Technology



TrustLink Technology

Overview

TrustLink is a technology developed by EION Wireless for the delivery of high‑throughput, outdoor, multimedia rich applications in the unlicensed band. TrustLink Technology provides interference mitigation, increased system performance, low latency and Quality of Experience.

  • With TrustLink, the core approach is to employ a dynamic polling system in place of a traditional CSMA-CA system for channel control.
  • Here, transmissions for the CPEs are synchronized to the base station and do not attempt to transmit until instructed to by the access point.
  • By using a dynamic approach only those CPEs that have traffic to send or are to receive data are polled.
  • Traffic dormant CPEs are polled much less frequently which substantially reduces the number of extraneous messages.
  • Dynamic polling gives more time for live traffic handling and reduces system overhead.
  • TrustLink incorporates strong algorithms that significantly reduce the harmful effects of interference in the unlicensed band. The system takes a commanding role in the face of interference from outside systems. Unlike other wireless systems.
  • TrustLink will constantly scan for gaps in transmission and take advantage of every free opportunity in the unlicensed band. This behavior is where the TrustLink can win out in congested channels.
  • By capitalizing on any gap in transmission and polling CPEs with traffic, TrustLink has a higher probability of successful communication. The added advantage of the aggressive polling approach is that it will back off CSMA-CA systems by keeping the channel active.
  • Collectively, the opportunistic gap grabbing, streamlined messaging and backing off of CSMA-CA messages results in significantly better throughput than conventional 802.11 systems in the same crowded channel environment.
  • For highly scalable networks, TrustLink Technology allows operators to connect a large number of CPEs to each access point.
  • Traditional WiFi based CSMA-CA systems requires that all subscribers can hear each other and multiple collisions can occur and suffer from hidden node and capture effect, limiting the number of subscribers.
  • TrustLink, solves the hidden node problems and enables a truly scalable platform for cost effective point-to-multipoint networks.
  • TrustLink goes beyond Quality of Service to provide a total Quality of Experience to end customers. Service flows can be defined to prioritize traffic based on the type of service (voice, video, data etc.).
  • These service flows can be further classified to sort traffic based on characteristics such as VLAN ID or IP range. Because QoS is implemented directly at the scheduler level in the access point.
  • TrustLink can maintain extremely low latency and deliver superior performance for multimedia applications. With TrustLink, polling cycles and transmit opportunity times are intelligently controlled by the access point to provide guaranteed maximum throughput.


OFDM

Overview

Orthogonal Frequency Division Multiplexing (OFDM) has been successfully applied to a wide variety of digital communications applications over the past several years and has been adopted as the wireless LAN standard.

    Just what is OFDM, and what makes it better? To answer this question, we need to review some basic ideas about wireless telecommunications systems, and how OFDM fits into the overall picture.

    In what follows, we will review the following concepts needed to understand OFDM; digital messages, carrier waves, modulation and multiplexing. Then we will explain OFDM and why it is used.

