throbber
   
` 
 
`
  
`
` 
`  
`  
`  
` 
`
`   
` !
`" # $%&'()
`*++
`
,
,+
`-()..()(/0
`
`  
` 
 
`  
       
`
`1  
`23 4
,
`
`  
` )56))/
`
` ! 
`
`  7888  /,00      #
`  9 
`:';         
`#
` 
  
`  
`
` 
`
`#<
`=  
`
`
` %   
  
    %  <
`=
`
, 7 
`%
`<%3   
`


         
`  #  
`,            3  
`
` 

    %   
`
`
`   <         3     #
`
`$    <   %    
`
`
`
  
`    , "
`

`   
3  3     #
`  
`
` 
` 3    <     3
`   /,$
`  
`
` 3    
` 
`
`
 %  
`   
`
`      #
`  <  "
` >  #
`  
`
`
`<   
`%7888  
`
`
`     
`#  ?  > 
  #
`
`9 :';
`
  
`,
`
`
` 
`
`In 1985, the Federal Communications
`Commission (FCC) deregulated the spectrum
`from 2.4-2.5 GHz for use by the Industrial,
`
`Scientific, and Medical (ISM) communities.
`This meant that the spectrum would be
`available for
`individual,
` non-licensed
`applications [1]. This news was exciting to
`up-and-coming developers of wireless
`communications technologies, because they
`could now develop without spending money
`on licensing fees. Unfortunately, this led to
`many developments that were far from the
`ubiquitous, sprawling networks we see now.
`At the time, and throughout the development
`of the 802.11 standard, if wireless network
`technologies were available, they were
`usually proprietary, expensive, slow, or
`simply
`
`lacked
`
`widespread
`availability/adaptation – and most suffered
`from several of these challenges [2].
`In the early 1990s, however, the IEEE
`realized that a wireless communications
`infrastructure standard was necessary to meet
`a clearly-desirable market niche. The IEEE
`established an executive committee, as part
`of the IEEE 802 standard for Local and
`Metropolitan Area Networks to focus on
`developing a wireless LAN standard [2]. The
`802.11 committee focused on providing a
`reliable, fast, inexpensive, robust wireless
`
`1
`
`Page 1 of 33
`
`Samsung Exhibit 1034
`
`

`

`solution that could grow into a standard with
`widespread acceptance, using the deregulated
`ISM band from 2.4-2.5 GHz.
`The original standard, ultimately
`adopted in 1997, is vastly different from the
`standard that exists today. The maximum
`data rate was 2 Mbps. It included forward
`error correction, and two forms of
`interference mitigating spread spectrum
`methods – direct sequence and frequency
`hopping. It also included a specification for
`infrared wireless communications, still
`operating at up to 2 Mbps.
`A large part of 802.11's success is its
`inherent compatibility with current 802
`networks, specifically the 802.3 wired
`Ethernet networks [2]. The independence of
`physical access (PHY) and media access
`(MAC) from overlaying communication
`layers is critical to this compatibility. This
`compatibility was part of the 802.11
`committee's charter
`
`[1],
` but
`
`its
`implementation played a large role in
`ongoing internetwork growth.
`
` The
`compatibility was built on two pillars –
`physical layer compatibility and media access
`layer compatibility. The separation of these
`layers is critical to, not only the early
`implementation of the standard, but the
`ongoing extensibility of the standard.
`The physical layer portions of the
`original standard, and as well as today's
`standard, focus on allowing the base stations
`to get wireless broadcasts to one another;
`transceiving. The broadcast frequencies were
`in the 2.4 GHz to 2.483 GHz range or in the
`infrared spectrum (IR) (850-950 nm) [2].
`Transmitters used time-division duplex
`(TDD) radio broadcasts, allowing both uplink
`and downlink to share the same RF channel,
`using differential binary phase shift keying
`(DBPSK) or differential quadrature phase
`shift keying (DQPSK) signal modulation
`(Appendix A). Transmitters used either
`
`Direct Sequence Spread Spectrum (DSSS) or
`Frequency Hopping Spread Spectrum
`(FHSS) for interference mitigation. Data
`rates were specified for both 1 Mbps and 2
`Mbps operation.
`The media access layer (MAC)
`processes the PHY layer signals into the
`ubiquitous network layer. Fundamentally,
`802.11 uses collision sense media access with
`collision avoidance (CSMA/CA) for its
`media access protocol (Appendix B) [2]. The
`MAC layer also provides several services to
`assist in the wireless broadcast such as
`synchronization, power management, frame
`fragmentation, and frame encryption (WEP -
`Wired Equivalent
` Privacy)
`
`and
`authentication, with varying methods of
`employing
`these services for both
`infrastructure-based in distributed (known as
`ad-hoc) networks.
` For example, in an
`infrastructure network, synchronization is
`performed between all transceivers by using
`beacons transmitted by the access point. In
`an ad-hoc network,
` however,
`
`the
`synchronization responsibility falls to all
`members of the independent network,
`creating a sub-network of synchronizers.
`Note that there is no 5 GHz spectrum
`specification in the original 802.11-1997
`standard. This frequency allocation was not
`explored (or at least, published) until shortly
`after the original standard was adopted. The
`original standard focused on exploiting the
`recently-unlicensed 2.4 GHz ISM band, and
`the practical, and already-in-use infrared
`spectrum. In fact, the original standard
`largely overlooks, or at least actively ignores,
`many compatibility standards that would end
`up being crucial to widespread acceptance of
`the standard.
` For example, the entire
`standard makes only cursory mention of
`MAC address space, pointing out that its 48-
`bit address space is compatible within the
`broader scope of the IEEE 802 address space,
`
`2
`
`Page 2 of 33
`
`

