Thursday, 24 January 2013

Network Operating System

 What is a Network Operating System? 

Unlike operating systems, such as Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly.
The two major types of network operating systems are:
  • Peer-to-Peer
  • Client/Server
Nearly all modern networks are a combination of both. The networking design can be considered independent of the servers and workstations that will share it.

Peer-to-Peer

Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers. However, they do not have a file server or a centralized management source (See fig. 1). In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network. Peer-to-peer networks are designed primarily for small to medium local area networks. Nearly all modern desktop operating systems, such as Macintosh OSX, Linux, and Windows, can function as peer-to-peer network operating systems.
Fig. 1. Peer-to-peer network

Advantages of a peer-to-peer network:

  • Less initial expense - No need for a dedicated server.
  • Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer operations.

Disadvantages of a peer-to-peer network:

  • Decentralized - No central repository for files and applications.
  • Security - Does not provide the security available on a client/server network.

Client/Server

Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers (See fig. 2). The file servers become the heart of the system, providing access to resources and providing security. Individual workstations (clients) have access to the resources available on the file servers. The network operating system provides the mechanism to integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location. UNIX/Linux and the Microsoft family of Windows Servers are examples of client/server network operating systems.
Fig. 2. Client/server network

Advantages of a client/server network:

  • Centralized - Resources and data security are controlled through the server.
  • Scalability - Any or all elements can be replaced individually as needs increase.
  • Flexibility - New technology can be easily integrated into system.
  • Interoperability - All components (client/network/server) work together.
  • Accessibility - Server can be accessed remotely and across multiple platforms.

Disadvantages of a client/server network:

  • Expense - Requires initial investment in dedicated server.
  • Maintenance - Large networks will require a staff to ensure efficient operation.
  • Dependence - When server goes down, operations will cease across the network.

Network Operating System Software

The following links include some of the more popular peer-to-peer and client/server network operating systems.
  • Macintosh OS X
  • Microsoft Windows Server
  • UNIX/Linux

Advantages/Disadvantages of wireless networks

Advantages of wireless networks:

  • Mobility - With a laptop computer or mobile device, access can be available throughout a school, at the mall, on an airplane, etc. More and more businesses are also offering free WiFi access ("Hot spots").
  • Fast setup - If your computer has a wireless adapter, locating a wireless network can be as simple as clicking "Connect to a Network" -- in some cases, you will connect automatically to networks within range.
  • Cost - Setting up a wireless network can be much more cost effective than buying and installing cables.
  • Expandability - Adding new computers to a wireless network is as easy as turning the computer on (as long as you do not exceed the maximum number of devices).

Disadvantages of wireless networks:

  • Security - Be careful. Be vigilant. Protect your sensitive data with backups, isolated private networks, strong encryption and passwords, and monitor network access traffic to and from your wireless network.
  • Interference - Because wireless networks use radio signals and similar techniques for transmission, they are susceptible to interference from lights and electronic devices.
  • Inconsistent connections - How many times have you hears "Wait a minute, I just lost my connection?" Because of the interference caused by electrical devices and/or items blocking the path of transmission, wireless connections are not nearly as stable as those through a dedicated cable.
  • Speed - The transmission speed of wireless networks is improving; however, faster options (such as gigabit Ethernet) are available via cables. If you are only using wireless for internet access, the actual internet connection for your home or school is generally slower than the wireless network devices, so that connection is the bottleneck. If you are also moving large amounts of data around a private network, a cabled connection will enable that work to proceed much faster.

Network Cabling

What is Network Cabling?

Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network.
The following sections discuss the types of cables used in networks and other related topics.
  • Unshielded Twisted Pair (UTP) Cable
  • Shielded Twisted Pair (STP) Cable
  • Coaxial Cable
  • Fiber Optic Cable
  • Cable Installation Guides
  • Wireless LANs
  • Unshielded Twisted Pair (UTP) Cable
Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks (See fig. 1).
Fig.1. Unshielded twisted pair
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has established standards of UTP and rated six categories of wire (additional categories are emerging).

Categories of Unshielded Twisted Pair

Category Speed Use
1 1 Mbps Voice Only (Telephone Wire)
2 4 Mbps LocalTalk & Telephone (Rarely used)
3 16 Mbps 10BaseT Ethernet
4 20 Mbps Token Ring (Rarely used)
5 100 Mbps (2 pair) 100BaseT Ethernet
1000 Mbps (4 pair) Gigabit Ethernet
5e 1,000 Mbps Gigabit Ethernet
6 10,000 Mbps Gigabit Ethernet

Unshielded Twisted Pair Connector

The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector (See fig. 2). A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying that the connector follows a standard borrowed from the telephone industry. This standard designates which wire goes with each pin inside the connector.
Fig. 2. RJ-45 connector

Shielded Twisted Pair (STP) Cable

Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If you must place cable in environments with lots of potential interference, or if you must place cable in extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the maximum distance of the cables.
Shielded twisted pair cable is available in three different configurations:
  1. Each pair of wires is individually shielded with foil.
  2. There is a foil or braid shield inside the jacket covering all wires (as a group).
  3. There is a shield around each individual pair, as well as around the entire group of wires (referred to as double shield twisted pair).

Coaxial Cable

Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield (See fig. 3). The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.
Fig. 3. Coaxial cable
Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial.
Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable has been popular in school networks, especially linear bus networks.
Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult to install.

Coaxial Cable Connectors

The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector (See fig. 4). Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest points in any network. To help avoid problems with your network, always use the BNC connectors that crimp, rather screw, onto the cable.
Fig. 4. BNC connector

Fiber Optic Cable

Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials (See fig. 5). It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals.
The center core of fiber cables is made from glass or plastic fibers (see fig 5). A plastic coating then cushions the fiber center, and kevlar fibers help to strengthen the cables and prevent breakage. The outer insulating jacket made of teflon or PVC.
Fig. 5. Fiber optic cable
There are two common types of fiber cables -- single mode and multimode. Multimode cable has a larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can provide more distance, but it is more expensive.

Specification Cable Type
10BaseT Unshielded Twisted Pair
10Base2 Thin Coaxial
10Base5 Thick Coaxial
100BaseT Unshielded Twisted Pair
100BaseFX Fiber Optic
100BaseBX Single mode Fiber
100BaseSX Multimode Fiber
1000BaseT Unshielded Twisted Pair
1000BaseFX Fiber Optic
1000BaseBX Single mode Fiber
1000BaseSX Multimode Fiber

Installing Cable - Some Guidelines

When running cable, it is best to follow a few simple rules:
  • Always use more cable than you need. Leave plenty of slack.
  • Test every part of a network as you install it. Even if it is brand new, it may have problems that will be difficult to isolate later.
  • Stay at least 3 feet away from fluorescent light boxes and other sources of electrical interference.
  • If it is necessary to run cable across the floor, cover the cable with cable protectors.
  • Label both ends of each cable.
  • Use cable ties (not tape) to keep cables in the same location together.

Wireless LANs

More and more networks are operating without cables, in the wireless mode. Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate between the workstations, servers, or hubs. Each workstation and file server on a wireless network has some sort of transceiver/antenna to send and receive the data. Information is relayed between transceivers as if they were physically connected. For longer distance, wireless communications can also take place through cellular telephone technology, microwave transmission, or by satellite.
Wireless networks are great for allowing laptop computers, portable devices, or remote computers to connect to the LAN. Wireless networks are also beneficial in older buildings where it may be difficult or impossible to install cables.
The two most common types of infrared communications used in schools are line-of-sight and scattered broadcast. Line-of-sight communication means that there must be an unblocked direct line between the workstation and the transceiver. If a person walks within the line-of-sight while there is a transmission, the information would need to be sent again. This kind of obstruction can slow down the wireless network. Scattered infrared communication is a broadcast of infrared transmissions sent out in multiple directions that bounces off walls and ceilings until it eventually hits the receiver. Networking communications with laser are virtually the same as line-of-sight infrared networks.

Wireless standards and speeds

The Wi-Fi Alliance is a global, non-profit organization that helps to ensure standards and interoperability for wireless networks, and wireless networks are often referred to as WiFi (Wireless Fidelity). The original Wi-Fi standard (IEEE 802.11) was adopted in 1997. Since then many variations have emerged (and will continue to emerge). Wi-Fi networks use the Ethernet protocol.
Standard Max Speed Typical Range
802.11a 54 Mbps 150 feet
802.11b 11 Mbps 300 feet
802.11g 54 Mbps 300 feet
802.11n 100 Mbps 300+ feet

Wireless Security

Wireless networks are much more susceptible to unauthorized use than cabled networks. Wireless network devices use radio waves to communicate with each other. The greatest vulnerability to the network is that rogue machines can "eves-drop" on the radio wave communications. Unencrypted information transmitted can be monitored by a third-party, which, with the right tools (free to download), could quickly gain access to your entire network, steal valuable passwords to local servers and online services, alter or destroy data, and/or access personal and confidential information stored in your network servers. To minimize the possibility of this, all modern access points and devices have configuration options to encrypt transmissions. These encryption methodologies are still evolving, as are the tools used by malicious hackers, so always use the strongest encryption available in your access point and connecting devices.
A NOTE ON ENCRYPTION: As of this writing WEP (Wired Equivalent Privacy) encryption can be easily hacked with readily-available free tools which circulate the internet. WPA and WPA2 (WiFi Protected Access versions 1 and 2) are much better at protecting information, but using weak passwords or passphrases when enabling these encryptions may allow them to be easily hacked. If your network is running WEP, you must be very careful about your use of sensitive passwords or other data.
Three basic techniques are used to protect networks from unauthorized wireless use. Use any and all of these techniques when setting up your wireless access points:
Encryption.
Enable the strongest encryption supported by the devices you will be connecting to the network. Use strong passwords (strong passwords are generally defined as passwords containing symbols, numbers, and mixed case letters, at least 14 characters long).
Isolation.
Use a wireless router that places all wireless connections on a subnet independent of the primary private network. This protects your private network data from pass-through internet traffic.
Hidden SSID.
Every access point has a Service Set IDentifier (SSID) that by default is broadcast to client devices so that the access point can be found. By disabling this feature, standard client connection software won't be able to "see" the access point. However, the eves-dropping programs discussed previously can easily find these access points, so this alone does little more than keep the access point name out of sight for casual wireless users.

Thursday, 17 January 2013

What is Networking Hardware?

Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the network. CLICK on the terms below to learn more about those pieces of networking hardware.
  • Workstations
  • Hubs
  • Bridges
  • Firewalls
  • Routers
  • FileServers
  • Repeaters
This needs to be a sprite
This section provides information on the following components:
  • Network Servers
  • Workstations
  • Network Interface Cards
  • Switches
  • Repeaters
  • Bridges
  • Routers
  • Firewalls

File/Network Servers

One or more network servers is a part of nearly every local area network.These are very fast computers with a large amount of RAM and storage space, along with a one or more fast network interface card(s). The network operating system provides tools to share server resources and information with network users. A sophisticated permissions-handling system is included, so that access to sensitive information can be carefully tailored to the needs of the users. For small networks, a singe network server may provide access control, file sharing, printer sharing, email, database, and other services.
The network server may be responding to requests from many network users simultaneously. For example, it may be asked to load a word processor program to one workstation, receive a database file from another workstation, and store an e-mail message during the same time period. This requires a computer that can store and quickly share large amounts of information. When configuring such a server, budget is usually the controlling factor. The following guidelines should be followed:
  • Fastest processor(s)
  • Large amount of RAM
  • multiple large, fast hard drives
  • Extra expansion slots
  • Fast network interface card(s)
Optionally (if no other such devices are available on the network):
  • A RAID (Redundant Array of Inexpensive Disks) to preserve large amounts of data(even after a disk failure)
  • A back-up unit (i.e. DAT tape drive, removable hard drives, or CD/DVD/BluRay burner)

Workstations

Computers that humans use are broadly categorized as workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables. Workstations do not necessarily need large storage hard drives, because files can be saved on the file server. Almost any computer can serve as a network workstation.

Laptops/Mobile Devices

Laptops and other mobile devices are becoming more and more common. These devices typically have modest internal storage, but enough power to serve as a workstation for users on the go. These machines nearly always have a wireless adapter to allow quick network connections without cumbersome cabling. In a school environment with good wireless coverage, a mobile device user can move about the campus freely, and remain continuously connected to the network.

Network Interface Cards

The network interface card (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, and they are included in the purchase of most computers. Network interface cards are a major factor in determining the speed and performance of a network. It is a good idea to use the fastest network card available for the type of workstation you are using.
The most common network interface connections are Ethernet cards and wireless adapters.

Ethernet Cards

Ethernet cards are usually included with a computer, although additional ethernet cards can be purchased and installed on most computers,. Ethernet cards can contain connections for either coaxial or twisted pair cables (or both) (See fig. 1). If it is designed for coaxial cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection. Some Ethernet cards also contain an AUI connector. This can be used to attach coaxial, twisted pair, or fiber optics cable to an Ethernet card. When this method is used there is always an external transceiver attached to the workstation. Only the RJ-45 connector is found on most modern ethernet cards (See the Cabling section for more information on connectors.)
Fig. 1. Ethernet card.
From top to bottom:
RJ-45, AUI, and BNC connectors

Wireless Adapters

Wireless adapters are found in most portable devices, such as laptops, smart phones, and tablet devices. External wireless adapters can be purchased and installed on most computers having an open USB (Universal Serial Bus) port, or unused expansion slot. (See the Cabling section for more information on connectors.)

