WIRELESS NETWORKS MULTIUSER DETECTION in CROSS-LAYER DESIGN Information Technology: Transmission, Processing, and Storage

Total Page:16

File Type:pdf, Size:1020Kb

WIRELESS NETWORKS MULTIUSER DETECTION in CROSS-LAYER DESIGN Information Technology: Transmission, Processing, and Storage WIRELESS NETWORKS MULTIUSER DETECTION IN CROSS-LAYER DESIGN Information Technology: Transmission, Processing, and Storage Series Editor: Jack Keil Wolf UniversiQ qf Californiil at Sun Diego Ln Jolln, Cnlifornia Editorial Board: Robert J. McEliece California Institute of Tecilnology Pnsndenn, Cdiforrzzn John Proakis Northeastem Universily Boston, Massach~mtts William H. Tranter Krginia Poljtechic Iiz~tctuteand State Universzty Blacksblirg, Virgznzn Communication System Design Using DSP Algorithms: With Laboratory Experiments for the TMS320C6701 and TMS320C6711 Steven A. Tretter Interference Avoidance Methods for Wireless Systems Dimitrie C. Popescu and Christopher Rose MIMO Signals and Systems Horst J. Bessai Performance Analysis and Modeling of Digital Transmission Systems William Turin Stochastic Image Processing Chee Sun Won and Robert M. Gray Wireless Communications Systems and Networks Mohsen Guizani Wireless Networks Multiuser Detection in Cross-Layer Design Cristina Comaniciu, Narayan B. Mandayam, and H. Vincent Poor A Continuat~onOrder Plan is ava~lablefor th~swries. A continuation order will bring dzli,ery of each new volt1111c ~mmed~atelyupon publication. Volumes are billed only upon actual sh~pment.For further into~inat~onplzaw contact the publ~sher. WIRELESS NETWORKS MULTIUSER DETECTION IN CROSS-LAYER DESIGN Cristina Comaniciu Stevens Inslitute of Techizology Hoboken, New Jersey Narayan B. Mandayam Rutgers University Piscataway, New Jersey H. Vincent Poor Prznceton University Princeton, New Jersey a- Springer Library of Congress Cataloging-in-Publication Data Cornaniciu, Cristina. Wireless networks: multiuser detection in cross-layer design1Cristina Cornaniciu, Narayan B. Mandayarn, H. Vincent Poor. p, cm. - (Information technology: transmission, processing, and storage) Includes bibliographical references and index. ISBN 0-387-23697-X 1. Wireless communication systems-Security measures. 2. Computer networks-Security nxeasures. 3. Denlodulation (Electronics) I. Mandayam, Narayan B. 11. Poor, H. Vincent. 111. Title. IV. Series ISSN: 1389-6938 ISBN-10: 0-387-23697-X ISBN-13: 978-0387-23697-1 Printed on acid-free paper, 02005 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage arid retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names. trademarks, service marks and similar terms. even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America To our families Contents List of Figures ix List of Tables xiii Preface xv Acknowledgments xvii 1. MULTIUSER DETECTION FOR WIRELESS NETWORKS 1 Future Generation Wireless Networks 1.1 Third Generation (3G) Cellular Networks 1.2 Wireless Application Protocol (WAP) 1.3 Network Costs for Data Transmission 1.4 Wireless Networks for Unlicensed Bands: WiFi, WiMax, HomeRF, Bluetooth and Infostations 1.5 Ad Hoc Networks 1.6 Cross-Layer Design 2 Introduction to Multiuser Receivers: Pros and Cons 2.1 Performance of Matched Filter Receivers 2.2 Multiuser Detectors 2.3 Performance of Blind Receivers 3 Multiuser Detection for Next Generation Wireless Networks 38 4 Multi-Rate Multiuser Detection 5 Information Theoretic Aspects: Spectral Efficiency 6 Multiuser Detection in Cross-Layer Design: Introductory Remarks and Book Outline 2. INTEGRATED RADIO RESOURCE ALLOCATION 1 Introduction to Radio Resource Allocation 2 Power Control 53 vii MULTIUSER DETECTION IN CROSS-LAYER DESIGN Integrated Power Control and Multiuser Detection 5 6 Access Control, Power Control