`

`but is not required to be unique from a global
`802 address overlay. This compatible
`address space, which is still a part of the
`802.11 standard today, allows 802.11
`networks to interact with the 802.1 LAN
`specification that provides for bridging
`between separate physical networks, and is
`perhaps the cornerstone of the success for the
`standard. This address compatibility with
`802.x networks (and flexibility) played a role
`in
`the widespread adoption and
`interoperability of 802.11 wireless networks
`[2], even in the face of other, higher-speed
`competing network standards such as
`HiperLAN, a competing European standard
`for wireless network communications, which
`provided its own convergence to internet
`protocol (IP) networks, vice relying on 802.1
`for internetwork bridging [1].
`Despite not having addressed direct
`compatibility of the 802.11 with 802
`networks, the committee left the door open,
`and in fact immediately fostered the follow
`on Task Groups to address specific
`supplemental topics for use within the 802.11
`standard framework. The 802.11b task
`group, TGb, addressed higher speed
`transmissions
` within
`the
` WLAN
`environment. The 802.11b Task Group
`produced the 802.11b amendment, adopted
`by IEEE in 1999, just two years after the
`original standard was adopted. It allows for
`5.5 Mbps and 11 Mbps data rates, using
`Direct Sequence Spread Spectrum (DSSS)
`transmissions [2]. It also prompted the
`creation of
`the Wireless Ethernet
`Compatibility Alliance (WECA); a non-profit
`association for standardization and promotion
`of Wi-Fi technologies. From wi-fi.org [5]:
`“The Wi-Fi Alliance is a global non-profit
`industry association of hundreds of
`leading companies devoted to seamless
`connectivity.
` With
`
`technology
`
`3
`
` and
` market building,
`development,
`regulatory programs, the Wi-Fi Alliance
`has enabled widespread adoption of Wi-Fi
`worldwide.”
`
`Even today, 802.11b is probably the
`most widely-recognized, and widely-used
`802.11 standard, although 802.11g is quickly
`surpassing it, with 802.11n up-and-coming in
`popularity and availability. WECA renamed
`itself to the Wi-Fi Alliance in October, 2002
`[4].
`About the same time the 802.11b
`Task Group was designing the 802.11b
`amendment, the 802.11a Task Group, TGa,
`was doing the same for another wireless
`standard [3]. At the time, many countries
`had recently opened up some 5 GHz
`spectrum for unlicensed (but still regulated)
`use. This spectrum was less “RF dense” than
`the 2.4 GHz spectrum [2], which includes
`other interferors such as garage door openers,
`cordless telephones, microwave ovens, and
`baby monitors. With less interference high
`bandwidth available, another, higher capacity
`standard could be constructed.
`The ultimate 802.11a standard
`included a 54 Mbps data rate using the more-
`complex orthogonal frequency division
`multiplexing (OFDM) waveforms (Appendix
`C), and operated in the 5 GHz range, set
`aside for
`the Unlicensed National
`Information Infrastructure (U-NII) usage [1].
`While the standard was completed and
`adopted in 1999,
` the more-complex
`equipment did not begin shipping until 2001.
`It is significant to note that while data
`rates were increased by both 802.11a and
`802.11b, that both only increased data
`bandwidth within RF applications. The IR
`specification, while still valid, was left
`behind with 1-2 Mbps maximum throughput,
`while the RF environment has continued to
`
`Page 3 of 33
`
`

