Sunteți pe pagina 1din 11

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/3227750

Power line communication: An overview

Article  in  IEEE Potentials · November 2004


DOI: 10.1109/MP.2004.1343222 · Source: IEEE Xplore

CITATIONS READS
133 1,159

2 authors, including:

James Caffery

57 PUBLICATIONS   3,171 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Array Signal Processing View project

All content following this page was uploaded by James Caffery on 10 November 2015.

The user has requested enhancement of the downloaded file.


Power lines were originally devised to (DSP). The final piece was the telecom- Phone-line networking most commonly
transmit electric power from a small munications market deregulation, first in referred to as HomePNA is based on the
number of sources (the generators) to a the US and then in Europe and Asia. All specifications developed by Home
large number of sinks (the consumers) these events have made power line com- Phone Networking Alliance. It is ubiqui-
in the frequency range of 50-60 Hz. munications a viable technology for high tous—multiple sockets in each room
Initially, the first data transmissions over provide considerable and dispersed
©DIGITALVISION COMPOSITE: MKC
power lines were primarily done only capacity—and no new wiring is neces-
to protect sections of the power distrib- sary. The development of the “last inch”
ution system in case of faults. (In fact, by Home-networking companies in the
power line protection remains one of form wireless network adapters and
the primary functions of power line power-line adapters is gradually leading
communications.) In such an event, the to widespread home networking; i.e., a
fast exchange of information is neces- wide array of devices connected inside
sary between power plants, substations the home in a intra-home network. This
“in-home networking” could transform
all power outlets in the household into
broadband connections for PCs, tele-
Power line communications : an overview phones and their accessories, as well as
other ‘enabled’ electric appliances.
Figure 1 illustrates the concept of “last
and distribution centers so as to mini- inch” or in-home networking, while Fig.
mize their detrimental effects. 2 illustrates the “last mile” concept.
The logic included the fact that power For the “last mile” access, power line
transmission towers are some of the most communications is one of the several
robust structures ever built. Thus, from a possible technologies that include cable
reliability perspective, any protection sig- modem, and different
naling scheme would be best served on types of Digital subscriber
such networks. Moreover, many remote Anindya Majumder lines (xDSL) and broad-
locations were not hooked up to tele- and band wireless. PLC is not
phone networks. Thus, it was deter- speed home networking as well as James Caffery, Jr. widely thought to be
mined that signaling and exchanging being a possible solution for the superior to other tech-
information for power system protection “last mile” problem. nologies, nor are the
purposes over the existing power lines The market for power line communi- other technologies without problems or
was the optimal solution. cations (PLC) is two-fold: to the home, clearly superior to PLC in all respects.
In the past, for protection and tele- or “last mile” access; and in the home, or The major attraction of PLC is that
metering, the largest portions of data “last inch” access. According to the the power lines often already exist.
were transmitted analogously to voice study, “Jumping on the Broadband Hence, they would be the preferred
data using analog telephony. However, Wagon” (a Morgan Stanley Dean Witter medium for providing broadband con-
in time, automatic telemetering and industry report in April, 2000) power line nection to rural or remote areas where
remote monitoring of status parameters communications could be better than the telephone and cable connections may
without operators has become increas- other last-inch access technologies such not exist. However, it suffers from a
ingly common. So today telephony plays as cable, wireless and HomePNA. number of problems.
a rather subordinate role to digital com-
munications even on the power lines.

So why power line


communications? Residential Desktop
Considering that data transmission Gateway
Personal Computer
over power lines has been around for
sometime, one might wonder why it is
receiving such renewed attention now? PLC Transceiver
Especially considering, the data rate for PLC Transceiver
protection and telemetering purposes is at PLC
most a few kb/sec and is not comparable Transceiver
PLC Telephone
to the mb/sec data that needs to be sup- Personal Transceiver
ported for multimedia applications. The Computer
Fig. 1 The “last-inch”
answer is a combination of effects that or in-home
took place during the mid thru late 1990s. networking
The most prominent one is, of course, the
unparalleled growth of the Internet. This Scanner
Laptop
growth was fueled with the technological PLC Printer
advancements of very large scale integra- Transceiver
tion (VLSI) and digital signal processing