and Multiuser Detection 62 Traffic-Aided LIultiuser Detection 7 1 Medium Access Control for Multipacket Reception Networks 76 Routing and Multiuser Detection in Ad Hoc Networks Admission Control: General Framework 3. ASYMPTOTIC CAPACITY FOR WIRELESS NETWORKS WITH MULTIUSER RECEIVERS 1 Effective Bandwidths and Capacity for Linear Receivers in Cellular Networks 1.1 General Formulation for Synchronous Networks 1.2 Partial Hybrid Networks 1.3 Optimal Signature Sequences 1.4 Multipath Fading Channels 1.5 Multi-Rate Networks 1.6 Asynchronous Networks 1.7 Imperfect Power Control 1.8 Blind and Group-Blind LIultiuser Receivers 2 Ad Hoc Networks 2.1 Asymptotic Capacity 2.2 Capacity for Finite Networks: Simulations 2.3 Implications for Admission Control 4. INTEGRATED ADMISSION CONTROL 1 Cellular Wireless Networks 2 Ad Hoc Networks 5. MULTIUSER DETECTION IK CROSS-LAYER DESIGN: PERSPECTIVES List of Acronyms References About the authors Index List of Figures Heterogeneous applications and ubiquitous cover- age in third generation cellular networks 3 Illustration of the infostation concept 10 Ad hoc network illustration 12 Adaptation at local layers in the OSI model 14 Cross-layer adaptation 15 Asynchronous CDMA: basic model 19 Power tradeoff regions for two users employing matched filter receivers 21 Power tradeoff regions for two users employing op- timal multiuser detection 24 A classification of multiuser receivers 2 5 Decorrelator implemented as a modified matched filter receiver 26 Power tradeoff regions for two users employing the decorrelating (solid line) and LMMSE (dash-dot line) receivers. 2 9 SIC block diagram 33 Power tradeoff regions for two users employing suc- cesive interference cancellation detector 33 Bit transmissioii for multirate systems 42 Virtual user equivalence in LRD multirate systems 42 HRD for multirate systems 43 Groupwise successive interference cancellation 44 Spectral efficiencies for 2 = lOdB (reprinted with permission from [Verd~and Shamai, 19991) 48 MULTIUSER DETECTION IhT CROSS-LAYER DESIGN Spectral efficiency for optimal KIN (reprinted with permission from [Verd~and Shamai, 19991) 49 Performance gains of integrated power control and multiuser detection (reprinted with permission from [Ulukus and Yates, 1998a1) 60 Integrated access control and receiver adaptation flowchart 69 Simulated convergence of the Perron-Frobenius eigen- value for the partial hybrid LMMSE implementation 70 Total data throughput capacity 70 Throughput per user for integrated access control and detection 7 1 Two stage multiuser detector (reprinted with per- mission from [Chen and Tong, 20011) 72 State tracker with matched filter receiver (reprinted with permission from [Chen and Tong, 20011) 73 Ergodic receiver operating characteristics (ROCs) (reprinted with permission from [Chen and Tong, 20011) 77 Packet error probability (reprinted with permission from [Chen and Tong, 20011) Throughput comparisons (reprinted with permis- sion from [Tong et al., 20011) Multiple transmissions from node k Joint power control and routing algorithm Distribution of powers versus node number: (a) initially, (b) after convergence Total transmission power Total energy consumption Equivalent queueing system (reprinted with per- mission from [Comaniciu and Poor, 2003al) Finite network simulations (reprinted with permis- sion from [Tse and Hanly, 19991) Effective interference for linear receivers Effective bandwiths for linear receivers Bidimensional capacity for the H - MMSE(P)sys- tem: (a) No power constraints (b) Minimum power transmission for both voice and data and power ra- tio fixed to K List of Fzgwes Bidimensional capacity for the H - D(P)system: (a) No power constraints (b) Minimum power trans- mission for