ď - Google Sites

Forth Edition
Louis Frenzel
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Wireless Technologies
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.








21-1: Wireless LAN
21-2: PANs and Bluetooth
21-3: ZigBee and Mesh Wireless Networks
21-4: WiMAX and Metropolitan-Area
Networks
21-5: Infrared Wireless
21-6: Radio-Frequency Identification and
Near-Field Communications
21-7: Ultra Wideband Wireless
21-8 Additional Wireless Applications
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



In addition to cell phones, there are many
more wireless systems and applications in
common use today.
These are primarily short-range systems that
have a range of a few inches up to several
miles depending upon the application.
Each of these popular systems is defined by a
specific industry standard and is identified
with one or a few well-known applications.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Figure 21-2: Types of WLANs. (a) Access point extension to a wired LAN. (b) Public
access point via an Internet service provider (ISP).
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.




Local-area networks (LANs) within a company or
an organization are still interconnected mainly
by CAT5 or CAT6 twisted pair.
Wireless extensions and even complete wireless
LANs have become more common now that
reliable, low-cost wireless modems are available.
Wireless is a great way to expand an existing
network.
What makes the wireless LAN so appealing is
that it offers flexibility, convenience, and lower
costs.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



Wireless access points (APs) are available not
only within offices, but also in restaurants,
coffee shops, airports, hotels, convention
centers, and other public places.
Access points are more commonly known as
“hot spots.” Some cities are installing municipal
hot spots.
Anyone with a laptop equipped with a LAN
modem interface can link up to the AP and
access his or her e-mail or the Internet. There are
hundreds of thousands of hot spots around the
world.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



Another growing use of wireless LANs is in the
implementation of home networks.
Installing a wireless LAN is fast, easy, and very
inexpensive. A special box called a residential
gateway or wireless router connects to the
cable TV or DSL and serves as the access point.
This gateway or router uses a software approach
called network address translation (NAT) to
make it appear as if each networked PC has its
own Internet address, when in reality only the
one associated with the incoming broadband
line is used.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Hardware of Wireless LANs
 The hardware devices in a wireless LAN are the access
point or the gateway/router and the radio modems in
the PCs.
 The access point is a box containing a transceiver that
interfaces to an existing LAN by way of CAT5/6 wiring.
 It gets its dc operating power via the twisted-pair
cabling.
 The IEEE 802.3af standard related to furnishing dc
power over the network cable is referred to as Power
over Ethernet (PoE).
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Hardware of Wireless LANs
 In a home network, the gateway or router is
designed to attach to the DSL or cable TV modem
with CAT5/6 cable.
 It often attaches to one of the PCs in the home
network by cable.
 The other PCs link to the gateway/router
wirelessly.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Wireless LAN Standards
 One standard for wireless LANs has emerged as the




most flexible, affordable, and reliable.
Known as the IEEE 802.11 standard, it is available in
multiple forms for different needs.
The earliest useful and most widely adopted version
of the 802.11 standard is 802.11b.
It operates in 11 channels in the 2.4-GHz unlicensed
ISM band.
This band extends from 2.4 to 2.4835 MHz for a total
bandwidth of 83.5 MHz.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Wireless LAN Standards
 The access method is direct sequence spread
spectrum (DSSS) so that multiple signals may share
the same band.
 The 802.11b standard specifies a maximum data rate
to 11 Mbps. This rate is achieved only under the most
favorable path conditions.
 Increasing range or noise causes the rate to
automatically drop off to 5.5, 2, or 1 Mbps, which
helps ensure a reliable connection despite the lower
speed.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Wireless LAN Standards: IEEE 802.11n
 The newest standard is the 802.11n version.
 It uses the 2.4-GHz band and OFDM.
 A primary feature of this standard is the use of
multiple-input multiple-output (MIMO) antenna
systems to improve reliability of the link.
 APs for 802.11n use two or more transmit antennas
and three or more receive antennas. The wireless
nodes use a similar arrangement. In each case
multiple transceivers are required for the AP and the
node.
 MIMO systems reduce multipath problems and
extend the range and reliability of the wireless link.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Wireless LAN Standards: Wireless Security
 The 802.11 standard also includes provision for
encryption to protect the privacy of wireless users.
 Since radio signals can literally be picked up by
anyone with an appropriate receiver, those concerned
about privacy and security should use the encryption
feature built into the system.
 The basic security protocol is called Wired Equivalent
Privacy (WEP) and uses the RC4 encryption standard
and authentication.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Wireless LAN Standards: Wireless Security
 WEP may be turned off or on by the user. It does
provide a basic level of security; however, WEP has
been cracked by hackers and is not totally secure from
the most high-tech data thieves.
 Two stronger encryption standards called Wi-Fi
Protected Access (WPA) and WPA2 are also available
in several forms to further boost the encryption
process.
 The IEEE also has a security standard called 802.11i
that provides the ultimate in protection.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.




