electrical Dr. Kavehrad received his PhD in Electrical Engineering
Engineering from Korea Advanced Institute of Science from Polytechnic University (Brooklyn Polytechnic),
and Technology (KAIST), Taejun, South Korea, and his Brooklyn, New York.
PhD in Electrical Engineering from The Pennsylvania
State University, State College, Pennsylvania.

Mohsen Kavehrad was with


the Space Communications
Division, Fairchild Industries,
and Satellite Corporation and
Laboratories, GTE, from 1978 to
1981. In December 1981, he
joined Bell Laboratories, and
in March 1989, he joined
the Department of Electrical
Engineering, University of
Ottawa, Ottawa, Ontario, Canada, as a full professor. At
the same time, he also was director of the Broadband
Communications Research Laboratory, director of
Photonic Networks and Systems Thrust, project leader
in Communications and Information Technology
Ontario (CITO), and director of the Ottawa-Carleton
Communications Center for Research (OCCCR). He
was an academic visitor (senior consultant) at NTT
Laboratories, Yokosuka, Japan, in the summer of 1991.
He spent a 6-month sabbatical term as an academic
visitor (senior consultant) with Nortel, Ottawa,
Ontario, Canada, in 1996. In January 1997, he joined
the Department of Electrical Engineering, The
Pennsylvania State University, University Park, as
the AMERITECH (W.L. Weiss) professor of Electrical
Engineering and director of Communications
Engineering. Later, in August 1997, he was appointed
founding director of the Center for Information and
Communications Technology Research (CICTR). From
1997 to 1998, he also was chief technology officer and
vice president with Tele-Beam Inc., State College,
Pennsylvania. He visited, as an academic visitor (senior
consultant), Lucent Technologies (Bell Laboratories),
Holmdel, New Jersey, in the summer of 1999. He spent
a 6-month sabbatical term as an academic visitor (senior
technical consultant) at the AT&T Shannon Research
Laboratories, Florham Park, New Jersey, in 2004.

56 Bechtel Telecommunications Technical Journal


ANSI/TIA STANDARD 222 – STRUCTURAL
STANDARD FOR ANTENNA SUPPORTING
STRUCTURES AND ANTENNAS:
A COMPARISON OF REVISIONS F AND G
Issue Date: January 2006

Abstract—A new revision of ANSI/TIA Standard 222 will take effect on January 1, 2006. The new standard—
Revision G—is the most comprehensive revision of Standard 222 since its first publication in 1949. A revision
on this order can cause anxiety in the industry as to its impact on tower design and can raise questions.
This paper explains the differences in the basic design philosophies of the standard (Revision F) and the new
Revision G. It also discusses the impetus behind this major revision triggered by the latest understanding and
state-of-the-art practices of the current codes and standards in the building industry.

INTRODUCTION obtained from available sources and


his paper describes the provisions of the represents, in the judgement of the
T ANSI/TIA/EIA-222-F-1996 standard [1] for
the design, purchase, fabrication, and installation
subcommittee, the accepted industry
minimum structural standards for the design
of telecommunication tower superstructures and of antenna supporting structures and
foundations and compares these provisions with antennas. While it is believed to be accurate,
those of the new ANSI/TIA-222-G-2005 standard this information should not be relied upon for
[2]. The new Revision G standard was issued in a specific application without competent
August 2005 with an effective date of January 1, professional examination and verification of
2006. This standard is the governing document its accuracy, suitability and applicability by a
for telecommunication towers in the United licensed professional engineer. This standard
States. The contents of the document are being utilizes loading criteria based on an annual
applied extensively as new telecommunication probability and is not intended to cover all
tower sites are built and existing sites are environmental conditions which could exist at
upgraded to accommodate the growth in the a particular location.
wireless communication industry. This paper The standard provides the requirements for the
provides insight into new Revision G of the structural design of new and the modification of
standard and how it will affect projects involving existing structural antennas and antenna-
wireless telecommunication tower sites. supporting structures, i.e., towers, mounts,
The Telecommunications Industry Association structural components, guy assemblies,
(TIA) subcommittee TR-14.7, which was insulators, and foundations.
responsible for preparing the standard, states: This paper compares the provisions of Revisions
The objective of this Standard is to provide F and G of ANSI/TIA Standard 222 as they relate
recognized literature for antenna supporting to five key aspects of tower superstructure and
structures and antennas pertaining to: (a) foundation design:
minimum load requirements as derived from • Design method evolution from a traditional
ASCE 7-02, “Minimum Design Loads for working strength design approach to a
Buildings and Other Structures,” [3] and (b) contemporary load resistance factor design
Peter Moskal
design criteria as derived from AISC-LRFD-99, approach for the tower superstructure
pmoskal@bechtel.com
“Load and Resistance Factor Design
Specification for Structural Steel Buildings,” • Wind load definition
Krishnamurthy [4] and ACI 318-05, “Building Code • Seismic requirements
Raghu Requirements for Structural Concrete” [5]. The • Ice loading definition
kraghu@bechtel.com information contained in this Standard was
• Design of existing structures

© 2006 Bechtel Corporation. All rights reserved. 57


Revision F
ABBREVIATIONS, ACRONYMS, AND TERMS This standard uses the working stress design
ACI American Concrete Institute method. The American Institute of Steel
AISC American Institute of Steel Construction (AISC) refers to this approach as the
Construction allowable stress design (ASD) method. Stresses in
AISI American Iron and Steel a structure are determined by application of
Institute defined service loads using the principles of
ANSI American National Standards statics and dynamics. The loads are applied to a
Institute suitable arrangement of structural elements
ASCE American Society of forming a stable assembly. The assembly has
Civil Engineers sufficient strength and is designed using
ASD allowable stress design members and connections of defined geometric
A significant change shape and known material properties in
COA Certificate of Authorization
in the standard accordance with applicable code provisions. The
ERC engineer in responsible
resulting actual member stresses are compared
reflects the charge
to allowable member stresses, based on the
migration from the IBC International Building Code
code, which are less than the member material
typical working NWS National Weather Service
yield stresses. The allowable stresses provide
TIA Telecommunications Industry an inherent factor of safety to account for
stress design to Association uncertainties related to typical simplifying
the contemporary
assumptions and the use of nominal or average
limit-states calculated stresses as the basis for manual
design approach In each case, the two standards are contrasted by methods of analysis. The margin between the
briefly describing the provisions of Revision F allowable stresses and the material yield stresses
for structural steel.
and then those of Revision G, followed by a provides the margin of safety. In applying this
summary of the significance of the changes. approach, engineering judgment must be
exercised. The working stress approach has
This paper also discusses related areas of interest.
served as the principal design philosophy for
Figure 1 shows a typical guyed lattice
a century.
telecommunication tower structure governed by
the ANSI/TIA-222 standard. Allowable stress design may be formulated as
follows:

DESIGN METHOD
φRn = ∑Q
significant change in the standard reflects (1)
A the migration from the typical working
stress design to the contemporary limit-states
γ i

design approach for structural steel. This brings In this elastic design approach, all loads Qi are
the standard into compliance with current codes. assumed to have the same variability, and the
term φ/γ may be thought of as the safety factor
applied to the material resistance. For materials in
direct tension, the allowable stress is limited to
0.60 times the material yield strength. This results
in a safety factor of 1/0.60 = 1.67. The AISC
specification defines the allowable stresses
for tension members, columns and other
compression members, beams and other flexural
members, plate girders, bolts, and welds.

Per Revision F, design for structural members,


unless otherwise noted, must be in accordance
with the appropriate AISC or American Iron and
Steel Institute (AISI) specification. American
Society of Civil Engineers (ASCE) Standard 10 is
used to adjust the AISC allowable compression
stresses for the effects of eccentric axial loading
and partial end restraint for structural steel
Figure 1. Guyed Lattice Tower Structure Governed by single-angle compression members.
ANSI/TIA-222

58 Bechtel Telecommunications Technical Journal


Revision G The left side of this equation represents resistance
The new standard is based on limit-states design. or strength, i.e., strength of concrete, steel, or other
Structural design has been moving toward this material. The right side represents the loads that
more rational probability-based approach over the the structure is designed to carry. On the left side of
past 25 years. The generic term “limit states” used the equation, the nominal resistances Rn are
in the new standard is synonymous with multiplied by a strength reduction factor φ to
the AISC’s use of load and resistance factor obtain a design strength limit. On the right side, the
design terminology. applied loads Qi (e.g., wind, ice, and seismic) are
multiplied by a load factor γi to obtain the factored
Structures (tower superstructure and foundation),
design loads for which the structure is designed.
members, and connections must have adequate
The strength reduction factors are less than one to
strength to function safely over their service life.
establish material strength limits with an
Reserve strength must exist in a structure to
appropriate conservatism applied based on The limit-state
account for possible overload and under-strength
statistical assessments of materials. The load factors design approach is
conditions. Overloads may occur because the
are greater than one to allow margin in the design
structure’s use may be changed or the design loads the contemporary
loads that are also based on statistical assessments.
may be judged to be less than those actually method for
experienced. Under strength may result from Additional discussion and comparison of the
structural analysis
variations in member sizes due to manufacturing working stress design and limit-state design
or construction practices, or from installed approaches can be found in Chapter 1 of [7]. and design.
material strengths that are less than specified.
The new standard specifies the requisite loads,
A structure must contain an adequate safety load combinations, strength reduction factors,
margin. Safety has been studied using and load factors for tower design and
probabilistic methods to assess the chance of modification use.
failure or the limit state. Limit states are reached
when a structure no longer performs its intended Design Method Summary
function. Limit states are divided into two The limit-state design approach is the
categories: strength and serviceability. Strength contemporary method for structural analysis and
refers to the ability of elements to sustain intended design. It is now the method of design for
loads and maintain stability in conditions such as telecommunication towers as well as concrete
sliding or overturning. Serviceability involves and structural steel. This is a rational approach
consideration of requirements such as deflection that will facilitate incorporation of additional
and permanent deformation. information that becomes available on loads and
The loads acting on a structure and the resistances and their variation. It provides a
structure’s resistance to the loads must balance framework for handling unusual loads that may
with an appropriate allowance for a margin of not be covered by specifications. Safer structures
safety. The variables that affect loads and may result because the method should lead to
strength have been studied probabilistically to improved awareness of structural behavior. In
assess variability. The limit-state approach most cases, it should also improve the economy
assumes that the load Q and the resistance R are of structures.
random variables. The goal is to have the
resistance R exceed the load Q by a reasonable
margin of safety. Unless the margin of safety is
very large, some probability exists that R may be
less than Q. When assessing the relationship for
the natural logarithm of resistance divided by
load, i.e., ln(R/Q), a probability distribution
function is obtained. Values for the number of
standard deviations that are appropriate between
the mean value of ln(R/Q) and the lower
specification limit are established and designated
as the reliability index [6] (see Figure 2).

