Documente Academic
Documente Profesional
Documente Cultură
net/publication/3227750
CITATIONS READS
133 1,159
2 authors, including:
James Caffery
57 PUBLICATIONS 3,171 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by James Caffery on 10 November 2015.
OCTOBER/NOVEMBER 2004 5
Frequency selective fading as experi- Simulated Power Line Channel nel estimation. In general, bit loading
enced by the power line channel algorithms may be classified as margin-
10
severely impairs the capacity of FSK for adaptive or rate-adaptive algorithms.
0
data rates beyond a few kilobytes per In margin-adaptive algorithms, the
SNR in dB
−10
second. A high degree of error control −20
objective is to minimize the bit error
coding would be needed. Combined −30 rate while keeping the data transmis-
with the low spectral efficiency of FSK, −40 sion rate constant. For rate-adaptive
it would limit the data rate achieved. −50 algorithms, the data rate is maximized
For CDMA, the signal of each user is −60
200
while maintaining a constant error rate.
spread using a spreading code at the 150
In PLC standards, rate-adaptive algo-
transmitter. It is recovered at the receiv- Tim 100 1000
1200
rithms have been adopted. This is
e 50
600
800
les 400
er by de-spreading using the same cy Samp because the power line channel can be
0 0 200
code. CDMA provides robustness Frequen z to 22mhz too harsh at times to guarantee a con-
0 kh
From 20
against narrowband noise and other Fig. 4 Simulated Power line channel model stant data rate that the margin-adaptive
forms of interference. Therefore, it algorithms required.
seems to be an attractive candidate for of parallel channels. The data in each Channel coding plays an important
PLC. However, in CDMA systems, the channel is applied to a modulator, such role for maintaining a constant error
processing gain needs to be high to that for N channels there are N modula- rate. The input bitstream is encoded
effectively counter narrowband noise tors whose carrier frequencies are f0, using Reed-Solomon coding followed
and interference from other users. With f1,…., fN-1. These N carriers are referred by interleaving and trellis coded modu-
low processing gain, the robustness to as sub-carriers in the literature. This lation. The complete functional block
against interference and noise is lost is because they split the work of a sin- diagram of the DMT transceiver as
and the signal quality may deteriorate gle carrier amongst themselves. This implemented on the power line physi-
to unacceptable levels for all users. The scheme offers various advantages. cal layer is shown in Fig. 6.
processing gain (PG) of a CDMA system With OFDM, since the data is split
may be expressed as: among N sub-carriers, each sub-carrier The PLC Medium Access
carries 1/Nth of the original data rate. This Control (MAC) Layer
Bt
PG = Bd (1) means that the symbol duration for each A MAC protocol specifies a resource
sub-carrier increases N times. Moreover, sharing strategy: the access of multiple
Where, B+ denotes the transmission a part of the end of a symbol is append- users to the network transmission
bandwidth and B d denotes the data ed at its beginning in what forms the capacity based on a fixed resource shar-
bandwidth. It is quite evident that for “cyclic prefix.” The length of the cyclic ing protocol. Generally, there are two
high data rates and for a reasonably prefix is made longer than the longest categories of access schemes:
high PG, the transmission bandwidth B+ delay path. This solves the inter-symbol • Fixed access
would have to be very high. interference (ISI) problem to a large • Dynamic access
Unfortunately, this is where the prob- extent. As a result, a simple linear equal- Transmissions using fixed access
lem lies. The fissured spectrum for izer may be enough to remove the ISI. schemes assign to each user a predeter-
transmission—due to frequency selec- Another significant advantage of mined or fixed channel capacity irre-
tive fading—does not provide large OFDM, while transmitting over a fre- spective of whether the user needs to
contiguous bands for data transmission. quency selective fading channel, is that transmit data at that time. Such schemes
Hence, the main advantage of CDMA is allows us to adopt adaptive schemes are not suitable for bursty traffic such as
cannot be fully exploited for PLC. so we can avoid transmitting at fre- data transmission that is provided by
Since the symbol time is inversely quencies in deep fade. Sub-carriers in PLC. Hence, dynamic access is provided
proportional to the data rate, as the which the signal to noise ratio (SNR) for power line communication.
data rate increases the symbol duration drops below a certain threshold are Dynamic access protocols may be clas-
correspondingly decreases. While trans- switched off. Sub-carriers with high SNR sified into two separate categories:
mitting over the power line channel at are made to carry more bits; i.e., they 1. Contention based protocols: colli-
high data rates, the symbol duration is are modulated to a higher-level constel- sions occur.
so small that delayed versions of one lation. This is known as a bit loading 2. Arbitration protocols: collision
symbol—due to multi-paths—gets technique and is illustrated in Fig. 5. free.
smeared over a large number of other The application of OFDM with bit load- Contention protocols may not be
symbols. This makes the detection ing for a wired channel such as the able to guarantee a quality of service
process complicated since it requires power line is widely known as Discrete (QOS), especially for time critical appli-
complex equalization techniques to Multi-tone (DMT). cations, since collisions might occur
counter the inter-symbol interference Channel estimation is necessary for and data might have to be retransmit-
(ISI). Despite equalization at the receiv- the bit loading technique to work. The ted. Arbitration based protocols are
er, the bit error rate may still be unac- transmitter has to know the noise vari- more capable of guaranteeing a certain
ceptably high for high data rates over ance and the attenuation being experi- QOS. However, contention based pro-
harsh channels with multi-paths. enced by each sub-carrier. DMT trans- tocols may actually provide higher data
In the case of OFDM modulation, ceivers use pilot signals for channel rates in applications which do not have
the serial data of a traffic channel is estimation. For time varying channels stringent QOS requirements (e.g.,
passed through a serial-to-parallel con- such as the PLC, the pilot signal is Internet applications). This is because
verter. It splits the data into a number repeated periodically for dynamic chan- they require much less overhead com-
6 IEEE POTENTIALS
pared to arbitration protocols (polling, due to the PLC’s hostile channel charac- The European Home System (EHS)
reservation, token passing). teristics. Though this means more over- consortium <www.ehsa.com> defines a
Polling and Aloha are the two most head, overall data rate is improved bus and a communication protocol for
studied protocols for medium access. since it means less retransmission. communication between appliances
Polling is a primary/secondary access CSMA/CA is the chosen medium access and the central processing unit in the
method in which the primary station protocol for the Homeplug standard home. The EHS specification, EHS 1.3,
asks the secondary station if it has any that has been developed for in-home covers several medium types to trans-
data to send. Aloha is a random access networking using power lines. port control data, power and informa-
protocol in which a user accesses a tion. All share the logical link control
channel as soon as it has data to send. Perspective/applications/ (LLC) sublayer. For the moment, the
The transmitter waits for an acknowl- standards supported medium types are Power
edgement from the receiver for a ran- The PLC market is expanding Line Carrier (230 Vac + data, 2.4 kbps,
dom period of time. It retransmits if it dynamically. Some applications and CSMA/ack, topology free) and Low
does not receive one. The main disad- research developments are reported in Speed Twisted Pair (15 VDC, 48 kbps,
vantage of Aloha is the low throughput the International Symposium for Power- CSMA/CA, topology free).
as the load increases as well as the lack line Communications and its One major issue under considerable
of QOS. Applications (ISPLC) conferences each debate for the PLC local loop distribution
Arbitration based polling can handle year. Advanced energy services include network is the radiation emission of
heavy traffic and does provide QOS applications such as automatic meter power lines and its effect on other fre-
guarantees. However, polling can be reading, programmable controllers and quency bands for communication.
inefficient under light or highly asym- demand supply management. Another area of concern is security and
metric traffic patterns or when polling Traditionally, this application area has privacy. The networking signals generated
lists need to be updated frequently as been pushed by energy companies and in one home may show up (albeit attenu-
network terminals are added or related manufacturers. PLC networking ated) on the power line in another home.
removed. Similarly, token passing in the home would be serving two This creates urgent concerns about priva-
schemes (e.g., token ring, token bus) goals: 1) providing a local home net- cy similar to those encountered in wireless
are efficient under heavy symmetric work with the advantages of the power systems. Right now, the Homeplug stan-
loads. However, they can be expensive line, and 2) combining access and in- dard uses Data Encryption Standard (DES)
to implement and serious problems can home network capabilities for service encryption technology as a solution.
arise with lost tokens on noisy unreli- and system integration. There are sever-
able channels such as power lines. al applications for a PLC network in the Bt
H(f)
Carrier Sense Multiple Access home: shared Internet, printers, files,
(CSMA) with overload detection has home control, games, distributed video
been proposed for PLC. CSMA is a con- and remote monitoring/security.
Bits/Sub-Carrier
tention based access method in which The key asset here is “no new
each station listens to the line before wires.” In the United States, the
transmitting data. CSMA is efficient Homeplug Powerline Alliance was
under light to medium traffic loads and founded by Cogency, Conexant, Enikia,
for many low-duty-cycle bursty termi- Intellon, Netgear, RadioShack Co.,
nals (e.g. Internet browsing). The pri- Sharp, Panasonic, Cisco systems,
mary advantage of CSMA is its low Motorola and Texas Instruments, togeth-
implementation cost. This is due to the er with several other participants and f1 f2 f3 fN f
fact that it is the dominant technique in adopters <http://www.homeplug.org>. Frequency
today’s wired data networks. The Homeplug Powerline Alliance is a
Collision detection (CSMA/CD) sens- non-profit corporation formed to pro- Bt
es the channel for a collision after trans- vide a forum for creating open specifica-
mitting. When it senses a collision, it tions for high-speed home power line
waits a random amount of time before networking products and services.
Bits/Sub-Carrier
OCTOBER/NOVEMBER 2004 7
RF TX DAC
IFFT (TX)
FFT (RX)
Serial to Remove
QAM Channel Parallel to Parallel Cyclic
Decosing Deinterleaving
Demapping Correction Serial Extension
Timing &
Fig. 6 The functional block diagram of DMT as implemented in Frequency
RF RX ADC
the PLC physical layer using the Homeplug standard Synchronization
8 IEEE POTENTIALS
The Private Branch eXchange (also • Call forwarding on absence less technology. This can be a cordless
called the PBX or the Private Business • Call forwarding on busy system, a small Wireless Local Loop
Exchange) is a telephone-switching cen- • Call transfer (WLL), Wireless LAN or some cellular
ter that is owned by a private business. • Music on hold technology. The goal is to provide con-
This switching center is exclusive to one • Automatic ring back venience to the workers at a corporate
company rather than owned by a com- • Night service site, so as to achieve in-house mobility
mon carrier or telephone company. • Call distribution (Automatic and continuous attachment
Even so, companies still need their Call Distribution, fixed sequences) among co-workers and clients
employees to be able call each other at The extension interface can be:
Azim A. Samjani, with a unique and constant
different locations (if need be), call out- • Proprietary: the manufac- Rahul R. Shetty contact number. This set up
side phone numbers (the public tele- turer has defined a protocol. and provides a good amount of
phone network or PSTN), and receive One can only connect the man- Rohit George scalability, since there is no
calls from the outside. Mathew hindrance of laying extra
PBXs are distinguished from smaller cables. Also, users can be
“key systems” by the fact that external added without any major modification.
lines are not normally indicated and
selectable from an individual extension. ©DIGITALVISION COMPOSITE: MKC
10 IEEE POTENTIALS
technologies. So it can work on WLAN, width of 11 Mbps and can support data the external network
which offers a bandwidth of 11 Mbps. rates of 5.5, 2 and 1 Mbps which is still 3. Call setup—setting up the calls to
• These systems are more secure. acceptable to the 3G system. and from the cell phone
• 3G supports IP and, hence, can The main components in this archi- Association: This is a process by
interface with other network devices. tecture (see Fig. 2) are the 3G which the cell phone gets associated
Thus, the standard 3G protocols are switch/PBX, the LAN Server, the WLAN with the Corporate Network (CN). The
implemented with no modifications. We and the 3G devices. AP has two channels of communication.
connect our Mobile Terminal Switching 3G switch/PBX: This is the outer- One is the control channel and the other
Office (MTSO), which is the 3G most component of the network. It one is the data or traffic channel. It
switch/wireless PBX switching box, to interfaces with the PSTN and the exter- always broadcasts control information on
other commercial MTSO’s such as AT&T nal commercial 3G network. It accepts the control channel.
or Verizon. The precise handshaking input from these sources in the form of When the cell phone is switched
protocols and security features are dis- voice or IP packets respectively and “ON,” it accepts the control information.
cussed in subsequently. then switches them to the LAN server. It realizes that it is in the CN and sends
This system is convenient for Also, data from the LAN server, which a request for association. It sends its ID
employees, clients or consultants of this might be voice or data, is sent over to to the AP. The ID can be an Electronic
organization since it offers seamless the outbound interface on to their Serial Number (ESN) or some other
integration into the corporate network respective networks. identification.
without changing instruments. Thus, it LAN server: This server converts the The AP forwards the request to the
keeps them “connected at all times.” data from the 3G switch to VOIP pack- LAN server through the switch. The
Also, with simple “touch” procedures, ets. It also forms the Ethernet frames. LAN server interprets the request and
they can switch between networks. When the 3G device gets attached to the checks if there is an entry for the
corporate network, authentication and phone; i.e., it checks whether the ID of
The architecture other validation procedures are done on the phone is present in the database. If
This network topology depicts the this server. A special customized it’s a valid ID, the cell phone is given
integration of 3G wireless systems and authentication is to be installed which an IP address. If not, the cell phone is
802.11 WLAN. The function of the will verify the validity of the user to use denied association. The database stored
WLAN is to keep the 3G devices con- the network resources. It also contains on the LAN server contains four entries.
nected to the other various networks. the database, which has a map of the They are:
They can be LANs, data networks, telephone numbers to the IP addresses. 1. Cell phone ID
PSTNs or other 3G networks. The way WLAN: It includes the LAN interface 2. Cell phone number given by the
this network system works is shown in with the access points and the distribu- commercial service provider
the Fig. 1 protocol stack. tion system. It implements the standard 3. Office number mapped on to this
Here the LAN server is the interface CSMA/CD protocol. Here we assume device
between the corporate network and the that we have dedicated access points for 4. IP address
external public network. Actually, there the 3G devices to carry voice and data. The database has the format shown
is a small element that directly interacts 3G devices: These can be any in Table 1. The location of the user in
with the outside world. It is the switch IP–enabled 3G systems such as cell the CN—which cell the user belongs
(discussed in the next section). The phones, PDAs, etc. But for this discus- to—is also updated. This information is
LAN server handles the data coming sion, we mainly focus on cell phones. not stored in this database but in a sep-
arate management database.
Table 1 The structure of the database can vary
and is implementation dependent. We
ID Cell Phone No. Office No. IP address show an example of how such a data-
base may look. Every corporate network
989721003 215-001-009 654-129-4533 192.168.0.99 can add more details for security and/or
187352920 543-976-275 654-129-4534 192.168.0.100
can integrate these details in already
existing management databases.
from the outside network and interprets These phones are registered on the cor- Registration with the Home Network:
it into the format of the corporate net- porate network by some authorized After the cell phone gets associated with
work. Since 3G devices are IP–based, entity; e.g., the system administrator. the CN, it must register the change in its
the external data in converted to Voice They communicate with the Access location and IP address to the home net-
Over Internet Protocol (VOIP) packets. Point (AP) over the radio interface. work. This has to be done so that calls
In this format, the end devices can for the subscriber are directed towards
access the data, i.e. voice. Basic operations the CN. One very important note, we
3G devices are used as the end system There are three basic operations that assume that the 3G switch can interface
because they can operate on the unli- occur very frequently and are important with the commercial 3G service provider.
censed 2.4 GHz frequency used by the to the operation of 3G phones over the That is, there is an agreed upon collabo-
WLAN. Also, since they are IP enabled, WLAN. They are: ration between the two switching centers
they are compatible with the TCP/IP net- 1. Association—getting connected to to send updates of user information.
work stack. The bandwidth requirements the corporate network The switch then makes a session
of WLAN and 3G are also compatible, 2. Registration with Home with the external switching center and
since 802.11b assures a maximum band- Network—registering the cell phone on informs it that their subscriber is in the
OCTOBER/NOVEMBER 2004 11
CN with some IP address. If it is the 3G to PSTN (Outgoing Call)
home agent, then it will update its data-
3G Cell Phone LAN Server PBX/3G Switch
base as the subscriber’s foreign network.
If it is the foreign network, then it will Request for Call Setup
forward the request to the home net-
Authentication
work to update its database.
Example: Assume that a subscriber is Error: Ignore To PSTN
a customer of ABC telecom systems. It Forward Request to PBX
gets an IP address from its home net- From PSTN
work. If the subscriber moves to a for- Forward to LAN Server
eign network, the home network is Authentication
made aware of this venture. This for-
eign network is directly connected to Error: Ignore
Make Call
the CN’s 3G switch. When this customer
gets associated with the CN, then the
request is sent to the foreign agent, PSTN to 3G (Incoming Call)
which in turn forwards to the home
PSTN PBX LAN Server
agent in the home network the cus- Request for Call Setup
tomer’s new network. Forward Request
When the subscriber leaves the cor- Check
porate network, the PBX informs the Data/Integrity
MTSO that the user has changed net- Error: Ignore
Authentication
works. The MTSO then might restore
the state of the user to what he or she Error: Ignore To 3G Phone
held prior to joining the corporate net-
work. Even if the subscriber switches From 3G Phone
OFF the cell phone, the same proce- Authentication
dure is applied since the neither the AP Response for Call Setup Error: Ignore
nor the PBX can distinguish this situa- Fig. 3 Forward Reply
tion: whether the user is outside the
network or the cell phone is OFF.
Call setup: When a call comes at the
inbound interface of the switch, the end replies, he or she is authenticated user is authenticated. If the user is invalid,
data is switched over to the LAN server. to confirm his or her identity. then the packet is simply dropped.
The LAN server checks the data. This Please note that the PSTN network is 2. Upon validation, the outgoing net-
can be voice or an IP packet. From the used to make an outgoing call, since work information is retrieved. If it is the
data, it authenticates the data by check- the cost of using a PSTN network is PSTN network, then the voice is sent to
ing the destination telephone number. much less than the 3G network. Once the PBX, which in turn forwards it to the
The number is searched in the database the call is setup, the conversion to telephone network.
with the cell phone number, telephone VOIP packets is done. The sequence of 3. If an IP packet is to be formed, then
number or the IP address. If it matches operation for incoming and outgoing this packet is simply forwarded to the 3G
with any one of these, then a VOIP calls in shown in Fig. 3. network through the PBX.
packet is formed and sent back to the Data interchange: When data arrives These procedures are done at a very
switch. The switch then forwards it to from the PBX to the LAN Server the fol- high speed, so the user in the corporate
the appropriate AP. The AP forwards lowing steps are carried out. network thinks he or she is having a con-
the packet to the cell phone. If the cell 1. The data is checked to distinguish tinuous conversation with the person out-
phone is already engaged, then a call whether it is a voice or an IP packet. side the network. Thus, software is need-
waiting or a engaged message is sent Next, the destination ID is extracted. This ed for authentication and data conver-
back to the caller through the switch. can be a telephone number or the IP des- sion, to avoid all the processing delays.
When a user wants to make a call, the tination address. Also, the network hardware and the LAN
voice packet containing the destination 2. With this information, the user is server must be fast enough to carry out
details is sent to the LAN server. The user authenticated and his or her identity is the processing at high speed. This
is authenticated (in the case of error the stored in the database. If it is an invalid process is shown in Fig. 4
user is ignored). The state of the user is user, then the call is ignored.
changed to “engaged” so that no other 3. After validation, if it is voice then a A billing system
person can connect to the user. Thus, the VOIP packet is formed. This VOIP packet Before the deployment of such a
user is in a locked state, and only the is then sent to the AP. If it is a data pack- system, one question that arises, “How
called person can respond to the user. et then it is simply forwarded to the 3G would the cell phone get billed?”
For valid users, the VOIP packet is device. The answer to this is simple and
converted to voice and sent to the PBX. When data arrives at the LAN Server straightforward. The cell phone has two
The PBX then connects the PSTN net- from the WLAN, the following steps are numbers: one is the number obtained
work to the central office to make a call taken. from the commercial service provider,
setup. When the person at the other 1. The VOIP packet is opened and the and the other is the office number that
12 IEEE POTENTIALS
is mapped onto it. If the user in not in usage warrants it and for load balancing. obtain interconnection of their offices
the CN, then the service provider han- Also, protocol converters need to be without any change in infrastructure.
dles the billing cycle. But if the user is extremely efficient for audible conversa-
now registered to the CN, then some tion. A one-way delay of more than 100 Read more about it
issues are to be noted. If he or she gets ms makes it difficult for end users to • Wireless Communication and
a call on the number provided by the converse. Hence, protocol converters Networks – 2nd Edition William
cell phone operator, then the user will must not cause a delay of more than 20 Stallings
be billed by this provider. (He or she ms, since there are other transportation • IEEE 802.11 WLAN Specification -
can get calls on this number, since the overheads involved. http://grouper.ieee.org/groups/802/11/
PBX informs the commercial MTSO Cost. If the existing wireless LAN is • 3rd Generation Partnership Project
about the presence of the user in the loaded, then some new access points 2 – Wireless IP Network Standard -
CN.) But if the user gets a call on his or probably would be needed to cater to 3GPP2 P.S0001-B - Version 1.0.0 -
her office number, then he or she is not the needs of the voice calls. But for most Version Date: October 25, 2002
billed by the provider, since it is like of the corporate networks, the existing • Wireless LAN Access Network
someone calling him or her on his or infrastructure would be suitable for this Architecture for Mobile Operators –
her office land line. system. Designing or buying protocol Juha Ala-Laurila et. al. , Nokia Mobile
When the user is making an outgo- converters for the LAN server can add to Phones, IEEE Communications
ing call, then the number would be the the cost. Users need 3G phones, but Magazine, November 2001
office number. Hence, the office will be they would already have them from their • WLAN as a Complement to GPRS
billed for this call, since all outgoing commercial service providers. Mainten- and 3G Services - Dr Mario Davoli
calls from the office PBX is going ance of servers, wireless phones and Ericsson Australia, White Paper -
through the PSTN network. ensuring security policies is an important Doc. Reference No: EPA/B 2223 158, 27
aspect and must be taken care of for a June 2002
Drawbacks of the smooth running system.
proposed solution About the authors
With the proliferation of wireless gad- Conclusion Azim A. Samjani received his
gets and applications in our daily lives, We have proposed a new solution for Bachelor of Engineering (B.E.) in
there is an increasing tendency to desire integration of 3G and Wireless LAN. This Computer Engineering from University
being connected to public and private architecture and recommendations have of Pune, India in August 2001 and his
networks – both voice and data. We have not been tested in the real world. But, Master of Science in Engineering (M.S.E.)
proposed a new method of using 3G with the available network components in Telecommunications and Networking
phones in public and private networks and standards available, a feasibility test from the University of Pennsylvania in
due to their inherent ability to mesh with was performed to ensure the implemen- May 2004. Contact: azim@computer.org
standard networking technologies. But tation. (Ericsson is working towards a Rahul R. Shetty, Contact: shettre@
with this method comes a price tag in similar implementation, but using all hotmail.com
terms of monetary resources as well as together different technologies.) With Rohit George Mathew, Contact:
changes in infrastructure. Apart from this method, we achieved a reduction in rohitgmathew@yahoo.com
these material investments, social issues the cost of deployment and scalability,
could arise since we envision a different and the employee was “always connect-
way of human – machine interaction. ed” with the same identification and
Acronym glossary
3G 3rd Generation Wireless
Technical issues. First of all, it is nec- standardized technology. Also, this sys-
Systems
essary to use 3G phones. We have tem refrains from legal issues, since it
AP Access Point
designed this system keeping in mind uses unlicensed frequency band. Hence,
the facilities offered by 3G systems. As corporations can deploy this system and BS Base Station
of today, 3G phones are in testing BSS Basic Service Set
mode or being used only by private CN Corporate Network
firms. Hence, it will be awhile before CO Central Office
the masses use it. Voice / IP DS Distribution System
The LAN server is one of the most Packets MTSO Mobile Terminal Switching
important components of this system. Office
The efficiency of the entire system PBX Private Branch eXchange
depends on it. This server can act as a
PSTN Public Switched Telephone
bottleneck for the entire system, if not Authentication Data Base Network
well configured and designed to accu-
TCP/IP Transmission Control
rately meet desired needs. Normally, Protocol/ Internet Protocol
simple LAN servers come with dual VOIP Packets
USB Universal Serial Bus
processors that have more than 2 GHz Data Voice
VOIP Voice over Internet Protocol
that is powerful enough to handle voice IP Packet (IP)
– data operations. But, again, the load
on the server depends on the number of WLAN Wireless Local Area Network
(802.11)
users, other applications running on it
To / From 3G WPBX Wireless Private Branch
and also the amount of memory avail-
LAN Server eXchange
able. More servers can be deployed if Fig. 4
OCTOBER/NOVEMBER 2004 13