Home > Articles > Networking > Wireless/High Speed/Optical

Wireless Networks: Where We Are, Where We're Headed

Follow the evolution of the telecommunications industry from start to present. Learn about the principles of air-interface designs, the impact of the internet and cable television networks, and the standard development process that continues to shape the industry.
This chapter is from the book

1.1 Introduction

Technological innovations of engineers during the 20th century have brought a deep change in our lifestyle. Today, when we fly over a modern city at night we see the earth full of footprints made by engineers. The glowing lights remind us of the impact made by electrical engineers; the planes we fly in and the moving cars below remind us of the contributions of mechanical engineers; and high-rise buildings and complex roads remind us of what civil engineers have accomplished. From the eyes of an engineer, the glow of light, the movement of cars, and the complexity of civil infrastructure relates to the challenges in implementation, size of the market, and the impact of the technology on human life. There is, however, one industry whose infrastructure is not seen from the plane because it is mostly buried under the ground, but it is the most complex, it owns the largest market size, and it has enabled us to change our lifestyle by entering the information technology age. This industry is the telecommunications networking industry.

To have an intuitive understanding of the size of the telecommunications industry, it is good to know that the size of the budget of AT&T in the early 1980s, before its divestiture, was nearly the budget of the fifth largest economy of the world. AT&T was the largest telecommunications company in the world, and its core revenue at that time was generated from plain old telephone service (POTS) that was first introduced in 1867.

During the past two decades, the cellular telephone industry augmented the income of the prosperous voice-oriented POTS with the subscriber fees of about 1 billion cellular telephone users worldwide [EMC01]. Today the income of the wireless industry has already surpassed the income of the wired telephone industry, and this income is by far dominated by the revenue of cellular phones. In the mid 1990s, the data-oriented Internet brought the computer communications industry from the office to the home, which soon generated an income comparable to that of the voice-oriented POTS and wireless industry. Figure 1.1 illustrates the growth of the fixed (POTS), wireless, and Internet industries in recent years. At the time of this writing, the information exchange industry that includes the fixed and wireless telephone as well as Internet access industries has an annual revenue of a few trillion dollars and is by far the largest industry in the world. The wireless networking industry makes up a third of the revenue of the information industry, and its share of the overall market is growing. Today this income is dominated by revenue from cellular telephone applications. The future of this industry relies on broadband wireless Internet access that is expected to develop a large market for emerging multimedia applications.

Figure 1.1Figure 1.1 Worldwide growth of the fixed, wireless, and Internet communication industries in the past decade.

The purpose of this book is to provide the reader with a text for understanding the principles of wireless networks, which include the cellular telephone and wireless broadband access technologies. Wireless networking is a multidisciplinary technology. To understand this industry, we need to learn aspects of a number of disciplines to develop an intuitive feeling of how these disciplines interact with one another. To achieve this goal, we provide an overview of the important wireless standards and products, describe and classify their underlying technologies in a logical manner, give detailed examples of successful standards and products, and provide a vision of evolving technologies. In this first chapter, we provide an overview of the wireless industry and its path of evolution. The following five chapters describe principles of technologies that are used in wireless networks. The next three chapters discuss the details of wireless wide area networks (WANs), and the last four chapters describe short-range broadband and ad hoc wireless networks.

In this chapter we first provide an overview of the evolution of the wireless information network industry. We describe the meaning of a wireless network, and we give a summary of the important standards. Then we discuss the technical aspects and general structure of a wireless network. Finally we give an outline of the chapters of the book and how they relate to one another.

1.1.1 Information Network Infrastructure

An information network infrastructure interconnects telecommunication devices to provide them with means for exchanging information. Telecommunication devices are terminals allowing users to run applications that communicate with other terminals through the information network infrastructure. The basic elements of an information network infrastructure are a number of switches or routers that are connected via point-to-point links. Switches include fixed and variable rate voice-oriented circuit switches and routers that are low speed and high speed data-oriented packet switches. The point-to-point links include a variety of fiber, coaxial cable, twisted pair wires, and wireless connections.

To support transmission of voice, data, and video, several wired information network infrastructures have evolved throughout the past century. Wireless networks allow a mobile telecommunications terminal to access these wired information network infrastructures. At first glance it may appear that a wireless network is only an antenna site connected to one of the switches in the wired information infrastructure which enables a mobile terminal to be connected to the backbone network. In reality, in addition to the antenna site, a wireless network may also need to add its own mobility-aware switches and base station control devices to be able to support mobility when a mobile terminal changes its connection point to the network. Therefore, a wireless network has a fixed infrastructure with mobility-aware switches and point-to-point connections, similar to other wired infrastructures, as well as antenna sites and mobile terminals.