Switches

An ethernet switch is a device that provides a central connection point for cables from workstations, servers, and peripherals. In a star topology, twisted-pair wire is run from each workstation to a central switch/hub. Most switches are active, that is they electrically amplify the signal as it moves from one device to another. The predecessor of the switch was the hub, which broadcasted all inbound packets out all ports of the device, creating huge amounts of unnecessary network traffic. Modern switches build a port map of all IP address which respond on each port, and only broadcasts on all ports when it doesn't have a packet's target IP address already in its port map. Switches are:
  • Usually configured with 8, 12, or 24 RJ-45 ports
  • Often used in a star or tree topology
  • Available as "managed" or "unmanaged", with the later less expensive, but adequate for smaller networks
  • direct replacements for hubs, immediately reducing network traffic in most networks
  • Usually installed in a standardized metal rack that also may store network servers, bridges, or routers

Repeaters

Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a concentrator. They are used when the total length of your network cable exceeds the standards set for the type of cable being used.
A good example of the use of repeaters would be in a local area network using a star topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100 meters. The most common configuration is for each workstation to be connected by twisted-pair cable to a multi-port active concentrator. The concentrator amplifies all the signals that pass through it allowing for the total length of cable on the network to exceed the 100 meter limit.

Bridges

A bridge is a device that allows you to segment a large network into two smaller, more efficient networks. If you are adding to an older wiring scheme and want the new network to be up-to-date, a bridge can connect the two.
A bridge monitors the information traffic on both sides of the network so that it can pass packets of information to the correct location. Most bridges can "listen" to the network and automatically figure out the address of each computer on both sides of the bridge. The bridge can inspect each message and, if necessary, broadcast it on the other side of the network.
The bridge manages the traffic to maintain optimum performance on both sides of the network. You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps information flowing on both sides of the network, but it does not allow unnecessary traffic through. Bridges can be used to connect different types of cabling, or physical topologies. They must, however, be used between networks with the same protocol.

Routers

Routers are the traffic directors of the global internet. All routers maintain complex routing tables which allow them to determine appropriate paths for packets destined for any address. Routers communicate with each other, and forward network packets out of or into a network. Here's an example:
You want to search for something on the internet using a search engine. You open a browser on your workstation. The browser opens to a blank page (not usually the default, but appropriate for this example). You type "http://www.google.com" into the URL (Universal Resource Locator) address line of the browser. The browser software packages up the URL you typed, and sends it with a request for an IP address to the DNS (Domain Name Server) that has been set in your network adapter's configuration. The domain server returns an IP, such as 74.125.67.103 (actual address returned by DNS for google.com on June 7th, 2011). The browser ships the request for that IP address off to the network card, which bundles the request into an ethernet packet, destined for 74.125.67.103. The network card sends the packet to the gateway of your network, which opens the header of the packet, and makes a determination that the packet is traveling out of your network, in search of 74.125.67.103. Your network's router has routing tables which it has been building from communicating with other routers, and potentially augmented with "static routes", which are specific paths added by your network's administrators to make the task of accessing certain networks easier, or faster, or in some cases, not possible. In this case, I find that my router knows about another router at my ISP(Internet Service Provider), which in turn has several more routers that are all on networks of which I am just a small node, much like finding an atom of a molecule of a piece of dust on a rock on a moon of a planet of a sun of a galaxy of the universe. In any case, the packet gets passed from router to router, each time moving out of the subnets of the packet sender, towards a router that will know where the desired server is. The packet finally reaches the router of the network at 74.125.67.103, which dutifully delivers the packet to the server at that IP address. The server carefully crafts a response, and sends a reply back, which follows the same process to get the response "Yes. Go ahead" back to the requester. Whew. And that's just the initial request.
While bridges know the addresses of all computers on each side of the network, routers know the addresses other routers which in turn know about their own networks. Routers can even "listen" to entire networks to determine which sections are busiest -- they can then redirect data around those sections until traffic congestion clears.
So, routers are network gateways. They move network packets from one network to another, and many can convert from one network protocol to another as necessary. Routers select the best path to route a message, based on the destination address of the packet. The router can direct traffic to prevent head-on collisions, and is smart enough to know when to direct traffic along back roads and shortcuts.
If you have a school LAN that you want to connect to the Internet, you will need to purchase a router. In this case, the router serves as the forwarder between the information on your LAN and the Internet. It also determines the best route to send the data over the Internet.

Firewalls

A firewall is a networking device that is installed at the entrance to a LAN when connecting a networks together, particularly when connecting a private network to a public network, such as the internet. The firewall uses rules to filter traffic into and out of the private network, to protect the private network users and data from malevolent hackers.
Firewalls are either hardware or software, depending on their intended use. A firewall used to protect a network is a hardware device that should be installed in the network between the router and the network. Almost all hardware firewalls will have at least two ports, labeled "Trusted" and "Untrusted". These terms imply the true nature of the firewall's responsibility to the private network. The public network is connected to the untrusted network port, and the private network is connected to the trusted port.
Firewall rules are usually simple, consisting of a verb, either allow or deny, the direction of the traffic, either inbound or outbound, and an address or other network traffic identifier. Firewall rules are cumulative, so general rules may be specified, and exceptions added as necessary. Some examples are:
  • Allow outbound all (all private network users can do anything on the public network)
  • Deny inbound all (default setting to prevent all traffic from the public or untrusted port, to the private port)
  • Allow inbound port 80 (allow internet web traffic to come into network to find web servers)
  • Allow inbound port 80 destined to 170.200.201.25 (allow inbound web traffic to a specific web server on your private network)
  • Deny inbound from 201.202.1.1/24 (deny all inbound traffic from a specific IP address or range of addresses)
Software firewalls are commonly included in modern workstation and server operating systems. They operate in a similar way as hardware firewalls, except that they filter traffic in and out of the machine itself. These software firewalls are typically unnoticed by machine users, and only need attention occasionslly when an internet-connected application don't work as expected. The software firewall should always be considered a "suspect" in such cases. The problem is easily resolved, by setting an exception rule in the firewall for the software that is attempting to communicate.
Florida Center for Instructional Technology
College of Education,
University of South Florida,
4202 E. Fowler Ave., EDU162
Tampa, Florida 33620
813.974.1640
Dr. Roy Winkelman, Director
This publication was produced under a grant from the Florida Department of Education.
The information contained in this document is based on information available at the time of publication and is subject to change. Although every reasonable effort has been made to include accurate information, the Florida Center for Instructional Technology makes no warranty of claims as to the accuracy, completeness, or fitness for any particular purpose of the information provided herein. Nothing herein shall be construed as a recommendation to use any product or service in violation of existing patents or rights of third parties.

What is a Protocol?

A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. The OSI (Open Systems Interconnection) Reference Model defines seven layers of networking protocols. The complexity of these layers is beyond the scope of this tutorial; however, they can be simplified into four layers to help identify some of the protocols with which you should be familiar (see fig 1).
OSI Layer Name Common Protocols
7 Application HTTP | FTP | SMTP | DNS | Telnet
6 Presentation
5 Session
4 Transport TCP | SPX
3 Network IP | IPX
2 Data Link Ethernet
1 Physical
Fig 1. OSI model related to common network protocols
Figure 1 illustrates how some of the major protocols would correlate to the OSI model in order to communicate via the Internet. In this model, there are four layers, including:
  • Ethernet (Physical/Data Link Layers)
  • IP/IPX (Network Layer)
  • TCP/SPX (Transport Layer)
  • HTTP, FTP, Telnet, SMTP, and DNS(combined Session/Presentation/Application Layers)
Assuming you want to send an e-mail message to someone in Italy, we will examine the layers "from the bottom up" -- beginning with Ethernet (physical/data link layers).

Ethernet (Physical/Data Link Layers)

The physical layer of the network focuses on hardware elements, such as cables, repeaters, and network interface cards. By far the most common protocol used at the physical layer is Ethernet. For example, an Ethernet network (such as 10BaseT or 100BaseTX) specifies the type of cables that can be used, the optimal topology (star vs. bus, etc.), the maximum length of cables, etc. (See the Cabling section for more information on Ethernet standards related to the physical layer).
The data link layer of the network addresses the way that data packets are sent from one node to another. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network.

Ethernet

The original Ethernet standard was developed in 1983 and had a maximum speed of 10 Mbps (phenomenal at the time) over coaxial cable. The Ethernet protocol allows for bus, star, or tree topologies, depending on the type of cables used and other factors. This heavy coaxial cabling was expensive to purchase, install, and maintain, and very difficult to retrofit into existing facilities.
The current standards are now built around the use of twisted pair wire. Common twisted pair standards are 10BaseT, 100BaseT, and 1000BaseT. The number (10, 100, 1000) ands for the speed of transmission (10/100/1000 megabits per second); the "Base" stands for "baseband" meaning it has full control of the wire on a single frequency; and the "T" stands for "twisted pair" cable. Fiber cable can also be used at this level in 10BaseFL.

Fast Ethernet

The Fast Ethernet protocol supports transmission up to 100 Mbps. Fast Ethernet requires the use of different, more expensive network concentrators/hubs and network interface cards. In addition, category 5 twisted pair or fiber optic cable is necessary. Fast Ethernet standards include:
  • 100BaseT - 100 Mbps over 2-pair category 5 or better UTP cable.
  • 100BaseFX - 100 Mbps over fiber cable.
  • 100BaseSX -100 Mbps over multimode fiber cable.
  • 100BaseBX - 100 Mbps over single mode fiber cable.

Gigabit Ethernet

Gigabit Ethernet standard is a protocol that has a transmission speed of 1 Gbps (1000 Mbps). It can be used with both fiber optic cabling and copper. (see the Cabling section for more information).
  • 1000BaseT - 1000 Mbps over 2-pair category 5 or better UTP cable.
  • 1000BaseTX - 1000 Mbps over 2-pair category 6 or better UTP cable.
  • 1000BaseFX - 1000 Mbps over fiber cable.
  • 1000BaseSX -1000 Mbps over multimode fiber cable.
  • 1000BaseBX - 1000 Mbps over single mode fiber cable.
The Ethernet standards continue to evolve. with 10 Gigabit Ethernet (10,000 Mbps) and 100 Gigabit Ethernet (100,000 Mbps),

Ethernet Protocol Summary

Protocol Cable Speed
Ethernet Twisted Pair, Coaxial, Fiber 10 Mbps
Fast Ethernet Twisted Pair, Fiber 100 Mbps
Gigabit Ethernet Twisted Pair, Fiber 1000 Mbps

Older Network Protocols

Several very popular network protocols, commonly used in the 90's and early 21st century have now largely fallen into disuse. While you may hear terms from time to time, such as "Localtalk" (Apple) or "Token Ring" (IBM), you will rarely find these systems still in operation. Although they played an important role in the evolution of networking, their performance and capacity limitations have relegated them to the past, in the wake of the standardization of Ethernet driven by the success of the Internet.

IP and IPX (Network Layer)

The network layer is in charge of routing network messages (data) from one computer to another. The common protocols at this layer are IP (which is paired with TCP at the transport layer for Internet network) and IPX (which is paired with SPX at the transport layer for some older Macintosh, Linus, UNIX, Novell and Windows networks). Because of the growth in Internet-based networks, IP/TCP are becoming the leading protocols for most networks.
Every network device (such as network interface cards and printers) have a physical address called a MAC (Media Access Control) address. When you purchase a network card, the MAC address is fixed and cannot be changed. Networks using the IP and IPX protocols assign logical addresses (which are made up of the MAC address and the network address) to the devices on the network, This can all become quite complex -- suffice it to say that the network layer takes care of assigning the correct addresses (via IP or IPX) and then uses routers to send the data packets to other networks.

TCP and SPX (Transport Layer)

The transport layer is concerned with efficient and reliable transportation of the data packets from one network to another. In most cases, a document, e-mail message or other piece of information is not sent as one unit. Instead, it is broken into small data packets, each with header information that identifies its correct sequence and document.
When the data packets are sent over a network, they may or may not take the same route -- it doesn't matter. At the receiving end, the data packets are re-assembled into the proper order. After all packets are received, a message goes back to the originating network. If a packet does not arrive, a message to "re-send" is sent back to the originating network.
TCP, paired with IP, is by far the most popular protocol at the transport level. If the IPX protocol is used at the network layer (on networks such as Novell or Microsoft), then it is paired with SPX at the transport layer.

HTTP, FTP, SMTP and DNS (Session/Presentation/Application Layers)

Several protocols overlap the session, presentation, and application layers of networks. There protocols listed below are a few of the more well-known:
  • DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain Names) and vice-versa
  • DHCP - Dynamic Host Configuration Protocol - can automatically assign Internet addresses to computers and users
  • FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on the Internet
  • HTTP - HyperText Transfer Protocol - An Internet-based protocol for sending and receiving webpages
  • IMAP - Internet Message Access Protocol - A protocol for e-mail messages on the Internet
  • IRC - Internet Relay Chat - a protocol used for Internet chat and other communications
  • POP3 - Post Office protocol Version 3 - a protocol used by e-mail clients to retrieve messages from remote servers
  • SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Internet
Florida Center for Instructional Technology
College of Education,
University of South Florida,
4202 E. Fowler Ave., EDU162
Tampa, Florida 33620
813.974.1640
Dr. Roy Winkelman, Director
This publication was produced under a grant from the Florida Department of Education.
The information contained in this document is based on information available at the time of publication and is subject to change. Although every reasonable effort has been made to include accurate information, the Florida Center for Instructional Technology makes no warranty of claims as to the accuracy, completeness, or fitness for any particular purpose of the information provided herein. Nothing herein shall be construed as a recommendation to use any product or service in violation of existing patents or rights of third parties

What is a Network?

A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
Two very common types of networks include:
  • Local Area Network (LAN)
  • Wide Area Network (WAN)
You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN).