both voice and data and power ratio fixed to K Partial hybrid LMMSE and decorrelator: simula- tions and asymptotic analysis Asymptotic capacity comparisons: MF versus LMMSE (reprinted with permission from [Comaniciu and Poor, 2003al) Capacity for multi-rate networks (reprinted with permission from [Yao et al., 20041) Capacity comparisons: GSIC with LMMSE versus GSIC with MF Capacity comparisons: GSIC with LMMSE versus hlC Effective bandwidth comparisons Saturation phenomenon for blind LMMSE receivers (reprinted with permission from [Zhang and Wang, 2002bl) SIR condition monotonicity (all curves are coinci- dent) (reprinted with permission from [Comaniciu and Poor, 2004~1) Physical layer capacity for given link probability constraint: synchronous transmission (reprinted with permission from [Comaniciu and Poor, 2004~1) Capacity comparisons for ad hoe networks with LMMSE receivers: synchronous versus asynchronous transmission (reprinted with permission from [Co- maniciu and Poor, 2004~1) Network diameter constraint (reprinted with per- mission from [Comaniciu and Poor, 2004~1) Link probability requirement (reprinted with per- mission from [Comaniciu and Poor, 2004~1) Ad hoe network capacity for delay sensitive traffic, D = 2 (reprinted with permission from [Comaniciu and Poor, 2004~1) Network throughput comparison (reprinted with permission from [Comaniciu and Poor, 2004~1) Optimization of network layer performance (reprinted with permission from [Comaniciu and Poor, 2003al) xii MULTIUSER DETECTION IN CROSS-LA YER DESIGN 4.2 Joint optimization across physical and network lay- ers (reprinted with permission from [Comaniciu and Poor, 2003al) 155 4.3 Threshold policy: blocking probability for class 2 (reprinted with permission from [Comaniciu and Poor, 2003al) 167 4.4 Multiple outgoing
Recommended publications
  • Book IG 1800 British Telecom Rev A.Book
    Notice to Users ©2003 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior written approval. 2WIRE PROVIDES NO WARRANTY WITH REGARD TO THIS MANUAL, THE SOFTWARE, OR OTHER INFORMATION CONTAINED HEREIN AND HEREBY EXPRESSLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE WITH REGARD TO THIS MANUAL, THE SOFTWARE, OR SUCH OTHER INFORMATION, IN NO EVENT SHALL 2WIRE, INC. BE LIABLE FOR ANY INCIDENTAL, CONSEQUENTIAL, OR SPECIAL DAMAGES, WHETHER BASED ON TORT, CONTRACT, OR OTHERWISE, ARISING OUT OF OR IN CONNECTION WITH THIS MANUAL, THE SOFTWARE, OR OTHER INFORMATION CONTAINED HEREIN OR THE USE THEREOF. 2Wire, Inc. reserves the right to make any modification to this manual or the information contained herein at any time without notice. The software described herein is governed by the terms of a separate user license agreement. Updates and additions to software may require an additional charge. Subscriptions to online service providers may require a fee and credit card information. Financial services may require prior arrangements with participating financial institutions. © British Telecommunications Plc 2002. BTopenworld and the BTopenworld orb are registered trademarks of British Telecommunications plc. British Telecommunications Plc registered office is at 81 Newgate Street, London EC1A 7AJ, registered in England No. 180000. ___________________________________________________________________________________________________________________________ Owner’s Record The serial number is located on the bottom of your Intelligent Gateway. Record the serial number in the space provided here and refer to it when you call Customer Care. Serial Number:__________________________ Safety Information • Use of an alternative power supply may damage the Intelligent Gateway, and will invalidate the approval that accompanies the Intelligent Gateway.