This leads to the following limit-state requirement:

φRn = ∑ γi Qi (2)
Figure 2. Reliability Index β

January 2006 • Volume 4, Number 1 59


As shown in Figure 3, the value of 0.02 indicates
a 2 percent chance that the 70 mph speed will be
exceeded in a year or a 98 percent chance that it
will not be exceeded. Wind determination
requires a probabilistic formulation, and the
necessary probability measures must be
estimated on the basis of experimental
formulations. The average time between two
consecutive annual occurrences of the wind
exceeding 70 mph is the reciprocal of the
probability of the event within one time unit, i.e.,
1/0.02 = 50 years. Therefore, the probability that
the wind will exceed 70 mph is a 2 percent chance
in a given year, and the chance that this speed
will be exceeded in consecutive years occurs once
Figure 3. Largest Annual Fastest-Mile Velocity (V) every 50 years. The National Oceanic and
Atmospheric Administration’s National Weather
Service (NWS) branch collects and publishes
WIND LOADS wind speed data throughout the US.

nother significant change relates to the


A migration from fastest-mile wind speed to a
3-second-gust wind speed definition, which
Revision G
In the new standard, wind speed definition is
brings the standard into compliance with other based on the 3-second gust. Wind speeds are
current standards, codes, and guides. developed for 3-second gusts at 33 feet above
ground in open-country exposure Category C for
a 50-year mean recurrence interval. The NWS has
Revision F
phased out the measurement of fastest-mile wind
Section 2.6.1 of the standard defines the basic
speeds, and the basic wind speed has been
wind speed as the fastest-mile wind speed at
redefined as the peak gust, which is recorded and
33 feet above the ground corresponding to an
archived for most NWS stations. The wind speeds
annual probability of 0.02 (50-year recurrence
are not representative of speeds at which ultimate
interval) for Exposure C. This may be thought of
limit states are expected to occur. Load factors or
as the average speed obtained during the passage
allowable stresses used in design equations lead
of 1 mile of wind. For a 70 mph wind, this would
to structural resistances substantially higher than
mean that 1 mile of wind passes in 51.4 seconds.
the design wind speeds. Figure 4 illustrates a
The wind speed is measured by a weather device
wind speed time history record and provides an
called an anemometer at a height of 33 feet above
interpretation of the two speed definitions.
the ground. The annual probability is based on
Figures 5 and 6 show lattice towers with
the probability distribution function.
significant coaxial cable wind load areas.

Figure 4. Wind Speed Record

60 Bechtel Telecommunications Technical Journal


Wind Loads Summary history analysis would be applied based on the
The fastest-mile wind speed of 70 mph mentioned provisions contained in applicable building
previously is equivalent to an 85 mph 3-second- codes.
gust wind speed. The new standard provides a
table of wind speed equivalencies. Revision G
This approach to wind loads makes the standard The new standard defines four methods of
consistent with ASCE Standard 7 and codes such structural analysis for seismic loads. A table is
as the International Building Code (IBC). It is the provided to identify which method is to be used
contemporary wind load approach in the US. for which tower type in accordance with mass and
This standard enables accurate site-specific wind stiffness irregularities. The four approaches are:
modeling using exposure categories and • Method 1 – Equivalent Lateral Force
topographic effects.
The total weight of the structure, including The new
The new standard will use an averaging period appurtenances, is determined; the total standard defines
of 3 seconds for the US. Other countries use seismic shear is determined and distributed four methods
different averaging periods (e.g., 1 hour or as specified in the standard. The structure is
10 minutes). Weather data in the US is collected at then analyzed statically using the seismic
of structural
465 stations throughout the country. forces as external loads. analysis for
A description of how to convert the fastest-mile • Method 2 – Equivalent Modal Analysis seismic loads.
wind speed to the 3-second-gust definition can be The fundamental frequency of the structure
found in Section 4.0 of Reference [8]. is determined along with the seismic forces
for each level of the structure. The structure is
then analyzed statically using the seismic
SEISMIC LOADS forces as external loads.
nother significant change in the standard is
A the inclusion of seismic provisions. This
brings the standard into compliance with other
• Method 3 – Modal Analysis
A mathematical model of the structure is
current standards, codes, and guides. created that represents the spatial
distribution of the mass and stiffness. The
mode shapes—the period, shape factor, and
Revision F
participation factor—are determined. The
The standard does not contain seismic provisions.
design response spectrum is established in
When seismic loads were considered to apply to a
accordance with the standard. The base
specific tower design, an equivalent static load,
shears and forces at each level of the
response spectrum modal analysis, or time

Figure 5. Coaxial cable is a major contributor of wind load Figure 6. Towers can be loaded with a very complex array
on a tower. Wind computations are handled of coaxial cable. Revision G addresses
in detail in Revision G. several load scenarios.

January 2006 • Volume 4, Number 1 61


structure for each mode are determined and Category C for a 50-year mean recurrence
then combined by the square root of the sum interval. Escalation of ice thickness and wind on
of the squares of the modal values. ice over the height of the structure is required.
• Method 4 – Time History Analysis Ice is assumed to be glaze ice with a density of
56 lb/ft3. Accumulation of ice is considered on the
A mathematical model of the structure is structure, guys, and appurtenances. All elements
created that represents the spatial distribution are assumed to be covered with a uniform
of the mass and stiffness considering thickness of ice that results in a wind drag.
structural damping to be 5 percent of critical Design ice thickness is also escalated with height
damping. Two orthogonal ground motion and is based on regional climatic data. For
time histories are selected from recorded engineering design, all members are traditionally
events with seismicity compatible to the site, assumed to be covered with a uniform thickness
The standard or synthetic time histories are developed of ice, which together with the ice density may be
in accordance with accepted practice. A used to calculate the ice weight as well as the
includes provisions
5 percent horizontal response spectrum is wind drag.
for the design of constructed, and the foregoing time histories
existing tower are combined according to rules specified in
Ice Loads Summary
superstructures the standard to develop two scaled, site-
The new standard provides a rational approach
specific time histories. These two time
and foundations. for considering ice thickness in the tower and
histories are used to perform a structural
foundation design.
analysis. Load effects for design are
determined by selecting the maximum values
from the time history analysis.
EXISTING STRUCTURES
he standard includes provisions for the
Seismic Loads Summary
Under the new standard, wireless T design of existing tower superstructures and
foundations.
telecommunications structures will typically be
analyzed using either Method 1 or 2.
Revision F
The standard contains provisions for ground
The standard indicates that towers and
motions, torsional moments, mathematical model
supporting structures should be analyzed when
requirements, and earthquake loads for
changes in the original design or operating
structures supported on buildings or other
conditions take place. Recommended criteria
supporting structures. A seismic approach
appear in an annex to the standard.
considering the uniqueness of towers will now be
included and considered as part of the design.
Revision G
A section of the new standard addresses the
ICE LOADS structural analysis of existing structures. Another
section discusses the evaluation of structures
he inclusion of ice loading provisions
T represents a significant change that brings the
standard into compliance with the current
regardless of the standard used in the original
design. Existing structures are to be evaluated in
the following circumstances:
standards, codes, and guides.
• A change in type, size, or number
Revision F of appurtenances such as antennas,
Though it recognizes a consideration of radial solid transmission lines, platforms, and ladders
ice uniform thickness with a density of 56 lb/ft3, • Any structural modification (except for
the standard does not specifically state an ice maintenance) made to the structure
requirement. The standard does recognize that
• A change in serviceability requirements
ice may be a significant load for structures to be
located in areas of significant ice accumulation and • A change in structure classification in
provides information for consideration in an annex. accordance with the categories identified
in the standard
Revision G
The design ice thickness specified in the new Existing Structures Summary
standard is a uniform radial thickness of The new standard indicates that existing
glaze ice at 33 feet above the ground in exposure structures need not be re-evaluated for each

62 Bechtel Telecommunications Technical Journal


revision of the standard except in the course and after suitable experience,
circumstances listed above. Analyses and participants will possess the skill set necessary
modifications will definitely include modeling, to assess, evaluate, analyze, and modify
analysis, design, and modification using the towers using the ANSI/TIA-222 standard.
provisions of the standard in computer models
and calculations.
LICENSED PROFESSIONAL ENGINEER SEAL
he primary responsibility of a registered
SOFTWARE T licensed Professional Engineer is the
protection of public, life, safety, health, welfare,
he commercially available software products
T typically used for tower analysis, design,
and modification are Power Line Systems,
and property. All tower work is to be carried out
under the direction of a licensed Professional
Inc.’s TOWER® and PLS-POLE®, and RISA Engineer in the Civil and/or Structures
The primary
Technologies’ RISATower. Both companies’ disciplines in responsible charge as defined in
software packages are now standard computer state licensing laws, rules, and regulations. In a responsibility of a
applications in accordance with engineering majority of states, all companies performing registered licensed
department procedures. Both companies are engineering must possess a Certificate of Professional
including the provisions for the new standard in Authorization (COA) with an engineer in
Engineer is the
their software; this capability will be available in responsible charge (ERC) designated on the
January 2006. certificate. The COA is the state corporate license protection of public,
to practice engineering. In states that do not life, safety, health,
require a COA, all companies performing welfare, and
TRAINING engineering must have an ERC with
property.
the appropriate Professional Engineering
raining in the following subjects is available
T for engineers who work in this area.
Customers may also wish to take advantage of
registration.

The drawings, calculations, and reports prepared


this training. by civil/structural engineers for owners are
manually wet-stamp sealed or manually
• Telecommunication Tower Overview
embossed with a seal and manually signed and
The overview training is an orientation for all dated by a licensed Professional Engineer
engineering personnel, regardless of registered in the state where the tower structure
discipline, involved in wireless site project is located. States are also allowing electronic
tower activities. Practical background is seals, signatures, and dates on engineering
provided to enhance understanding of the deliverables.
different types of towers and foundations,
the codes and standards that apply, and the
work associated with tower activities. CONCLUSIONS
• ANSI/TIA-222-G-2005 Structural Standard he comprehensive Revision G of Standard 222
for Antenna Supporting Structures and
Antennas
T governing telecommunication tower
activities in the US will continue to guide the
This offering focuses on the meaning and use creation of tower structures that successfully
of the Revision G standard. perform their intended function. The standard
addresses both the tower superstructure and
• Telecommunication Tower Structural
the foundation, as both are necessary for the
Analysis and Design
successful performance of a tower in service.
This course provides instruction for The term “tower“ encompasses both the
civil/structural engineers in the use of superstructure above the ground and the
Revisions F and G of the ANSI/TIA-222 foundation below the ground functioning
standard. Training is provided in the use of together to support loads under all design
the TOWER, PLS-POLE, and RISATower conditions.
software packages. Participants model and
The standard has been prepared by individuals
design a lattice steel guyed tower and a self-
and companies who work and practice in this
supporting, tapered tubular steel pole tower.
area, i.e., fabricators, erectors, consultants,
The course provides the background
contractors, and architect-engineers. Designs are
necessary for an engineer to independently
expected to be in line with those that result from
analyze and design telecommunication
application of Revision F of the standard.
towers. Upon successful completion of the

January 2006 • Volume 4, Number 1 63


In summary, ANSI/TIA Standard 222 Revision G and selects and provides the software, design guides,
reflects contemporary engineering practice and specifications, training, and tools needed to perform
the work. He also regularly supports business
incorporates the latest appropriate technical development activities.
methods and academic information. It is a
welcomed evolution that brings the science and Peter is a voting member of ANSI/TIA-222-G-2005
standard committee TR-14.7. He holds Professional
art of tower design and analysis into conformance Engineer licenses in multiple states and serves as the
with current provisions of the AISC, ACI, ASCE, designated engineer in responsible charge on a number
IBC, and other national codes, standards, and of corporate licenses to practice engineering.
practices.  Peter received a BS in Civil Engineering and an MS
in Civil Engineering (Structures and Soil Mechanics)
from the University of Pittsburgh and a Business
TRADEMARKS Management Certificate from Golden Gate University.