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building.
Computers connected to a network are broadly categorized as servers or workstations. Servers are generally not used by humans directly, but rather run continuously to provide "services" to the other computers (and their human users) on the network. Services provided can include printing and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval, complete access control (security) for the network's resources, and many others.
Workstations are called such because they typically do have a human user which interacts with the network through them. Workstations were traditionally considered a desktop, consisting of a computer, keyboard, display, and mouse, or a laptop, with with integrated keyboard, display, and touchpad. With the advent of the tablet computer, and the touch screen devices such as iPad and iPhone, our definition of workstation is quickly evolving to include those devices, because of their ability to interact with the network and utilize network services.
Servers tend to be more powerful than workstations, although configurations are guided by needs. For example, a group of servers might be located in a secure area, away from humans, and only accessed through the network. In such cases, it would be common for the servers to operate without a dedicated display or keyboard. However, the size and speed of the server's processor(s), hard drive, and main memory might add dramatically to the cost of the system. On the other hand, a workstation might not need as much storage or working memory, but might require an expensive display to accommodate the needs of its user. Every computer on a network should be appropriately configured for its use.
On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless access to a wired network is made possible by wireless access points (WAPs). These WAP devices provide a bridge between computers and networks. A typical WAP might have the theoretical capacity to connect hundreds or even thousands of wireless users to a network, although practical capacity might be far less.
Nearly always servers will be connected by cables to the network, because the cable connections remain the fastest. Workstations which are stationary (desktops) are also usually connected by a cable to the network, although the cost of wireless adapters has dropped to the point that, when installing workstations in an existing facility with inadequate wiring, it can be easier and less expensive to use wireless for a desktop.
See the Topology, Cabling, and Hardware sections of this tutorial for more information on the configuration of a LAN.

Wide Area Network

Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time. A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN.

Advantages of Installing a School Network

User access control.
Modern networks almost always have one or more servers which allows centralized management for users and for network resources to which they have access. User credentials on a privately-owned and operated network may be as simple as a user name and password, but with ever-increasing attention to computing security issues, these servers are critical to ensuring that sensitive information is only available to authorized users.
Information storing and sharing.
Computers allow users to create and manipulate information. Information takes on a life of its own on a network. The network provides both a place to store the information and mechanisms to share that information with other network users.
Connections.
Administrators, instructors, and even students and guests can be connected using the campus network.
Services.
The school can provide services, such as registration, school directories, course schedules, access to research, and email accounts, and many others. (Remember, network services are generally provided by servers).
Internet.
The school can provide network users with access to the internet, via an internet gateway.
Computing resources.
The school can provide access to special purpose computing devices which individual users would not normally own. For example, a school network might have high-speed high quality printers strategically located around a campus for instructor or student use.
Flexible Access.
School networks allow students to access their information from connected devices throughout the school. Students can begin an assignment in their classroom, save part of it on a public access area of the network, then go to the media center after school to finish their work. Students can also work cooperatively through the network.
Workgroup Computing.
Collaborative software allows many users to work on a document or project concurrently. For example, educators located at various schools within a county could simultaneously contribute their ideas about new curriculum standards to the same document, spreadsheets, or website.

Disadvantages of Installing a School Network

Expensive to Install.
Large campus networks can carry hefty price tags. Cabling, network cards, routers, bridges, firewalls, wireless access points, and software can get expensive, and the installation would certainly require the services of technicians. But, with the ease of setup of home networks, a simple network with internet access can be setup for a small campus in an afternoon.
Requires Administrative Time.
Proper maintenance of a network requires considerable time and expertise. Many schools have installed a network, only to find that they did not budget for the necessary administrative support.
Servers Fail.
Although a network server is no more susceptible to failure than any other computer, when the files server "goes down" the entire network may come to a halt. Good network design practices say that critical network services (provided by servers) should be redundant on the network whenever possible.
Cables May Break.
The Topology chapter presents information about the various configurations of cables. Some of the configurations are designed to minimize the inconvenience of a broken cable; with other configurations, one broken cable can stop the entire network.
Security and compliance.
Network security is expensive. It is also very important. A school network would possibly be subject to more stringent security requirements than a similarly-sized corporate network, because of its likelihood of storing personal and confidential information of network users, the danger of which can be compounded if any network users are minors. A great deal of attention must be paid to network services to ensure all network content is appropriate for the network community it serves.
Florida Center for Instructional Technology
College of Education,
University of South Florida,
4202 E. Fowler Ave., EDU162
Tampa, Florida 33620
813.974.1640
Dr. Roy Winkelman, Director
This publication was produced under a grant from the Florida Department of Education.
The information contained in this document is based on information available at the time of publication and is subject to change. Although every reasonable effort has been made to include accurate information, the Florida Center for Instructional Technology makes no warranty of claims as to the accuracy, completeness, or fitness for any particular purpose of the information provided herein. Nothing herein shall be construed as a recommendation to use any product or service in violation of existing patents or rights of third parties.

What is a Network?

A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
Two very common types of networks include:
  • Local Area Network (LAN)
  • Wide Area Network (WAN)
You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN).

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building.
Computers connected to a network are broadly categorized as servers or workstations. Servers are generally not used by humans directly, but rather run continuously to provide "services" to the other computers (and their human users) on the network. Services provided can include printing and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval, complete access control (security) for the network's resources, and many others.
Workstations are called such because they typically do have a human user which interacts with the network through them. Workstations were traditionally considered a desktop, consisting of a computer, keyboard, display, and mouse, or a laptop, with with integrated keyboard, display, and touchpad. With the advent of the tablet computer, and the touch screen devices such as iPad and iPhone, our definition of workstation is quickly evolving to include those devices, because of their ability to interact with the network and utilize network services.
Servers tend to be more powerful than workstations, although configurations are guided by needs. For example, a group of servers might be located in a secure area, away from humans, and only accessed through the network. In such cases, it would be common for the servers to operate without a dedicated display or keyboard. However, the size and speed of the server's processor(s), hard drive, and main memory might add dramatically to the cost of the system. On the other hand, a workstation might not need as much storage or working memory, but might require an expensive display to accommodate the needs of its user. Every computer on a network should be appropriately configured for its use.
On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless access to a wired network is made possible by wireless access points (WAPs). These WAP devices provide a bridge between computers and networks. A typical WAP might have the theoretical capacity to connect hundreds or even thousands of wireless users to a network, although practical capacity might be far less.
Nearly always servers will be connected by cables to the network, because the cable connections remain the fastest. Workstations which are stationary (desktops) are also usually connected by a cable to the network, although the cost of wireless adapters has dropped to the point that, when installing workstations in an existing facility with inadequate wiring, it can be easier and less expensive to use wireless for a desktop.
See the Topology, Cabling, and Hardware sections of this tutorial for more information on the configuration of a LAN.

Wide Area Network

Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two users a half-world apart with workstations equipped with microphones and a webcams might teleconference in real time. A WAN is complicated. It uses multiplexers, bridges, and routers to connect local and metropolitan networks to global communications networks like the Internet. To users, however, a WAN will not appear to be much different than a LAN.

Advantages of Installing a School Network

User access control.
Modern networks almost always have one or more servers which allows centralized management for users and for network resources to which they have access. User credentials on a privately-owned and operated network may be as simple as a user name and password, but with ever-increasing attention to computing security issues, these servers are critical to ensuring that sensitive information is only available to authorized users.
Information storing and sharing.
Computers allow users to create and manipulate information. Information takes on a life of its own on a network. The network provides both a place to store the information and mechanisms to share that information with other network users.
Connections.
Administrators, instructors, and even students and guests can be connected using the campus network.
Services.
The school can provide services, such as registration, school directories, course schedules, access to research, and email accounts, and many others. (Remember, network services are generally provided by servers).
Internet.
The school can provide network users with access to the internet, via an internet gateway.
Computing resources.
The school can provide access to special purpose computing devices which individual users would not normally own. For example, a school network might have high-speed high quality printers strategically located around a campus for instructor or student use.
Flexible Access.
School networks allow students to access their information from connected devices throughout the school. Students can begin an assignment in their classroom, save part of it on a public access area of the network, then go to the media center after school to finish their work. Students can also work cooperatively through the network.
Workgroup Computing.
Collaborative software allows many users to work on a document or project concurrently. For example, educators located at various schools within a county could simultaneously contribute their ideas about new curriculum standards to the same document, spreadsheets, or website.

Disadvantages of Installing a School Network

Expensive to Install.
Large campus networks can carry hefty price tags. Cabling, network cards, routers, bridges, firewalls, wireless access points, and software can get expensive, and the installation would certainly require the services of technicians. But, with the ease of setup of home networks, a simple network with internet access can be setup for a small campus in an afternoon.
Requires Administrative Time.
Proper maintenance of a network requires considerable time and expertise. Many schools have installed a network, only to find that they did not budget for the necessary administrative support.
Servers Fail.
Although a network server is no more susceptible to failure than any other computer, when the files server "goes down" the entire network may come to a halt. Good network design practices say that critical network services (provided by servers) should be redundant on the network whenever possible.
Cables May Break.
The Topology chapter presents information about the various configurations of cables. Some of the configurations are designed to minimize the inconvenience of a broken cable; with other configurations, one broken cable can stop the entire network.
Security and compliance.
Network security is expensive. It is also very important. A school network would possibly be subject to more stringent security requirements than a similarly-sized corporate network, because of its likelihood of storing personal and confidential information of network users, the danger of which can be compounded if any network users are minors. A great deal of attention must be paid to network services to ensure all network content is appropriate for the network community it serves.
Florida Center for Instructional Technology
College of Education,
University of South Florida,
4202 E. Fowler Ave., EDU162
Tampa, Florida 33620
813.974.1640
Dr. Roy Winkelman, Director
This publication was produced under a grant from the Florida Department of Education.
The information contained in this document is based on information available at the time of publication and is subject to change. Although every reasonable effort has been made to include accurate information, the Florida Center for Instructional Technology makes no warranty of claims as to the accuracy, completeness, or fitness for any particular purpose of the information provided herein. Nothing herein shall be construed as a recommendation to use any product or service in violation of existing patents or rights of third parties.

What is a Topology?

The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter.

Main Types of Physical Topologies

The following sections discuss the physical topologies used in networks and other related topics.
  • Linear Bus
  • Star
  • Tree (Expanded Star)
  • Considerations When Choosing a Topology
  • Summary Chart

Linear Bus

A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server, workstations, and peripherals) are connected to the linear cable.
Fig. 1. Linear Bus topology

Advantages of a Linear Bus Topology

  • Easy to connect a computer or peripheral to a linear bus.
  • Requires less cable length than a star topology.

Disadvantages of a Linear Bus Topology

  • Entire network shuts down if there is a break in the main cable.
  • Terminators are required at both ends of the backbone cable.
  • Difficult to identify the problem if the entire network shuts down.
  • Not meant to be used as a stand-alone solution in a large building.

Star

A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator (See fig. 2).
Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.
Fig. 2. Star topology

Advantages of a Star Topology

  • Easy to install and wire.
  • No disruptions to the network when connecting or removing devices.
  • Easy to detect faults and to remove parts.

Disadvantages of a Star Topology

  • Requires more cable length than a linear topology.
  • If the hub, switch, or concentrator fails, nodes attached are disabled.
  • More expensive than linear bus topologies because of the cost of the hubs, etc.

Tree or Expanded Star

A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable (See fig. 3). Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs.
Fig. 3. Tree topology

Advantages of a Tree Topology

  • Point-to-point wiring for individual segments.
  • Supported by several hardware and software venders.

Disadvantages of a Tree Topology

  • Overall length of each segment is limited by the type of cabling used.
  • If the backbone line breaks, the entire segment goes down.
  • More difficult to configure and wire than other topologies.

5-4-3 Rule

A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 rule. One aspect of the Ethernet protocol requires that a signal sent out on the network cable reach every part of the network within a specified length of time. Each concentrator or repeater that a signal goes through adds a small amount of time. This leads to the rule that between any two nodes on the network there can only be a maximum of 5 segments, connected through 4 repeaters/concentrators. In addition, only 3 of the segments may be populated (trunk) segments if they are made of coaxial cable. A populated segment is one that has one or more nodes attached to it . In Figure 4, the 5-4-3 rule is adhered to. The furthest two nodes on the network have 4 segments and 3 repeaters/concentrators between them.
NOTE: This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber optic backbone and UTP cabling, the rule would translate to a 7-6-5 rule.The speed of networking switches is vastly improved over older technologies, and while every effort should be made to limit network segment traversal, efficient switching can allow much larger numbers of segments to be traversed with little or no impact to the network.

Considerations When Choosing a Topology

  • Money. A linear bus network may be the least expensive way to install a network; you do not have to purchase concentrators.
  • Length of cable needed. The linear bus network uses shorter lengths of cable.
  • Future growth. With a star topology, expanding a network is easily done by adding another concentrator.
  • Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star topologies.

Summary Chart

Physical Topology Common Cable Common Protocol
Linear Bus Twisted Pair
Coaxial
Fiber
Ethernet
Star Twisted Pair
Fiber
Ethernet
Tree Twisted Pair
Coaxial
Fiber
Ethernet
Florida Center for Instructional Technology
College of Education,
University of South Florida,
4202 E. Fowler Ave., EDU162
Tampa, Florida 33620
813.974.1640
Dr. Roy Winkelman, Director
This publication was produced under a grant from the Florida Department of Education.
The information contained in this document is based on information available at the time of publication and is subject to change. Although every reasonable effort has been made to include accurate information, the Florida Center for Instructional Technology makes no warranty of claims as to the accuracy, completeness, or fitness for any particular purpose of the information provided herein. Nothing herein shall be construed as a recommendation to use any product or service in violation of existing patents or rights of third parties.