4 0278-6648/04/$20.00 © 2004 IEEE IEEE POTENTIALS


The power line channel as a Figure 3 depicts a generalized channel with the generator’s actual supply fre-
transmission medium model for the power line physical layer. quency: This type of impulse noise usu-
First off, the power line carrier was In Fig. 4, the generalized channel model ally repeats at multiples of the supply
not specifically designed for data trans- has been simulated between the fre- frequency of 60/50Hz. It has a short
mission and provides a harsh environ- quency ranges 200 Khz to 22 Mhz. The duration of about a few microseconds
ment for it. Varying impedance, consid- channel exhibits a high level of attenua- and a psd that decreases with increasing
erable noise that is not white in nature tion with an increasing frequency. frequency. The noise is caused from
and high levels of frequency-dependent power supplies operating synchronously
attenuation are the main issues. Noise to the main’s frequency.
The channel between any two out- Noise in power lines is a significant 4. Impulse noise asynchronous with
lets in a home has the transfer function problem for data transmission. This is the main’s frequency: This is the most
of an extremely complicated line net- because it rarely has properties similar to detrimental type of noise for data trans-
work. Many stubs have transmission the easily analyzed white Gaussian noise mission. Its duration varies from a few
loads of various impedances. Over such of the receiver front ends.
a transmission medium, the amplitude Typical sources of noise Substation
and phase response may vary widely are brush motors, fluores- Local Loop Distribution Center
with frequency. While the signal may cent and halogen lamps,
arrive at the receiver with very little loss switching power supplies To Medium Voltage Network Speech/Data
Links to
over some frequencies, it may be com- and dimmer switches. PSTN/WAN
pletely indistinguishable over other fre- The noise in power lines
quencies. Worse, the channel transfer can be impulsive or fre-
function itself is time varying since quency selective in nature
plugging in or switching off of devices and, sometimes, both. Low Voltage Network (230/115V)
connected to the network would Several studies on the
change the network topology. noise characteristics of
The location of the transmitter or the power lines have been
receiver (in this case the power outlet) conducted. Recent papers
could also have a serious effect on trans- have discussed not only
mission error rates. For example, a the type of noise encoun-
receiver close to a noise source would tered but, also, the distrib-
have a poor signal to noise ratio (SNR) ution of duration, ampli-
compared to one further away from the tude and inter-arrival time
noise source. The noise sources could be of impulse noise encoun-
home devices plugged into the network. tered in power lines.
Just like a wireless channel, signal According to them,
propagation does not take place between the noise in power lines can be classi- Fig. 2 The “last mile” broadband
access to homes from the local
the transmitter and the receiver along a fied into four categories: distribution center
line-of-sight path. As a result, additional
echoes must be considered. This echoing microseconds to milliseconds and has a
occurs because a number of propagation Narrow-Band Asynchronous random inter-arrival time. The psd of
Noise Impulse Noise
paths exist between the transmitter and such impulse noise may be as much as
the receiver. Reflection of the signal often 50dB above the background noise
occurs due to the various impedance mis- Background Synchronous spectrum. Hence, it is capable of wip-
Noise Impulse Noise
matches in the electric network. ing out blocks of data symbols during
Each multi-path would have a certain high data transmission at certain fre-
weight factor attributed to it to account quencies. It is caused from switching
for the reflection and transmission losses. S(t) H(t,τ) + R(t) transients in the system network.
All reflection and transmission parame-
ters in a power line channel may be
Fig. 3 The generalized channel model
Communicating at the PLC
assumed to be less than one. The num- Physical Layer
ber of dominant multi-paths to be con- 1. Colored noise: This type of noise Modulation techniques such as fre-
sidered (N) is often not more than five or has relatively low power spectral densi- quency shift keying (FSK), code-division
six since additional multi-paths are usual- ty (psd) which decreases with increas- multiple access (CDMA) and orthogonal
ly too weak to be of any significance. ing frequency. It is considered to be the frequency division multiplexing (OFDM)
This is because the more transitions and sum of all low power noise sources and have been discussed as appropriate
reflections that occur along a path, the may be time varying. modulation schemes for PLC. For low
smaller its weighting factor would be. 2. Narrowband background noise: cost, low data rate applications, such as
It has been observed from channel This noise is mainly due to amplitude power line protection and telemetering,
measurements that at higher frequencies modulated sinusoidal signals. This kind FSK is seen as a good solution. For data
the channel attenuation increases. of interference is from broadcast sta- rates up to 1Mbps, the CDMA technique
Hence, the channel may be described as tions in the medium and short wave may provide an effective solution.
random and time varying with a fre- bands. The interference level varies However, for high data applications
quency dependent signal to noise ratio during different times of the day. beyond that, OFDM is the technology of
(SNR) over the transmission bandwidth. 3. Impulse noise that is synchronous choice for PLC.

OCTOBER/NOVEMBER 2004 5
Frequency selective fading as experi- Simulated Power Line Channel nel estimation. In general, bit loading
enced by the power line channel algorithms may be classified as margin-
10
severely impairs the capacity of FSK for adaptive or rate-adaptive algorithms.
0
data rates beyond a few kilobytes per In margin-adaptive algorithms, the

SNR in dB
−10
second. A high degree of error control −20
objective is to minimize the bit error
coding would be needed. Combined −30 rate while keeping the data transmis-
with the low spectral efficiency of FSK, −40 sion rate constant. For rate-adaptive
it would limit the data rate achieved. −50 algorithms, the data rate is maximized
For CDMA, the signal of each user is −60
200
while maintaining a constant error rate.
spread using a spreading code at the 150
In PLC standards, rate-adaptive algo-
transmitter. It is recovered at the receiv- Tim 100 1000
1200
rithms have been adopted. This is
e 50
600
800
les 400
er by de-spreading using the same cy Samp because the power line channel can be
0 0 200