PLS-POLE and TOWER are registered


trademarks of Power Line Systems, Inc. Krishnamurthy Raghu is an
engineering supervisor in
Bechtel Telecommunications
currently responsible for
REFERENCES supporting Telecommunications
[1] American National Standards Institute staff engineering and self-
(ANSI)/Telecommunications Industry performance engineering in
Association (TIA)/EIA-222-F, Structural Standards Frederick, Maryland. A
for Steel Antenna Towers and Antenna Supporting civil/structural engineer, he
Structures, June 1996. has also worked in Bechtel’s
[2] ANSI/TIA-222-G, Structural Standard for Antenna Power and Petroleum & Chemical business lines. He is
Supporting Structures and Antennas, August 2005. experienced in wireless tower engineering, site
development, and zoning as well as in the transmission
[3] Structural Engineering Institute (SEI)/American
and distribution industry. He is a technical specialist in
Society of Civil Engineers (ASCE) 7-02, Minimum
Design Loads for Buildings and Other Structures, tower and pole structures and telecommunications
2003. standards.
[4] American Institute of Steel Construction (AISC), Krishnamurthy is a member of ANSI/TIA-222-G-2005
Manual of Steel Construction, Load and Resistance standard committee TR-14.7.
Factor Design.
Krishnamurthy received a BE in Civil Engineering from
[5] American Concrete Institute (ACI) 318, Building
Code Requirements for Structural Concrete. Bangalore University, India, and an MS in Civil
Engineering from Virginia Polytechnic Institute and
[6] A.H.-S. Ang and W.H. Tang, Probability Concepts State University (Virginia Tech).
in Engineering Planning and Design, Volume 1 –
Basic Principles, John Wiley & Sons, Inc., 1975.
[7] C.G. Salmon and J.E. Johnson, Steel Structures
Design and Behavior, Fourth Edition, Harper
Collins, 1996.
[8] M.K.S. Madugula, “Dynamic Response of
Lattice Towers and Guyed Masts,” ASCE,
Reston, Virginia, 2002.

BIOGRAPHY
Peter Moskal is chief engineer,
civil, structures, and architecture,
for Bechtel Telecommunications.
He is responsible for the wire-
less and wire line infrastructure
engineering deliverables, the
people who prepare those
deliverables, the processes
employed, and the tools used to
execute the work on behalf of
Bechtel Telecommunications customers. He oversees
the work of civil engineers, structural engineers,
architects, and CAD designers and drafters within the
Telecommunications organization.

Peter implements defined standard work processes in


accordance with engineering department procedures

64 Bechtel Telecommunications Technical Journal


REDUCING THE AMOUNT OF FIBER IN
FIBER-TO-THE-HOME NETWORKS

Issue Date: January 2006

Abstract—Reducing the amount of unnecessary fiber deployed in fiber-to-the-home networks can significantly
reduce capital costs. Two principal causes of fiber waste—excessive serving area size and poor hub location—
are examined. Methods to detect and quantify excessive fiber usage attributable to these causes are developed.

INTRODUCTION • It is difficult to determine when a network


n excessive amount of fiber is being design contains excessive fiber. Each design
A deployed in today’s fiber-to-the-home
(FTTH) networks. In many cases, more than half
is a unique reflection of an engineer’s
judgment applied to the peculiarities
the fiber deployed may be unnecessary. Although of differing neighborhoods. No two
the excess fiber is increasing the cost of networks, neighborhoods will yield the same design,
this phenomenon is occurring largely unnoticed nor will two engineers produce the same
for several reasons: design for the same neighborhood.
Identifying excessive fiber is a challenging
• Fiber is generally regarded as “cheap.” task and the impetus for this paper. Two
Little attention is paid to conserving fiber, metrics are developed in this paper that can
since its cost is generally considered be simply applied to any network design to
insignificant. While it is inexpensive, fiber is indicate the presence of excessive fiber.
not free.1 The cost of fiber in a network can
reach hundreds of dollars per household
passed. Significant savings can be realized if BACKGROUND
excess fiber is eliminated.
iber is the principal component of any FTTH
• There is a common belief that deploying
extra fiber is “good.” It is considered
F network, as the name implies. Fiber from
homes is routed to an aggregation point in the
less expensive to have extra fiber in place neighborhood. At this aggregation point or hub,
to meet future demands than to install traffic from multiple fibers is combined onto
additional fiber later on. Indeed, there fewer fibers for transport back to the central
is some economy in deploying extra fiber office. The hub can combine traffic passively via
for maintenance and foreseeable growth optical splitters in a passive optical network
opportunities. A threshold exists, though, (PON) or actively via an Ethernet switch in an
between extra fiber and excessive fiber active Ethernet network. Within the central office,
deployment. Installing fiber in excess of traffic is routed to the appropriate destination.
the foreseeable demand is an inefficient use Traffic flows in both directions: home to central
of capital. office (upstream) and central office to home
Brian Perkins ____________________________
(downstream). The hub not only aggregates
bmperkin@bechtel.com 1 While the price of fiber-optic cable can vary based on upstream traffic but also distributes downstream
the number of fibers, cable construction, and purchase
commitments, $0.01 per fiber-foot is a useful rule-of-
thumb approximation in today’s market.

© 2006 Bechtel Corporation. All rights reserved. 65


homes suited to the capacities of the available
ABBREVIATIONS, ACRONYMS, AND TERMS hubs. Once the serving areas are defined, a hub
FTTH fiber to the home site is selected within each serving area. Hubs are
HC hub centricity best located near the center of the serving areas,
PON passive optical network but safety, accessibility, and aesthetic concerns
often cause hubs to be located near the serving
PSTN public switched telephone
network area edges (see Figure 2).

The completed plan, with serving area


boundaries and hub locations established, is used
traffic from the central office across the multiple
as a template for the engineering phase. The
fibers to the homes (see Figure 1).
network design is completed by routing and
The design of FTTH networks typically occurs in sizing fiber cables that connect every household
Two principal two phases: planning and engineering. During to the hub location within each serving area. Only
causes of excessive the planning phase, homes are grouped into minor modifications of the plan, to compensate
serving areas. The serving area boundaries are for constructability issues, are considered during
fiber deployment:
established to contain an “ideal” number of the engineering phase.
•Overly large
serving area

•Poor hub
location

Figure 1. FTTH Network Architecture

CAUSES OF EXCESSIVE FIBER DEPLOYMENT


eviews of several FTTH network designs
R identified two principal causes of excessive
fiber deployment:

• Overly large serving area


• Poor hub location
The following sections discuss serving area size
and hub centricity (HC) and their effect on the
amount of fiber deployed. Models and metrics
are presented to detect and assess the impact of
these causes.

Figure 2. Hub Locations Within Serving Areas

66 Bechtel Telecommunications Technical Journal


Serving Area Size
The serving area size for each network design is
X
chosen during the planning phase. Armed with
ONT ONT ONT ONT
guidelines and an approved list of hub sizes, the
planner uses “good judgment” to group an
acceptable number of households into serving
ONT ONT ONT ONT
areas. Previous work has suggested that expected
subscription rate (or take rate) should also be
considered when establishing serving area size to
maximize resource utilization [1]. In general, Figure 3. Linear Serving Area with Eight Households
resource utilization improves as serving area size

X A larger serving area


ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
requires additional
fiber per household
12 Fiber Cable 12 Fiber Cable
to be installed.
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

Figure 4. Linear Serving Area with 24 Households

increases, lowering the cost per subscriber. linear serving areas of any size n, the total fiber
However, there is a penalty to be paid for TFl required is:
increasing serving area size. A larger serving area
requires additional fiber per household to be
⎞ n2 ⎞
installed. This principle is easily demonstrated TFl = ⎟⎠ 4 – n⎟⎠ x (1)
and quantified with two simplistic examples.

Linear Serving Area


The total fiber per household TFl / n is simply:
Consider a serving area composed of eight
households arranged as shown in Figure 3.
TFl ⎞ n – 1⎞ x
n = ⎟⎠ 4 ⎟⎠
Each household lot has frontage of x feet. With
the hub placed in the center, four fibers would
exit east and west and traverse one lot,
connecting to drops to each of the four TFl ≈ n x n >>4 (2)
households on either side of the hub. The total n 4
fiber required is 8x fiber-feet or x fiber-feet
per household. For large linear serving areas, total fiber per
Consider now a serving area of 24 households, as household is directly proportional to the serving
shown in Figure 4. area size—splitting the serving area in half halves
the fiber cost per household.
The dimensions are the same as before; each lot
has a frontage of x feet. The hub is centered with The linear serving area model may be too severe
12 households to either side. In this case, 12 fibers a characterization of the real world. Therefore, it
exit east and west from the hub and traverse may be useful to investigate the other extreme—
5 lots to connect all the households.2 The an overly generous characterization.
total fiber required for this serving area is Ideal Mesh Serving Area
120x fiber-feet or 5x fiber-feet per household. Consider a serving area composed of
The previous two examples demonstrate that 16 households arranged in a square, as shown
tripling the serving area size results in a fivefold in Figure 5.
increase in the fiber required per household. For Each household lot is x by x feet. The hub is
located at the center of the serving area with eight
____________________________
households north and south of the hub. A main
2 The fiber count could be reduced by four at each drop
distribution cable of eight fibers exits north and
location. However, it is more expensive to splice smaller
cables at each taper point than to continue the original
south of the hub and traverses one lot.
12 fibers the entire length. Subtending distribution cables of four fibers

January 2006 • Volume 4, Number 1 67


traverse one lot east and west of both the north Now consider a similar serving area of
and south main cable to connect all the 144 households, as shown in Figure 6.
households. The total fiber used is 32x fiber-feet
The lot dimensions are the same: x by x feet. The
(16x main cable + 16x subtending cable) or
hub is located at the center. The main distribution
2x fiber-feet per household.
cable is now 72 fibers and traverses 5 lots.
There are 12 subtending cables of 12 fibers,
X
each traversing 5 lots. The total fiber is
ONT ONT ONT ONT 1,440x fiber-feet or 10x fiber-feet per household.