Example 1.1: PSTN and Cellular

Figure 1.2 shows the overall picture for the wired and wireless telephone services. The public switched telephone network (PSTN), designed to provide wired telephone services, is augmented by a wireless fixed infrastructure to support mobility of the mobile terminal that communicates with several base stations mounted over antenna posts. The PSTN infrastructure consists of switches, point-to-point connections, and computers used for operation and maintenance of the network. The fixed infrastructure of the cellular telephone service has its own mobility-aware switches, point-to-point connections, and other hardware and software elements that are needed for the mobile network operation and maintenance. A wireless telecommunications device, such as a cordless telephone, can connect to the PSTN infrastructure by replacing the wire attachment with radio transceivers. But, for the mobile terminal to change its point of contact (antennas) the PSTN switches must be able to support mobility. Switches in the PSTN infrastructure were not originally designed to support mobility. To solve this problem, the cellular telephone service providers add their own fixed infrastructure with mobility-aware switches. The fixed infrastructure of the cellular telephone service provider is an interface between the base stations and the PSTN infrastructure that implements the requirements to support mobility.

Figure 1.2Figure 1.2 PSTN and its extension to cellular telephone services.

In the same way a telephone service provider needs to add its own infrastructure to allow a mobile telephone to connect to the PSTN, a wireless data network provider needs its own infrastructure to support wireless Internet access.

Example 1.2: Wireless Internet

Figure 1.3 shows the traditional wired data infrastructure and the additional wireless data infrastructure that allow wireless connection to the Internet. The traditional data network consists of routers, point-to-point connections, and computers for operation and maintenance. The elements of a wireless network include mobile terminals, access points, mobility-aware routers, and point-to-point connections. This new infrastructure has to support all the functionalities needed to support mobility.

Figure 1.3Figure 1.3 Internet and its extension to wireless data services.

The difference between Examples 1 and 2 is that the wireless network in Figure 1.2 is a connection-based, voice-oriented network, and the wireless network in Figure 1.3 is a connectionless data-oriented network. A voice-oriented network needs a dialing process, and after the dialing, a certain quality of service (QoS) is guaranteed to the user during the communication session. In data-oriented networks there is no dialing, and terminals are always connected to the network, but a definite QoS is not guaranteed.

1.1.2 Overview of Existing Network Infrastructure

Because the existence of the wireless networks heavily depends on the wired infrastructure that they connect to, in this section we provide an overview of the important types of wired infrastructure. More details on the evolution of these wired backbone infrastructures are provided in Appendix 1A. The most commonly used wired infrastructures for wireless networks are the PSTN, the Internet, and hybrid fiber coax (HFC), originally designed for voice, data, and cable TV distribution applications, respectively. Figure 1.4 provides an overall picture of these three networks and how they relate to other wired and wireless networks.

Figure 1.4Figure 1.4 Backbone infrastructures: PSTN, Internet, and HFC.

The main sources of information transmitted through telecommunications devices are voice, data, and video. Voice and video are analog in nature, and data is digital. The dominant voice application is telephony, which is a bidirectional, symmetric, real-time conversation. To support telephony, telephone service providers have developed a network infrastructure that establishes a connection for a telephone call during the dialing process and disconnects it after completion of the conversation. As we saw in Example 1, this network is referred to as the PSTN. As shown in the top of Figure 1.4, the cellular telephone infrastructure provides a wireless access to the PSTN. Another network attached to the PSTN is the private branch exchange (PBX), which is a local telephone switch privately owned by companies. This private switch allows privacy and flexibility in providing additional services in an office environment. The PSTN physical connection to homes is a twisted-pair analog telephone wiring that is also used for broadband digital services. The core of the PSTN is a huge digital transmission system that allocates 64 kbps channels for each direction of a telephone conversation. Other network providers often lease the PSTN transmission facilities to interconnect their nodes.

The infrastructure developed for video applications is cable television, shown in the lower part of Figure 1.4. This network broadcasts wideband video signals to residential buildings. A cable goes from an end office to residential areas, and all users are provided service that is tapped from the same cable. The set-top boxes leased out by cable companies provide selectivity of channels depending on the charged rates. The end offices, where a group of distribution cables arrive, are connected to one another with fiber. For this reason, the cable TV network is also called hybrid fiber coax (HFC). More recently cable distribution has also been used for broadband home access to the Internet.

