Oct 8, 2022
Spatial streams – Understanding Network and Security for Far-Edge Computing

The term for beamforming as it is implemented within Wi-Fi is spatial streams.

While some vendors of 802.11n (Wi-Fi-4) devices did implement beamforming, it was through proprietary mechanisms that were specific to each product line. 802.11ac (Wi-Fi-5) was the first to include it as part of the specification.

When a Wi-Fi access point has beamforming enabled, it first estimates the angle of arrival of each client by comparing small differences in arrival times of a signal across multiple antennas that are close together. Once it knows the direction in which it needs to steer the beam, it will have those antennas broadcast the signal at slightly different times. The pattern that’s used is known as a steering matrix.

This deliberately introduces interference because the waves now overlap a little bit. However, not all interference is the same. Some are constructive interference, which makes the signal stronger in one direction, while destructive interference makes it weaker in another:

Figure 3.32 – Beamforming with 802.11ac (Wi-Fi-5)

The net effect of all this is to maximize the signal strength on a per-client basis. This means the signal effectively travels farther and penetrates obstacles better. With older Wi-Fi specifications, all you could do is increase the power output of an omnidirectional signal or add Wi-Fi repeaters.

This is one of the reasons for a seemingly endless multiplication of antennas on even consumer-grade access points. More antennas on both the AP and the clients are better for Wi-Fi throughput – up to a point13. Regardless of the number of antennas, the 802.11ac (Wi-Fi-5) specification supports a maximum of four spatial streams to be active at once.

13 Two antennas are the minimum for beamforming to function at all, while three is recommended.

802.11ax (Wi-Fi-6) increased this to eight and also enhanced it by including client-side modifications that help the AP figure out where a given client is instead of leaving all the work on the AP.

More Details
Aug 22, 2022
Modulation and coding schemes (MSCs) – Understanding Network and Security for Far-Edge Computing

The speeds provided in the preceding table are best-case scenarios. They assume an optimal SNR, which, in turn, allows the use of a modulation and encoding scheme that gets a higher data rate. Each generation of Wi-Fi has a different matrix of MCSs. The following is the MCS index table for 802.11ac (Wi-Fi-5):

   ModulationFEC Coding RateData Rate
MCS0BPSK1/2 
MCS1QPSK1/22x faster than MCS0
MCS2QPSK3/43x faster than MCS0
MCS316-QAM1/24x faster than MCS0
MCS416-QAM3/46x faster than MCS0
MCS564-QAM2/38x faster than MCS0
MCS664-QAM3/49x faster than MCS0
MCS764-QAM5/610x faster than MCS0
MCS8256-QAM3/412x faster than MCS0
MCS9256-QAM5/613.3x faster than MCS0

Figure 3.30 – 802.11ac modulation and coding schemes

Each of the MCSs shown has two parameters:

Modulation: In this context, modulation refers to the particular 802.11x modulation type in use. Some modulation types are very sensitive to noise while others tolerate it well. However, the robustness of a modulation type is achieved by reducing how sensitive it is – and this means a lower bit rate.

FEC coding rate: This describes how many bits transfer data, and how many are used for forward error correction. A coding rate of 5/6 means for every 5 bits of useful information, the coder sends 6 bits of data. In other words, there’s one error bit for every 5 data bits:

Figure 3.31 – Impact of MCS on data rate for 802.11ac

A Wi-Fi-5 or Wi-Fi-6 access point will negotiate the best MCS that it can, given the interference it is experiencing. Wi-Fi devices tend to express the SNR as a single number in dB, which represents the amount of signal above whatever noise is present.

A laptop 1 meter away from an access point with no obstructions would have an SNR of ~50 dB, and be able to operate at MCS9 (100% max speed). A second laptop far away or in a different room might only see an SNR of ~25 dB and be stuck at MCS3 (30% max speed).

Here are some practical steps that can help your device negotiate a faster MCS to its access point:

Reduce devices per AP: Try to have only 3-4 devices per AP where possible

Change Wi-Fi channels: Utilities such as NetSpot can help with this

Increase AP signal power: Some APs default to a lower power level than they are legally able to use

More Details
Jul 24, 2022
Optimizing Wi-Fi (802.11x)-based connectivity – Understanding Network and Security for Far-Edge Computing

Wi-Fi was designed to allow laptops, smartphones, and tablets to connect to the internet and/or communicate with each other on a local area network (LAN). It uses RF to transmit data over relatively short distances, typically within a home or office – although permutations intended for outdoor use are becoming more common.