X
In general, the total fiber TFim required for an
ideal mesh serving area is:
ONT ONT ONT ONT

TFim = n ⎞⎟⎠ n – 2⎞⎟⎠ x


ONT ONT ONT ONT
(3)

ONT ONT ONT ONT

Figure 5. Ideal Mesh Serving Area with 16 Households

X
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
X

12 Fiber Cable 12 Fiber Cable

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

12 Fiber Cable 12 Fiber Cable


72 Fiber Cable

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

12 Fiber Cable 12 Fiber Cable

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

ONT ONT ONT ONT ONT ONT


HUB ONT ONT ONT ONT ONT ONT

12 Fiber Cable 12 Fiber Cable

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

12 Fiber Cable 12 Fiber Cable


72 Fiber Cable

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

12 Fiber Cable 12 Fiber Cable

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

Figure 6. Ideal Mesh Serving Area with 144 Households

68 Bechtel Telecommunications Technical Journal


The total fiber per household TFim /n is:

TFim = ⎞ n – 2⎞ x
n ⎟⎠ ⎟⎠

TFim ≈ nx n >>4 (4)


n

For large ideal mesh serving areas, total fiber per


household is proportional to the square root of
the serving area size. Splitting a serving area 32 232 432 632 832 1032
in half reduces total fiber per household by
30 percent. Series 2 Rural Linear Series 3 Rural Mesh
Series 4 Urban Linear Series 5 Urban Mesh
Optimum Serving Area Size
Both models indicate a direct relationship Figure 7. Total Fiber per Household Versus Serving Area Size
between the size of the serving area and the total (Rural and Urban)
fiber per household. The expectation is for real
world behavior to be bounded by the predictions
of the two models. However, the models reveal
another important relationship. The total fiber per
Fiber Cost per Subscriber

household and the geographic density—the x


factor—are directly related. While the x factor is
very specific to geographic locations, some useful
generalizations can be made. In more rural
environments with households separated by
greater distances, the total fiber per household is
greater than in urban environments. Figure 7
plots the relative total fiber per household versus
32 232 432 632 832 1032
serving area size for rural and urban Serving Area Size
environments. Linear Mesh
To determine the optimum serving area size for a
Figure 8. Fiber Cost per Subscriber Versus Serving Area Size
specific region, the fiber cost per subscriber
F$ /sub of a specific design must be calculated:

F$ TF$ • 1
Equipment Cost per Subscriber

sub = n τ (5)

Where:
TF$ = total fiber cost
n = number of households in serving area
τ = expected take rate

Using the models, the fiber cost per subscriber 32 132 232 332 432 532
can now be extrapolated for any serving area size, Serving Area Size
as shown in Figure 8.
Figure 9. Equipment Cost per Subscriber Versus Serving Area Size
An equipment cost per subscriber plotted against
serving area size can be derived from equipment
cost and calculated utilization (see Figure 9).

January 2006 • Volume 4, Number 1 69


The optimal serving area size is obtained by Linear Serving Area
finding the minimum total cost—fiber cost per From Figure 4, with the hub centered in the linear
subscriber + equipment cost per subscriber (see serving area, the total fiber required was
Figure 10). 120x fiber-feet or 5x fiber-feet per household. If
the hub is moved to the far right, as shown in
Prior to calculating optimum serving area size,
Figure 11, additional fiber is required.
excess fiber associated with HC must be
identified and removed. In this case, 20 fibers must now exit to the west of
the hub and traverse 10 lots. The total fiber
Hub Centricity required is 200x fiber-feet or 8.3x fiber-feet per
FTTH network planning, as described previously, household—a 66 percent increase.
is a two-step process: establish the service area Ideal Mesh Serving Area
boundaries, then locate the hub. There is a From Figure 6, with the hub centered in the ideal
general perception that hub location has little mesh serving area, the total fiber required was
impact on cost. As such, little effort is expended 1,440x fiber-feet or 10x fiber-feet per household. If
on selecting the least cost location. Locations at the hub moved to the extreme south end of the
the edge of the serving area—considered more serving area, as shown in Figure 12, additional
“convenient”—are often chosen. However, fiber is required.
serving areas with hubs located away from the
center require additional fiber strands to be In this case, 120 fibers exit the hub to the north as
engineered to gain full connectivity. To the main distribution cable and traverse 10 lots.
understand the impact, the earlier models are The subtending distribution cables remain the
revisited. same. The total fiber required is 1,920x fiber-feet
or 13.33x fiber-feet per household—a 33 percent
Common Equipment + Fiber Cost per Subscriber vs. Serving Area Size increase.
Common Equipment + Fiber Cost per Subscriber

Hub Centricity Metric


To quantify the degree to which the hub is
centered, an HC metric is created. HC is defined
as the ratio of the total number of fibers exiting
the hub less the greatest number of fibers exiting
Optimal Serving Area Size the hub in one direction to the greatest number of
fibers exiting in one direction.

In the Figure 4 example, HC = (24 – 12)/12 = 1.0.

In the Figure 11 example, HC = (24 – 20)/20 = 0.2.

In the Figure 6 example, HC = (144 – 72)/72 = 1.0.


32 132 232 332 432 532 In the Figure 12 example, HC = (144 – 120)/120 =
Serving Area Size
0.17.
Equipment + Fiber Linear Model
Equipment + Fiber Mesh Model An HC metric of 1 (or higher) indicates that the
hub is well-centered within the serving area. An
Figure 10. Total Cost per Subscriber Versus Serving Area Size HC metric below 1 indicates that the hub is not

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

Figure 11. Linear Serving Area with 24 Households with Hub Off-Center

70 Bechtel Telecommunications Technical Journal


X
X ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

12 Fiber Cable 12 Fiber Cable

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

12 Fiber Cable 12 Fiber Cable

120 Fiber Cable


ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

A very low HC metric


ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
indicates a
12 Fiber Cable 12 Fiber Cable significant amount
of excess fiber—over
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
50 percent in some
ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT
instances.
12 Fiber Cable 12 Fiber Cable
120 Fiber Cable

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

12 Fiber Cable 12 Fiber Cable

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT ONT

12 Fiber Cable 12 Fiber Cable

ONT ONT ONT ONT ONT ONT HUB ONT ONT ONT ONT ONT ONT

Figure 12. Ideal Mesh Serving Area with 144 Households with Hub Off-Center

centered; the lower the metric, the more the hub


is offset from center.
0.6
While the two models predict an increase in total 0.5
fiber per household, it is difficult to predict how
much excess fiber is present in a design with the 0.4
Waste

given HC metric. To understand the behavior of 0.3


the metric, 50 actual designs were reviewed. The
0.2
metric was calculated for each design. Where the
hub was not centered, a better, more central, hub 0.1
location was sought. The fiber required was 0.0
recalculated for each design with improved hub 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6
location. The difference in fiber requirements Centricity
between the two designs was classified as excess
fiber and is plotted against the HC metric of the
Figure 13. Excess Fiber Versus Hub Centricity
original design (see Figure 13).

The plot suggests a good correlation between the excess fiber—over 50 percent in some instances.
HC metric and the amount of excess fiber. A very The decision to find a more suitable hub location
low HC metric indicates a significant amount of or alter serving area boundaries to center the hub

January 2006 • Volume 4, Number 1 71


should be made after evaluating the potential REFERENCES
savings to be realized. Reworking a network [1] B. Perkins, “Optimal Splitter Placement in PONs,”
design in an urban area with an HC of 0.6 and a Bechtel Telecommunications Technical Journal, Vol. 2,
fiber cost of $30 per household may not be No. 2, September 2004, pp. 49–52.
warranted to realize a potential savings of $0 to $3
per household. In contrast, a design with an HC
of 0.1 and a fiber cost of $200 per household with BIOGRAPHY
Brian Perkins joined Bechtel
the potential to recover $100 per household most
Telecommunications in 2004
certainly warrants rework. with more than 15 years
of experience in the tele-
communications industry. As
senior director of technology—
CONCLUSIONS
optical networking, he
The two primary
he two primary causes of excessive fiber
causes of excessive
fiber deployment—
T deployment—creation of too large a serving
area and poor hub centering—originate in the
evaluates new products and
technologies and establishes
best practices for designing and
implementing fiber-optic networks in support of
creation of too large planning phase. Bechtel’s global projects.
a serving area Fiber costs of today’s FTTH networks can be Before joining Bechtel, Brian worked for Quantum
hundreds of dollars per household. Identifying Bridge Communications, where he was heavily
and poor hub involved in the deployment of PONs. Before Quantum
and removing excessive fiber can save tens to
centering— Bridge, he led a networks integration department
hundreds of dollars per household. at Lucent Technologies. Brian began his
originate in the telecommunications career with AT&T Bell
The amount of fiber per household is directly Laboratories. He has an MS and a BS in Electrical
planning phase.
proportional to the size of the serving area. Engineering from Worcester Polytechnic Institute.
Reducing a serving area by half reduces fiber per
household by 30 to 50 percent. Equipment
utilization is also affected by serving area size.
Fiber cost and equipment cost should be jointly
considered to arrive at an optimum serving area
size.

The network requires the least amount of fiber


when the hub is centered in the serving area.
When the hub is not centered, excess fiber is
required. An HC metric has been developed to
identify how well the hub is centered within the
serving area and to estimate the fiber impact. A
poorly centered hub may double the fiber per
household requirements. With an understanding
of the cost impact, an informed decision can be
made on possible adjustment of hub location or
serving area boundaries. 

72 Bechtel Telecommunications Technical Journal


THE IMPACTS OF ANTENNA AZIMUTH
AND TILT INSTALLATION ACCURACY ON
UMTS NETWORK PERFORMANCE

Issue Date: January 2006

Abstract—Inconsistencies in setting up antenna azimuth and tilt during installation may reduce overall
network performance. However, the degree of quality degradation depends on the amount of the discrepancy
between the designed and installed parameters. The paper investigates the effect of these errors on UMTS
RF KPIs, including coverage, signal quality (Ec /Io), and soft-handoff areas. Two examples are studied that
include real measurement data. The studies show the effect of azimuth and tilt installation inaccuracies on
UMTS network quality.