Wednesday, 16 January 2013

IP address

Definition: An IP address is a binary number that uniquely identifies computers and other devices on a TCP/IP network.
An IP address can be private - for use on a local area network (LAN) - or public - for use on the Internet or other wide area network (WAN). IP addresses can be determined statically - assigned to a computer by a system administrator - or dynamically - assigned by another device on the network on demand.
 
What Is a Public IP Address?, What Is a Private IP Address?
Two IP addressing standards are in use today. The IPv4 standard is most familiar to people and supported everywhere on the Internet, but the newer IPv6 standard is gradually replacing it. IPv4 addresses consist of four bytes (32 bits), while IPv6 addresses are 16 bytes (128 bits) long.
 
Internet Protocol Address Notation
A network administrator sets up the addressing scheme for an IP network. When troubleshooting network problems, users sometimes also need to be familiar with how IP addresses work.

IP Address Survival Guide

How to find, change, hide and otherwise work with IP addresses

IP address are the fundamental method for computers to identify themselves on most computer networks. Every computer (or other network device) connected to the Internet has an IP address. This tutorial explains the basics of finding, changing, and hiding (your) my IP addresses.

Inside IP Addresses

IP addresses are written in a notation using numbers separated by dots. This is called dotted-decimal notation. Examples of IP addresses in dotted-decimal notation are 10.0.0.1 and 192.168.0.1 although many millions of different IP addresses exist.
  • How IP Addresses Work

Finding IP Addresses

Everyone who needs to use a computer network should understand how to look up their own IP addresses. The exact procedure to follow depends on the kind of computer you use. Additionally, in some situations you may need to find the IP address of someone else's computer.
  • How to Find IP Addresses

Fixing IP Address Problems

When a computer network is functioning properly, IP addresses stay in the background and don't require any specific attention. However, some common problems you may encounter when setting up or joining a computer network include:
  • A computer has no IP address
  • Two computers have the same IP address
  • A computer has a "bad" IP address that won't allow it to "talk" on the network
To solve these problems, several techniques can be applied including IP address release / renew, setting static IP addresses, and updating the subnet ccnfiguration

Hiding IP Addresses

Your public IP addresses are shared with others over the Internet, and this raises privacy concerns in the minds of some people. IP addresses allow your Internet usage to be tracked and give some rough information about your geographic location. While there is no simple solution to ths problem, some techniques do help hide your IP address and increase your Internet privacy:

Bus, Ring, Star,

Ring Topology

In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses.
Illustration - Ring Topology Diagram

Star Topology

Many home networks use the star topology. A star network features a central connection point called a "hub node" that may be a network hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)
Illustration - Star Topology Diagram

Tree Topology

Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the root of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone. Illustration - Tree Topology Diagram

Mesh Topology

Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing. A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.
Illustration - Mesh Topology Diagram

Summary

Topologies remain an important part of network design theory. You can probably build a home or small business computer network without understanding the difference between a bus design and a star design, but becoming familiar with the standard topologies gives you a better understanding of important networking concepts like hubs, broadcasts, and routes.

Network Topologies

Bus, ring, star, and other types of network topology

In computer networking, topology refers to the layout of connected devices. This article introduces the standard topologies of networking.

Topology in Network Design

Think of a topology as a network's virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a ring topology there. Network topologies are categorized into the following basic types:
  • bus
  • ring
  • star
  • tree
  • mesh
More complex networks can be built as hybrids of two or more of the above basic topologies.

Bus Topology

Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable.
Illustration - Bus Topology Diagram

 

Tuesday, 15 January 2013

Who Created the Internet Network?

Question: Who Created the Internet Network?
Development of the technologies that became the Internet began decades ago. The development of the World Wide Web (WWW) portion of the Internet happened much later, although many people consider this synonymous with creating the Internet itself.
Answer: No single person or organization created the modern Internet, including Al Gore, Lyndon Johnson, or any other individual. Instead, multiple people developed the key technologies that later grew to become the Internet:
  • Email - Long before the World Wide Web, email was the dominant communication method on the Internet. Ray Tomlinson developed in 1971 the first email system that worked over the early Internet.

  • Ethernet - The physical communication technology underlying the Internet, Ethernet was created by Robert Metcalfe and David Boggs in 1973.

  • TCP/IP - In May, 1974, the Institute of Electrical and Electronic Engineers (IEEE) published a paper titled "A Protocol for Packet Network Interconnection." The paper's authors - Vinton Cerf and Robert Kahn - described a protocol called TCP that incorporated both connection-oriented and datagram services. This protocol later became known as TCP/IP.

Capacity of wireless channels


5 Capacity of wireless channels
In the previous two chapters, we studied specific techniques for communication
over wireless channels. In particular, Chapter 3 is centered on the
point-to-point communication scenario and there the focus is on diversity as
a way to mitigate the adverse effect of fading. Chapter 4 looks at cellular
wireless networks as a whole and introduces several multiple access and
interference management techniques.
The present chapter takes a more fundamental look at the problem of
communication over wireless fading channels. We ask: what is the optimal
performance achievable on a given channel and what are the techniques to
achieve such optimal performance? We focus on the point-to-point scenario in
this chapter and defer the multiuser case until Chapter 6. The material covered
in this chapter lays down the theoretical basis of the modern development in
wireless communication to be covered in the rest of the book.
The framework for studying performance limits in communication is information
theory. The basic measure of performance is the capacity of a channel:
the maximum rate of communication for which arbitrarily small error
probability can be achieved. Section 5.1 starts with the important example
of the AWGN (additive white Gaussian noise) channel and introduces
the notion of capacity through a heuristic argument. The AWGN channel
is then used as a building block to study the capacity of wireless
fading channels. Unlike the AWGN channel, there is no single definition
of capacity for fading channels that is applicable in all scenarios. Several
notions of capacity are developed, and together they form a systematic
study of performance limits of fading channels. The various capacity
measures allow us to see clearly the different types of resources available
in fading channels: power, diversity and degrees of freedom. We will see
how the diversity techniques studied in Chapter 3 fit into this big picture.
More importantly, the capacity results suggest an alternative technique,
opportunistic communication, which will be explored further in the later
chapters.
166
167 5.1 AWGN channel capacity
5.1 AWGN channel capacity
Information theory was invented by Claude Shannon in 1948 to characterize
the limits of reliable communication. Before Shannon, it was widely believed
that the only way to achieve reliable communication over a noisy channel,
i.e., to make the error probability as small as desired, was to reduce the data
rate (by, say, repetition coding). Shannon showed the surprising result that
this belief is incorrect: by more intelligent coding of the information, one
can in fact communicate at a strictly positive rate but at the same time with
as small an error probability as desired. However, there is a maximal rate,
called the capacity of the channel, for which this can be done: if one attempts
to communicate at rates above the channel capacity, then it is impossible to
drive the error probability to zero.
In this section, the focus is on the familiar (real) AWGN channel:
ym = xm+wm (5.1)
where xm and ym are real input and output at time m respectively and wm
is 02 noise, independent over time. The importance of this channel is
two-fold:
• It is a building block of all of the wireless channels studied in this book.
• It serves as a motivating example of what capacity means operationally and
gives some sense as to why arbitrarily reliable communication is possible
at a strictly positive data rate.
5.1.1 Repetition coding
Using uncoded BPSK symbols xm = ±

P, the error probability is
QP/2. To reduce the error probability, one can repeat the same
symbol N times to transmit the one bit of information. This is a
repetition code of block length N, with codewords xA
=

P1    1t
and xB
=

P−1   −1t . The codewords meet a power constraint of
P joules/symbol. If xA is transmitted, the received vector is
y = xA
+w (5.2)
where w = w1    wNt . Error occurs when y is closer to xB than to
xA, and the error probability is given by
Q
xA
−xB

2
 = Q
NP
2

 (5.3)
which decays exponentially with the block length N. The good news is that
communication can now be done with arbitrary reliability by choosing a large
168 Capacity of wireless channels
enough N. The bad news is that the data rate is only 1/N bits per symbol
time and with increasing N the data rate goes to zero.
The reliably communicated data rate with repetition coding can be
marginally improved by using multilevel PAM (generalizing the two-level
BPSK scheme from earlier). By repeating an M-level PAM symbol, the levels
equally spaced between ±

P, the rate is logM/N bits per symbol time1 and
the error probability for the inner levels is equal to
Q


NP
M −1

 (5.4)
As long as the number of levels M grows at a rate less than

N, reliable
communication is guaranteed at large block lengths. But the data rate is
bounded by log

N/N and this still goes to zero as the block length
increases. Is that the price one must pay to achieve reliable communication?
5.1.2 Packing spheres
Geometrically, repetition coding puts all the codewords (the M levels) in just
one dimension (Figure 5.1 provides an illustration; here, all the codewords
are on the same line). On the other hand, the signal space has a large number
of dimensions N. We have already seen in Chapter 3 that this is a very
inefficient way of packing codewords. To communicate more efficiently, the
codewords should be spread in all the N dimensions.
We can get an estimate on the maximum number of codewords that can
be packed in for the given power constraint P, by appealing to the classic
sphere-packing picture (Figure 5.2). By the law of large numbers, the
N-dimensional received vector y=x+w will, with high probability, lie within
Figure 5.1 Repetition coding
packs points inefficiently in the
high-dimensional signal space.
√N(P + σ
2)
1 In this chapter, all logarithms are taken to be to the base 2 unless specified otherwise.
169 5.1 AWGN channel capacity
Figure 5.2 The number of
noise spheres that can be
packed into the y-sphere
yields the maximum number
of codewords that can be
reliably distinguished. Nσ
2 √NP
√N(P + σ
2)
a y-sphere of radius NP +2; so without loss of generality we need only
focus on what happens inside this y-sphere. On the other hand
1
N
N
   
m=1
w2m→2 (5.5)
as N →, by the law of large numbers again. So, for N large, the received
√vector y lies, with high probability, near the surface of a noise sphere of radius
N around the transmitted codeword (this is sometimes called the sphere
hardening effect). Reliable communication occurs as long as the noise spheres
around the codewords do not overlap. The maximum number of codewords
that can be packed with non-overlapping noise spheres is the ratio of the
volume of the y-sphere to the volume of a noise sphere:2
NP +2N


N2N  (5.6)
This implies that the maximum number of bits per symbol that can be reliably
communicated is
1
N
log


NP +2N


N2N


= 1
2
log1+ P
2

 (5.7)
This is indeed the capacity of the AWGN channel. (The argument might sound
very heuristic. Appendix B.5 takes a more careful look.)
The sphere-packing argument only yields the maximum number of codewords
that can be packed while ensuring reliable communication. How to construct
codes to achieve the promised rate is another story. In fact, in Shannon’s
argument, he never explicitly constructed codes. What he showed is that if
2 The volume of an N-dimensional sphere of radius r is proportional to rN and an exact
expression is evaluated in Exercise B.10.
170 Capacity of wireless channels
one picks the codewords randomly and independently, with the components
of each codeword i.i.d. 0P, then with very high probability the randomly
chosen code will do the job at any rate R < C. This is the so-called i.i.d.
Gaussian code. A sketch of this random coding argument can be found in
Appendix B.5.
From an engineering standpoint, the essential problem is to identify easily
encodable and decodable codes that have performance close to the capacity.
The study of this problem is a separate field in itself and Discussion 5.1
briefly chronicles the success story: codes that operate very close to capacity
have been found and can be implemented in a relatively straightforward way
using current technology. In the rest of the book, these codes are referred to
as “capacity-achieving AWGN codes”.
Discussion 5.1 Capacity-achieving AWGN channel codes
Consider a code for communication over the real AWGN channel in (5.1).
The ML decoder chooses the nearest codeword to the received vector as
the most likely transmitted codeword. The closer two codewords are to
each other, the higher the probability of confusing one for the other: this
yields a geometric design criterion for the set of codewords, i.e., place
the codewords as far apart from each other as possible. While such a set
of maximally spaced codewords are likely to perform very well, this in
itself does not constitute an engineering solution to the problem of code
construction: what is required is an arrangement that is “easy” to describe
and “simple” to decode. In other words, the computational complexity of
encoding and decoding should be practical.
Many of the early solutions centered around the theme of ensuring
efficient ML decoding. The search of codes that have this property leads to
a rich class of codes with nice algebraic properties, but their performance
is quite far from capacity. A significant breakthrough occurred when the
stringent ML decoding was relaxed to an approximate one. An iterative
decoding algorithm with near ML performance has led to turbo and low
density parity check codes.
A large ensemble of linear parity check codes can be considered in conjunction
with the iterative decoding algorithm. Codes with good performance
can be found offline and they have been verified to perform very close to
capacity.Toget a feel for their performance,weconsidersomesampleperformance
numbers. The capacity of the AWGN channel at 0 dB SNR is 0.5 bits
per symbol. The error probability of a carefully designedLDPCcode in these
operating conditions (rate 0.5 bits per symbol, and the signal-to-noise ratio is
equal to 0.1 dB) with a block length of 8000 bits is approximately 10−4. With
a larger block length, much smaller error probabilities have been achieved.
These modern developments are well surveyed in [100].
171 5.1 AWGN channel capacity
The capacity of the AWGN channel is probably the most well-known
result of information theory, but it is in fact only a special case of Shannon’s
general theory applied to a specific channel. This general theory is outlined
in Appendix B. All the capacity results used in the book can be derived from
this general framework. To focus more on the implications of the results in
the main text, the derivation of these results is relegated to Appendix B. In
the main text, the capacities of the channels looked at are justified by either
Figure 5.3 The three
communication schemes when
viewed in N-dimensional space:
(a) uncoded signaling: error
probability is poor since large
noise in any dimension is
enough to confuse the receiver;
(b) repetition code: codewords
are now separated in all
dimensions, but there are only
a few codewords packed in a
single dimension; (c)
capacity-achieving code:
codewords are separated in all
dimensions and there are many
of them spread out in the
space.
Summary 5.1 Reliable rate of communication and capacity
• Reliable communication at rate R bits/symbol means that one can design
codes at that rate with arbitrarily small error probability.
• To get reliable communication, one must code over a long block; this
is to exploit the law of large numbers to average out the randomness of
the noise.
• Repetition coding over a long block can achieve reliable communication,
but the corresponding data rate goes to zero with increasing block length.
• Repetition coding does not pack the codewords in the available degrees
of freedom in an efficient manner. One can pack a number of codewords
that is exponential in the block length and still communicate reliably.
This means the data rate can be strictly positive even as reliability is
increased arbitrarily by increasing the block length.
• The maximum data rate at which reliable communication is possible is
called the capacity C of the channel.
• The capacity of the (real) AWGN channel with power constraint P and
noise variance 2 is:
Cawgn
= 1
2
log1+ P
2