code. CDMA provides robustness Frequen z to 22mhz too harsh at times to guarantee a con-
0 kh
From 20
against narrowband noise and other Fig. 4 Simulated Power line channel model stant data rate that the margin-adaptive
forms of interference. Therefore, it algorithms required.
seems to be an attractive candidate for of parallel channels. The data in each Channel coding plays an important
PLC. However, in CDMA systems, the channel is applied to a modulator, such role for maintaining a constant error
processing gain needs to be high to that for N channels there are N modula- rate. The input bitstream is encoded
effectively counter narrowband noise tors whose carrier frequencies are f0, using Reed-Solomon coding followed
and interference from other users. With f1,…., fN-1. These N carriers are referred by interleaving and trellis coded modu-
low processing gain, the robustness to as sub-carriers in the literature. This lation. The complete functional block
against interference and noise is lost is because they split the work of a sin- diagram of the DMT transceiver as
and the signal quality may deteriorate gle carrier amongst themselves. This implemented on the power line physi-
to unacceptable levels for all users. The scheme offers various advantages. cal layer is shown in Fig. 6.
processing gain (PG) of a CDMA system With OFDM, since the data is split
may be expressed as: among N sub-carriers, each sub-carrier The PLC Medium Access
carries 1/Nth of the original data rate. This Control (MAC) Layer
Bt
PG = Bd (1) means that the symbol duration for each A MAC protocol specifies a resource
sub-carrier increases N times. Moreover, sharing strategy: the access of multiple
Where, B+ denotes the transmission a part of the end of a symbol is append- users to the network transmission
bandwidth and B d denotes the data ed at its beginning in what forms the capacity based on a fixed resource shar-
bandwidth. It is quite evident that for “cyclic prefix.” The length of the cyclic ing protocol. Generally, there are two
high data rates and for a reasonably prefix is made longer than the longest categories of access schemes:
high PG, the transmission bandwidth B+ delay path. This solves the inter-symbol • Fixed access
would have to be very high. interference (ISI) problem to a large • Dynamic access
Unfortunately, this is where the prob- extent. As a result, a simple linear equal- Transmissions using fixed access
lem lies. The fissured spectrum for izer may be enough to remove the ISI. schemes assign to each user a predeter-
transmission—due to frequency selec- Another significant advantage of mined or fixed channel capacity irre-
tive fading—does not provide large OFDM, while transmitting over a fre- spective of whether the user needs to
contiguous bands for data transmission. quency selective fading channel, is that transmit data at that time. Such schemes
Hence, the main advantage of CDMA is allows us to adopt adaptive schemes are not suitable for bursty traffic such as
cannot be fully exploited for PLC. so we can avoid transmitting at fre- data transmission that is provided by
Since the symbol time is inversely quencies in deep fade. Sub-carriers in PLC. Hence, dynamic access is provided
proportional to the data rate, as the which the signal to noise ratio (SNR) for power line communication.
data rate increases the symbol duration drops below a certain threshold are Dynamic access protocols may be clas-
correspondingly decreases. While trans- switched off. Sub-carriers with high SNR sified into two separate categories:
mitting over the power line channel at are made to carry more bits; i.e., they 1. Contention based protocols: colli-
high data rates, the symbol duration is are modulated to a higher-level constel- sions occur.
so small that delayed versions of one lation. This is known as a bit loading 2. Arbitration protocols: collision
symbol—due to multi-paths—gets technique and is illustrated in Fig. 5. free.
smeared over a large number of other The application of OFDM with bit load- Contention protocols may not be
symbols. This makes the detection ing for a wired channel such as the able to guarantee a quality of service
process complicated since it requires power line is widely known as Discrete (QOS), especially for time critical appli-
complex equalization techniques to Multi-tone (DMT). cations, since collisions might occur
counter the inter-symbol interference Channel estimation is necessary for and data might have to be retransmit-
(ISI). Despite equalization at the receiv- the bit loading technique to work. The ted. Arbitration based protocols are
er, the bit error rate may still be unac- transmitter has to know the noise vari- more capable of guaranteeing a certain
ceptably high for high data rates over ance and the attenuation being experi- QOS. However, contention based pro-
harsh channels with multi-paths. enced by each sub-carrier. DMT trans- tocols may actually provide higher data
In the case of OFDM modulation, ceivers use pilot signals for channel rates in applications which do not have
the serial data of a traffic channel is estimation. For time varying channels stringent QOS requirements (e.g.,
passed through a serial-to-parallel con- such as the PLC, the pilot signal is Internet applications). This is because
verter. It splits the data into a number repeated periodically for dynamic chan- they require much less overhead com-

6 IEEE POTENTIALS
pared to arbitration protocols (polling, due to the PLC’s hostile channel charac- The European Home System (EHS)
reservation, token passing). teristics. Though this means more over- consortium <www.ehsa.com> defines a
Polling and Aloha are the two most head, overall data rate is improved bus and a communication protocol for
studied protocols for medium access. since it means less retransmission. communication between appliances
Polling is a primary/secondary access CSMA/CA is the chosen medium access and the central processing unit in the
method in which the primary station protocol for the Homeplug standard home. The EHS specification, EHS 1.3,
asks the secondary station if it has any that has been developed for in-home covers several medium types to trans-
data to send. Aloha is a random access networking using power lines. port control data, power and informa-
protocol in which a user accesses a tion. All share the logical link control
channel as soon as it has data to send. Perspective/applications/ (LLC) sublayer. For the moment, the
The transmitter waits for an acknowl- standards supported medium types are Power
edgement from the receiver for a ran- The PLC market is expanding Line Carrier (230 Vac + data, 2.4 kbps,
dom period of time. It retransmits if it dynamically. Some applications and CSMA/ack, topology free) and Low
does not receive one. The main disad- research developments are reported in Speed Twisted Pair (15 VDC, 48 kbps,
vantage of Aloha is the low throughput the International Symposium for Power- CSMA/CA, topology free).
as the load increases as well as the lack line Communications and its One major issue under considerable
of QOS. Applications (ISPLC) conferences each debate for the PLC local loop distribution
Arbitration based polling can handle year. Advanced energy services include network is the radiation emission of
heavy traffic and does provide QOS applications such as automatic meter power lines and its effect on other fre-
guarantees. However, polling can be reading, programmable controllers and quency bands for communication.
inefficient under light or highly asym- demand supply management. Another area of concern is security and
metric traffic patterns or when polling Traditionally, this application area has privacy. The networking signals generated
lists need to be updated frequently as been pushed by energy companies and in one home may show up (albeit attenu-
network terminals are added or related manufacturers. PLC networking ated) on the power line in another home.
removed. Similarly, token passing in the home would be serving two This creates urgent concerns about priva-
schemes (e.g., token ring, token bus) goals: 1) providing a local home net- cy similar to those encountered in wireless
are efficient under heavy symmetric work with the advantages of the power systems. Right now, the Homeplug stan-
loads. However, they can be expensive line, and 2) combining access and in- dard uses Data Encryption Standard (DES)
to implement and serious problems can home network capabilities for service encryption technology as a solution.
arise with lost tokens on noisy unreli- and system integration. There are sever-
able channels such as power lines. al applications for a PLC network in the Bt
 H(f)
Carrier Sense Multiple Access home: shared Internet, printers, files,
(CSMA) with overload detection has home control, games, distributed video
been proposed for PLC. CSMA is a con- and remote monitoring/security.