INTRODUCTION coverage, the ratio of chip energy to interference


ntenna azimuth and downtilt are two (Ec/Io), and soft handoff areas. Two exercises
A important optimization parameters in
universal mobile telecommunications system
are defined. A variety of errors are introduced
for all antennas, and a simulation is performed
(UMTS) networks. Optimization of these two for each case. At the end, the results are
parameters can significantly improve system compared and analyzed. Consistent use of the
performance. However, new networks sometimes new antenna installation processes is promoted to
use inefficient optimization techniques and limit the impact of inconsistencies. Suggestions
implement default values. Furthermore, incon- are also provided on acceptable installation
sistencies in setting these parameters during error limits for use as a baseline to develop
installation vary the network coverage and implementation processes.
capacity. This paper presents the results of a
quantitative study that investigated the effect of
these parameters on UMTS network performance. ANTENNA AZIMUTH AND TILT SETTINGS AND
INCONSISTENCIES
Many techniques are used to measure antenna
ntenna azimuth and tilt errors (Figure 1) are
azimuth and tilt during installation. The accuracy
in setting up the azimuth and tilt depends on
A randomly distributed among the sites and
sectors. For the purpose of this paper, azimuth
the antenna installation processes and human
error is measured as the absolute difference
and instrumentation errors. Inefficient imple-
between the actual azimuth installed in the field
mentation and rigging processes may also cause
and the designed azimuth, as illustrated in
azimuth or tilt errors. The overall accuracy is
Figure 1a. In this definition, all azimuth errors
within ±10 degrees using most traditional
are positive. Tilt errors can be positive or
techniques. Usually, antenna azimuth errors are
negative—uptilt errors are considered negative,
independent for antennas belonging to different
while downtilt errors are considered positive, as
sectors. New processes and instruments may
shown in Figure 1b.
reduce these errors by several degrees, reduce
Esmael Dinan, PhD randomness in antenna orientations, and bring An antenna installation technician sets up the
ehdinan@bechtel.com errors consistently within the set tolerance. azimuth using a compass and alignment tool. On
the top of the tower, the technician can use
This paper investigates the effects of azimuth and
Aleksey A. Kurochkin several mechanisms to install the antenna.
tilt inaccuracies on network coverage and
However, the technician’s capabilities are
aakuroch@bechtel.com performance and considers the three main UMTS
restricted by uncomfortable climbing status,
network system quality parameters: service
limited time, limited available tools, and

© 2006 Bechtel Corporation. All rights reserved. 73


environmental factors. An example of an
ABBREVIATIONS, ACRONYMS, AND TERMS installation mechanism using landmarks and an
Ec/Io ratio of chip energy to optical alignment tool is shown in Figure 2. This
interference figure shows two pre-specified landmarks for the
GPS global positioning system technician to use from the top of the tower. In
KPI key performance indicator this example, the respective angles between
QoS quality of service the antenna aim point and Landmarks A and B
are set to 40 degrees (counterclockwise) and
RF radio frequency
–25 degrees (clockwise) from aim point to target.
RSCP received signal code power
Once the alignment is set, antenna tilt is adjusted
UMTS universal mobile
using a mechanical tilt bracket. Antenna tilt errors
telecommunications system
are caused by imperfect vertical adjustment of the
antenna support structure.
The accuracy in
setting up the Designed Tilt

azimuth and tilt


Negative
depends on Error
Positive
the antenna Error

installation
processes and
human and Positive Error
Field Azimuth
instrumentation
errors.
Designed Azimuth

(a) (b)

Figure 1. Antenna Azimuth and Tilt Errors


(a) Azimuth Error; (b) Tilt Error

Target A
True North

Optical
50° Actual Bearing
Alignment Tool
le
ng
tA
f fse
°O
40
Antenna Aim Point

-25 90° Specified Antenna


°O Azimuth
f fse
t An
gle
Target B

115° Actual Bearing


Antenna Support Structure

Figure 2. Example of an Antenna Azimuth Setup and Installation

74 Bechtel Telecommunications Technical Journal


Using the Six Sigma process improvement antenna. This paper shows that this scenario,
methodology, Bechtel initiated a task force to offered by recent installation techniques,
measure antenna installation accuracies [1]. The provides better network performance than the
implementation team analyzed the data related traditional method.
to repeatability and reproducibility of different
antenna azimuth adjustment mechanisms. The
results demonstrated up to 10 degrees of error in SIMULATION MODEL AND ASSUMPTIONS
simple global positioning system (GPS)-based his paper examines two example network
adjustment methods. More advanced mecha-
nisms can provide accuracies within 5 degrees
T clusters—one with 20 sites and one with
42 sites—that were simulated using planning and
with 95 percent probability of confidence. optimization tools. These clusters are shown in
Figure 3 illustrates another element used in the Figure 4. The simulation results help to analyze
study that is the subject of this paper: the the effect of azimuth and tilt settings on some
correlation of errors between sectors of the same aspects of network performance. The following
site. Scenario A illustrates the traditional tasks were included in the study:
technique of pointing antennas individually, • Select cluster areas, antenna types, default
leading to independent error in each sector. site configuration, and system parameters
This paper proposes using a technique that
offers a consistent error or the same error for • Develop simulation scenarios, objectives,
antennas belonging to the same site. In this and plans
technique, shown in Scenario B, the azimuths of • Develop project setup in the planning and
the second and third antennas are adjusted optimization tools and configure all the
relative to the azimuth of the first-installed parameters

Error = γ Error = ∝ Error = ∝ Error = ∝


Field Azimuth Field Azimuth

Designed Azimuth Designed Azimuth

Error = β Error = ∝

Scenario A Scenario B

Figure 3. Correlation of Errors Between Sectors of the Same Site


Scenario A – Traditional Azimuth Setting; Scenario B – Proposed Azimuth Setting

(a) (b)

Figure 4. Cluster Area Elevation Map


(a) 20 UMTS Sites – Traffic and Coverage Relevant Area: 17.17 km2
(b) 42 UMTS Sites – Traffic and Coverage Relevant Area: 26.14 km2

January 2006 • Volume 4, Number 1 75


• Optimize all antenna azimuths and tilts using In the next step, a series of simulations were
recursive optimization algorithms (This performed to investigate the effect of azimuth
design will be considered to be the baseline and tilt errors on network performance. For both
design.) Scenarios A and B, a variety of errors were
• Execute the simulation and record the introduced for all the antennas. These errors were
statistics for the above scenarios and error randomly distributed among the cells. For each
parameters error set, the simulation was executed repeatedly
until a steady, consistent result was achieved.
• Analyze the data and compile the final Then the performance statistics, including
graphs coverage, interference, and soft handoff area
A standard default site configuration was were calculated and compared. Performance
considered. Cell sites included in the test cluster statistics were recorded and then analyzed to
UMTS network had the following configuration parameters: produce the final graphs.
performance
• Antenna radiation center heights in the The exercises described above were performed
sensitivity to range of 20 to 25 meters multiple times, each using a different antenna
azimuth and tilt type. The results help provide an understanding
• Node B transmission power = 20 watts
error increases of the effect of antenna types on the performance
• Pilot power = 2 watts graphs and conclusions. Overall behavior is
as beamwidth
• Traffic load = 50 percent, uniform distribution consistent with antennas having the same
is reduced. horizontal and vertical beamwidth. UMTS
• Total antenna feeder loss = 3 dB
network performance sensitivity to azimuth and
• Frequency = 2,150 MHz (downlink) tilt error increases as beamwidth is reduced. The
Two example projects were created in the relationship between error type and beamwidth
planning and optimization tools using the above is as follows:
configuration parameters. Other UMTS system • Horizontal beamwidth ↔ Azimuth error
parameters were set to default values. In the
baseline design, antenna azimuth and tilt • Vertical beamwidth ↔ Tilt error
configurations were optimized for maximum Simulation results presented in this paper were
overall performance of the test cluster. Therefore, performed with antennas that have 65-degree
changes in these parameters would result in horizontal beamwidth and 7-degree vertical
reduced network performance. Antenna azimuth beamwidth, which is considered to be a typical
and tilt were optimized using an automated antenna type in most UMTS networks.
recursive optimization tool (Radioplan GmbH’s
Wireless Network System [WiNeS]). The tool
prediction parameters and path loss matrix were SIMULATION RESULTS
tuned using drive test data. For the baseline imulation results are presented in Figures 5, 6,
design, a simulation was performed, including
coverage, interference, and soft handoff analysis.
S and 7. Figure 5 considers a simple single site

Single Site Coverage Versus Antenna Azimuth Error Single Site Coverage Versus Antenna Tilt Error
100 105
RSCP < –86 dBm RSCP < –86 dBm

99.5 100

99
Normalized Coverage Area

Normalized Coverage Area

95
98.5
90
98
85
97.5
80
97

96.5 75

96 70
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error
(a) (b)

Figure 5. Network Performance Versus Antenna Azimuth and Tilt Installation Error in a Single-Site Configuration
(a) Azimuth Error; (b) Tilt Error

76 Bechtel Telecommunications Technical Journal


Coverage Gap Versus Antenna Azimuth Error Coverage Gap Versus Antenna Tilt Error
7 16
RSCP < –86 dBm, A RSCP < –86 dBm
RSCP < –86 dBm, B 14 RSCP < –92 dBm
6 RSCP < –92 dBm, A

Increase in Coverage Gap (Percentage)


Increase in Coverage Gap (Percentage)

RSCP < –92 dBm, B 12


5
10
4 8

3 6

4
2
2
1
0

0 –2
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error

(a) Area with RSCP < –86 dBm = 12.32%, Area with RSCP < –92 dBm = 4.80%

QoS Gap Versus Antenna Azimuth Error QoS Gap Versus Antenna Tilt Error
4.5 2.5
Ec /Io < –12 dB, A Ec /Io < –12 dB
4 Ec /Io < –12 dB, B
Increase in Service Quality Gap (Percentage)

Ec /Io < –13 dB


Increase in Service Quality Gap (Percentage)

Ec /Io < –13 dB, A 2


Ec /Io < –13 dB, B
3.5

3 1.5

2.5
1
2

1.5 0.5

1
0
0.5

0 –0.5
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error

(b) Area with Ec /Io < –12 dB = 4.0%, Area with Ec /Io < –13 dB = 1.01%

Soft Handoff Area Versus Antenna Azimuth Error Soft Handoff Area Versus Antenna Tilt Error
10 1
SHO Margin = 3 dB
9 SHO Margin = 5 dB, A SHO Margin = 5 dB
Increase in Soft Handoff Area (Percentage)

SHO Margin = 5 dB, B


Increase in Soft Handoff Area (Percentage)

