diff --git "a/markdown/misc/wireless.md" "b/markdown/misc/wireless.md" new file mode 100644--- /dev/null +++ "b/markdown/misc/wireless.md" @@ -0,0 +1,3616 @@ +Department of Justice +,"'''''''''<11 Bureau of Investigation +, Operational Technology Division + +## Wireless Evdlutidn In **This** Iselil-It:: .. Wireless Evolutidn I!I Tech Bytes + +- LONG TERM EVOLUTIQN ill CLDUD SERVICES +- 4G TECHNOLOGY +ill GESTURE-RECOGNITION +- FCC ON BROADBAND +- ACTIVITY-BASED NAVIGATION +'aw PUIi! + +I' -. q + +## Message From Management T + +he bou~~aries of technology are constantly expanding. + +Recognizing the pathway of emerging technology is a key element to maintaining relevance in a rapidly changing technological environment. + +While this proficiency is fundamentally important in developing strategies that preserve long-term capabilities in the face of emerging technologies, equally important is delivering technical solutions to meet the operational needs of the law enforcement customer in a dynamic 'threat' environment. How can technical law enforcement organizations maintain the steady-state production of tools and expertise for technical collection, while infusing ideas and agility into our organizations to improve our ability to deliver timely, relevant, and cutting edge tools to law enforcement customers? Balancing these two fundamentals through an effective business strategy is both a challenge and an opportunity for the Federal Bureau of Investigation (FBI) and other Federal, state, and local law enforcement agencies. + +This ~dition .of th~ Emerging Technr.::0.:,;:lo.li:i:;::;es:....:.:=:::.:.:::::.:....J.=.!!.!L., L-_______ **...Jln** the last decade, smartphone technology and the ability to communicate data over handheld and other portable devices have grown exponentially. Simple Personal Digital Assistants (PDAs) have been replaced with the iPhone, Android, and other Global Positionin System +(GPS) enabled hybrid devices. + +When we consider strategies to mitigate risks posed by a......::-:-_~_~_~ ______ .....IThe concepts of innovation and collaboration focused on the customer's requirements are not limited to technology. These principles + +rm..;a.:..y_b;;.;e_a;;....;;.s.;;.;ou:.;;n;.;;;d...;:s:.::tr;.;;;at.::e;su...:.::.:.~:a..:;::::.:.:.:...:::.:~~.:.:.:::.:!IL_---J can help deliver relevant technical solutions successfully, +L-________ .JAs an alternative, consider the opportunity to employ a customer-centric business strategy that combines technology, innovation, and collaboration. This strategy was recently incorporated into the FBI's efforts to develop technical tools to combat threats along the Southwest Border. + +The customer-centric approach calls for a high degree of collaboration among engineers, subject matter experts (SMEs), and the investigator to determine needs and requirements. + +To encourage innovation, the technologists gain a better understanding of the operational and investigative needs and tailor the technology to fit the end user's challenges. + +Rather than developing solutions from scratch, the customercentric approach leverages and modifies the technoloe:v to fit the customer's nFlFlrt~.1 +Organizations that have traditionally been successful in vertical lines of production (sometimes referred to as stovepipes) +can also benefit from an injection of this type of horizontal +"internal consultancy" to jumpstart their capabilities. One way to implement this customer-centric business strategy is to empower a team of engineers and SMEs with the latitude to work across multiple departments, selecting those technologies that best fit the customer's needs. By setting the customer's requirements as the end goal, the internal and external collaboration is driven by the user's requirements. + +The unique tool or capability derived from this process is the product of the collaboration. + +As law enforcement moves forward into the 21st century, emerging technologies such ~.IoW.L"""'liiLLLL.W~.I.II.II.LJJ..LIOJ.-'I1.IiLol, other wireless tech nolo ies especially when the technology is changing at such a rapid pace. We can count on technology to change. Our strategy for dealing with this change can make a difference in the technical tools we provide our Federal, state, and local law enforcement customers. + +1. Message From, Management . . . - . - . - . . - . - - - - - . . - - - . - - - - - - - - . - - - - - - - I +2. The FCC's Net Neutrality Rules (CIU) ........ 2 +3. Wireless Evolution ........ 4. +4. !,:ong Term Evolution ........ +~':I: +5. 4G: Technology. ........ ' ..... " .... '. - . - . - . - . - - - . - - . . - . - . . . - . - - - 26 +6. WI.reless. Cell PhQnQ< TQQhnQlog,es: A; ShQrHuJQrlC!1.. . " ........ " . . . ...... 30 +7. +Opera.tQt'~ l;>i1em.m~1 femtQcelt or'WHW' ........ , . , , .... 3~ +8. fCC's, P.Qsltion: Qn: SJQij,<1.Q.iYJd.l Whit~ SRC!~Q-.... " - ", " ........ , .... '. " ........ 3'4l +9~ elou~ Ser.v.iQ~s ........ " ...... " . , ........ ' . ' ., . , . " . , . , .. 3QJ +tQ~ Wlreg;v.s. Wl.reles$, .. " ........ " .... ' . , , ....... " , ...... , . , , 4? + +U. Qri<1~jn~:th~H~.~p., Wi-,lii, HQ.t$p-qts; . " ........ " - , ... 4:~ +~2.'. Fr.Qffl; Wl-f.1 tc)'. MiF,i, '.' ~ ... ' ........ " . " ........ 49; +t3'. $lu,Fp. l;>i~itaL ~y'edrgeP'er ........ , , ........ 5(:)' +:1.:41., Hu.ma,l)) 1;)Q.t.: Trantm!~~iqo~. - ........ , - - . - . . - - . . . . .. . . - - . . . . . . . . , . - - . . . . - . - s~ +t;S . G-e$tu.re.,r.e<;:qg,nitiQI1l ........ '. , ........ ~6J +:!i.Q. Mlcr;QsQfi WIJfler - ' .. , ........ , ........ ~9: +1;1. CQu.nt~r.t~it ~a(lgQts.. - . . . . - . - - . ........ , .... 6Q~ +~S'. A.<;:tiv.itY-basec;t; Naxig,atiQI1: ' ....... " ........ , ........ 9~ +t9~ Tech Sytes ... ' ........ " ........ , . " . , ........ 6Q. +~Q:. Patents; Qf.lnterest . " ...... , ........ 6~. +2:1;. GIQssar.y ..... , .. , ...... , ........ 69. +~2. Teclt Insights ........ ' ........ , .. - 12 +6Qing Dark - A Rev.iew. QUhe NatiQnal' ~awful Int~rcept Strategy. ........ 7.3, +23. FYI' ........ , ........ 76 + +While this document is believed to contain correct information, neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, expressed or Implied, or assumes legal responsibility for the accuracy, completeness, Dr usefulness of any information, apparatus. product, service, or process disclosed or represents that its use would not infringe privately owned rights. Reference herein to any speCific commercial product, process, or service by its trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. + +This document contains privileged, deliberative, sensitive information which relates to the.electronic surveillance procedures and capabilities, of law enforcement and other government agencies as well as their state of knowledge relating to such issues. The public or unauthorized and inappropriate disclosure of this document/information will, in fact facilitate the circumvention of the law. Circulation of this document, either physically or electronically is controlled and reserved exclusively to the FBI. Recipients of this document from the FBI may not publish, circulate or re-disclose this document or any information contained herein to any other person outside their agency without the express prior, written consent of the FBI. The only authorized methods of disposal are shredding or burning. + +## 2. The Fcc's Net Neutrality Rules + +than fixed broadband. However, the FCC's rules prohibit mobile broadband providers from blocking lawful websites and applications that compete with their voice and video telephony services. + +EXECUTIVE SUMMARY +On December 21, 2010, the Federal Communications Commission (FCC) approved new rules aimed at regulating how broadband service providers offer ifldividuals and organizations the ability to access the Internet. + +The FCC's goal was to, " ... provide greater clarity and certainty regarding the continued freedom and openness of the Internet." In doing so, it adopted four basic principles: +Transparency A key purpose of the FCC's transparency rule is to enable third-party experts (e.g., independent engineers and consumer watchdogs) to monitor and evaluate network management practices, in order to surface concerns regarding potential open Internet violations. The rule itself reads: + +- Transparency. Fixed and mobile broadband providers +must disclose the network management practices, +performance characteristics, .and terms and conditions +of their broadband services; +- No Blocking. Fixed broadband providers may not block +lawful content, applications, services, or non-harmful +devices; mobile broadband providers may not block +lawful websites, or block applications that compete with +their voice or video telephony services; + +UA person engaged in the provision of broadband +Internet access service shall publicly disclose accurate +information regarding the network management practices, +performance, and commercial terms of its broadband +Internet access services sufficient for consumers to make +informed choices regarding use of such services and for +content, application, service, and device providers to +develop, market, and maintain Internet offerings.'t! + +- No Unreasonable Discrimination. +Rxed broadband +providers may not unreasonably discriminate in +transmitting lawful network traffic; and +- Reasonable Network Management. +Reasonable +practices employed by broadband Internet access +service providers that are consistent with open Internet +protections. +However, critics warn the FCC's new rules could Include introduction of usage-based pricing for accessing the Internet at home and preferential treatment for companies that pay extra for faster access to the network. Another potential short coming of the rules as identified by critics is that service providers may choose which websites can run faster than others over their respective networks .. Still critics warn that the FCC's actions are an inappropriate over-reach of a Federal agency. + +The FCC's reasoning for the transparency rule is based on five tenets. First, the FCC believes disclosure will ensure end users can make informed choices regarding the purchase and use of broadband service. Second, as end users' +confidence in broadband providers' practices increases, their adoption of broadband services will increase as well. Third, disclosure supports innovation, investment, and competition by ensuring that startups and other edge +providers have the technical information necessary to create and maintain online content, applications, services, and devices, and to assess the risks and benefits of embarking on new projects. Fourth, disclosure increases the likelihood that broadband providers will abide by open Internet principles, and that the Internet community will identify problematic conduct and suggest fixes. + +Fifth, disclosure will enable the FCC to collect information necessary to assess, report on, and enforce the other open Internet rules. + +THE FCC'S NET NEUTRALITY RULES +The FCC's rules come after its issuance of its "Connecting America: The National Broadband Plan," as mandated by the American Recovery and Reinvestment Act of 2009 +(See ETR Bulletin Article entitled, "FCC Broadb"and Plan," +June 2010, Volume 7, Issue 1). + +The FCC has largely restricted the application of its rules to fixed, or wired, broadband access services while only requiring mobile broadband providers to comply with the transparency rule. + +The FCC's rationale, in part, is based on its assertion that mobile broadband is at an earlier stage in its development No Blocking The purpose behind the FCC's no blocking rule is to ensure the freedom of consumers to send and receive lawful content. In addition, it is intended for users and providers to use and provide applications and other services without fear of blocking that may otherwise inhibit the Internet's openness and competition in adjacent markets such as +........ + +use the network less to pay less. + +voice communications and video and audio programming. + +The rule itself reads: + +'~ person engaged in the provision of fixed broadband +Internet access service, insofar as such person is so +engaged, shall not 'block lawful content, applications,. +services, or non- harmful devices, subject to reasonable +network management "2 + +In sliort, the nO-blocking rule prohibits broadband service +providers from impairing or degrading particular content, +applications, services, or non-harmful devices so as to +render them effectively unusable (subject to reasonable +network management). + +Reasonable Network Management +The FCC's three above rules are all subject to a fourth, +underlying belief that broadband service providers should +be allowed to institute reasonable network management +protocols and practices. Legitimate network management +purposes identified by the FCC are: ensuring network +security and integrity, including by addressing traffic that +is harmful to the network; addressing traffic unwanted +by end users (including by premise operators), such as +by providing services or capabilities consistent with an +end user's choices regarding parental controls or security +capabilities; and reducing or mitigating the effects of +congestion on the network. The rule itself reads: + +'~ network management practice is reasonable if it is +appropriate and tailored to achieving a legitimate network +management purpose, taking into account the particular +network architecture and technology of the broadband +Internet access service.'" + +No Unreasonable Discrimination +In the course of conducting the rulemaking, the FCC found +that fixed broadband service providers have incentives +as well as the ability to discriminate in their handling +of network traffic in ways that can harm innovation, +investment, competition, end users, and free expression. +The FCC's rule attempts to strike a balance between +restricting harmful conduct and permitting beneficial forms +of differential treatment. The rule itself reads: + +'~ person engaged in the provision of fixed broadband +Internet access service, insofar as such person is so +engaged, shall not unreasonably discriminate in transmitting +lawful network traffic over a consumer's broadband +Internet access service. Reasonable network management +shall not constitute unreasonable discrimination.'13 + +The + FCC acknowledged that reasonable network +management practices may differ across service +platforms. For example, practices to manage congestion +on a fixed satellite network may be inappropriate for a +fiber-to-the-home network. The FCC also recognized the +unique network management challenges facing broadband +providers that use unlicensed spectrum to deliver service +to end-users (i.e., unlicensed spectrum is shared among +multiple users and technologies and no Single user can +control or assure access to the spectrum). + +CONCLUSION +The FCC's Net Neutrality rules have sparked a large amount +of controversy since they were issued in December 2010. +Diverse interpretations of the rules characterize them as +either having gone too far in a heavy-handed attempt +to regulate the Internet or not having gone far enough in +protecting consumers' interests. The only thing on which +critics agree is that the rules are vague and subject to +interpretation and will likely lead to lawsuits as the FCC +implements them. + +The FCC's primary purpose behind its "no unreasonable +discrimination" rule can be summed up by its concern +over the following three practices. First, the FCC prohibits +discrimination that harms an actual or potential competitor +to the broadband provider (such as by degrading certain +Voice over Internet Protocol (VoIP) applications or services +when the broadband provider offers telephone service). +Second, prohibit practices that harm end users (such +as by inhibiting end users from accessing the content, +applications, services, or devices of their choice). Third, +prohibit practices that impair free expression (such +as slowing traffic from a particular blog because the +broadband provider disagrees with the content of blogger's +message). + +"Intelligence provides the information we need, + but technology further enables us to find the +patterns and connections in that intelligence." + +However, the FCC's rule does not prohibit tiered or usage- +based pricing. + The rules adopted by the FCC do not +prevent broadband providers from asking subscribers who +use the network more to pay more, and subscribers who + +~ FBI Director Robert S. Mueller, III +........ + +2 Ibid, para. 63. + +3 Ibid, para. 68. + +## 3. Wireless Evolution + +competing approaches, but has significantly extended the life of each of its member technologies. + +HSPA is strongly positioned to be the dominant mobile-data technology for the next five to ten years. To help leverage service provider investments in HSPA, the Third Generation +. Partnership Project (3GPP) standards body has developed a series of enhancements to create "HSPA Evolution", commonly referred to as "HSPA+". HSPA+ represents a rational development of the Wldeband Code Division Multiple Access (WCDMA) approach, and it is the pathway to a totally new 3GPP radio platform called 3GPP LTE. LTE, which uses Orthogonal Frequency Division Multiple Access1 +(OFDMA), was initially deployed in 2010. At the same time, +3GPP recognizes the significant worldwide investments in GSM networks, and has defined enhancements to drastically increase EDGE data capabilities through an effort called Evolved EDGE. + +INTRODUCTION +The vision of a robust mobile broadband capability has become a reality with millions of people actively using smartphones, tablets, netbooks, Personal Digital Assistants (PDAs) and laptops with wireless Third Generation (3G)/Fourth Generation (4G) access. But this is only the beginning of what is to come. This will be the decade of the "anywhere/anytime" social existenGe with mobile broadband being integrated into every aspect of life. Recent major developments include: 3G near ubiquity, expanded smartphone capabilities, the availability of hundreds of thousands of mobile user applications, the introduction of new form factors (e.g. tablets), projections of mobile data, bandwidth demand that exceeds current capacity, and industry and government acknowledgement of the need for more spectrum. Other developments include: implementation of data offload via Wi-Fi and Femtocells, dramatic performance increases through High Speed Packet Access (HSPA) enhancements, initial deployments of Long Term Evolution (LTE) technology, and significant progress on specifications that will meet "true" +4G requirements. A lot is happening in the wireless sector. + +Combining these advances in radio-access technOlogy, +3GPP has spearheaded the development of major core-network architectural enhancements (e.g., the IP +Multimedia Subsystem (lMS)) [See IMS Mini Tutorial) and the Evolved Packet Core2 (EPC), formerly called System Architecture Evolution (SAE). These developments will make possible new types of services, effective integration of legacy and new networks, the convergence of fixed and wireless systems, and the transition from circuit-switched architectures for voice traffic to a fully packet-switched delivery solution. The result is a balanced portfolio of complementary technologies that includes both radio access and core networks, provides service providers maximum freedom in how they enhance their networks over time, and delivers unified voice and data services. + +3G technology has demonstrated the power and potential of always-on, anywhere network connectivity and has created a wave of industry innovation that spans devices, applications, Internet integration, and new business service delivery models. Currently used by hundreds of millions of people, mobile broadband connectivity is on the verge of becoming ubiquitous. It is doing so on a powerful foundation of networking technologies including Global System for Mobile Communications (GSM) with Enhanced Data Rates for GSM Evolution (EDGE), HSPA, and LTE. LTE, in a forthcoming release called LTE-Advanced, will be one of the first technologies to meet the new requirements of International Mobile Telecommunications Advanced (IMT- +Advanced), an International Telecommunications Union +(ITU) project, and realize a true 4G technology. + +This white paper focuses on the evolution of EDGE, HSPA enhancements, 3GPP LTE; the capabilities of these technologies, and their position relative to other primary competing technologies. It explains how these technologies fit into the ITU roadmap that leads to IMT-Advanced and the migration from 3G to 4G. The following are some important observations. (Subsequent ETR Bulletins will look at these technologies and new applications supported as they are rolled out onto the network.) +Through continuous innovation, Universal Mobile Telecommunications System (UMTS) with HSPA technology has established itself as a global, mobile-broadband solution. Building on the phenomenal success of GSM, the GSM-HSPA ecosystem has become the most successful communications technology family ever. Through a process of constant improvement, the GSM family of technologies has not only matched or exceeded the capabilities of + +- The wireless technology road map now extends to +IMT-Advanced with LTE-Advanced being one of the +first technologies specified to meet the IMT-Advanced +........ + +1;0" EnE" B' ,t S + .,. + ; f + r + 5 QWl" + "TT gIl) (WiG;'I*9Y9) Aetti!slosull fL.'" 111111 ~ ~) FB' a + I; + +- LTE has become the technology platform of choice as +requirements. LTE-Advanced will be capable of peak throughput rates that exceed 1 Gigabit per second +(Gbps). + +GSM-UMTS and Code Division Multiple Access (CDMA)/ +One Carrier Evolved, Data Optimized (EV-DO) service +providers are making strategiC, long-term decisions to +deploy their next generation platforms. +- Future networks will be networks otnetworks consisting +of multiple-access technologies, multiple bands, widely +varying coverage areas, all self-organized and selfoptimized, and based on an IMS approach. +- GSM-HSPN will comprise the large majority of +subscribers over the next five to ten *years,* even as new +wireless technologies are developed. The deployment of +- GSM-HSPA has a significant global lead in terms of +subscribers, deployment, and services. It will continue +to dominate other wide-area wireless technologies. +LTE and its coexistence with UMTS-HSPA will be similar +to the deployment of UMTS HSPA and its coexistence +with GSM. +- 3GPP has made considerable progress on how to +enhance LTE to meet the requirements of IMT-Advanced +in an activity referred to as LTE-Advanced. LTE-Advanced +is expected to be the first true 4G system available. +Specifications are to be completed by March of 2011, +and the earliest deployment may be in 2012. +In current deployments, HSPA users regularly experience throughput rates far in excess of 1 Megabit per second +(Mbps), generally under favorable conditions, on both downlinks and uplinks, with 4 Mbps downlink speed commonly being observed. Planned enhancements such as dual-carrier operation3 will double user achievable peak throughput rates. + +- HSPA-LTE has significant economic advantages over +other wireless technologies. +- WiMAX has developed network speCifications supported +by many providers, but it will likely represent only a very +small percentage of wireless subscribers over the next +five years. +- HSPA+ provides a strategic performance roadmap +advantage for incumbent GSM HSPA service providers. +Features such as multi-carrier operation, Multiple InpuV Multiple Output (MIMO)4, and higher-order modulation +offer service providers several options for upgrading +their networks, with many of these features (e.g., multicarrier, higher order modulation) being available as +network software upgrades. With all planned features +implemented, HSPA+ peak rates will eventually reach +168 Mbps. +- EDGE technology has proven highly successful and is +broadly deployed on GSM networks globally. Advanced +capabilities with Evolve.d EDGE can double and ultimately +quadruple current EDGE throughput rates, halve latency, +and increase frequency spectral efficiency. +- HSPA+ with 2x2 MIMO, successive interference +cancellation,5 and 64 Quadrature Amplitude Modulation6 +(QAM) is more spectrally efficient than competing +technologies including Worldwide Interoperability for +Microwave Access (Wi MAX) Release 1.0. +- EPC will provide a new core network that supports both +LTE and interoperability with legacy GSM-UMTS radioaccess networks and non-3GPP based radio access +networks. Policy based billing and control provides +flexible quality-of-service (QoS) management, enabling +new types of applications, as well as billing measures. +- The 3GPP OFDMA technology used in LTE matches or +exceeds the capability of any other OFDMA systems. +Peak theoretical downlink rates are 326 Mbps in a 20 +Megahertz (MHz) channel bandwidth. LTE assumes a +full Internet Protocol (IP) network architecture, and it is +designed to support voice in the packet domain. +- Innovations such as EPC and UMTS one-tunnel +architectureS will "flatten". the network, simplify +deployment, and reduce latency. This is a significant +benefit for service providers that will impact lawful +surveillance methods. +3 A mobile device in a dual-carrier communication system communicates with a network via first and second carriers by receiving data in the first cell via one +of the first and second carriers on one carrier frequency, whilst receiving syst!lm information and/or downlink data from a second cell via the other of the +first and second carriers on another carrier frequency. +4 MIMO is the use of multiple antennas at both the transmitter and receiver to improve communication performance. +5 Users are ordered by their chance of successful decoding and the packet of the strongest user is decoded first. After a packet is decoded, the signal is +reconstructed and subtracted from the received signal. The rest of the users are ordered again for the next round of decoding. The procedure is performed iteratively over all users. +6 QAM Is both an analog and a digital modulation scheme. It conveys two analog message signals, or two digital bit streams, by changing (modulating) +the amplitudes of two carrier waves, using the amplitudeshift keying (ASK) digital modulation scheme Dr amplitude modulation (AM) analog modulation +scheme. +confusion. The following table highlights the generational characteristics. + +## Table 3-11G To 4G + +- +, +,I +I Generation +Requirements +I' +Comments +I +No official +Deployed in the 1980s. +lG +requirements. +Analog technology. + +Transition to 4G +There is some misunderstanding in the industry as to what technology falls into which cellular generation. Generally speaking, lG refers to analog cellular technologies; it was first available in the 1980s. 2G denotes initial digital systems, introducing services such as short messaging and lower (limited) speed data.9 CDMA2000 1xRTT and GSM +are the primary 2G technologies, although CDMA2000 +1xRTT is sometimes called a 3G technology because it meets the 144 Kilobits (kbps) mobile throughput requirement for 3G. EDGE also meets this refluirement. 