A personal-area network (PAN) is a very
small network that is created informally or on
an ad hoc basis.
A PAN typically involves two or three nodes,
but some systems permit many nodes to be
connected in a small area.
PANs can be wired, but today all are wireless.
The most popular wireless PAN system is
Bluetooth, a standard developed by the cell
phone company Ericsson for use as a cable
replacement.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



Bluetooth is a digital radio standard that uses
frequency-hopping spread spectrum (FHSS)
in the unlicensed 2.4-GHz ISM band.
Three levels of transmission power have been
defined, depending upon the application.
Bluetooth transceivers are available as singlechip transceivers that interface to the device
to be part of a PAN.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.




Bluetooth transceivers send out search signals
and then listen for nearby Bluetooth-equipped
devices.
If another Bluetooth device comes into range,
the two Bluetooth devices automatically
interconnect and exchange data.
These devices form what is called a piconet, the
linking of one Bluetooth device that serves as a
master controller to up to seven other Bluetooth
slave devices.
Bluetooth devices can also link to other piconets
to establish larger scatternets.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Figure 21-3: Bluetooth piconet with scatternet link. Up to seven devices can be actively
connected.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



The main applications for Bluetooth are cordless
headsets for cell phones, wireless connections
between PCs, or laptop computers and PDAs.
Bluetooth applications include: laptop
connections at meetings, wireless printer-to-PC
connections, laptop-to-cell phone connections,
wireless audio headsets, and wireless digital
camera-to-TV set connections.
The Bluetooth standard is maintained by the
Bluetooth Special Interest Group (SIG) and
supported by more than 2000 manufacturers.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.




ZigBee is the commercial name for another
PAN network technology based on the IEEE
802.15.4 wireless standard.
Like Bluetooth, it is a short-range technology
with networking capability.
It was designed primarily for commercial,
industrial, and home monitoring and control
applications.
ZigBee is designed to operate in the licensefree spectrum.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.


There are three basic bands and versions (below).
Data rates are low, but most applications are
simply transmitting sensor data or making simple
on/off operations.
Frequency
Band
Number of
Channels
Modulation
Max. Data Rate, Kbps
868 MHz
(Europe)
1
DSSS/BPSK
20
915 MHz
1
DSSS/BPSK
40
2.4 GHz
16
DSSS/O-QPSK
250
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



ZigBee’s virtue is its versatile networking
capability.
The standard supports three topologies: star,
mesh, and cluster tree. The most commonly
used are the star and mesh.
These network topologies are made up of
three types of ZigBee nodes:
 ZigBee coordinator (ZC)
 ZigBee router (ZR)
 ZigBee end device (ZED).
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.




The ZC initiates a network formation. There is
only one ZC per network.
The ZR serves as monitor or control device
that observes a sensor or initiates off/on
operations on some end device.
It also serves as a router as it can receive data
from other nodes and retransmit it to other
nodes.
The ZED is simply an end monitor or control
device that only receives data or transmits it.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Figure 21-4: Most common
ZigBee network topologies.
(a) Star. (b) Mesh.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.


In the mesh topology, most of the nodes are
ZRs that can serve as monitor and control
points and can also repeat or route data to
and from other nodes.
The mesh topology can greatly extend the
range of the network, and enhance its
network reliability or robustness.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.





ZigBee can address a wide range of wireless needs.
It was designed primarily for monitoring and control.
Monitoring refers to looking at a wide range of
physical conditions, especially temperature, humidity,
pressure, the presence of light, speed, and position
information.
Control refers to the sending of command signals to
initiate some action.
Typically commands are used to turn things off and
on, such as lights, motors, solenoids, relays, and other
devices.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.