Bits/Sub-Carrier
tention based access method in which The key asset here is “no new
each station listens to the line before wires.” In the United States, the
transmitting data. CSMA is efficient Homeplug Powerline Alliance was
under light to medium traffic loads and founded by Cogency, Conexant, Enikia,
for many low-duty-cycle bursty termi- Intellon, Netgear, RadioShack Co.,
nals (e.g. Internet browsing). The pri- Sharp, Panasonic, Cisco systems,
mary advantage of CSMA is its low Motorola and Texas Instruments, togeth-
implementation cost. This is due to the er with several other participants and f1 f2 f3 fN f
fact that it is the dominant technique in adopters <http://www.homeplug.org>. Frequency
today’s wired data networks. The Homeplug Powerline Alliance is a
Collision detection (CSMA/CD) sens- non-profit corporation formed to pro- Bt
es the channel for a collision after trans- vide a forum for creating open specifica-
mitting. When it senses a collision, it tions for high-speed home power line
waits a random amount of time before networking products and services.
Bits/Sub-Carrier

retransmitting again. CSMA/CD used in Adopters of the Homeplug 1.0 stan-


Ethernet networks does enhance the dard have developed products for in-
performance of CSMA. But on power home networking reaching data rates
lines the wide variation of the received up to 14Mb/s. The Homeplug standard
signal and noise levels make collision uses OFDM in a burst mode as the
detection difficult and unreliable. physical layer modulation. The
An alternative to collision detection Homeplug technology contains a com-
that can be easily employed in case of bination of sophisticated forward error
f1 f2 f3 fN
PLC is collision avoidance (CSMA/CA). correction (FEC), interleaving, error Frequency
As in the CSMA/CD method, each detection and automatic repeat request
device listens to the signal level to (ARQ) to ensure that the channel Fig. 5 The concept of bit loading in
which higher bits are allotted to
determine when the channel is idle. appears completely reliable to the net- sub-carriers which have higher
Unlike CSMA/CD, it then waits for a work layer protocols. The MAC proto- SNR, and lower number of bits
random amount of time before trying to col for the Homeplug standard is the are allotted to sub-carriers
send a packet. Packet size is kept small CSMA/CA protocol described earlier. experiencing attenuation.

OCTOBER/NOVEMBER 2004 7
RF TX DAC

Parallel Add Cyclic


QAM Pilot Serial to Extension &
Coding Interleaving to Serial
Mapping Insertion Parallel Windowing

IFFT (TX)
FFT (RX)

Serial to Remove
QAM Channel Parallel to Parallel Cyclic
Decosing Deinterleaving
Demapping Correction Serial Extension

Timing &
Fig. 6 The functional block diagram of DMT as implemented in Frequency
RF RX ADC
the PLC physical layer using the Homeplug standard Synchronization

Conclusion Read more about it voltage power-line communication


The power line communication field • Klaus Dostert, Powerline Commun- channels on the basis of multi-path
still constitutes an open research area ications, 2001 Prentice Hall, Upper Saddle propagation,” IEEE Transactions on
even though successful standards have River, NJ07458. ISBN: 0-13-029342-3 Consumer Electronics, Vol. 49, No.1,
been adopted in recent years. Many • Niovi Pavlidou, A.J. Han Vinck, Feb.2003.
more studies are needed to better Javad Yazdani, “Power Line Commun-
understand and improve the perfor- ications: State of the Art and Future About the authors
mance of power lines for high bit rate Trends,” IEEE Communications Maga- Anindya Majumder obtained his BE
applications. DMT (defined earlier, zine, April 2003, pg 34-40. in Electronics and Power engineering
Discrete Multi-tone) technology as • Sobia Baig, N.D. Gohar, “A from Nagpur University, India, in 1998
adopted by the Homeplug standard can Discrete Multitone Transceiver at the and Master’s degree in Electrical engi-
theoretically provide data rates of heart of the PHY layer of an In-Home neering from Southern Illinois
100Mb/s. However, products based on Power Line Communication Local Area University, Carbondale in 2001. During
the standard only have achieved data Network,” IEEE Communications 1998-99, he was employed in BPL
rates up to 14Mb/s. The theoretical data Magazine, April 2003, pg 48-53. Telecom Ltd. at Kolkata, India. He has
rate here indicates the raw physical • Olaf G. Hooijen, “Channel Model been pursuing his Ph.D. in Electrical
layer data rate. To protect against the for the Residential Power Circuit used engineering under the guidance of Dr.
severe noisy conditions and fading in as a Digital Communications Medium,” James Caffery Jr., in the Electrical &
the powerline channel, very high levels IEEE Transactions on Electromagnetic Computer Engineering and Computer
of error control coding need to be pro- Compatibility, Vol. 40, No.4, Novem- Science department of University of
vided. Hence, the data rate as seen by ber 1998. Cincinnati since September, 2001. His
the upper layers is much less. The • M. Zimmermann, Klaus Dostert, research interests include Wireless
efforts of the Homeplug Alliance and “An Analysis of the Broadband Noise Communications, Digital signal process-
home networking technology’s growth Scenario in Powerline networks.” ing, Power line Communications and
in the US portend a very bright future Proceedings of International Sym- the application of signal processing and
for DMT-based PLC home networking. posium of Power-line Communications data analysis techniques in the area of
and its applications, 5-7th April, 2000, medical sciences.
Limerick, Ireland Dr. James Caffery received his
• Halid Hrasnica, Abdelfatteh B.S.E.E. (summa cum laude) from
Haidine, ‘Modeling MAC Layer for Bradley University in 1992. He com-
Don’t Powerline Communications Net-
works’.Internet, Performance and Con-
pleted the M.S. and Ph.D. degrees in
electrical engineering from the Georgia

delay... trol network systems, part of SPIE’s sym-


posium on Information Technologies, 5-
Institute of Technology in 1993 and
1998, respectively. In 1999, he joined
8th November,2000, Boston, MA, USA/ the Department of Electrical and
Renew • Majumder, “Performance Analysis Computer Engineering and Computer
of M-tone coded frequency hopping sig- Science at the University of Cincinnati
your naling over Power line transmission chan-
nel,” Master’s thesis, Southern Illinois
where he is currently an assistant pro-
fessor. His research interests focus on
membership University, Carbondale, August 2001.
• Papaleonidopoulos, I.C.; Capsalis,
geolocation technology and many
aspects of wireless communication sys-
C.N.; Karagiannopoulos, C.G.; Theo- tems, including CDMA systems, multi-
today. dorou, N.J., “Statistical analysis and user transmission/detection and space-
simulation of indoor single-phase low time signal processing.