`

`increase in data throughput throughout the
`development of the 802.11 standard.
`Not long after 802.11a was adopted,
`IEEE immediately recognized that the
`OFDM waveform could benefit the 802.11b
`standard. Increased data rates would even
`support
` bandwidth-hungry multimedia
`applications as the demand for these
`applications grew. In July 2000, the 802.11
`Task Force G was assigned the task of
`overlaying the OFDM waveform on the 2.4
`GHz spectrum, producing a new standard that
`was fully backward-compatible with the
`802.11b standard. This was no easy feat, but
`after 3 years the new standard was ratified.
`The key was in requiring all 802.11g
`equipment to support complimentary code
`key (CCK) modulation as a fall-back
`mechanism to ensure 802.11b compatibility.
`This fall-back has significant impacts on the
`total data rate of the network, but allows
`mixed 802.11b-802.11g network equipment
`to coexist on the same topology. As 802.11b
`equipment is phased out and replaced with
`802.11g equipment, users can seamlessly
`upgrade their network without upgrading the
`entire infrastructure. In June 2003, the
`amendment was ratified.
`As 802.11 enjoyed widespread
`adoption by home and business users alike,
`more scrutiny was placed on security. The
`initial standard included a MAC-level
`security protocol called WEP, Wired
`Equivalent Privacy [6]. WEP was intended
`to provide confidentiality and authentication
`for connecting users. By using a very small
`subset (up to four) of pre-shared keys, a user
`could identify itself as a valid user to an
`access point, and encrypt every packet of the
`session [7]. The intent of WEP was not to be
`a bulletproof security protocol for wireless
`networks, but to provide reasonable session
`privacy, like that which could be expected
`from a direct-connection (wired) connection.
`
` WEP was rife with
`Unfortunately,
`vulnerabilities (Appendix D), and continued
`bad press caused 802.11 users to demand
`better security [7]. Another task group, Task
`Group I, was set up to address MAC-level
`security in an effort to address security
`problems with WEP [6].
`The Task Group model, however,
`took too long to address the concerns of
`equipment manufacturers.
` The Wi-Fi
`Alliance began implementing additional
`security enhancements to provide customers
`with additional security features. Many
`members of the Wi-Fi Alliance were part of
`Task Group I, and these enhancements would
`be seen as part of the final 802.11i
`amendment.
` These original security
`implementations, labeled Wireless Protected
`Access included many enhancements to
`address the weaknesses of WEP, including
`the use of extended initialization vectors (IV)
`(56-bits), rotating initialization vectors, more
`robust integrity checks, and protection
`against replay/redirection attacks [6].
`In June 2004, the 802.11i amendment
`was ratified. The security enhancements in it
`became known as WPA2, Wireless Protected
`Access v2. It was largely a mirror of the
`WPA enhancements from the Wi-Fi Alliance,
`with some small,
` but
` significant,
`improvements. First, it incorporated the use
`of the Advanced Encryption Standard for
`encrypting and protecting data [8]. The AES
`was selected/adopted by the National
`Institute of Standards and Technology
`(NIST) in November 2001, and was not
`available when WEP was being designed
`nearly 10 years earlier. Next, enhanced
`integrity checks leveraging the AES CCMP
`(counter mode with cipher block chaining
`with message authentication code protocol, a
`recursive acronym) provides additional
`authentication. 802.11i also supports several
`implementations
` of
` using external
`
`4
`
`Page 4 of 33
`
`

`

`  
`     
`      3  =
`<    7888
`/,00)0..., 
` '# 
 

%
`/,00 %
` /,003%
` /,00%
` /,00%
`/,00 %/,00%/,00 %/,002%< 
`
` 
`
`
`
`    @7888
`/,00)-, 
` 9       
`


