Wireless Applications and Effect on IFE Ken Brady Chief Design Engineer Thales Avionics
Wireless Topics for IFE Connectivity –PicoCell Service (voice and data) –Wireless Data (802.11b/g) Wireless IFE –AVOD Not Ready for World-Wide Deployment Content Delivery and Update
Wireless Technologies Voice Technologies Broadcast (Audio/Video) Technologies Data Technologies
Wireless Voice Technologies Designed for Human Voice –CDMA, TDMA, GSM Long Range (miles) Connection Based Service –Dedicated “channel” Adopting Packet Data Capability
Wireless Broadcast Technologies Digital Video Broadcast (DVB) DVB-S Satellite DVB-C Cable DVB-T Terrestrial TV DVB-H Handhelds Advanced TV Systems Committee (ATSC) Limited Back-Channel Capability
Wireless Data Technologies wPANs, wLANs, wWAN –wPAN: Wireless Personal Area Network –wLAN: Wireless Local Area Network –wWAN: Wireless Wide Area Network
wPAN Short Range Servicing your Personal Area –Printers, Mouse, Keyboard, Headsets Standards –Bluetooth / IEEE –ZigBee / IEEE –Wireless USB –Ultra Wideband (UWB) / WiMedia
wLAN Medium Range service (30-50 Meters) Applicable Standards –IEEE b (2.4 GHz) –IEEE g (2.4 GHz) –IEEE a (5 GHz) –IEEE n (2.4 & 5 GHz) –HIPERLAN, HIPERLAN/2
wWAN Long Range Service (3-18 Miles) New Data Network Technology –802.16, e Technology Migration –GSM EDGE, UMTS W-CDMA
Important Characteristics Operate over a Shared Media (air) –Multi-user Conflicts More Users, Less Bandwidth Conflicts with Other Systems in same Frequencies –Frequency Issues Licensed vs. Unlicensed Frequencies Adaptive, Best Effort –Adjust Speed to Maintain Error Rate –Error Threshold Based on Service Expectations
Wireless Std.Speed (theory)Speed (actual)RangeComment CDMA-RTT0.307 Mbps0.125 Mbps18 mi2G Phone CDMA-EV-DO2.4 Mbps0.600 Mbps18 mi3G Phone GSM GPRS0.080 Mbps0.014 Mbps16 mi2G Phone GSM EDGE0.474 Mbps0.034 Mbps16 mi3G Phone UMTS-w-CDMA14.4 Mbps0.75 Mbps18 mi4G Phone IEEE e70 Mbps10-20 Mbps3-5 miWiMax IEEE b11 Mbps6 Mbps30 metersWiFi IEEE a/g54 Mbps20 Mbps30 MetersWiFi IEEE n200 Mbps50-70 Mbps50 Meters Actual vs. Theoretical
Content Characteristics Size –Text Data, Short Subject, Feature Length –Encoding Standard (MPEG-1, MPEG-2, MPEG-4) Quantity –2 Hour Audio, 10s Hours Video, 100s Hours AVOD Refresh Rate –Daily, Weekly, Monthly, Quartly, Semi-permanent
Typical Content Profiles Content TypeLengthMPEG-1MPEG-2MPEG-4 Short Subject10 min132 MBytes282 MBytes90 MBytes TV Short23 min304 MBytes649 MBytes207 MBytes TV Long43 min568 MBytes1.2 GBytes387 MBytes Movie Short90 min1.2 GBytes2.5 GBytes810 MBytes Movie Long3 hours2.4 GBytes5 GBytes1.6 GBytes Small Load10 hours8 GBytes17 GBytes5.4 GBytes Medium Load30 hours24 GBytes51 GBytes16 GBytes Large Load100 hours79 GBytes169 GBytes54 GBytes
Wireless Loading Methods Incremental Content Loading –Program by Program –Restart Mid Transfer –Error Detection and Recovery Practical Loading Times –< 30 min – immediately available –< 180 min – long gate stay –< 1800 min – opportunistic, multisession loading during extended timeperiod
Wireless Loading Times (MPEG-2) TypeLenGPRSEDGEEVDOUMTS.16e.11b.11a/g.11n Short Sub10 m TV Short23 m TV Long43 m Movie Short90 m Movie Long3 h Small Load10 h Med Load30 h Large Load100 h Short Gate Visit Long Gate VisitImpractical Incremental Load over Month Single Content Load No Conflicts
Wireless Loading Times (MPEG-4) TypeLenGPRSEDGEEVDOUMTS.16e.11b.11a/g.11n Short Sub10 m TV Short23 m TV Long43 m Movie Short90 m Movie Long3 h Small Load10 h Med Load30 h Large Load100 h Short Gate Visit Long Gate VisitImpractical Incremental Load over Month Single Content Load No Conflicts
One Size Does Not Fit All Wireless Technology Is Effective at: –Supporting Small Content Updates –Supporting Larger Updates Spread Out in Time Not Needed Immediately Wireless Technology is Not Effective at: –Large Content Updates –Medium Size Updates Needed Immediately
Security Balancing Protection and Use –An item is most secure if no one can get to it (but it’s also not very useful)
Thwarting The Hacker –Can He Tell Its There Hide the Link to Reduces Detection –Can He Get It Authentication Used to Prevent Requests –Can He Make Sense of It Encryption Used to Make it Unusable –Can He Prevent My Proper Use Denial of Service Attach (DoS)
Security Methods Layers of Security in Wireless Networks –Hidden Identity, Reduced Announcement –Link Encryption (WEP, WPA, WPA2) –Authentication (RADIUS) –Content Encryption (WAEA0403) File Encryption Essence Encryption
Questions
The Alphabet Soup CDMA – Code Division Multiple Access W-CDMA – Wideband CDMA GSM – Global System for Mobile Communications EDGE – Enhanced Data Rates for GSM Evolution UMTS – Universal Mobile Telephone System EV-DO – Evolution Data Optimized (Evolution Data Only)