  • Wireless communications systems are used to send messages between two locations using radio waves which travel across free space.
  • Messages of all types (voice, music, image, video, text) are usually converted to digital form and are represented as a stream of 1's and 0's called bits (binary digits).
  • Voice messages can be represented by about 10,000 bits per second, CD quality music needs about 100,000 bits/sec, and TV quality video messages require about 1,000,000 bits per second, plus or minus.
  • Text messages can be sent at any speed, depending on how long you are willing to wait.
  • Frequency division is where each toll booth lane represents a different carrier frequency or simply the carrier.
  • Orthogonal is a mathematical term used to describe axis and functions that do not influence each other.
  • Radio waves are electromagnetic waves used to carry a message over a distance. Thus radio waves are also called a carrier waves.
  • A carrier wave looks like a sine wave, and moves like a train at the speed of light.
  • The frequency of the carrier wave is the number of times per second that the wave train goes up and down and back up as it moves past you, and is measured in units of cycles per second or Hertz.
  • Carrier (electromagnetic) waves of different frequencies and wavelengths have different properties. For example, radio waves can travel through walls, but light waves cannot.
  • Lower frequency waves tend to travel further, and can bend around corners. Higher frequency waves travel more or less only via line of sight.
  • Thus certain parts of the radio spectrum are better suited for certain types of telecommunications. For indoor wireless communications through walls over a distance of several hundred feet, or outdoor communications over several miles mostly over line of sight with perhaps some trees in the way, carrier frequencies in the range of 1 to 5 GHz (gigahertz or billion cycles per second) are used.
  • Multiplexing is a way to split a high speed digital message into many lower speed ones. A useful analogy is a highway with a toll collection point.
  • Where each car is one bit of the message, and the number of cars passing a given point in one second is the speed of the message, which represents bits per second.
  • The single lane highway may be split into 10 different lanes for paying tolls. At a point beside the single lane highway, the cars will pass at high speed, whereas at the toll booths, the cars will pass slowly.
  • Thus the single high speed message (flow of cars past a point of single lane highway) is divided into many low speed messages (flow of cars past many toll booths).
  • In a perfect system, the first car will take the first toll lane, the second car takes the second toll lane, etc. The 11th car takes the first toll lane again, and follows the first car. A multiplexer is a switch that assigns each car to one of the many toll booths.
  • Demultiplexing is the opposite, where many low speed messages are combined into one high speed message. Following the analogy, demultiplexing is where the many low speed messages (cars) passing slowly through the toll booth lanes are merged back into a high speed message traveling quickly on a single lane highway.
  • Modulation
  • Orthogonal Frequency Division
  • How to Implement OFDM?
  • Why Use OFDM?

Modulation is the process whereby a carrier wave of a particular frequency is modified or modulated by the message signal, so that the modulated carrier wave can be used to carry the message over a distance. For digital messages (a stream of 1's and 0's), there are three basic kinds of modulation

Amplitude Shift Keying (ASK) (digital AM) in which the amplitude of the carrier wave is modulated in step with the message signal. Frequency Shift Keying (FSK) (digital FM) in which the frequency of the carrier wave is modulated in step with the message signal.

Phase Shift Keying (PSK) (digital PM) in which the phase of the carrier wave is modulated in step with the message signal. ASK and PSK may also be used at the same time on one carrier, which is called Quadrature Amplitude Modulation (QAM) or Amplitude/Phase Keying (APK).

The receiver is designed to receive the carrier wave, detect these amplitude and phase shifts in the carrier (demodulation), and thus retrieve the digital message.

When a carrier wave is modulated, it is no longer a single frequency but is spread out over a range of frequencies. The bandwidth of the modulated carrier wave is the range from lowest to highest frequency, with the original carrier frequency in the center.

The bandwidth is approximately equal to the speed of the digital message, e.g. 10,000 Hz (10 KHz) for voice or 1,000,000 Hz (1 MHz) for video. OFDM (Orthogonal Frequency Division Multiplexing) is a method of using many carrier waves instead of only one, and using each carrier wave for only part of the message.

OFDM is also called multicarrier modulation (MCM) or Discrete Multi-Tone (DMT). We first describe Multiplexing, then Frequency Division and then Orthogonal.

It is important to stress that OFDM is not really a modulation scheme since it does not conflict with other modulation schemes. It is more a coding scheme or a transport scheme.

Orthogonal Frequency Division is where the spacing between carriers is equal to the speed (bit rate) of the message (explained in more detail later).

In earlier multiplexing literature, a multiplexer was primarily used to allow many users to share a communications medium like a phone trunk between two telephone central offices.

In OFDM, it is typical to assign all carriers to a single user; hence multiplexing is not used with its generic meaning.

Orthogonal frequency division multiplexing is then the concept of typically establishing a communications link using a multitude of carriers each carrying an amount of information identical to the separation between the carriers.

In comparing OFDM and single carrier communication systems (SCCM), the total speed in bits per second is the same for both, 1 Mbit/sec (Mbps) in this example.

For single carrier systems, there is one carrier frequency, and the 1 Mbps message is modulated on this carrier, resulting in a 1 MHz bandwidth spread on both sides of the carrier.

For OFDM, the 1,000,000 bps message is split into 10 separate messages of 100,000 bit/sec each, with a 100 KHz bandwidth spread on both sides of the carrier.

To illustrate how frequencies change with time, we can use the analogy of the sounds of an orchestra or band.

One carrier wave is analogous to one instrument playing one note, whereas many carriers is analogous to many instruments playing at once.