The data network infrastructure was developed for bursty applications and evolved into the Internet that supports Web access, email, file transfer, and telnet applications, as well as multimedia (voice, video, and data) sessions with a wide variety of session characteristics. The middle part of Figure 1.4 shows the Internet and its relation to other data networks. From the user's, point of view, the data-oriented networks are always connected, but they only use the transmission resources when a burst of information needs it. Sessions of popular data communications applications, such as Web browsing or file transfer protocol (FTP) are often asymmetric, and a short burst of upstream requests results in a downstream transmission of a large amount of data. Symmetric sessions such as Internet Protocol (IP) telephony over data networks are also becoming popular, providing an alternative to traditional telephony. The Internet access to home is a logical access that is physically implemented on other media such as cable TV wiring or telephone wiring. The distribution of the Internet in office areas is usually through local area networks (LANs). Wireless LANs (WLANs) in the offices are usually connected to the Internet through the LANs. These days all other private data networks, such as those used in the banks or airline reservation industries, are also connected to the Internet. As we saw in Example 2, the Internet is also the backbone for wireless data services.

1.1.3 Four Market Sectors for Wireless Applications

The market for wireless networks has evolved in four different segments that can be logically divided into two classes: voice-oriented market and data-oriented market. The voice-oriented market has evolved around wireless connections to the PSTN. These services further evolved into local and wide area markets. The local voice-oriented market is based on low-power, low-mobility devices with higher quality of voice, including cordless telephone, personal communication services (PCS), wireless PBX, and wireless telepoint. The wide area voice-oriented market evolved around cellular mobile telephone services that are using terminals with a higher power consumption, comprehensive coverage, and lower quality of voice. Figure 1.5(a) compares several features of these two sectors of the voice-oriented market. The wireless data-oriented market evolved around the Internet and computer communication network infrastructure. The data-oriented services are divided into broadband local and ad hoc and wide area mobile data markets. The wide area wireless data market provides for Internet access for mobile users. Local broadband and ad hoc networks include WLANs and wireless personal area networks (WPANs) which provide for high-speed Internet access, as well as evolving ad hoc wireless consumer products. Figure 1.5(b) illustrates several differences among the local- and wide-area wireless data networks.

Figure 1.5Figure 1.5 Wireless market sectors: (a) voice-oriented networks and (b) data-oriented networks.

1.1.4 Evolution of Voice-Oriented Wireless Networks

Table 1.1 shows a brief chronology of the evolution of voice-oriented wireless networks. The technology for frequency division multiple access (FDMA) analog cellular systems was developed at AT&T Bell Laboratories in the early 1970s. However, the first deployment of these systems took place in the Nordic countries as the Nordic Mobile Telephony (NMT) about a year earlier than the deployment of the Advanced Mobile Phone System (AMPS) in the United States. Because the United States is a large country, the frequency administration process was slower and it took a longer time for the deployment. The digital cellular networks started in Nordic countries with the formation of the Groupe Special Mobile standardization group that became the Global System for Mobile Communications (GSM). The GSM standard group was originally formed to address the international roaming, a serious problem for cellular operation in the European Union (EU) countries. The standardization group shortly decided to go for a new digital time division multiple access (TDMA) technology because it could allow integration of other services to expand the horizon of wireless applications [HAU94]. In the United States, however, the reason for migration to digital cellular was that the capacity of the analog systems in major metropolitan areas such as New York City and Los Angeles had reached its peak value, and there was a need for increasing it in the existing allocated bands. Although Nordic countries, led by Finland, have always maintained the highest rate of cellular telephone penetration, in the early days of this industry the United States was by far the largest market. By 1994, there were 41 million subscribers worldwide, 25 million of them in the United States. The need for higher capacity motivated the study of code division multiple access (CDMA) that was originally perceived to provide capacity that was orders of magnitude higher than other alternatives, such as analog band splitting or digital TDMA.