2G +technologies became available in the 1990s. + +| No | official | +|----------|---------------| +| Digital | Technology. | +| . | requirements. | +| First | digital | +| Deployed | in | +| New | services.such | +| 2G | | +| Short | Mess!lge | +| (SMS) | and | +| Primary | technologies | +| include | 'IS-95 | +| GSM. | | +| ITU's | IMT-2000 | +| Primary | technologies | +| required | 144 | +| include | CDMA2000 | +| 3G | | +| mobile, | 384 | +| EVDO | and | + +3G requirements were specified by the ITU as part of the International Mobile Telephone 2000 (IMT-2000) +project, for which digital networks had to provide 144 +Kbps of throughput at mobile speeds, 384 Kbps at pedestrian (walking) speeds, and 2 Mbps while stationary. + +UMTS-HSPA and CDMA2000 EV-DO are the primary +3G technologies, although WiMAX was recently also designated as an official 3G technology. 3G technologies began deployment in the last decade (2000s). + +| | pedestrian, | 2 | Mbps | +|----------|----------------|------|----------| +| WiMAX | now | an | official | +| indoors. | | | | +| 3G | technology. | | | + +ITU's IMT-Advanced No technology meets requirements today. + +IEEE 802.16m and LTE Advanced being designed to meet requirements. + +The ITU recently issued requirements for IMT-Advanced. + +They constitute the only official definition of 4G. The requirements include operation in up to 40 MHz radio channels with extremely high spectral efficiency. However, the lTU recommends operation in up to 100 MHz radio channels and peak spectral efficiency of 15 bps/Hz, resulting in a theoretical throughput rate of 1.5 Gbps. + +Previous to the publication of these requirements, 1 Gbps was frequently cited as the 4G goal. + +No available technology meets these requirements, today. + +It will require new technologies such as LTE-Advanced (with work already underway) and IEEE 802.16m. For marketing purposes, some have tried to label current versions of WiMAX and LTE as "4G", but this is only accurate to the extent that such designation refers to the general approach or platform that will be enhanced to meet the +4G ITU requirements. + +While service providers are starting to deploy LTE networks today, it will be the middle of the next decade before a large percentage of subscribers will actually be using LTE +(or LTE-Advanced). During this deployment period, most networks and devices will support the full scope of the +3GPP family of technologies (GSM EDGE, HSPA, and LTE). + +The history of wireless network deployment provides a useful perspective. GSM, which in 2009 was stili growing its user base, was specified in 1990 with initial networks deployed in 1991. The UMTS Task Force established itself in 1995, Release 99 specifications were completed in +2000, and HSPA+ specifications were completed in 2007. + +Although it's been more than a decade since work began on the technology, only now is UMTS deployment and acceptance starting to take off. Figure 3-1 highlights the transition of wireless technology from early 2000. + +With WiMAX and HSPA significantly outperforming current +3G requirements, calling these technologies 3G clearly does not give them full credit, as they are a generation beyond existing technologies. But calling them 4G is not exactly correct either. Unfortunately, the generational labels do not properly capture the scope of available technologies and have resulted in some amount of market +........ + +infrastructure. If an LTE picocell is serving a small number of houses using fiber backhaul, is this a wireline or wireless network? The answer is both. + +Bandwidth Management Trends Given enormous growth in usage, mobile service providers are either employing or considering multiple approaches to manage their limited bandwidth: + +- More spectrum. Spectrum correlates directly to +capacity, and more spectrum is becoming available +globally for mobile broadband. Purchase of spectrum +from the government. however, is expensive. +- Increased spectral efficiency. Newer technologies are +spectrally more efficient, meaning greater throughput in +the same amount of spectrum. +- More cell sites. Smaller cell sizes result in more +capacity per subscriber, as fewer users are competing +for the frequency spectrum. +Wireless versus Wireline Advances Today. wireless technology assumes a dominant role in communications, even though wireline technology, with fiber links. has inherent capacity advantages. + +The overwhelming global success of mobile telephony, and the growing demand for mobile data, conclusively demonstrates the desire for mobile communications. + +- Femtocells.l1 Ferntocells can significantly offload the +macro network. Pricing plans can encourage users to +move high-bandwidth activities (e.g., movie downloads +and IPTV) to Femtocell connections. +- Wi-Fi. Wi-Fi networks offer another means of offloading +intense radio access traffic. +- Off-peak hours. Service providers can offer lower rates +or fewer restrictions on large data transfers that occur at off-peak hours such as overnight. +Mobile broadband combines robust high-speed data services with mobility and anytime, anywhere access. + +Thus, the opportunities are endless when viewing the many diverse markets mobile broadband can effectively address: +Developed countries continue to show incredible demand for. mobile broadband services. Additionally, in developing countries, there is no doubt that 3G technology will cater to both enterprises and their high end mobile workers and consumers, for whom 3G can be a cost effective solution, competing with digital subscriber line (DSL) or cable for at home access. + +- QoS. By prioritizing traffic. large downloads can occur +with lower priority, thus not affecting other active users. +(See Article 2 on FCC's Net Neutrality Rules) +- Innovative data plans. Creative new data plans that +influence consumption behavior, including tiered pricing, +could make usage affordable for most subscribers, and could discourage excessive or abusive use. +It will take a creative blend of all of the above to make the mobile broadband market successful and to enable it to exist as a complementary solution to wired broadband. + +Relative to wireless networks, wireline networks have always had superior capacity, and historically have always delivered faster throughput rates. Wireless technologies have increased typical user throughput rates; however, wireline enjoys a consistent lOx advantage over wireless technologies. It is not throughput that makes wireless access attractive, it is mobility. Taking advantage of the .strengths of each technology leads to the efforts to support seamless mobility (e.g., roaming through multiple networks). + +EDGE/HSPA/HSPA+/LTE Deployment Most GSM networks today support EDGE, which represents more than 478 networks in approximately 190 countries.12 +Meanwhile, UMTS has established itself globally. Nearly all WCDMA handsets are also GSM handsets, so WCDMA +users can access the broad base of GSM networks and services. + +Despite some of the inherent limitations of wireless technology relative to wireline. its fundamental appeal of providing access from anywhere has fueled its market growth. As the decade progresses, the lines between wireline and wireless networks will blur. The fact is that wireless networks are mostly wireline in their transport +........ + +## F .... 1 + +modems, routers, laptops, media players, and cameras. + +There are more than 500 million UMTS-HSPA customers worldwide spanning 347 commercial networks.13 +324 +service providers in 137 countries offer HSDPA and 100 of these have deployed HSUPA. Almost all I:JMTS operators are deploying HSPA for two reasons: + +- The incremental cost of HSPA is relatively low, and +Service providers have begun deploying evolved HSPA +features. As of June 2010, 65 HSPA+ networks are in service in 35 countries.14 +As the technology matures, upgrading to HSPA+ will likely represent a minimal investment for service providers in order to significantly boost their network performance. + +- HSPA makes such efficient use of spectrum for data +that it results in a much lower overall cost per Megabyte +(MB) of data delivered. +Demonstrating marketplace commitment to HSPA +technology, at the close of 2010, there were ,more than +2,350 commercial HSPA devices available worldwide from +230 suppliers. Devices include handsets, data cards, LTE appears' to be the preferred choice for service providers as their next-generation wireless technology. It has also been selected by public~safety organizations as their broadband technology of choice. The Association of Public-Safety Communications Officials15 (APCO) and the National Emergency Number Association (NENA) have both endorsed LTE.is + +## Competitive Positioning Of Wireless Technologies Table 3-2 Competitive Position Of Major Wireless Technologies + +-- +I +- +II +I +Technology +EDGEjHSPAjLTE +CDMA2000 +WiMAX +- +II +Subscribers +Over 4.4 billion +518 million17 today; slower growth expected +61 million anticipated by 2014 +than GSM-HSPA +Maturity +Extremely mature +Extremely mature +Emerging +Adoption +Cellular operators globally +Cellular operators globally +Umited to date +Coverage/Footprint +Global +Global with the general exception of Western +Umited +Europe +Deployment +Fewer cell sites required at 700 Fewer cell sites required at 700 and 850 MHz +Many more cell sites required at 2.5 +and 850 MHz +Devices +Broad selection of GSM/ +Broad selection of 1xRIT/EV-OO devices +Initial devices emphasize data +EDGE/UMTS/ HSPA devices +Radio Technology +Highly optimized TDMA for +Highly optimized COMA for Rev 0/ A/B +Optimized OFDMA in Release 1.0, +EDGE, COMA for HSPA, OFDMA +More optimized in Release 1.5 +forLTE +Spectral Efficiency +Very high with HSPA, matches +Very high with EVOO Rev AlB +Very high, but not higher than HSPA+ +OFDMA approaches in 5 MHz +for Release 1.0, and not higher than +with HSPA+ +LiE for Release 1.5 +Throughput +Peak downlink user-achievable +Peak downlink user-achievable rates of over +3 to 6 Mbps typical rates with bursts +Capabilities +rates of over 4 Mbps today +1.5 Mbps, with significantly higher rates in the +to 10 Mbps +with achievable rates of over 8 +future +Mbps today with HSPA+ +Voice CapablDty +Extremely efficient circuit-voice +Extremely efficient circuit-voice available today +Relatively Inefficient VolP initially; +available today; smooth- +EV-DO radio channels With VolP cannot support +more effiCient in later stages, but +est migration to VolP of any +circuit-voice users +lower than LTE Voice coverage will be +technology +much more limited than cellular +Simultaneous Voice +Available with GSM18 and +Not available today. Available with VolP and +Potentially available, though initial +and Data +UMTStoday +future devices +services will emphasize data +Efficient Spectrum +Entire UMTS radiO channel +Radio channel today limited to either voice/ +Currently only efficient for data +Usage +available for any mix of voice +medium speed data or high speed data only +centric networks +and high speed data +........ + +13 CiSCO, Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update; February 10, 2010. + +14 3G Americas, June, 2010. + +IS APCO International Is the world's largest organization of public safety communications professionals, It serves the needs of public safety communications practitioners worldwide and the welfare of the general public as a whole by providing complete expertise, professional development, technical assistance, advocacy, and outreach. + +combination of EPC and LTE is referred to as the Evolved Packet System (EPS). + +3GPP Evolutionary Approach +3GPP standards development falls into three principal areas: radio interfaces, core networks, and services. With respect to'radio interfaces, rather than focusing on anyone wireless approach, 3GPP's evolutionary plan recognizes the strengths and weaknesses of every technology and consequently,exploits the unique capabilities of each one. + +Note that GSM, based on a Time Division Multiple Access19 +(TDMA) approach, is mature and broadly deployed. + +LTE is crucial to service providers since it provides the efficiencies and capabilities demanded by the rapidly growing mobile broadband marKet. The cost for service providers to deliver data (e.g., cost per MB) is almost directly proportional to the spectral efficiency of the technology. LTE has the highest spectral efficiency of any currently specified technology, making it an essential technology as market demand increases. + +Already extremely efficient, there are nevertheless opportunities for additional optimization and enhancements. Standards bodies have already defined +"Evolved EDGE", which was available for deployment in the 2009 to 2010 timeframe. Evolved EDGE more than doubles throughput over current EDGE systems, reduces latency by half, and increases spectral efficiency. By the end of the decade, due to total market momentum, the majority of worldwide subscribers will still be using GSM/ +EDGE technologies. + +LTE supports both FDO and TDD modes. Many deployments will be based on FDD in paired spectrum. The TOD mode, however, will be important in enabling deployments where paired spectrum is unavailable. LTE TDO will be deployed in China; it will be available for Europe at 2.6 GHz, and available for the U.S. Broadband Radio Service (BRS) 2.6 +GHz band. It is also being considered for the TOO portions of the U.S. Wireless Communications Service (WCS) band. + +Over the last year, LTE TOD has developed considerable market momentum, and Is emerging as a competitive threat to other OFDMA TOO technologies. + +ITU's IMT-Advanced To address ITU's IMT-Advanced requirements, 3GPP is developing LTE-Advanced, a technology that will have peak rates of more than 1 Gbps. + +Meanwhile, CDMA was selected as the basis of 3G +technologies including WCDMA for the Frequency Division Duplex20 (FDD) mode of UMTS and Time Division COMA +(TD-CDMA) for the Time Division Duplex (TOD) mode of UMTS. The evolved data systems for UMTS, such as HSPA +and HSPA+, introduce enhancements and simplifications that help CDMA based systems equal the capabilities of competing systems, especially with 5 MHz spectrum allocations. + +Development of GSM and UMTS-HSPA happens in stages referred to as 3GPP releases. Equipment vendors' products support particular versions of each specification. It is important to realize that 3GPP releases address multiple technologies. For example, Release 7 optimizes Voice over Internet Protocol (VoIP) for HSPA, but also significantly enhances GSM data functionality with Evolved EDGE. A +summary of the different 3GPP releases is as follows:22 + +- Release 99: Completed. First deployable version of +UMTS. Enhancements to GSM data (EDGE). Majority of +deployments today are based on Release 99. Provides +support for GSMjEDGEjGPRS/WCDMA radio-access +networks. +- Release 4: Completed. Multimedia messaging support. +Firststepstoward using IP transport in the core network. +- Release 5: Completed. HSDPA. First phase of IMS. +Full ability to use IP-based transport instead of just +Asynchronous Transfer Mode (ATM).inthe core network. +HSPA innovations such as dual-carrier21 HSPA, synchronizes the operation of HSPA on two adjacent 5 MHz carriers for higher throughput rates. In combination with MIMO, dualcarrier HSPA will achieve peak network speeds of 84 +Mbps, and quad-carrier HSPA will achieve peak rates of +168 Mbps. Given some of the advantages of an Orthogonal Frequency Division Multiplexing (OFOM) approach, 3GPP +has specified OFDMA as the basis of its LTE effort. + +LTE incorporates best-of radio techniques to achieve performance levels beyond what would be practical with CDMA approaches, especially in larger channel bandwidths. Similar to the way that 3G coexists with 2G +systems in integrated networks, LTE systems will coexist with both 3G systems and 2G systems. Multimode devices will function across LTE/3G or even LTEj3G/2G, depending on network circumstances. Beyond radio technology, EPC +provides a new core architecture that enables both flatter architectures and integration of LTE with both legacy GSM +HSPA networks, as well as other wireless technologies. The + +- Release 6: Completed. HSUPA. Enhanced multimedia +........ + +## I Hi 'Ii" Ii' Fi" 15 .,. 'F Tis Elf Gfjilill "18 Qai ,I ""Eo"R) 9 ,. , , 1 - " , Pe, ""Ly + +support through Multimedia Broadcast/Multicast Services (MBMS). Performance specifications for advanced receivers. Wireless Local Area Network +(WLAN) integration option. IMS enhancements. Initial VolP capability. + +for additional global harmonization of the 1.7/2.1GHz band. These new spectrum bands, allocated harmoniously across North, Central, and South America, are critical to efficiently meeting the growing needs of customers for mobile broadband applications. + +- Release 7: Completed. Provides enhanced GSM data +The Federal Communications Commission (FCC) auctioned the 700 MHz band23 in the United States in January +2008. The availability of this band, the Advanced Wireless Services (AWS) band at 1710-1755 MHz with 2110-2155 +MHz in the U.S., and the forthcoming 2.6 GHz frequency band in Europe are providing service providers with wider deployment options. A growing number of providers are also deploying UMTS at 900 MHz, a traditional GSM band. + +functionality with Evolved EDGE. Specifies HSPA+, +which includes higher order modulation and MIMO. +Performance +enhancements, +improved +spectral +efficiency, increased capacity, and better resistance +to interference. Continuous Packet Connectivity (CPC) +enables efficient "always-on" service and enhanced +uplink UL VolP capacity, as well as reductions in call +set-up delay for Push-to-Talk Over Cellular (PoC). Radio +enhancements to HSPA' include 64 QAM in the downlink +DL and 16 QAM in the uplink. Also includes optimization +of MBMS capabilities through the Multicast/Broadcast, +Single-Frequency Network (MBSFN) function. +The spectrum projection does not take into account that small (short) message traffic (e.g., e-mail queries and SMS) consumes a disproportionate amount of capacity, nor that providers need additional radio channels for infill coverage or to separate24 voice and data traffic on different channels. + +- Release 8: Completed. Includes further HSPA Evolution +features such as simultaneous use of MIMO and 64 +QAM. Includes dual-carrier HSPA (DC-HSPA) wherein two +WCDMA radio channels can be combined for a doubling +of throughput performance. Specifies OFDMA-based +3GPP LTE. Defines EPC. +Spectrum needs vary by service provider. Some may experience shortages well before others depending on multiple factors such as the amount of spectrum they have, cell site density relative to user demographics, type of devices they service, and their customer service plans. As the amount of available spectrum increases and as technologies simultaneously become spectrally more effiCient, total capacity rises rapidly, supporting more subscribers and making malJY new types of applications feasible. + +- Release 9: Completed. HSPA and LTE enhancements +including HSPA dual-carrier operation in combination +with MIMO, EPC enhancements, Femtocell support, +support for regulatory features such as emergency user +equipment positioning and the Commercial Mobile Alert +System (CMAS), and evolution of IMS architecture. +- Release 10: Under development. Expected to be +complete in 2011. Will specify LTE-Advanced that meets +the requirements set by ITU's IMT-Advanced project. +Also includes quad-carrier operation for HSPA+. +Different countries have regulated spectrum more loosely than others. For example, service providers in the United States can use. either 2G or 3G technologies in cellular, Personal Communications Service (PCS), or 3G bands, whereas in Europe there are greater restrictions, although efforts are under way that will result in greater flexibility including the use of 3G technologies in current 2G bands. + +Spectrum Another important characteristic of UMTS-HSPA deployment is the expanding number of available radio bands and the subsequent support from infrastructure and mobile equipment vendors. The fundamental system design and networking protocols remain the same for each band; +however the frequency dependent portions of the radios have to change. + +As new frequency bands become available for deployment, standards bodies are adapting UMTS for these bands. This includes 450 and 700 MHz. The 1710-1770 MHz uplink was matched with the 2110-2170 MHz downlink to allow With the projected increase in the use of mobile-broadband technologies, the amount of spectrum required by the next generation of wireless technology could be substantial. + +In the U.S., the FCC has committed itself to finding an additional 500 MHz of spectrum over the next 10 years as part of its National Broadband Plan. This would effectively double the amount of spectrum for commerCial mobile radio service. As regulators make more spectrum available, it is important that such spectrum be: +........ + +## Idn Hilsiiiistisii I'Si Schbial Yse E"L> (Ii8;Tijwilj N I' I I I "J , If + +1. +Coordinated on a regional or global basis. +2. +Unfettered by spectrum caps and other legacy voicecentric spectrum policies. +3. Made available in the widest radio channels possible +(e.g., 10 MHz, 20 MHz, and mor.e). +4. +Utilized efficiently without causing interference to +existing spectrum owners. +network performance is by using flatter architectures. The more hierarchical a network, the more effortlessly it can be managed centrally. The tradeoff, however, is reduced performance, especially for data communications, because packets must pass through and be processed by multiple nodes in the network. To enhance data performance and, in particular, to reduce latency (packet delays), 3GPP has defined a number of enhancements in Release 7 and Release 8 that decrease the number of processing nodes and result in a flatter architecture. + +Emerging technologies such as LTE benefit from wider radio channels. These wider radio channels are not only spectrally more efficient; they offer greater capacity, which is an important attribute because typical broadband usage contributes to a much higher load than voice applications. + +Note that watching a YouTubeTM video consumes 100 times as many bits per second on the downlink as a voice call. + +Release 7 introduces an option called one-tunnel architecture that allows service providers to configure their. networks to allow user data to bypass a serving node and travel directly via a gateway node. There is also an option to integrate the functionality of the Radio Network Controller25 (RNC) directly into the base station. + +For Release 8, 3GPP defined an entirely new core network called the EPC. The key features and capabilities of EPC +include: + +- Reduced latency and higher data performance through +a flatter architecture +Of some worry in this regard is that spectrum for LTE +is becoming available in different frequency bands in different countries. Initial U.S. deployments will be at 700 +MHz, in Japan at 1500 MHz, and in Europe at 2.6 GHz. + +With so many varying spectrum bands, roaming operations based on GSM or HSPA on common regional or global bands will likely be required. + +- Support for both LTE radio access networks and +interworking with GSM-HSPA radio access networks + +## Core-Network Evolution + +- The ability to integrate non-3GPP networks such as +Wi MAX +- Optimization for all services provided via IP +3GPP is defining a progression of enhancements to the core network to improve network performance and the range of services provided. Improvements will enable a shift to all IP architectures. One way to improve core + +- Comprehensive, network-controlled, QoS architecture + +## Evolution Of Toma, Coma, And Ofoma Systems + +........ + +~------------------------------------------------------- +Service Evolution Not only do 3GPP technologies provide continual improvements in capacity and data performance, they also develop capabilities that expand the services available to subscribers. Important service advances include Fixed Mobile Convergence (FMC), IMS, and broadcasting" +technologies. + +it supports not only FMC, but also a much broader range of potential applications. In the United States, AT&T has committed to an IMS approach and has already deployed an IMS4Jased video sharing service. Although defined by +3GPP, the Third Generation Partnership Project 2 (3GPP2), +'CableLabs, and WiMAX have adopted IMS. IMS is how VolP +will (or could) be deployed in CDMA 2000 EV-DO, WiMAX, HSPA, and LTE networks. + +FMC refers to the integration of fixed selYices (such as telephony provided by wireline or Wi-Fi) with mobile cellular based services. Although FMC is still in its beginning stages of deployment, it promises to provide significant benefits to both users and service providers. + +For users, FMC will simplify how they communicate, making it possible for them to use a single device (e.g., a smart cell phone) at work, on the go or at home where it might connect via a Wi-Fi network or a Femtocell" as well as the macro-radio network. + +Users will also benefit from single voice mailboxes and single phone numbers, as well as the ability to be in command of how and with whom they communicate. For service providers, FMC allows the consolidation of core services across multiple access networks. For instance, a service provider could offer complete VolP based voice service that supports access via DSL, cable, Wi-Fi, or 3G. + +FMC also offloads data intensive applications such as movie or video downloads from the macro network. + +IMS allows innovative amalgamation of different types of communications and information including voice, video, Instant Messaging (1M), presence information, location, multi-media messaging, and documents. It provides application developers the platform to create applications that have never before been possible. It allows people to communicate in entirely new ways by dynamically using multiple services, with the" ability to move from one application to another depending on the communication needs, all in real-time. For example, during an interactive chat session, a user could launch a voice call, and then include another person in that call or chat. Or during a voice call, a user could suddenly establish a simultaneous video connection or start transferring files while still communicating via a voice connection. While browsing the Web, a user could decide to speak to a customer service representative and transfer data to assist in the communications. IMS will be a key platform for all IP +architectures for both HSPA and LTE. + +A new initiative called Rich Communications Suite (RCS), supported by many service providers and vendors, builds upon thelMS technology. It provides a consistent feature set, as well as implementation gUidelines, use cases, and reference implementations. RCS uses existing standards and specifications from 3GPP, OMA, and GSMA. + +Core RCS features include: + +- An enhanced phone book (device and/or network +based) that includes service capabilities and presence +enhanced contact information +- Enhanced +messaging (supporting text, +instant +messaging, and multimedia) with chat and messaging +history +- Enriched calls that include multimedia content (e.g., +video sharing) during voice calls +There are various approaches for FMC including Generic Access Network (GAN), previously called Unlicensed Mobile Access (UMA), femtocells, and IMS. With GAN, GSM-HSPA devices can connect via Wi-Fi or cellular connections for both voice and data. UMA/GAN is a 3GPP +technology, and it has been deployed by a number of service providers including T-Mobile in the United States. + +A substitute for using Wi-Fi for the "fixed" portion of FMC +is femtocells These are small base stations that cost little more than a Wi-Fi access point, and, like Wi-Fi, femtocells leverage a subscriber's existing wireline broadband connection (e.g., cable or DSL). Instead of operating on unlicensed bands, femtocells use the service provider's licensed bands at very low power levels. The significant advantage of the femtocells approach is that single mode, mobile communication devices can now operate using the femtocell. + +IMS is another key technology for convergence. It supports access to core services and applications via multiple access networks. IMS is more powerful than GAN, because Another important new service is support for mobile TV +through what is called multicast or broadcast functions. + +3GPP has defined multicast/broadcast capabilities for both HSPA and LTE . + +. . . . . . . . . + +applications for information and control. Today, two widely deployed capabilities include location queries and SMS. + +Voice Support While 2G and 3G technologies were deployed from the beginning with voice and data capability, LTE networks can be deployed with or without voice support. Moreover, there are a number of methods available for voice support including fallback to 2G/3G and VolP operation. (See Long Term Evolution Article) +Device Innovation Computing is becoming more mobile, and notebook computers and smartphones are now prevalent. In fact, With location services, mobile devices or external applications (e.g., applications operating on computers outside of the network) can query the location of a user, subject to privacy restrictions. This can significantly enhance many applications including navigation, supplying location of nearby destinations (e.g., restaurants and stores), location of friends for social networking, and worker dispatch. With SMS, external applications can send user requested content such as flight updates. + +aU mobile phones are becoming "smart", with some form of data capability. Also, leading notebook vendors are now offering computers with integrated 3G (e.g., HSPA) +capabilities. Modems are available in multiple formats including USB devices, Personal Computer (PC) cards, and Express cards. + +4 +Short Messaging Send and receive of SMS including delivery +receipts +6 +Payment + +Smartphones are becoming extremely powerful mini computers with general purpose operating systems and sophisticated application development environments. + +Smartphones, originally targeted for the high-end of the market, are now available at much lower price points and thus, are affordable to a much larger market segment. + +In the U.S., smartphones already account for some 25% +of phones today, and they are on track to reach 50% by +2011. 26 The continued success of the BlackBerry along witb the success of the iPhone and Android devices demonstrates the potential of this market. From a radio perspective, today's phones can support ever more bands and technologies. This makes phones that work across the world feasible. Increasingly, users expect their phones to work anywhere they go. + +Computer manufacturers are also delivering new form factors such as netbooks, tablet computers, mobile Internet devices (MID), and smartbooks. The movement to open networks allows a greater number of companies to develop products that use wireless networks in both vertical-market and horizontal-market scenarios. Cellular telephones are becoming more powerful and feature large color touch displays, graphics and video viewers, still cameras, movie cameras, music players, 1M clients, email clients, PoC, downloadable and executable content capabilities, and more powerful browsers. All of these capabilities consume data. + +Network Interfaces for Applications Another important development related to service evolution is service providers making interfaces available to external +........ + +| 'Send | aiid | +|----------------------|---------| +| i'e~ive | | +| of | | +| niultime~ia,meSsages | | +| Prepald | and | +| reservations | | + +- Eventual Market ConSOlidation. Though the market +is currently fragmented, there are certain platforms +(e.g., AndrOid, BlackBerry, and iPhone) that represent +a relatively dominant market share. Increasingly, +developers are choosing to develop for just a small +number of these platforms using the development tools +specific to that environment. +Broadband-Wireless Deployment Considerations Much of the debate in the wireless industry deals with the merits of different radio technologies. Yet, other factors are equally important in determining the services and capabilities of a wireless network. These factors include the amount of spectrum available, backhaul, and network topology. + +Mobile Application Architectures Many applications used over wireless connections will be the same as those used over the Internet with desktop/laptop PCs. An increasing number of applications, however, will be developed specifically for mobile devices. + +This can be a challenge for developers, because there are a number of different mobile platforms available including Android, Apple iPhone, liMo, Palm Pre, RIM BlackBerry, Symbian, and Windows Mobile. Unlike the desktop market, the mobile device market has become fragmented. Each of the device platforms comes with its own application development environment, and developers must face a learning curve to become adept at programming for any specific platform. Some developers may be content targeting specific platforms. Others, however, may need their applications to operate across multiple platforms. + +Fortunately, there are various developments that address the fragmentation challenge. These include: +Spectrum has always been a major consideration for deploying any wireless network, but it is particularly important when looking at high-performance broadband systems. HSPA and HSPA+ can deliver high throughput rates on the downlink and uplink with low latency in 5 MHz channels when deployed in single frequency (1/1) reuse. + +By this, we mean that every cell sector (typically three per cell) in every cell uses the same radio channel(s). + +- Mobile Middleware. These are software infrastructures +that consist of a client component that operates on the +mobile device, and a server component that acts as a +proxy for the client. Vendors provide tools with which +developers can develop an application in a platformneutral manner, which enables the application to +operate on multiple device types. Mobile middleware is +mostly used for business applications. +To achieve higher data rates requires wider radio channels, such as 10 or 20 MHz wide channels, in combination with emerging OFDMA radio technologies. Very few operators today, however, have access to this much spectrum. It was challenging enough for GSM operators to obtain UMTS spectrum. If delivering very high data rates are the objective, then the system must minimize interference. + +This result is best achieved by employing looser reuse, such as having every sector use only one-third of the available radio channels (1/3 reuse). The 10 MHz radio channel could now demand as much as 30 MHz of available spectrum. + +- Mobile Web 2.0. Mobile browsers are adopting many +of the same sophisticated capabilities as desktop +browsers. Combined with networks that have higher +throughputs and lower latency27, an increasing number +of applications can be Web hosted, making the applications available from diverse platforms. Mobile +Web 2.0 technologies include items such as Ajax, offline +operation, video capabilities, fast JavaScript execution, +and mash-ups (combining data from multiple Web +sources). Cloud computing, enabled by Mobile Web 2.0, +will play an important role for mobile systems and for +desktops. +- Push Architectures. Many mobile applications are +notification oriented, meaning users want to know when +new information is available in applications like e-mail +or social networking. "Pushing" small amounts of data +on a regular basis to large numbers of users, or having +devices poll on a regular basis, can impact network +capacity. In response, 3GPP has specified supporting +mechanisms such as Paging Channel (PCH) states and +tools for enabling rapid transitions between active and +inactive states. +Backhaul is another factor. As the throughput of the radio link increases, the circuits connecting the cell sites to the core network must be able to handle the increased load. With many cell sites today serviced by just a small number of T1/El circuits, each able to carry only 1.5/2.0 +Mbps, operators are in the process'of upgrading backhaul capacity to obtain the full benefit of next-generation wireless technologies. Approaches include emerging wireline technologies such as VDSl and optical Ethernet, as well as point-to point microwave systems. An OFDMA +system with 1.5 bps per hertz (Hz) of spectral efficiency in +10 MHz on three sectors has up to 45 Mbps average cell throughput. + +........ + +Additionally, any technology's ability to reach its peak spectrum efficiency is somewhat contingent on the system's ability to reach the instantaneous peak data rates allowed by that technology. For example, 'a system claiming spectrum efficiency of 1.5 bps/Hz (as described) might rely on the anility to reach 100 Mbps instantaneously to achieve this level of spectrum efficiency. Any constraint on the transport system below 100 Mbps will restrict the range of achievable throughput and, in turn, impact the spectral efficiency of the system. + +Wi-Fi has huge inherent capacity for two reasons. First, a large amount of spectrum (approximately 500 MHz) +is available across 2.4 and 5 GHz bands. Second, the spectrum is used in small coverage areas, resulting in high frequency reuse. The result is much higher bps rates per square meter of coverage than with WANs. Various organizations are looking at integrating WLAN service with GSM Communications GSM-HSPA data services. The GSM Association has developed recommendations for Subscriber Identity Module (SIM) based authentication of hotspots, and 3GPP has multiple initiatives that address WLAN integration into its networks, including 3GPP System to WLAN interworking, UMA, IMS, and EPC. + +Finally, the overall network topology also plaY$ an important role, especially with respect to latency. Low latency is critical to achieving very high data rates, because of the way it affects Transmission Control Protocol (TCP)/ +IP traffic. How traffic routes through the core networkhow many hops and nodes it must pass through-can influence the overall performance of the network. One way to increase performance is by using flatter architectures, meaning a less hierarchical network with more direct routing from mobile device to end system. The core EPC network for 3GPP LTE emphasizes a flatter architecture. + +Integration can either be loose or tight. Loose ihtegration means data traffic routes directly to the Internet and minimizes traversal of the service providers network. This is called local breakout. Tight integration means data traffic, or select portions, may traverse the service providers core network. This is beneficial in situations where the service providers offer value added services (e.g., internal portals) +that can only be accessed from within the core. + +It can be misleading to say that one wireless technology outperforms another without a full understanding of how that technology will be deployed in. a complete system that also takes spectrum into account. + +Essential to successful data offload is providing a good subscriber experience. This mandates measures such as automatically provisioning subscriber devices with the necessary Wi-Fi configuration options and automatically authenticating subscribers on supported public Wi-Fi networks. Work in 3GPP Release 10 is defining some specific mechanisms for offloading traffic. One is called IP Flow and Seamless Offload (IFOM) used to carry select traffic over Wi-Fi instead of a Femto connection. Another is called Selected IP Traffic Offload (SIPTO) used to offload the mobile core network by separating traffic out early. + +Data Offload As data traffic loads increase, operators are seeking to offload some of the data traffic to other networks, particularly Wi-Fi networks. In the future, once they are widely deployed, offload onto Femtocells will also play an important role. The IEEE 802.11 family of technologies has experienced rapid growth, mainly in private deployments. + +The latest 802.11 standard, 802.11n, offers users throughputs in excess of 100 Mbps and improved range through use of MIMO. 802.11e provides QoS enabling VolP and multimedia, 802.11i enables robust security, and 802.11r provides fast roaming, which is necessary for voice handover across access points. + +Feature and Network Roadmap GSM service providers first enhanced their networks to support data capability through the addition of General Packet Radio Service (GPRS) infrastructure with the ability to use existing cell sites, transceivers, and interconnection facilities. Since installing GPRS, GSM service providers have largely upgraded data service to EDGE, and any new GSM network includes EDGE capability. + +Service providers have deployed UMTS-HSPA worldwide. + +Although, UMTS involves a new radio access network, several factors facilitate deployment. First, most UMTS +cell sites can be collocated in GSM cell sites enabled by multi-radio cabinets that can accommodate GSMjEDGE, as well as UMTS equipment. Second, much of the GSM/ +Leveraging this success, service providers-including cellular operators-are offering hotspot service in public areas such as airports, fast-food restaurants, and hotels. + +For the most part, hotspots are complementary with cellular-data networks, because the hotspot can provide broadband services in extremely dense user areas and the cellular network can provide broadband services across much larger areas . + +. . . . . . . . . + +station including using the same shelter, tower, antennas, power supply, and climate control. + +GPRS core network can be used. This means that all corenetwork elements above the Serving GPRS Support Node +(SGSN) and Mobile SWitching Center (MSC}-the Gateway GPRS Support Node (GGSN), the Home Location Register +(HLR), billing and subscriber administration systems, service platforms, and so forth-need, at most, a software upgrade to support 3G UMTS-HSPA. + +And while early 3G deployment used separate 2G/3G +SGSNs and MSCs, all-new MSC and/or SGSN products are capable of supporting both GSM and UMTS-HSPA radio access networks. Similarly, new HSPA equipment will be upgradeable to LTE through a software upgrade. + +Different vendors have different so-called "zero-footprine solutions allowing service providers to use empty space to enable reuse of existing sites without the need for any new floor space. A service provider can add LTE capability simply by adding a LTE baseband card. New multi-standard radio units (HSPA and LTE), as well as LTE only baseband cards, are mechanically compatible with existing building practices, so that operators can use empty space in an old base station for LTE baseband cards, thus enabling reuse of existing sites without the need for any new construction. + +Base station equipment is available for many bands including the 1.7/2.1 GHz AWS band and the recently auctioned 700 MHz bands in the U.S. In 2010, service providers and vendors began LTE deployment. On the device side, multi mode chipsets will enable devices to easily operate across UMTS and LTE networks. For example, one chipset vendor announced a series of chips that support the following combination of technologies: +UMTS, HSPA+, and LTE; EVDO Rev B; and UMTS, HSPA+, EV-DO Rev Band LTE.28 +New features are being designed so that the same upgraded UMTS radio channel can support a mixture of terminals. In other words, a network supporting Release +5 features (e.g., HSDPA) can support Release 99, Release +5, and Release 6 terminals (e.g., HSUPA) operating in a Release 5 mode. This flexibility assures the maximum degree of forward and backward compatibility. Note that most UMTS terminals today support GSM, thus facilitating use across large coverage areas and multiple networks. + +Once deployed, operators can minimize the costs of managing GSM/EDGE and UMTS networks, because these networks share many of the same aspects including: + +- Packet-data architecture +One important and interesting aspect of technology deployment is that an advanced technology such as LTE +enables service providers to upgrade prior technologies, such as HSPA. Examples include: + +- Cell. sites +- Antenna systems - Backhaul circuits - Subscriber account management +- VolP for HSPA: since LTE uses an IP core, once it is +deployed, supporting voice on HSPA via VolP will be +a much Simpler task as it can share the same core IP +network as LTE +- Service platforms +- Device processing power: supporting the high throughput +rates with LTE (e.g., 50 Mbps or higher) will provide +sufficient processing in the device to also support very +high HSPA rates (e.g., 30 Mbps or higher) +Users largely don't even need to know what type of network they are connected to because their multimode GSM-HSPA (and eventually GSM-HSPA-LTE) devices can seamlessly hand off between networks. + +## The Gsm Family Of Technologies, Which Are Interchangeably Called The 3Gpp + +The changes being planned for the core network are another aspect of evolution. Here, the intent is to reduce the number of nodes that packets must traverse. This will result in both reduced deployment costs and reduced latency. The key enabling technology is EPC, which is described in detail later in this paper. + +family of technologies, are all based on the evolution of standards developed for GSM, EDGE, UMTS-HSPA, HSPA+, LTE, and LTE-Advanced. + +The upgrade to LTE will be relatively straightforward, with new LTE infrastructure having the ability to reuse a significant amount of the UMTS-HSPA cell site and base +..., 4G Americas' Board of Governors +........ + +[-Year_ +r +---- - +-~ ---- +- +- +-- +Features +L +- -- +---- -- +-- -- +Evolved EDGE capabilities available to significantly increase EDGE throughput rates -and announced +deployments. HSPA+ peak speeds further increased to peak rates-of 42 Mbps based on Release 8. LTE +2010 +. introduced for next-generation throughput performance using 2X2 MIMO. Advanqed core architectures +, available through ~PC, primarily fo~ LT~, but aiso fo~ ~$PA+, ,providing benefits such as integration of +multiple antenl"!as., +.. +. . +' +' +2011 +LTE enhancements such as 4X2 MIMO and 4X4 MIMO available. LTE-Advanced specifications completed. +HSPA+ with MIMO and dual-carrier available. +-- +2012 +: i.TE-Adv~mced potentially deployed in initial'stages. HSPA+ with MIMO and quad-carrier avail~ble. M9st +,ano'later +n~w s~rvi(!es implemented in the packet domain. +. ' + +Over time, the separate GSM/EDGE Radio Access Network (GERAN), UTRAN, and core-infrastructure elements will undergo consolidation, thus lowering total network cost and improving integrated operation of the separate access networks. For actual users with multimode devices, the networks they access will be largely transparent Today, nearly all UMTS phones and modems support GSM/EDGE. + +Service providers will deploy LTE in various configurations. Some will offer only data service on LTE. Others will offer data service 'on LTE in combination with voice over 2G or 3G. Yet others will provide both voice and data service on LTE. + +Individual service provider configurations will also evolve over time. + +| I | ---- | - | -- | +|---------------|--------------------|-----------|---------| +| II | | | | +| 'f | - | - | | +| I | | | | +| ,I | | | | +| II | | | | +| Peak | and/or | ' | | +| ! | | | | +| i | | | | +| Peak Network | Peak | and/or | Typical | +| Ii | | | | +| Peak | Network | T' | | +| I U | R | | | +| t : | | | | +| I' | | | | +| I | | | | +| I" | | | | +| I | | | | +| yplca | ser | a | | +| e | | | | +| _ _ _ J | | | | +| Speed | (Down) | :: | | +| _us~~te | | | | +| - | | | | +| Down | | | | +| .l | | | | +| ~~e~d | (UP~Lmk) | | | +| II | | | | +| (UP-Linkl_ | | | | +| I | | | | +| 236.8 | kbps | | | +| EDGE | (type | 1 | MS) | +| Terminal) | | | | +| 200 | kbps | peak | 70 | +| 135 | kbps | typical | | +| - . | t':Mbps':peak.350' | .. | | +| to | 100 | kbps | typical | +| _ | | | | +| expe<;~e_d | ,(Qu,a~:C_arri~rk | | | +| Evolved | EDGE | (type | 2 | +| 1894.4 | | | | +| 33 | | | | +| kbps | | | | +| ' | | | | +| , | | | | +| - | | | | +| -UMTS' | WCDMA | -Release' | 99- | +| 2.048-Mbps | | | | +| , | | | | +| , | | | | +| 384 | kbps | | | +| UMTS | WCDMA | Release | 99 | +| (Practical | Terminal) | | | +| 350 | kbps | peak | | +| 200 | to | 300 | | +| kbps | typical | | | +| HSDPA | Initial | Devices | (2Q06) | +| , > | | | | +| -1,MpP's:peak | | | | +| i.8 | | | | +| Mbps | | | | +| - | | | | +| - | | | | +| . | | | | +| HSDPA | | | | +| 14.4 | Mbps | | | + +........ + +29 A type 1 Evolved EDGE MS can receive on up to ten timeslots using two radio channels and can transmit on up to four t1meslots in one radio channel using +32 QAM modulation (with turbo coding in the downlink), + +| | 236.8 | kbps | +|-------------|----------|---------| +| 200 | kbps | peak | +| 70 | to | 135 | +| typical | | | +| ; | 4Q(): | | +| kbpipeak' ' | | | +| : | 15.o-to | 300 | +| : | typia! | | +| ~xpecteQ | | | +| , | | | +| 947.2 | kb | | +| pS | | | +| 34 | | | +| . | | | +| - | | | +| - | | | +| ,768 | | | +| kbps | | | +| - - | | | +| . | | | +| - | | | +| , | | | +| . | | | +| , | | | +| - | | | +| - | | | +| 384 | kbps | | +| ~384 | kbi>~ | | +| 350 | kbps | peak | +| 200 | to | 300 | +| kbps | typical | | +| $50:kbps | peak | - | +| , | | | +| - | | | +| 384 | kbps | | +| HSPA35 | Initiallmpleme'ntation | +|-------------|---------------------------| +| 7,2 | Mbps | +| > | | +| 5 | Mbps | +| 2 | Mbps | +| > | | +| 1,5 | Mbps | +| 700 | kbps | +| 500 | kbps | +| typical | | +| 36 | | +| Mbps | typical | +| HSPA | Current | +| 7,2 | Mbps | +| HSPA | | +| ,14,4 | Mbps | +| 5,76 | Mbps | +| HSPA+ | (DL | +| 21,6 | Mbps | +| 1,9 | Mbps | +| 11,5 | Mbps | +| 1 | Mbps | +| QAM,2 | X 5 | +| 13 | Mbps | +| 8 | | +| Mbps | | +| -HSPA+ | (2X2 | +| 28 | Mbps | +| 11,5 | Mbps | +| QAM, | UL | +| .. | | +| HSPA+ | (2X2 | +| 42 | Mbps | +| 11,5 | Mbps | +| DL | 64 | +| 5 | | +| MHz) | | +| . | HSPA+ | +| 84 | Mbps | +| 23 | Mbps | +| : | DL | +| Carrier, | 2 X | +| - | | +| HSPA+ | (2X2 | +| 168 | Mbps | +| DL | 64 | +| Carrier, | 2 X | +| LTE | (2X2 | +| 70 | Mbps | +| 5,9 | to | +| pS | | +| 39 | | +| 35 | Mbps | +| LTE | (4X4 | +| 326 | Mbps | +| 86 | Mbps | +| CDMA2000 | 1XRlT | +| 153 | kbps | +| CDMA2000 | lXRTT | +| 307 | kbps | +| CDMA2000 | EV-DO | +| > | | +| 1 | Mbps | +| 153 | kbps | +| 150 | kbps | +| CDMA2000 | EV-DO | +| > | | +| 1,5 | Mbps | +| > | | +| 1 | Mbps | +| 600 | kbps | +| typical | | +| 40 | | +| kbps | typical | +| CDMA2000 | EV-DO | +| 14.741 | Mbps | +| 5.4 | Mbps | +| radio | channels | +| CDMA2000 | EV-DO | +| 73.5 | Mbps | +| Theoretical | (15 | +| WiMAX | Release | +| 46 | Mbps | +| 1 | to | +| 42 | | +| 4 | Mbps | +| MHzTDD, | DLjUL-3, | +| MIMO) | | +| Wi | MAX | +| TBD | | +| TBD | | +| IEEE | 802.16m | +| TBD | | +| TBD | | +| *Blue: | indicates | +| | | + +3$ HSPA consists of systems supporting both HSDPA and HSUPA, +38 Typical downlink and uplink throughput rates based on AT&T press release, June 4, 2008 +31 3G Americas analysis, Assumes Release 7 with 64 QAM and F-DPCH, Single user. 50% loading In neighboring cells. Higher rates expected with subsequent versions. + +38 Vodafone press release, Vodafone Trials HSPA+ Mobile Broadband at Speeds of Up To 16Mbps," January 15, 2009. + +3G Americas' member company analysis, Assumes single user with 50% load In other sectors, Verizon Is quoting average user rates of 5-12 Mbps on the downlink and 2-5 Mbps on the uplink for their network. https://www.lte.vzw.com/AboutlTE/VerizonWlrelesslTENetwork/tabld/6003/Default.aspx +39 Assumes 64 QAM. Otherwise 22 Mbps with 16 QAM. + +40 Typical downlink and uplink throughput rates based on Sprint press release January 30, 2007. + +large economies of scale, widespread acceptance by service providers,' paired services like messaging and multimedia, and an incredible variety of competitive handsets and other mobile user devices. Currently, more than 347 commercial UMTS-HSPA networks are already in operation. UMTS~HSPA and/or LTE offers an excellent migration path for GSM service providers, as well as an effective technology solution for greenfield providers. + +CONCLUSION +During 2010, the mobile broadband industry grew rapidly with data intensive smartphones on track to becoming the most common phone type used in developed countries and with innovative new devices such as the Apple iPhone4 and iPad. 3G is becoming ubiquitous in developed countries, and advanced wireless technologies such.as LTE +are starting to see initial rollouts. The growing success of mo"i:ii1e' broadband, however, has mandated the network requirement to increase capacity to which the industry has responded by using more efficient technologies, deploying more cell sites, and offloading. onto either Wi-Fi or Femtocells. Governments have also responded with supportive planning to supply more commercial spectrum. + +HSPA has significantly enhanced UMTS by providing a broadband data service with user rates that often exc~ed +1 Mbps on the downlink in initial deployments and that now exceed 4 Mbps in some commercial networks. + +Numerous networks are being upgraded to' include HSUPA, providing users with uplink rates in excess of 1 Mbps. + +HSPA+ increases rates further, with typical rates between +1.9 and *B.B* Mbps expected in initial versions of the technology (based on 64 QAM). Speeds will only increase as service providers implement other HSPA+ innovations such as Dual-Carrier, Multi-Carrier43, and MIMO. + +By means of constant innovation, the EDGE/HSPA/ +LTE family of technologies has proven itself to be the predominant wireless network solution and offers service providers and subscribers a' true mobile broadband capability. Continued use of GSM and EDGE technology through ongoing enhancements allows service providers to .. Ieyerage existing network investments. UMTS-HSPA technologies' advantages provide broadband services that deliver increased data transport and provide a path to an all services IP architecture. + +Continual improvements in radio technology are expected. Improvements to the core network through flatter architectures, particularly EPC, that will reduce latency, speed applications, simplify deployment, enable all services within the IP domain, and allow a common core network to support both LTE and legacy architectures is a.lso anticipated. + +LTE is currently the most widely chosen technology platform for the coming decade and with deployment underway, the benefits include a best practice, long-term solution that meets or exceeds the performance of competing approaches. The migration to 4G, however, is a long-term one. Until the middle of this decade, most subscribers will still be using 2G and 3G. Significant uptake of LTE may not occur until the second half of this decade. + +Networks are rapidly moving toward providing the "always on, anywhere, anytime", type of communications support, with corresponding increases in traffic demanded by users in developed countries. Network limitations are constantly being addressed with solutions that make this vision a reality. Users will expand to include deviceto-device applications, thus expanding pOint-to-point and point-to-multipoint cpmmunications. Smart homes, smart appliances, cars, and sensors are among the new communications devices that are a part of the communications explosion. The number and types of devices that communicate will grow rapidly once the network supports the volume at a reasonable cost. The way we communicate is set to change drastically. + +Today, HSPA offers the highest peak data rates of any widely available, wide-area wireless technology. With continued improvements, peak data rates will increase, spectral efficiency will improve, and latency will decrease. + +The result will be support for more users and more data intensive applications. The scope of applications will also increase as new services, achieved through standardized network interfaces, become available such as location information, video, and user initiated call control. Greater efficiencies and capabilities translate to more competitive offers, greater network usage, and increased traffic. + + "What works on the net works + for people in general. The net has + very little to do with technology, what +matters is how people use the technology." + +Because of practical benefits and deployment momentum, +the migration path from EDGE to HSPA, and then to LTE is +foreseeable. Benefits include the ability to roam globally, + +- Craig Newmark, Founder, Craigslist +........ + +IMS Mini Tutorial The benefits of using IMS include handling all communication in the packet domain, tighter integration with the Internet, and a lower cost infrastructure that is based on IP building blocks used for both voice and data services. This allows operators to potentially deliver data and voice services at a lower cost, thus providing these services at cheaper prices and further driving demand and usage. + +IMS applications can reside in the operator's network or in third-party networks including those of enterprises. By managing services and applications centrally-and independently of the access network-IMS can enable network convergence. This allows operators to offer common services across 3G, Wi-Fi, and wireline networks. + +IMS is one of the most likely methods that operators will use to provide voice service in LTE networks. Service Continuity, defined in Release 8, allows a user's entire session to continue seamlessly as the user moves from one access network to another. Release 9 expands on this concept to allow sessions to move across different device types. For example, the user could transfer a video call in midsession from a mobile phone to a large-screen TV, assuming both have an IMS +appearance in the network. + +Release 8 introduces the IMS Centralized Services (ICS) feature, which allows IMS controlled voice features to use either packet-switched or circuit-switched access . + +. . . . . . . . .. . . . . . . . . + +EXECUTIVE SUMMARY +The Third Generation (3G) to Fourth Generation (4G) +evolution m;:ly be the most dramatic change that has been intiated by the wireless industry. Carriers are deploying wireless networks that rely on an all-Internet Protocol (IP) +core that transmits information in the form of data traffic. + +The new 4G network is evolving with fewer nodes and a flatter structure, thus providing lower latency. 4G improves on the limitations of 3G byincreasing access speeds and addressing network throughput, making better use of network resources, and improving Quality of Service (QoS). + +Access Network (RAN)4, voice will be a basic service for the customer. However, voice service continuity is not guaranteed if a. Voice over IP (VoIP) subscriber roams between the LTE coverage area and other wireless networks, as it is a significant challenge to deliver voice over LTE networks. Unlike previous generations of mobile standards like Global' System for Mobile Communications +(GSM), LTE does not have dedicated channels for circuitswitched (CS) telep~ony, and instead relies on an end-toend IP connection from the handset to the core network. + +Therefore, any form of voice service used on an LTE bearer, by definition, must be some form of VoIP. + +Long Term Evolution (LTE) is seen as the next technology for mobile networks. It incluc!es promising features such as semi-persistent scheduling1, Transmission Time Interval +(TIl) bundling2, and high performance gains on Quality of end user Experience (QoE).3 The primary objective of LTE +is to provide ultra-high speed mobile broadband service with peak data rates over 100 Mbps. One of the main selling pOints of LTE is that it is supposed to encourage and foster new business models for mobile operators, especially as certain aspects of the competing WiMAX +technology are specifically intended to enhance flexibility. + +In practical applications, however, LTE is challenged to provide the same capabilities as a 2G/3G network during the initial stages of trial deployments and during the service providers' initial broad network build out. + +The industry is evaluating potential solutions to overcome the LTE voice issues. During this investigative process, two options are viewed with significant interest Circuit Switched Fall Back (CSFB)5 and LTE VolP-based Single Radio Voice Call CQntinuity (SRVCC). SRVCC provides the ability to transition a voice call from the VoIP/IMS +packet domain to the legacy circuit domain, (the ability to transition from the circuit domain to the packet domain is not addressed in the current generation of LTE standards). + +IMS is a platform that permits data sessions to be supported across telecom networks. IMS architecture may potentially allow a call to begin in the home using a wired network, transfer seamlessly to a mobile device, and then move uninterrupted into a corporate wired or wireless environment. SRVCC is broadly supported in the industry and is recommended by the LTE OneVoice Initiative. It is also supported by some of the world's largest service and network equipment providers and has been endorsed by the GSM Association (GSMA). + +A major area of innovation and opportunity for telecom services is being termed "Voice 2.0", also known as +"voice mash ups". This involves linking voice with other applications (e.g., embedding voice capabilities within a corporate application or game). A call might be invoked inside a browser or Web application, either residing on the handset or the network side. There is huge interest by service providers in monetizing their voice capabilities beyond mere "person to person' telephony". However, one of the concerns regarding LTE is the support for voice services. Wireless network architects see voice as just another application on the network. Voice continues to be the "killer application" for service providers because it continues to provide a significant portion of their revenue. Voice will remain the dominant critical service in the wireless network for years, and despite the technical challenges of providing service over an ail-iP Radio WHYSRVCC? + +Multimedia services with video sharing, video on demand, video telephony, video conferencing, VoIP, Push-To- +Talk, broadband access to Personal Digital Assistants +(PDAs), and many other applications are currently offered with the existing capabilities of the Universal Mobile Telecommunications System (UMTS) using High Speed Packet Access (HSPA), Evolved HSPA (HSPA+), Code Division Multiple Access (COMA), and IP MultiMedia Subsystems (lMS) technologies. Increased demand for these real-time mobile data services coupled with subscribers' requirements for always-on, high-quality +........ + +services is driving the need for expanded network capacity and increased throughput. + +Packet System (EPS)8 with the 3GPP Universal Terrestrial Radio Access Network (UTRAN). + +However, along with added "Voice 2.0" services, another slowly emerging trend which could be extinguished by CSFB is that of the shift towards "high definition" voice. + +Although this has been widely used in the VolP community for years, it has taken a long time to penetrate the mobile marketplace, despite being technically feasible. + +For dual-mode/single-standby mobile phones to simultaneously use dual-network services, the Inter Working Solution (IWS) node provides on-time message access. On the other hand, dual-mode/dual-standby mobile phones require fewer network chang~s to facilitate inter-working between two networks. Dual-mode handsets drain battery power quickly and- .need complex terminal customization. + +With LTE's increased data transmission capacity, interworking with 3rd Generation Partnership Project (3GPP) +and non-3GPP based networks, and all-IP core network elements, the converging services can be delivered effectively. Higher bandwidth for LTE means that more resource blocks6 can be "allocated by the lIE system, which in turn provides higher performance gains. + +For converging mobile and broadband wireless access technologies, SRVCC offers LTE-IMS based voice service within the LTE coverage area, and CS-based voice service outside the LTE coverage area. The following figure displays the reference architecture for SRVCC using EPS to 3GPP +UTRAN. + +Recognizing this reality, CSFB is a 3GPP-defined standard that requires radio devices to be equipped with either dual-mode/single-standby or dual-mode/dual-standby capabilities. In addition to CSFB, a number of other interim technologies have been suggested: + +- Voice over LTE via GAN (VoLGA) encapsulates circuit +voice within an IP Protocol Security (IPsec) tunnel over +the LTE bearer. It is an evolution of the voice-over- +WiFi standard UMA (standardized by 3GPP as Generic +Access Network (GAN)), which has existed for a few +years, however, with limited traction. It enables the +normal telephony and SMS7 application on the phone +to connect over an IP connection to the existing Mobile +Switching Center (MSC), via a gateway and handset +client. +Figure 4-1 displays the reference architecture for a CSFB +network using an Evolved Whenever the VolP subscriber moves out of LTE coverage, SRVCC ensures smooth handoff of voice from the LTE to the CS network, keeping upgrades of the network to a minimum. The IMS network that stores voice service link information during this time guides the target CS network to establish a link, thereby replacing the original VolP +channel. + +| I | PARAMETER | +|-----------------|--------------| +| SRVCC | CSFB | +| Device/terminal | | +| Single | radio | +| capability | | +| single-standby | or | +| Dualmode/dual- | | +| standby | | +Terminal +Less complex +Complex for single +customization +standby +| IMS | anchoring | +|-----------|--------------| +| Mandatory | Optional | +| Switching | Only | when | the | +|-------------------|-------------|---------|-------------| +| For | every | mobile | | +| networks/mobility | | | | +| terminal | roams | out | originating | +| to | CS | network | of | +| mobile | terminating | | | +| area | | | | +| voice | call | | | +| | | | | + +6 Resource blocks are groups of transport carriers (e.g. sub-carriers) or Intervals that are assigned to transport data. A resource block for UMTS lTE is 12 subcarriers when the subcarrier bandwidth is 15 kHz or 24 sub-carriers when the sub-carrier bandwidth Is 7.5 kHz. + +T I I 5 1F tin rIP 9tHel.1 Yse e"I, ttl!!8;'FtUtB) Rsdlc I +d I J Lj 'II Qiilj + +- +- -- +i PAR-AMETER +r SRVCC +_~_Il CSFB +'-- +- +J, +- +- +- +J +Cost +.. +'less expensive +Expensive due to + +a VolP to a CDMA Ix network using SRVCC technology. + +The existing inter-frequency/RAT gap pattern mechanism in E-UTRAN is therefore extended to support gap patterns suitable for lxRTT measurements. + +Increa~ed netw.ork +si@aling:load + +With this approach, the eNodeS is able to interwork with the 3GPP2 IXRTT MSC using the SI-MME interface with the Evolved Packet Core (EPC) Mobility Management Entity +(MME). + +| Voice | call | setup | +|-----------|----------|----------| +| Less, | as | time | +| More, | as | the | +| time | | | +| is | required | only | +| terminal | needs | to | +| when | the | terminal | +| establish | the | voice | +| moves | out | of | +| call | session | with | +| coverage | area | | +| CS | network | for | +| every | access | | + +Mobility Management Entity (MME): The MME manages mobility. Some of MME's functions are: + +| | | | - | NAS | signaling | and | related | security | +|------------|----------------|--------------|-----------------|------------|--------------|--------------|------------|--------------| +| - | Inter | CN | node | signaling | for | mobility | between | 3GPP | +| access | networks | (terminating | S3) | | | | | | +| - | Idle | mode | UE | Tracking | and | Connectivity | (control | and | +| execution | of | paging | retransmission) | | | | | | +| - | Tracking | Area | list | management | | | | | +| - | Roaming | (terminating | towards | home | HSS) | | | | +| - | Gateway | (GW) | selections | (serving | GW | and | PDN | GW | +| selection) | | | | | | | | | +| - | MME | selection | for | handovers | with | MME | change | | +| - | Serving | GPRS | Support | Node | selection | for | handovers | to | +| 2G | or | 3G | 3GPP | access | networks | | | | +| - | High | Rate | Packet | Data | (HRPD) | access | node | (terminating | +| reference | point) | selection | for | hand | overs | to/from | HRPD | | +| - | Authentication | | | | | | | | +| - | Bearer | management | functions | including | dedicated | | | | +| bearer | establishment | | | | | | | | +| - | Lawful | interception | of | Signaling | traffic | | | | + +SRVCC from LTE +SRVCC service for LTE is important when a single radio User Equipment (UE) accessing IMS anchored voice call services switches from the LTE network to the CS +domain, while it is able to transmit or receive on only one of these access networks at a given time. This basically removes the need for a UE to have multiple Radio Access Technology (RAT) capabilities. With single-radio terminals, measurement gaps are needed to allow the UE to switch onto the CS network and complete radio measurements. + +Measurement gaps define the time periods when no uplink or downlink transmissions are scheduled so that the UE +may perform the measurements. However, it is understood that the idea of CSFS fits very poorly with LTE femtocells. + +An LTE device camped onto a femto would either need to fallback to 2G/3G in the fernto itself, or look for a macro cell-site instead. Adding 2G into femtos is extremely complex, while adding 3G increases cost, complexity and time-to-market. Conversely, accessing the macro network is obviously dependent on coverage, and may have a huge performance gap with the femto for data services running in parallel. + +- Support for Single Radio VCC and CS Fallback for 2G/3G +and 1xRTT CDMA +A new Interworking Signaling (IWS) node is required and is responsible for the exchange of 3GPP 1XCS signaling messages with the MME and for establishing a CS session when the UE is in the process of switching over from the LTE network to the 3GPP lXCS network. Generally, this is a case of intersystem handover from the LTE perspective. + +The Evolved NodeB (eNodeS), (i.e., LTE base station) +is responsible for configuring the measurement gap pattern and provides it to the UE using Radio Resource Control (RRC) dedicated signaling. The UE assists the eNodeB by informing the network about its gap-related capabilities, at least mentioning if it has a dual or single receiver. This capability is transferred along with the other UE capabilities. The UE accessing the SRVCC service is assumed to have IMS Service continuity capabilities with single radio access only. + +A new S102 reference point or interface is defined between the LTE MME node and the 3GPP IXCS IWS node. + +SRVCC from LTE to 3GPP2 3.XCS +The 3GPP lXCS signaling messages are tunneled over In the case of VolP, when subscribers geographically roam this single link of S102 and thereafter, tunneled through from LTE+CDMA to CDMA, voice calls are switched from E-UTRAN/EPS tunneling messages to the UE . + +. . . . . . . . . + +r de en",. Elf +" +.,. 'f +,. + +5 + +e o,r'iat UI. QR'Y (laii}EioIlO) Pedhlss + C + tI + - + I '1 FB' 9 + " + +EVOLVED PACKET SYSTEM (EPS) ACCESS +The following process identifies the actions taken by the network to seamlessly hand off voice calls from a VolP +network to a CS network: + +1. +lxCS SRVCC UE sends measurement reports to the +eNodeB. +2. The E-UTRAN makes a determination to initiate an +inter-technology handover to CDMA2000 1xRTT. +10. The 3GPP2 lxCS IWS creates a lx message and +encapsulates it in a S102 Dire~t Transfer message (lx, +Handover indication). If the 3GPP2 access was able +to allocate resources successfully, the lx message is +a lx Handover Direction message and the handover +indicator indicates successful resource allocation. +Otherwise, the hand over indicator indicates to the MME +that handover preparation failed and the embedded +lx message indicates the failure to the UE. +11. The MME sends the lx message and CDMA2000 +3. The E-UTRAN signals the UE to perform an intertechnology handover by sending a Handover from +E-UTRAN Preparation Request message with 3Glx +Overhead Parameters. +HO Status IE in a Downlink Sl CDMA2000 Tunneling +message to the E-UTRAN. The CDMA2000 HO Status +IE is set according to the handover indicator received +over the S102 tunnel. +4. The UE initiates signaling for establishment of the CS +access leg by sending an Uplink handover preparation +message containing the lxRTT Origination message. +5. The E-UTRAN sends an Uplink Sl CDMA2000 +12. If the CDMA2000 HO Status IE indicates successful +handover preparation, the E UTRAN forwards the lx +Handoff Direction message embedded in Mobility +from E-UTRA Command message to the UE. This +is perceived by the UE as a Handover Command +message. +Tunneling message with Mobile 'Equipment Identifiers +(MElD), lx Origination, Reference Cell ID to the MME. + +The eNodeB will also include CDMA2000 Handover Required Indication Information Element (IE) to Uplink Sl CDMA2000 Tunneling message, which indicates to the MME that the handover preparation has started. + +13. The UE tries to acquire the traffic channel with the +lxRTT CS access as it becomes aware of the traffic +channel information from the CDMA2000 lxRTT +system. +6. +On receipt of the Uplink Sl CDMA2000 Tunneling +message, the MME: +14. The UE sends a lxRTI handoff completion message to +the lxRTT CS Access. +15. The lxRTT CS Access sends a message to the lxRTT +- Separates the voice bearer from the non-voice bearers +based on the QoS Class Identifier (QCI) associated with +the voice bearer (QCI 1) and CDMA2000 HO Required +Indication. +- Selects the 3GPP2 lxCS IWS based on Reference Cell +MSC to indicate that the handoff is done. The traffic +aSSignment, that was done during the session/domain +transfer of the CS access leg, between the lxCS IWS +and the lxRTT MSC, is released. +ID and encapsulates the lx Origination Message along +with the MElD and Authentication Challenge Parameter, +RAND, in a Direct Transfer message (as "ix Air Interface +Signaling") to the IWS, only for the voice bearer. +16. An ongOing voice call over the CS access leg is +established over lxRTT access. The UE continues to +transmit voice via the new access system. The voice +bearer path is no longer carried by the EPC. +7. +The traffic assignment is done between the IWS and +RTT MSC, over the Al interface using the signaling +protocols to initiate the handoff to the lXRTT system. +8. The traffic channel resources are established in the lx +RTT system and 3GPP2 lxCS procedures for initiation +of session transfer for CS access leg are performed. +17. The eNodeB initiates the release of UE context on +the EPS; it sends an Sl UE Context Release Request +(Cause) message to the MME. Cause indicates that Sl +release procedure is due to handover from E-UTRAN +to lxRTT. +18. The MME exchanges Suspend Request and Suspend +9. Whenthe lxRTTMSCreceivesa positive acknowledgment +from the lxRTT radio for traffic allocation and from the +IMS for successful domain transfer, it returns an IS-41 +handoff message to the IWS to send to the UE via the +established signaling tunnel. +Acknowledge messages with the Serving Gateway +(S-GW). With this, the Sl-U bearers are released for +all EPS bearers and the Guaranteed Bit Rate (GBR) +bearers are deactivated by the MME. The non-GBR +........ +bearers are preserved and are marked as suspended in the S-GW. Upon receipt of downlink data, the S-GW +should not send a downlink data notification message to the MME. + +Serving Gateway: The S-GW is the node that terminates the interface towards E-UTRAN. For each UE associated with the EPS, at a given pOint of time, there is a single S-GW. Serving GW functions include: + +- The local Mobility Anchor point for inter-eNodeB +handover +competitive solutions, different service providers will likely choose to implement one or the other depending on many factors including existing network assets and the overall requirements for rolling out LTE. CSFB may be used by a subset of service providers as it requires less core network modification and changes can be focused primarily on the handset manufacturers. Due to the efforts of the LTE +-OneVoice initiative and the capability to deliver SRVCC +via a subset of IMS functionality, it is forecasted that the majority of LTE voice service will be provided using an IMS- +based SRVCC architecture. + +- Mobility anchoring for inter-3GPI? 'mobility (terminating +and relayingthe traffic between 2G/3G system and PDN +Gateway) +- E-UTRAN idle mode downlink packet buffering +and initiation of network triggered service request +procedure +- Transport level packet marking in the uplink and the +downlink (e.g., setting the DiffServ Gode POint, based +on the QCI9 of the associated EPS bearer) +In current form, CSFB may be unsuitable as a broadlydeployed interim solution, especially for LTE service providers that do not expect a swift transition to IMS. + +While it may be made workable for certain service providers that retain control of handset software, and an entrenched business model that supports the ability to provide a highly-customized user experience, it has severe deficiencies for many others. While there are likely to be some work arounds and enhancements to CSFB to address some of the problems, it seems unlikely that these will solve all the concerns raised. + +- Accounting on user and QCI granularity for inter-operator +charging +~'-----....... +- Packet routing and forwarding +- Some charging support +19. UE Context in the eNodeB and MME are now released +with the normal E-UTRAN/EPS procedure. +For service providers that want to retain' control over in-house voice applications and which have robust CS platforms with several years working life and spare capacity left in them, VoLGA maybe a realistic option - or at least one worthy of formal investigation and testing, as well as greater attention from the standards bodies. It is certainly not without its own challenges. It also requires changes to handsets, as well as a mechanism for allowing the network to trigger LTE-to-3G/2G handovers for VoLGA +calls, originally defined as part of SRVCC. It is also purely a mechanism for delivering "old school" CS-type voice services rather than the more advanced types of Web/ +voice integration, although potentially the voice traffic could be treated as a packet application/object available over IP. + +The introduction of seamless high speed networking offers service providers the ability to customize billing specific to a customer usage. Blending pre and postpaid services, and a -per-use, (e. 0, billin for me a-b tes transmitted) +CONCLUSION +The popularity of VolP applications, along with the absolute need for service providers to deliver voice over LTE, is causing the SRVCC to receive significant attention. Despite the fact that SRVCC is apparently more complex than CSFB due to the requirement of an IMS core network (or application tier), it continues to be the choice of the LTE +OneVoice initiative due to the lack of need for complex and expensive dual-mode user devices. To combat the apparent cost and complexity of a full IMS network rollout, the industry is now focusing on simplifying the IMS +protocols and defining a specific IMS "profile" for providing seamless LTE VolP service. + +SRVCC will playa key role in handing over the UE from LTE +to other CS-based networks by utilizing high performance technology capabilities of LTE and the EPC. When there are +........ + +## 5. 4G Technology + +INTRODUCTION +For some time now, marketers in the telecommunications industry have offered the promise of Fourth Generation +(4G) networks bringing the full power of the Internet to the world of wireless. But what does 4G really mean? Is it more than just a promise? Most importantly, how will it impact Law Enforcement's (LE) ability to perform electronic intercepts? This article examines the evolving definition of 4G, describes what is really happening on the network, and identifies the specific challenges that the deployment of 4G networks could pose for LE. + +THE GENERATION GAP +Generations represent major advances in technologies and services. As such, the term is often freely used by those who wish to portray their offerings as major improvements to what is currently considered state of the art. Often these changes prove to be incremental at best, and soon enough another company is touting their own products as part of the next generation. Such uses of Third Generation +(3G), and now 4G, as marketing terms lead to confusion within the marketplace. Usually, it is only over time that the industry converges on an accepted definition of the characteristics of a generation of telecommunications technology. 4G is just reaching that stage. While there is much marketing hype, agreement on what technologies meet the definition of 4G is just now emerging.1 +1 http://www.fiercebroadbandwireless.com/story/ltu-declares-Ite.advanced-80216m4g-standards/2010-10-25 +THE TECHNOLOGIES +Global System for Mobile (GSM): The dominant mobile phone technology worldwide is GSM, which has over 85% +of the three billion (and growing) subscriptions worldwide. + +Universal Mobile Telecommunications System (UMTS): +This 3G mobile phone system evolved from GSM by replacing the radio subsystem with one based on Code Division Multiple Access (COMA), which offers higher capacity and performance than Second Generation (2G). + +By squeezing more phone calls into the same spectrum, fewer cell sites are required or ,higher data rates can be aChieved. Almost all UMTS networks are owned by or directly interwork with an existing 2G GSM network'so that in areas with poor coverage, calls can be handeG over to and continue on the other network. + +High Speed Packet Access (HSPA): Often termed 3.5G, this is an improved version of UMTS that modifies the coding used on the radio transmissions to dramatically improve the data throughput Peak rates of 14 Megabits per second (Mbps) are achievable in lab conditions, with promises of even higher capacity. These systems are completely backward compatible with the original UMTS +systems, although, newer handsets or data dongles would be required to take advantage of the higher data rates. + +Earlier versions of (non-mobile) WiMAX are considered +3-3.5G - +LTE Advanced) is moving toward deployment in 2011 with LTE Advanced deployment projected to begin in 2012. + +WiMAX 1.x (based on IEEE 802.16e) has been deployed in the U.S. and worldwide, with WiMAX 2 deployments projected to begin before the end of 2011.4 + +LTE EVOLUTION +- The term LTE originally referred to the Evolved UMTS +Code Division Multiple Access (COMA): Not to be confused with Wideband CDMA (WCDMA), this earlier technology was popular in the U.S., Japan, and Korea but did not achieve global deployment. The 2G version of CDMA +is known as One times Radio Transmission Technology +(lxRT.f) and is efficientfor voice and text services. The 3G +version, called Evolution-Data Optimized ot Evolution-Data Only (EV-DO), provides higH-speed data rates. + +## Terrestrial Radio Access Network (E-Utran) + +- LTE is now used as a 4G marketing term for the Evolved +Packet System (EPS) +Long Term Evolution (LTE): Both GSM and CDMA +communities have agreed to move toward a common standard for their next step. LTE is their 4G standard, and radio interface has already demonstrated data rates over 100 Megabits per second (Mbps). The Orthogonal Frequency-Division Multiplexing (OFDM) scheme is particularly effective at combating multi-path and other aspects where radio propagation is difficult There will also be a major change to the core network standard, which is called System Architecture Evolution (SAE) and uses the Session Initiation Protocol (SIP) to setup sessions and voice calls. + +- Initial LTE deployments use the 700 Megahertz (MHz) +band +- LTE supports Voice (lP Multimedia Subsystems (IMS) +VoIP) and data +Worldwide Interoperability for Microwave Access (WiMAX): +This is also an OFDM technology and competes with LTE, although, there are talks to combine the two. It is marketed as a low-cost means of delivering broadband data services, is likely to be popular in areas where there are no land line alternatives, and is a competitor to HSPA and LTE. + +WI MAX EVOLUTION +- 802.16d fixed Wi MAX; mobility added in 802.16e - Sprint's Xohm WiMAX offering ranges between 3.7 - 5 +Mbps +A summary of the key aspects of the four widely acknowledged generations of telecommunications technology is shown in Figure 5-1. The key aspects of +4G wireless networks that distinguish them from widely deployed 3G networks are: + +- Developing 802.16m with average downlink speeds +greater than 100 Mbps +- WiMAX initially supported data only +- Gigabit (GB) wireless data rates - one to two orders of +magnitude faster than the most advanced 3G or 3.5G networks2 +- WiMAX currently developing WiMAX VolP Capability +- All Internet Protocol (IP)-switched networks - rather than +the mixed circuit and packet nature of 3G networks +- Multi-carrier transmission - allows more effiCient use of +available radio access network bandwidth +WHO IS DEPLOYING LTE IN THE US?5 +Verizon conducted successful user LTE (not LTE Advanced) +usability tests in five markets in June 2010. On December +1, Verizon announced that it will roll out LTE service in 38 +U.S. markets by the end of 2010 and extend the network to reach all of its eXisting 36 coverage areas by 2013.6 +In October2010, the ITU declared that only two technologies meet its definition of 4G3 - LTE Advanced and WiMAX +2 (based on the IEEE 802.16m air interface standard), Neither of these technologies has been deployed. LTE (not +........ + +6 http://www.thetechherald.com/article.php/201048/6493/Hands-on-with-Verizon-s-speedy-lTE-4G-network i am eamm* +i' +I +d" lim .fHeial the Bal) (U!8,'FIUI, R dl I +if FBi liiiip + +- E-UTRAN was designed to offer high-speed +broadband access equivalent to the higher +end of Digital Subscriber Line (DSL) and cable +connections +- EPS = E-UTRAN + the Evolved Packet Core (EPC) +- EPC is the result of the SAE, which optimized an allpacket core network to accommodate higher access +speeds and larger volume data network sessions +- Initial deployments may also support Circuit +Switched (CS) fallback for voice +- VolP was provided by third-parties +LTE Advanced are still in development and vendor and service provider implementation and deployment plans are not known in detail. + +Cox Communications conducted LTE trials in Phoenix and San Diego beginning in January 2010. In November 2010, it announced the start of service in three areas: Hampton Roads, VA, Omaha, NE, and Orange County, CA? + +MetroPCS launched its LTE rollout in September 2010 in Las Vegas with promises to add at least 10 more markets +"soon".8 +Centl,lrytel announced plans to roll out'lTE in 2010 for broadband, but not wireless. + +Higher Data Rates One notable impact is that Law Enforcement Agencies +(LEAs) will need to deal with significantly higher data rates than in current wireless network intercepts. Managing this "fire hose" of data is complicated by the lack of buffering or reliable delivery requirements. In contrast to the CS environment, with packet-based communications, if critical packets are lost, entire streams of content can be rendered unintelligible. These higher data rates could place a greater emphasis on the filtering of data to identify specific content. + +AT&T plans a mid-2011 deployment and is conducting trials in Baltimore and Dallas.9 The company is deploying HSPA+ prior to its LTE launch. and is working out its LTE deployment strategy to ensure that voice and data services can work simultaneously on UMTS and LTE. + +Despite T-Mobile USA's ongoing partnership negotiations with Clear (formerly Clearwire), a T-Mobile USA statement made in October 2010 indicated that while there is no pressure to transition to LTE, the carrier prefers LTE over Wi MAX. T-Mobile did not make a definitive announcement on their future strategy.10 T-Mobile is continuing its HSPA+ +rollout; it currently has 55 markets on HSPA+ and plans to cover 100 major metropolitan areas by the end of 2010. + +AIIIP and Multi-media In the IP environment, all subject content will be embedded in a single packet stream. To perform VolP intercepts, voice packets will need to be extracted from the packet stream in near real-time. Voice packets also may not include voice, exclusively. 4G wireless networks will support multi-media applications that combine voice and video or other media. + +Another aspect of the All IP network is that as users move, tunnels are used within the networks during handoffs to provide the mobile user's wireless communications (either voice or data sessions) with continuity. Tunnels within a network increase the complexity of lawful intercept (LI) +solutions. Challenges imposed by tunneling may include difficulty in identifying the traffic of a particular user +(e.g., deep packet inspection may be needed), accessing the content of a tunnel at its end-points, and the use of encryption within tunnels. + +WHO IS DEPLOYING WIMAX IN THE US?U +Clear began WiMAX 1.x deployments in partnership with Sprint Nextel in 2008. Clear also has wholesale partnerships with Comcast and Time Warner Cable. By the end of June 2010, Clear had commercial WiMAX +services available in 36 U.S. cities including: Atlanta, Baltimore, Chicago, Las Vegas, Philadelphia, Honolulu, Seattle, Dallas/Ft. Worth, and central Washington, DC. + +By the end of 2010, Clear plans to have service for: Los Angeles, Miami, New York City, Boston, Denver, and San Francisco amongst others. + +Clear is also conducting LTE trials in Phoenix. If the company decides to switch from Wi MAX to LTE, it would not be until 2012, at the earliest.12 Reacting to changes in the market, Clear updated their agreement with Intel to allow either party to terminate their agreement with a +30-day notice, increasing the carrier's flexibility. + +Multiple Subject Identifiers Since service-related functions are independent from transport-related technologies, applications can be defined independently (at the service level) from the network. This results in a variety of identifiers being used in 4G wireless networks; different networks may use different identifiers (or different types of identifiers) for the same subject's intercepted communications. For example, access networks are likely to continue using IP addresses, but various identities may be associated with IMS: + +- IP Multimedia Private Identity (IMPI) - IP Multimedia Public Identity (IMPU) - Globally Routable User Agent URI (GRUU) +IMPACT OF 4G ON ELECTRONIC +SURVEILLANCE +There are a number of w~ys in which 4G wireless technology could impact electronic surveillance. Many of these areas represent unknowns because standards for WiMAX 2 and + +- Wildcarded Public User Identity +........ +those identities mayor may not be mapped to SIP URIs. + +These additional identifiers will also need to be addressed in 4G U solutions. + +The use of these identifiers could pose challenges for identifying a target's traffic by the service provider and correlation of data received by the LEA. It is not clear if the timing of the assignment of these identifiers aligns well with existing reporting capabilities. + +Both IMPI and IMPU are not phone numbers or other series of digits, but Uniform Resource Identifiers (URIs) +can be digits (a TEL URI, like tel: +1-555-123-4567) or alphanumeric identifiers (a SIP URI, like sip:john.doe@ example.com). + +Access Level Interception May Not Be Sufficient +4G wireless networks support a broad range of interworking and service continuity capabilities across both service providers and technologies. This will add to the complexity of correlating different parts of a communication. The access and connectivity (core network) services may be provided by different service providers, thus, the access network may not have access to all r.nntp.nt nr silmalimd IMS IDENTIFIERS +IP Multlm~dla Private Identity The IMPlls a unique, permanently allocated global identity assigned by the home network operator and is used, for example, for registration, authorization, administration, and accounting purposes. Every IMS user has one or more IMPI. The IMPI is not accessible to the user and is only visible to control nodes inside the IMS. + +IP Multlm~dia Public Identity The IMPU is employed by a user to request communications with other users and takes the form of a SIP URI or a TEL +URI. There can be multiple IMPU per IMPI. The IMPU +can also be shared with another phone so that both can be reached with the same identity (e.g., a single phone number for an entire family). This identity is visible outside of the network. In the case of more than one IMS +subscription, there may be a many-to-many mapping of Private User Identities to Public Users l1:>s. + +Globally Routable User Agent URI +GRUU is an identity that classifies a unique combination of IMPU arid UE instance. There are two types of GRUU: +Public-GRUU (P-GRUU) and Temporary GRUU (T-GRUU). + +P-GRUU reveals the IMPU and is very long lived. T-GRUU +does not reveal the IMPU and is valid until the contact is explicitly de-registered or the current registration expires. + +Growth of Machine-ta-Machine Communication Machine-to-machine +(M2M) +communications exist in earlier generations of wireless technology but are proliferating in 4G, particularly in WiMAX where they have become a significant focus area. M2M communications are used to support applications such as meter reading, tracking, building security and environmental control fleet management, and remote paymentj I +I + + "As a result of the increase in digital + communications and the growing +importance of digital evidence in all types of +investigations, Regional Computer Forensics +Laboratories continue to develop and deploy + innovative digital forensics tools and +services to meet law enforcement's needs." + +Wi/dcarded Public User Identity +A wild carded Public User Identity expresses a set of IMPU +grouped together. The Home Subscriber Server (HSS) +subscriber database contains the IMPU, IMPI, IMSI, and +Mobile Subscriber ISDN Number (MSISDN), subscriber +service profiles, service triggers, and other information. +Although already a challenge today, other applications +such as Web-based VolP and instant messaging (1M), have +introduced closed identifier schemes. These providers +proprietarily manage the subscriber's identities, though + +,.., Anthony P. DiClemente, Chief, Data AcquisitionlIntercept Section +........ + +lil~) ("JjIi;'IiQ"~ Raaiaalillifl 'uti . Id b; FII - I; + +## 6. Wireless Cell Phone Technologies: A Short Tutorial + +INTRODUCTION +Today, wireless is not just a concept; it is a reality that is driving mobile technology to new levels of seamless mobility, With the emergence of higher bandwidth offered by the 802.11n standard and the explosion of mobile applications, there is a need for a new architecture to accommodate 802,11g's 54 Megabits per second (Mbps) +to 802,11n's 300 Mbps and mobile cellular broadband. + +BACKGROUND +What does wireless technology mean? And how did we arrive here? + +HISTORY +How are eel/phones Different from Smartphones? + +The first cell phone was demonstrated 19 years ago. + +Motorola employee Dr. Martin Cooper on April 3, 1973 +called researcher Dr. Joel S. Engel of AT&T's Bell Labs using a prototype from Motorola called the DynaTAC.3 +In 1980, the First Generation (1G) wireless analog technology was the 'brick or bag phone' or 1G. 1G was replaced by the second generation (2G) cell phone advancing the technology from analog to digital and the introduction of Global System for Mobile Communications +(GSM) standard on the 2G network. 2G also utilizes the following digital protocols: Code Division Multiple Access +(CDMA), Time Division Multiple Access (TDMA), Integrated Digital Enhanced Network (iDEN), and Primary Domain Controller (PDC). In order to bridge the gap between +2G and the Third Generation (3G), the Interim Standard +(2.5G) was created for marketing purposes. One major advance leading up to 3G is packet-switched systems. The transition from 2G to 3G enabled faster data transmission speeds and greater network capacity with more advanced services. The first commercial 3G launch was in Japan on October 1, 2001. Today, the future is looking to Fourth Generation (4G) or 'beyond 3G' with the cell phone evolving to replace 3G technology. The next generation promises higher data rates, and voice, data, and highquality multimedia In real-time ("streamed") anywhere and anytime. 4G networks are forecasted to launch between +2012 and 2015.1 +The Pew Research Center's Internet & American Life Project revealed that:2 + +- 82 percent of American adults own a cell phone +- Five percent of adult texters send more than 200 text +messages per day +- Women tend to make slightly fewer calls than men; 26 +percent of men say they make or receive 6 to 10 calls a +day, while 20 percent of women make the same claim +Cell phones can typically send and receive text, picture, and video messages, and some can email, too. Smartphones typically go a step further by syncing with the email server of your personal or corporate provider . + +. . . . . . . . . + +- 91 percent of cell phone owners say their phones make +them feel safer +- 42 percent of cell phone owners say they feel irritated +when a call or text interrupts them +- 65 percent of adults say they have slept with their phone +"on or right next to" their bed +- 72 percent of adult cell phone "Users send and receive +text messages +Less than 20 years later, IBM designed the first smartphone in 1992. It was called Simon. The smartphone was presented that year as a concept device in Las Vegas at the computer industry trade show known as COMDEX. + +A smartphone is like a miniature computer that can place and receive calls. Smartphones use a mobile operating system (OS). A mobile operating system is much like what's powering your personal computer at home or at work. However, the software goes by different names. Cell phones don't have operating systems at all. Smartphones can ~e powered by: + +- Windows Mobile +- iPhone as +- Google's Android +- Symbian as +- RIM's BlackBerry +- Palm's Web as +- Linux + +| 3G | 4G | +|--------------|-------------| +| Frequency | Band: | +| 1.B | | +| -2.5 | | +| GHz | 2-BGHz | +| Forward | error | +| 3G | | +| uses | Turbo | +| error | correction | +| Concatenated | codes | +| corrections | in | +| 4G | | +| Data | Throughput: | +| Up | to' | +| 3.1 | | +| Mbps | | +| Practically | speaking, | +| 3 | | +| to | | +| 5 | | +| Mbps | but | +| potential | estimated | +| at a | | +| range | | +| of | | +| 100 | | +| to | | +| 300 | Mbps | +| Services | And | +| COMA | 2000, | +| etc. | | + +Relevance The speed you ultimately experience on your mobile phone depends much more on factors other than "3G" +or "4G". In theory, newer technologies offer performance improvements. However, 3G and 4G refer to the communication protocol between the mobile handset and the cell phone tower. So, it's only one piece of the puzzle. + +The throughput rate and browsing speed also depends on factors such as: + +- How manycell phone towers are.in the vicinity? - How many users are sharing these towers? +- The bandwidth available to these cell phone towers to +connect to the Internet or the carrier's network. +SPEED OF 3G VS. 4G +How much faster is 4G compared to 3G? Unfortunately for consumers, the answer to this question is more nuanced than one would like. The speed of a 3G network depends upon how it is implemented. In the U.S., by 2010 Sprint and Verizon (both COMA networks) had reached the limits of how fast they could make their 3G networks. Upgrading to 4G networks allowed them to offer data transmission speeds up to four times faster than their 3G networks. + +However, the 3G networks of GSM carriers AT&T and T-Mobile were designed such that there was room to upgrade 3G speeds. As of mid-2010, it was anticipated that when AT&T and T-Mobile upgrade their 3G networks, their speeds will become comparable to 4G from Sprint and Verizon. + +Design Principle and Applications The advances in the mobile arena allow users to not just Both 2G and 3G networks were designed primarily for have access to inform~J!m..aD~~~i.Jlai1i.W~1LD.UI..., voice communications rather than data. On the other hand, r-w::o~r~ld~w~id~e...;a~sw::w~el:!:.I...L ___________ -f +4G is designed especially for data tr.ansmission rather than voice. So, 4G offers faster access to data using mobile phones. For example, streaming video works better with ~----,..---------------I +4G, with less stuttering and a higher resolution. Similarly, video conferencing and multi-player online games work better with the faster data transmission offered by 4G. + +## 7. Operator's Dilemma! Femtocell Or Wi-Fi? + +INTRODUCTION +The growth of data centric devices is humongous and +mobife data will roughly double each year from 2008 to +2013 1 + +According to Cisco, the average broadband connection +generates 11.4 Gigabytes (GB) of Internet traffic per +month, or 375 Megabytes (MB) per day. Reports from +early Fourth Generation (4G) Worldwide Interoperability for +Microwave Access (WiMAX)-based broadband networks +found that the average traffic per customer is analogous +in Russia and the U.S., with 10GB of traffic per month.2 + +Data projections for next decade anticipate that Internet +traffic will grow at a compound annual rate of at least 50 +percent By 2020, the average mobile Internet connection +from Third Generation (3G) and 4G handsets will generate +22.5GB of traffic, and Internet-centric devices will generate +171.7GB of traffic. + +## Data Growth In Internet-Centrlc Devices (Laptops) + +The amount of traffic Internet will compel operators to offload data from their Macro Base station to indoor I https://www.cisco.com/en/US/netsol/ns827/networking_solutlons_sub_solutlon.html +2 http://img.en25.com/Web/WiMaxBroadbandSolutions/SenzaFilLYotaWP.pdf +3 http://www.beyond4g.orgfmanaging-data-networks base stations. At least two solutions are on the table for operators: Femtocells and Wi-Fi offloads. Both approaches solve the backhaul issue by using customer or third-partv links (e.g. DSL, MetroE, Ti/El, WISP, or others). + +Femto +ti +Moderate +i +- +- +- +- +---- +-I +., +--- +- +--- +- +- +! +i Wi-Fi AP +:! +...L.'I +Low +; +. ________ .. __ ---_ .. 1...._-- ____________ .... + +Femtocells are tiny mobile cell sites that use the mobile operators' licensed spectrum supporting all devices and all services. Femtocells are a great way to extend coverage and create higher capacity. + +To extend data service in places where macro cell coverage is poor, a WiMAX +Femtocell could be an ideal candidate. However, operators also have the option of extending indoor coverage through Wi-Fi access points. This article examines the various aspects of Femtocells and Wi-Fi for the purpose of indoor coverage. + +ARCHITECTURE AND DEPLOYMENT +Femtocell-based architecture requires that all management and data traffic be passed through an Access Service Network Gateway (ASN-GW) and a security gateway to perform handovers and security procedures defined in IEEE 802.16e. Wi-Fi based systems do not require data traffic to pass through any central location and have a much flatter architecture than Femtocells. Of course, there are advantages to using a Serving Gateway (S-GW) and ASN-GW in the case of Femtocells. + +## Sui.1 I R F 1I1H' I Un Linl, (Hl!S;'Fiy9! Rlllia.11I I 2 U . Ii 5 59' A Ij + +ECONOMICS +Intel is ready to ship 6250 Kilmer Peak chipsets, which will The current prices of femto access points are five to ten have 2x2 11 a/gin and 16e WiMAX in the 2.3/2.5 and times higher than the cost of Wi-Fi devices. Businesses +3.5 GHz bands. The 11n version is capable of supporting using operator controlled Femtocells will likely face peak data rates up to 300Mbps. Intel's next Wi MAX +economic challenges as a result of high prices, and retail module, Evans Peak, is targeted for MIDs and will support customers may be deterred from buying Femtocells at one module of lX2 11 a/gin, 16e, Bluetooth, and Global current price levels. A huge demand for Femtocell access Positioning System (GPS) in the 2.3, 2.5, and 3.5 GHz points is not expected in near future, therefore, it would bands. + +be very difficult for operators to push Femtocell-based solutions to their customers. In fact, businesses using operator controlled Femtocells to provide higher capacity and coverage would face severe return on investment challenges as the cost of femto access points and the associated infrastructure is way too expensive compared to Wi-Fi access pOints. + +ROADMAP +WiMAX release 1.5 will focus on a WiMAX/Wi-Fi/Bluetooth co-existence. A forum is also evaluating and addressing handovers between Wi-Fi and WiMAX.5 +SPECTRUM +The data growth expected in the next decade will keep operators hungry for spectrum. 83MHz of Wi-Fi spectrum in the 2.4GHz band is ideal for operators to manage the mobile data demand generated out of indoor locations. + +The next version of Wi-Fi, 802.11n, supports Multiple Input/Multiple Output (MIMO) and data rates up to +300Mbps. The cost of 11n devices is not significantly higher than 802.11b/g devices. Worldwide, operators are demanding at least 30MHz of spectrum for Broadband Wireless Access (BWA) application in the 2.3, 2.5, and +3.5 GHz bands. Current deployments are mostly in reuse, and there is little spectrum left for operators to build Femtocells. Free Wi-Fi spectrum in 2.4 GHz band will help operators provide sufficient capacity for indoor use. + +SUMMARY +Pico Base Station and Repeaters will continue to play an important role in extending coverage and generating additional capacity in wireless networks.6 The economics of deploying Pico Base Stations in enterprise buildings and commercial hubs is encouraging. However, Femtocells appear challenging from a bUSiness and deployment perspective. There are numerous advantages associated with Wi-Fi for retail consumers and Wi-Fi will continue to complement wireless networks. WiMAX+WiFi router capabilities have already been demonstrated by Clearwire with its Clearspot, the Yota Egg, and UQ. Operators must keep Wi-Fi in their access strategy when building next generation mobile data networks. + +"While this technology expands accessibility + and productivity, it introduces complexity +and security risks as wireless networks and + handheld mobile devices become a new + target for hackers and thieves." + +DEVICES +The primary sources of mobile data demand are laptops, +notebooks, and smartphones. Laptops and notebooks +have Wi-Fi connectivity. Wi-Fi chipsets are prevalent and +is included in almost 100% of the laptops and other +Internet-centric devices on the market. Wi-Fi is already +widely available and Wi MAX-embedded devices may reach +these levels in the next five to seven years. ABI research +projects that 1 billion Wi-Fi chips will be shipped in 2011 +and the global shipment of Wi-Fi enabled cell phones will +double between 2009 and 2011. Wi-Fi is not only common +in Internet-centric devices like laptops and notebooks. It +is expected that 90% of smartphones will be embedded +with Wi-Fi modules by 2014. Current Wi-Fi chlpsets are +very competitively priced and Intel has plans to embed +WiMAX+Wi-Fi into their Mobile Internet Devices (MIDs) and +all future Internet-centric devices.4 + +- Sarah Hicks, Vice President of Mobile and +Wireless Solutions, Symantec +........ + +## B. Fcc's Position On Broadband White Space + +Why is this significant? Why is this important to consumers? Why is ttiis important to law enforcement (LE)? + +INTRODUCTION +Technology companies (e.g., Google, Motorola, Microsoft and Dell) have been lobbying the +~~'0~\CAT!OI\( Federal Communications +~~- +\S' +Commission (FCC) for years +11 +'b to open new spectrum to +~ expand existing wireless +;t s: services or create new +~ +fii wireless broadband C +~ +ost? services. For the last two +"Like electricity a centur.y ago, broadband communications is a foundation for economic growth, job creation, global competitiveness and a better way of life. It is enabling entire new industries and unlocking vast new possibilities for existing ones. It is changing how we educate children, deliver health care, manage energy, ensure public safety, engage government, and access, organize and disseminate knowledge."3 +Under the Omnibus Broadband Initiative (OBI), the plan outlines four ways that the Government can influence the broadband ecosystem: + +- Establish competition policies - Ensure effiCient allocation and use of Governmentowned' and Government-influenced assets +'>' +~ years the FCC has been +- *US1\.* " +solicited by Congress to open the unused wireless spectrum that separates TV channels for use by unlicensed broadband networks. In November 2008, the FCC agreed to open up unused broadcast TV spectrum for unlicensed use, in the 300 Megahertz (MHz) to 400 MHz band of unused spectrum known- as 'white space'. + +- Create incentives for universal availability and adoption +of broadband +- Updating policies, setting standar.cts, and aligning +incentives to maximize use for national priOrities +Long-Term GoalS" +Goal No.1: At least 100 million United States (U.S.) homes should have affordable access to actual download speeds of at least 100 Megabits per second and actual upload speeds of at least 50 Mbps. + +BACKGROUND +"The FCC has been examining this issue for six years, and finished testing several proof-of~concept devices this summer to see if companies can develop products that use the buffer spectrum between licensed broadcast channels. + +The' commission's Office of Engineering Technology (OET) +found that sensing technology alone was not 100 percent effective in preventing channel interference. But when coupled with geo-Iocation technology, which uses GPS +technology along with a data base of known services using certain spectrum channels, interference was greatly reduced."l Goal No.2: The U.S. should lead the world in mobile innovation, with the fastest and most extensive wireless networks of any nation. + +Goal No.3: Every American should have affordable access to robust broadband service, and the means and skills to subscribe if they so choose. + +In accordance with the rules, the FCC will require that all white space devices be tested and certified by the FCC +Laboratory, as is required of all other wireless devices, including cell phones and wireless routers. + +Goal No.4: Every American community should have affordable access to at ieast 1 Gigabit per second broadband service to anchor institutions such as schools, hospitals and government buildings. + +Goal No.5: To ensure the safety of the American people, every first responder should have access to a nationwide, wireless, interoperable broadband public safety network. + +In early 2009, Congress directed the FCC to develop a National Broadband Plan to ensure every American has "access to broadband capability". Congress also required that this plan include a detailed strategy for achieving affordability and maximizing use of broadband to advance "consumer welfare, civic participation, public safety and homeland security, community development, health care delivery, energy independence and efficiency, education, employee training, private sector investment, entrepreneurial activity, job creation and economic growth, and other national purposes."2 +Goal No.6: To ensure that America leads in the clean energy economy, every American should be able to use broadband to track and manage their real-time energy consumption . + +. . . . . . . . . + +"opportunistic use" of underdeveloped spectrum. It doesn't plan to take up the issue of net neutrality or reclaSSifying broadband Internet services under TItle 11."6 +FCC Plan Opens 90 MHz of Satellite SpectrumS +The FCC wants to open mobile satellite spectrum in three bands for land-based services as part of its effort to free up an additional 500 Megahertz (MHz) of spectrum for mobile broadband. + +The agency's proposed rulemaking wOuld open a total of 90 MHz in the 2 Gigahertz (GHz) band, Big LEO band and l-band for uses other than satellite-based broadband services. + +Specifically, the proposal aims to add co-primary fixed and mobile allocations to the 2 GHz band and expand existing +secondary market policies and rules involving the use of satellite bands for terrestrial services. The FCC is also seeking comment on what actions the agency could take if the value of the spectrum increases. + +LAW ENFORCEMENT IMPACT +The challenges facing LE increase with the introduction of each new wireless device. In fact, reports state that +"wireless data traffic on the AT&T network has grown more than 5,000 percent over the past three years, largely attributed to today's advanced smartphones that are generating dramatically increasing volumes of network traffic."7 "We're seeing advanced smartphones driving up to 10 times the amount of usage of other devices on average," according to Vice President and General Manager for AT&T Mobility and Consumer Markets in Minnesota."s Over 50 percent of homes have broadband connectivity. A +smartphone device with -Wi-R installed can automatically establish a dual connection while using the outdoor macro network for voice and mobile data services and the indoor CTIA President and CEO Steve Largent commended the FCC for opening up the spectrum. "We are pleased the Commission and the Obama Administration have joined us in recognizing the critical importance of harnessing our spectrum resources to benefit the nation's wireless consumers," he said in a statement. + +GOOGLE-VERIZON NET NEUTRALITY DEAL +As of November 5, 2010, the FCC reported that, "The agency plans to cover the UHF and VHF television bands, experimental licenses, and ways to accelerate +........ + +, "j , Ii"' - + +## 9. Cloud Services + +functionality for uploading large files. It also lets the user automatically back up files to online space either on demand or at scheduled intervals. + +Security for business level service appears to be well implemented and thorough. All uploads are handled using +128-bit SSL encryption, which is a current standard. Files can also be stored in encrypted form so that not even the data center managers can view them. This is very important when dealing with what may be critical business documents and sensitive information. The free option offers 1 Gigabyte (1GB) of storage space and 200 Mb of downloads per month, but you can only get a free account if you sign up and use the DriveHQ software.2 +INTRODUCTION +With mass volumes of information being exchanged and viewed by individuals on all types of devices from smartphones to iPads; the demand and need for storage capacity has become a big business for some companies, but for those who subscribe or use these services it is important to select ttie right provider. + +In the past, companies in the technology, device and gadget industry strived to provide equipment that had the largest storage capacity and overall memory. Today, with the.vast number of companies focusing on how to provide storage to both individuals and business, acquiring a service that meets your personal needs or your business model. requirements is easy. As with any service provider there are guidelines and restrictions, along with risk and security issues. These services can be downloaded for free or a subscription can be purchased and utilized by the entire organization. Fees give value added-services over free and basic services. + +Dropbox is basically an intelligent combination of Box.net, dot.mac, and Microsoft's FolderShare syncing service. + +It makes online storage and sharing of files simple - as simple as dragging files into specially marked local folders. + +Files are constantly being uploaded and downloaded to edit, and therefore requires some additional peer-topeer software. Dropbox .is available via a public beta for GigaOM readers."3 +What's In the Cloud? + +There are several types of cloud services. This article will discuss some of the most popular services and uses. + +As people acquire multiple digital devices, including tiny netbooks and super-smartphones, it becomes harder for them to coordinate all their documents, music and photos so, they have access from whichever device they're using at the moment.1 Using these digital devices requires that the industry create a means for users to store and access the information. + +Ideally, it would be convenient to go to one location and retrieve all of the information, but sometimes that is not feasible due to the size and amount of information. + +DriveHQ is an enterprise level online storage and backup provider. Although aimed at business users, DriveHQ also targets individuals with its free memberships and low cost subscription options. The service is professional and high quality but still easy enough to use for novice users. It offers many different services bundled into one package - +online storage, online backup, File Transfer Protocol (FTP) +server hosting and email server hosting. + +The online storage service can be accessed through the downloadable desktop client, a Web-based interface, or an FTP client of your choice, although the desktop software is only available for Windows. Mac or Linux users only have the Web-based or FTP client options. Drive HQ's proprietary software for uploading files provides robust The software, once downloaded, is simple to install (it works on both Windows and Mac) and integrates with the file browser. It runs efficiently in the background. You create folders inside the DropBox folder and then just drag and drop them. The files are constantly synced with your online storage locker - any time a file is changed, the changes are sent to the online folders, which can be accessed via any Web browser even if your home machine is shut off. The system keeps revised versions of the files as backup, just in case the user aCCidentally erases or damages the "live" version of a document. Therefore, there is a file timeline that may be used to identify changes and dates. You can click and share the "URLs" of every file with anyone by simply sending them an email (a feature that opens up Viral growth opportunities for DropBox).4 +........ + +Dropbox, in a number of ways, goes beyond FolderShare's simple ease of use. You can access your files through the Web browser in addition to the desktop client. All files are version controlled so you can revert to an earlier version of a document, or restore it completely when lost. There are also two special folders within the local Dropbox folder: one for publicly sharing files (via distinct URL) +and one for sharing photos (which gets distinct URLs for particular galleries that have been formatted online for easy viewing).8 +At the very least, you can use Dropbox to automatically backup a subset of your files, and to access them when traveling. You can also use the service to easily share files with friends and associates. However, the service does not currently provide 'any' password protection on files or folders to limit public access. While Dropbox appears to be just another cloud storage service, it's actually a file synchronization service that will sync your files, remotely back them up and provide web and iPhone access at the same time. + +. Are images encrypted? "Dropbox stores their data on Amazon S3 using AES-256 encryption. Dropbox employees don't have access to your data, and all traffic between your computer and their servers is encrypted using SSl."5 +The encryption software that will allow you to secure your Dropbox is called "EncFS" .. lt works by creating a folder in which to store an encrypted version of each of your files and folders, and then making the unencrypted names and content available in a different folder. + +Dropbox Locl:Ition Can files be stored only on the cloud file server and not on the computer? The cloud serves to keep your files up to date, but Dropbox uses a hosted virtual disk on your computer to store files. + +## ~Dropbox + +FolderShare provides a desktop client that syncs local folders across computers. But it's a bit like comparing Vista to MacOS; both get the job done, but one may be easy to use and appears designed for maximum customer satisfaction. FolderShare allows a private peer-to-peer network to be created that will help you to synchronize files across multiple devices and access or share files with colleagues and friends. The user no longer needs to send large files via email, burn them to CDsjDVDs and mail them, or upload them to a website. It allows the user to share and sync important information instantly with anyone who is invited, making it a good solution for file sharing.9 +"Our industrY is going through quite a wave of innovation and it's being powered by a phenomenon which is referred to as the cloud." +What information on the local PC points to the cloud (e.g. + +client server)? Dropbox uses the drag and drop concept to move files from one location to another and creates a Dropbox folder on your hard drive which syncs with the Dropbox server on the Internet.7 +- Steve Ballmer, CEO, Microsoft +........ + +La ihfUi2SmSiiZ CCiiSiUOC hhOii"atloh 1'01 efffeis' tlse 8iilj (1!t!8; FIUI) n dt t .GIG +01' "NO fij' Fe. "iiij' + +## ~ Foldershare"" ~ Mimi". + +From the creators ofBOXSTr, a file-hosting and backup solution comes a new cloud-based storage solution, called Open Drive. + +Presently in public beta mode, Open Drive acts much like a typical redundancy device, but its downloadable software +!;o')\ +utility connects +, 'OpenDriveo the users personal +10 information to the Web more flUidly, with an especially smart syncing feature. + +OpenDrive recognizes which files are stored on a user's local machine and also with online accounts, and when edits are made on the user's local hard disk and subsequently saved, those changes can be registered automatically via OpenDrive. + +OpenDrive advertises a free storage limit of 1 GB, which is considerably less than the amount offered by BOXSTr. + +But as an added plus if a user is already registered with BOXSTr, then registration with Open Drive is not necessary. + +OpenDrive also manages data via the Web through BOXSTr and it is only available for Windows XP or Vista users - +There is another client application that has been compared to SpiderOak and Dropbox called SugarSync. SugarSync is an interface for Windows, which integrates with Explorer to show the status of the synced folders with small colored indicators overlaid on the file/folder icons. SugarSync offers +. . . . . . . . . , ........ . + +10 http://mashable.com/2008/07/15/opendrive/ +II http://mac,appstorm,net/how.to/utilities.how.to/how.to.back.up.your.data.with-splderoak/ +12 http://technologykills.com/2010/04/06/sugarsync-vs.spideroak/ +SPIDEROAK +SpiderOak is an online backup, syncing and sharing service similar to Dropbox or SugarSync. It is powerful, versatile and free to use. for up to two GB +/, of storage.ll SpiderOak is a strong, +,- competitor in the arena of apps that backup, share and sync your data across multiple machines. Once signed on, users see the menu bar application with several tabs to select from: + +- Status - (Schedule Backups) Back Up +View +Sync +Share +There are two basic pricing plans for SpiderOak: the Free Account and the Plus Account. The Free Account gives access to all of the features and is only limited in the capacity or storage you receive, which is up to 2 GB( The Plus Account is $10 per month for every 100 GB increment. + +If a user wants 300 GB of storage, it is $30 per month. + +Alternatively, if users choose to sign up for a year, the rate is lower: $100 per year for every 100 GB increment. So, if +300 GB is purchased on a month-to-month basis it would cost $360 per year, but if the user signs up for a year it would only cost $300. + +## Sugarsync12 I Ail! Hunt" Iii Aut, Li I F Mads.. Fbi Afraial Hac E"L) (Le8;'F8Yi) Rad's I I I I! ] Rei Ii. + +clients for Windows, Mac, iPhone, Android, Blackberry, and stunning."14 +Windows Mobile, but there are no provisions for other Citrix boasts that GoToMeeting, " .. .is the easiest and operating systems, such as Linux. + +most cost-effective way to conduct an online meeting.D1s SugarSync implements share administration in the main Specifically, the GoToMeeting app for iPad allows users to: + +- Present to remote audiences +Web interface that is highly polished with similar features +- Collaborate with remote colleagues in real-time to.SpiderOak. Files are transferred one at atime, at a high data rate. It supports file versioning, keeps deleted items until permanently removed while monitoring the file system +- Demenstrate products to prospects and customers for changes and automatically uploads. SugarSync doesn't +- Train customers and employees across the globe16 +require the user to be online to use the files it synchronizes. + +It offers a Web Archive to store files without syncing them to a specific device. There is also file sharing,and files can be e-mailed to a SugarSync account. SugarSync data is SSL-secured, and encrypted once it hits the servers. Data is stored in "geo-redundant, world class data centers." +The service offers 2 GB of free storage, allows use of all features, supports multiple devices, and syncs and share files up to the 2 GB limit. 30 GB from SugarSync costs $5 +per month, which is easily affordable. + +ZUMODRIVE +ZumoDrive provides the convenience of home information away from home by allowing *tne* user to put any amount of media from Macs or PCs to a phone. Users can read all file types to include Word, Excel, PowerPoiot, and PDF, anywhere and anytime. It offers one of the better media capabilities out of all "cloud apps". ZumoDrive is not a stand-alone application; it works with a free PC, Mac, and Linux app that you can download from zumodrive.com. Get +2 GB of storage for free and everything put on ZumoDrive is protected with encryption and stored on file servers. + +Citrix has also developed a GoToMeeting Corporate app, which is designed to provide online meeting services for multiple users. The GoToMeeting Corporate app for iPad includes unlimited online meetings as well as, " ... + +features to make it easy for you to manage multiple users, streamline usage, and maximize your cost savings.rll7 +Additional GoToMeeting Corporate features include an: + +- Administration Center: Quickly deploy GoToMeeting to +new users, control feature access and track usage from +a convenient.online.Administration Center +- Meet Now Buttons: Start meetings from the company's +own website +- XenApp Integration: Integrate GoToMeeting into the +XenApp environment +- Integrated TolIFree Audio Service: Purchase convenient +toll-free packages from Citrix Online Audio18 +Citrix 'GoToMeeting' +Citrix recently announced the availability of a new Apple iPad app called Citrix GoToMeeting. Launched as a free app for download through Apple's App Store, "The Citrix GoToMeeting App for iPad brings the same level of simplicity to the world of business meetin~s, making it easy for iPad owners to collaborate from anywhere via online meetings that are both effortless and visually GoToMeeting for Individuals provides an alternative online solution for the face-to-face meeting, which may require +........ + +U II Flila by FA' i 'Aiy business travel and is: + +- Easy to use. The streamlined interface makes it extremely easy for organizers and meeting attendees to start meeting +right away on both pes and Mac computers. +- Cost-effective. GoToMeeting's All You Can Meet subscription model provides unlimited meetings for one flat fee, +with no limits on meeting duration and no "overage" charges. Plus, VolP and toll-based phone options reduce audio +costs even further. +- Secure. GoToMeeting uses industry-standard SSL and U.S. government-standard 128-bit AES encryption to ensure +that confidential meeting information remains private. Security is built-in and no configuration is required by users or +administrators.19 The following figures display how to host a GoToMeeting. +GoToMeeting is a hosteq service, delivered via Web browsers, downloadable client executables and a network of multicast communication servers operated by Citrix Online. It has the following security features: + +- Powerful encryption: All GoToMeeting data is encrypted with industry-standard SSL and U.S. government-standard +128-bit AES encryption, including screen-sharing data, keyboard and mouse data, and chat messages. +- Privacy: Meeting information is only available to the organizer and invited participants. +19.20.21.22.2] Ibid + +- Authentication and password security: Strong passwords, unique meeting IDs and optional meeting passwords +protect privacy and integrity. Through attendee authentication, GoToMeeting ensures that only authorized attendees +can join meetings to which they have been invited. +- Firewall and network compatibility: Administrators don't need to reconfigure firewall ports, which could potentially +compromise security. +- Role-based security: Organizers set the appropriate controls and rights based on user roles. +- Endpoint system security: GoToMeeting creates a secure endpoint on each user's desktop with Web-downlo~dable +executables that employ strong cryptographic measures. +LAW ENFORCEMENT IMPACT +With the llrowth of cloud comDutinEt. the mai~r challenlles are not Dosed bv the technolollV tool anvmore.r + +## 10. Wired Vs. Wireless + +for wired infrastructure such as desk phones and wired Internet links. + +BACKGROUND +"While the United States was built on the postpaid model +(and relies heavily on consumers' use of credit) Europe's wireless industry has long thrived on the prepaid model, with less credit-dependent customers willing to shell out a little extra to get a premium device without having to sign a contract. As differentiation between postpaid and prepaid fades, more Americans will start to lean. towards adopting the European way when it comes to cell service. + +The prepaid proposition has always been burdened with the 'you-get-what-you-pay-for' stigma. But that's changing as the smartphone playing field levels and device and data prices drop dramatically".l The rollout of Verizon's Long Term "Evolution (LTE) service sets the standard for future networks; it's due to launch at the end of 2010 and will bring coverage to more than +.100 million people. "We'll be announcing 4G modems first and support for cell phones by mid-2011.''4 The firm isn't building a cell-phone network but a data network, one just as fast as wired links. Sprint Nextel has been rolling out its +4G service in major U.S. cities all year, and is now up to +55 cities. That network is based on the Wi MAX standard, an alternative to LTE. Sprint is also working on the idea of packaging a set of 4G modems and other hardware into an off-the-shelf 'office in a box'. "It would contain everything you need to set up a new branch and connect it up." +There are doubts that networks can keep pace with the demand for wireless data, a demand that's growing 55 +percent annually in North America. Predictions indicate that by 2013, there will INCREASING APPETITE +be more. North Americans The capabilities 01 new devices Inspire users to download more and more data. + +connecting to the Internet via mobile broadband than via any other forin of INTRODUCTION +"Wireless technology is becoming increasingly popular. It has been said that wireless networks will possibly become more widely used than the wired networks".2 +With the booming demand for mobile access to multiple applications and services, the evolution and proliferation of Wireless Local Area Network devices and applications have outpaced the ability to scale networks efficiently. In fact, the prediction is that "70% of new enterprise users by +2013 will be wireless by default and wired by exception". 3 +During the first wave of the wireless revolution, being out +of the office didn't mean being out of action. BlackBerrys, iPhones, and 3G dongles for laptops let people stay connected on the move. + +The era of flat pricing for wireless data looks to be ending and the next step might involve asking customers to pay for different tiers of service depending on their data demands. + +Ultimately, the net neutrality policy may become the biggest practical distinction Figure 10-1 Monthly Data Usage between wired and wireless connections. + +The second wave, ushered in by the development of 4G +mobile broadband, will take the mobile revolution indoors. + +Although consumer excitement over apps and smartphones is high, and has attracted much of the attention of the press, the enterprise will be the first serious consumer of +4G services. Cellular networks and other service providers ,-----------, ______ --.J +are preparing services that will potentially elimate the need +........ + +1.2 http://www.lehman.edu/itr/wireless-n;~or:'p~; +: http://resources.ldgenterprise.com/origlnaI/AST-0008746_Gartner_Newsletter~ug.pdf access-with enterprises expected to account for much of the demand. + +number of Wi-R devices can connect to the Wi-Fi PAN in order to share various resources and internet access. + +In contrast to fixed and complicated corporate Wi-Fi networks, Wi-Fi PANs are easy to use and can be setup with little effort in any location. As an added benefit, Wi-Fi +. PANs provide users with the same bandwidth and range as a corporate Wi-R network, which is typically larger than conventional wireless PAN technologies like Bluetooth and Infrared. + +INTRODUCTION +With the various wireless technologies that are.available today, people are able to conduct business, keep in touch with family, or simply spend a few minutes checking e-mails or social networking .websites all while on. the go. + +Over the years, the popularity of wireless devices such as laptops, netbooKs, notebooks, smartphones, MP.3 +players, and e-readers have facilitated the development of a "constantly connected" culture that continues to expand everyday. + +The advantages of Wi-Fi over more conventional short range wireless technologies has resulted in the development of more devices equipped with Wi-Fi that can be easily integrated into a Wi-Fi PAN. Once integrated, devices including: digital cameras, digital projectors, printers, game consoles, HOTV, and digital photo frames can share resources at high data rates and across relatively long distances, wirelessly. + +The potential benefits of using a Wi-Fi PAN include: + +- Sharing of Internet/Network access with other Wi-R +users and Wi-Fi devices +- Sharing of data directly between two or more Wi-Fi +users +- Enjoying content accessible on the user notebook (such +as YouTube) on a HOTV wirelessly +Although there are considerably more ways and places to connect to the Web than there were a decade ago, for some, publicly offered Wi-Fi hotspots.are not enough. This growing desire among consumers to have access to the Internet wherever they go has led to an increase in the number of businesses offering free 802.11 Wi-Fi including hotels and resorts, airports, popular coffeehouses, bus stations, and public libraries. For users that want to connect to the Web in areas where Wi-Fi is unavailable, or do not want to pay fees that may be charged for commercially providEld Wi-Fi, there is the mobile hotspot. + +With a mobile hotspot device, a user no longer has to worry about how and where they will be able to connect to the Internet. With increasingly popular mobile hotspots, users now have the ability to create a personal Wi-Fi hotspot with the convenience of having the Internet available anytime, anywhere, with access to a wireless cellular network. + +- Transfer of pictures/video from a digital. camera/digital +camcorder directly to computer instantaneously over the air within the range of Wi-Fi PAN +- Printing of user's documents on the printer over the air +- 'Projection of user's content wirelessly through a +projector1 +Today, smartphones and personal mobile Wi-R hotspot devices are used to set-up Wi-Fi PANs, which allows users to create open or closed private networks. + +TYPES OF MOBILE HOTSPOT DEVICES +The following mobile hotspot devices are examples of popular portable WI-Fi products available to the public. + +Mobile hotspots are not becoming more attractive to buyers solely because they are portable. They also offer a single paint of access for all of a user's wireless devices. + +Equally appealing is the mobile hotspot's ability to be shared among multiple users, allowing several people to benefit from Internet connectivity while only using one access interface. There are many options available for people interested in investing in a mobile hotspot. Today, +"You can buy a simple, slim unit that fits in a pocket or others that maximize throughput by shifting from 3G to speedier 4G networks." Additionally, "You can convert some cell phones into hotspots, while a few new phones now come with hotspots included." +WI-FI PERSONAL AREA NETWORKS +Wi-Fi Personal Area Networks (PANs) are setup and managed by a specific user, unlike corporate Wi-Fi networks that are established and administered by a corporate network administrator. Once arranged, a limited Novatel MiFI 2200 +MiR is a line of compact wireless routers that serve as mobile Wi-R hotspots. Through backconnections to a cellular data network, and frontconnections to local Wi-R +devices (up to 10 meters/30 feet distance), MiFi creates a local area of shared high-speed Internet connectivity.2 +........ + +The Novatel MiFi 2200 acts as a mobile Wi-R hotspot that has no screen and is powered on by a single button.3 +The Clear Spot offers Wi-R connectivity .to Sprint's 4G +network, that is not currently available, nationally. The Clear Spot can support up to eight wireless devices within a 150 foot range. Plans are available that offer 3G speeds and unlimited 4G access.9 +Measuring at 3.5"x 2.3"x 0.4" and weighing approximately +2.0 ounces, the Novatel MiFi 2200 is too large to fit in a typical wallet, but it is small enough to be considered pocket-sized. The MiFi 2200 creates a Wi-Fi hotspot using a 3G connection that can be shared among five devices.4 +Like a cell phone, -the Novatel MiR wirelessly connects to a 3G cellular network, but unlike a phone, the device broadcasts a Wi-Fi signal to its surrounding area. This capability allows devices within a 30-foot range to connect to the Internet CradlePoint PHS300 +The Cradle Point PHS300, " ... is a compact router device which connects to a user's laptop to create a Wi-R hotspot for up to 16 users." The self managing device is battery powered and can connect several users to a 3G/4G +network by simply inserting a wireless broadband card into a laptop. One of the CradlePoint PHS300's most important and unique features is the capability to support up to five broadband cards at the same time, regardless of the user's carrier or the services used. The CradlePoint PHS300's ports are load balanced and can be used to increase bandwidth and provide Wi-R service up to 150 +feet.11 +Overdrive 3G/4G +The Overdrive 3G/4G, available from Sprint for $49.99 +is another mobile hotspot option that is small enough to fit in your pocket Although slightly bigger than the Novate I MiR '2200, the Overdrive +3G/4G +includes more features such as the ability to connect to Sprint's 3G network as well as the faster 4G network, where available. + +Other features include, " ... a bright screen that displays information like remaining battery life, signal strength, the hotspot's name, password and the number of connected devices." +CLEAR iSpot The iSpot, made by CLEAR, is a mobile hotspot device designed specifically for use with Apple's iPad, iPhone, and iPod. iSpot allows up to eight Wi-A enabled devices to connect to the Internet in areas where CLEAR provides 4G +coverage. The password protected iSpot is small enough to' fit in your pocket and has a rechargeable battery that provides up to four hours of continuous use. In comparison to many of the other mobile hotspot devices on the market, it is relatively inexpensive and offers an unlimited 4G data plan.12 + +## Vodafone Mobile Wi-Fi R201 + +Clearwire Clear Spot Clearwire's Clear Spot uses Sprint's 4G network to provide linternet connectivity. Larger than the Overdrive 3G/4G, the Clear Spot is not ideal for users wanting a pocket-sized device. + +Clear Spot costs +$49.99 and requires a modem ranging in price from $69.99 to +$224.99, depending on desired features - +Vodafone recently launched the Mobile WI-Fi R201. This mobile hotspot device, which connects automatically once the user enters the Wi-Fi authentication key, supports the +. . . . . . . . . + +3 http://www.nyUmes.com/2010/06/03/tecl1nology/personaltech/03basics. +- http://www.nytimes.com/2010/06/03/tecbnology/personaltech/03beslcs,html?_ +html?src-busln +r-l&Slc-busin +- http://www.networkworld.com/communlty/node/66583 +I. htlp:/Iposterous.com/getlile/files.posterous.com/temp2010.04-20/ +- http://www.quantum.wlreless.com/store/medla/catalog/p,oduct!cache,ll/lmage/500x +IRoyjgJqJlnxdwhmutGqxFOlxarrbpwBvFjUbczJOfjlcxHECncHtHCIzi/C,adlePolnCPHS300. +500/9df78eab33525d08d6e5fb8d27136e95/m/ilmifl-2200,jpg +jpg.scaledlOOO,jpg +Ihltp;//ecx.lmagesamazon.com/lmages/I/41UYWRBTteL.jpg It htlp;/Ibuslness-solutions.tmcnetcom/toplcs/business-soluUons/articles/87790- +7 http://www.ubergizmo.com/photos/2010/1/sprinl-overdrive.jpgcradlepolnts-phs300-personal-wifl-hotspot-supports-up-16.htm +- htlP:/lcdn.slashgear.com/wp-contenl/uploads/2009/04/clearwire_cleacspoC +12 http://www.trendygadgetcom/wp-c:ontenl/uploads/2010/08/lspot.jpg personaLhotspot-480x295.jpg . + +..http:t/www.clear.com/spol/ispot + +## I Am EnfhtfFfiHi Sqiis' Iiii J Po Officiall!Lsu Bid) Ti:E8;'F8Yb) N Dis I ) E5' '''''9 + +system includes a hotspot feature that allows some Android phone models to be turned into a mobile Wi-R +hotspot without requiring a USB cableP +Digital Living Network Alliance (DLNA) standard, which allows DLNA-compatible devices to share digital content among each other. + +The Vodafone Mobile Wi-Fi R201 is the first mobile router to be deemed compatible with Windows 7. The device is approximately the size of a credit card and creates an For users that own cell phones without built in mobile hotspot capabilities, there is software available that can transform many cell phones into mobile hotspots. The WMWiflRouter software, which was created by Morose Media in the Netherlands, works with a variety of cell phones.ln'orderto tum a cell phone into a mobile hotspot, a user can download the WMWifiRouter software directly to the phone from the http://wmwifirouter.com/website for $19.99. + +Agpre 11-7 Vodafone WI-FI R20114 instant mobile hotspot for +up to five wireless devices. Currently, Mobile Wi-Fi R201 is +only available in countries where Vodafone operates, which +does not include the U.S.15 +CELL PHONES AS MOBILE HOTSPOTS +One of the most novel ways for a user to create a mobile hotspot is through the use of a cell phone. Using a smartphone as a mobile hotspot can help eliminate clutter by allowing the user to limit the number of devices that must be transported. Phones that offer this capability include Verizon's Palm Pre Plus, which is available for +$49.99 with two-year contract. The Verizon Pixi Plus is free with a two-year contract and includes the mobile hotspot option. Using a cell phone as a mobile hotspot provides the same type of internet connectivity as other mobile Wi-Fi devices, although, this function is likely to drain a smartphone battery quicker than normal. + +A 21-day trial version of the software can be downloaded for free. In order to use the WMWifiRouter software, the user must have: +Sprint's HTC EVa 4G, which runs on the Sprint 4G network,_ +- Windows Mobile 5: AKU 3.3 or newer + +- Windows Mobile 6: 6.0, 6.1, 6.5 or 6.5.3 - Both a Wi-Fi and a cellular data connection - An installed and working version of Internet Sharing +also has mobile hotspot support. The mobile hotspot feature on the HTC EVa 4G device is available for $29.99 +in addition to the Sprint calling and data plan. AT&T is also allowing tethering for the iPhone to a computer for a monthly fee.16 Google's updated Android 2.2 operating +........ + +i Hi Ehi"" pmp'll +, , ill +!!ScS! + +The JoikuSpot, available at jOikushop.com, supports many phones that use the Symbian operating system including several Nokia and Samsung models. Smartphones such as the iPhone and some Android phones can be hacked to operate as mobile hotspots, as well. Multiple methods can be used to root an Android phone to allow tethering. + +They include: + +- Tether Android with Apps that Need Root (Free, heavy +configuration) +- Tether Android with Proxoid (Free, no root required, +some configuration) +- Tether Android with PDAnet ($30, no root required, +minimal configuration) +For more details on how to root an Android phone and install tethering apps such as PdaNet and Proxoid that allow an Android phone to operate as a mobile hotspot, visit the following webpage: http://lifehacker. + +com/5447347/how-to-tether-your-android-phone.2D +MyWi Mobile Hotspot App Once an iPhone has been jailbroken, it can be turned into Wi-Fi hotspot by downloading the MyWi app. + +MyWi is a jailbreak app that allows a user to tether and create a Wi-Fi hotspot on their iPhone.21 The MyWi app costs +$9.99 to download, and users must pay a fee to use the service after the trial period expires. To turn an iPhone +"AT&T said that traffic on the 3G network has grown by +5,000 percent over the past three years. The introduction this year of the Apple iPhone 4, which can shoot and upload high-definition video, and Apple's iPad, a whole new class of device, is likely to push that growth even faster."26 +AT&T's strategy to offer its customer base +........ + +into a mobile hotspot, a user would first need to jailbreak their iPhone. Once the phone has been jailbroken, the user can then follow the instructions listed on ReadWriteWeb website at: http://www.readwriteweb.com/archives/turn_ +youciphone_into_a_wi-fi_hotspot.php, to add the mobile hotspot capability.23 +PUBLIC WI-FI HOTSPOTS +Retailers are becoming increasingly aware that the average customer enjoys the freedom of having Internet connectivity on the go. Therefore, many businesses have begun offering free Wi-Fi as a service to their patrons. Starbucks, a popular destination among coffee drinkers, launched a +" ... no-charge, registration-less and limitation-free Wi-Fi initiative ... " in hopes of, " ... introducing a seamless and entertaining Web experience for all mobile devices ... "24 +Many other businesses are following the free Wi-Fi trend and have already begun or have plans in the works to provide free wireless Internet access to their customers. + +AT&T's Free WiFI Hotspots Wireless carriers, like AT&T, have also started offering free public Wi-Fi hotspots in metropolitan areas to help mitigate issues related to crowded wireless data networks. + +AT&T launched a completely free outdoor wireless hotspot in New York's Times Square that provides complimentary Wi-Fi access to AT&T customers. The company's broadband and wireless customers can take advantage of the wireless hotspot using their smartphones, laptops, and other wireless devices. AT&T launched the pilot program to determine how the free Wi-Fi hotspot can help to decrease wireless congestion on its network. AT&T has struggled to manage the demand for data services on its network due to the use of devices like the popular (Phone, and has seen extra traffic in major cities such as New York and San Francisco cause problems for users including dropped calls and sluggish Internet access. + +As a reSUlt, "AT&T +has also been using its more than 20,000 Wi-Fi hotspots throughout the country to offload some of the traffic. The company has offered free Wi-Fi access to its smartphone subscribers in the hopes that customers will use the Wi-Fi network when it's available rather than the slower 3G +network."25 + +## Does Free Wi-Fi Effect Choice Of Venue? + +access to free Wi-Fi hotspots appears to be working. + +According to the company, "users "are piling on to AT&Ts public Wi-Fi hotspots, racking up millions of connections in the second quarter." AT&T reported that a total of 68.1 +million connections were made through phones and other devices in the second quarter of 2010; a number that is more than four times the 15 million connections logged in the second- quarter of 2009. In 2010, subscribers used the network 121.2 million times; also up from the 85.5 +million reported in 2009. The number of connections has increased by 30% just from the first to second quarter of this year, alone. + +AT&T has stated that it intends to continue developing its Wi-Fi infrastructure, including the launch of more +"hotzones", like the one piloted in Times Square. 3G iPad as well as iPhone subscribers can use AT&Ts hotspots, where available. + +A searchable database of free AT&T +hotspots can be found by visiting the following webpage: +http://www.att.com/gen/general?pid-13540. + +WI-FI on Choice of Venue28 +significant value in bringing customers to a venue. It's no wonder over 150 thousand cafe/retail venues have now deployed Wi-Fi hotspots, but not all of these are free. + +That's in addition to the tens of thousands of travel-related installations (hotels, airports, in-flight) worldwide." +Other conclusions made as a result of the research include: + +- Worldwide annual hotspot connects, or sessions, will +reach over 2 billion by the end of 2010 with annual +hotspot connects anticipated to grow to over 11 billion +by 2014 +- Asia/Pacific will have about one quarter of the worldwide +hotspot venues over the forecast period +- Sbrbudcs +- Bam .. & NobM +- McDomIld'. + +- Fedb: Office + +- By 2012, handhelds are anticipated to account for half +of hotspot connects +- The total worldwide hotspot market size will swell to + +## Wi-Fi Hotspot Usage Statistics + +319,200 venues by year-end.29 +Based on the In-Stat study, it is apparent that the mobile Wi-Fi hotspot market is growing exponentially. + +The marketplace can expect to see more mobile hotspot devices and venues that offer free Wi-Fi as consumer demand for complimentary Internet connectivity via Wi-Fi increases. + +## Wi-R Hotspot Resources + +Statistics show that the availability of free Wi-Fi hotspots for public use definitely influences consumer decisionmaking regarding which venues to visit. According to recent In-Stat's Wi-Fi Hotspot research, approximately two-thirds of those surveyed indicated that free Wi-Fi influences their choice of venue. 31% of the group indicated that free Wi-Fi access may potentially influence their decision, and only 5% said that it would have no impact on the choice of venue. + +There are several online resources that provide information According to Amy "Craven, Market Analyst, " ... research on where to find publicly offered Wi-Fi by location including: +shows that while revenue may not always be directly +- WI-Fi Zone Finder - www.wi-fi.jiwire.com gleaned from the hotspot offering, free Wi-Fi has a - Wi-Fi Free Spot - www.wififreespot.com +........ + +- The Hotspot Haven - www.hotspothaven.com +. - WiFinder - www.wifinder.com +- WeFi - www.wefi.com +The Wi-Fi Finder app, powered by JiWire, Inc., can also be downloaded to an iPhone or iPod Touch from Apple's iTunes store.3D + +........ + +The MiFi allows online access to families who are travelling in a vehicle and using a variety of devices; colleagues on a business trip or corporate retreat and first responders at a disaster site. 'In the cell phone era where customers are trading a 'Iandline' for mobile phones, users could make the MiFi an at home family Internet service. One unique feature of the MiFi is the select location and mapping MiFi +2200 GPS application. + +The issue of 'Going Dark' has just been escalated to another .Ievel. + +While customers and field operators wrestle witl'l'finding hotspots to operate mobile devices via Wireless Fidelity (Wi-Fi) and Wireless-'Microwave Access +(Wi MAX}; others are vying for space in coffee shops, bookstores or libraries to get online using cellul9r modems from :Verizon, Sprint, T-Mobile or AT&T. Not only do these devices drain your battery; they also limit your accessibility and options for use to basically being stationary. + +As of October 28, 2010 to further encourage the use of portable devices and popular technology Verizon Wireless started selling a combo package (iPad and Wi-Fi + MiFi mobile hotspot).3 +LAW ENFORCEMENT IMPACT +The technology that comprises a MiFi and a personal area network (PAN) is not new. In fact, this is no different from connecting to the Internet via a Verizon DSL modem or +a wireless router. The key for users is the portability and single access to a network anywhere. + +Service Providers are rapidly improving the speeds of their networks with fourth generation technology. MiFi could eventually replace wired broadband subscriptions in the same way that Americans are canceling home phone lines in favor of cell phones.4 When industry looks at developing new products to keep up with technology the last thing that a service p...,wIlolMl...I.LL.lLL,l,jIl.lW~OiI.II.I.t.II...I.lLlLliMOa, at is the securi as ect. + +Two prevailing theories for how we will access the Internet in the future hinge on the success of small plastic gadgets called MiFis.l If National Aeronautics and Space Administration can send a man to the moon; and utility companies can provide water, electriCity, phone.and cable, why not have universal wireless Internet? Saygood-bye:to USB stick and card-slots, AT&T has introduced its first MiFi device, Sprint Nextel, has the 4G-enabled Overdrive and a thinner gadget called the ZTE Peel and Verizon Wireless offers the popular Novatel MiFi 2200 Intelligent Mobile Hotspot. The MiFi 2200 +has the thickness of three credit cards, one power button, one status light and a swappable battery that looks like the one in a cell phone. Within little or no time after turning on your MiFi, wait 30 seconds, it provides a personal, portable, powerful, password-protected wireless hotspot. + +The battery lasts for four hours per charge and offers 40 "---------.... + +hours of standby, and Verizon uses its 3G (high-speed) +cellular data network to provide customers with an array of usage options.2 +According to Cisco, in 2010, total mobile The MiFi acts as a Hub creating a Wi-Fi cloud providing access and coverage for up to five people at one time. The MiFi is not only small and portable, with a range of 30 feet. + +Just like car the MiFi can be left in a pocket, purse or data traffic, including video, grew by +159% -- more than three times faster than Internet traffic traveling over wired ("fixed") +communications. Earlier, Cisco predicted that growth would be 149%, so this trend is moving faster than expected. + +laptop bag and still fire up the mobile device. + +Once connected, the box dials into the Verizon's network, it connects online via the personal hotspot. + +,... Doug Webster, Cisco Senior Director +........ + +## 13. Slurp Digital Eyedropper + +device to access it from." Slurp actually contains digital. + +information as opposed to working as a hyperlink. It also offers both haptic2 and visual feedback, thus eliminating tHe need for visible tags on accessed objects. + +Slurp is composed of two parts: the digital eyedropper, and the IR nodes.3 To use the device, a person would simply extract data by touching the screen with the Slurp device, pointing it at an object or remote display, and then squeezing the eyedropper's bulb; much like a regular dropper would be used to suck up a liquid. After the digital object is extracted, it can be "squirted out" or injected by touching the screen with the Slurp device, pointing it INTRODUCTION +Today, there is no shortage in the number of wireless mechanisms that can be used to transfer data from one device to another. These capabilities come in many forms including portable hard drives, Digital Versatile .Discs +(DVDs), Compact Discs (CDs), Zip discs, and Universal Serial Bus (USB) drives. Over the years, the devices that are used to transfer data have become more inconspicuous, like USB drives that resemble tubes of lipstick, double as a fancy designer necklace, or come attached to Swiss Army knives. Many of these devices also employ additional functionality like the ability to receive and transmit data wirelessly. + +~t a remote display, and once again' squeezing thebulb. + +Essentially, this process is facilitated by a small pOinter that is passed between the Slurp eyedropper and the IR +node. All related files are transferred, in the background, over the network in a process that is transparent to the user. + +A former MIT Media Lab student.has followed this trend by creating a gadget that at first glance seems like a simple eyedropper. The device, .called Slurp because of its ability to suck up information and its resemblance to a typical eyedropper, is another example of how objects that may be disregarded as common .items, can actually be tools used as a means to transfer data quickly and discretely. + +HOW SLURP WORKS +Slurp was created as a, "tangible interface for manipulating abstract digital information as if it were water." The eyedropper, which can, "extract (slurp up) and inject (squirt out) points to digital objects," allows connected desktops and machines to facilitate a wireless data transfer from desktop-to-desktop, or from a desktop to another devlce.1 +Slurp is also used as a mechanism for storing data. It indicates that it is full when it is pOinted at an IR node and the stem lights vibrate, much like a liquid that is bubbling to be rEtleased. During the injection process, light travels from the Slurp's bulb to the stem, and then fades. + +Gentle presses of a full Slurp's bulb will inject data into the targeted data object while still retaining the data in the bulb for future injections. The bulb remains illuminated while data is injected. A full Slurp that is pressed firmly will inject and clear all of the data. + +IR NODES +In the Slurp eyedropper, each IR node is connected to a display or object (auditory, visual, and so forth), that is powered by a Personal Computer (PC). Since they are selfcontained and less costly. IR nodes that operate from a microcontroller may also be used and potentially,. " ... could be attached to computationally passive unidirectional objects such as buildings. artwork, or trees for locativemedia interactions." +The Slurp tool is said to be different from existing work done in the area of abstract digital media. As such, "Slurp allows for the extraction of digital media from physical objects and the selection of an appropriate display MULTISENSORY FEEDBACK +Using a vibrotactile actuator, users can search for digital signals within any given space. This can be likened to a beeping metal detector or the sounds emitted from a Geiger counter4 indicating the presence of objects that are not visible to the user. When a digital object is targeted, the Slurp eyedropper displays a different feedback for a +........ + +discrete or a continuous object.5 Once an empty Slurp is pOinted towards an IR node, the Slurp's stem is illuminated and reflects the color of the targeted object, much like how an eyedropper assumes the color of the 'liE/uid that it is placed in. In the extraction process, light travels from the stem to the bulb, which remains in the bulb until information is injected. Wheninjection occurs; lightmoves from the Slurp's bulb to its stem, and then fades out. + +platform based on multiple, small graphical displays," is a logical next step for the technology according to the inventor and other Slurp collaborators. This would provide userS'the capability to navigate through large video media libraries on a Graphical User Interface (GUI) and extract them straight from a monitor. Slurp could potentially be used to transfer video between devices, which would leverage a GUI's scalability and Siftables' spatial and tangible properties.7 +LAW ENFORCEMENT IMPACT +It is not only the large number of devices that are available that can be used by targets to obtain and transfer data that poses a threat to Law Enforcement (LE). New wireless data storalle technolollies.l +'--___ +~J Devices like Slurp, designed to appear as an eyedropper and not a typical wireless storage device, LOCATIVE MEDIA +Locative media, also known as location-based media, is the linking of digital objects to physical locations, and is achieved through the use of camera phones, text messages, and two-dimensional (20) barcodes. In locative media, 20 barcodes act as pointers, aimed at locations on the Web or a type of hyperlink. In the future, it is expected that media will be linked to physical objects, locations, and people; the Slurp eyedropper could be used to transfer data among them. When Slurp is pointed at a digitally active object (e.g., a music video), the eyedropper vibrates and is illuminated. Once this occurs, the user can extract, and then inject, the object into a container (e.g., a watch or cell phone) for later use. + +ADDITIONAL SLURP FUNCTIONALITY +Slurp functions in a' manner that is similar to a USB drive and has the ability to work remotely by pointing it in the direction of the display (e.g., an audio or video object). It also works with non-visual displays (e.g., speakers); this feature has yet to be implemented on most systems with multiple displays. + +## Potential Slurp Uses Adding Slurp To Siftables, "A Tangible Sensor Network + +........ + +## 14. Human Data Transmission + +showed, " ... two people having devices pocketed and sharing data',between the two via hand touching ... " +INTRODUCTION +Technology continues to explore several alternative means of communicating. In addition to already eXisting forms of voice, written, and electronie communication, new technologies are being created that allow users to communicate through less traditional means. Researchers are experimenting with human data transmission technology, a novel idea in the communication arena, which uses the human body to transfer data from one point to another. + +. The Electric-field Communication model is very small and +can only be powered by a button battery. It is anticipated +that in the future, the device may be used to advertise +products and services, allowing people to touch a poster +or sign to have information transferred directly to their +cell phone. The Electric-field Communication model already +has the ability to conduct small data transmissions such +as swapping phone numbers and addresses. According to +an ALPS representative, "high-capacity data transmission +can be done using multiple people in theory, but they have +to be holding hands all the while so it sounds a bit too +impractical. Data can be transmitted by anyone regardless +of age and sex .. " +ALPS ELECTRIC-FIELD COMMUNICATION +MODEL +ALPS has created an Electric-field Communication model expanding on the concept behind TransferJet, " ... a 'Close Proximity Wireless Transfer technology featuring simple operation, safe connection, and efficient transfer of data,"l and employing the use of the human body as a transport medium for transferring data between two devices. The mQdel, which ALPS unveiled at the latest Tokyo Gadget Fair, functions through electric field transmissions that are communicated through the human body. + +The electric field transmissions in ALPS' Electric Field Communication model use the human body to transfer data through electric field modulation, which creates signals that are sent and received through it. Communication is initiated by simply placing the hand over a sensor. As a result of its easy usability, the ALPS model is thought to be suitable for applications such as ID cards or keyless automobile access. + +MICROSOFT SKINPUT +A graduate student at Carnegie Mellon University and former intern at Microsoft Research, has developed a working prototype of a system called "Skinput" that essentially turns a person's hand and forearm into a keyboard and screen. + +With this model, "you can network various devices like a cellphone, camera, watch, tonometer, and pedometer just by touching them." +In a demo of the tool, " ... one person held a mockup cell phone displaying one of three images. The user held the phone in one hand, picked one of those images, +-..::t and then placed his or her other hand against a computer panel, whereby that image was displayed on an overhead machine." +Another demo +"Using Skinput, a person could tap their thumb and middle finger together to answer a call; touch their forearm to go to the next track on a music player; or flick the center of their palm to select a menu item. All of these signlanguage-like movements, which are customizable, would control a gadget In a person's pocket through a Bluetooth connection. When fitted with a pica-prOjector, the Skin put system could display an image of a digital keyboard on a person's forearm. So, using Skinput, someone could send text messages by tapping his or her arm in certain places +-- without pulling the phone out of a pocket or purse." +........ + +I http://www.transferjet.orgjen/tj/tj_overview.html z hUp://en.gigazine.netjindex.php?/news/comments/20091006_alps_ceatec.,japan_2009/ +Skinput is a technology that aims to make communication more "natural" by, " .. .Ietting people communicate with their gadgets by gesturing, using sign language or tapping on their hands, fingers, and forearms." +arm, and found that low-frequency electromagnetic waves were able to travel tnrough the skin easily and without any outside interference. The study, which improved on previous attempts that used tiny metal electrodes coated with a silicon-rich polymer, allowed the device to be bent at a gO-degree angle 700,000 times without incident, and proved that human skin can be used as a conduit for transferring data. + +To use Skinput, a person must wear an armband with sensors (the prototype is an elbow brace lined with 10 +sensors), that are able to pick up low, but audible sounds with frequencies ranging from 25 to 78 hertz. + +Once a Skinput user taps their thumb and middle finger together, the impact acts as a catalyst and sends ripples down the skin and through the bones in the person's arm. The arm band's receivers then read the sound waves and determine what gesture the person made, and then proceeds to pass that information on to a telephone. + +REDTACTON +RedTacton is a technology designed to use the human body as a network transmission path. Considered a Human Area Network (HAN) technology, RedTacton is unlike wireless and infrared. It operates by forming a transmission path when part of the human body comes in contact with a RedTacton transceiver. Once the body part is separated from a RedTacton transceiver, communication ends. Communication through RedTacton is initiated when embedded devices or terminals carried by the user are linked in a variety of combinations according to a user's Skinput can differentiate whether a person tapped a middle finger or an index finger, as the movements each impart a unique sound to the receivers. Once the system becomes accustomed to the sound of a user's arm, a process that generally takes one to two minutes, the user can begin to use Skin put as desired. Skin put allows a user to tap their palm as a signal to unlock a door or to tap virtual buttons on an arm to power on a :rv and search through channels.4 +USING S~IN TO TRANSFER BROADBAND +SIGNALS +An experiment conducted by researchers at Korea University demonstrated that human skin is an energyefficient conduit for data transmission. Performed with small, flexible electrodes that are the approximate width of three human hairs, the experiment showed that data can be transmitted through skin at a rate of 10 Megabits per second (Mbps). + +physical movements through hands, fingers, arms, feet, face, legs, torso, and so forth. RedTacton usability is not impacted when a user wears clothing or shoes. It can communicate data through the human body at speeds up to 10 Mbps. + +RedTacton has three primary functional features: + +- Touch: Touching, gripping, sitting, walking, stepping +and other human movements can be the triggers for +unlocking or locking, starting or stopping equipment, or +obtaining data +South Korean researchers that administered the test placed electrodes approximately 12 inches apart on the subject's + +- Broadband +and Interactive: +Duplex, interactive +communication is possible at a maximum speed of 10 +Mbps. Because the transmission path is on the surface +........ +bail eiliOiUCli'Ci.CSe"Sltloe '.afbil.laHUI. i O' OillCiS. ase **6'''9** (dS) , 060) iiCSIS6!6SSlS: iSliloriiie hi FBI 8111y of the body, transmission speed does not deteriorate in congested areas where many people are communicating at the same time + +- Any-media: In addition to the human body, various conductors and dielectrics can be used as transmission media. +Conductors and dielectrics may also be used in combination7 +How RedTacton Operates The following steps detail how the RedTacton technology works: + +1. The RedTacton transmitter induces a weak electric field on the surface of the body. +2. The electric field sensor (transistor or photonic electric field sensor) detects the electric ,field that reaches the +RedTacton receiver. +3. Signals are processed in the receiver circuit and the data is downloaded. +The RedTacton transmitter sends data based on fluctuations in the weak electric field induced in the human body. The electric field is then received using sensing technology that is highly sensitive to the body's electric field. RedTacton's super-sensitive electric field sensing technology is used to measure the weak electric fields induced by the ultra efficient alternating electric field induction technology, developed by RedTacton's creators, NIT (Japan). + +RedTacton Prototypes According to RedTacton, the following RedTacton security device and data transmission device prototypes have been developed, or are currently in development: +........ + +- Transmission rate: 230 Kbps +- Protocol: Proprietary protocol +- Transmission method:' Unidirectional + +## Embedded Receiver + +- Transmission rate: 230 Kbps +- Protocol: Proprietary protocol +- Transmission method: Unidirectional - External device interface: 10/100BASE-T, RS232C - TransmiSSion rate: 10 Mbps +- Protocol: TCP/IP +- Transmission method: Half-duplex - Terminal interface: PCMCI + +## Embedded Receiver + +- Transmission rate: 10 Mbps +- Protocol: TCP/IP - Transmission method: Half-duplex - External device interface: 10BASE-T +LAW ENFORCEMENT IMPACT +HAN technology is responsible for. ground-breaking developments in the way that people communicate. In the future, conventional voice-to-voice calling and data transfer methods may no longer be required to pass information to a person or a device. Devices that are based on HAN technology allow people to communicate and initiate tasks with a simple handshake, tap on the arm, or b lacin a hand over a sensor. Such devices ot 0 I +iv +f share information + +## 15. Gesture-Recognition + +software uses eyesight's Touch Free Interface which, +" ... allows the user to interact with the mobile device easily and intuitively, without touching the keypad or touchscreen." The eye Can technology operates with any standard phone containing a bUilt-in camera, which it uses in combination with advanced real-time image processing algorithms to track a user's hand motions and translate them into user actions.2 +eyeCan operates by recognizing the four basic hand gestures, that are then translated into various actions such as skipping tracks, volume control of a media player, scrolling through pages in an E~book viewer or Web browser, switching content channels in a media streaming application, and'so forth.3 +INTRODUCTION +The act of placing a telephone call or selecting a song to play on an MP3 player has gone through many changes over the years. Making a call on a cell phone is no longer limited to a user pressing buttons on a compact dial pad or touchscreen. Scrolling through an entire collection of music to find a specific song, which was once the only way for a user to pick and play their favorite tune, is now just one of many options. Voice-activated calling allows users to simply speak the name or number of the person with minimal or no physical contact with their phone, and users can utter commands on their smartphones or MP3 players to search for addresses, contacts, and other data. These examples are representative of a growing movement exploring the potential of gesture-based mobile device capabilities, and a progression toward touch-less telecommunication. + +Using a mobile phone's front-facing camera, eyeCan provides users with the capability to navigate through picture galleries, send Short Message Service (SMS) +messages, and place phone calls using "swipe" gestures that are ex.ecuted a few inches in front of a mobile device. + +Other features include pause-and-play control of a music player using a temporary "hold" gesture.4 +Expanding on the idea of touch-less functions, a new technology known as gesture-recognition is the latest way that individuals use their cell phones and other mobile devices to perform tasks and communicate with each other. "Gesture-recognition is a topic in computer science and language technology with the goal of interpreting human gestures, via mathematical algorithms. + +Gestures can originate from any bodily motion or state but commonly originate from the face or hand." Gesturerecognition can be considered a means for computers to understand human body language, as well as a way to facilitate communication among humans and machines, which at present, is mostly limited to text and Graphical User Interfaces (GUls) such as the keyboard, mouse, and screens.1 +Applications with gesture-recognition capabilities are being integrated into mobile and gaming devices and have infiltrated the marketplace. + +APPLICATIONS +Several companies have begun advertising new gesturerecognition tools and software for mobile phones. A few of these technologies are described in the sections that follow. + +eyeCan Developed by the company eyeSight, "eyeCan is a pure software solution, which provides a unique interface to control mobile phone features and applications." eyeCan EyePhone The EyePhone, created by a team of researchers at Dartmouth College, is an eye tracking technology that, +"lets users browse through mobile phone menus with the blink of an eye."6 The EyePhone system works by creating a template of a user's open eye when the individual initially uses the system. Once a template is created, it is saved in the device's persistent memory and retrieved when the EyePhone is invoked. In the EyePhone's current implementation, the system is trained individually (e.g., an eye template is created for each user when the application is used for the first time). In future iterations, it is anticipated that the eye template training will be facilitated through the use of the EyeMenu, a customizable shortcut for accessing EyePhone functions. + +........ + +The EyePhone is designed to map the position of a user's eye to one of nine buttons, which are highlighted once the EyePhone detects the eye in the position mapped to the button. Once in the position of a corresponding 'button, a user then blinks their eye to launch the associated application? + +Microsoft Klnect One of the highlights of the Electronic Entertainment Expo (E3) 2010 press conference was the unveiling of Microsoft's Kinect for Xbox 360, a motion control system formerly titled "Project Natal". Released on November 4, +2010, the"Kinect, " ... can sense and respond to users' body motions as well as their voices ... "l1 +"EyePhone runs on a Nokia 810 smartphone". The program tracks the position of an eye relative to the screen (rather than where a person is looking). A user must move the phone slightly so the icon is directly in front of the eye and then select an application"by blinking. The program places an "error box" viitually around an eye, and can recognize the eye as long as it doesn't move outside of this box. The phone app divides the camera frame into nine regions and looks for the eye in one of these regions."s +"The slim black Kinect sensor plugs directly into any Xbox +360. Despite its small size, the Kinect device contains a camera, audio sensors, and motion-sensing technology that tracks 48 pOints of movement on the human body. + +It has the ability to recognize faces and voices."13 Kinect is able to conduct fullmotion human body tracking at 30 +frames per second, and is not affected by surroundings including furniture or what the user is wearing. + +Moove MP3 Player eyeSight is also the creator of the Moove MP3 player, an application that uses gesture-recognition technology to allow users to control an MP3 shuffler using hand motions. + +Moove works by having the user place their hand over the phone to initiate the playing of a song. A song can be paused by the user placing a hand over the phone a second time. With the ease of the Moove application and the phone's camera, "a hand gesture above the phone will skip to the next song .. .wave again and skip to the next, and to the next ... " A "Sync" button is also available to add new songs to a playlist9 +With Kinect technology, " ... users will be able to access and control Netflix movies or TVshows through Xbox Live with nothing more than a wave or two of their hands and a voice command to stop, pause, or play. They will be able to have video chats with friends, watch pro sports games via a Microsoft content partnership with ESPN and, of course, play games." Microsoft's Kinect will also contain, +"other features of Xbox Live, including the new content from ESPN, Facebook, Last.fm, and Twitter ... "14 +Tokyo~ Touch/ess Camera System Researchers at the University of Tokyo's Ishikawa Komuro Laboratory have produced a camera system that allows users to interact with their cell phones without actually touching them. The system was designed to attach to a mobile device and track suspended finger movements and then translate them into commands. + +"The camera recognizes if the finger is moving toward it and away from it and at what speed. This lets a user move a mouse, zoom and scroll pictures, and digitally draw and type, without ever touching the screen."10 +GAMING +Gesture-recognition technology is a new trend that can be seen in the releases of popular gaming technology. + +Abandoning traditional remote controls, gamers have the opportunity to navigate through games and perform other functions with simple gestures and body movements. + +Morna for Windows Mobile Momo for Windows Mobile, created by the company GestureTek, is a new technology that uses a cell phone camera to track objects and motions within the camera's field of view. Momo's engine defines interfaces for two trackers. The first is a Motion tracker that determines interaction by following specific movements; the other is the Mosaic tracker, which tracks objects such as faces and hands. 'Momo makes possible groundbreaking mobile games that can respond to hand motions over menu items and even track the position of the user's head.' The tool allows users to control and direct actions on their phone using specific hand or body gestures and does not require +........ + +movement of the device itself. + +Users could also abuse gesture-recognition +1-__ +--:-' +to communicate with associates. Providing the capability to scroll through pictures, draw and type digitally, and peruse phone menus that can easil take a user to the e-mails and so forth EyeMo EyeMo, which uses a mobile device's camera to sense and report device motion, is now available for Android devices. + +For people with camera-enabled Android phones, "once the software is enabled, users can shake, rock or roll their phone to play games, answer calls, shuffle playlists, navigate maps, scroll, pan, zoom, turn pages and even . '-------------------' +browse the Web - all without pressing a button or touching Gesture-recognition technology is clearly within the early the screen."15 +. + +- stages of development. It has the potential to alter how we ILAW ENFORCEMENT IMPACT +execute command and control functions, as well as how we interface with com uter and communication devices. + +L...-__________ ----ilThis technology is definitely one to watch - +. . . . . . . . . + +one soon. If the device is unable to find a hotspot within a +. predicted maximum delay time it switches to 3G. + +INTRODUCTION +Microsoft Researchers have been working on a technology that would let mobile phones and other third generation +(3G) devices automatically switch to public Wi-Fi even while the deviceis traveling in a vehicle. The technology is dubbed Wiffler and earlier this year, researchers took it for some test drives in Amherst, Massachusetts (MA), Seattle and San Francisco.1 +"We try to ensure that application performance requirements are met. So, if ,data needs to be transferred rightaway (e.g., VoIP) we do not wait for Wi-Fi connectivity. + +But, if some. data can wait for a few seconds for Wi-Fi instead of transmitting right away on 3G, this reduces 3G +usage." +"The second feature is that both connections can be used in parallel instead of using only one. So, if some data cannot be transferred using Wi.:Fi alone within its latency requirement, both 3G and Wi-Fi are used simultaneously. This parallel use is different from a handoff from one technology to'the other, and it-better balances the sometimes conflicting goals of reducing 3G usage and meeting application constraints."3 It is similar to mUlitnetwork load balancing. + +Wi-Fi is available only about 11 percent of the time for a mobile device-'in transit, compared to 87 percent of the time for 3G availability, .Wi-Fi was not designed as a mobile access technology. At best, mobile devices can use Wi-Fi for short periods of time. The Wiffler protocol allows devices to offload nearly half of its data from 3G to Wi-Fi. How does this work? Wiffler is smart about when to send the packets. It doesn't replace 3G, it augments it and transmits over Wi-Fi simultaneously, allowing users to set Wi-Fi as the delivery method of choice when it is available -- and when an application can tolerate it. Not every application can handle even a few seconds delay in the stream Voice-over-Internet Protocol {VoIP} -- and Wi-Fi tends to drop more packets than 3G does. But many apps can handle even a minutes-worth of delay perfectly well +(e.g., messaging).2 +The test consisted of running Wiffler units on 20 buses in Amherst, MA as well as in one car in Seattle and one at the San Francisco airport. The Wiffler unit itself was a proxy device that included a small-form factor computer, similar to a car computer (no keyboard), an 802.11b radio, a 3G +data modem, and a GPS unit. The 3G modem was using HSDPA-based service via AT&T. With today's smartphones, the Wi-Fi/3G combo tends to use Wi-Fi connectivity only when stationary; *the* Wifflertechnology provides automatic combo management that permits optimal application performance. + +Wiffler uses what researchers call "prediction based offloading" in which it determines how likely it is to travel within the area of an acceptable Wi-Fi hotspot within a certain time frame. A car in an urban area discovers frequent hotspots and predicts finding another one quickly. If traveling on a highway and Wiffler does not locate a hotspot in a while, it figures it won't find another Currently, it is not known when the Wiffler will be available on the commercial market. + +........ + +## 17. Counterfeit Gadgets + +and iPad or those that cannot afford the premium cost to buy these items. + +INTRODUCTION +The introduction of devices such as the iPod, iPhone, and iPad, Apple's recently released touchscreen tablet, have proven to be very popular among consumers. Because of their popularity, and the inability for some interested buyers to get their hands on the devices legitimately, a growing gray market has emerged in places like Beijing: China. The gray market provides options for users that cannot afford to pay the retail price for Apple's mobile devices, as well as individuals that live in areas where the iPad and the iPhone 4 just recently became available. These counterfeit devices often appear to look very Similar to the real iPad and iPhone sold in stores but are available for a much cheaper price. The functionality of fake iPhone 4 models available on the gray market varies and some phones even offer capabilities that Apple's licensed products do not. + +For this reason, Law Enforcement (LE) should be aware that these phony mobile devices exist, and understand that they may be used to perform functions that Apple manufactured devices cannot. + +BACKGROUND +Three Wi-Fi models of the Apple iPad went on sale in China on September 17, 2010. Apple first released the iPad in the United States back in April 2010, and in late May 2010 made the device available in Australia, Canada, France, Germany, Italy, Japan, Switzerland, and the U.K.l The iPhone 4 was officially released in China on September +25, 2010, three months after the phone's initial launch in the United States.2 +A thriving Chinese gray market emerged in between the time that the iPhone 4 and iPad were released in the U.S. and when the devices were made available for legal purchase in China. + +Despite a significant portion of China's population living in poverty or on low income, the iPhone 4 can be sold for as much as $1,000 once it is unlocked.3 For many Chinese buyers, "Apple is a sign of coolness," suggesting that the Before their official September 2010 release, the iPhone widespread popularity of both the real and counterfeit +4 and iPad were readily available in China. Available in iPhone 4 is related to the status that It conveys. 125 +electronics malls in major cities like Shanghai and Beijing, +"Most people in China can only dream of being able to the sale of fake Apple devices is so lucrative that it can afford an expensive phone. But millions of Chinese are be considered a serious competitor for Apple. Phones developing a taste for luxury goods, and Apple products sold on the gray market are smuggled from the United have joined Louis Vuitton bags as totems of wealth.1I4 The States and Hong Kong, where devices went on sale long. + +Chinese gray market provides easy access to high-quality before their authorized release in China. The smuggled replicas of trendy Apple gadgets for consumers that were iPhone 4 sells in China for $800 to $1,700, depending on too anxious to wait for the official release of the iPhone 4 +the storage size. An iPad with 64 gigabytes (GB) goes for +........ + +8 http://images.lntomobilthcom/wp-content/uploads/2010/10/white-iphone-4-bigJpg about $1,000.7 The expensive price tag was a deterrent for many Chinese consumers that wanted to purchase the iPad and iPhone produced by Apple. As a result, users that could not afford to buy the licensed Apple iPhone 4 opted for counterfeits that are virtually indistinguishable from the real one. These counterfeit Apple phones are known in China as "Shanzhaiji", which is loosely translated as +"Mountain Bandit Phones". + +In China, a country well known for its production of copycat jewelry, electronics, clothing, and accessories, the growing prevalence of smartphones and other mobile devices has introduced a new marketplace for the production and selling of counterfeit items. According to BOA China, a business advisory firm based out of Beijing, " .. .illicit phones made up 38 percent of the handset sales in China in 2009."8 Arguably, the popularity of Taiwan's iPhone +4 phone is based on its likeness to the real iPhone 4. + +Comprising a significant portion of the market share, the popul~rity of "Shanzhaiji" is so vast that it has allowed the gray market t