0
SHO Margin = 3 dB, A
8
SHO Margin = 3 dB, B
7 –1

6
–2
5
–3
4

3 –4
2
–5
1

0 –6
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error

(c) Soft Handoff Area = 28.05% (Soft Handoff Margin = 5 dB),


Soft Handoff Area = 17.58% (Soft Handoff Margin = 3 dB)

Figure 6. Performance Graphs for 42-Site Cluster

January 2006 • Volume 4, Number 1 77


Coverage Gap Versus Antenna Azimuth Error Coverage Gap Versus Antenna Tilt Error
2 7
– RSCP < –86 dBm
RSCP < –86 dBm, A
1.8 RSCP < –92 dBm
RSCP < –86 dBm, B 6

Increase in Coverage Gap (Percentage)

Increase in Coverage Gap (Percentage)


RSCP < –92 dBm, A
1.6 RSCP < –92 dBm, B
5
1.4
4
1.2

1 3

0.8 2
0.6
1
0.4
0
0.2

0 –1
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error

(a) Area with RSCP < –86 dBm = 5.76%, Area with RSCP < –92 dBm = 2.0%

QoS Gap Versus Antenna Azimuth Error QoS Gap Versus Antenna Tilt Error
4.5 4
Ec /Io < –12 dB, A Ec /Io < –12 dB
4 3.5
Increase in Service Quality Gap (Percentage)

Increase in Service Quality Gap (Percentage)


Ec /Io < –12 dB, B Ec /Io < –13 dB
Ec /Io < –13 dB, A
3.5 Ec /Io < –13 dB, B
3
3
2.5
2.5
2
2
1.5
1.5
1
1

0.5 0.5

0 0
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error

(b) Area with Ec /Io < –12 dB = 4.42%, Area with Ec /Io < –13 dB = 0.94%

Soft Handoff Area Versus Antenna Azimuth Error Soft Handoff Area Versus Antenna Tilt Error
8 1
SHO Margin = 5 dB, A
SHO Margin = 5 dB, B SHO Margin = 3 dB
7 SHO Margin = 3 dB, A 0
Increase in Soft Handoff Area (Percentage)

SHO Margin = 5 dB
Increase in Soft Handoff Area (Percentage)

SHO Margin = 3 dB, B


6
–1
5
–2
4
–3
3

–4
2

1 –5

0 –6
0 5 10 15 20 25 30 –3 –2 –1 0 1 2 3
Average Antenna Azimuth Error Average Antenna Tilt Error

(c) Soft Handoff Area = 36.34% (Soft Handoff Margin = 5 dB),


Soft Handoff Area = 23.0% (Soft Handoff Margin = 3 dB)

Figure 7. Performance Graphs for 20-Site Cluster

78 Bechtel Telecommunications Technical Journal


configuration to provide an initial reference result Soft Handoff Area
for comparison purposes. In this example no Soft handoff area is defined as the area covered
interference or inter-cell soft handoff areas exist; by more than one sector belonging to different
only coverage plots are shown. Only Scenario A Node Bs. Two different settings were considered
was considered because in Scenario B all the site’s for soft handoff threshold. Performance graphs
antennas were rotated with the same azimuth are shown for soft handoff areas when the soft
error; therefore, overall coverage performance handoff margin is 3 dB and 5 dB. Figures 6c and
did not change. 7c show the variations in soft handoff areas when
there are inconsistencies in antenna azimuth and
As illustrated in Figure 5a, coverage shrinks
tilt settings. It is desirable to achieve the target
when azimuth error increases. Coverage is
soft handoff area recommended by the service
reduced by 4 percent when there is a 30-degree
operator when implementing a UMTS network.
error in azimuth setting. The coverage area has an
A smaller soft handoff area results in increased Azimuth error
almost inverse linear relationship with azimuth
call drop rate, and a higher soft handoff area in the range of
error. Figure 5b shows that coverage is also very
results in inefficient use of radio resources and
sensitive to downtilt errors. Coverage changes up 6 to 8 degrees
excessive interference.
to 29 percent when downtilt error varies in the is tolerable,
range of –3 to +3 degrees. This example shows a Careful investigation of the results of the graphs
depending on
system with no interference and inter-cell soft in Figures 6 and 7 leads to the following
handoff coverage. To study and capture real conclusions: the installation
network performance behavior, multiple sites scenario and initial
• Antenna Azimuth: Network performance
are needed. coverage area.
variations depend on antenna azimuth error
Figure 6 shows the results for a 20-site cluster, variations and the installation process.
and Figure 7 shows the results for a 42-site Overall degradation in Scenario B is 40 to 60
cluster. These provide realistic examples in percent less than in Scenario A. Therefore,
performance graphs. the same error in all sectors is preferable.
Azimuth error in the range of 6 to 8 degrees
Azimuth errors in the range of 0 to 30 degrees
is tolerable, depending on the installation
were considered for both Scenarios A and B. Tilt
scenario and initial coverage area.
errors varied between –3 and +3 degrees. The
Performance degrades noticeably if the error
areas are represented as the percentage of the
is greater than 10 degrees. Soft handoff
cluster area. The performance graphs are
areas are the least sensitive to azimuth
categorized by coverage area, coverage quality,
error. The coverage gap is 30 percent
and soft handoff area.
greater with 30 degrees of error in antenna
azimuth. A comparison of the coverage
Coverage Area graphs in Figures 6 and 7 shows that when
Coverage area is measured in reference to the coverage/quality gap is smaller, its
received signal code power (RSCP). Two sensitivity to error is higher.
definitions were considered for coverage gap: the
• Antenna Tilt: Both coverage and quality
area with less than –86 dBm RSCP and the area
performances are very sensitive to antenna
with less than –92 dBm RSCP. Figures 6a and 7a
tilt variations. There is up to a 100 percent
show the variations in coverage gaps when there
increase in coverage and quality gaps with
are inconsistencies in antenna azimuth and tilt
±3 degrees of tilt error. Soft handoff areas are
settings. A higher coverage percentage and
the least sensitive to tilt error. The graphs in
fewer coverage gaps is desirable when
Figures 6c and 7c show less than a 10 percent
implementing a UMTS network.
variation in soft handoff area with ±3 degrees
of tilt error.
Coverage Quality
Quality of service (QoS) or coverage quality is
measured by Ec/Io. Two definitions were SUMMARY AND CONCLUSIONS
considered for QoS gap: the area with Ec/Io less
oth the 20- and 42-site examples produce
than –12 dB and the area with Ec/Io less than
–13 dB. Figures 6b and 7b show the variations in
B consistent network performance behavior
and lead to the same conclusions. If equal errors
areas with QoS gaps when there are incon-
are introduced to cell site sectors, there is less
sistencies in antenna azimuth and tilt settings. A
network performance degradation (Scenario A),
higher QoS and fewer QoS gaps is desirable when
compared with random errors (Scenario B). For
implementing a UMTS network.

January 2006 • Volume 4, Number 1 79


practical purposes, azimuth error in the range BIOGRAPHIES
of 6 to 8 degrees is tolerable for network Esmael Dinan, a senior
performance. Performance degradation is RF technologist with Bechtel
noticeable if the azimuth error is greater than Telecommunications, has
10 degrees. Network performance is almost ten been instrumental in many
times more sensitive to antenna tilt variations, aspects of the business unit’s
compared with azimuth variations. Both research activities and
coverage and quality gaps increase by up to the Cingular RF engineering
100 percent with ±3 degrees of tilt error. project. He has designed
If possible, only one antenna should be oriented and engineered an RF
and the other antenna azimuths set in reference engineering data management system, developed
to that one (Scenario B). However, rooftop size Cingular project RF engineering processes and
Both coverage procedures, designed UMTS networks, and
and configuration may interfere with this
and quality gaps verified and tested Dupont cryogenic TMA
recommendation. If Scenario B installation
increase by up techniques can be applied to the site, simpler performance.
to 100 percent methods (instead of the more expensive methods) Before joining Bechtel in 2002, Dr. Dinan
with ±3 degrees have the same effect on network performance. was product manager for the GMPLS control
of tilt error. Considering these conclusions, the following plane of the RAYStar DWDM optical switch
UMTS network implementation standard can be at Movaz Networks, and lead network
Tilt setting
practically recommended for antenna azimuth architect at MCI. He has conducted research
tolerance of and development on access methods and
and tilt tolerances:
±0.5 degrees performance modeling of 3G wireless commu-
1. For the Scenario A technique: Azimuth nications and high-speed optical networks.
is recommended.
setting tolerance of ±6 degrees
Dr. Dinan received his PhD in Electrical
2. For the Scenario B technique: Azimuth Engineering from George Mason University,
setting tolerance of ±8 degrees Fairfax, Virginia, and is a registered Professional
3. For both scenarios: Tilt setting tolerance of Engineer in Maryland. He has authored more
±0.5 degrees than 25 conference papers and journal articles
The cluster with more sites experiences less and has filed a patent on a novel signaling
network quality degradation due to azimuth and mechanism developed for 3G cellular networks.
tilt errors. However, this could be a subject for He is a member of the Institute of Electrical and
further studies.  Electronics Engineers.

Aleksey Kurochkin is
currently senior director,
ACKNOWLEDGMENTS Site Development and
he authors would like to thank Lacy Kiser Engineering, in the Bechtel
T from the Bechtel Six Sigma Team and Jeff
Bryson from the Bechtel Construction Team for
Telecommunications
Technology group, a group
the valuable data and information they provided. that he originated. He is
Special thanks go to Radioplan GmbH for experienced in international
providing WiNeS software for this study. telecommunications
business management and network imple-
mentation. Before joining Bechtel, he worked
REFERENCES at Hughes Network Systems, where he built
an efficient multi-product team focused on
[1] Six Sigma PIP TI-81, Report and Data Analysis,
Bechtel Telecommunications, 2005.
RF planning and system engineering. His
engineering and marketing background has
[2] E. Dinan, “UMTS RF Network Optimization
Process,” Document Number 3DP-T04G-50009, given him both theoretical and hands-on
Bechtel Telecommunications Network Planning knowledge of most wireless technologies.
Department, 2005.
Aleksey has an MSEE/CS degree in Automatic
Telecommunications from Moscow Technical
University of Communications and Informatics,
Russia.

80 Bechtel Telecommunications Technical Journal


2.4 GHz Wi-FiTM PHASED ARRAY
ANTENNA EVALUATION

Issue Date: January 2006

Abstract—This paper examines the application, coverage, and security of a 2.4 GHz IEEE 802.11b (Wi-Fi TM)
phased array antenna system. Two antennas are installed in real-world scenarios. One antenna provides
outdoor-to-indoor and outdoor-to-outdoor coverage, and the other antenna provides outdoor-to-outdoor coverage
only. Throughput is measured using a variety of typical application methods. The results show both the
advantages and disadvantages of using a phased array antenna system.