`
` $ %  
`<
` 
`#3    %

` #
`
`  
 3       


`  
`  
`       #     # 
`  3  
`#
`
`#/,00< 
`:';  A.B,#
`
`<    
`
`    
  
`#  <   #  


`<      C ,,%     =  
`  < 
`#
`
D%    <   

  < 
`  # %  
 % 
`  
`  
`    
`
`  ,
`
`
`  
` 

`The 802.11 standard, while a single standard,
`has many manifestations that allow wireless
`network access. It covers everything from
`how synchronization should be performed, to
`how infrared (IR) wireless networks should
`be configured, to spread spectrum chip rates
`for different applications. This paper cannot
`touch on all portions of the standard. Indeed,
`the 1200+ page standard (not including its
`many
`
`several-hundred
`
`page
`amendments/enhancements) will require this
`paper leave many topics unexplored, and
`many, many more topics completely
`undiscovered.
`
`authentication mechanisms, including 802.1X
`authentications and/or RADIUS [8].
`Meanwhile, the IEEE was going
`through another exercise to increase wireless
`data rates. Recognizing the seemingly
`unquenchable bandwidth thirst of users, the
`IEEE set out to exceed 54 Mbps as an upper
`data rate limit by creating Task Group n
`(TGn) in September 2003 [3]. By using
`multiple-input
` multiple-output
` (MIMO)
`transmitting methods, 802.11n would allow
`multiple data streams, separated spatially, to
`increase the overall data rate [9]. This access
`method, as with 802.11g, is backward-
`compatible with previous 2.4 GHz
`implementations of 802.11, as well as
`802.11a in the 5 GHz and 3.7 GHz spectra
`(802.11a was extended to 3.7 GHz by the
`802.11y amendment in Nov 2008) [9].
`While 2.4 GHz implementations
`include the largest number of users
`worldwide, unfortunately the 2.4 GHz
`spectrum is heavy on interference. While
`MIMO can provide additional and higher
`data rates, and protection against some
`interferences (Appendix E), there is a limit as
`to how much data can be transferred in the
`congested spectrum.
`
` The 802.11n
`amendment, ratified in September 2009, can
`support data rates up to 600 Mbps, but in its
`current implementation, with the congestion
`in the 2.4 GHz spectrum, the maximum
`supported transmission rate is 104 Mbps.
`This is still a significant increase over the
`802.11g amendment, but leaves significant
`room for growth, should 802.11n be
`deployed in other RF environments. Indeed,
`as the amendment does not specify the exact
`spectrum, the largest performance gains will
`be realized in the 5 GHz and 3.7 GHz ranges,
`where significantly less interference is found.
`'
`%
`   (%    7888  3 
`
`
`      

#
`

`   =  
`%    
`   
 
`  
`
`
`  3    ,  
`
`5
`
`Page 5 of 33
`
`

`

`Evolution Timeline of 802.11 Standards
`
`1990
`
`1992
`
`1994
`
`1996
`
`1998
`
`2000
`
`2002
`
`2004
`
`Year Z|
`
`2006
`
`2008
`
`2010
`
`Terminated
`2012
`
`Initiated
`
`Ratified
`
`Core Standard
`
`IEEE Milestone
`
`802.11
`-¥- 802.11a
`-¥ 802.11b
`4 802.11¢
`> 802.11d
`+ 802.11e
`++ 802.11F
`
`-¥ 802.119
`- 802.11h
`> 802.11i
`
`+ 802.14)
`+ 802.11k
`-© 802.11n
`
`-4- 802.11
`+ 802.11r
`++ 802.115
`& 802.11u
`- 802.11v
`4 802.11w
`
`- 802.1 1y
`E 802.11z
`
`Page 6 of 33
`
` 
  
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`*
`
`
`
`
`
`
`
`
`!
`"
`
`#
`$
`
`%
`
`
`
`
`&
`'
`(
`
`  
`
`
`
`
`
` 

`
`   
`
`
`)
`
`6
`
`Page 6 of 33
`
`

`

`
` " 
`802.11 networks can operate in two basic
`modes: infrastructure and ad-hoc[2].
`Infrastructure:
` In infrastructure
`networks there are two entities: a station
`(STA) and an access point (AP). This mode
`is called the Infrastructure Basic Service Set,
`or just BSS. Access points provide wireless
`access to network resources for stations, as
`well
` as other services such as
`synchronization and channel selection. Many
`times, APs are gateways, and provide other
`services such as network address translation,
`dynamic host control protocol (DHCP), and
`other network services. While these services
`are outside the bounds of 802.11, they are
`critical to end-to-end usability of the network
`[2].
`
`')
`* 7 )
`<
`=% 
`
`   
` %  2   
`,     