Wi-Fi is based on the IEEE 802.11 standards, which operate at Layer 1 of the OSI model (physical). Introduced in the late 1990s, it was the first commercially successful wireless networking technology that was designed to work seamlessly with Ethernet (IEEE 802.3) – which almost all LANs use at Layer 2.

Wi-Fi-1 through Wi-Fi-6

The following table shows us the comparison of 802.11a/b/g/n/ac/ax:

   802.11 (b) Wi-Fi-1802.11 (a) Wi-Fi-2802.11 (g) Wi-Fi-3802.11 (n) Wi-Fi-4802.11 (ac) Wi-Fi-5802.11 (ax) Wi-Fi-6
Max Speed11 Mbps54 Mbps54 Mbps600 Mbps10 10 Requires the use of vendor-specific proprietary beamforming/spatial streams.1.3 Gbps11 11 Refers to per-station throughput. The whole network theoretical maximum is 6.9 Gbps.1.7 Gbps12 12 Refers to per-station throughput. The whole network theoretical maximum is 9.6 Gbps.
Range Indoor (2.4)35 mN/A45 m60 mN/A60 m
Range Indoor (5)N/A30 m30 m45 m45 m45 m
Range Outdoor (2.4)70 mN/A90 m120 mN/A120 m
Range Outdoor (5)N/A60 m75 m90 m90 m90 m
2.4 GHz BandYesNoYesYesNoYes
5 GHz BandNoYesYesYesYesYes
OFDMNoYesYesYesYesYes
MU-OFDMANoNoNoNoNoYes
SU-MIMONoNoNoYesYes8×8
MU-MIMO (d)NoNoNoNo4×48×8
MU-MIMO (u/d)NoNoNoNoNo8×8
Spatial StreamsNoNoNoNo48

Figure 3.29 – Comparison of 802.11a/b/g/n/ac/ax

More Details
May 19, 2022
Narrow-Band IoT (NB-IoT) – Understanding Network and Security for Far-Edge Computing

NB-IoT is a specification devised by 3GPP that defines a low-powered WAN (LPWAN) technology that rides on top of existing 4G/LTE and 5GC networks. It is meant to provide a lower cost level of service for IoT devices that do not need the full throughput of an MNO’s standard 4G/LTE or 5G data service offering.

Because it piggybacks on top of existing mobile networks, it shares the same licensed frequency spectrum, and normally the same cell towers/antennas. However, at a signal level, it functions a bit differently. The specification limits each device to a maximum of 200KHz of bandwidth. Contrast this with 4G/LTE, which can have 20MHz channels, and 5G, which can go as high as 400MHz, and the reason it is called “narrow-band” becomes evident. An MNO can support as many as 100 NB-IoT devices using the same amount of bandwidth needed to support a single 4G/LTE phone using a 20MHz channel.

How much throughput an NB-IoT device can squeeze out of that 200KHz channel depends on the version. 3GPP Release 17 was published in 2022 and specifies the latest revision, known as NB-IoT Enhanced. This version specifies a maximum throughput of 250 kbps down and 20 kbps up. It achieves this by using TDD to time-slice the transmit phase as FDMA and the receive phase as OFDMA.

Another difference is that NB-IoT is typically deployed using the guard band slots of an MNO’s network. While this is not always true, it is important to ask your MNO whether they deploy NB-IoT using “in-band mode” or “guard-band mode” as the latter will inevitably suffer from a higher signal-to-noise ratio than you could expect from an NB-IoT channel provisioned in a standard slot. Guard bands exist for a reason. At the time of writing, few NB-IoT offerings do not use guard-band mode:

Figure 3.28 – NB-IoT-capable pressure sensor

In most other ways, NB-IoT works like any 4G/LTE or 5G mobile device. Each device needs a SIM (although eSIMs are becoming the standard) to access the MNO’s network. Each device is also paired with one cell tower/radio at a time. Finally, the connection is synchronous, which means it is constantly on, regardless of whether the device has data to send or receive.

The narrowness of the band allows the MNO to charge less for the service, but it also means NB-IoT devices need less power for the transceiver than if they were using standard 4G/LTE or 5G. However, because of the synchronous connection, NB-IoT devices as a rule consume more power than LPWAN technologies that use an asynchronous connection model.