INTRODUCTION transmitter and a single receiver, is provided by


merging advances in wireless communication Claude Shannon in the following formula [1]:
E technology and its application and the ever-
increasing demand for the availability of wireless I = log (1 + S/N) bits/s/Hz
high-bit-rate devices have resulted in numerous
high-tech innovations. Recently, phased array In the above formula, S is the received signal
antennas have been proposed to reduce the power and N is the noise power, and the
time and cost of providing high-bit-rate information is measured in bits per second per
wireless fidelity (Wi-Fi™) to indoor and outdoor hertz of transmission bandwidth available. Due
wireless users. to the maximum power limitation set by the
Federal Communications Commission (FCC) on
This paper examines the application, coverage,
an already crowded unlicensed spectrum,
and security of 2.4 GHz IEEE 802.11b (Wi-Fi)
Shannon’s formula does not seem to be useful in
phased array antennas. Two of these antennas are
increasing the information capacity. However,
installed in real-world scenarios on the roof of
multi-antenna arrays or smart antennas have
Bechtel Park Building 5 (BP5) in Frederick,
been introduced to increase the information
Maryland. One antenna covers Bechtel Park
capacity.
Building 2 (BP2) (outdoor to indoor) and the
business area behind it (outdoor to outdoor), and The simplest multi-antenna array—the “steered
the other antenna covers a large outdoor beam” or “phased” array—consists of many
residential area (outdoor to outdoor). individual antennas that each transmit the same
Throughput is measured using a variety of signal using different phase shifts, which are
typical application methods. arranged so that different signals interfere
constructively in one direction and destructively
This paper describes the theory, test architecture,
in every other direction. Transmitting and
and setup of these 2.4 GHz Wi-Fi phased
receiving antenna phase shifts can be steered
array antennas; provides extensive experimental
electronically.
results and a technical interpretation of
these results; summarizes the advantages and Beam steering increases the signal directed
disadvantages of using this technology; and toward an intended receiver and reduces the
provides practical suggestions for its use. reception of stray signals intended for other
targets. The receiver perceives these stray signals
Glenn A. Torshizi as noise. Overall, the relative power gain
THEORY obtained using an array with m antennas is
gtorshiz@bechtel.com
nformation capacity I, which limits the amount roughly a factor of m [2].
I of information that can be sent between a single

© 2006 Bechtel Corporation. All rights reserved. 81


antennas on the roof of BP5. BP2, a typical three-
ABBREVIATIONS, ACRONYMS, AND TERMS story office building approximately 70 by 210 feet
AES Advanced Encryption Standard and 45 feet high, is positioned directly in front of
AGL above ground level and 600 feet from the first antenna, which is
installed on top of BP5 at a height of
BSS basic service set
approximately 55 feet above ground level (AGL)
EIRP effective isotropic radiated power with no downtilt. See Figure 2 for a photograph
FCC Federal Communications depicting a view of BP2 from Antenna 1 on BP5.
Commission
FIPS Federal Information Processing
Standard
IBSS independent BSS
Beam steering
LOS line of sight
increases the signal
PC personal computer
directed toward an
RF radio frequency
intended receiver
WEP wired equivalent privacy
and reduces the TM
Wi-Fi wireless fidelity
reception of stray
WLAN wireless local area network
signals intended for
other targets.
Figure 2. View of BP2 from Antenna 1 on BP5
TEST SETUP AND PROCEDURES
he phased array antenna used in this
T evaluation is a three-channel unlicensed (FCC
Part 15) wireless device. It allows point-to-point
The tools used to measure the radio frequency
(RF) environment and signal quality included
AirMagnet™ for iPaq, AirMagnet laptop, Cisco
packet communication to client devices through
Aironet™ 350 personal computer (PC) card, and
an integrated high gain, electronically steered
Antenex® YE240015 antenna.
transmitting and receiving antenna. The antenna
is configured in a 100-degree pattern horizontally The antenna uses a Wi-Fi switch that supports an
and a 12-degree pattern vertically. The antenna infrastructure basic service set (BSS) mode. The
pattern is divided into 13 focused areas. Channel network consists of one access point connected to
assignments and other settings for each area can the wired network infrastructure and a set of
be changed to optimize overall Wi-Fi operation wireless end stations. The independent basic
within the full antenna pattern. The antenna is service set (IBSS), in which wireless stations
approximately 43 by 36 by 7 inches and weighs intercommunicate directly without using an
80 pounds. Figure 1 shows the placement of two access point or connection to a wired network, is
not supported.

Wireless wall software [3] was used to provide


system security, since wired equivalent privacy
(WEP) is susceptible to wireless interception
and fraud [4, 5]. This software manages the
authentication process using an IEEE 802.11
framework and software-specific extensions to
prevent session hijacking or denial of service
attacks at any point. The software adheres
to Advanced Encryption Standard (AES) [6]
to protect sessions and networks. AES is a
Federal Information Processing Standard (FIPS
Publication 197) that specifies a cryptographic
algorithm to be used by US government
organizations to protect sensitive information.
The wireless wall software operates at Layer 2 of
the networking stack, providing the highest level
Figure 1. Placement of Antennas on BP5 Roof on of protection against radio-based attacks.
Bechtel Campus in Frederick, Maryland

82 Bechtel Telecommunications Technical Journal


The test setup goal was to map antenna range and
coverage in open outdoor environments and
inside BP2. The effective isotropic radiated power
(EIRP) level was 41 dBm.

EXPERIMENTAL RESULTS AND ANALYSIS


ignal, noise, speed, and throughput were
S measured at various locations inside, just
outside of, and on the roof of BP2. Similar
measurements were also taken at locations off
Figure 3. Signal Level Measurements
of the Bechtel campus.
The noise
measurements
Outdoor-to-Indoor Measurements
Data was collected from 11 locations on the third show an
and second floors of BP2 and from 10 locations on approximately
the first floor of BP2. Figure 3 shows the variation flat noise level
of the signal level as a function of the relative
that averages
position of the measurement points with respect
to the antenna. For each building floor, the –95 dBm.
measurement points were divided into three
groups:

• Group A: Points in the areas directly facing


the antenna Figure 4. Speed Measurements
• Group B: Points in the middle of the
building
• Group C: Points deeper inside the building

The measurements for each group were averaged


over the nodes in that group and then compared
to the averages of the other groups for each floor.
The noise measurements show an approximately
flat noise level that averages –95 dBm. Speed and
throughput measurements are summarized in
Figures 4 and 5, respectively.

The results show that good indoor coverage exists


at locations near the windows facing Antenna 1
Figure 5. Throughput Measurements
on the first, second, and third floors; however, the
signal degrades significantly away from the
windows toward the inside of the building.

Outdoor-to-Outdoor Measurements
Figure 6 shows the outdoor measurements for
Antenna 1 around BP2. Signal strength was
measured at several points in the front and back
and on the roof of BP2. The measurements show
that there is a good signal just outside of BP2 on
the ground facing Antenna 1 and on the roof of
BP2. However, the signal did not completely
penetrate through the building, resulting in little
or no coverage immediately behind BP2 at ground
level. At roof level, if the signal was blocked by
Figure 6. Outdoor Measurements for Antenna 1 Around BP2
the metal skirt around the air conditioning
system, the signal degraded noticeably.
Otherwise, the signal level was the same or better.

January 2006 • Volume 4, Number 1 83


Figure 7. Test Locations B, C, D, E, and F from Antenna 1 at Location A

Figure 8. Test Locations G, H, I, J, K, L, and M from Antenna 2 at Location A

Outdoor measurements for Antennas 1 and 2 • At other locations away from Antennas 1
were taken at several locations off of the Bechtel and 2, the signal was very weak. At several
campus. Figure 7 shows the outdoor-to-outdoor locations, the signal level was adequate,
measurement points from Antenna 1, and but connectivity to the test laptop could
Figure 8 shows the outdoor-to-outdoor points for not be established using just the wireless
Antenna 2. local area network (WLAN) adapter. When
an Antenex antenna was used, connectivity
The test locations were chosen so that line of
was established.
sight (LOS) or near LOS could be maintained.
To ensure that LOS existed, point-to-point • Many IEEE 802.11 applications are already
profiles were evaluated and examined for all being used around the test locations.
measurement points. Figure 9 is an example of • The Antenex antenna greatly enhanced the
one of these profiles. performance in low signal strength areas.
Figure 10 shows the measurement results • In marginal areas, the AES algorithm
from points B, C, and G. The following are degraded performance beyond use.
worth noting:

84 Bechtel Telecommunications Technical Journal


Phased array
Figure 9. Point-to-Point Profile from Antenna 2 at Location A to Test Location J
antennas are a
good choice for
TRADEMARKS
outdoor-to-outdoor
AirMagnet is a trademark of AirMagnet, Inc.
scenarios where
Aironet is a trademark of Aironet Wireless LOS can be
Communications, Inc.
maintained.
Antenex is a registered trademark of
Antenex, Inc.

Wi-Fi is a trademark of the Wireless Ethernet


Compatibility Alliance, Inc.

REFERENCES
[1] C.E. Shannon, “A Mathematical Theory of
Figure 10. Measurement Results from Points B, C, and G
Communication,” Bell System Technical Journal,
Vol. 27, pp. 379–423 and pp. 623–656, 1948.
[2] S.H. Simon, A.L. Moustakas, M. Stoytchev, and
CONCLUSIONS H. Safar, “Communication in a Disordered
World,” Physics Today online, 2001.
his paper examined the use of phased array
T antennas for outdoor-to-indoor and outdoor-
to-outdoor applications using extensive
[3] Cranite Systems, Inc., “Best Practices: Wireless
LAN Design, Implementation and Management,”
White Paper, September 2003.
measurements at several indoor and outdoor [4] W.A. Arbaugh, N. Shankar, Y.C.J. Wan, and
points. As the experimental results reveal, Z. Kan, “Your 802.11 Wireless Network Has
No Clothes,” IEEE Transactions on Wireless
using the system has both advantages and Communications, December 2002, Vol. 9, No. 6,
disadvantages; these are mainly application pp. 44–51.
specific. The system is conveniently easy and fast [5] T. Karygiannis and L. Owens, “Wireless Network
to install, and it appears to be the only choice for Security: 802.11, Bluetooth and Handheld
Devices,” NIST Special Publication 800-48,
applications such as a marina. For the outdoor-to- November 2002.
indoor scenarios, it is a good choice for narrow [6] D.J. Welch and S.D. Lathrop, “A Survey of
multistory buildings. The signal degrades toward 802.11a Wireless Security Threats and Security
the inside of wide buildings (such as BP2). Use Mechanisms,” Army G6 Technical Report
ITOC-TR-2003-101, 2003.
of repeaters is recommended to enhance the
signal in deep building areas that are not covered.
Phased array antennas are also a good choice for
outdoor-to-outdoor scenarios where LOS can be
maintained; however, since the frequency is
unlicensed, interference is an issue over an
extended range. When security is enhanced using
the AES algorithm, there is also a tradeoff
between the level of security in the system
and throughput. 