    [Show full text]
  • Mobile Devices 1 Development of Mobile Devices Berker Sönmez
    Mobile Devices 1 Development of Mobile Devices Berker Sönmez Faculty of Computer and Informatics 040100101 Oğuz Onur Kul Faculty of Computer and Informatics 040100105 Erdem Emekligil Faculty of Computer and Informatics 150110702 English 201 Sueda Albayrak December 22, 2011 Mobile Devices 2 Thesis: The hardware, software and connection technologies of mobile devices have developed greatly in the recent years. I. Hardware A. Inside Components 1. Chips 2. Batteries B. Outside Components 1. Cameras 2. Touch sense technologies II. Software A. New operating systems 1. iOS 2. Android B. Functional applications 1. Medical applications 2. Game applications III. Connection technologies A. New generation wireless technologies 1. 802.11(Wifi) and 802.16(WiMax) 2. Bluetooth, IrDA and HomeRF B. Advanced communication protocols 1. 3G technology 2. 4G (LTE) technology Mobile Devices 3 Technology is one of the fastest growing entities in science. Day after day, many improvements are being made, many ideas and inventions are being added to this entity. In the recent years, mobile technology gained importance since people have started living in different places and it is important to provide communication among them. Mobile devices are small, portable equipments that are used to carry out various tasks without being obliged to stay in a certain place. In the recent years, the most popular mobile devices have been mobile phones since they have become everyday objects which people carry in their pockets to wherever they travel. Using mobile devices, it is possible to view e-mails, play games, read books and complete many other tasks on the go. Therefore, the importance of mobile phones can not be overlooked.
    [Show full text]
  • Generating Signals for Wireless Lans, Part I: IEEE 802.11B
    Products: SMIQ, AMIQ, WinIQSIM™, SMIQK16, AMIQK16 Generating Signals for Wireless LANs, Part I: IEEE 802.11b With Wireless Local Area Networks (WLAN) already entering the mass markets, generating signals to WLAN standards will become increasingly important. Signal sources are needed in R&D (or production) to test RF modules, to evaluate basic receiver functionality or when new designs are being evolved. This Application Note focuses on the most commonly used standard IEEE 802.11b. Topics covered include technical aspects of the physical layers as well as details on configuring available signal sources. Subject to change – Gernot Bauer 8/2002 – 1GP49_1E Generating Signals for WLANs, Part I: 802.11b Contents 1 Introduction to Wireless LAN Systems......................................................................................3 2 The IEEE 802.11 and 11b Standards ..........................................................................................5 2.1 The 802.11 and 11b PHY ....................................................................................................6 2.1.1 Defined Transmission Methods.................................................................................6 2.1.1.1 Low Rate Modulation with Barker Spreading................................................7 2.1.1.2 High Rate CCK Modulation...........................................................................8 2.1.1.3 High Rate PBCC Modulation ........................................................................9 2.1.2 The PLCP..................................................................................................................9
    [Show full text]
  • WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK TECHNOLOGY: an OVERVIEW with OTHER BROADBAND WIRELESS NETWORKS
    WIRELESS FIDELITY (Wi-Fi) BROADBAND NETWORK TECHNOLOGY: AN OVERVIEW WITH OTHER BROADBAND WIRELESS NETWORKS by Chris A. Nwabueze, M. Eng., MNSE, MNIEEE, MIEE. Silas A. Akaneme, M. Eng., MNSE, MNIEEE, MIEEE Dept. of Electrical/Electronic Engineering, Anambra State University, Uli. E-mail: [email protected]. ABSTRACT Wireless Fidelity (Wi-Fi) broadband network technology has made tremendous impact in the growth of broadband wireless networks. There exists today several Wi-Fi access points that allow employees, partners and customers to access corporate data from almost anywhere and anytime. Wireless broadband networks are expected to grow in terms of broadband speed and coverage, while Wi-Fi can be integrated with WiMAX networks to provide Internet connectivity to mobile Wi-Fi users. This paper explores the Wi-Fi broadband wireless network technology, its uses, advantages and disadvantages, comparison with other broadband wireless networks and integration with WiMAX network. Key Words: Broadband, Wireless Fidelity (Wi-Fi), World Wide Interoperability for Microwave Access (WiMAX), IEEE 802.11 standards. 1.0 INTRODUCTION 802.11a [12]. Wi-Fi is owned by the Wi-Fi Wi-Fi stands for “Wireless Fidelity” and Alliance which is a consortium of separate was used to describe Wireless LAN and independent companies agreeing to a (WLAN) products that are based on the set common interoperable products based IEEE 802.11 standards. Wi-Fi uses both on the family of IEEE 802.11 standards single carrier direct-sequence spread [11]. spectrum radio technology and multi-carrier Wi-Fi certifies products via a set of OFDM (Orthogonal Frequency Division established test procedures to establish Multiplexing) radio technology.