 (5.8)
and the engineering problem of constructing codes close to this performance
has been successfully addressed.
Figure 5.3 summarizes the three communication schemes discussed.
(a) (b) (c)
172 Capacity of wireless channels
transforming the channels back to the AWGN channel, or by using the type
of heuristic sphere-packing arguments we have just seen.
5.2 Resources of the AWGN channel
The AWGN capacity formula (5.8) can be used to identify the roles of the
key resources of power and bandwidth.
5.2.1 Continuous-time AWGN channel
Consider a continuous-time AWGN channel with bandwidth W Hz, power
constraint ¯P watts, and additive white Gaussian noise with power spectral
density N0/2. Following the passband–baseband conversion and sampling at
rate 1/W (as described in Chapter 2), this can be represented by a discretetime
complex baseband channel:
ym = xm+wm (5.9)
where wm is 0N0 and is i.i.d. over time. Note that since the noise is
independent in the I and Q components, each use of the complex channel can
be thought of as two independent uses of a real AWGN channel. The noise
variance and the power constraint per real symbol are N0/2 and ¯ P/2W
respectively. Hence, the capacity of the channel is
1
2
log1+
¯P
N0W
bits per real dimension (5.10)
or
log1+
¯P
N0W
bits per complex dimension (5.11)
This is the capacity in bits per complex dimension or degree of freedom.
Since there are W complex samples per second, the capacity of the continuoustime
AWGN channel is
Cawgn ¯ PW = W log1+
¯P
N0W
bits/s (5.12)
Note that SNR     = ¯P/N0W is the SNR per (complex) degree of freedom.
Hence, AWGN capacity can be rewritten as
Cawgn
= log1+SNR bits/s/Hz (5.13)
This formula measures the maximum achievable spectral efficiency through
the AWGN channel as a function of the SNR.
173 5.2 Resources of the AWGN channel
5.2.2 Power and bandwidth
Let us ponder the significance of the capacity formula (5.12) to a communication
engineer. One way of using this formula is as a benchmark for evaluating
the performance of channel codes. For a system engineer, however, the main
significance of this formula is that it provides a high-level way of thinking
about how the performance of a communication system depends on the basic
resources available in the channel, without going into the details of specific
modulation and coding schemes used. It will also help identify the bottleneck
that limits performance.
The basic resources of the AWGN channel are the received power ¯P and
the bandwidth W. Let us first see how the capacity depends on the received
power. To this end, a key observation is that the function
fSNR     = log1+SNR (5.14)
is concave, i.e., fx≤0 for all x≥0 (Figure 5.4). This means that increasing
the power ¯P suffers from a law of diminishing marginal returns: the higher
the SNR, the smaller the effect on capacity. In particular, let us look at the
low and the high SNR regimes. Observe that
log21+x ≈ x log2 e whenx ≈ 0 (5.15)
log21+x ≈ log2 x whenx    1 (5.16)
Thus, when the SNR is low, the capacity increases linearly with the received
power ¯P: every 3 dB increase in (or, doubling) the power doubles the capacity.
When the SNR is high, the capacity increases logarithmically with ¯P : every
3 dB increase in the power yields only one additional bit per dimension.
This phenomenon should not come as a surprise. We have already seen in
Figure 5.4 Spectral efficiency
log1+SNR of the AWGN
channel.
0
3
4
5
6
7
0 20 40 60 80 100
1
2
SNR
log (1 + SNR)
174 Capacity of wireless channels
Chapter 3 that packing many bits per dimension is very power-inefficient.
The capacity result says that this phenomenon not only holds for specific
schemes but is in fact fundamental to all communication schemes. In fact,
for a fixed error probability, the data rate of uncoded QAM also increases
logarithmically with the SNR (Exercise 5.7).
The dependency of the capacity on the bandwidth W is somewhat more
complicated. From the formula, the capacity depends on the bandwidth in two
ways. First, it increases the degrees of freedom available for communication.
This can be seen in the linear dependency on W for a fixed SNR = ¯P/N0W.
On the other hand, for a given received power ¯P, the SNR per dimension
decreases with the bandwidth as the energy is spread more thinly across the
degrees of freedom. In fact, it can be directly calculated that the capacity is
an increasing, concave function of the bandwidth W (Figure 5.5). When the
bandwidth is small, the SNR per degree of freedom is high, and then the
capacity is insensitive to small changes in SNR. Increasing W yields a rapid
increase in capacity because the increase in degrees of freedom more than
compensates for the decrease in SNR. The system is in the bandwidth-limited
regime. When the bandwidth is large such that the SNR per degree of freedom
is small,
W log1+
¯P
N0W
 ≈ W
 ¯P
N0W
log2 e =
¯P
N0
log2 e (5.17)
In this regime, the capacity is proportional to the total received power across
the entire band. It is insensitive to the bandwidth, and increasing the bandwidth
has a small impact on capacity. On the other hand, the capacity is now linear
in the received power and increasing power has a significant effect. This is
the power-limited regime.
Figure 5.5 Capacity as a
function of the bandwidth W.
Here ¯P/N0 = 106.
5 30
Bandwidth W (MHz)
Capacity
Limit for W → ∞
Power limited region
0.2
1
Bandwidth limited region
(Mbps)
C(W )
0.4
0 10 15 20 25
1.6
1.4
1.2
0.8
0.6
0
P
N0
log2 e
175 5.2 Resources of the AWGN channel
As W increases, the capacity increases monotonically (why must it?) and
reaches the asymptotic limit
C =
¯P
N0
log2 e bits/s (5.18)
This is the infinite bandwidth limit, i.e., the capacity of the AWGN channel
with only a power constraint but no limitation on bandwidth. It is seen that
even if there is no bandwidth constraint, the capacity is finite.
In some communication applications, the main objective is to minimize
the required energy per bit b rather than to maximize the spectral efficiency.
At a given power level ¯P, the minimum required energy per bit
b is ¯ P/Cawgn ¯ PW. To minimize this, we should be operating in the most
power-efficient regime, i.e., ¯P →0. Hence, the minimum b/N0 is given by
 b
N0

min
= lim
¯P
→0
¯P
Cawgn ¯ PWN0
= 1
log2 e
=−159dB (5.19)
To achieve this, the SNR per degree of freedom goes to zero. The price
to pay for the energy efficiency is delay: if the bandwidth W is fixed, the
communication rate (in bits/s) goes to zero. This essentially mimics the
infinite bandwidth regime by spreading the total energy over a long time
interval, instead of spreading the total power over a large bandwidth.
It was already mentioned that the success story of designing capacityachieving
AWGN codes is a relatively recent one. In the infinite bandwidth
regime, however, it has long been known that orthogonal codes3 achieve the
capacity (or, equivalently, achieve the minimum b/N0 of −159 dB). This is
explored in Exercises 5.8 and 5.9.
Example 5.2 Bandwidth reuse in cellular systems
The capacity formula for the AWGN channel can be used to conduct
a simple comparison of the two orthogonal cellular systems discussed
in Chapter 4: the narrowband system with frequency reuse versus the
wideband system with universal reuse. In both systems, users within a cell
are orthogonal and do not interfere with each other. The main parameter
of interest is the reuse ratio

 ≤ 1. If W denotes the bandwidth per user
within a cell, then each user transmission occurs over a bandwidth of
W.
The parameter
 = 1 yields the full reuse of the wideband OFDM system
and
<1 yields the narrowband system.
3 One example of orthogonal coding is the Hadamard sequences used in the IS-95 system
(Section 4.3.1). Pulse position modulation (PPM), where the position of the on–off pulse
(with large duty cycle) conveys the information, is another example.
176 Capacity of wireless channels
Here we consider the uplink of this cellular system; the study of the
downlink in orthogonal systems is similar. A user at a distance r is heard
at the base-station with an attenuation of a factor r− in power; in free
space the decay rate is equal to 2 and the decay rate is 4 in the model
of a single reflected path off the ground plane, cf. Section 2.1.5.
The uplink user transmissions in a neighboring cell that reuses the same
frequency band are averaged and this constitutes the interference (this
averaging is an important feature of the wideband OFDM system; in the
narrowband system in Chapter 4, there is no interference averaging but that
effect is ignored here). Let us denote by f
 the amount of total out-of-cell
interference at a base-station as a fraction of the received signal power of
a user at the edge of the cell. Since the amount of interference depends
on the number of neighboring cells that reuse the same frequency band,
the fraction f
 depends on the reuse ratio and also on the topology of the
cellular system.
For example, in a one-dimensional linear array of base-stations
(Figure 5.6), a reuse ratio of
 corresponds to one in every 1/
 cells using
the same frequency band. Thus the fraction f
 decays roughly as
. On
the other hand, in a two-dimensional hexagonal array of base-stations, a
reuse ratio of
 corresponds to the nearest reusing base-station roughly a
distance of

1/
 away: this means that the fraction f
 decays roughly as

/2. The exact fraction f
 takes into account geographical features of the
cellular system (such as shadowing) and the geographic averaging of the
interfering uplink transmissions; it is usually arrived at using numerical
simulations (Table 6.2 in [140] has one such enumeration for a full reuse
system). In a simple model where the interference is considered to come
from the center of the cell reusing the same frequency band, f
 can be
taken to be 2
/2 for the linear cellular system and 6
/4 /2 for the
hexagonal planar cellular system (see Exercises 5.2 and 5.3).
The received SINR at the base-station for a cell edge user is
SINR = SNR

+f
SNR
 (5.20)
where the SNR for the cell edge user is
SNR     = P
N0Wd
 (5.21)
d
Figure 5.6 A linear cellular system with base-stations along a line (representing a highway).
177 5.2 Resources of the AWGN channel
with d the distance of the user to the base-station and P the uplink
transmit power. The operating value of the parameter SNR is decided by the
coverage of a cell: a user at the edge of a cell has to have a minimum SNR
to be able to communicate reliably (at aleast a fixed minimum rate) with
the nearest base-station. Each base-station comes with a capital installation
cost and recurring operation costs and to minimize the number of basestations,
the cell size d is usually made as large as possible; depending on
the uplink transmit power capability, coverage decides the cell size d.
Using the AWGN capacity formula (cf. (5.14)), the rate of reliable
communication for a user at the edge of the cell, as a function of the reuse
ratio
, is
R

=
W log21+SINR =
W log2
1+ SNR

+f
SNR
bits/s (5.22)
The rate depends on the reuse ratio through the available degrees of
freedom and the amount of out-of-cell interference. A large
 increases
the available bandwidth per cell but also increases the amount of out-ofcell
interference. The formula (5.22) allows us to study the optimal reuse
factor. At low SNR, the system is not degree of freedom limited and the
interference is small relative to the noise; thus the rate is insensitive to the
reuse factor and this can be verified directly from (5.22). On the other hand,
at large SNR the interference grows as well and the SINR peaks at 1/f
.
(A general rule of thumb in practice is to set SNR such that the interference
is of the same order as the background noise; this will guarantee that the
operating SINR is close to the largest value.) The largest rate is