January 2006 • Volume 4, Number 1 85


BIOGRAPHY
Glenn Torshizi joined Bechtel
in 2001 and is currently a staff
scientist/engineer at Bechtel
Telecommunications’ Training,
Demonstration, and Research
(TDR) Laboratory in Frederick,
Maryland. Before relocating to
Frederick, he spent more than
3 years working as an RF design
engineer on the Bechtel AWS
GSM, GPRS, and UMTS Program in Philadelphia,
Pennsylvania, and as the market RF lead in Harrisburg,
Pennsylvania, and Hackensack, New Jersey.

Before joining Bechtel, Glenn was involved in planning,


optimizing, and integrating the Triton PCS TDMA
system in Norfolk, Virginia, and the Cricket
Communications CDMA system in Pittsburgh,
Pennsylvania. As a technical expert witness on
numerous planning and zoning boards, he was very
successful in obtaining final site approvals.

Glenn has a BS in Physics from Southwestern


Oklahoma State University and an MS in Physics from
the University of Tennessee, Knoxville. He has done
research in relativistic heavy ion physics at Oak Ridge
National Laboratory and Brookhaven National Laboratory.

86 Bechtel Telecommunications Technical Journal


BECHTEL
TELECOMMUNICATIONS
echtel Telecommunications, a unit of Bechtel
B Corporation, provides turnkey deployment services
that include network planning, RF design, engineering,
Telecommunications Leadership
and project and construction management for the
deployment of wireless, wireline, and other
TIMOTHY D. STATTON
telecommunication facilities worldwide. We are
Executive Vice President,
headquartered near Washington, DC, and have major Bechtel Corporation and
offices in London and Sydney, and numerous project President, Bechtel Telecommunications
offices worldwide.

Bechtel has performed telecommunications work for ROBERT CASAMENTO


over 35 years. We have successfully completed more Principal Vice President and
than 140 major telecommunications projects worldwide, General Manager
including more than 85,000 wireless sites; 23,000
kilometers of wireline fiber; and communication centers
such as POPs, NOCs, and data centers.
LARRY ALBEE
Bechtel Telecommunications is a global leader in Principal Vice President and
applying proven project and construction management Manager of Functional Operations
tools to geographically and technically complex
network builds. We deliver the essential elements of
project success while setting records for speed, JAMES A. IVANY
reliability, quality, and cost control. Principal Vice President and
Chief Financial Officer

J. S. (JAKE) MACLEOD
Principal Vice President and
Chief Technology Officer

LEE LUSHBAUGH
Principal Vice President and
General Manager, Americas

RICK ASTLEFORD
Principal Vice President and
General Manager, Europe, Africa,
Middle East, Asia, and Asia-Pacific

January 2006 • Volume 4, Number 1 87


Bechtel Corporation

echtel Corporation is a privately held


B company headquartered in San Francisco,
California, with approximately 40,000 employees,
more than 40 offices worldwide, and 2004
revenues of approximately $17.4 billion. Founded
in 1898, Bechtel has been under the leadership of
its founding family for four generations. Riley P.
TECHNOLOGY EVALUATION Bechtel, great-grandson of the founder, is the
current chairman and chief executive officer.
ey to Bechtel's deployment success is our
K technology expertise. To provide our
clients with complete turnkey deployment
Bechtel is one of the world's premier engineering,
construction, and project management companies.
services, we offer expert technology research
• The Financial Times recently listed Bechtel
and testing services. We have assembled a
as the “World’s Most Respected Company”
full-service Technology Group of leading
in the property and construction industries.
professionals that provides our customers
with neutral technology services and • Global Finance magazine named Bechtel
oversees our in-house telecommunications the “World’s Best Company” in the
laboratories: the Bechtel Wireless Test Bed construction sector for 5 years in a row.
(BWTB) and the Training, Demonstration
• Engineering News-Record ranked Bechtel as
and Research (TDR) Laboratory.
Number 1 on the list of the “Top 400
The BWTB, an over-the-air wireless test bed, Contractors” for 7 consecutive years.
enables us to analyze network products and
• Engineering News-Record also ranked
technologies for our clients in a real-world
Bechtel Number 1 Telecommunications
environment. It operates 24/7 and can be
Contractor from 2002 to 2004.
dynamically configured to meet specific
testing requirements without sacrificing the Because of our unparalleled industry recognition
client’s network. and financial stability, we are the partner of choice
The TDR Laboratory offers our clients for network deployment.
the ability to integrate equipment from
multiple vendors to identify interoperability
issues, monitor product performance, and
ensure compatibility with legacy systems,
thereby reducing the risk of imple-
menting new technologies and paving the
way for investment in network upgrades
or expansion.

88
Bechtel Offices

Abu Dhabi Houston Moscow Shanghai


Tel: (971-2) 631-8999 Tel: (1-713) 235-2000 Tel: (7-095) 961-3020 Tel: (86-21) 3305-4567
Fax: (971-2) 631-0091 Fax: (1-713) 960-9031 Fax: (7-095) 961-3015 Fax: (86-21) 6391-2999

Al Khobar, Saudi Arabia* Istanbul New Delhi Singapore


Tel: (966-3) 882-5288 Tel: (90-212) 278-2900 Tel: (94-124) 509-8000 Tel: (65) 6332-1220
Fax: (966-3) 882-5306 Fax: (90-212) 278-2913 Fax: (94-124) 234-3110 Fax: (65) 6332-1335

TURNKEY Bangkok Jakarta New York Taipei*


DEPLOYMENT Tel: (66-2) 545-7100 Tel: (62-21) 5291-6000 Tel: (1-212) 689-0100 Tel: (886-2) 2703-2880
SERVICES Fax: (66-2) 545-7777 Fax: (62-21) 5296-2278 Fax: (1-212) 689-4829 Fax: (886-2) 2703-2885

Network Planning Beijing Kuala Lumpur Oak Ridge, Tennessee Tokyo


and RF Tel: (86-10) 8453-9998 Tel: (603) 2078-2050 Tel: (1-865) 220-2000 Tel: (81-3) 3214-4481
Fax: (86-10) 8453-8303 Fax: (603) 2078-1950 Fax: (1-865) 220-2100 Fax: (81-3) 3214-2596
Engineering
Brisbane Lima Paris Toronto
Tel: (61-7) 3295-1400 Tel: (51-1) 445-8746 Tel: (33-1) 4720-5304 Tel: (1-905) 362-6600
Site Acquisition and
Fax: (61-7) 3295-1450 Fax: (51-1) 446-1255 Fax: (33-1) 4720-5506 Fax: (1-905) 362-6767
Right of Way

Buenos Aires London (Hammersmith Rd.) Rio de Janeiro Tysons Corner, Virginia
Procurement
Tel: (54-11) 4315-8000 Tel: (44-208) 846-5111 Tel: (55-21) 2579-2400 Tel: (1-703) 748-9300
and Contracting Fax: (54-11) 4315-0081 Fax: (44-208) 846-6940 Fax: (55-21) 2579-2413 Fax: (1-703) 748-9442

Construction and Cairo London (Pilgrim St.) Riyadh Warrington, England


Equipment Installation Tel: (20-2) 754-6763 Tel: (44-207) 651-7777 Tel: (966-1) 482-9051 Tel: (44-1925) 857-000
Fax: (20-2) 754-6804 Fax: (44-207) 651-7972 Fax: (966-1) 482-9563 Fax: (44-1925) 857-001
Integration and
Optimization Calgary Louisville San Diego Washington, D.C.
Tel: (1-403) 290-5000 Tel: (1-502) 244-2574 Tel: (1-619) 687-8700 Tel: (1-202) 828-5200
Fax: (1-403) 290-5050 Fax: (1-502) 244-2211 Fax: (1-619) 687-8787 Fax: (1-202) 785-2645

Frederick, Maryland Manila San Francisco *Joint-venture office

Tel: (1-301) 228-6000 Tel: (63-2) 751-1000 Tel: (1-415) 768-1234


Fax: (1-301) 228-2200 Fax: (63-2) 751-1005 Fax: (1-415) 768-9038

Glendale, Arizona Mexico City Santiago


Tel: (1-602) 368-1500 Tel: (52-55) 5201-3500 Tel: (56-2) 675-1000
Fax: (1-602) 368-1615 Fax: (52-55) 5202-1785 Fax: (56-2) 232-5208

Hong Kong Montreal Seoul


Tel: (852) 2970-7000 Tel: (1-514) 871-1711 Tel: (82-2) 512-2921
Fax: (852) 2840-1272 Fax: (1-514) 871-1392 Fax: (82-2) 512-2931
Bechtel Telecommunications
Technical Journal
An Independent Analysis of Current

Telecommunications Operational Issues January 2006


Global Headquarters
Bechtel Telecommunications Authors Contents
5295 Westview Drive
Frederick, Maryland 21703-8306

Bechtel Telecommunications Technical Journal


Tel: +1 301-228-7500 (Main) or v Foreword
Tel: +1 800-946-3632 (Toll Free)
vii Editorial
Fax: +1 301-694-6971
Timothy D. Statton and Jake MacLeod 1 Telecommunications Research and Development in the United States:
London A State of Crisis?
Bechtel Telecommunications
S. Rasoul Safavian, PhD 13 IP Multimedia Subsystems (IMS): A Standardized Approach to
245 Hammersmith Road
All-IP Converged Networks
Hammersmith
London W6 8DP Brian Coombe 37 A Survey of MEMS-Enabled Optical Devices – Applications and
United Kingdom Drivers for Deployment
Tel: +44 208-846-5093
Fax: +44 208-846-4938
Jungnam Yun, PhD 45 PHY/MAC Cross-Layer Issues in Mobile WiMAX
(POSDATA America R&D Center) and (Invited Paper)
Prof. Mohsen Kavehrad, PhD
(The Pennsylvania State University [CITCTR])
www.bechteltelecoms.com
Peter Moskal and Krishnamurthy Raghu 57 ANSI/TIA Standard 222 – Structural Standard for
Antenna Supporting Structures and Antennas:
A Comparison of Revisions F and G

Brian Perkins 65 Reducing the Amount of Fiber in Fiber-to-the-Home Networks

Esmael Dinan, PhD, and Aleksey A. Kurochkin 73 The Impacts of Antenna Azimuth and Tilt Installation Accuracy
on UMTS Network Performance

Glenn A. Torshizi 81 2.4 GHz Wi-FiTM Phased Array Antenna Evaluation

Volume 4, No. 1
2006

T ELECOMMUNICATIONS Volume 4 No. 1


T ELECOMMUNICATIONS
7211

You might also like