`  
` 7   %
`
`7 , 
` 8    
`  
`
    
`
`      <  
`   
`%  < 
`
`
`#'
` 3  #
`

` 
`
`

`  3          
`,
`  
`< <
`=
`3> =
` 
`
`<%< 
`#
` ) 
` # %  
`    
`#$ 3  ,   9        
`      
`
`

`# /,00<
`=%   
`         
`#  /,00 

 
`
`AB,
`
`7
`
`AP
`
`ST
`A
`
`ST
`A
`
`ST
`A
`
`ST
`A
`
`ST
`A
`Independent (Ad-Hoc)
`Infrastructure
`  1
` 
  
`
`
`
`
`
`
` #$ 
`
`3    , EF< 
`<
`=   3    
`

 
` 
`#      ,     
`
 
`#
` ," %3   
`            
  3  
`  

` 
`
, "
`   
`
`  %<C

`
`
$D< #
`

` 3 
`     
`#
`    <
`=  A.B,   
`%       ,
` EF
  % 
`
`#  #)
`       
`
`       , 
` 
` % 
`   
`

F%  #% 

`

` 3


`
 
`      A0B,   '        
`< #
`
       %  <   
`


` 3

`AB,
`9    

`    
`    
`
  

     
`  
%  
`   7  3      
`, 
` 7888
`3    
` 
 
`
`3   #
`    3  9   :';
`  %<     3  ##
`
`, 
`  3  0  
`<    
`

`
 
` 
`      ,  EF    %
` 
` <   
`   
`3
`
`
`  
`
`#  
` 
`A0B,
`Since the IEEE has continued to provide
`backward-compatible amendments to the
`original standard, all the 2.4 GHz methods
`used by 802.11 for RF transmission are still
`valid [2]. That is, since no amendment
`nullifies a previous access method, all the
`
`Page 7 of 33
`
`

`

`previous methods are still legitimate
`waveforms and spread spectrum techniques.
`For a discussion of RF waveforms, see
`Appendices.
`
`Channel Number
`
`Japan
`
`Regulatory Body (Region)
`FCC
`IC
`ETSI
`(Canada)
`(Europe)
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`X
`
`Frequenc
`y (GHz)
`1
`2.412
`X
`2
`2.417
`X
`3
`2.422
`X
`4
`2.427
`X
`5
`2.432
`X
`6
`2.437
`X
`7
`2.442
`X
`8
`2.447
`X
`9
`2.452
`X
`10
`2.457
`X
`11
`2.462
`X
`12
`2.467
`X
`13
`2.472
`X
`14
`2.484
`X
`Table 1: 24. GHz Channel Allocations by
`Region ([reproduction, 12]
`
`802.11 – Allows for frequency
`hopping spread spectrum (FHSS) and direct
`sequence spread spectrum (DSSS) to provide
`interference mitigation and binary phase shift
`keying (BPSK) or quadrature phase shift
`keying (QPSK) to provide 1 or 2 Mbps data
`rates, respectively.
` Since all future
`amendments would be backward-compatible,
`all future methods support these access rates
`[9].
`
`802.11b – Uses Direct Sequence
`Spread Spectrum (DSSS) with overlapping
`channels to provide interference mitigation,
`and moves away from FHSS for higher data
`rates. 802.11b also uses Differential QPSK
`(DQPSK) or Differential BPSK (DBPSK) to
`provide 11 Mbps or 5.5 Mbps data rates,
`respectively [2].
`
`8
`
`/,00  @    6
`
`   ">
`  
`   $   C6"D  
` 
 
` # 
` !3   ,
` ##          
`  
` 
` ## 

` 
`  
%     G
`   0G  H'  CH    '
 
`
` 
`D,    3    
`<  
`<   
`
`

` 
`  
    
`  < 
` 

`    
`  
`
    # 
`   #
`/,00 , 

`  
`   <     /,003   
` 
`C 3%3
`<DA0B,
`
`Data Rate (Mbps)
`54
`48
`36
`24
`18
`12
`11
`9
`6
`5.5
`2
`1
`
`Transmission Type
`OFDM
`OFDM
`OFDM
`OFDM
`OFDM
`OFDM
`DSSS
`OFDM
`OFDM
`DSSS
`DSSS
`DSSS
`
`Modulation Scheme
`64 QAM
`64 QAM
`16 QAM
`16 QAM
`QPSK1
`QPSK
`CCK2
`BPSK3
`BPSK
`CCK
`QPSK
`BPSK
`
`
 !! 

