Lecture Notes Wireless Communication
Lecture Notes Wireless Communication
WIRELESS
COMMUNICATION
The wireless method of communication uses low-powered radio waves to transmit data
between devices. High powered transmission sources usually require government licenses to
broadcast on a specific wavelength. This platform has historically carried voice and has grown
into a large industry, carrying many thousands of broadcasts around the world. Radio waves are
now increasingly being used by unregulated computer users.
We owe much to the Romans that in the field of communication it did not end with the Latin
root communicate. They devised what might be described as the first real mail, or postal system,
in order to centralize control of the empire from Rome. This allowed Rome to gather knowledge
about events in its many widespread provinces.
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
The first wireless transmitters went on the air in the early 20th century using radiotelegraphy
(Morse code). Later, as modulation made it possible to transmit voices and music via wireless, the
medium came to be called "radio." With the advent of television, fax, data communication, and
the effective use of a larger portion of the spectrum, the term "wireless" has been resurrected.
(1) Cellular phones and pagers: provide connectivity for portable and mobile applications,
both personal and business
(2) Global Positioning System (GPS): allows drivers of cars and trucks, captains of boats and
ships, and pilots of aircraft to ascertain their location anywhere on earth
(3) Cordless computer peripherals: the cordless mouse is a common example; keyboards and
printers can also be linked to a computer via wireless
(4) Cordless telephone sets: these are limited-range devices, not to be confused with cell
phones
(5) Home-entertainment-system control boxes: the VCR control and the TV channel control
are the most common examples; some hi-fi sound systems and FM broadcast receivers
also use this technology
(6) Remote garage-door openers: one of the oldest wireless devices in common use by
consumers; usually operates at radio frequencies
(7) Two-way radios: this includes Amateur and Citizens Radio Service, as well as business,
marine, and military communications
(8) Baby monitors: these devices are simplified radio transmitter/receiver units with limited
range
(9) Satellite television: allows viewers in almost any location to select from hundreds of
channels
(10) Wireless LANs or local area networks: provide flexibility and reliability for
business computer users
Wireless technology is rapidly evolving, and is playing an increasing role in the lives of people
throughout the world. In addition, ever-larger numbers of people are relying on the technology
directly or indirectly. (It has been suggested that wireless is overused in some situations, creating
a social nuisance.) More specialized and exotic examples of wireless communications and control
include:
(11) Global System for Mobile Communication (GSM): a digital mobile telephone
system used in Europe and other parts of the world; the de facto wireless telephone
standard in Europe
PAGING SYSTEMS
Paging Systems are wireless communication systems that are designed to send brief messages to a
subscriber. It's a one-way messaging system in which Base Station send messages to all
subscribers. The Paging System transmits the message also known as Page, along with Paging
System access number, throughout the service area using Base Station, which broadcast the page
on a radio link.
Manual Paging System: In a manual paging system, a message is sent to the paging operator
through telephone call by the caller. The message is then delivers to the pager through paging
network by the operator.
Automatic Paging System: In an automatic paging system, the incoming requests are
automatically processed by the paging terminal and then this information is delivers to the pager.
Automatic Paging Systems are mostly used.
One of the following four types of information messages can be delivered in a Paging System.
Alert Tone Message: In the alert tone message, a dedicated telephone number is assigned to the
receiver, which is also known as Tone Pager. The pager is triggered by dialing the number. To
generate tone-type messages, the advantage of tone paging is that it utilizes a small amount of
airtime.
Voice Message: In the voice message, a voice message can be transmitted in some tone paging
systems after the beep.
Digital String Message: In digital string message, the receiver is a Numeric Pager. The string can
be the telephone number of the caller or a coded message. This coded message is generated on
request of the caller by the paging center and is decoded by a codebook built into the pager. This
type of paging takes less amount of airtime.
Text String Message: In the text string message, the receiver is an Alphanumeric Pager, which
has large screen to display the text strings. This type of messaging is becoming more popular than
numeric messaging.
This network enabled computer sites at seven campuses spread out over four islands to
communicate with a central computer on Oahu via radio transmission. The network architecture
used a star topology with the central computer at its hub. Any two computers could establish a bi-
directional communications link between them by going through the central hub. ALOHANET
incorporated the first set of protocols for channel access and routing in packet radio systems, and
many of the underlying principles in these protocols are still in use today. The U.S. military was
extremely interested in the combination of packet data and broadcast radio inherent to
ALOHANET. Throughout the 1970’s and early 1980’s the Defense Advanced Research Projects
Agency (DARPA) invested significant resources to develop networks using packet radios for
tactical communications in the battlefield. The nodes in these ad hoc wireless networks had the
ability to self-configure (or reconfigure) into a network without the aid of any established
infrastructure. DARPA’s investment in ad hoc networks peaked in the mid 1980’s, but the
resulting networks fell far short of expectations in terms of speed and performance.
These networks continue to be developed for military use. Packet radio networks also found
commercial application in supporting wide-area wireless data services. These services, first
introduced in the early 1990’s, enable wireless data access (including email, file transfer, and web
browsing) at fairly low speeds, on the order of 20 Kbps. A strong market for these wide-area
wireless data services never really materialized, due mainly to their low data rates, high cost, and
lack of “killer applications”. These services mostly disappeared in the 1990s, supplanted by the
wireless data capabilities of cellular telephones and wireless local area networks (LANs). The
introduction of wired Ethernet technology in the 1970’s steered many commercial companies
away from radio-based networking.
Ethernet’s 10 Mbps data rate far exceeded anything available using radio, and companies did not
mind running cables within and between their facilities to take advantage of these high rates. In
1985 the Federal Communications Commission (FCC) enabled the commercial development of
wireless LANs by authorizing the public use of the Industrial, Scientific, and Medical (ISM)
frequency bands for wireless LAN products. The ISM band was very attractive to wireless LAN
vendors since they did not need to obtain an FCC license to operate in this band. However, the
wireless LAN systems could not interfere with the primary ISM band users, which forced them to
The challenge for future wireless LANs will be to support many users simultaneously with
bandwidth-intensive and delay-constrained applications such as video. Range extension is also a
critical goal for future wireless LAN systems. By far the most successful application of wireless
networking has been the cellular telephone system. The roots of this system began in 1915, when
wireless voice transmission between New York and San Francisco was first established. In 1946
public mobile telephone service was introduced in 25 cities across the United States. These initial
systems used a central transmitter to cover an entire metropolitan area. This inefficient use of the
radio spectrum coupled with the state of radio technology at that time severely limited the system
capacity: thirty years after the introduction of mobile telephone service the New York system
could only support 543 users. A solution to this capacity problem emerged during the 50’s and
60’s when researchers at AT&T Bell Laboratories developed the cellular concept.
Cellular systems exploit the fact that the power of a transmitted signal falls off with distance.
Thus, two users can operate on the same frequency at spatially-separate locations with minimal
interference between them. This allows very efficient use of cellular spectrum so that a large
number of users can be accommodated. The evolution of cellular systems from initial concept to
implementation was glacial.
1. TDMA/FDD Standards
(a) Global System for Mobile (GSM): The GSM standard, introduced by Group Special Mobile,
was aimed at designing a uniform pan-European mobile system. It was the first fully digital
system utilizing the 900 MHz frequency band. The initial GSM had 200 KHz radio channels, 8
full-rate or 16 half-rate TDMA channels per carrier, encryption of speech, low speed data services
and support for SMS for which it gained quick popularity.
(b) Interim Standard 136 (IS-136): It was popularly known as North American Digital Cellular
(NADC) system. In this system, there were 3 full-rate TDMA users over each 30 KHz channel.
The need of this system was mainly to increase the capacity over the earlier analog (AMPS)
system.
(c) Pacific Digital Cellular (PDC): This standard was developed as the counterpart of NADC in
Japan. The main advantage of this standard was its low transmission bit rate which led to its better
spectrum utilization.
2. CDMA/FDD Standard
Interim Standard 95 (IS-95): The IS-95 standard, also popularly known as CDMA One, uses 64
orthogonally coded users and codeword’s are transmitted simultaneously on each of 1.25 MHz
channels. Certain services that have been standardized as a part of IS-95 standard are: short
messaging service, slotted paging, over-the-air activation (meaning the mobile can be activated by
the service provider without any third party intervention), enhanced mobile station identities etc.
Here, the main up gradation techniques are: supporting higher data rate transmission for web
browsing 2.5G networks also brought into the market some popular application, a few of which
are: Wireless Application Protocol (WAP), General Packet Radio Service (GPRS), High Speed
Circuit Switched Dada (HSCSD), Enhanced Data rates for GSM Evolution (EDGE) etc.
Basic service set :The basic service set (BSS) is a set of all stations that can communicate with
each other. Every BSS has an identification (ID) called the BSSID, which is the MAC address of
the access point servicing the BSS. There are two types of BSS: Independent BSS (also referred
to as IBSS), and infrastructure BSS. An independent BSS (IBSS) is an ad-hoc network that
contains no access points, which means they can not connect to any other basic service set. An
infrastructure BSS can communicate with other stations not in the same BSS by communicating
through access points.
Extended service set :An extended service set (ESS) is a set of connected BSSs. Access points in
an ESS are connected by a distribution system. Each ESS has an ID called the SSID which is a
32-byte (maximum) character string.
Distribution system: A distribution system (DS) connects access points in an extended service
set. The concept of a DS can be used to increase network coverage through roaming between
cells. DS can be wired or wireless. Current wireless distribution systems are mostly based on
WDS or MESH protocols, though other systems are in use.
Hidden node problem:: Devices A and C are both communicating with B, but are unaware of each
other IEEE 802.11 defines the physical layer (PHY) and MAC (Media Access Control) layers
based on CSMA/CA (Carrier Sense MultiplMultiplee Access with Collision Avoidance). The 802.11
specification includes provisions designed to minimize collisions, because two mobile units may
both be in range of a common access point, but out of range of each other.
A bridge can be used to connect networks, typically of different types. A wireless Ethernet bridge
allows the connection of devices on a wired Ethernet network to a wireless network. The bridge
bri
acts as the connection point to the Wireless LAN.
A Wireless Distribution System enables the wireless interconnection of access points in an IEEE
802.11 network. It allows a wireless network to be expanded
expanded using multiple access
ac points without
the need for a wired backbone to link them, as is traditionally required. The notable advantage of
WDS over other solutions is that it preserves the MAC addresses of client packets across links
between access points. An access point can be either a main, relay or remote base station. A main
base station is typically connected to the wired Ethernet. A relay base station relays data between
remote base stations, wireless clients or other relay stations to either a main or another relay base
bas
station. A remote base station accepts connections from wireless clients and passes them to relay
or main stations. Connections between "clients" are made using MAC addresses rather than by
specifying IP assignments.
All base stations in a Wireless Distribution System must be configured to use the same radio
channel, and share WEP keys or WPA keys if they are used. They can be configured to different
service set identifiers. WDS also requires that every base station be configured to forward to
others in the system.
WDS may also be referred to as repeater mode because it appears to bridge and accept wireless
clients at the same time (unlike traditional bridging). It should be noted; however, that throughput
in this method is halved for all clients connected
con wirelessly. When it is difficult to connect all of
the access points in a network by wires, it is also possible to put up access points as repeaters.