    [Show full text]
  • Wireless Networks Book
    Wireless Networks Local and Ad Hoc Networks Ivan Marsic Department of Electrical and Computer Engineering and the CAIP Center Rutgers University Contents CHAPTER 1................................................................................................... INTRODUCTION ..............................................................................................................................1 1.1 Summary and Bibliographical Notes................................................................................................... 6 CHAPTER 2 THE RADIO CHANNEL.......................................................................1 2.1 Introduction........................................................................................................................................ 1 2.1.1 Decibels and Signal Strength ............................................................................................................ 4 2.2 Channel Implementation..................................................................................................................... 5 2.2.1 Transmission Rate ........................................................................................................................... 5 2.2.2 Symbols To Signals.......................................................................................................................... 6 2.2.3 Modulation ...................................................................................................................................... 6 2.2.4 Noise and Error
    [Show full text]
  • Short-Range Wireless Communication This Page Intentionally Left Blank Short-Range Wireless Communication
    Short-range Wireless Communication This page intentionally left blank Short-range Wireless Communication Alan Bensky Newnes is an imprint of Elsevier The Boulevard, Langford Lane, Kidlington, Oxford OX5 1GB, United Kingdom 50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States © 2019 Elsevier Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
    [Show full text]
  • Development of Wireless Local Area Networks in OECD Countries”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2003-04-16), “Development of Wireless Local Area Networks in OECD Countries”, OECD Digital Economy Papers, No. 71, OECD Publishing, Paris. http://dx.doi.org/10.1787/233145088433 OECD Digital Economy Papers No. 71 Development of Wireless Local Area Networks in OECD Countries OECD Unclassified DSTI/ICCP/TISP(2002)10/FINAL Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 16-Apr-2003 ___________________________________________________________________________________________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Unclassified DSTI/ICCP/TISP(2002)10/FINAL Cancels & replaces the same document of 14 April 2003 Working Party on Telecommunication and Information Services Policies DEVELOPMENT OF WIRELESS LOCAL AREA NETWORKS IN OECD COUNTRIES English - Or. English JT00142903 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/ICCP/TISP(2002)10/FINAL FOREWORD In December 2002, this report was presented to the Working Party on Telecommunications and Information Services Policy (TISP). It was recommended to be made public by the Committee for Information, Computer and Communications Policy in March 2003. The report was prepared by Mr. Atsushi Umino of the OECD's Directorate for Science, Technology and Industry. It is published on the responsibility of the Secretary-General of the OECD. Copyright OECD, 2003 Applications for permission to reproduce or translate all or part of this material should be made to: Head of Publications Service, OECD, 2 rue André-Pascal, 75775 Paris Cedex 16, France. 2 DSTI/ICCP/TISP(2002)10/FINAL TABLE OF CONTENTS MAIN POINTS............................................................................................................................................