Single carrier systems using a high speed message is analogous to a drum roll where the sticks are moving fast.

Multicarrier systems (OFDM) using many low speed messages is analogous to many instruments playing more slowly.

A final comparison between OFDM and SCCM is to state that SCCM carry the information is a serial manner whereas OFDM carries the information in a parallel manner.

A more detailed understanding of Orthogonal arises when we observe thatthe bandwidth of a modulated carrier has a so called sinc shape (sinx/x) with nulls spaced by the bit rate.

In OFDM, the carriers are spaced at the bit rate, so that the carriers fit in the nulls of the other carriers.

Another view of Orthogonal is that each carrier has an integer number of sine wave cycles in one bit period.

Original multicarrier systems were implemented through the generation of a number of carriers using separate local oscillators. This was inefficient and costly (though increased the data rate).

When a mathematical transform (the fast Fourier transform - FFT) was introduced to generate the different individual carriers and ensure their orthogonality, OFDM was reborn. The FFT basically calculates the spectral content of the signal.

It moves a signal from the time domain where it is expressed as a series of time events to the frequency domain where it is expressed as the amplitude and phase of a particular frequency. The inverse FFT (IFFT) performs the reciprocal operation.

Data (which can be digitized speech, digitized video or computer data) is coded for security or error correction. It is then modulated by some form of QAM (QAM, 16QAM or 64QAM for example).

In single carrier systems, the data would then be placed at the appropriate frequency for transmission. In OFDM, the data is then framed into frames of a suitable size for an FFT.

An FFT should be of length 2r (where r is an integer). Not all 2r points in the FFT are used to carry the information; some points are placed for fine-tuning the frequency or for tracking the timing of the bits.

An IFFT is performed on the frames. Each frame output from the IFFT is placed at the appropriate frequency for transmission. In the receiver, the inverse operations are performed and data is recovered.

However, as the FFT is performed in the receiver, the data is then in the frequency domain which makes correcting the imperfections of the channel simple.

OFDM was known since the mid 50s. Why OFDM only became popular in 2000 is because economical integrated circuits that can perform a high speed FFT real time were not available until 1998.

Peak-to-Average Ratio (PAR) Problem

A characteristic of FFT is that if the input to it happened to be a sinusoid, the output will be a pulse of height 2r. If the input was a pulse of some height, the output would be a sinusoid of height 1.

This means that the output of the FFT has a minimum dynamic range of 10log2r. Dynamic range is a term used to define the linearity requirement of a system.

It represents the ability of the system to honestly reproduce the signals input into it. The dynamic range of an OFDM system then is typically larger by as much as two to four times that of a single carrier system.

The dynamic range increase leads to an increase in the cost both in terms of dollars and power consumption of the transmitter amplifier.

This PAR problem is one of the reasons early high speed OFDM systems were only implemented in broadcasting applications.

When the radio signals travel from one location to another, they may bounce off surrounding objects (Figure 1), resulting in multiple paths between transmitter and receiver.

This is analogous to echoes or reflections causing multiple copies of the message to arrive at the receiver at different times. The combination of all paths at the receiver causes the modulated message signal to be distorted.

A simple example is where there are only two paths, the line of sight path and a reflected path from the ground. If a message is sent at the right speed, then the second (reflected) copy of the message may arrive exactly one bit time later than the first (direct) copy.

The receiver will then receive two different bits mixed together, thus distorting the original message bit (Figure 1). Wireless communication systems have to be designed to cope with this so-called multipath distortion.

The main idea of using OFDM is to avoid problems caused by multipath reflections by sending the message bits slowly enough so that any delayed copies (reflections) are late by only a small fraction of a bit time.

To maintain a high bit rate, multiple carriers are used to send many low speed messages at the same time which can be combined at the receiver to make up one high speed message. In this way, we avoid the distortion caused by reflections.

If SCCM is used instead of OFDM, then the delayed copies of bits will be mixed together by the multipath, and the multipath distortion must be cancelled out using a so-called equalizer.

Such equalized systems can work well, but they are subject to problems caused by imperfect cancellation of the multipath.

If the delay spread (the period of time where replicas of a bit are still arriving at the receiver) is n bits long, conventional equalizers need n2 (order of magnitude) operations to remove the effects of multipath.