W log2
1+ 1
f


 (5.23)
This rate goes to zero for small values of
; thus sparse reuse is not
favored. It can be verified that universal reuse yields the largest rate in
(5.23) for the hexagonal cellular system (Exercise 5.3). For the linear
cellular model, the corresponding optimal reuse is
 = 1/2, i.e., reusing
the frequency every other cell (Exercise 5.5). The reduction in interference
due to less reuse is more dramatic in the linear cellular system when
compared to the hexagonal cellular system. This difference is highlighted
in the optimal reuse ratios for the two systems at high SNR: universal
reuse is preferred for the hexagonal cellular system while a reuse ratio of
1/2 is preferred for the linear cellular system.
This comparison also holds for a range of SNR between the small and
the large values: Figures 5.7 and 5.8 plot the rates in (5.22) for different
reuse ratios for the linear and hexagonal cellular systems respectively.
Here the power decay rate is fixed to 3 and the rates are plotted as a
function of the SNR for a user at the edge of the cell, cf. (5.21). In the
178 Capacity of wireless channels
10 15 20 25 30
Rate
bits / s / Hz
Cell edge SNR (dB)
1/2
Frequency reuse factor 1
1/3
0.5
–10 –5 0 5
3
2.5
2
1.5
1
0
Figure 5.7 Rates in bits/s/Hz as a function of the SNR for a user at the edge of the cell for
universal reuse and reuse ratios of 1/2 and 1/3 for the linear cellular system. The power decay
rate  is set to 3.
10 15 20 25 30
1/7
Cell edge SNR (dB)
Frequency reuse factor 1
0.2 1/2
–10 –5 0 5
1.4
1.2
1
0.8
0.6
0.4
0
Rate
bits /s / Hz
Figure 5.8 Rates in bits/s/Hz as a function of the SNR for a user at the edge of the cell for
universal reuse, reuse ratios 1/2 and 1/7 for the hexagonal cellular system. The power decay rate
 is set to 3.
hexagonal cellular system, universal reuse is clearly preferred at all ranges
of SNR. On the other hand, in a linear cellular system, universal reuse
and a reuse of 1/2 have comparable performance and if the operating
SNR value is larger than a threshold (10 dB in Figure 5.7), then it pays to
reuse, i.e., R1/2 >R1. Otherwise, universal reuse is optimal. If this SNR
threshold is within the rule of thumb setting mentioned earlier (i.e., the
gain in rate is worth operating at this SNR), then reuse is preferred. This
Preference has to be traded off with the size of the cell dictated by (5.21)
due to a transmit power constraint on the mobile device.
179 5.3 Linear time-invariant Gaussian channels
5.3 Linear time-invariant Gaussian channels
We give three examples of channels which are closely related to the simple
AWGN channel and whose capacities can be easily computed. Moreover,
optimal codes for these channels can be constructed directly from an optimal
code for the basic AWGN channel. These channels are time-invariant, known
to both the transmitter and the receiver, and they form a bridge to the fading
channels which will be studied in the next section.
5.3.1 Single input multiple output (SIMO) channel
Consider a SIMO channel with one transmit antenna and L receive antennas:
y m = h xm+w m = 1   L (5.24)
where h is the fixed complex channel gain from the transmit antenna to
the th receive antenna, and w m is 0N0 is additive Gaussian noise
independent across antennas. A sufficient statistic for detecting xm from
ym     = y1m    yLmt is
˜y
m     = h∗ym = h2xm+h∗wm (5.25)
where h     = h1   hLt and wm     = w1m    wLmt . This is an
AWGN channel with received SNR Ph2/N0 if P is the average energy per
transmit symbol. The capacity of this channel is therefore
C = log1+ Ph2
N0
bits/s/Hz (5.26)
Multiple receive antennas increase the effective SNR and provide a power
gain. For example, for L=2 and h1
= h2
=1, dual receive antennas provide
a 3 dB power gain over a single antenna system. The linear combining (5.25)
maximizes the output SNR and is sometimes called receive beamforming.
5.3.2 Multiple input single output (MISO) channel
Consider a MISO channel with L transmit antennas and a single receive
antenna:
ym = h∗xm+wm (5.27)
where h = h1   hLt and h is the (fixed) channel gain from transmit
antenna to the receive antenna. There is a total power constraint of P across
the transmit antennas.
180 Capacity of wireless channels
In the SIMO channel above, the sufficient statistic is the projection of the
L-dimensional received signal onto h: the projections in orthogonal directions
contain noise that is not helpful to the detection of the transmit signal. A natural
reciprocal transmission strategy for the MISO channel would send information
only in the direction of the channel vector h; information sent in any orthogonal
direction will be nulled out by the channel anyway. Therefore, by setting
xm = h
h
˜x
m (5.28)
the MISO channel is reduced to the scalar AWGN channel:
ym = h˜xm+wm (5.29)
with a power constraint P on the scalar input. The capacity of this scalar
channel is
log1+ Ph2
N0
bits/s/Hz (5.30)
Can one do better than this scheme? Any reliable code for the MISO channel
can be used as a reliable code for the scalarAWGNchannel ym=xm+wm:
if
Xi are the transmitted L×N (space-time) code matrices for the MISO channel,
then the received 1×N vectors
h∗Xi form a code for the scalar AWGN
channel. Hence, the rate achievable by a reliable code for the MISO channel
must be at most the capacity of a scalar AWGN channel with the same received
SNR. Exercise 5.11 shows that the received SNR Ph2/N0 of the transmission
strategy above is in fact the largest possible SNR given the transmit power constraint
of P. Any other scheme has a lower received SNR and hence its reliable
rate must be less than (5.30), the rate achieved by the proposed transmission
strategy. We conclude that the capacity of the MISO channel is indeed
C = log1+ Ph2
N0
bits/s/Hz (5.31)
Intuitively, the transmission strategy maximizes the received SNR by having
the received signals from the various transmit antennas add up in-phase
(coherently) and by allocating more power to the transmit antenna with the
better gain. This strategy, “aligning the transmit signal in the direction of
the transmit antenna array pattern”, is called transmit beamforming. Through
beamforming, the MISO channel is converted into a scalar AWGN channel
and thus any code which is optimal for theAWGNchannel can be used directly.
In both the SIMO and the MISO examples the benefit from having multiple
antennas is a power gain. To get a gain in degrees of freedom, one has to use
both multiple transmit and multiple receive antennas (MIMO). We will study
this in depth in Chapter 7.
181 5.3 Linear time-invariant Gaussian channels
5.3.3 Frequency-selective channel
Transformation to a parallel channel
Consider a time-invariant L-tap frequency-selective AWGN channel:
ym =
L−1
   
=0
h xm− +wm (5.32)
with an average power constraint P on each input symbol. In Section 3.4.4, we
saw that the frequency-selective channel can be converted into Nc independent
sub-carriers by adding a cyclic prefix of length L−1 to a data vector of
length Nc, cf. (3.137). Suppose this operation is repeated over blocks of data
symbols (of length Nc each, along with the corresponding cyclic prefix of
length L−1); see Figure 5.9. Then communication over the ith OFDM block
can be written as
˜y
ni = ˜hn
˜d
ni+ ˜wni n = 0 1   Nc
−1 (5.33)
Here,
˜d
i     = ˜d0i     ˜dNc−1it (5.34)
˜ wi     = ˜w0i     ˜wNc−1it (5.35)
˜yi     = ˜y0i    ˜yNc−1it (5.36)
are the DFTs of the input, the noise and the output of the ith OFDM block
respectively. ˜h is the DFT of the channel scaled by

Nc (cf. (3.138)). Since the
overhead in the cyclic prefix relative to the block lengthNc can be made arbitrarily
small by choosing Nc large, the capacity of the original frequency-selective
channel is the same as the capacity of this transformed channel as Nc
→.
The transformed channel (5.33) can be viewed as a collection of sub-channels,
one for each sub-carrier n. Each of the sub-channels is an AWGN channel. The
Figure 5.9 A coded OFDM
system. Information bits are
coded and then sent over the
frequency-selective channel via
OFDM modulation. Each
channel use corresponds to an
OFDM block. Coding can be
done across different OFDM
blocks as well as over different
sub-carriers.
Encoder
OFDM
modulator
Channel
(use 2)
OFDM
modulator
Channel
(use 3)
Channel
(use 1)
Information
bits
OFDM
modulator
182 Capacity of wireless channels
transformed noise w˜ i is distributed as 0N0I, so the noise is 0N0
in each of the sub-channels and, moreover, the noise is independent across
sub-channels. The power constraint on the input symbols in time translates
to one on the data symbols on the sub-channels (Parseval theorem for DFTs):
˜di2 ≤ NcP (5.37)
In information theory jargon, a channel which consists of a set of noninterfering
sub-channels, each of which is corrupted by independent noise, is
called a parallel channel. Thus, the transformed channel here is a parallel
AWGN channel, with a total power constraint across the sub-channels. A natural
strategy for reliable communication over a parallel AWGN channel is
illustrated in Figure 5.10. We allocate power to each sub-channel, Pn to the
nth sub-channel, such that the total power constraint is met. Then, a separate
capacity-achieving AWGN code is used to communicate over each of the subchannels.
The maximum rate of reliable communication using this scheme is
Nc−1
   
n=0
log

1+ Pn
˜hn
2
N0

bits/OFDM symbol (5.38)
Further, the power allocation can be chosen appropriately, so as to maximize
the rate in (5.38). The “optimal power allocation”, thus, is the solution to the
optimization problem:
CNc     = max
P0    PNc−1
Nc−1
   
n=0
log

1+ Pn
˜hn
2
N0

 (5.39)
Figure 5.10 Coding
independently over each of the
sub-carriers. This architecture,
with appropriate power and
rate allocations, achieves the
capacity of the
frequency-selective channel.
OFDM
modulator
OFDM
modulator
OFDM
modulator
Channel
(use 1)
Channel
(use 2)
Channel
(use 3)
Information
bits
Information
bits
Encoder
for subcarrier 1
Encoder
for subcarrier 2
183 5.3 Linear time-invariant Gaussian channels
subject to
Nc−1
   
n=0
Pn
= NcP Pn
≥ 0 n= 0   Nc
−1 (5.40)
Waterfilling power allocation
The optimal power allocation can be explicitly found. The objective function
in (5.39) is jointly concave in the powers and this optimization problem can
be solved by Lagrangian methods. Consider the Lagrangian
P0   PNc−1     =
Nc−1
   
n=0
log

1+ Pn
˜hn
2
N0

−
Nc−1
   
n=0
Pn (5.41)
where  is the Lagrange multiplier. The Kuhn–Tucker condition for the
optimality of a power allocation is

Pn
=0 ifPn > 0
≤0 ifPn
= 0
(5.42)
Define x+     = maxx 0. The power allocation
P∗
n
= 1

− N0
˜hn
2

+
 (5.43)
satisfies the conditions in (5.42) and is therefore optimal, with the Lagrange
multiplier  chosen such that the power constraint is met:
1
Nc
Nc−1
   
n=0
1

− N0
˜hn
2

+
= P (5.44)
Figure 5.11 gives a pictorial view of the optimal power allocation strategy
for the OFDM system. Think of the values N0/ ˜hn
2 plotted as a function
of the sub-carrier index n = 0   Nc
−1, as tracing out the bottom of a
vessel. If P units of water per sub-carrier are filled into the vessel, the depth
of the water at sub-carrier n is the power allocated to that sub-carrier, and
1/ is the height of the water surface. Thus, this optimal strategy is called
waterfilling or waterpouring. Note that there are some sub-carriers where the
bottom of the vessel is above the water and no power is allocated to them. In
these sub-carriers, the channel is too poor for it to be worthwhile to transmit
information. In general, the transmitter allocates more power to the stronger
sub-carriers, taking advantage of the better channel conditions, and less or
even no power to the weaker ones.
184 Capacity of wireless channels
Figure 5.11 Waterfilling power
allocation over the Nc subcarriers.
P1 = 0
N0
|H( f )|2
Subcarrier n
P2
P3
*
*
*

Observe that
˜h
n
=
L−1
   
=0
h exp−j2 n
Nc

 (5.45)
is the discrete-time Fourier transform Hf evaluated at f = nW/Nc, where
(cf. (2.20))
Hf      =
L−1
   
=0
h exp−j2 f
W

 f∈ 0 W (5.46)
As the number of sub-carriers Nc grows, the frequency width W/Nc of the
sub-carriers goes to zero and they represent a finer and finer sampling of the
continuous spectrum. So, the optimal power allocation converges to
P∗f  = 1

− N0
Hf  2

+
 (5.47)
where the constant  satisfies (cf. (5.44))

W
0
P∗f df = P (5.48)
The power allocation can be interpreted as waterfilling over frequency (see
Figure 5.12). With Nc sub-carriers, the largest reliable communication rate
185 5.3 Linear time-invariant Gaussian channels
Figure 5.12 Waterfilling power
allocation over the frequency
spectrum of the two-tap
channel (high-pass filter):
h0 = 1 and h1 = 05.
P ( f )
Frequency ( f )
– 0.4W – 0.2W 0 0.2W 0.4W
4
0
3.5
3
2.5
2
1.5
1
0.5
N0
|H( f )|2
*

with independent coding is CNc bits per OFDM symbol or CNc/Nc bits/s/Hz
(CNc given in (5.39)). So as Nc
→, the WCNc/Nc converges to
C = 
W
0
log1+ P∗f  Hf  2
N0
df bits/s (5.49)
Does coding across sub-carriers help?
So far we have considered a very simple scheme: coding independently over
each of the sub-carriers. By coding jointly across the sub-carriers, presumably
better performance can be achieved. Indeed, over a finite block length, coding
jointly over the sub-carriers yields a smaller error probability than can be
achieved by coding separately over the sub-carriers at the same rate. However,
somewhat surprisingly, the capacity of the parallel channel is equal to the
largest reliable rate of communication with independent coding within each
sub-carrier. In other words, if the block length is very large then coding jointly
over the sub-carriers cannot increase the rate of reliable communication any
more than what can be achieved simply by allocating power and rate over
the sub-carriers but not coding across the sub-carriers. So indeed (5.49) is the
capacity of the time-invariant frequency-selective channel.
To get some insight into why coding across the sub-carriers with large
block length does not improve capacity, we turn to a geometric view. Consider
a code, with block length NcN symbols, coding over all Nc of the sub-carriers
with N symbols from each sub-carrier. In high dimensions, i.e., N      1, the
NcN-dimensional received vector after passing through the parallel channel
(5.33) lives in an ellipsoid, with different axes stretched and shrunk by the
different channel gains ˜hn. The volume of the ellipsoid is proportional to
Nc−1

n=0
 ˜hn
2Pn
+N0
N
 (5.50)
186 Capacity of wireless channels
see Exercise 5.12. The volume of the noise sphere is, as in Section 5.1.2,
proportional to NNcN
0 . The maximum number of distinguishable codewords
that can be packed in the ellipsoid is therefore
Nc−1

n=0

1+ Pn
˜hn
2
N0
N
 (5.51)
The maximum reliable rate of communication is
1
N
log
Nc−1