    [Show full text]
  • Broadband Wireless, Integrated Services, and Their Application to Intelligent Transportation Systems
    M PRODUCT MP 2000-044 Broadband Wireless, Integrated Services, and Their Application to Intelligent Transportation Systems June 2000 Keith Biesecker s Center for Telecommunications and Advanced Technology McLean, Virginia M PRODUCT MP 2000-044 Broadband Wireless, Integrated Services, and Their Application to Intelligent Transportation Systems June 2000 Keith Biesecker Sponsors: Federal Highway Administration Contract No.: DTFH61-99-C-00001 Dept. No.: Q020/Q060 Project No.: 0900610F-01 s Center for Telecommunications and Advanced Technology McLean, Virginia ABSTRACT This paper introduces some of the newer broadband wireless communications alternatives and describes how they could be used to provide high-speed connections between fixed, transportable, and mobile facilities. We also describe the new integrated service technologies – devices used to bundle voice, data, and video services for transmission over a single link. In this case, it’s a broadband wireless link. Together, the new broadband wireless and integrated service technologies can be used to provide efficient, cost effective, and flexible multi-service provisioning. We introduce this concept and discuss its potential for Intelligent Transportation Systems (ITS). Suggested Keywords: broadband, wireless, integrated service platform, multi-service access device (MSAD), integrated access device (IAD), Intelligent Transportation Systems (ITS) i ii ACKNOWLEDGMENTS The author wishes to thank Mr. Louis Ruffino and Mr. Carl Kain for their technical and editorial contributions to this effort. iii iv TABLE OF CONTENTS SECTION PAGE 1. Introduction 1-1 1.1 Purpose 1-1 1.2 Scope 1-1 1.3 Organization 1-2 2. The Concept 2-1 2.1 Integrated Services 2-1 2.2 Broadband Wireless 2-2 2.3 Applying Broadband Wireless to the Integrated Service Platform 2-4 3.
    [Show full text]
  • Security in Mobile and Wireless Networks
    Security in Mobile and Wireless Networks APRICOT Tutorial Perth Australia 27 February, 2006 Ray Hunt, Associate Professor Dept. of Computer Science and Software Engineering University of Canterbury, New Zealand 1 Security Issues in Wireless and Mobile IP Networks Section 1 - Wireless & Mobile IP Architecture, Standards, (Inter)operability, Developments Section 2 - Cryptographic Tools for Wireless Network Security Section 3 - Security Architectures and Protocols in Wireless LANs Section 4 - Security Architectures and Protocols in 3G Mobile Networks 2 1 Wireless & Mobile IP Architecture, Standards, (Inter)operability, Developments (Section 1) 3 Outline Wireless LANs – Standards, Architecture IP roaming Wireless security and authentication QoS (Quality of Service) Integration of 3G and WLANs New Developments by IEEE - Broadband Wireless Access 4 2 Wireless IP Networking Revolution Past Present Future Paradigms Demand Solutions Local Area WLAN - On campus Unlicensed Bands Fixed - At home Data • Personal mobility Mobility • High data rate Combined with • Incremental infrastructure Network “handoff” Connectivity (Data + Voice) “3G” WCDMA Wide Area Mobile Licensed Bands - On the road Voice • Full mobility • Modest data rate • All new infrastructure 5 Recent WLAN Activity …. IEEE and ETSI involved in standardisation WLAN standards are converging to achieve interoperability Integration of WLAN and 3G appearing Wireless IP momentum - rapid growth in requirements for mobile IP access WLAN offers good mobile solution for indoor IP access
    [Show full text]
  • Wifi for the Enterprise
    00_200223_FM/Muller 2/11/03 2:11 PM Page iii WiFi for the Enterprise Nathan J. Muller McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto 00_200223_FM/Muller 2/11/03 2:11 PM Page iv Cataloging-in-Publication Data is on file with the Library of Congress. Copyright © 2003 by The McGraw-Hill Companies, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a data base or retrieval system, without the prior written permission of the publisher. 1234567890 DOC/DOC 09876543 ISBN 0-07-141252-2 The sponsoring editor for this book was Steve Chapman and the production supervisor was Pamela A. Pelton. It was set in Century Schoolbook by MacAllister Publishing Services, LLC. Printed and bound by RR Donnelley. This book is printed on recycled, acid-free paper containing a minimum of 50 percent recycled de-inked fiber. McGraw-Hill books are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please write to the Director of Special Sales, Professional Publishing, McGraw-Hill, Two Penn Plaza, New York, NY 10121-2298. Or contact your local bookstore. Information contained in this work has been obtained by The McGraw-Hill Companies, Inc. (“McGraw-Hill”) from sources believed to be reliable. However, neither McGraw-Hill nor its authors guarantee the accuracy or completeness of any information published herein, and neither McGraw-Hill nor its authors shall be responsible for any errors, omissions, or damages arising out of use of this information.