8 IEEE POTENTIALS
The Private Branch eXchange (also • Call forwarding on absence less technology. This can be a cordless
called the PBX or the Private Business • Call forwarding on busy system, a small Wireless Local Loop
Exchange) is a telephone-switching cen- • Call transfer (WLL), Wireless LAN or some cellular
ter that is owned by a private business. • Music on hold technology. The goal is to provide con-
This switching center is exclusive to one • Automatic ring back venience to the workers at a corporate
company rather than owned by a com- • Night service site, so as to achieve in-house mobility
mon carrier or telephone company. • Call distribution (Automatic and continuous attachment
Even so, companies still need their Call Distribution, fixed sequences) among co-workers and clients
employees to be able call each other at The extension interface can be:
Azim A. Samjani, with a unique and constant
different locations (if need be), call out- • Proprietary: the manufac- Rahul R. Shetty contact number. This set up
side phone numbers (the public tele- turer has defined a protocol. and provides a good amount of
phone network or PSTN), and receive One can only connect the man- Rohit George scalability, since there is no
calls from the outside. Mathew hindrance of laying extra
PBXs are distinguished from smaller cables. Also, users can be
“key systems” by the fact that external added without any major modification.
lines are not normally indicated and
selectable from an individual extension. ©DIGITALVISION COMPOSITE: MKC

From a user’s point of view, calls on a


key system are made by selecting a line
and dialing the external number; calls Wireless PBX : using 3G over a wireless LAN
on a PBX are made by dialing 9 then
the external number.
Another alternative is to connect all
the telephone sets to the PSTN. But the Existing implementations
major disadvantage is that every exten- Wireless PBX exists in a variety of
sion requires its own line (usually with ways. Each way has some advantages
a monthly recurring line charge); also, and disadvantages.
“internal” calls would be dialed exter- Wired LAN: This is one of the most
nally and charged for. The main pur- common approaches used by corpora-
pose of a PBX is to save the cost of tions. Here the PBX switch/machine is
requiring a line for each user to the connected to a central LAN server. Also,
telephone company’s central office. a Base Station (BS) is connected to
Thus, most local phone companies every PC, via a Universal Service Bus
offer Centrex or “Virtual PBX” service. (USB) port. When the PBX wants to
That is each extension has a trunk line ufacturer’s sets on the PBX contact a particular number, the num-
that is connected to the telephone com- • Standard interfaces: any device sup- ber is broadcasted on the LAN. If the BS
pany’s Central Office (CO), where soft- porting the standard can be connected on the USB identifies the number, it
ware on the CO switch enables PBX- responds to the PBX switch. Then the
like functionality. Wireless PBX PBX switch identifies the machine, con-
Functionally, the PBX performs three Wireless PBX (WPBX) is defined as nects it with the user at the calling end
main duties: the privately owned and operated wire- and sends voice packets over the net-
Establishing connections (circuits) less telephone equipment, including work. It is affordable on a LAN, since it
between the telephone sets of two base stations and handsets, used to con- provides reasonable bandwidth for such
users. Note that fax, modems and many nect users to PBX systems or Centrex applications. The identification is nor-
communication devices can often be trunks using unlicensed spectrum. mally IP-based. The BS then connects
connected to the PBX (although the WPBX private wireless networks operate to the wireless phone and the user can
PBX may degrade line quality for similarly to today’s cellular networks talk. Typically, a BS can support more
modems). Therefore, telephone sets are except the WPBX networks are privately than one user. In such cases, it identi-
referred to as extensions. owned and usually exist within the walls fies more than one calling number. But
Maintaining such connections as of a business. The WPBX application when the network is busy or when
long as the users require them. generally consists of WPBX handsets that employees have long calls, then the
Providing information for the use unlicensed spectrum and special quality of service is not good. Hence, it
Accounting Department (e.g. metering WPBX air interfaces to communicate to is best used for short conversations.
calls) the nearest private WPBX base station Also the computer would be loaded
PBXs offer many capabilities, (BS). The base stations are located when voice calls are activated.
although each manufacturer may have a throughout a work environment to pro- Cordless phones: A cordless phone
different name for each capability. Here vide the desired coverage. The capacity has a base station and one or more
is a short list of common capabilities: of the base station may vary depending phones connected to it. The base sta-
• Direct Dialing (DDD or DDI), also upon the type of wireless technology tion is connected to the PBX switch
called Direct Inward Dialing (DID) used for communication, the backbone with a wire. When a call is to be made,
• Customized Abbreviated dialing network and the devices’ applications. the PBX contacts the correct base sta-
(Speed Dialing) In wireless PBX, the PBX system is tion and the call is put through. This is
• Follow-me implemented by deploying some wire- one of the cheapest and easiest systems