` " 
` 
`#$

  %
`&!'(
`
`/,00  @    6"  
` 
 
` #%  <     
 ) %
`
 )
`  C76D   

`  
`
`  
`    ,"
` 

`
`76%    ' $  8, 
` 76   
`  #    
` )
 
`>  #
`
`/,00, 
`#
   

`
`    
`   
`      
  
`      
`       
`#    /,00
` 
`
, 
` 5%    /,003+ 
`       EF%  <   0  EF   ,
` 3  (  
`<    <        <
`76     <    
`      
`C
     3<   

` 
`#
`
`   
3
`D      EF   
`< A0!B,
`
`Page 8 of 33
`
`

`

`/,00%  
`<%  
`  3
`  
` EF 
`
`  
$


`  
` 
`#(3, 3
`<
`   #  C
`3  D      %
`<    EF     <     ,
`#
` %   , EF
  
`
`          <   
`       =
`    
`#           ,   7  
`     
` 
`%     
`  (
`      C
`)
`   D    
`'
    /,00        ,  EF
`C  0% G%  00D,  7%   
` %<    
`3
`  

## % 3  
`
`  
` 3
`

,A0!B
`
`Spatial
`Streams
`
`Modulation
`Scheme
`
`1
`1
`1
`1
`1
`1
`1
`1
`2
`2
`2
`2
`2
`2
`2
`2
`
`BPSK
`QPSK
`QPSK
`16-QAM
`16-QAM
`64-QAM
`64-QAM
`64-QAM
`BPSK
`QPSK
`QPSK
`16-QAM
`16-QAM
`64-QAM
`64-QAM
`64-QAM
`
` Rate
`Data
`(Mbps)
`(GI=800ns)
`6.5
`13
`19.5
`26
`39
`52
`58.5
`65
`13
`26
`39
`52
`78
`104
`117
`130
`
` Rate
`Data
`(Mbps)
`(GI=400ns)
`7.2
`14.4
`21.7
`28.9
`43.3
`57.8
`65
`72.2
`14.4
`28
`42.8
`57.8
`86.7
`115.6
`130
`144.4
`
`
) !!
`

` " 
` *$ 
`+#$

`
`,$%
`&!-(
`
`This channel allocation is unfortunate,
`but all is not lost for 802.11n. First, the
`standard includes mechanisms to allow
`Access Points and Stations to identify when
`40 MHz channel usage is practical, allowing
`maximum throughput when feasible, but
`being able to step down to 20 MHz channel
`allocation when necessary. In many ways,
`
`9
`
`this is just flow control for frequency division
`multiplexing. This method protects legacy
`802.11b/g networks, as well as other 2.4 GHz
`transmitters, like Bluetooth [16].
`Another method is for the 802.11n
`station to announce on both 20 MHz channel
`allocations that all legacy (non-high
`throughput) network equipment should leave
`the channel open for some period of time,
`and then broadcast at the full data rate on
`both 20 MHz channels (providing 40 MHz
`channel allocation) for the specified period of
`time [16].
`' 
` %  /,00     
`   #
`
`/,00 ,      /,00 
`       !
` EF    %      
 
` 
`  
` ##%     
` 3(   
`EF    
`  <     /,00
`3
`           F   
$
F  
` 
`
` ,   "