Roaming
• Internal Roaming (1): The Mobile Station (MS) moves from one access point (AP) to
another AP within a home network because the signal strength is too weak. An
authentication server (RADIUS) presumes the re-authentication of MS via 802.1x (e.g.
with PEAP). The billing of QoS is in the home network. A Mobile Station roaming from
one access point to another often interrupts the flow of data among the Mobile Station and
an application connected to the network. The Mobile Station, for instance, periodically
monitors the presence of alternative access points (ones that will provide a better
connection). At some point, based on proprietary mechanisms, the Mobile Station decides
to re-associate with an access point having a stronger wireless signal. The Mobile Station,
however, may lose a connection with an access point before associating with another
access point. In order to provide reliable connections with applications, the Mobile Station
must generally include software that provides session persistence.
• External Roaming (2): The MS (client) moves into a WLAN of another Wireless Internet
Service Provider (WISP) and takes their services (Hotspot). The user can independently of
his home network use another foreign network, if this is open for visitors. There must be
special authentication and billing systems for mobile services in a foreign network.
Bluetooth is a very simple type of wireless networking that can allow up to eight devices to be
connected together in a mini-network. It is very short range in operation, and so is considered to
be for 'personal' networking. With a range typically under 30ft, this allows enough distance to
perhaps communicate across your office, but not any further. This short range is also its major
security feature - anyone wishing to eavesdrop on your Bluetooth communications would not only
need special equipment but would also need to be quite close to you. It is a moderately slow type
of networking, but it can transfer data sufficiently fast enough for most typical applications.
Bluetooth is hoped to be a very low cost type of networking, and, as it becomes more widespread,
the cost of adding Bluetooth to devices should drop down to perhaps no more than an extra $5-10
on the selling price.
Bluetooth can also help different devices to communicate with each other. For example, you
might have a phone, a PDA, and a computer. If all three devices have Bluetooth capabilities, then
(with the appropriate software on each device) you can probably share contact information
between all three devices quickly and conveniently. And you can look up a phone number on your
PDA (or laptop) and then place a call direct from the laptop or PDA, without needing to touch
your cell phone.
Bluetooth is not a magical solution giving universal connectivity between devices. Each device
also needs to have the appropriate software as well as the basic Bluetooth communication
capability, and so sometimes the promise and theory of what could be possible is not fully
matched by the reality. For best compatibility, devices should support the Bluetooth 1.1 standard.
A new standard - 1.2, was formalized in early November 2003 and this is now the dominant
standard. A newer Bluetooth 2.0 standard, allowing for three to ten times faster network speeds,
and more careful use of battery power, is becoming widely adopted.
Bluetooth has been slow to become accepted in the market, but now is starting to become
increasingly prevalent. Prices are falling and increasing numbers of devices are offering Bluetooth
connectivity.
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
Bluetooth devices communicating with each other and your PC. It is very short range in
operation, and so is considered to be for 'personal' networking. With a range typically under 30ft,
this allows enough distance to perhaps communicate across your office, but not any further. This
short range is also its major security feature - anyone wishing to eavesdrop on your Bluetooth
communications would not only need special equipment but would also need to be quite close to
you. It is a moderately slow type of networking, but it can transfer data sufficiently fast enough
for most typical applications. Bluetooth is hoped to be a very low cost type of networking.
Bluetooth is designed to be compatible across a range of very different operating systems and
devices, including things that you would not normally think of as being 'computer' type items - for
example, some types of headset. Bluetooth networking can enable the headset to connect with
other devices such as your phone, your MP3 player, your computer, or your PDA.
A Bluetooth enabled headset would mean that you can leave your cell phone in your pocket or
briefcase, but still receive incoming phone calls. If your cell phone supports voice recognition for
dialing out, you can even place calls as well as receive them, while never needing to reach for
your phone. The safety benefits of this, if you're driving, are obvious.
It is probably better from a health point of view to have a very low powered headset close to your
head than it is to have a phone that might be generating 100 or even 300 times as much radio
energy close to your head.
Bluetooth can also help different devices to communicate with each other. For example, you
might have a phone, a PDA, and a computer. If all three devices have Bluetooth capabilities, then
(with the appropriate software on each device) you can probably share contact information
between all three devices quickly and conveniently. And you can look up a phone number on your
PDA (or laptop) and then place a call direct from the laptop or PDA, without needing to touch
your cell phone.
Bluetooth Range
Bluetooth has three different defined ranges, based on their output power ratings.
Class 1 devices are the most powerful. These can have up to 100 mW of power, and a regular
antenna will give them a range of about 40 m - 100 m (130 - 330 ft).
Class 2 devices are lower power, with up to 2.5 mW of power. A regular antenna will give them
a range of about 15 m - 30 m (50 - 100 ft).
UNIT 3
INTRODUCTION TO CELLULAR MOBILE SYSTEMS
SPECTRUM ALLOCATION
The spectrum is a limited natural resource. Wireless communication equipment depends on the
appropriate and available frequency bands. The signal propagation characteristics are different
with different frequency bands. Also, the scope of the service
for the new system used in that band determines the bandwidth of that band. The higher the data
rate, the wider bandwidth is needed. Manufacturers want to allocate a desired spectrum band and
have an investment leverage of economic scale. The task of authorizing the allocation and
licensing of the available spectrum to different systems (allocation band) and to different service
operators (licenses) falls to different frequency administrative bodies throughout the world. It is a
process of restructuring of frequency band allocations and allows the new systems and services to
migrate toward higher frequency bands. Many issues are surrounded by major controversies
among segments of the communication industry and are brought to Congress to resolve. In the
past, satellite communications needed a global plan of spectrum allocation. The spectrum
allocation of terrestrial communication systems has only come from the regional authorities. As
of today, the global roaming of terrestrial communication systems forces the spectrum allocations
of the systems to be planned globally as well; the GSM system is an example. As of today, there
is a need to have three spectral bands for GSM to roam in most areas of the world: 900 MHz and
In 1946, the FCC granted AT&T a license for mobile telephone services in St. Louis operating at
450 MHz (VHF) with a channel bandwidth of 120 kHz. In 1947, the service was being offered in
more than 25 cities in the United States. In 1950, the channel bandwidth was reduced to 60 kHz
a) Mobile units: A mobile unit is basically a mobile/wireless device that contains a control unit,
a transceiver and an antenna system for data and voice transmission. For example, in GSM
networks, the mobile station will consist of the mobile equipment (ME) and the SIM card.
b) Air Interface Standard: There are three main air interface protocols or standards: frequency
division multiple access (FDMA), time division multiple access (TDMA) and code division
multiple access (CDMA). These standards are basically the medium access control (MAC)
protocols that define the rules for entities to access the communication medium. These air
interface standards allow many mobile users to share simultaneously the finite amount of
radio channels.
d) Databases: Another integral component of a cellular system is the databases. Databases are
used to keep track of information like billing, caller location, subscriber data, etc. There are
two main databases called the Home Location Register (HLR) and Visitor Location Register
(VLR). The HLR contains the information of each subscriber who resides in the same city as
the MTSO. The VLR temporarily stores the information for each visiting subscriber in the
coverage area of a MTSO. Thus, the VLR is the database that supports roaming capability.
f) Gateway: The final basic component of a cellular system is the Gateway. The gateway is the
communication links between two wireless systems or between wireless and wired systems.
There are two logical components inside the Gateway: 1) MTSO and 2) Interworking function
(IWF). The MTSO connects the cellular base stations and the mobile stations to the public
switched telephone network (PSTN) or other MTSO. It contains the EIR database. The IWF
PERFORMANCE CRITERIA
Voice Quality
Voice quality is very hard to judge without subjective tests for users’ opinions. In this technical
area, engineers cannot decide how to build a system without knowing the voice quality that will
satisfy the users. In military communications, the situation differs: armed forces personnel must
use the assigned equipment. CM: For any given commercial communications system, the voice
quality will be based on the following criterion: a set value x at which y percent of customers rate
the system voice quality (from transmitter to receiver) as good or excellent; the top two circuit
merits (CM) of the five listed below.
MOS: As the percentage of customers choosing CM4 and CM5 increases, the cost of building the
system rises. The average of the CM scores obtained from all the listeners is called mean
opinion score (MOS). Usually, the toll-quality voice is around MOS ≥4. DRT (Diagnostic
Rhyme Test): An ANSI standardized method used for evaluation of intelligibility. It is a
subjective test method. Listeners are required to choose which word of a rhyming pair they
perceived. The words differ only in their leading consonant the word pairs have been chosen
such that six binary attributes of speech intelligibility are measured in their present and absent
states. This attribute profile provides a diagnostic capability to the test.
Data Quality
Picture/Vision Quality
There are color acuity, depth perception, flicker perception, motion perception, noise perception,
and visual acuity. The percentage of pixel (picture element) loss rate can be characterized in
vertical resolution loss and horizontal resolution loss of a pixel.
Service Quality
1. Coverage. The system should serve an area as large as possible. With radio coverage, however,
because of irregular terrain configurations, it is usually not practical to cover 100 s
a. The transmitted power would have to be very high to illuminate weak spots with sufficient
reception, a significant added cost factor.
b. The higher the transmitted power, the harder it becomes to control interference. Therefore,
systems usually try to cover 90 percent of an area in flat terrain and 75 percent of an area in hilly
terrain. The combined voice quality and coverage criteria in AMPS cellular systems3 state that 75
percent of users rate the voice quality between good and excellent in 90 percent of the served
area, which is generally flat terrain. The voice quality and coverage criteria would be adjusted as
per decided various terrain conditions. In hilly terrain, 90 percent of users must rate voice quality
good or excellent in 75 percent of the served area. A system operator can lower the percentage
values stated above for a low-performance and low-cost system.
2. Required grade of service. For a normal start-up system, the grade of service is specified for a
blocking probability of .02 for initiating calls at the busy hour. This is an average value. However,
the blocking probability at each cell site will be different. At the busy hour, near freeways,
automobile traffic is usually heavy, so the blocking probability at certain cell sites may be higher
than 2 percent, especially when car accidents occur. To decrease the blocking probability requires
a good system plan and a sufficient number of radio channels.
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
3. Number of dropped calls. During Q calls in an hour, if a call is dropped and Q−1 calls are
completed, then the call drop rate is 1/Q. This drop rate must be kept low. A high drop rate could
be caused by either coverage problems or handoff problems related to inadequate channel
availability or weak reception.
Operation Procedures
This section briefly describes the operation of the cellular mobile system from a customer’s
perception without touching on the design parameters the operation can be divided into four parts
and a handoff procedure.
Mobile unit initialization. When a user activates the receiver of the mobile unit, the receiver
scans the set-up channels. It then selects the strongest and locks on for a certain time. Because
each site is assigned a different set-up channel, locking onto the strongest set-up channel usually
means selecting the nearest cell site. This self-location scheme is used in the idle stage and is
user-independent. It has a great advantage because it eliminates the load on the transmission at the
cell site for locating the mobile unit. The disadvantage of the self-location scheme is that no
location information of idle mobile units appears at each cell site. Therefore, when the call
initiates from the land line to a mobile unit, the paging process is longer. For a large percentage of
calls originates at the mobile unit, the use of self-location schemes is justified. After a given
period, the self-location procedure is repeated. When land-line originated calls occur, a feature
called “registration” is used.
Mobile originated call. The user places the called number into an originating register in the
mobile unit, and pushes the “send” button. A request for service is sent on a selected set-up
channel obtained from a self-location scheme. The cell site receives it, and in directional cell sites
(or sectors), selects the best directive antenna for the voice channel to use. At the same time, the
cell site sends a request to the mobile telephone switching office (MTSO) via a high-speed data
link. The MTSO selects an appropriate voice channel for the call, and the cell site acts on it
through the best directive antenna to link the mobile unit. The MTSO also connects the wire-line
party through the telephone company zone office.