Table 1.1 History of Voice-Oriented Wireless Networks

Year

Event

Early 1970s

Exploration of first-generation mobile radio at Bell Labs

Late 1970s

First-generation cordless phones

1982

Exploration for second-generation digital cordless CT-2

1982

Deployment of first generation Nordic analog NMT

1983

Deployment of U.S. AMPS

1983

Exploration of the second-generation digital cellular GSM

1985

Exploration of wireless PBX, DECT

1988

Initiation for GSM development

1988

Initiation for IS-54 digital cellular

1988

Exploration of the QUALCOMM CDMA technology

1991

Deployment of GSM

1993

Deployment of PHS/PHP and DCS-1800

1993

Initiation for IS-95 standard for CDMA

1995

PCS band auction by FCC

1995

PACS finalized

1998

3G standardization started


While the debate between TDMA and CDMA was in progress in the United States, deployment of GSM technology started in the EC in the early 1990s. At the same time, developing countries started their planning for cellular telephone networks, and most of them adopted the GSM digital cellular technology over the legacy analog cellular. Soon after, GSM had penetrated into more than 100 different countries. An interesting phenomenon in the evolution of the cellular telephone industry was the unexpected rapid expansion of this industry in developing countries. In these countries the growth of the infrastructure for wired POTS was slower than the growing demand for new subscriptions, and there was always a long waiting time to acquire a telephone line. As a result, in most of these countries telephone subscriptions were sold on the black market at a price several times the actual value. Penetration of cellular telephones in these countries was much easier because people were already prepared for a higher price for telephone subscriptions, and the expansion of cellular networks occurred much faster than POTS.

In the beginning of the race between TDMA and CDMA, CDMA technology was deployed in only a few countries. Besides, experimentation had shown that the capacity improvement factor of CDMA was smaller than expected. In the mid 1990s when the first deployment of CDMA technology started in the United States, most companies were subsidizing the cost to stay in race with TDMA and analog alternatives. However, from day one, the quality of voice using CDMA was superior to that of TDMA systems installed in the United States. As a result, CDMA service providers under banners like "you cannot believe your ears" started marketing this technology in the United States, which soon became very popular with the users. Meanwhile, with the huge success of digital cellular all manufacturers worldwide started working on the next generation IMT-2000 wireless networks. Most of these manufacturers adopted wideband CDMA (W-CDMA) as the technology of choice for the IMT-2000, assuming that W-CDMA eases integration of services, provides better quality of voice, and supports higher capacity.

The local voice-oriented wireless applications started with the introduction of the cordless telephone, which appeared in the market in the late 1970s. A cordless telephone provides a wireless connection to replace the wire between the handset and the telephone set. The technology for implementation of a cordless telephone is similar to the technology used in walkie-talkies which had existed since the Second World War. The important feature of the cordless telephone was that as soon as it was introduced to the market it became a major commercial success, selling tens of millions of units and generating an income exceeding several billion dollars. The success of the cordless telephone encouraged further developments in this field. The first digital cordless telephone was CT-2, a standard developed in the United Kingdom in the early 1980s. The next generation of cordless telephones was the wireless PBX using the digital European cordless telephone (DECT) standard. Both CT-2 and DECT had minimal network infrastructures to go beyond the simple cordless telephone and cover a larger area and multiple applications. However, in spite of the huge success of the cordless telephone, neither CT-2 nor DECT has yet been considered a very commercially successful system. These local systems soon evolved into PCS, which was a complete system with its own infrastructure, very similar to the cellular mobile telephone.

In the technical communities of the early 1990s, PCS systems were differentiated from the cellular systems as presented in Figure 1.5(b). A PCS service was considered the next generation cordless telephone designed for residential areas, providing a variety of services beyond the cordless telephone. The first real deployment of PCS systems was the personal handy phone (PHP), later renamed as personal handy system (PHS), introduced in Japan in 1993. At that time, the technical differences between PCS services and cellular systems were perceived to be smaller cell size, better quality of speech, lower tariff, lesser power consumption, and lower mobility. However, from the user's point of view the terminals and services for PCS and cellular looked very similar; the only significant differences were marketing strategy and the way that they were introduced to the market. For instance, around the same time in the United Kingdom DCS-1800 services were introduced as PCS services. The DCS-1800 was using GSM technology at a higher frequency of 1,800 MHz, but it employed a different marketing strategy. The last PCS standard was the personal access communications system (PACS) in the United States, finalized in 1995. All together, none of the PCS standards became a major commercial success or a competitor with cellular services.

In 1995, the Federal Communications Commission (FCC) in the United States auctioned the frequency bands around 2 GHz as the PCS bands, but PCS-specific standards were not adopted for these frequencies. Eventually the name PCS started to appear only as a marketing pitch by some service providers for digital cellular services, in some cases not even operating at PCS bands. Although the more advanced and complex PCS services evolving from simple cordless telephone application did not succeed and were merged into the cellular telephone industry, the simple cordless telephone industry itself still remains active. In more recent years, the frequency of operation of cordless telephone products has shifted into unlicensed industrial, scientific, and medical (ISM) bands rather than the licensed PCS bands. Cordless telephones in the ISM bands can provide a more reliable link using spread spectrum technology.