OCTOBER/NOVEMBER 2004 0278-6648/04/$20.00 © 2004 IEEE 9


IP ny wants to interconnect more such • Scalability. This feature ensures
Upper Layer IP components or increase the user base, the flexible addition of users without
PPP Protocols
it is expensive and sometimes impossi- any major changes in the network infra-
LLC LLC LLC ble (if the technology is old and no structure. With a wired PBX, the extra
MAC MAC MAC
more in use). cables required would be result in a
2. These systems are not standard- installation cost proportional to the
Physical Physical Physical ized and, hence, may at times be inse- amount of infrastructural changes made.
MS AP LAN Server cure. Since it is not a generic technolo- • Interoperability with other systems.
gy, companies may have to implement This capability lets the company’s wire-
3G over WLAN Protocol Stack their own security policies. This can less PBX network connect to client net-
Fig. 1 prove expensive. Also, since it’s not works, other commercial networks or
tested by others, there is no guarantee the company’s own network at some
to implement. Different cordless tech- the system will be completely secure. other location.
nologies can be applied depending 3. When the LAN is used, the net- • Security. Since we are using a cus-
upon the type of service desired. work may be heavily loaded when tomized system, it is still more vulnera-
Walkie-talkie sets: These are simple voice packets are passed on to it. This ble to attacks. In such cases, the organi-
and common devices often used to can affect the performance of some zation has to implement their own
implement wireless PBX. They can be data intensive applications. security policy. Since this may not be
automated systems or there can be a 4. Suppose a company has offices well known, no guarantee about the
manual switching from PSTN to the that are geographically dispersed. If an privacy is justified.
internal PBX. These are one of the old- employee moves to another office, his • Standardized technology. Using
est wireless systems and they have a or her number is changed. This creates widely accepted standard components
variety of applications apart from wire- confusion and, sometimes, connectivity makes maintenance and upgrades easi-
less PBX. with the person is lost. er. Also, support from different vendors
5. Since these implementations can is provided.
Motivation be proprietary for a particular corpora- • Always connected. Lastly, an
So what are the problems in the tion, interfacing such a system with employee is “always connected to his
existing wireless PBX? There are many clients or other organizations can be or her corporate network” irrespective
technical issues that are inherent with difficult at times, and doable only with of his or her location.
the technology deployed. They are… major modifications.
1. The company can implement a A cellular based system
private protocol or use customized Wireless PBX using We propose a cellular system based
components that are incompatible with 3G over WLAN wireless PBX using commercial wireless
other products of the same or different Using third generation (3G) wireless technical standards. This system sup-
technology. This increases the cost and systems over the Wireless LAN (WLAN), ports voice, data and other telephony
decreases the scalability. If the compa- these main problems can be solved: applications. The data applications
• Cost of the sys- involve paging, Short Message Service
tem. Users subscrib- (SMS), email and such. The telephony
Corporate Network-3G over WLAN PSTN ing to commercial applications include caller ID, call for-
cellular operators warding, call waiting and call blocking.
3G Switch can use their hand- For this system, we divide the office
sets both outside as into small cells also known as micro
well as inside the cells. For example, every floor in the
organization’s net- office could be a cell or a big hall or a
LAN Server
work. This setup shop floor could be a cell. The cell’s
eliminates the need size depends upon the size of the office
for cordless and and may vary from one implementation
3G
land line phones. to another. Every cell has a base sta-
Distribution Network The network com- tion. In turn, every base station is con-
System ponents being used nected to a central switching center,
are standardized which is the PBX switch.
thus far less costly So what cellular technology is incor-
AP
AP than customized porated? Any cellular system such as
ones. Also, the sup- TDMA or CDMA can be used. But we
External
Networks porting software is chose a 3G cellular network because:
BSS BSS readily available. • It can operate in an unlicensed 2.4
Hence, the mainte- GHz frequency same as a WLAN.
nance and upgrade Therefore, no FCC regulations apply
of such systems is and many network products are avail-
3G Phones relatively easy com- able which are WLAN enabled.
3G Phones pared to using a • It can support both voice and data
proprietary PBX due to the considerable increase in
Fig. 2 Network Architecture of 3G over WLAN system. bandwidth compared to other cellular

10 IEEE POTENTIALS
technologies. So it can work on WLAN, width of 11 Mbps and can support data the external network
which offers a bandwidth of 11 Mbps. rates of 5.5, 2 and 1 Mbps which is still 3. Call setup—setting up the calls to
• These systems are more secure. acceptable to the 3G system. and from the cell phone
• 3G supports IP and, hence, can The main components in this archi- Association: This is a process by
interface with other network devices. tecture (see Fig. 2) are the 3G which the cell phone gets associated
Thus, the standard 3G protocols are switch/PBX, the LAN Server, the WLAN with the Corporate Network (CN). The
implemented with no modifications. We and the 3G devices. AP has two channels of communication.
connect our Mobile Terminal Switching 3G switch/PBX: This is the outer- One is the control channel and the other
Office (MTSO), which is the 3G most component of the network. It one is the data or traffic channel. It
switch/wireless PBX switching box, to interfaces with the PSTN and the exter- always broadcasts control information on
other commercial MTSO’s such as AT&T nal commercial 3G network. It accepts the control channel.
or Verizon. The precise handshaking input from these sources in the form of When the cell phone is switched
protocols and security features are dis- voice or IP packets respectively and “ON,” it accepts the control information.
cussed in subsequently. then switches them to the LAN server. It realizes that it is in the CN and sends
This system is convenient for Also, data from the LAN server, which a request for association. It sends its ID
employees, clients or consultants of this might be voice or data, is sent over to to the AP. The ID can be an Electronic
organization since it offers seamless the outbound interface on to their Serial Number (ESN) or some other
integration into the corporate network respective networks. identification.
without changing instruments. Thus, it LAN server: This server converts the The AP forwards the request to the
keeps them “connected at all times.” data from the 3G switch to VOIP pack- LAN server through the switch. The
Also, with simple “touch” procedures, ets. It also forms the Ethernet frames. LAN server interprets the request and
they can switch between networks. When the 3G device gets attached to the checks if there is an entry for the
corporate network, authentication and phone; i.e., it checks whether the ID of
The architecture other validation procedures are done on the phone is present in the database. If
This network topology depicts the this server. A special customized it’s a valid ID, the cell phone is given
integration of 3G wireless systems and authentication is to be installed which an IP address. If not, the cell phone is
802.11 WLAN. The function of the will verify the validity of the user to use denied association. The database stored
WLAN is to keep the 3G devices con- the network resources. It also contains on the LAN server contains four entries.
nected to the other various networks. the database, which has a map of the They are:
They can be LANs, data networks, telephone numbers to the IP addresses. 1. Cell phone ID
PSTNs or other 3G networks. The way WLAN: It includes the LAN interface 2. Cell phone number given by the
this network system works is shown in with the access points and the distribu- commercial service provider
the Fig. 1 protocol stack. tion system. It implements the standard 3. Office number mapped on to this
Here the LAN server is the interface CSMA/CD protocol. Here we assume device
between the corporate network and the that we have dedicated access points for 4. IP address
external public network. Actually, there the 3G devices to carry voice and data. The database has the format shown
is a small element that directly interacts 3G devices: These can be any in Table 1. The location of the user in
with the outside world. It is the switch IP–enabled 3G systems such as cell the CN—which cell the user belongs
(discussed in the next section). The phones, PDAs, etc. But for this discus- to—is also updated. This information is
LAN server handles the data coming sion, we mainly focus on cell phones. not stored in this database but in a sep-
arate management database.
Table 1 The structure of the database can vary
and is implementation dependent. We
ID Cell Phone No. Office No. IP address show an example of how such a data-
base may look. Every corporate network
989721003 215-001-009 654-129-4533 192.168.0.99 can add more details for security and/or
187352920 543-976-275 654-129-4534 192.168.0.100
can integrate these details in already
existing management databases.
from the outside network and interprets These phones are registered on the cor- Registration with the Home Network:
it into the format of the corporate net- porate network by some authorized After the cell phone gets associated with
work. Since 3G devices are IP–based, entity; e.g., the system administrator. the CN, it must register the change in its
the external data in converted to Voice They communicate with the Access location and IP address to the home net-
Over Internet Protocol (VOIP) packets. Point (AP) over the radio interface. work. This has to be done so that calls
In this format, the end devices can for the subscriber are directed towards
access the data, i.e. voice. Basic operations the CN. One very important note, we
3G devices are used as the end system There are three basic operations that assume that the 3G switch can interface
because they can operate on the unli- occur very frequently and are important with the commercial 3G service provider.
censed 2.4 GHz frequency used by the to the operation of 3G phones over the That is, there is an agreed upon collabo-
WLAN. Also, since they are IP enabled, WLAN. They are: ration between the two switching centers
they are compatible with the TCP/IP net- 1. Association—getting connected to to send updates of user information.
work stack. The bandwidth requirements the corporate network The switch then makes a session
of WLAN and 3G are also compatible, 2. Registration with Home with the external switching center and
since 802.11b assures a maximum band- Network—registering the cell phone on informs it that their subscriber is in the

OCTOBER/NOVEMBER 2004 11
CN with some IP address. If it is the 3G to PSTN (Outgoing Call)
home agent, then it will update its data-
3G Cell Phone LAN Server PBX/3G Switch
base as the subscriber’s foreign network.
If it is the foreign network, then it will Request for Call Setup
forward the request to the home net-
Authentication
work to update its database.
Example: Assume that a subscriber is Error: Ignore To PSTN
a customer of ABC telecom systems. It Forward Request to PBX
gets an IP address from its home net- From PSTN
work. If the subscriber moves to a for- Forward to LAN Server
eign network, the home network is Authentication
made aware of this venture. This for-
eign network is directly connected to Error: Ignore
Make Call
the CN’s 3G switch. When this customer
gets associated with the CN, then the
request is sent to the foreign agent, PSTN to 3G (Incoming Call)
which in turn forwards to the home
PSTN PBX LAN Server
agent in the home network the cus- Request for Call Setup
tomer’s new network. Forward Request
When the subscriber leaves the cor- Check
porate network, the PBX informs the Data/Integrity
MTSO that the user has changed net- Error: Ignore
Authentication
works. The MTSO then might restore
the state of the user to what he or she Error: Ignore To 3G Phone
held prior to joining the corporate net-
work. Even if the subscriber switches From 3G Phone
OFF the cell phone, the same proce- Authentication
dure is applied since the neither the AP Response for Call Setup Error: Ignore
nor the PBX can distinguish this situa- Fig. 3 Forward Reply
tion: whether the user is outside the
network or the cell phone is OFF.
Call setup: When a call comes at the
inbound interface of the switch, the end replies, he or she is authenticated user is authenticated. If the user is invalid,
data is switched over to the LAN server. to confirm his or her identity. then the packet is simply dropped.
The LAN server checks the data. This Please note that the PSTN network is 2. Upon validation, the outgoing net-
can be voice or an IP packet. From the used to make an outgoing call, since work information is retrieved. If it is the
data, it authenticates the data by check- the cost of using a PSTN network is PSTN network, then the voice is sent to
ing the destination telephone number. much less than the 3G network. Once the PBX, which in turn forwards it to the
The number is searched in the database the call is setup, the conversion to telephone network.
with the cell phone number, telephone VOIP packets is done. The sequence of 3. If an IP packet is to be formed, then
number or the IP address. If it matches operation for incoming and outgoing this packet is simply forwarded to the 3G
with any one of these, then a VOIP calls in shown in Fig. 3. network through the PBX.
packet is formed and sent back to the Data interchange: When data arrives These procedures are done at a very
switch. The switch then forwards it to from the PBX to the LAN Server the fol- high speed, so the user in the corporate
the appropriate AP. The AP forwards lowing steps are carried out. network thinks he or she is having a con-
the packet to the cell phone. If the cell 1. The data is checked to distinguish tinuous conversation with the person out-
phone is already engaged, then a call whether it is a voice or an IP packet. side the network. Thus, software is need-
waiting or a engaged message is sent Next, the destination ID is extracted. This ed for authentication and data conver-
back to the caller through the switch. can be a telephone number or the IP des- sion, to avoid all the processing delays.
When a user wants to make a call, the tination address. Also, the network hardware and the LAN
voice packet containing the destination 2. With this information, the user is server must be fast enough to carry out
details is sent to the LAN server. The user authenticated and his or her identity is the processing at high speed. This
is authenticated (in the case of error the stored in the database. If it is an invalid process is shown in Fig. 4
user is ignored). The state of the user is user, then the call is ignored.
changed to “engaged” so that no other 3. After validation, if it is voice then a A billing system
person can connect to the user. Thus, the VOIP packet is formed. This VOIP packet Before the deployment of such a
user is in a locked state, and only the is then sent to the AP. If it is a data pack- system, one question that arises, “How
called person can respond to the user. et then it is simply forwarded to the 3G would the cell phone get billed?”
For valid users, the VOIP packet is device. The answer to this is simple and
converted to voice and sent to the PBX. When data arrives at the LAN Server straightforward. The cell phone has two
The PBX then connects the PSTN net- from the WLAN, the following steps are numbers: one is the number obtained
work to the central office to make a call taken. from the commercial service provider,
setup. When the person at the other 1. The VOIP packet is opened and the and the other is the office number that

12 IEEE POTENTIALS
is mapped onto it. If the user in not in usage warrants it and for load balancing. obtain interconnection of their offices
the CN, then the service provider han- Also, protocol converters need to be without any change in infrastructure.
dles the billing cycle. But if the user is extremely efficient for audible conversa-
now registered to the CN, then some tion. A one-way delay of more than 100 Read more about it
issues are to be noted. If he or she gets ms makes it difficult for end users to • Wireless Communication and
a call on the number provided by the converse. Hence, protocol converters Networks – 2nd Edition William
cell phone operator, then the user will must not cause a delay of more than 20 Stallings
be billed by this provider. (He or she ms, since there are other transportation • IEEE 802.11 WLAN Specification -
can get calls on this number, since the overheads involved. http://grouper.ieee.org/groups/802/11/
PBX informs the commercial MTSO Cost. If the existing wireless LAN is • 3rd Generation Partnership Project
about the presence of the user in the loaded, then some new access points 2 – Wireless IP Network Standard -
CN.) But if the user gets a call on his or probably would be needed to cater to 3GPP2 P.S0001-B - Version 1.0.0 -
her office number, then he or she is not the needs of the voice calls. But for most Version Date: October 25, 2002
billed by the provider, since it is like of the corporate networks, the existing • Wireless LAN Access Network
someone calling him or her on his or infrastructure would be suitable for this Architecture for Mobile Operators –
her office land line. system. Designing or buying protocol Juha Ala-Laurila et. al. , Nokia Mobile
When the user is making an outgo- converters for the LAN server can add to Phones, IEEE Communications
ing call, then the number would be the the cost. Users need 3G phones, but Magazine, November 2001
office number. Hence, the office will be they would already have them from their • WLAN as a Complement to GPRS
billed for this call, since all outgoing commercial service providers. Mainten- and 3G Services - Dr Mario Davoli
calls from the office PBX is going ance of servers, wireless phones and Ericsson Australia, White Paper -
through the PSTN network. ensuring security policies is an important Doc. Reference No: EPA/B 2223 158, 27
aspect and must be taken care of for a June 2002
Drawbacks of the smooth running system.
proposed solution About the authors
With the proliferation of wireless gad- Conclusion Azim A. Samjani received his
gets and applications in our daily lives, We have proposed a new solution for Bachelor of Engineering (B.E.) in
there is an increasing tendency to desire integration of 3G and Wireless LAN. This Computer Engineering from University
being connected to public and private architecture and recommendations have of Pune, India in August 2001 and his
networks – both voice and data. We have not been tested in the real world. But, Master of Science in Engineering (M.S.E.)
proposed a new method of using 3G with the available network components in Telecommunications and Networking
phones in public and private networks and standards available, a feasibility test from the University of Pennsylvania in
due to their inherent ability to mesh with was performed to ensure the implemen- May 2004. Contact: azim@computer.org
standard networking technologies. But tation. (Ericsson is working towards a Rahul R. Shetty, Contact: shettre@
with this method comes a price tag in similar implementation, but using all hotmail.com
terms of monetary resources as well as together different technologies.) With Rohit George Mathew, Contact:
changes in infrastructure. Apart from this method, we achieved a reduction in rohitgmathew@yahoo.com
these material investments, social issues the cost of deployment and scalability,
could arise since we envision a different and the employee was “always connect-
way of human – machine interaction. ed” with the same identification and
Acronym glossary
3G 3rd Generation Wireless
Technical issues. First of all, it is nec- standardized technology. Also, this sys-
Systems
essary to use 3G phones. We have tem refrains from legal issues, since it
AP Access Point
designed this system keeping in mind uses unlicensed frequency band. Hence,
the facilities offered by 3G systems. As corporations can deploy this system and BS Base Station
of today, 3G phones are in testing BSS Basic Service Set
mode or being used only by private CN Corporate Network
firms. Hence, it will be awhile before CO Central Office
the masses use it. Voice / IP DS Distribution System
The LAN server is one of the most Packets MTSO Mobile Terminal Switching
important components of this system. Office
The efficiency of the entire system PBX Private Branch eXchange
depends on it. This server can act as a
PSTN Public Switched Telephone
bottleneck for the entire system, if not Authentication Data Base Network
well configured and designed to accu-
TCP/IP Transmission Control
rately meet desired needs. Normally, Protocol/ Internet Protocol
simple LAN servers come with dual VOIP Packets
USB Universal Serial Bus
processors that have more than 2 GHz Data Voice
VOIP Voice over Internet Protocol
that is powerful enough to handle voice IP Packet (IP)
– data operations. But, again, the load
on the server depends on the number of WLAN Wireless Local Area Network
(802.11)
users, other applications running on it
To / From 3G WPBX Wireless Private Branch
and also the amount of memory avail-
LAN Server eXchange
able. More servers can be deployed if Fig. 4

OCTOBER/NOVEMBER 2004 13

View publication stats

S-ar putea să vă placă și