Network originated call. A land-line party dials a mobile unit number. The telephone company
zone office recognizes that the number is mobile and forwards the call to the MTSO. The MTSO
sends a paging message to certain cell sites based on the mobile unit number and the search
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
algorithm. Each cell site transmits the page on its own set-up channel. If the mobile unit is
registered, the registered site pages the mobile. The mobile unit recognizes its own identification
on a strong set-up channel, locks onto it, and responds to the cell site. The mobile unit also
follows the instruction to tune to an assigned voice channel and initiate user alert.
Call termination. When the mobile user turns off the transmitter, a particular signal (signaling
tone) transmits to the cell site, and both sides free the voice channel. The mobile unit resumes
monitoring pages through the strongest set-up channel.
Handoff procedure. During the call, two parties are on a traffic channel. When the mobile unit
moves out of the coverage area of a particular cell site, the reception becomes weak. The current
cell site requests a handoff. The system switches the call to a new frequency channel in a new cell
site without either interrupting the call or alerting the user. The call continues as long as the user
is talking. The user does not notice the handoff occurrences. Handoff was first used by the AMPS
system, and then renamed handover by the European systems because of the different meanings in
British English and American English. Description of handoff will appear in performance
Criteria:
Analog cellular systems use very narrow radio channel (small amount of bandwidth) that varies
from 10 kHz to 30 kHz. Analog systems usually send control information in digital (data) form.
The data signaling rates determine how fast messages can be sent on control channels. The RF
power level of mobile telephones and how the power level is controlled ordinarily determines
how far away the mobile telephone can operate from the base station (radio tower).
Regardless of the size and type of radio channels, all cellular and PCS systems allow for full
duplex operation. Full duplex operation is the ability to have simultaneous communications
between the caller and the called person. This means a mobile telephone must be capable of
simultaneously transmitting and receiving to the radio tower. The radio channel from the mobile
telephone to the radio tower is called the uplink and the radio transmission channel from the base
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
station to the mobile telephone is called the downlink. The uplink and downlink radio channels
are normally separated by 45 MHz to 80 MHz.
In early mobile radio systems, a mobile telephone scanned the limited number of available
channels until it found an unused one, which allowed it to initiate a call. Because the analog
cellular systems in use today have hundreds of radio channels, a mobile telephone cannot scan
them all in a reasonable amount of time. To quickly direct a mobile telephone to an available
channel, some of the available radio channels are dedicated as control channels. Most cellular
systems use two types of radio channels, control channels and voice channels. Control channels
carry only digital messages and signals, which allow the mobile telephone to retrieve system
control information and compete for access.
Control channels only carry control information such as paging (alert) and channel assignment
messages. Voice channels are primarily used to transfer voice information. However, voice
channels must also be capable of sending and receiving some digital control messages to allow for
necessary frequency and power changes during a call.
Current analog systems serve only one subscriber at a time on a radio channel so the number of
radio channels available influence system capacity. However, a typical subscriber uses the system
for only a few minutes a day, on a daily basis, and many subscribers share a single channel. As a
rule, 20 - 32 subscribers share each radio channel [ ], depending upon the average talk time per
hour per subscriber. Generally, a cell with 50 channels can support 1000 - 1600 subscribers.
The basic operation of an analog cellular system involves initiation of the phone when it is
powered on, listening for paging messages (idle), attempting access when required and
conversation (or data) mode.
When a mobile telephone is first powered on, it initializes itself by searching (scanning) a
predetermined set of control channels and then tuning to the strongest one. During the
initialization mode, it listens to messages on the control channel to retrieve system identification
and setup information.
After initialization, the mobile telephone enters the idle mode and waits to be paged for an
incoming call and senses if the user has initiated (dialed) a call (access). When a call begins to be
received or initiated, the mobile telephone enters system access mode to try to access the system
via a control channel. When it gains access, the control channel sends an initial voice channel
A mobile telephone's attempt to obtain service from a cellular system is referred to as access.
Mobile telephones compete on the control channel to obtain access from a cellular system. Access
is attempted when a command is received by the mobile telephone indicating the system needs to
service that mobile telephone (such as a paging message indicating a call to be received) or as a
result of a request from the user to place a call. The mobile telephone gains access by monitoring
the busy/idle status of the control channel both before and during transmission of the access
attempt message. If the channel is available, the mobile station begins to transmit and the base
station simultaneously monitors the channel's busy status. Transmissions must begin within a
prescribed time limit after the mobile station finds that the control channel access is free, or the
access attempt is stopped on the assumption that another mobile telephone has possibly gained the
attention of the base station control channel receiver.
If the access attempt succeeds, the system sends out a channel assignment message commanding
the mobile telephone to tune to a cellular voice channel. When a subscriber dials the mobile
telephone to initiate a call, it is called "origination". A call origination access attempt message is
sent to the cellular system that contains the dialed digits, identity information along with other
information. If the system allows service, the system will assign a voice channel by sending a
voice channel designator message, if a voice channel is available. If the access attempt fails, the
mobile telephone waits a random amount of time before trying again. The mobile station uses a
random number generating (an internal algorithm) to determine the random time to wait. The
design of the system minimizes the chance of repeated collisions between different mobile
stations, which are both trying to access the control channel since each one waits a different
random time interval before trying again if they have already collided on their first, simultaneous
attempt.
To receive calls, a mobile telephone is notified of an incoming call by a process called paging. A
page is a control channel message that contains the telephone's Mobile Identification Number
(MIN) or telephone number of the desired mobile phone. When the telephone determines it has
been paged, it responds automatically with a system access message that indicates its access
attempt is the result of a page message and the mobile telephone begins to ring to alert the
customer of an incoming telephone call. When the customer answers the call (user presses
"SEND" or "TALK"), the mobile telephone transmits a service request to the system to answer
After a mobile telephone has been commanded to tune to a radio voice channel, it sends mostly
voice or other customer information. Periodically, control messages may be sent between the base
station and the mobile telephone. Control messages may command the mobile telephone to adjust
its power level, change frequencies, or request a special service (such as three way calling).
To conserve battery life, a mobile phone may be permitted by the base station to only transmit
when it senses the mobile telephone's user is talking. When there is silence, the mobile telephone
may stop transmitting for brief periods of time (several seconds). When the mobile telephone user
begins to talk again, the transmitter is turned on again. This is called discontinuous transmission.
A basic analog cellular system. There are two types of radio channels; control channels and voice
channels. Control channels typically use frequency shift keying (FSK) to send control messages
(data) between the mobile phone and the base station. Voice channels typically use FM
modulation with brief bursts of digital information to allow control messages (such as handoff)
during conversation. Base stations typically have two antennas for receiving and one for
transmitting. Dual receiver antennas increases the ability to receive the radio signal from mobile
telephones which typically have a much lower transmitter power level than the transmitters in the
base station. Base stations are connected to a mobile switching center (MSC) typically by a high
speed telephone line or microwave radio system. This interconnection must allow both voice and
control information to be exchanged between the switching system and the base station. The MSC
is connected to the telephone network to allow mobile telephones to be connected to standard
landline telephones.
DIGITAL SYSTEMS
Many digital cellular and cordless phone systems have been developed. The cellular systems are
GSM, NA-TDMA, CDMA, PDC, and 1800-DCS, and the cordless phone systems are DECT and
CT-2 schemes. Although analog cellular systems are limited to using frequency division multiple-
access (FDMA) schemes, digital cellular systems can use FDMA, time division multiple-access
(TDMA), and code-division multiple-access (CDMA). When a multiple-access scheme is chosen
for a particular system, all the functions, protocols, and network are associated with that scheme
CEPT, a European group, began to develop the Global System for Mobile TDMA system in June
1982.17–21 GSM has two objectives: pan-European roaming, which offers compatibility
throughout the European continent, and interaction with the integrated service digital network
(ISDN), which offers the capability to extend the single-subscriber-line system to a multiservice
system with various services currently offered only through diverse telecommunications
networks.
System capacity was not an issue in the initial development of GSM, but due to the unexpected,
rapid growth of cellular service, 35 revisions have been made to GSM since the first issued
specification. The first commercial GSM system, called D2, was implemented in Germany in
1992.
CDMA
CDMA development26–30 started in early 1989 after the NA-TDMA standard (IS-54) was
established. A CDMA demonstration to test its feasibility for digital cellular systems was held in
November 1989. The CDMA “Mobile Station-Base Station Compatibility Standard for Dual
Mode Wideband Spread Spectrum Cellular System “was issued as IS-95 (PN-3118, Dec. 9,
1992). CDMA uses the idea of tolerating inteterference by spread-spectrum modulation. The
power control scheme in a CDMA system is a requirement for digital cellular application
UNIT 4
CELLULAR SYSTEM DESIGN FUNDAMENTALS
Frequency Reuse
Frequency reuse, or, frequency planning, is a technique of reusing frequencies and channels
within a communication system to improve capacity and spectral efficiency. Frequency reuse is
one of the fundamental concepts on which commercial wireless systems are based that involve the
partitioning of an RF radiating area into cells. The increased capacity in a commercial wireless
network, compared with a network with a single transmitter, comes from the fact that the same
radio frequency can be reused in a different area for a completely different transmission.
Frequency reuse in mobile cellular systems means that frequencies allocated to
The service is reused in a regular pattern of cells, each covered by one base station. The repeating
regular pattern of cells is called cluster. Since each cell is designed to use radio frequencies only
within its boundaries, the same frequencies can be reused in other cells not far away without
interference, in another cluster. Such cells are called `co-channel' cells. The reuse of frequencies
enables a cellular system to handle a huge number of calls with a limited number of channels.
Figure shows a frequency planning with cluster size of 7, showing the co-channels cells in
different clusters by the same letter. The closest distance between the co-channel cells (indifferent
clusters) is determined by the choice of the cluster size and the layout of the cell cluster. Consider
a cellular system with S duplex channels available for use and let N be the number of cells in a
cluster. If each cell is allotted K duplex channels with all being allotted unique and disjoint
channel groups we have S = KN under normal circumstances. Now, if the cluster are repeated M
times within the total area, the total number of duplex channels, or, the total number of users in
the system would be T = MS = KMN. Clearly, if K and N remain constant, then
Hence the capacity gain achieved is directly proportional to the number of times a cluster is
repeated, as shown as well as, for a fixed cell size, small N decreases the size of the cluster with
in turn results in the increase of the number of clusters and hence the capacity. However for small
N, co-channel cells are located much closer and hence more interference. The value of N is
determined by calculating the amount of interference that can be tolerated for a sufficient quality
communication. Hence the smallest N having interference below the tolerated limit is used.
However, the cluster size N cannot take on any value and is given only by the following equation
Ex.: A total of 33 MHz bandwidth is allocated to a FDD cellular system with 25 KHz simplex
channels to provide full duplex voice and control channels. Compute the number of channels
available per cell if the system uses (i) 4 cell, (ii) 7 cell, and (iii) 8 cell reuse technique.
Assume 1 MHz of spectrum is allocated to control channels. Give a distribution of voice and
control channels
(b) For N = 7, total channels per cell are 660/7 _ 94. Therefore, we have to go for a more exact
solution. We know that for this system, a total of 20 control channels and a total of 640 voice
channels are kept. Here, 6 cells can use 3 control channels and the rest two can use 2 control
channels each. On the other hand, 5 cells can use 92 voice channels and the rest two can use 90
voice channels each. Thus the total
solution for this case is:
6 x 3 + 1 x 2 = 20 control channels, and,
5 x 92 + 2 x 90 = 640 voice channels.
This is one solution, there might exist other solutions too.
(c) The option N = 8 is not a valid option since it cannot satisfy equation by two integers i and j.
Handoff Process
When a user moves from one cell to the other, to keep the communication between the user pair,
the user channel has to be shifted from one BS to the other without interrupting the call, i.e., when
a MS moves into another cell, while the conversation is still in progress, the MSC automatically
transfers the call to a new FDD channel without disturbing the conversation. This process is
called as handoff. A schematic diagram of handoff is given in Figure. Processing of handoff is an
important task in any cellular system. Handoffs must be performed successfully and be
imperceptible to the users. Once a signal
is quite an important parameter during the handoff process since this margin can neither be too
large nor too small. If∆ is too small, then there may not be enough time to complete the handoff
and the call might be lost even if the user crosses the cell boundary. If ∆ is too high on the other
hand, then MSC has to be burdened with unnecessary handoffs. This is because MS may not
intend to enter the other cell. Therefore ∆ should be judiciously chosen to ensure imperceptible
handoffs and to meet other objectives.
Now, given the fixed area A = R1R2, we need to find λhmin for a given teta. Replacing
R1 by A/R2 and equating dH/dR1 to zero, we get
. This has two implications: (i) that handoff is minimized if rectangular cell is aligned with X-Y
axis, i.e., teta = 0o, and, (ii) that the number of users crossing the cell boundary is inversely
proportional to the dimensionof the other side of the cell. The above analysis has been carried out
Handoff_ in CDMA:
In spread spectrum cellular systems, the mobiles share the same channels in every cell. The MSC
evaluates the signal strengths received from different BS for a single user and then shifts the user
from one BS to the other without actually changing the channel. These types of handoffs are
called as soft handoff_ as there is no change in the channel.
Handoff Priority
While assigning channels using either FCA or DCA strategy, a guard channel concept must be
followed to facilitate the handoffs. This means, a fraction of total available channels must be kept
for handoff_ requests. But this would reduce the carried traffic and only fewer channels can be
assigned for the residual users of a cell. A good solution to avoid such a dead-lock is to use DCA
with handoff priority (demand based allocation)
From the above equation, small of `Q' means small value of cluster size `N' and increase in
cellular capacity. But large `Q' leads to decrease in system capacity but increase in transmission
quality. Choosing the options is very careful for the selection of `N', the proof of which is given in
the first section. The Signal to Interference Ratio (SIR) for a mobile receiver which monitors the
forward channel can be calculated as
Where i0 is the number of co-channel interfering cells, S is the desired signal power from the
baseband station and Ii is the interference power caused by the i-th interfering co-channel base
where P0 is the power received at a close-in reference point in the far field region at a small
distance do from the transmitting antenna, and `n' is the path loss exponent. Let us calculate the
SIR for this system. If Di is the distance of the i-th interferer from the mobile, the received power
at a given mobile due to i-th interfering cell is proportional to (Di) n (the value of 'n' varies
between 2 and 4 in urban cellular systems).
Let us take that the path loss exponent is same throughout the coverage area and the transmitted
power be same, then SIR can be approximated as
where the mobile is assumed to be located at R distance from the cell centre. If we consider only
the first layer of interfering cells and we assume that the interfering base stations are equidistant
from the reference base station and the distance between the cell centers is 'D' then the above
equation can be converted as
which is an approximate measure of the SIR. Subjective tests performed on AMPS cellular
system which uses FM and 30 kHz channels show that sufficient voice quality can be obtained by
SIR being greater than or equal to 18 dB. If we take n=4 , the value of 'N' can be calculated .
Therefore minimum N is 7. The above equations are based on hexagonal geometry and the
distances from the closest interfering cells can vary if different frequency reuse plans are used.
We can go for a more approximate calculation for co-channel SIR. This is the example of a 7 cell
reuse case. The mobile is at a distance of D-R from 2 closest interfering cells and approximately
D+R/2, D, D-R/2 and D+R distance from other
interfering cells in the first tier. Taking n = 4 in the above equation, SIR can be approximately
calculated as
assignments of the base stations and their transmit powers. Tilting the base-station antenna to
limit the Using the value of N equal to 7 (this means Q = 4.6), the above expression yields that
worst case SIR is 53.70 (17.3 dB). This shows that for a 7 cell reuse case the worst case SIR is
slightly less than 18 dB. The worst case is when the mobile is at the corner of the cell i.e., on a
vertex as shown in the Figure Therefore N = 12 cluster size should be used. But this reduces the
capacity by 7/12 times. Therefore, co-channel interference controls link performance, which in a
way controls frequency reuse plan and the overall capacity of the cellular system. The effect of
co-channel interference can be minimized by optimizing the frequency spread of the signals in the
system can also be done.
which can be easily found from the earlier SIR expressions. If n = 4, then SIR is 52 dB. Perfect
base station filters are needed when close-in and distant users share the same cell. Practically,
each base station receiver is preceded by a high Q cavity filter in order to remove adjacent
channel interference. Power control is also very much important for the prolonging of the battery
life for the subscriber unit but also reduces reverse channel SIR in the system. Power control is
done such that each mobile transmits the lowest power required to maintain a good quality link on
the reverse channel.
If the total serviced area is Atonal, then the number of clusters M that could be accommodated is
given by
Note that all of the available channels N, are reused in every cluster. Hence, to make the
maximum number of channels available to subscribers, the number of clusters M should be large,
which, by Equation , shows that the cell radius should be small. However, cell radius is
determined by a trade-off: R should be as large as possible to minimize the cost of the installation
per subscriber, but R should be as small as possible to maximize the number of customers that the
system can accommodate. Now, if the cell radius R is fixed, then the number of clusters could be
maximized by minimizing the size of a cluster N. We have seen earlier that the size of a cluster
depends on the frequency reuse ratio Q. Hence, in determining the value of N, another trade-off
is encountered in that N must be small to accommodate s large number of subscribers, but should
be sufficiently large so as to minimize the interference effects.
Now, we focus on the issues regarding system expansion. The history of cellular phones has been
characterized by a rapid growth and expansion in cell subscribers. Though a cellular system can
be expanded by simply adding cells to the geographical area, the way in which user density can
be increased is also important to look at.This is because it is not always possible to counter the
increasing demand for cellular systems just by increasing the geographical coverage area due to
the limitations in obtaining new land with suitable requirements. We discuss here two methods for
dealing with an increasing subscriber density: Cell Splitting and Sectoring. The other method,
microcell zone concept can treated as enhancing the QoS in a cellular system.
CELL SPLITTING
Why Splitting?
The motivation behind implementing a cellular mobile system is to improve the utilization of
spectrum efficiency.19 The frequency reuse scheme is one concept, and cell splitting is another
concept. When traffic density starts to build up and the frequency channels Fi in each cell Ci
Let each new cell carry the same maximum traffic load of the old cell; then, in theory,
How Splitting?
There are two kinds of cell-splitting techniques:
1. Permanent splitting. The installation of every new split cell has to be planned ahead of time;
the number of channels, the transmitted power, the assigned frequencies, the choosing of the cell-
site selection, and the traffic load consideration should all be considered. When ready, the actual
service cut-over should be set at the lowest traffic point, usually at midnight on a weekend.
Hopefully, only a few calls will be dropped because of this cut-over, assuming that the downtime
of the system is within 2 h.
2. Dynamic splitting. This scheme is based on using the allocated spectrum efficiency in real
time. The algorithm for dynamically splitting cell sites is a tedious job, as we cannot
able directional antennas, a given cell would receive interference and transmit with a fraction of
available co-channel cells is called 'sectoring'. In a seven-cell-cluster layout with 120o sectored
cells, it can be easily understood that the mobile units in a particular sector of the center cell will
receive co-channel interference from only two of the first-tier co-channel base stations, rather than
from all six. Likewise, the base station in the center cell will receive co-channel interference from
mobile units in only two of the co-channel cells
Base Station Signals: When a call is made to a cellular phone, the system already knows the cell
location of that phone. The base station of that cell knows in which zone, within that cell, the
cellular phone is located. Therefore when it receives the signal, the base station transmits it to the
suitable zone site. The zone site receives the cellular signal from the base station and transmits
that signal to the mobile phone after amplification. By confining the power transmitted to the
The signal power is reduced, the microcells can be closer and result in an increased system
capacity. However, in a microcellular system, the transmitted power to a mobile phone within a
microcell has to be precise; too much power results in interference between microcells, while with
too little power the signal might not reach the mobile phone.This is a drawback of microcellular
systems, since a change in the surrounding (a new building, say, within a microcell) will require a
change of the transmission power.
user is also called the average arrival rate, referring to the rate at which calls from
a single user arrive. The average holding time is the average duration of a call. The Trunking
mainly exploits the statistical behavior of users so that a fixed number of channels can be used to
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
accommodate a large, random user community. As the number of telephone lines decrease, it
becomes more likely that all channels are busy for a particular user. As a result, the call gets
rejected and in some systems, a queue may be used to hold the caller's request until a channel
becomes available.. The product:
that is, the product of the average arrival rate and the average holding time{is called
the offered traffic intensity or offered load. This quantity represents the average traffic that a user
provides to the system. Offered traffic intensity is a quantity that is traditionally measured in
Erlangs. One Erlang represents the amount of traffic intensity carried by a channel that is
completely occupied. For example, a channel that is occupied for thirty minutes during an hour
carries 0.5 Erlang of traffic. Call arrivals or requests for service are modeled as a Poisson random
process. It is based on the assumption that there is a large pool of users who do not cooperate in
deciding when to place calls. Holding times are very well predicted using an exponential
probability distribution. This implies that calls of long duration are much less frequent than short
calls. If the traffic intensity offered by a single user is Auser, then the traffic intensity offered by
N users is A = NAuser. The purpose of the statistical model is to relate the offered traffic intensity
A, the grade of service Pb, and the number of channels or trunks C needed to maintain the desired
grade of service.
Two models are widely used in traffic engineering to represent what happens when a call is
blocked. The blocked calls cleared model assumes that when a channel or trunk is not available to
service an arriving call, the call is cleared from the system. The second model is known as
blocked calls delayed. In this model a call that cannot be serviced is placed on a queue and will be
serviced when a channel or
trunk becomes available. Use of the blocked-calls-cleared statistical model leads to the Erlang B
formula that relates offered traffic intensity A, grade of service Pb, and number of channels K.
The Erlang B formula is:
When the blocked-calls-delayed model is used, the "grade of service" refers to the probability that
a call will be delayed. In this case the statistical model leads to the Erlang C formula,
Introduction
1. If there is only a single Base Station (BS), how can it communicate with many Mobile Stations
(MSs) simultaneously?
2. If there are multiple BSs, how can we assign spectral resources to them in such a way that the
total number of possible users is maximized? And how should these BSs is placed in a given
geographical area? As for the first question, there are different methods, called Multiple Access
(MA) methods that allow multiple users to talk to a BS simultaneously. In this, we discuss the
following three methods:
• Frequency Division Multiple Access (FDMA), where different frequencies are assigned to
different users.
• Time Division Multiple Access (TDMA), where different timeslots are assigned to different
users.
• Packet Radio can be viewed as a form of TDMA, where the assignment of timeslots to users is
adaptive.
Space Division Multiple Access: (SDMA) is a multiple access format for systems with multiple
antennas; it can be combined with all of the other multiple access methods. The so-called
“duplexing,” which separates transmission and reception at a transceiver. The goal of all these
methods is to maximize spectral efficiency – i.e., to maximize the number of users per unit
bandwidth.
FDMA is the oldest, and conceptually most simple, multiaccess method. Each user is assigned a
frequency (sub) band – i.e., a (usually contiguous) part of the available spectrum. The assignment
of frequency bands is usually done during call setup, and retained during the whole call. FDMA is
usually combined with the Frequency Domain Duplexing (FDD) so that two frequency bands
(with a fixed duplex distance) are assigned to each user: one for downlink (BS-to-MS) and one
for uplink (MS-to-BS) communication.
• The transmitter (TX) and receiver (RX) require little digital signal processing. However, this is
not so important in practice anymore, as the costs for digital processing are continuously
decreasing.
• (Temporal) synchronization is simple. Once synchronization has been established during the
call setup, it is easy to maintain it by means of a simple tracking algorithm, as transmission occurs
continuously.
However, pure FDMA also has significant disadvantages, especially when used for speech
communications. These problems arise from spectral efficiency considerations, as well as from
sensitivity to multipath effects:
• Frequency synchronization and stability are difficult: for speech communications, each
frequency
Sensitivity to fading: since each user is assigned a distinct frequency band, these bands are
narrower than for other multi access methods (compare TDMA, CDMA) – i.e., 5–30 kHz. For
such narrow sub bands, fading is flat in practically all environments. This has the advantage that
no equalization is required; the drawback is that there is no frequency diversity. Remember that
frequency diversity is mainly provided by signal components that are more than one channel
coherence bandwidth apart.
Thus, it is inversely proportional to the square of the bandwidth. On the positive side, appropriate
signal-processing schemes can not only mitigate these effects but even exploit them to obtain time
diversity. Note that the situation here is dual to wideband systems, where delay dispersion can be
a drawback, but equalizers can turn them into an asset by exploiting frequency diversity.
Intermodulation: the BS needs to transmit multiple speech channels, each of which is active the
whole time. Typically, a BS uses 20–100 frequency channels. If these signals are amplified by the
same power amplifier, third-order modulation products can be created, which lie at undesirable
frequencies – i.e., within the transmit band. We thus need either a separate amplifier for each
speech channel, or a highly linear amplifier for the composite signal – each of these solutions
makes a BS more expensive.
It is for these reasons that FDMA is mostly used for the following applications:
• Analog communications systems: here, FDMA is the only practicable multiple access method.
• Combination of FDMA with other multiple access methods: the spectrum allocated for a service
(or a network operator) is divided into larger sub bands, each of which is used for serving a group
of users. Within this group, multiple access is done by means of another multiple access method –
e.g., TDMA or CDMA.
• High-data-rate systems: the disadvantages of FDMA are mostly relevant if each user requires
only a small bandwidth – e.g., 20 kHz. The situation can be different for wireless Local Area
Networks (LANs), where a single user requires a bandwidth on the order of 20 MHz, and only a
few frequency channels are available.
TDMA is a more efficient, but more complicated way of using FDMA channels. In a TDMA
system each channel is split up into time segments, and a transmitter is given exclusive use of one
or more channels only during a particular time period. For example, in North American TDMA
(also known as Interim Standard 54) each channel is essentially divided into three timeslots. A
maximum of three transmitters take turns sending in their assigned timeslots. A conversation,
then, takes place during the time slots to which each transmitter (base and mobile) is assigned.
TDMA requires a master time reference to synchronize all transmitters and receivers.
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
TDMA was the first digital standard to be proposed, and is attractive to current cellular operators
because it allows existing analog customers to continue using the network as digital capability is
added. Under IS-54, channel bandwidth remains 30 kHz and the data format on the control
channels remains identical to those under AMPS. Voice channels are designated as either analog
or digital, and analog cell phones continue to operate as they do under AMPS since they will
always be assigned to analog voice channels. Dual-mode and digital-only phones are assigned
digital voice channels where they are available. Base stations can be converted to digital
capability as demand and funding allow.
In TDMA the system dimensions are divided along the time axis into non overlapping channels,
and each user is assigned a different cyclically-repeating timeslot, as shown in Figure . These
TDMA channels occupy the entire system bandwidth, which is typically wideband, so some form
of ISI mitigation is required. The cyclically repeating timeslots imply that transmission is not
continuous for any user. Therefore, digital transmission techniques which allow for buffering are
required. The fact that transmission is not continuous simplifies overhead functions such as
channel estimation, since these functions can be done during the timeslots occupied by other
users. TDMA also has the advantage that it is simple to assign multiple channels to a single user
by simply assigning him multiple timeslots.
A major difficulty of TDMA, at least for uplink channels, is the requirement for synchronization
among the different users. Specifically, in a downlink channel all signals originate from the same
transmitter and pass through the same channel to any given receiver. Thus, for flat-fading
channels, if users transmit on orthogonal timeslots the received signal will maintain this
orthogonality. However, in the uplink channel the users transmit over different channels with
different respective delays. To maintain orthogonal timeslots in the received signals, the different
uplink transmitters must synchronize such that after transmission through their respective
channels, the received signals are orthogonal in time. This synchronization is typically
coordinated by the base station or access point, and can entail significant overhead. Multipath can
also destroy time-division orthogonality in both uplinks and downlinks if the multipath delays are
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
a significant fraction of a timeslot. TDMA channels therefore often have guard bands between
them to compensate for synchronization errors and multipath. Another difficulty of TDMA is that
with cyclically repeating timeslots the channel characteristics change on each cycle. Thus,
receiver functions that require channel estimates, like equalization, must re-estimate the channel
on each cycle. When transmission is continuous, the channel can be tracked, which is more
efficient. TDMA is used in the GSM, PDC, IS-54, and IS-136 digital cellular phone standards.
TDMA is a more efficient, but more complicated way of using FDMA channels. In a TDMA
system each channel is split up into time segments, and a transmitter is given exclusive use of one
or more channels only during a particular time period. For example, in North American TDMA
(also known as Interim Standard 54) each channel is essentially divided into three timeslots. A
maximum of three transmitters take turns sending in their assigned timeslots. A conversation,
then, takes place during the time slots to which each transmitter (base and mobile) is assigned.
TDMA requires a master time reference to synchronize all transmitters and receivers.TDMA was
the first digital standard to be proposed, and is attractive to current cellular operators because it
allows existing analog customers to continue using the network as digital capability is added.
Under IS-54, channel bandwidth remains 30 kHz and the data format on the control channels
remains identical to those under AMPS. Voice channels are designated as either analog or digital,
and analog cell phones continue to operate as they do under AMPS since they will always be
assigned to analog voice channels. Dual-mode and digital-only phones are assigned digital voice
channels where they are available. Base stations can be converted to digital capability as demand
and funding allow.
(SDMA) is a multiple access format for systems with multiple antennas; it can be combined with
all of the other multiple access methods. The so-called duplexing,”which separates transmission
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
and reception at a transceiver. The goal of all these methods is to maximize spectral efficiency –
i.e., to maximize the number of users per unit bandwidth. As mentioned above, there is also a
different (though related) question:
How can we design a system so that the number of users per unit bandwidth and unit area is
maximized? This goal obviously requires multiple BSs, and the assignment of spectral resources
to them. All this leads us to the cellular principle.
Space-Division Multiple Access (SDMA) is a channel access method based on creating parallel
spatial pipes next to higher capacity pipes through spatial multiplexing and/or diversity, by which
it is able to offer superior performance in radio multiple access communication systems. In
traditional mobile cellular network systems, the base station has no information on the position of
the mobile units within the cell and radiates the signal in all directions within the cell in order to
provide radio coverage. These results in wasting power on transmissions when there are no
mobile units to reach, in addition to causing interference for adjacent cells using the same
frequency, so called co-channel cells. Likewise, in reception, the antenna receives signals coming
from all directions including noise and interference signals. By using smart antenna technology
and differing spatial locations of mobile units within the cell, space-division multiple access
techniques offer attractive performance enhancements. The radiation pattern of the base station,
both in transmission and reception, is adapted to each user to obtain highest gain in the direction
of that user. This is often done using phased array techniques.In GSM cellular networks, the base
station is aware of the mobile phone's position by use of a technique called "timing advance"
(TA). The Base Transceiver Station (BTS) can determine how distant the Mobile Station (MS) is
by interpreting the reported TA. This information, along with other parameters, can then be used
to power down the BTS or MS, if a power control feature is implemented in the network. The
power control in either BTS or MS is implemented in most modern networks, especially on the
MS, as this ensures a better battery life for the MS and thus a better user experience (in that the
need to charge the battery becomes less frequent). This is why it may actually be safer to have a
BTS close to you as your MS will be powered down as much as possible. For example, there is
more power being transmitted from the MS than what you would receive from the BTS even if
you are 6 m away from a mast. However, this estimation might not consider all the MS's that a
particular BTS is supporting with EM radiation at any given time.
Features
Unlike traditional mobile cellular network systems, where the base station is tied up, radiating
radio signals in all directions within the cell, with no knowledge of the location of mobile devices,
SDMA architecture enables the channeling of radio signals based on the mobile devices'
locations.
In this way, SDMA architecture not only protects the quality of radio signals, safeguarding
against interference causing noise and signal degradation coming from adjacent cells, but also
saves on redundant signal transmission in areas where mobile devices are not currently active or
unavailable.
Packet Radio
Packet radio access schemes break data down into packets, and each of the packets is transmitted
over the medium independently. In other words, each packet is like a new user that has to fight for
its “own” resources. This allows the transport medium to be exploited much more efficiently
when the data traffic from each user is bursty, as is the case for Web browsing, file downloads,
and similar data applications.
Packet radio shows two main differences from TDMA and FDMA:
Each packet has to fight for its own resources, as described above. The most common methods
for resource allocation are ALOHA systems, Carrier Sense Multiple Access (CSMA), and packet
reservation (polling). 2. Each packet can be routed to the RX in different ways – i.e., via different
relay stations. This aspect does not play a major role in cellular systems, where connection can
only be to the closest BS,5 but it does play an important role in wireless ad hoc and sensor
networks, where each wireless device can act as a relay for information originating from another
wireless device.Appropriate routing is thus a very important aspect of sensor networks.This
method has better spectral efficiency; the drawback is that the tables can become quite large,
especially at nodes in the middle of a network. A related topic is “route discovery” – i.e.,
determination of which route a packet should take from the transmitter to the receiver. Route
discovery is typically done by means of special packets that are broadcast in the network, and
record the quality of the links between different nodes. In order to achieve optimum performance,
routing has to be changed whenever the channel between nodes changes significantly.
In packet radio (PR) access techniques, many subscribers attempt to access a single channel in an
uncoordinated (or minimally coordinated) manner. Transmission is done by using bursts of data.
Collisions from the simultaneous transmissions of multiple transmitters are detected at the base
station receiver, in which case an ACK or NACK signal is broadcast by the base station to alert
the desired user (and all other users) of received transmission. The ACK signal indicates an
acknowledgment of a received burst from a particular user by the base station, and a NACK
(negative acknowledgment) indicates that the previous burst was not received correctly by the
base station. By using ACK and NACK signals, a PR system employs perfect feedback, even
though traffic delay due to collisions may be high.
Packet radio multiple access is very easy to implement, but has low spectral efficiency and may
induce delays. The subscribers use a contention technique to transmit on a common channel.
AlOHA protocols, developed for early satellite systems, are the best examples of contention
techniques. ALOHA allows each subscriber to transmit whenever they have data to send. The
transmitting subscribers listen to the acknowledgment feedback to determine if transmission has
been successful or not. If a collision occurs, the subscriber waits a random amount of time, and
then retransmits the packet.
The advantage of packet contention techniques is the ability to serve a large number of
subscribers with virtually no overhead. The performance of contention techniques can be
evaluated by the throughput (T), which is defined as the average number of messages successfully
transmitted per unit time, and the average delay (D) experienced by a typical message burst.
Spread spectrum techniques spread information over a very large bandwidth – specifically, a
bandwidth that is much larger than the inverse of the data rate. In this, we discuss various ways of
providing multiple access by spreading the spectrum. We start out with the conceptually most
simple approach, Frequency Hopping (FH). We then proceed to the most popular form of spread
spectrum, Direct Sequence–Code Division Multiple Access (DS-CDMA). Finally, we elaborate
on time-hopping impulse radio, a relatively new scheme that has gathered interest in recent years
because of its application to ultra wideband systems.
“spread spectrum” comes from the military area, where the main interest lies in keeping
communications stealthy, safe from intercept, and safe from jamming efforts by hostile
transmitters – issues that do not top the list of concerns of cellular operators.1 It thus seems
astonishing that spread spectrum approaches have attained such an important role in wireless
communications.
In a spread spectrum
ctrum communication system users employ signals which occupy a significantly
larger bandwidth than the symbol rate. Such a signalling scheme provides some advantages which
are primarily of interest in secure communication systems, e.g., low probability of intercept or
robustness to jamming. In this problem we explore the inherent multiple access capability of
spread spectrum signalling, i.e., the ability to support simultaneous transmissions in the same
frequency band.
One user employs the following signal set to transmit equally likely binary symbols
Now, a second users transmits one of the following signals with equal probability
Both signals are transmitted simultaneously, such that the received signal is given by
(1)
Where is the noise process and indicate which symbol each of the users is
transmitting. We are interested in receiving the first user's signal in the presence of the second
(interfering) user.
Find the probability of error of your receiver from part (a) for distinguishing
between and if the received signal is given by (1). Which value does the
the presence of the interfering signal , i.e., if the received signal is given by (1). Note: You
do not need to find the probability of error for this receiver.
Indicate the locations of the relevant signals and the decision regions for fo your receiver in a
suitably chosen and accurately labeled signal space. Indicate also the decision boundary formed.
Capacity is a concern in any wireless communications system. High demand for cellular service,
especially in large urban markets, has created a need to serve a greater number of users in a
limited amount of frequency space. Cellular system operators are looking for new ways to fit
more users into their increasingly crowded network, and many are choosing to move ffrom the
existing analog transmission technology to one of the competing digital standards. These
standards are also being selected by the new PCS providers as they begin to build out their own
networks. Although digital systems provide a variety of benefits,
benefits, this month we'll focus on two
main digital access methods and their effect on system capacity.
Almost all current and proposed digital standards are based on either Time Division Multiple
Access (TDMA) or Code Division Multiple Access (CDMA). These two methods are
fundamentally different and incompatible with each other, but each claim to able to support
anywhere from three to more than twenty times the number of simultaneous callers than the
current AMPS cellular standard, which uses Frequency Division Multiple Access (FDMA).
We derive an expression for the system capacity of a cellular network in which power
equalization (PE) is applied only to the mobile stations (MS) that have stronger channel, while
there is no power equalization for those with weaker
weaker channel. Power equalization means
adjustment of the transmit power of each MS in order to have the sanle received power at the
base station (BS). Systems that use matched filter receiver need power equalization. In general,
however, if another reception strategy is used, the system capacity is higher if there is no power
equalization. Although this strategy is optimal for the sum rate capacity, it will give an advantage
to users staying very close to the BS, and is not fair. In this paper we consider a combined
co model
in which the power equalization is done partially, i.e., stations that are closer to the BS equalize
their transmit powers, while the others do not. For that reason, we define a cut-off
cut rate beyond
which no MS can transmit. This corresponds to an equivalent cut-off off radius in the cell within
Outside the cut-off radius all users can transmit with their maximal power (i.e. no PE is applied to
them), such that the overall system capacity is increased. We derive a closed form expression in
terms of the hyper geometric functions for the system capacity when partial power equalization
Is applied and the channel is Gaussian. The main purpose of this paper is like to study the
possibility of using the rate splitting multiple access (RSMA) on cellular communications. From
theoretical point of view maximum achievable rates of multiple access channels have been well
understood for long time the transmit power is affected by large scale path loss, shadowing and
small scale path loss (fast fading). Power equalization (PE) is an operation that adjusts the
transmit power of mobile units in such a way that the mean received power is the same for all
units. It should not be mixed with power control (PC), that is an operation that allocates transmit
power to the transmit antennae according to the channel state information obtained from the
training sequence, in order to maximize some objective function such as the throughput of the
resulting channel. In this paper we consider only power equalization.
Note that in both cases, PE and PC, the transmitter must have information about the channel, but
for the PE this information is much smaller (a pilot signal might be used for that) than for the
power control case where real channel estimation is needed (training sequence). For systems that
use nlatch filter receiver, perfect power equalization is necessary. In general, however, if we use
another reception strategy, the system capacity is higher if there is no power equalization at all.
In authors analyze a cellular system by comparing its spectral efficiency of a spread spectrum
multiple access (SSMA) scheme and of the ideal interference cancellation multiple access
scheme. The latter gives the theoretical upper bound on the maximal sum-rate. Authors conclude
that there is a big gap between the two schemes. They also observe that another huge
improvement could be obtained if power equalization is not used. Although this strategy is
optimal for the sunl rate, it will give an advantage to users staying very close to the BS, and is not
fair, and therefore not applicable in practice. To that end we propose a combined model in which
users that are close to the BS are equalized but those who are further are not. We define a cut-off
rate beyond which no user can transmit. This corresponds to an equivalent (since there is a
random fading) cut-off radius in the cell within which the transmit power of users has to be scaled
such that all of them have the same receive power. Outside the cut-off radius all users can
transmit with their maximal power, such that the overall system capacity is maximized. A pure
case without power equalization, although theoretically more efficient, does not have practical
importance.
WIRELESS NETWORKING
Difference between wireless and fixed telephone networks
Transfer of information in the public switched telephone network (PSTN) takes place over land-
line trunked lines (called trunks) comprised of fiber optic cables, copper cables, microwave links,
and satellite links. The network configurations in the PSTN are virtually static, since the network
connections may only be changed when a subscriber changes residence and requires
reprogramming at the local central office (CO) of the subscriber. Wireless networks, on the other
hand, are highly dynamic, with the network configuration being rearranged every time a sub-
scriber moves into the coverage region of a different base station or a new market. While fixed
networks are difficult to change, wireless networks must reconfigure themselves for users within
small intervals of time (on the order of seconds) to provide roaming and imperceptible handoffs
between calls as a mobile moves about. The available channel bandwidth for fixed networks can
be increased by installing high capacity cables (fiber optic or coaxial cable), whereas wireless
networks are constrained by the meager RF cellular bandwidth provided for each user’s wireless
and fixed telephone network.
The PSTN is a highly integrated communications network that connects over 70% of the world’s
inhabitants. In early 2001, the International Telecommunications Union estimated that there were
1 billion public landline telephone numbers, as compared to 600 million cellular telephone
Numbers. While landline telephones are being added at a 3% rate, wireless subscriptions are
interexchange service. In the US, there are about 2000 telephone companies, although the Bell
Operating Companies (BOCs) are the most widely known.. Each local exchange consists of a
central office (CO) which provides PSTN connection to the customer premises equipment (CPE)
which may be an individual phone at a residence or a private branch exchange (PBX) at a place of
business. The CO may handle as many as a million telephone connections. The CO is connected
to a tandem switch which in turn connects the local exchange to the PSTN. The tandem switch
physically connects the local telephone net-work to the point of presence (POP) of trunked long
distance lines provided by one or more IXCs [Pec92]. Sometimes IXCs connect directly to the
CO switch to avoid local transport charges levied by the LEC.
Throughout the world, first generation wireless systems (analog cellular and cordless tele-phones)
were deployed in the early and mid 1980s. As first generation wireless systems were being
introduced, revolutionary advances were being made in the design of the PSTN by land-line
telephone companies. Until the mid 1980s, most analog landline telephone links throughout the
world sent signaling information along the same trunked lines as voice traffic. That is, a single
physical connection was used to handle both signaling traffic (dialed digits and telephone ringing
commands) and voice traffic for each user. The overhead required in the PSTN to handle
signaling data on the same trunks as voice traffic was inefficient, since this required a voice trunk
to be dedicated during periods of time when no voice traffic was actually being carried.
Throughout the world, first generation wireless systems (analog cellular and cordless tele-phones)
were deployed in the early and mid 1980s. As first generation wireless systems were being
introduced, revolutionary advances were being made in the design of the PSTN by land-line
telephone companies. Until the mid 1980s, most analog landline telephone links throughout
the world sent signaling information along the same trunked lines as voice traffic. That is, a single
physical connection was used to handle both signaling traffic (dialed digits and telephone ringing
commands) and voice traffic for each user. The overhead required in the PSTN to handle
Fixed wireless
Non portable portable
Cost of fiber +copper+coaxial cable i Cost is less
Bandwidth fixed in advance Not so
Static in nature Dynamic in nature
Difficult to find path break if any No path break
Infrastructure is required Infrastructure is required
Handoff minimum More Handoff
First generation cellular and cordless telephone networks are based on analog technology. All first
generation cellular systems use FM modulation, and cordless telephones use a single base station
to communicate with a single portable terminal. A typical example of a first generation cellular
telephone system is the Advanced Mobile Phone Services (AMPS) system used in the United
States .Basically; all first generation systems use the transport architecture.
First generation cellular radio network, which includes the mobile terminals, the base stations,
and MSCs. In first generation cellular networks, the sys-tem control for each market resides in the
MSC, which maintains all mobile related information and controls each mobile handoff. The
MSC also performs all of the network management functions, such as call handling and
processing, billing, and fraud detection within the market. The Until the early 1990s, US cellular
customers that roamed between different cellular systems had to register manually each time they
entered a new market during long distance travel. This required the user to call an operator to
request registration. In the early 1990s, US cellular carriers implemented the network protocol
standard IS-41 to allow different cellular systems to automatically accommodate subscribers who
roam into their coverage region. This is called interoperator roaming. IS-41 allows MSCs of
different service providers to pass information about their subscribers to other MSCs on demand.
All second generation systems use digital voice coding and digital modulation. The systems
employ dedicated control channels within the air interface for simultaneously exchanging voice
and control information between the subscriber, the base station, and the MSC while a call is in
progress. Second generation systems also provide dedicated voice and signaling trunks between
MSCs, and between each MSC and the PSTN.
In contrast to first generation systems, which were designed primarily for voice, second
generation wireless networks have been specifically designed to provide paging, and other data
services such as facsimile and high-data rate network access. The network controlling structure is
more distributed in second generation wireless systems, since mobile stations assume greater
control functions. In second generation wireless networks, the handoff process is mobile-
controlled and is known as mobile assisted handoff .The mobile units in these networks perform
several other functions not performed by first generation subscriber units, such as received power
reporting, adjacent base station scanning, data encoding, and encryption and will serve both
0 64.0 kbps 1
The amount of traffic capacity required in a wireless network is highly dependent upon the type
of traffic carried. For example, a subscriber’s telephone call (voice traffic) requires dedicated
network access to provide real-time communications, whereas control and signaling traffic may
be bursty in nature and may be able to share network resources with other bursty users.
Alternatively, some traffic may have an urgent delivery schedule while some may have no need to
be sent in real-time. The type of traffic carried by a network determines the routing services,
proto-cols, and call handling techniques which must be employed.
Two general routing services are provided by networks. These are connection-oriented services
(virtual circuit routing), and connectionless services (datagram services). In connection-oriented
routing, the communications path between the message source and destination is fixed for the
entire duration of the message, and a call set-up procedure is required to dedicate network
resources to both the called and calling parties. Since the path through the network is fixed, the
traffic in connection-oriented routing arrives at the receiver in the exact order it was transmitted.
A connection-oriented service relies heavily on error control coding to provide data protection in
case the network connection becomes noisy. If coding is not sufficient to protect the traffic, the
call is broken, and the entire message must be retransmitted from the beginning.
Connectionless routing, on the other hand, does not establish a firm connection for the traffic, and
instead relies on packet-based transmissions. Several packets form a message, and each individual
packet in a connectionless service is routed separately. Successive packets within the same
message might travel completely different routes and encounter widely varying delays throughout
the network. Packets sent using connectionless routing do not necessarily arrive in the order of
transmission and must to be reordered at the receiver. Because packets take different routes in a
connectionless service, some packets may be lost due to network or link failure; however others
may get through with sufficient redundancy to enable the entire message to be recreated at the
receiver. Thus, connectionless routing often avoids having to retransmit an entire message, but
requires more overhead information for each packet. Typical packet over-head information
includes the packet source address, the destination address, the routing information, and
information needed to properly order packets at the receiver. In a connectionless service, a call
set-up procedure is not required at the beginning of a call, and each message burst is treated
independently by the network.
Connectionless services exploit the fact that dedicated resources are not required for message
transmission. Packet switching (also called virtual switching) is the most common technique used
to implement connectionless services and allows a large number of data users to remain virtually
connected to the same physical channel in the network. Since all users may access the network
randomly and at will, call set-up procedures are not needed to dedicate specific circuits when a
particular user needs to send data. Packet switching breaks each message into smaller units for
transmission and recovery . When a message is broken into packets, a certain amount of control
information is added to each packet to provide source and destination identification, as well as
error recovery provisions.
Sequential format of a packet transmission. The packet consists of header information, the user
data, and a trailer. The header specifies the beginning of a new packet and contains the source
address, destination address, packet sequence number, and other routing and billing information.
The user data contains information which is generally protected with error control coding. The
trailer contains a cyclic redundancy checksum which is used for error detection at the receiver.
Structure of a transmitted packet, which typically consists of five fields:
In contrast to circuit switching, packet switching (also called packet radio when used over a
wireless link) provides excellent channel efficiency for bursty data transmissions of short length.
An advantage of packet-switched data is that the channel is utilized only when sending or
receiving bursts of information. This benefit is valuable for the case of mobile services where the
available bandwidth is limited. The packet radio approach supports intelligent protocols for data
flow control and retransmission, which can provide highly reliable transfer in degraded channel
conditions. X.25 is a widely used packet radio protocol that defines a data interface for packet
switching .
X.25 was developed by CCITT (now ITU-T) to provide standard connectionless network access
(packet switching) protocols for the three lowest layers (layers 1, 2, and 3) of the open systems
interconnection (OSI) model (see Figure for the OSI layer hierarchy). The X.25 protocols provide
a standard network interface between originating and terminating subscriber equipment
The hierarchy of X.25 protocols in the OSI model. The Layer 1 protocol deals with the electrical,
mechanical, procedural, and functional interface between the sub-scriber (DTE), and the base
station (DCE). The Layer 2 protocol defines the data link on the common air-interface between
the subscriber and the base station. Layer 3 provides connection The X.25 protocol does not
specify particular data rates or how packet-switched networks are implemented. Rather, X.25
provides a series of standard functions and formats which give structure to the design of software
that is used to provide packet data on a generic connectionless network.
As discussed in Section 10.5, circuit switching is inefficient for dedicated mobile data services
such as facsimile (fax), electronic mail (e-mail), and short messaging. First generation cellular
systems that provide data communications using circuit switching have difficulty passing modem
signals through the audio filters of receivers designed for analog, FM, common air-interfaces.
Inevitably, voice filtering must be deactivated when data is transmitted over first generation
cellular networks, and a dedicated data link must be established over the common air-interface.
The demand for packet data services has, until recently, been significantly less than the demand
for voice services, and first generation subscriber equipment design has focused almost solely on
voice-only cellular communications. However, in 1993, the US cellular industry developed the
cellular digital packet data (CDPD) standard to coexist with the conventional voice-only cellular
system. In the 1980s, two other data-only mobile services called ARDIS and RAM Mobile Data
(RMD) were developed to provide packet radio connectivity throughout a network.
CDPD is a data service for first and second generation US cellular systems and uses a full 30kHz
AMPS channel on a shared basis. CDPD provides mobile packet data connectivity to existing data
networks and other cellular systems without any additional band-width requirements. It also
capitalizes on the unused air time which occurs between successive radio channel assignments by
the MSC (it is estimated that for 30% of the time, a particular cellular radio channel is unused, so
packet data may be transmitted until that channel is selected by the MSC to provide a voice
circuit). CDPD directly overlays with existing cellular infrastructure and uses existing base station
equipment, making it simple and inexpensive to install. Furthermore, CDPD does not use the
MSC, but rather has its own traffic routing capabilities. CDPD occupies voice channels purely on
a secondary,noninterfering basis, and packet channels are dynamically assigned (hopped) to
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
different cellular voice channels as they become vacant, so the CDPD radio channel varies with
time. As with conventional, first generation AMPS, each CDPD channel is duplex in nature. The
forward channel serves as a beacon and transmits data from the PSTN side of the network, while
the reverse channel links all mobile users to the CDPD network and serves as the access channel
for each subscriber. Collisions may result when many mobile users attempt to access the network
simultaneously. Each CDPD simplex link occupies a 30 kHz RF channel, and data is sent at
19,200 bps. Since CDPD is packet-switched, a large number of modems are able to access the
same channel on an as needed, packet-by-packet basis. CDPD supports broadcast, dispatch,
electronic mail, and field monitoring applications. GMSK BT = 0.5 modulation is used so that
existing analog FM cellular receivers can easily detect the CDPD format without redesign.
CDPD transmissions are carried out using fixed-length blocks. User data is protected using a
Reed–Solomon block code with 6-bit symbols. For each packet, 282 user bits are coded into 378
bit blocks, which provide correction for up to eight symbols. Two lower layer protocols are used
in CDPD. The mobile data link protocol (MDLP) is used to convey information between data link
layer entities (layer 2 devices) across the CDPD air interface. The MDLP provides logical data
link connections on a radio channel by using an address contained in each packet frame. The
MDLP also provides sequence control to maintain the sequential order of frames across a data
link connection, as well as error detection and flow control. The radio resource management
protocol (RRMP) is a higher, layer 3 protocol used to manage the radio channel resources of the
CDPD system and enables an M-ES to find and utilize a duplex radio channel without interfering
with standard voice services. The RRMP handles base-station identification and configuration
messages for all M-ES stations, and provides information that the M-ES can use to determine
usable CDPD channels without knowledge of the history of channel usage. The RRMP also
handles channel hopping commands, cell handoffs, and M-ES change of power commands.
CDPD version 1.0 uses the X.25 wide area network (WAN) subpro-file and frame relay
capabilities for internal sub networks.
In first generation cellular systems, the SS7 family of protocols, as defined by the Integrated
System Digital Network (ISDN) are used to provide CCS. Since network signaling traffic is
bursty and of short duration, the signaling channel may be operated in a connectionless fashion
where packet data transfer techniques are efficiently used. CCS generally uses variable length
packet sizes and a layered protocol structure. The expense of a parallel signaling channel is minor
compared to the capacity improvement offered by CCS throughout the PSTN, and often the same
physical network connection (i.e., a fiber optic cable) carries both the user traffic and the network
signaling data.
As more users subscribe to wireless services, backbone networks that link MSCs together will
rely more heavily on network signaling to preserve message integrity, to provide end-to-end
connectivity for each mobile user, and to maintain a robust network that can recover from
failures.CCS forms the foundation of network control and management functions in second and
third generation networks. Out-of-band signaling networks which connect MSCs throughout the
world enable the entire wireless network to update and keep track of specific mobile users,
wherever they happen to be. Figure illustrates how an MSC is connected to both the PSTN and
the signaling network.
Network A Network B
The STP controls the switching of messages between nodes in the CCS network. For higher
reliability of transmission (redundancy), SEPs are required to be connected to the SS7 network
(described in Section 10.8) via at least two STPs. This combination of two STPs in parallel is
known as a mated pair, and provides connectivity to the network in the event one STP fails. The
SMS contains all subscriber records, and also houses toll-free databases which may be accessed
by the subscribers. The DBAS is the administrative database that maintains service records and
investigates fraud throughout the network. The SMS and DBAS work in tandem to provide a
wide range of customer and network provider services, based on SS7.
In telephony, Common Channel Signaling (CCS), in the US also Common Channel Interoffice
Signaling (CCIS), is the transmission of signaling information (control information) on a separate
channel from the data, and, more specifically, where that signaling channel controls multiple data
channels.
For example, in the public switched telephone network (PSTN) one channel of a communications
link is typically used for the sole purpose of carrying signaling for establishment and tear
down of telephone calls. The remaining channels are used entirely for the transmission of voice
data. In most cases, a single 64kbit/s channel is sufficient to handle the call setup and call clear-
down traffic for numerous voice and data channels.
The logical alternative to CCS is Channel Associated Signaling (CAS), in which each bearer
channel has a signaling channel dedicated to it.
CCS offers the following advantages over CAS, in the context of the PSTN:
Greater trunking efficiency due to the quicker set up and clear down, thereby reducing traffic on
the network
The most common CCS signaling methods in use today are Integrated Services Digital
Network (ISDN) and Signaling System 7 (SS7).
ISDN signaling is used primarily on trunks connecting end-user private branch exchange (PBX)
systems to a central office. SS7 is primarily used within the PSTN. The two signaling methods are
very similar since they share a common heritage and in some cases, the same signaling messages
are transmitted in both ISDN and SS7.
CCS is distinct from in-band or out-of-band signaling, which are to the data band what CCS and
CAS are to the channel.
work that has been created to complement the PSTN for more flexible and efficient network
access and signaling and may be thought of as a parallel world-wide network for sig-naling
traffic that can be used to either route voice traffic on the PSTN or to provide new data services
between network nodes and the end-users.
ATM is a packet switching and multiplexing technique which has been specifically designed to
handle both voice users and packet data users in a single physical channel. ATM data rates vary
from low traffic rates (64 kbps) over twisted pair to over 100 Mbps over fiber optic cables for
high traffic rates between network nodes. ATM supports bidirectional transfer of data packets of
fixed length between two end points, while preserving the order of transmission.
ATM data units, called cells, are routed based on header information in each unit (called a label)
that identifies the cell as belonging to a specific ATM virtual connection. The label is determined
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
upon virtual connection of a user, and remains the same throughout the transmission for a
particular connection. The ATM header also includes data for congestion control, priority
information for queuing of packets, and a priority which indicates which ATM packets can be
dropped in case of congestion in the network.
ATM cells (packets) have a fixed length of 53bytes, consisting of 48 bytes of data and 5 bytes of
header information. Fixed length packets result in simple implementation of fast packet switches,
since packets arrive synchronously at the switch [Ber92]. A compromise was made in selecting
the length of ATM cells to accommodate-date both voice and data users.
The SS7 signaling protocol is widely used for common channel signaling between interconnected
networks (see Figure, for example). SS7 is used to interconnect most of the cellular MSCs
throughout the US, and is the key factor in enabling autonomous registration and auto-mated
roaming in first generation cellular systems.
ATM is a packet switching and multiplexing technique which has been specifically designed to
handle both voice users and packet data users in a single physical channel. ATM data rates vary
from low traffic rates (64 kbps) over twisted pair to over 100 Mbps over fiber optic cables for
high traffic rates between network nodes. ATM supports bidirectional transfer of data packets of
fixed length between two end points, while preserving the order of transmission.ATM data units,
called cells, are routed based on header information in each unit (called a label) that identifies the
cell as belonging to a specific ATM virtual connection. The label is determined upon virtual
connection of a user, and remains the same throughout the transmission for a particular
connection. The ATM header also includes data for congestion control, priority information for
queuing of packets, and a priority which indicates which ATM packets can be dropped in case of
congestion in the network.
ISDN should not be mistaken for its use with a specific protocol, whereby ISDN is employed as
the network, data-link and physical layers in the context of the OSI model. In a broad sense ISDN
can be considered a suite of digital services existing on layers 1, 2, and 3 of the OSI model. ISDN
is designed to provide access to voice and data services simultaneously.
However, common use reduced ISDN to be limited to Q.931 and related protocols, which are a
set of protocols for establishing and breaking circuit switched connections, and for
advanced calling features for the user. They were introduced in 1986.
In a videoconference, ISDN provides simultaneous voice, video, and text transmission between
individual desktop videoconferencing systems and group (room) videoconferencing systems.
The switch - known as the Service Switching Point (SSP) - forwards the call over a Signaling
System 7 (SS7) network to a Service Control Point (SCP) where the service logic is located.
In some cases, the call can be handled more quickly by an Intelligent Peripheral (IP) that is
attached to the Service Switching Point over a high-speed connection. For example, a customized
voice announcement can be delivered in response to the dialed number or a voice call can be
analyzed and recognized.
In addition, an "adjunct" facility can be added directly to the Service Switching Point for high-
speed connection to additional, undefined services.
One of the services that AIN makes possible is Local Number Portability (LNP).
AIN
Capabilities
Release
Release 0 Trigger checkpoints at off-hook, digit collection and analysis, and
routing points of call
Code gapping to check for overload conditions at SCP
75 announcements at the switching system
Based on ANSI TCAP issue 1
Release Adds a formal call model that distinguishes the originating half of
0.1 the call from the terminating half
Additional triggers
254 announcements at the switching system
Based on ANSI TCAP issue 2
Release Adds Phase 2 Personal Communication Service (PCS) support
0.2 Voice Activated Dialing (VAD)
ISDN-based SSP-IP interface
Busy and no-answer triggers
Next events list processing at SCP
Default routing
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
Release 1 A full set of capabilities
UNIT 7
In the cellular industry, system capacity is a great issue. As demand for cellular service grows,
system operators try to find ways to increase system capacity. Capacity can be increased by
reducing the cell sizes. This is called the conventional microcell approach, but it does not provide
intelligence. When the cell size becomes smaller, the control of interference among the cells
becomes harder. Also, the handoff time from the beginning of the initiation to the action
completion sometimes may take around 15 s. If a mobile station is moving at a speed of 25 km/h
(7 m/s), then the mobile station will travel 105 m in 15 s; at a speed of 50 km/h, the mobile station
travels 205 m in 15 s. Because within a microcell of 0.5-km radius the overlapped region for a
handoff is very small, then the mobile station is in the overlapped region too short a time for the
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
handoff action to be complete. As a result, the call drops. In a conventional microcell system,
interference is hard to control and the handoffs may not have enough time to complete.
The intelligent cell can solve the two problems. The intelligent cell concept can be used not only
in microcells but also in regular cells to bring extra capacity to the system.
There are two definitions to describe an intelligent cell. One definition of intelligent cell is that
the cell is able to intelligently monitor...
In the cellular industry, system capacity is a great issue. As demand for cellular service grows,
system operators try to find ways to increase system capacity. Capacity can be increased by
reducing the cell sizes. This is called the conventional microcell approach, but it does not provide
intelligence. When the cell size becomes smaller, the control of interference among the cells
becomes harder. Also, the handoff time from the beginning of the initiation to the action
completion sometimes may take around 15 s. If a mobile station is moving at a speed of 25 km/h
(7 m/s), then the mobile station will travel 105 m in 15 s; at a speed of 50 km/h, the mobile station
travels 205 m in 15 s. Because within a microcell of 0.5-km radius the overlapped region for a
handoff is very small, then the mobile station is in the overlapped region too short a time for the
handoff action to be complete. As a result, the call drops. In a conventional microcell system,
interference is hard to control and the handoffs may not have enough time to complete.
The intelligent cell can solve the two problems. The intelligent cell concept can be used not only
in microcells but also in regular cells to bring extra capacity to the system.
There are two definitions to describe an intelligent cell. One definition of intelligent cell is that
the cell is able to intelligently monitor where the mobile unit or portable unit is and find a way to
deliver confined power to that mobile unit. The other definition of intelligent cell is that signals
coexist comfortably and indestructibly with the interference in the cell. From the first definition,
the intelligent cell is called the power-delivery intelligent cell, and from the second definition, it is
called the processing-gain intelligent cell. The intelligent cell may be a large cell such as a
microcell or a small cell such as a microcell. The intelligent cell increases capacity and improves
performance of voice and data transmission. Because personal communication service (PCS)
needs vast capacity and high quality, the intelligent cell concept is well-suited to it. Actually,
using any means intelligently in a cell to improve the performance of services is what the
intelligent many different wireless versions of an intelligent cell can be used as long as they can
deliver power to the location of the mobile unit. The easiest explanation is the analogy of a person
entering a house in a conventional microcell or microcell, when a mobile unit t cell stands for
In the cellular industry, system capacity is a great issue. As demand for cellular service grows,
system operators try to find ways to increase system capacity. Capacity can be increased by
reducing the cell sizes. This is called the conventional microcell approach, but it does not provide
intelligence. When the cell size becomes smaller, the control of interference among the cells
becomes harder. Also, the handoff time from the beginning of the initiation to the action
completion sometimes may take around 15 s. If a mobile station is moving at a speed of 25 km/h
(7 m/s), then the mobile station will travel 105 m in 15 s; at a speed of 50 km/h, the mobile station
travels 205 m in 15 s. Because within a microcell of 0.5-km radius the overlapped region for a
handoff is very small, then the mobile station is in the overlapped region too short a time for the
handoff action to be complete. As a result, the call drops. In a conventional microcell system,
interference is hard to control and the handoffs may not have enough time to complete.
Advanced intelligent networks have become a buzz word in telecommunications today. Each
carrier has its own version and interpretation of these smart networks, but virtually all use SS7 to
implement their AIN. While each version may differ, the concept of AIN is the same. Before calls
are sent to their final destination, the network queries a database asking, "What should I do with
this phone call?" The response determines how the call is handled. This is a tremendous saving of
resources, since the call does not have to be attempted if the remote end is busy. In addition, if
offers all kinds of advanced features, such as distinctive ring, caller ID, 900 number blocking,
enhanced Toll-Free features, etc.
Advanced intelligent networks operate over SS7 (Signaling System 7). SS7 is an industry
standard for transmitting signaling information in a switched network. It is designed to efficiently
transfer information between network Signaling Points and interconnected networks.
SS7 utilizes out-of-band signaling to improve call processing setup times. Signaling information
is sent ahead of a call, over a separate channel, to establish and control network connections. This
set-up information includes supervisory signals (answer, non-answer), billing information (who
called whom and for how long) and network management signals such as maintenance test signals
and routing information.
In-Building Communication
In an intelligent macro cell or microcell, when a mobile unit enters a cell or a sector, the cell site
covers only a local area, which follows the mobile unit. This is just like a house that turns on only
the light of the first room a person enters. When the person enters the second room, the light of
the first room is turned off and the light of the second room is turned on. Therefore, the light of
only one room is on at a time and not the lights in the whole house. When the lights of the entire
house A and the lights of the entire house B are on, the two houses should be largely separated in
order to avoid the light being seen from one house to the other. If the light of only one room of
house A and house B is on, the light that can be seen from one house to the other house is
relatively weak. Thus, the distance between the two houses can be much closer.
This same analogy can be applied to a cellular system. In a cellular system, the frequency reuse
scheme is implemented for the purpose of increasing spectrum efficiency. If two co channel cells
(cells that use the same frequency) can be placed much closer, then the same frequency channel
World Institute Of Technology
8km milestone ,Sohna Palwal Road , NH-71 B ,Sohna , Gurgaon ,Haryana.
Website : www.wit.net.in E-mail : [email protected]
can be used more frequently in a given geographical area. Thus, the finite number of frequency
channels can provide many more traffic channels, and both system capacity and spectrum
efficiency can be further increased. In order to reduce the separation between two co channel
cells, the power of each cell should be reduced to cover merely one of numerous local areas in a
cell if the cell operator is intelligent enough to know in which local area the mobile unit or
handset is. Therefore, there are two required conditions:
1. The cell operator has to know where the mobile unit is located. Different resolution methods
can be used to locate the mobile unit.
2. The cell operator has to be able to deliver power to that mobile unit. If the power transmitted
from the cell site to the mobile unit can be confined in a small area (analogous to the light of a
small room turning on when a person enters it), co channel interference reduces, and the system
capacity increases.
In the cellular industry, system capacity is a great issue. As demand for cellular service grows,
system operators try to find ways to increase system capacity. Capacity can be increased by
reducing the cell sizes. But it does not provide intelligence, because when the cell size becomes
smaller, the control of interference among the cells becomes harder. The intelligent cell is able to
intelligently monitor where the mobile unit or portable unit is and find a way to deliver confined
power to that mobile unit. The intelligent cell increases capacity and improves performance of
voice and data transmission. Because personal communication service (pcs) needs vast capacity
and high quality, the intelligent cell concept is well-suited to it. Actually, using any means
intelligently in a cell to improve the performance of services is what the intelligent cell stands for.
A cellular network is a radio network distributed over land areas called cells, each served by at
least one fixed-location transceiver known as a cell site or base station. When joined together
these cells provide radio coverage over a wide geographic area. This enables a large number of
portable transceivers (e.g., mobile phones, pagers, etc.) to communicate with each other and with
fixed transceivers and telephones anywhere in the network, via base stations, even if some of the
transceivers are moving through more than one cell during transmission.
Increased capacity
In a cellular radio system, a land area to be supplied with radio service is divided into regular
shaped cells, which can be hexagonal, square, circular or some other irregular shapes, although
hexagonal cells are conventional. Each of these cells is assigned multiple frequencies (f1 - f6)
which have corresponding radio base stations. The group of frequencies can be reused in other
cells, provided that the same frequencies are not reused in adjacent neighboring cells as that
would cause co-channel interference.
The increased capacity in a cellular network, compared with a network with a single transmitter,
comes from the fact that the same radio frequency can be reused in a different area for a
completely different transmission. If there is a single plain transmitter, only one transmission can
be used on any given frequency. Unfortunately, there is inevitably some level of interference from
the signal from the other cells which use the same frequency. This means that, in a standard
FDMA system, there must be at least a one cell gap between cells which reuse the same
frequency.
In the simple case of the taxi company, each radio had a manually operated channel selector knob
to tune to different frequencies. As the drivers moved around, they would change from channel to
channel. The drivers know which frequency covers approximately what area. When they do not
receive a signal from the transmitter, they will try other channels until they find one that works.
The taxi drivers only speak one at a time, when invited by the base station operator.