1.1.5 Evolution of Data-Oriented Wireless Networks

Table 1.2 provides the chronology of data-oriented wireless networks. As shown in Figure 1.5(b), data-oriented wireless networks are divided into the wide area wireless data and local broadband and ad hoc networks. Wireless local networks support higher data rates and ad hoc operation for a lower number of users. The broadband wireless local networks are usually referred to as WLANs and the ad hoc local networks as WPANs. The concept of WLANs was first introduced around 1980. However, the first WLAN products were completed about 10 years later. Today a key feature of the local broadband and ad hoc networks is operation in the unlicensed bands. The first unlicensed bands were the ISM bands released in the United States in 1985. Later in 1994 and then in 1997, unlicensed PCS and U-NII (Unlicensed National Information Infrastructure) bands were also released in the United States. The major WLAN standard is the IEEE 802.11 started in the late 1980s and completed in 1997. The IEEE 802.11 and 802.11b operate in the ISM bands and the IEEE 802.11a in the U-NII bands. The competing European standard for WLANs is the HIgh PErformance Radio LAN (HIPERLAN). The HIPERLAN-1 was completed in 1997, and the HIPERLAN-2 is currently under development. In 1996, the wireless ATM working group of the ATM (Asynchronous Transfer Mode) Forum was formed to merge ATM technology with wideband local access. More recently, after the announcement of Bluetooth technology in 1998, WPANs have attracted tremendous attention. The coverage of WPANs is smaller than traditional WLANs, and they are intended for ad hoc environments to interconnect such personal equipment as the laptop, cell phone, and headset together. At the time of this writing, the IEEE 802.11 products generated around half a billion dollars per year. In the past couple of years, huge investments have been poured into WLAN and WPAN chip set developments all over the world. These investments expect sizable incomes from the possible incorporation of WLANs into the prosperous cellular industry and a large WPAN market for consumer products and home networking. A more complete history of WLANs and WPANs is provided in Chapter 10.

Table 1.2 History of Data-Oriented Wireless Networks

Date

Event

1979

Diffused infrared (IBM Rueschlikon Labs—Switzerland)

1980

Spread spectrum using SAW devices (HP Labs—California)

Early 1980s

Wireless modem (Data Radio)

1983

ARDIS (Motorola/IBM)

1985

SM bands for commercial spread spectrum applications

1986

Mobitex (Swedish Telcom and Ericsson)

1990

IEEE 802.11 for Wireless LAN standards

1990

Announcement of wireless LAN products

1991

RAM mobile (Mobitex)

1992

Formation of WINForum

1992

ETSI and HIPERLAN in Europe

1993

Release of 2.4, 5.2, and 17.1–17.3 GHz bands in EU

1993

CDPD (IBM and 9 operating companies)

1994

PCS licensed and unlicensed bands for PCS

1996

Wireless ATM Forum started

1997

U-NII bands released, IEEE 802.11 completed, GPRS started

1998

IEEE 802.11b and Bluetooth announcement

1999

IEEE 802.11a/ HIPERLAN-2 started


Mobile data services were first introduced with the ARDIS (now called DATATAC) project between Motorola and IBM in 1983. The purpose of this network was to allow IBM field crew to operate their portable computers wherever they want to deliver their services. In 1986, Ericsson introduced Mobitex technology, which was an open architecture implementation of the ARDIS. In 1993, IBM and nine operating companies in the United States started the CDPD (cellular digital packet data) project, expecting a huge market by the year 2000. In the late 1990s the GPRS (general packet radio service) data services that are integrated in the successful GSM systems and can support an order of magnitude higher data rates than previous technologies attracted considerable attention. These higher data rates are perceived to be essential for wireless Internet access, the most popular wireless data application. The third generation (3G) cellular systems are planning to provide up to 2 Mbps mobile data service that is substantially higher than the GPRS data rates. These data rates, however, would not have the comprehensive coverage of GPRS. The early mobile data networks, ARDIS and Mobitex, were independent networks owning their infrastructure. As time passed, CDPD overlaid its infrastructure over the AMPS systems, and GPRS was actually integrated within the GSM infrastructure. This gradual assimilation of the mobile data industry into the cellular telephone industry will be completed in the next-generation cellular systems.

With the integration of PCS and mobile data industries in the next-generation cellular systems we see the emergence of two industries: the next-generation traditional cellular systems operating in licensed bands and the local broadband and ad hoc networks operating in unlicensed bands.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020