Popular applications of ZigBee include:
 Monitoring and controlling lights;
 Heating, ventilating, and air conditioning (HVAC)






systems in large buildings;
Industrial monitoring and control in factories,
chemical plants, and manufacturing operations.
Automatic electric and gas meter reading.
Medical uses, such as wireless patient monitoring.
Automotive sensor systems.
Military battlefield monitoring.
Consumer applications such as home monitoring and
control, remote control of other objects, and security.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



Metropolitan-area networks (MANs) are
primarily fiber-optic networks, most often
SONET rings, that connect enterprise LANs
to WANs or the Internet backbone.
Another typical MAN is a local cable TV
network.
A new wireless contender for metropolitanarea networking is known as WiMAX. It is
defined by the IEEE 802.16 standard.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



It was developed to provide a wireless
alternative to consumers for broadband
Internet connections.
These connections are now dominated by
cable TV and DSL, but with the new WiMAX
standard, wireless Internet service providers
(WISPs) may soon be offering wireless
broadband connections.
The primary standard is known as IEEE
802.16-2004 or 802.16d.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



Perhaps the most widespread wireless
system uses infrared (IR) light for shortdistance data communication.
The most widely used is the wireless remote
control on TV sets, VCRs, and DVD players
and on most audio CD stereo systems.
Infrared has also been used for wireless LANs
and PANs.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
TV Remote Control
 Almost every TV set sold these days, regardless of
size or cost, has a wireless remote control.
 Other consumer electronic products have remote
controls including VCRs, cable TV converters, CD
and DVD players, stereo audio systems, and some
ordinary radios.
 Generic remote controls are available to hook up
to any device that you wish to control remotely.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
TV Remote Control
 All remote control devices work on the same
principle.
 A small handheld battery-powered unit transmits
a serial digital code via an IR beam to a receiver
that decodes it and carries out the specific action
defined by the code.
 A TV remote control is one of the more
sophisticated of these controls, for it requires
many codes to perform volume control, channel
selection, and other functions.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
TV Remote Control
 The keyboard is a matrix of single-pole single-throw
(SPST) pushbuttons.
 The row and column connections are made to a
keyboard encoder circuit inside the IC.
 When a key is depressed, the pulses from one of the
column outputs are connected to one of the row
inputs.
 The encoder circuit converts this input to a unique
binary code representing a number for channel
selection or some function such as volume control.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
TV Remote Control
 The serial output is generated by the shift register as




data is shifted out.
A standard nonreturn to zero (NRZ) serial code is
generated and applied to a serial encoder.
The serial bit stream turns a higher-frequency pulse
source off and on.
The pulses modulate the IR light source by turning it
off and on.
The IR source is usually one or more IR LEDs. Two or
more LEDs are used to ensure a sufficient level of IR
radiation to the receiver in the TV set.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Figure 21-5: IR TV remote control transmitter.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
TV Remote Control
 In an IR receiver, the PIN IR photodiode is mounted on




the front of the TV set, where it picks up the IR signal
from the transmitter.
Two or more high-gain amplifiers boost the signal
level.
The incoming pulses are detected, shaped, and
converted to the original serial data train.
This serial data is read by the control microcomputer
that is usually part of the TV receiver.
The microcontroller inputs and decodes the incoming
signal and issues output control signals to all other
circuits.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
IR PANs
 Besides remote control, the primary application
for IR data communication is in short-distance
links between computers, computers and printers,
or ad hoc PANs.
 Distance links are typically up to 1 m, however
under some conditions, the distance can be
extended to 9 m.
 There must be a clear line of sight between the
transmitter and receiver.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Figure 21-8: Common applications for IR data communication.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
IR PANs
 An IR transceiver connects to interface circuitry in
the PC or PDA.
 The interface is typically a small embedded
controller inside the computer or PDA.
 The encoder puts the serial digital data from the
PC or PDA into the proper format for
transmission.
 A high-current bipolar transistor or MOSFET
drives one or more IR LEDs.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
IR PANs
 The receiver consists of the PIN diode that picks up
the IR light from a nearby transmitter.
 The signal is amplified and shaped and then sent to
the decoder, which recovers the original data.
 Although many laptops and PDAs have a built-in
transceiver, their use is often restricted by this need
for line of sight.
 A better arrangement is a transceiver dongle which
consists of a cable attached to the interface in the PC
or PDA and to the movable dongle containing the
LED and PIN diode.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Figure 21-8: IR wireless LAN transceiver.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



Another growing wireless technique is radio
frequency identification (RFID).
RFID uses thin, inexpensive tags or labels
containing passive radio circuits that can be
queried by a remote wireless interrogation
unit.
The tags are attached to any item that is to
be monitored, tracked, accessed, located, or
otherwise identified.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
RFID tags are widely used in inventory control,
container and parcel shipping, capital equipment
and other asset management, baggage
handling, and manufacturing and production
line tracking.
 Other applications for RFID tags are personnel
security checking and access, animal tracking,
and theft prevention, automatic toll collection
and parking access for vehicles.
 As the technology develops, prices drop and
new applications are being discovered.

Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



The tag is a very thin label-like device into
which is embedded a simple passive singlechip radio transceiver and antenna.
The chip also contains a memory that stores a
digital ID code unique to the tagged item.
For the item to be identified, it must pass by
the interrogation or reader unit, or the reader
must physically go to a location near the
item.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



The reader unit sends out a radio signal that
may travel from a few inches up to no more
than a hundred feet or so.
The radio signal is strong enough to activate
the tag.
The tag rectifies and filters the RF signal into
direct current that operates the transceiver.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.


This activates a low-power transmitter that
sends a signal back to the interrogator unit
along with its embedded ID code.
The reader checks its attached computer,
where it notes the presence of the item and
may perform other processing tasks
associated with the application.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Figure 21-10: Basic concept and components of an RFID system.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Figure 21-12: RFID tag configurations.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.




The most recent new RFID standard is called Gen 2 for
second generation.
The standard is under the auspices of EPCGlobal, the
organization that also standardizes the Electronic
Product Code (EPC) used on all tagged items.
A key benefit of the new standard is that it is designed
to read multiple tags faster. Tag read rates as high as
1500 tags per second are possible.
The Gen 2 tags can operate reliably in an environment
with multiple readers transmitting and receiving
simultaneously.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Near-Field Communications
 One of the newest forms of wireless is a version of
RFID called near-field communications (NFC).
 It is an ultrashort-range wireless whose range is
rarely more than a few inches.
 It is a technology used in smart cards and cell
phones to pay for purchases or gain admittance to
some facilities.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.



Perhaps the newest and most unusual form of
wireless is known as ultrawideband (UWB)
wireless.
There are two basic forms of UWB: the original
version based on very narrow impulses, and the
newer kind based on OFDM.
The original UWB, also known as impulse,
baseband, or carrierless wireless, transmits data
in the form of very short pulses, typically less
than 1 ns.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Impulse UWB Hardware
 The UWB transmitter circuits use BPSK to generate




pulses which are applied directly to the antenna.
The receiver amplifies the incoming signal and then
applies it to a correlator consisting of a multiplier,
where it is multiplied by a stream of coded pulses
similar to those transmitted.
If the multiplier output exceeds a specific level, it is
considered to be detected and recovered.
The recognized signal is then demodulated into the
original data.
Broadband antennas are used for UWB.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Multiband OFDM UWB
 The newest form of UWB is called multiband OFDM or
MB-OFDM UWB.
 This form of UWB divides the lower end of the
assigned spectrum into three 528-MHz-wide
channels, extending from 3.168 to 4.952 GHz.
 Each band is designed to hold an OFDM data signal.
 There are 128 carriers per band: 100 carry the data; 12
are used as pilot carriers; the remaining ones serve as
guard bands.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Multiband OFDM UWB
 The signal is divided up among the carriers, and
each is modulated by BPSK or QPSK depending
on the data speed selected.
 The system permits a wide range of data rates
from about 53 to 480 Mbps.
 Implementation of an OFDM UWB transceiver is
just like that of any OFDM device.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Advantages and Disadvantages of UWB
 UWB offers many benefits to radar, imaging, and
communication applications:
▪ Superior resolution in radar and imaging.
▪ Immunity to multipath propagation effects.
▪ Higher data rates than are possible with other wireless
technologies.
▪ License-free operation
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Advantages and Disadvantages of UWB
 No interference to other signals using the same
frequency band. UWB signals appear as random noise
to conventional radios.
 Power-efficient. Extremely low-power operation.
Peak power levels are in the milliwatt region, and
average power in microwatts.
▪ This low power severely limits the range of operation.
 Simple circuitry, most of which can be integrated in
standard CMOS.
 Potentially low cost.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Primary Application of UWB
 The primary application of impulse UWB to date has




been in military radar.
UWB radar is used by fire, emergency, and police
personnel to see through walls and doors.
Medical versions permit body imaging for diagnosis.
Low-cost, short-range UWB radars that can be used in
cars and trucks for collision avoidance, automatic
braking, improved air bag deployment, and
suspension systems are under development.
Target markets for UWB include computer peripherals
and wirelessly connecting video equipment.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.