n=0

1+ Pn
˜hn
2
N0
N
=
Nc−1
   
n=0
log

1+ Pn
˜hn
2
N0

bits/OFDM symbol
(5.52)
This is precisely the rate (5.38) achieved by separate coding and this suggests
that coding across sub-carriers can do no better. While this sphere-packing
argument is heuristic, Appendix B.6 gives a rigorous derivation from information
theoretic first principles.
Even though coding across sub-carriers cannot improve the reliable rate of
communication, it can still improve the error probability for a given data rate.
Thus, coding across sub-carriers can still be useful in practice, particularly
when the block length for each sub-carrier is small, in which case the coding
effectively increases the overall block length.
In this section we have used parallel channels to model a frequencyselective
channel, but parallel channels will be seen to be very useful in
modeling many other wireless communication scenarios as well.
5.4 Capacity of fading channels
The basic capacity results developed in the last few sections are now applied
to analyze the limits to communication over wireless fading channels.
Consider the complex baseband representation of a flat fading channel:
ym = hmxm+wm (5.53)
where
hm is the fading process and
wm is i.i.d. 0N0 noise.
As before, the symbol rate is W Hz, there is a power constraint of P
joules/symbol, and  hm 2 = 1 is assumed for normalization. Hence
SNR     = P/N0 is the average received SNR.
In Section 3.1.2, we analyzed the performance of uncoded transmission for
this channel. What is the ultimate performance limit when information can
be coded over a sequence of symbols? To answer this question, we make
the simplifying assumption that the receiver can perfectly track the fading
process, i.e., coherent reception. As we discussed in Chapter 2, the coherence
time of typical wireless channels is of the order of hundreds of symbols and
187 5.4 Capacity of fading channels
so the channel varies slowly relative to the symbol rate and can be estimated
by say a pilot signal. For now, the transmitter is not assumed to have any
knowledge of the channel realization other than the statistical characterization.
The situation when the transmitter has access to the channel realizations will
be studied in Section 5.4.6.
5.4.1 Slow fading channel
Let us first look at the situation when the channel gain is random but remains
constant for all time, i.e., hm = h for all m. This models the slow fading
situation where the delay requirement is short compared to the channel
coherence time (cf. Table 2.2). This is also called the quasi-static scenario.
Conditional on a realization of the channel h, this is an AWGN channel
with received signal-to-noise ratio h 2SNR. The maximum rate of reliable
communication supported by this channel is log1+ h 2SNR bits/s/Hz. This
quantity is a function of the random channel gain h and is therefore random
(Figure 5.13). Now suppose the transmitter encodes data at a rate R bits/s/Hz.
If the channel realization h is such that log1+ h 2SNR < R, then whatever
the code used by the transmitter, the decoding error probability cannot be
made arbitrarily small. The system is said to be in outage, and the outage
probability is
poutR     = 
log1+ h 2SNR < R (5.54)
Thus, the best the transmitter can do is to encode the data assuming that
the channel gain is strong enough to support the desired rate R. Reliable
communication can be achieved whenever that happens, and outage occurs
otherwise.
A more suggestive interpretation is to think of the channel as allowing
log1+ h 2SNR bits/s/Hz of information through when the fading gain is h.
Figure 5.13 Density of
log1+h2SNR, for Rayleigh
fading and SNR = 0 dB. For
any target rate R, there is a
non-zero outage probability.
0
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0 1 2 3 4 5
0.05
0.1
R
Area = pout (R)
188 Capacity of wireless channels
Reliable decoding is possible as long as this amount of information exceeds
the target rate.
For Rayleigh fading (i.e., h is 0 1), the outage probability is
poutR = 1−exp−2R−1
SNR

 (5.55)
At high SNR,
poutR ≈ 2R−1
SNR
 (5.56)
and the outage probability decays as 1/SNR. Recall that when we discussed
uncoded transmission in Section 3.1.2, the detection error probability also
decays like 1/SNR. Thus, we see that coding cannot significantly improve the
error probability in a slow fading scenario. The reason is that while coding
can average out the Gaussian white noise, it cannot average out the channel
fade, which affects all the coded symbols. Thus, deep fade, which is the
typical error event in the uncoded case, is also the typical error event in the
coded case.
There is a conceptual difference between the AWGN channel and the slow
fading channel. In the former, one can send data at a positive rate (in fact, any
rate less than C) while making the error probability as small as desired. This
cannot be done for the slow fading channel as long as the probability that
the channel is in deep fade is non-zero. Thus, the capacity of the slow fading
channel in the strict sense is zero. An alternative performance measure is the
-outage capacity C. This is the largest rate of transmission R such that the
outage probability poutR is less than . Solving poutR =  in (5.54) yields
C
= log1+F−11− SNR bits/s/Hz (5.57)
where F is the complementary cumulative distribution function of h 2, i.e.,
Fx     = 
h 2 > x.
In Section 3.1.2, we looked at uncoded transmission and there it was natural
to focus only on the high SNR regime; at low SNR, the error probability of
uncoded transmission is very poor. On the other hand, for coded systems,
it makes sense to consider both the high and the low SNR regimes. For
example, the CDMA system in Chapter 4 operates at very low SINR and
uses very low-rate orthogonal coding. A natural question is: in which regime
does fading have a more significant impact on outage performance? One can
answer this question in two ways. Eqn (5.57) says that, to achieve the same
rate as the AWGN channel, an extra 10 log1/F−11− dB of power is
needed. This is true regardless of the operating SNR of the environment. Thus
the fade margin is the same at all SNRs. If we look at the outage capacity
at a given SNR, however, the impact of fading depends very much on the
operating regime. To get a sense, Figure 5.14 plots the -outage capacity as
189 5.4 Capacity of fading channels
Figure 5.14 -outage capacity
as a fraction of AWGN capacity
under Rayleigh fading, for
 = 01 and  = 001.
0
1
–10 –5 0 5 10 15 20 25 30
0.6
0.4
0.2
0.8
= 0.1
= 0.01
C
Cawgn
SNR (dB)
35 40
∋ ∋

a function of SNR for the Rayleigh fading channel. To assess the impact of
fading, the -outage capacity is plotted as a fraction of the AWGN capacity
at the same SNR. It is clear that the impact is much more significant in the
low SNR regime. Indeed, at high SNR,
C
≈ log SNR+logF−11− (5.58)
≈ Cawgn
−log 1
F−11−

 (5.59)
a constant difference irrespective of the SNR. Thus, the relative loss gets
smaller at high SNR. At low SNR, on the other hand,
C
≈ F−11−SNR log2 e (5.60)
≈ F−11−Cawgn (5.61)
For reasonably small outage probabilities, the outage capacity is only a
small fraction of the AWGN capacity at low SNR. For Rayleigh fading,
F−11− ≈  for small  and the impact of fading is very significant. At
an outage probability of 001, the outage capacity is only 1% of the AWGN
capacity! Diversity has a significant effect at high SNR (as already seen in
Chapter 3), but can be more important at low SNR. Intuitively, the impact
of the randomness of the channel is in the received SNR, and the reliable
rate supported by the AWGN channel is much more sensitive to the received
SNR at low SNR than at high SNR. Exercise 5.10 elaborates on this point.
5.4.2 Receive diversity
Let us increase the diversity of the channel by having L receive antennas
instead of one. For given channel gains h     = h1   hLt , the capacity was
190 Capacity of wireless channels
calculated in Section 5.3.1 to be log1+h2SNR. Outage occurs whenever
this is below the target rate R:
prx
outR     = 
log1+h2SNR < R (5.62)
This can be rewritten as
poutR = 
h2 <
2R−1
SNR

 (5.63)
Under independent Rayleigh fading, h2 is a sum of the squares of 2L
independent Gaussian random variables and is distributed as Chi-square with
2L degrees of freedom. Its density is
fx = 1
L−1!xL−1e−x x≥ 0 (5.64)
Approximating e−x by 1 for x small, we have (cf. (3.44)),

h2 <  ≈ 1
L!L (5.65)
for  small. Hence at high SNR the outage probability is given by
poutR ≈ 2R−1L
L!SNRL  (5.66)
Comparing with (5.55), we see a diversity gain of L: the outage probability
now decays like 1/SNRL. This parallels the performance of uncoded transmission
discussed in Section 3.3.1: thus, coding cannot increase the diversity
gain.
The impact of receive diversity on the -outage capacity is plotted in
Figure 5.15. The -outage capacity is given by (5.57) with F now the cumulative
distribution function of h2. Receive antennas yield a diversity gain
and an L-fold power gain. To emphasize the impact of the diversity gain, let
us normalize the outage capacity C by Cawgn
= log1+LSNR. The dramatic
salutary effect of diversity on outage capacity can now be seen. At low SNR
and small , (5.61) and (5.65) yield
C
≈ F−11−SNR log2 e (5.67)
≈ L!
1L

1L
SNR log2 e bits/s/Hz (5.68)
and the loss with respect to the AWGN capacity is by a factor of 1/L rather
than by  when there is no diversity. At  = 001 and L = 2, the outage
capacity is increased to 14% of the AWGN capacity (as opposed to 1% for
L = 1).
191 5.4 Capacity of fading channels
Figure 5.15 -outage capacity
with L-fold receive diversity, as
a fraction of the AWGN
capacity log1+LSNR for
 = 001 and different L.
0
–10 0 5 10 15 20 25 30 35 40
1
0.8
0.6
0.4
0.2
–5
C
Cawgn
L = 2
L = 4
L = 5
L = 3
L = 1
SNR (dB)

5.4.3 Transmit diversity
Now suppose there are L transmit antennas but only one receive antenna, with
a total power constraint of P. From Section 5.3.2, the capacity of the channel
conditioned on the channel gains h = h1   hLt is log1+h2SNR.
Following the approach taken in the SISO and the SIMO cases, one is tempted
to say that the outage probability for a fixed rate R is
pfull−csi
out R = 
log1+h2SNR < R (5.69)
which would have been exactly the same as the corresponding SIMO system
with 1 transmit and L receive antennas. However, this outage performance
is achievable only if the transmitter knows the phases and magnitudes of the
gains h so that it can perform transmit beamforming, i.e., allocate more power
to the stronger antennas and arrange the signals from the different antennas to
align in phase at the receiver. When the transmitter does not know the channel
gains h, it has to use a fixed transmission strategy that does not depend on h.
(This subtlety does not arise in either the SISO or the SIMO case because the
transmitter need not know the channel realization to achieve the capacity for
those channels.) How much performance loss does not knowing the channel
entail?
Alamouti scheme revisited
For concreteness, let us focus on L = 2 (dual transmit antennas). In this
situation, we can use the Alamouti scheme, which extracts transmit diversity
without transmitter channel knowledge (introduced in Section 3.3.2). Recall
from (3.76) that, under this scheme, both the transmitted symbols u1u2 over a
block of 2 symbol times see an equivalent scalar fading channel with gain h
192 Capacity of wireless channels
h2
w2
h1 w1
w2
h2
MISO channel
MISO channel
repetition
Alamouti
post-processing
y1 = (|h1|2
+ |h2|2)u1 + w1
y1 = (|h1|2
+ |h2|2)u1 + w1
y2 = (|h1|2
+ |h2|2)u2 + w2
h2
h1
h2h2 *
*
*
post-processing
u1
*
*
*
–*
u1
u2
(b)
(a)
2 equivalent scalar channels
equivalent scalar channel
h1 w1
h1
–h1
Figure 5.16 A space-time and additive noise 0N0 (Figure 5.16(b)). The energy in the symbols
coding scheme combined with
the MISO channel can be
viewed as an equivalent scalar
channel: (a) repetition coding;
(b) the Alamouti scheme. The
outage probability of the
scheme is the outage
probability of the equivalent
channel.
u1 and u2 is P/2. Conditioned on h1h2, the capacity of the equivalent scalar
channel is
log1+h2 SNR
2
bits/s/Hz (5.70)
Thus, if we now consider successive blocks and use an AWGN capacityachieving
code of rate R over each of the streams
u1m and
u2m
separately, then the outage probability of each stream is
pAla
out R = 
log1+h2 SNR
2

<R

 (5.71)
Compared to (5.69) when the transmitter knows the channel, the Alamouti
scheme performs strictly worse: the loss is 3 dB in the received SNR. This
can be explained in terms of the efficiency with which energy is transferred
to the receiver. In the Alamouti scheme, the symbols sent at the two transmit
antennas in each time are independent since they come from two separately
coded streams. Each of them has power P/2. Hence, the total SNR at the
receive antenna at any given time is
 h1
2 + h2
2
SNR
2
 (5.72)
In contrast, when the transmitter knows the channel, the symbols transmitted
at the two antennas are completely correlated in such a way that the
signals add up in phase at the receive antenna and the SNR is now
 h1
2 + h2
2 SNR
193 5.4 Capacity of fading channels
a 3-dB power gain over the independent case.4 Intuitively, there is a power
loss because, without channel knowledge, the transmitter is sending signals
that have energy in all directions instead of focusing the energy in a specific
direction. In fact, the Alamouti scheme radiates energy in a perfectly isotropic
manner: the signal transmitted from the two antennas has the same energy
when projected in any direction (Exercise 5.14).
Ascheme radiates energy isotropically whenever the signals transmitted from
the antennas are uncorrelated and have equal power (Exercise 5.14). Although
the Alamouti scheme does not perform as well as transmit beamforming, it
is optimal in one important sense: it has the best outage probability among
all schemes that radiate energy isotropically. Indeed, any such scheme must
have a received SNR equal to (5.72) and hence its outage performance must be
no better than that of a scalar slow fading AWGN channel with that received
SNR. But this is precisely the performance achieved by the Alamouti scheme.
Can one do even better by radiating energy in a non-isotropic manner (but
in a way that does not depend on the random channel gains)? In other words,
can one improve the outage probability by correlating the signals from the
transmit antennas and/or allocating unequal powers on the antennas? The
answer depends of course on the distribution of the gains h1h2. If h1h2
are i.i.d. Rayleigh, Exercise 5.15 shows, using symmetry considerations, that
correlation never improves the outage performance, but it is not necessarily
optimal to use all the transmit antennas. Exercise 5.16 shows that uniform
power allocation across antennas is always optimal, but the number of antennas
used depends on the operating SNR. For reasonable values of target outage
probabilities, it is optimal to use all the antennas. This implies that in most
cases of interest, the Alamouti scheme has the optimal outage performance
for the i.i.d. Rayleigh fading channel.
What about forL>2 transmit antennas? An information theoretic argument
in Appendix B.8 shows (in a more general framework) that
poutR = 
log1+h2 SNR
L

<R
 (5.73)
is achievable. This is the natural generalization of (5.71) and corresponds again
to isotropic transmission of energy from the antennas. Again, Exercises 5.15
and 5.16 show that this strategy is optimal for the i.i.d. Rayleigh fading
channel and for most target outage probabilities of interest. However, there
is no natural generalization of the Alamouti scheme for a larger number
of transmit antennas (cf. Exercise 3.17). We will return to the problem of
outage-optimal code design for L>2 in Chapter 9.
4 The addition of two in-phase signals of equal power yields a sum signal that has double the
amplitude and four times the power of each of the signals. In contrast, the addition of two
independent signals of equal power only doubles the power.
194 Capacity of wireless channels
1e–10
10 15
1e–08
1e–06
0.0001
0.01
1
–10 –5 0 5 10 15 20 5
7
6
5
4
3
2
1
0
–10 –5 0
9
8
1e–14
1e–12
C
(bps /
Hz)
(a)
SNR (dB)
pout
L = 5
L = 3
L = 1
MISO
SIMO
SNR (dB)
(b)
20
L = 5
L = 3
L = 1

Figure 5.17 Comparisonof The outage performances of the SIMO and the MISO channels with i.i.d.
outage performance between
SIMOandMISOchannels for
different L: (a) outage probability
as a function of SNR, for fixed
R = 1; (b) outage capacity as a
function of SNR, for a fixed outage
probability of 10−2.
Rayleigh gains are plotted in Figure 5.17 for different numbers of transmit
antennas. The difference in outage performance clearly outlines the asymmetry
between receive and transmit antennas caused by the transmitter lacking
knowledge of the channel.
Suboptimal schemes: repetition coding
In the above, the Alamouti scheme is viewed as an inner code that converts
the MISO channel into a scalar channel. The outage performance (5.71) is
achieved when the Alamouti scheme is used in conjunction with an outer code
that is capacity-achieving for the scalar AWGN channel. Other space-time
schemes can be similarly used as inner codes and their outage probability
analyzed and compared to the channel outage performance.
Here we consider the simplest example, the repetition scheme: the same
symbol is transmitted over the L different antennas over L symbol periods,
using only one antenna at a time to transmit. The receiver does maximal
ratio combining to demodulate each symbol. As a result, each symbol sees
an equivalent scalar fading channel with gain h and noise variance N0
(Figure 5.16(a)). Since only one symbol is transmitted every L symbol periods,
a rate of LR bits/symbol is required on this scalar channel to achieve a target
rate of R bits/symbol on the original channel. The outage probability of this
scheme, when combined with an outer capacity-achieving code, is therefore:
prep
outR = 
 1
L
log1+h2SNR < R

 (5.74)
Compared to the outage probability (5.73) of the channel, this scheme is
suboptimal: the SNR has to be increased by a factor of
L2R−1
2LR−1
 (5.75)
195 5.4 Capacity of fading channels
to achieve the same outage probability for the same target rate R. Equivalently,
the reciprocal of this ratio can be interpreted as the maximum achievable
coding gain over the simple repetition scheme. For a fixed R, the performance
loss increases with L: the repetition scheme becomes increasingly inefficient
in using the degrees of freedom of the channel. For a fixed L, the performance
loss increases with the target rate R. On the other hand, for R small,
2R−1 ≈ Rln 2 and 2RL−1 ≈ RLln 2, so
L2R−1
2LR−1
≈ LRln 2
LRln 2
= 1 (5.76)
and there is hardly any loss in performance. Thus, while the repetition scheme
is very suboptimal in the high SNR regime where the target rate can be high,
it is nearly optimal in the low SNR regime. This is not surprising: the system
is degree-of-freedom limited in the high SNR regime and the inefficiency of
the repetition scheme is felt more there.
Summary 5.2 Transmit and receive diversity
With receive diversity, the outage probability is
prx
outR     = 
log1+h2SNR < R (5.77)
With transmit diversity and isotropic transmission, the outage probability is
ptx
outR     = 
log1+h2 SNR
L

<R

 (5.78)
a loss of a factor of L in the received SNR because the transmitter has
no knowledge of the channel direction and is unable to beamform in the
specific channel direction.
With two transmit antennas, capacity-achieving AWGN codes in conjunction
with the Alamouti scheme achieve the outage probability.
5.4.4 Time and frequency diversity
Outage performance of parallel channels
Another way to increase channel diversity is to exploit the time-variation
of the channel: in addition to coding over symbols within one coherence
period, one can code over symbols from L such periods. Note that this is
a generalization of the schemes considered in Section 3.2, which take one
symbol from each coherence period. When coding can be performed over
196 Capacity of wireless channels
many symbols from each period, as well as between symbols from different
periods, what is the performance limit?
One can model this situation using the idea of parallel channels introduced
in Section 5.3.3: each of the sub-channels, = 1   L, represents
a coherence period of duration Tc symbols:
y m = h x m+w m m = 1   Tc (5.79)
Here h is the (non-varying) channel gain during the th coherence period.
It is assumed that the coherence time Tc is large such that one can code
over many symbols in each of the sub-channels. An average transmit power
constraint of P on the original channel translates into a total power constraint
of LP on the parallel channel.
For a given realization of the channel, we have already seen in Section 5.3.3
that the optimal power allocation across the sub-channels is waterfilling.
However, since the transmitter does not know what the channel gains are, a
reasonable strategy is to allocate equal power P to each of the sub-channels.
In Section 5.3.3, it was mentioned that the maximum rate of reliable communication
given the fading gains h is
L
   
=1
log1+ h
2SNR bits/s/Hz (5.80)
where SNR = P/N0. Hence, if the target rate is R bits/s/Hz per sub-channel,
then outage occurs when
L
   
=1
log1+ h
2SNR < LR (5.81)
Can one design a code to communicate reliably whenever
L
   
=1
log1+ h
2SNR > LR? (5.82)
If so, an L-fold diversity is achieved for i.i.d. Rayleigh fading: outage occurs
only if each of the terms in the sum L
=1 log1+ h
2SNR is small.
The term log1 + h
2SNR is the capacity of an AWGN channel with
received SNR equal to h
2SNR. Hence, a seemingly straightforward strategy,
already used in Section 5.3.3, would be to use a capacity-achieving AWGN
code with rate
log1+ h
2SNR
for the th coherence period, yielding an average rate of
1
L
L
   
=1
log1+ h
2SNR bits/s/Hz
197 5.4 Capacity of fading channels
and meeting the target rate whenever condition (5.82) holds. The caveat is
that this strategy requires the transmitter to know in advance the channel state
during each of the coherence periods so that it can adapt the rate it allocates to
each period. This knowledge is not available. However, it turns out that such
transmitter adaptation is unnecessary: information theory guarantees that
one can design a single code that communicates reliably at rate R whenever
the condition (5.82) is met. Hence, the outage probability of the time diversity
channel is precisely
poutR = 
 1
L
L
   
=1
log1+ h
2SNR < R

 (5.83)
Even though this outage performance can be achieved with or without
transmitter knowledge of the channel, the coding strategy is vastly different.
With transmitter knowledge of the channel, dynamic rate allocation and separate
coding for each sub-channel suffices. Without transmitter knowledge,
separate coding would mean using a fixed-rate code for each sub-channel and
poor diversity results: errors occur whenever one of the sub-channels is bad.
Indeed, coding across the different coherence periods is now necessary: if the
channel is in deep fade during one of the coherence periods, the information
bits can still be protected if the channel is strong in other periods.
A geometric view
Figure 5.18 gives a geometric view of our discussion so far. Consider a code
with rate R, coding over all the sub-channels and over one coherence timeinterval;
the block length is LTc symbols. The codewords lie in an LTcdimensional
sphere. The received LTc-dimensional signal lives in an ellipsoid,
with (L groups of) different axes stretched and shrunk by the different subchannel
gains (cf. Section 5.3.3). The ellipsoid is a function of the sub-channel
gains, and hence random. The no-outage condition (5.82) has a geometric
interpretation: it says that the volume of the ellipsoid is large enough to
contain 2LTcR noise spheres, one for each codeword. (This was already seen
in the sphere-packing argument in Section 5.3.3.) An outage-optimal code is
one that communicates reliably whenever the random ellipsoid is at least this
large. The subtlety here is that the same code must work for all such ellipsoids.
Since the shrinking can occur in any of the L groups of dimensions, a robust
code needs to have the property that the codewords are simultaneously wellseparated
in each of the sub-channels (Figure 5.18(a)). A set of independent
codes, one for each sub-channel, is not robust: errors will be made when even
only one of the sub-channels fades (Figure 5.18(b)).
We have already seen, in the simple context of Section 3.2, codes for
the parallel channel which are designed to be well-separated in all the subchannels.
For example, the repetition code and the rotation code in Figure 3.8
have the property that the codewords are separated in bot the sub-channels
198 Capacity of wireless channels
Channel
fade
Channel
fade
(a)
Reliable communication Noise spheres overlap
(b)
(here Tc
=1 symbol and L=2 sub-channels). More generally, the code design
Figure 5.18 Effect of the fading
gains on codes for the parallel
channel. Here there are L= 2
sub-channels and each axis
represents Tc dimensions within
a sub-channel. (a) Coding
across the sub-channels. The
code works as long as the
volume of the ellipsoid is big
enough. This requires good
codeword separation in both
the sub-channels. (b) Separate,
non-adaptive code for each
sub-channel. Shrinking of one
of the axes is enough to cause
confusion between the
codewords.
criterion of maximizing the product distance for all pairs of codewords naturally
favors codes that satisfy this property. Coding over long blocks affords
a larger coding gain; information theory guarantees the existence of codes
with large enough coding gain to achieve the outage probability in (5.83).
To achieve the outage probability, one wants to design a code that communicates
reliably over every parallel channel that is not in outage (i.e., parallel
channels that satisfy (5.82)). In information theory jargon, a code that communicates
reliably for a class of channels is said to be universal for that class.
In this language, we are looking for universal codes for parallel channels that
are not in outage. In the slow fading scalar channel without diversity (L = 1),
this problem is the same as the code design problem for a specific channel.
This is because all scalar channels are ordered by their received SNR; hence a
code that works for the channel that is just strong enough to support the target
rate will automatically work for all better channels. For parallel channels,
each channel is described by a vector of channel gains and there is no natural
ordering of channels; the universal code design problem is now non-trivial.
In Chapter 9, a universal code design criterion will be developed to construct
universal codes that come close to achieving the outage probability.
Extensions
In the above development, a uniform power allocation across the sub-channels
is assumed. Instead, if we choose to allocate power P to sub-channel , then
the outage probability (5.83) generalizes to
poutR = 
 L
   
=1
log1+ h
2SNR  < LR

 (5.84)
where SNR
= P /N0. Exercise 5.17 shows that for the i.i.d. Rayleigh fading
model, a non-uniform power allocation that does not depend on the channel
gains cannot improve the outage performance.
199 5.4 Capacity of fading channels
The parallel channel is used to model time diversity, but it can model
frequency diversity as well. By using the usual OFDM transformation, a slow
frequency-selective fading channel can be converted into a set of parallel subchannels,
one for each sub-carrier. This allows us to characterize the outage
capacity of such channels as well (Exercise 5.22).
We summarize the key idea in this section using more suggestive
language.
Summary 5.3 Outage for parallel channels
Outage probability for a parallel channel with L sub-channels and the th
channel having random gain h :
poutR = 
 1
L
L
   
=1
log1+ h
2SNR < R

 (5.85)
where R is in bits/s/Hz per sub-channel.
The th sub-channel allows log1+ h
2SNR bits of information per symbol
through. Reliable decoding can be achieved as long as the total amount
of information allowed through exceeds the target rate.
5.4.5 Fast fading channel
In the slow fading scenario, the channel remains constant over the transmission
duration of the codeword. If the codeword length spans several coherence
periods, then time diversity is achieved and the outage probability improves.
When the codeword length spans many coherence periods, we are in the
so-called fast fading regime. How does one characterize the performance limit
of such a fast fading channel?
Capacity derivation
Let us first consider a very simple model of a fast fading channel:
ym = hmxm+wm (5.86)
where hm = h remains constant over the th coherence period of Tc symbols
and is i.i.d. across different coherence periods. This is the so-called
block fading model; see Figure 5.19(a). Suppose coding is done over L such
coherence periods. If Tc
     1, we can effectively model this as L parallel
sub-channels that fade independently. The outage probability from (5.83) is
poutR = 
 1
L
L
   
=1
log1+ h
2SNR < R

 (5.87)
200 Capacity of wireless channels
Figure 5.19 (a) Typical
trajectory of the channel
strength as a function of
symbol time under a block
fading model. (b) Typical
trajectory of the channel
strength after interleaving. One
can equally think of these
plots as rates of flow of
information allowed through
the channel over time.
m
l = 0
h[m]
l = 1 l = 2 l = 3
m
h[m]
(a) (b)
For finite L, the quantity
1
L
L
   
=1
log1+ h
2SNR
is random and there is a non-zero probability that it will drop below any
target rate R. Thus, there is no meaningful notion of capacity in the sense of
maximum rate of arbitrarily reliable communication and we have to resort to
the notion of outage. However, as L→, the law of large numbers says that
1
L
L
   
=1
log1+ h
2SNR→log1+ h 2SNR (5.88)
Now we can average over many independent fades of the channel by coding