    [Show full text]
  • Home Networking: Connectivity in the Last 100 Yards
    SPLT004 – August 2001 White Paper Home Networking: Connectivity in the last—100 Yards Remi El-Ouazzane, Business and Marketing Manager Matt Kurtz, Product Marketing Manager Once the primary domain of businesses and other large organizations, broadband technology is now fundamentally and rapidly changing the way consumers utilize home computers. Technologies such as T1, frame relay and Asynchronous Transfer Mode (ATM) have long enhanced the business user’s Internet experience by enabling fast web downloads and rich interactive services made possible by high-throughput data connections. Now, high-speed technologies such as digital subscriber line (DSL) and cable modems are quickly making the broadband experience a pervasive reality in the home as well. The broadband market is experiencing explosive growth, as home users have come to expect the same lightning-fast download times and interactive content they enjoy at their place of work. From a total subscriber base of 3.8 million in 1999, for all broadband technologies combined, industry analyst In-Stat predicts a dramatic growth curve for this sector. The firm predicts broadband subscribers will increase from 21.5 million in 2001 to 35 million in 2002. By 2005, In-Stat forecasts there will be nearly 84 million broadband users worldwide. Clearly, a remarkably enhanced user experience is quickly making broadband a must-have service for home users. Fast Internet access is currently the overwhelming motivation for new subscribers. Other existing and new applications that drive the need for high-bandwidth connections will also speed the rapid growth of broadband technologies. Some of these include streaming media, video conferencing, IP telephony, e-commerce, webcasting and multi- player gaming.
    [Show full text]
  • Wireless Network Design & Architecture
    Wireless Network Design & Architecture Matt Peterson Bay Area Wireless Users Group Rajendra Poudel Nepal Wireless/ENRD This afternoon’s agenda • Our backgrounds/CV • An overview of WLAN/802.11 concepts • Ecosystem / industry users • Knowledge to apply to these models • Install “lessons learned from the field” • Resources • More Q&A Matt’s CV • PlayaNET - Intranet in desert • BAWUG - Founder of educational WLAN non- profit • Independent Consultant – International hotspot firm – National WISP – Other small firms • Authority Figure – USA Today, Wall St Journal, Wired, etc Bay Area Wireless Users Group • Est. September 2000 • Founded by IP and RF clued folks to educate the masses • Bi-monthly meetings, active 2000+ subscriber mailing list • Model as non-profit, currently in-formal • Affiliated with FreeNetworks.org; an umbrella organization of CWN's (Community Wireless Networks) • “We don't build networks” - supply the knowledge, roll your own Rajendra’s CV • ENRD - Research organization • Nepal Wireless - Team member (Voluenter based Project) • Collage of Information & Technology - Lecturer • CCNA, CCNP & MCSE Afternoon modeled after BoF • No sales pitch – PLEASE be interactive, interruptions are welcomed (and encouraged!) – We’re not experts, technology is constantly changing (not a day job’s); here to share experiences • Not today – Bluetooth, HomeRF, HiperLAN, 802.16 “WiMAX” (will briefly touch base) • What would you like to learn today? – Name, home country, goals – We’ll attempt to “tune” the workshop towards the audience Industry Overview • Starting to mature (vs VoIP); plenty of room for innovation (better routing protocols, antenna “magic”, etc) • Extremely well adopted technology, some claim faster adoption rate then 100Mb switched Ethernet • WiFi = trade org to certify equipment compatibility (enforce the IEEE standards); also a brand-name (a.k.a.
    [Show full text]