More Details
Apr 5, 2022
Small cells – Understanding Network and Security for Far-Edge Computing

So far, we have been discussing macrocells. They are large arrays of antennas that are typically mounted on their own tower and meant to service all of a CSP’s customers for a radius measured in kilometers. The ever-growing demand for new mobile devices has driven a market in small cells. These are small, lower-powered access nodes that are deployed for specific uses.

CSPs add small cells to their existing networks to increase coverage in rural areas, to service more devices in an area of particularly dense usage, or to provide service indoors. Small cells are also found in most private 5G networks. Small cells are broken up into femtocells, picocells, and microcells – each of which has a different range and supports a different number of users.

5G frequency spectra

Unlike 4G/LTE, 5G frequencies are split into three range groupings, each in a different region of the spectrum:

Figure 3.27 – 5G frequency band utilization

Cellular Vehicle-to-Everything (C-V2X)

Vehicle-to-Everything (V2X) is a set of specifications that encompass multiple types of wireless communication between a vehicle and its surroundings. This includes other vehicles, infrastructure, networks, and even pedestrians. V2X communication has the potential to revolutionize transportation, making it safer, more efficient, and more sustainable. C-V2X, however, is based on 5G (although it can use 4G/LTE in a more limited fashion).

V2X can be broadly categorized into four subtypes:

Vehicle-to-Vehicle (V2V): This communication occurs between vehicles on the road, allowing them to exchange information about their position, speed, and direction. This enables advanced Driver-Assistance Systems (ADASs) to prevent collisions, optimize navigation, and facilitate cooperative driving.

Vehicle-to-Infrastructure (V2I): In this type of communication, vehicles interact with roadside infrastructure such as traffic signals, road signs, and smart city sensors. This allows for real-time traffic management, improved safety measures, and enhanced navigation guidance. China is leading the way in this area. Nearly 90 cities have already partnered with local wireless network operators, deploying tens of thousands of roadside units to demonstrate intelligent highways and urban intelligent networked roads.

Vehicle-to-Pedestrian (V2P): This type of communication occurs between vehicles and pedestrians or cyclists, using devices such as smartphones or wearable technology. V2P communication can help prevent accidents by providing alerts to both pedestrians and vehicle drivers about potential collisions.

Vehicle-to-Network (V2N): This type of communication connects vehicles to various networks, including the internet, cellular networks, and cloud-based services. V2N communication can provide vehicles with updates on traffic, weather conditions, and other relevant information to enhance their performance and safety.

Of note is that, unlike most other 5G technologies, C-V2X does not necessarily require an MNO’s infrastructure to function. It can operate without a SIM, without network assistance, and uses GNSS as its primary time synchronization source. Today, about 50-60% of vehicles in North America are equipped with a cellular modem. The decision-making process within the automotive industry on whether to standardize on DSRC/802.11p or 5G for V2X has been long and drawn out but has finally settled on using cellular as the standard going forward.

According to the 5G Automotive Association (5GAA), auto manufacturers that are currently producing C-V2X capable models include Audi, BMW, Daimler, Ford, Lexus, Nissan, and Tesla.

More Details
Feb 10, 2022
Network slicing – Understanding Network and Security for Far-Edge Computing

Network slicing is a technique in 5G that can be thought of as a combination of VLANs and QoS mechanisms seen in enterprise data networks. Some aspects of them could be looked at as analogous to VPCs and SGs in AWS.

Regardless of how you conceptualize them, 5G slices allow multiple virtual networks to coexist on the same physical infrastructure. This allows for very fine-grained control of security and performance parameters down to a per-slice basis. MNOs often have the average user on general use public slices, while carving off per-customer slices for their B2B customers. Sometimes, mobile devices are given access to multiple slices from one device, each one mapping to a different application.

The Third Generation Partnership Project (3GPP) has defined three network slice categories:

Enhanced Mobile Broadband (eMBB): Designed to ensure high data rates to mobile devices, with SLA targets of >100 Mbit/s average and >10 Gbit/s peak throughput.

Ultra-Reliable Machine Type Communication (uMTC): Focuses on the reliability and deterministic latency aspects of 5G. SLAs target 3 9’s service availability and <1ms RAN latency. Sometimes, this is called Ultra-Reliable Low-Latency Communication (URLLC).

Massive Machine Type Communication (mMTC): Concentrates on the density of devices with lots of small conversations. This is also known as massive Internet of Things (mIoT).

3GPP also defines dozens of application-specific network slice templates such as those for all subcategories of V2X. In addition to these standard categories, MNOS can engineer custom slice types in response to customer demand.

Network function virtualization (NFV)

NFV uses proven hypervisor and/or container platforms to eliminate the 1:1 mapping between hardware and function that was seen in 4G/LTE EPC. 5G components, on the other hand, are deployed as virtual machines or containers on commodity compute hardware:

Figure 3.26 – 5G functions via NFV on commodity servers

This allows 5G service providers to deploy, manage, and scale the critical components of their network in an automated way. This not only reduces cost and time-to-market, it improves reliability and SLA adherence – which are critical to an MNO’s business.

While NFV was possible in 4G/LTE EPC, 5GC was built from the ground up with it in mind. All functions of 5GC can be virtualized – AMF, SMF, UPF, and network slicing can all be deployed as virtual constructs from the 5G management plane and operated transparently by the 5G control plane.

More Details
Dec 30, 2021
5G – Understanding Network and Security for Far-Edge Computing

As of August 2021, 175 MNOs were operating public 5G services across 72 countries[9]. It is estimated that 5G networks will account for 77% of MNO revenues (600 billion USD) by 2026, with demand for both consumer and business services such as MEC driving adoption. Much of this is being driven by the massive deployment of cellular-connected IoT devices, which are predicted to top six billion by 2026. That will be the point where IoT devices overtake smartphones as endpoints on mobile networks, with half of these expected to use 5G connections.

5G benefits from widespread support as a single global standard. When the specification was developed, the primary design goals were as follows:

Peak data rates up to 10 Gbps

Reliable, deterministic low latency for critical applications

Much higher density of devices on the network

Network Functions Virtualization (NFV) capabilities built into the core

Ability to fine-tune Quality of Service (QoS) parameters per application

At the same time, they realized that MNOs had made considerable investments in 4G/LTE infrastructure. Therefore, the specification was formulated in such a way that brand-new end-to-end 5G networks were not a requirement. Deployments are typically done in a phased manner that allows elements of an MNO’s network to be upgraded over time:

Figure 3.23 – Example of a 5G network

Even where standalone/private 5G networks are built using the full 5G New Radio (5G NR) architecture end-to-end, User Equipment (UE) such as mobile devices themselves are often built in a hybrid way such that 4G/LTE acts as a fallback position in case of incompatibilities.

5G Core (5GC) architecture

5G Core (5GC) is the basis of the network architecture used in 5G (fifth-generation) mobile networks. It is responsible for providing the same core network services as EPC, but it has been redesigned to support the increased demands and requirements of 5G networks. Compared to 4G/LTE EPC, 5GC was designed to be more flexible and scalable, with the ability to support a wider range of use cases and network architectures.

5GC includes the following key elements:

Access and mobility management function (AMF): Manages authentication, radio resource management, handover management, connectivity to external networks, and management of QoS for user data plane traffic.

Session management function (SMF): Manages the establishment, maintenance, and termination of sessions between the mobile device and the network.

User plane function (UPF): Routes user data plane traffic between the mobile device and the network. It is also responsible for compressing packets and enforcing the QoS policies set by the AMF:

Figure 3.24 – 5GC logical architecture

In the preceding figure, we can see that, unlike the PGW in 4G/LTE EPC, there is no longer a single node acting as the gateway to the internet or other packet networks. Mobile devices no longer need to backhaul to the PGW to leave the cell provider’s network. Elimination of this bottleneck was needed to support the much higher density of mobile devices, which is a key use case for 5G:

Figure 3.25 – 5G intranetwork routing

The preceding figure illustrates how the data path between two mobile devices on the same network benefits from 5GC’s distributed UPF. These changes are a key reason 5G devices see average RTTs of <10ms versus the average of 50ms observed in 4G/LTE networks.

More Details
Oct 15, 2021
Utilizing cellular networks – Understanding Network and Security for Far-Edge Computing

In this main section we will take a closer look at the different cellular networks and understand how we can utilize them. We will mainly cover 4G/LTE, 5G, C-V2X, and NB-IoT.

4G/LTE

What is known as 4G/LTE is not a single specification. It is a family of technologies that set out to meet a proposed definition of 4G laid out by the ITU in 2008. Its designers had the following improvements in mind over 3G:

Fully packet-switched (3G was circuit-switched)

Peak data rates up to 100 Mbps for mobile devices

1 Gbps for stationary devices such as 4G hotspots

Increased density of devices per cell through resource sharing:

Figure 3.20 – An example of a 4G/LTE network

How 4G/LTE is implemented varies considerably between Mobile Network Operators (MNOs). There are also key differences in how a given MNO’s 4G/LTE network functions across regions9. MNOs began rolling out 4G/LTE networks around 2011, and it was 2016 before MNO coverage could be considered widespread.

9 The Americas, Europe, Africa, and Asia all had different regulatory constraints that drove this.

Evolved Node B (eNodeB)

The part of a 4G/LTE network you are likely most familiar with is the front end – the ubiquitous cell tower. In 4G/LTE parlance, these are known as eNodeBs. They are elements of a standard cellular network component known as the Radio Access Network (RAN). They include antennas, transceivers, and radio access controllers.

Evolved Packet Core (EPC)

Note that 4G/LTE base stations (eNodeBs) only communicate with each other directly for control plane functions, such as to hand off a device from one tower to another.

Figure 3.21 – 4G/LTE logical architecture

Otherwise, communication needs to go through one of the subcomponents of EPC:

Serving gateway (SGW): Routes user data plane traffic, either between mobile devices or out to other EPC functions, such as a Packet Data Network Gateway (PGW). It also provides core network services such as routing, switching, and transport of data packets.

Packet data network gateway (PGW): Routes user data-plane traffic between EPC and external IP networks such as the internet. It’s also responsible for handling the exchange of data between the mobile device and the wider internet, and it consists of several interconnected network elements.

Mobility management entity (MME): This handles critical control plane functions for mobile devices, including authentication, location tracking, and handover signaling.

4G/LTE latency

EPC instances are centralized and often physically distant from the eNodeBs in a cellular network.

Figure 3.22 – 4G/LTE hairpin routing

Because user data plane traffic has to go back up to the EPC layer to be routed (this is known as hairpin routing), the average RTT on 4G hovers around 50 ms.

More Details
Aug 18, 2021
ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) – Understanding Network and Security for Far-Edge Computing

This is a scheme in which multiple closely spaced orthogonal subcarrier signals with overlapping spectra are transmitted to carry data in parallel.

In traditional Frequency Division Multiplexing (FDM), the subcarriers (also known as channels) are kept apart using a little bit of space between them called a guard band:

Figure 3.18 – FDM using guard bands

This is done to prevent crosstalk, noise, or interference between the channels. It also makes it easier for the demodulators to single out the channels when demuxing them.

OFDM deliberately overlaps the channels in a specific way – this is where the orthogonal part comes in. Orthogonal means “at right angles,” but in this context, it refers to a precise mathematical relationship between how the channels are spaced across the frequency band. This technique can save as much as 50% of the bandwidth, which can now be used to carry additional channels:

Figure 3.19 – OFDM

OFDM uses digital signal processing techniques to perform coherent demodulation on these overlapping channels 7. The mathematics are beyond the scope of this book. At its core, this is simply another example of how we can exploit the fact that light always travels at the same speed. OFDM techniques can, and often are, used in combination with MIMO.

7 Fourier transforms can be performed to convert the time domain of a digital signal’s square waves into frequency domains corresponding to the channels.

Shannon-Hartley theorem (signal-to-noise ratio)

Developed in the 1940s, the Shannon-Hartley theorem describes the maximum rate at which information can be transmitted over a communications channel of a specified bandwidth in the presence of noise:

Here, we have the following:

C is the channel capacity in bits per second

B is the bandwidth of the channel in hertz

S is the average received signal power in watts

N is the average power of noise/interference in watts

Let’s zero in on the two most important terms to remember:

Signal (S): Average power of the received signal in watts

Noise (N): Average power of noise (that is, interference) in watts

These two terms are grouped into a single expression known as the Signal-to-Noise Ratio (SNR). An SNR of 2:1 means there is twice as much signal as there is noise. An SNR of 1:1 means there is the same amount of noise as there is a signal.

Another way to put this is to say a signal that is suffering throughput loss from degradation due to interference can be improved by increasing the signal’s power 8.

8 Keep in mind that increasing the power of your signal can create interference for others. This is why there are often laws limiting how powerful a given device’s transmitter is allowed to be.

More Details