TrustLink-256

Overview
EION Wireless has introduced TrustLink-256 technology to address the enhanced security requirements from todays network operators. TrustLink-256 includes strong data security features such as AES-256 encryption in addition to management security and user authentication. The TrustLink-256 security infrastructure software enhancements can be added to any StarPlus radio via software key upgrade.
  • TrustLink-256 builds on the base level TrustLink features available in all StarPlus products.
  • TrustLink is a technology developed by EION Wireless for the delivery of high‑throughput, outdoor, multimedia rich applications in the unlicensed band.
  • TrustLink Technology provides interference mitigation, increased system performance, low latency and Quality of Experience.
  • EION has taken a multiple tier approach to overall network security.
  • The three pillars of our network security model are; Payload Security - ensuring that your data is secure using advanced encryption techniques, Management Security - ensuring that management traffic is secure and accessible to only authorized users, and Physical Security - ensuring that devices cannot be unknowingly tampered with.
  • EION TrustLink-256 technology uses advanced encryption techniques and filtering techniques to ensure that data on the network is secure and only visible to intended users.
  • The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S.
  • National Institute of Standards and Technology (NIST) and is a requirement from the US government to protect SECRET and TOP SECRET information.
  • TrustLink-256 implements the highest level of encryption, AES-256, however other key sizes are available in the software such as AES-128.
  • EION StarPlus radios form a closed private network infrastructure.
  • Unlike WiFi products where a large number of different devices are able to connect, StarPlus radios will only communicate and authenticate with other StarPlus radios.
  • This significantly reduces the possible attack vectors to the network.
  • With the StarPlus access filtering capabilities, network operators can create whitelists or blacklists of devices to controls authentication and connection to StarPlus networks or to individual StarPlus base stations.
  • Management Security The management security layer ensures that management traffic is secure and accessible to only authorized users within the network. Securing at the management layer is critical.
  • All management traffic is encrypted using the highest level AES-256 encryption. Obviously if management traffic is not secure; any other traffic going over the link could be compromised.
  • Rather than manage user access individually on each device, operators can centralize user access of large networks to a single RADIUS database.
  • This approach reduces complexity when assigning management functions, aids with change management and integration with third party contractors as well as provides a method to manage and enforce corporate password policies and password expiry.
  • The RADIUS authentication includes a fallback mode to local authentication in the event that the RADIUS service becomes compromised, the StarPlus network will remain secure.
  • Rather than manage user access individually on each device, operators can centralize user access of large networks to a single RADIUS database.
  • This approach reduces complexity when assigning management functions, aids with change management and integration with third party contractors as well as provides a method to manage and enforce corporate password policies and password expiry.
  • The RADIUS authentication includes a fallback mode to local authentication in the event that the RADIUS service becomes compromised, the StarPlus network will remain secure.
  • The StarPlus based management system ties into any standard SNMP capable NMS. Traps and alarms can be configured to immediately alert members of your team to downtime or suspicious activity on the network.
  • Because the alerts are sent in real time, resources can be dispatched immediately to take corrective action. For example, if a unit is rebooted or if an ethernet cable is unplugged, the system can be configured to send immediate alerts.
  • If your organization separates traffic using VLANs, all of the management traffic can be segregated from the data payload to a separate VLAN for an added security measure.
  • An component of our security focus is on physical security. The inherent placement of radio units excludes them from being located in secure network locations like other rack-mounted network gear.
  • Our focus on physical security prevents unwanted tampering or alteration of the equipment.
  • The rugged all-weather enclosure allows co-location on rooftops and masts limiting physical access. Products designed for critical infrastructure deployment are twice as thick as our conventional enclosures.
  • Our most rugged enclosures which are typically used for border security applications are fastened with tamper resistant hardware. These units require specially designed tools to open the enclosure.
  • One advantage to broadband wireless devices compared to wire-line systems is the placement of devices on rooftops and masts is inherently secure and limits the opportunities for an attacker to tap in or eavesdrop on the communications.
  • With wireless, the physical assets are located in a handful of discrete points as opposed to a wire-line system with long expanses of potentially exposed cabling.
  • TrustLink-256 technology that includes AES-256 and management security, combined with EION’s multi-layer approach to security provides network operators with a total security infrastructure solution.