`%     
`    #
` < %
`
` 
` 
`  =
`
`
`A0GB,
`
`
`%"   
`
` =   %
   
`
`        
  #
`  /,00     
` ,9 

`/,$<
`=  
`
  < 
` 
`
`
`C5'+5D%  /,00        
`
     <   
` 
`  
`  
`C5'+5'DABC' $ D,  
=
`
`
      
` 
`  
`     
`< 
`<
`3
`  
`
`
 , 9 
` 

`
#
`   
` %
`<%
`  

`
`
$, " % 

`
`3
`  %
` 

`
`
`  
`
`     
` 
`,   ' 
` %      
`)
`   I   
`  
`3
,J  AB   7   
`  %<
` 
` 3
`    
`
`
    
` %  3    
`    
`
`
`
` %    <
`   
`    
`
` 
`?  3
`    @  
`      
`
`
  

`
C 
`
`

`D 
`
`Page 9 of 33
`
`

`

`     
 
` 
`," 
`#
`      
`
`# 
`
`
`3
,
`
`STA
`1
`
`AP
`
`STA
`2
`
` 
`
`0
` 
`  ,
`
`  
`./"%(
`
` 
`
`
` 
`  ,
`
`
`&
`     
`802.11a – A 5 GHz operating frequency
`allowing communication up to 54 Mbps
`using an OFDM waveform [2].
` This
`standard, with its high bandwidth, operating
`in the reasonably unused 5 GHz frequency
`band was expected to be the workhorse for
`business and office applications. While it did
`find some success in this arena, its high
`operating frequency was readily absorbed by
`physical impediments such as walls, floors,
`and ceilings, significantly decreasing its
`effective range. Also, the increase in the
`inexpensive 802.11b hardware made it
`difficult to justify the the purchase and
`support of the more expensive 802.11a
`equipment. Many applications opted for the
`802.11b (see below) standard , with lower
`bandwidth, cheaper hardware costs, and
`typically further operating ranges.
`802.11b – A 2.4 GHz operating frequency
`(unlicensed ISM), communicating up to 11
`Mbps using a Complimentary Code Keying
`(CCK) broadcast.
` This standard was
`expected to be adopted by private individuals
`and small operating environments due to its
`inexpensive production costs and relatively
`convenient
`
`configuration
`
`options.
`
`Unfortunately, the unlicensed ISM band at
`2.4 GHz is a “crowded” spectrum, and there
`are plenty of interference producing products
`on the market, to include microwaves,
`portable phones (now, almost completely
`digital, and nearly defunct), and Bluetooth
`headsets.
`802.11c – Network bridging procedures for
`compatibility with other 802 networks
`(specifically 802.1d).
`802.11d – Compatibility and conformance
`extensions for transmitter operation outside
`of the typical political subdivisions of the
`802.11 standard.
` This effectively is a
`standard that allows a transmitter to roam
`between regions
`that
` observe/enforce
`different effective spectra for 802.11
`transmitters [17].
`802.11e – Quality of Service (QoS) functions
`for multi-application support. With these
`extensions, 802.11 is able to support many
`delay-sensitive applications which might
`otherwise suffer adverse effects of not having
`QoS, such as real-time video or voice over IP
`(VoIP) [3].
`802.11f – Inter-Access Point protocol used
`for managing the handoff of a user between
`access points in an 802.11 network. This
`specification was withdrawn in Feb 2006 [3].
`802.11g – A 2.4 GHz operating frequency
`(unlicensed ISM) , communication up to 54
`Mbps using a OFMD broadcast, and fully
`backward-compatible with 802.11b. This
`specification allows a significant increase in
`network throughput for the 2.4 GHz range,
`and when coupled with its backward-
`compatible feature and inexpensive hardware
`has lead to a global adoption as the de-facto
`preferred wireless network standard for
`
`10
`
`Page 10 of 33
`
`

`

`“typical” computer applications [14].
`802.11h – Extensions to the 5GHz broadcast
`of 802.11a that address mitigating issues
`from interference on the 5 GHz spectrum
`from other applications such as radar and
`satellite broadcasts, including power control
`and dynamic frequency selection [18].
`802.11i – Security enhancements (WPA2) to
`address the shortcomings of previous security
`protocols (WEP). This standard includes
`support for robust encryption by including
`the AES, and more robust authentication [6].
`802.11j – Broadcast standard to allow 802.11
`to be formalized in Japan, where broadcast
`requirements only allow 802.11 to operate in
`the 4.5-5 GHz spectrum [19].
`802.11k – Radio resource measurement for
`802.11 networks, allowing mobile stations to
`dynamically identify which access points
`(APs) within range will provide the best
`network performance, based on more than
`simply received signal strength, but on a
`complete report from each AP of its current
`network utilization, availability and received
`signal strength [20].
`802.11n – The incorporation of multiple
`input multiple output (MIMO) and increased
`bandwidth channels to the current broadcast
`sets (802.11g and 802.11a), increasing the
`total data throughput [9]. Contrary to current
`marketing, 802.11n is not a replacement to
`the 802.11g standard, but is a complementary
`performance increase that allows the use of
`multiple (usually two for current commercial
`availability) 802.11g broadcasts to share the
`same spectrum, thus increasing (doubling in
`the case of two data streams) the effective
`802.11g data throughput [15]. The same
`technique can be applied to 802.11a in the 5
`
`GHz spectrum. The current 802.11n standard
`is designed to support up to 600 Mbps
`throughput [15].
`802.11p – Extensions for vehicular (fast-
`moving) 802.11 access and handoffs, called
`Wireless Access for
`the V

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket