Wireless & Mobile Communication
Wireless & Mobile Communication
Wireless & Mobile Communication
1 Wireless
Communication
Fundamentals
CONTENTS
Evolution of Mobile Radio 1-3A to 1-3A
Part-l
Communication Fundamentals
1-3A to 1-5A
Part-2 : General Model of Wireless.....
Communication Link
1-5A to 1-7A
Part-3: Types of Signals
Part-4 : Cellular Infrastructure, 1-7A to 1-12A
Frequency Reuse
Communication
....... 1-26A to 1-29A
Part-13: Free Space Propagation Model
1-1A (EC-Sem-7)
1-2A (EC-Sem-7) Wireless Communication Fundamentals
1-38A to 1-40A
Part-17 : Wireless Channel Modelling :
AWGN Channel
PART- 1
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1. In the year 1887 Heinrich Hertz proves existence of EM waves.
2. Gugliemo Marconi developed the world's first commercial radio service
in 1897.
3. The first use of mobile radio in an automobile was in 1921. Early radio
telephone systems were too bulky.
4 The key technological breakthrough came in 1935, when Edwin
Armstrong introduced frequency modulation (FM) to improve radio
broadcasting.
5. This technology reduced the required bulk of radio equipment and
improved transmission quality.
6 In 1946, Bell telephone labs inaugurated the first mobile system for
public. The system was known as mobile telephone service (MTS).
7 In 1965, Bell system introduced inproved version of MTS known as
improved mobile telephone service (IMTS), which was the first automatic
mobile system and full duplex in nature.
8. The ability to provide wireless communication to an entire population
was made possible by Bell laboratories with the development of cellular
concept in 1960s and 1970s.
9. With the development of highly reliable, miniature, solid state radio
frequency hardware in the 1970s, the wireless communication era was
born.
PART-2
Questions-Answers
Que 1.2, Draw and explain the general model for wireless digital
communication link.
Answer
1. Fig. 1.2.1 provides a block diagram ofa digital communications link.
Information Source Channel
Encryptor Modulator
Source encoder encoder
RF
upconversion
Wireless
channel
RF down
conversion
Modulatorldemodulator stage :
1. The modulation method to be used should be selected based on the
channel characteristics.
2. Corrections should take place before demodulation to reduce the
probability of errors.
3 The modulator block generates a signal suitable for the transmission
channel.
4 The block in the reverse path does the opposite of those in the forward
path.
Intermediate frequency/radio frequency stage :
1 After the modulator, we have a typical RF or microwave transmitter.
2 The signal is converted up to an IF and then further upconverted to a
higher RF. Any undesirable signal produced by the upconversion is
filtered out.
3 Depending upon the requirements, the power amplifier is selected for
amplifying the power to cover the required transmission distance.
4 The receiver RF section provides efficient coupling between the antenna
and the rest of the hardware, which utilizes the energy abstracted from
the radio wave.
PART-3
Types of Signals.
Questions-Answers
PART-4
Questions-Answers
Answer
1. The design process of selecting and allocating channels groups for all of
the cellular base stations within a system is called frequency reuse or
frequency planning.
1-8A (EC-Sem-7) Wireless Communication Fundamentals
2. The cellular frequency reuse concept is shown in Fig. 1.5.1. Cells with
the same letter use the same set of frequencies. Acell cluster is outlined
in bold and replicated over the coverage area.
3. In this example, the cluster size N is equal to 7 and the frequency reuse
factor is L/7, since each cell contains one-seventh of the total number of
available channels.
G
A
B G
G A
A D
F E
Answer
A Limitations of mobile telephone systems :
1. Limited service capability,
2. Poor service performance,
3. Ineficient frequency spectrum utilization.
B. Verification of co-channel cell of cluster size N= / +j+ij:
1. Acandidate cell has 6 nearest co-channel cells. By joining the centers of
the 6 nearest neighbouring co-channel cells, we form a large hexagon
as shown in Fig. 1.6.1. This large hexagon has radius equal to D, which
is alsothe co-channel cell separation.
Small
hexagon
Large
hexagon R
D
Fig. 1.6.1.
2. With the cell radius R, we have
N. =3N .(1.6.2)
Answer
PART-5
Questions-Answers
PART-6
Questions-Answers
PART-7
Questions-Answers
Answer
A Evolution of mobile radio communication fundamentals :
Refer Q. 1.1, Page 1-2A, Unit-1.
B. Operation of cellular systems : The operation of cellular systems
can be divided into several parts and a handoff procedure :
i. Mobile unit initialization :
1 When a user activates the receiver of the mobile unit, the receiver
selects the strongest channel and locks on for a certain time. Since each
site is assigned a different set up channel, locking onto the strongest set
up channel usually means selecting the nearest cellsite.
2 This self-location scheme is used in the idle stage and is user independent.
It has a great advantage because it eliminates the load on the transmission
at the cell site for locating the mobile unit.
ii. Mobile originated call :
1 The user places the called number into an originating register in the
mobile unit, checks to see that the number is correct, and pushes the
"send" button.
1-16 A (EC-Sem-7)
Wireless Communication Fundamentals
2.
Arequest for service is sent on a selected set-up channel obtained form
a self-location scheme.
3. The cell site receives it, and in directional cell
directive antenna for the voice channel to use. sites, selects the best
4. At the same time the cell site sends a
request to the
switching office (MTSO) via a high-speed data link. mobile telephone
5. The MTSOselects an appropriate voice channel for the call, and the
site acts on it through the best directive antenna to link the mobile
cell
unit.
iii. Call termination : When the mobile user
turns off the transmitter, a
particular signal (signaling tone) transmits to the cell site, and both sides
free the voice channel. The mobile unit resumes
monitoring pages
through the strongest set-up channel.
iv. Handoff procedure:
1. During the call, two parties are on a voice channel. When the mobile
unit moves out of the coverage area of a particular cell site, the reception
becomes weak. The present cell site requests a handoff.
2. The system switches the call to a new frequency channel in a new cell
site without either interrupting the call or altering the user.
PART-8
Questions-Answers
Answer
We can divide the channel assignment strategies into two parts:
i. Fixed channel assignment strategy:
1. Fixed channel assignment strategy depicts that a fixed set of frequencies
(voice channels) is allocated to each cell.
2. Maximum number of calls that can be attempted depend on the number
of voice channels.
3 If allthe channels in acell are found occupied then the callis blocked
and no service will be delivered to the subscriber. In this strategy, an
approach is sometimes adopted that is known as borrowing approach.
Wireless & Mobile Communication 1-17A (EC-Sem-7)
PART-9
Handoff Strategies.
Questions-Answers
Answer
A. Frequency reuse concept : Refer Q. 1.5, Page 1-8A, Unit-1.
B. Handoff :
1 The handoff operation not only involves identifying a new base station,
channels
but also requires that the voice and control signals be allocated to
associated with the new base station.
2. Many handoff strategies prioritize handoff requests over call initiation
requests when allocating unused channels in a cell site. I andoffs must
be performed successfully and as infrequently as possible, and be
imperceptible to the users. In order to meet these requirements, system
designers must specify an optimum signal
3. In order tomeet these requirements, system designers must specify an
optimum signal level at which to initiate a handoff.
1-18A (EC-Sem-7) Wireless Communication Fundamentals
4. Once a particular signal level is specified as the minimum usable signal
for acceptable voice quality at the base station receiver, a slightly stronger
signal level is used as a threshold at which handoff is made.
5. This margin given by
A=Phandof - D
rminimum usable
cannot be too large or too small.
6 If Ais larger unnecessary handoffs which burden the MSC may occur,
and if Ais too small, there may be insufficient time to complete a handoff
before a call is lost due toweak signal conditions.
C. Handoff strategies :
i. Forced handoff :
1 When there is a drop in the measured signal level due to momentary
fading and not due to the actual moving mobile away from the base
station, in that situation if the handoff of a call takes place then such
handof is known as forced handoff.
ii. MAHO:
1 In mobile assisted handoff (MAHO), every mobile station measures the
received power from surrounding base stations and continually reports
the result of these measurements of signals to the serving base station.
2 A
handoff is initiated when the power received from the base station of
a neighbouring cell begins to exceed the power received from the current
base station by a certain value or for a certain period of time.
3 The MAHOmethod enables the call to be handed over at a much faster
rate than in first generation analog systems.
iii. Soft handoff :
1. The soft handoffis applied to CDMA system. In CDMA systems, all cells
can use the same radio carrier. Therefore, the frequency reuse factor K
approaches one.
2. Since the operating radio carriers of all cells are the same, there is no
need to change from one frequency to another frequency but to change
from one code to another code. Thus there is no hard handoff. We call
this kind of handoff a soft handoff.
Que l.16. How prioritizinghandoffs technique is used to decrease
the probability of forced termination of a call due to lack of available
channels ? AKTU2015-16, Marks 7.5
Answer
1 Queuing of handoffs requests is a method to decrease the probability of
forced termination of a call due to lack of available channel.
Wireless & Mobile Communication 1-19 A (EC-Sem-7)
2 Queuing of handoffs is possible due to the fact that there is a finite time
interval between the time the received signal level drops below the
handoff threshold and the time the call is terminated due to insufficient
signal level.
3. The delay time and size of the queue is determined from the traffic
pattern of the particular service.
4. Queuing does not guarantee azero probability of forced termination, as
large delay will cause the received signal level to drop below the minimum
acceptable and hence lead to forced termination.
Que 1.17. Discuss umbrella cell approach with diagram to enhance
the connectivity in mobile communication.
AKTU2015-16, Marks 7.5
Answer
1 In practical cellular systems, several problems arise when attempting to
design fora wide range of mobile velocities.
2 This problem is solved by using different antenna heights over same
tower and different power levels. This technique is called umbrella cell
approach and is used to provide large area coverage to high speed users,
while providing small area coverage to low speed users.
3 This minimizes the high speed user's handoff and reduces the burden of
MSC. This approach is shown in Fig. 1.17.1.
Large "Umbrella"
cell for high -Small microcells
speed traffic for low speed traffice
PART-10
Cellular Interferences.
Questions-Answers
Long Answer Type and Medium Answer Type
Questions
Answer
1. Ifthere is interference from the signals that are adjacent in frequency
to the desired signal, it is called adjacent channel interference.
2. It results from not having enough separation between the adjacent
channels or having an imperfect receiver filter that allows nearby
frequencies to enter into the passband as shown in Fig. 1.19.1(b).
20 x
User B
User A Base
Desired
station
mobile B
Interfering
mobile A
(a)
Channel 1 Channel 1
f
Desired mobile B Interfering mobile A
with low power with high power overwhelming
the desired frequency
Dotted line indicates when both mobiles
are equidistant from base station
(b)
Fig. 1.19.1. Adjacent channel interference (a)Interference created by
near-far problem (b) Interference shown on frequency axis with
relative powers of both channels for mobiles A and B.
PART-11|
Sectorization.
Questions-Answers
o
2
31.62 x 2 = (V3N)
3N= 7.9 or N= 2.650
Hence, N=3.
Answer
A. Coverage : Coverage is defined as the maximum distance that a given
user of interest can be from the base station and still have reliable
received signal strength at the base station.
B. Capacity: Capacity of system is defined as the maximum of the product
of the number of users per cell times the user spectral eficiency for a
given maximum outage probability.
C. Techniques used to increase the capacity of a cellular system :
i. Cell splitting: Refer Q. 1.4, Page 1-7A, Unit-1.
ii. Cell sectoring:Refer Q. 1.20, Page 1-22A, Unit-1.
ii. Microcell zone concept.
iv. Increasing number of repeaters.
D. Comparision :
SNo. Parameters Cell splitting Sectoring Microcell zone concept
3.
Interference Interference gets Co-channel interference Interference is reduced.
increased due to nearer is reduced.
co-channel cells.
4 System System capacity incre ases System capacity System capacity
capacity
due to increase in the increases by increase in increases without any
number of clusters. the SIR. degradation in trunking
efficiency.
Radius of cell decreases. Radius of cell remains Radius of cell incre ases.
5 Radius of
cell unchanged.
Cost increases due to new Cost increases due to Cost decreases due to
base stations. more antennas. less base stations.
6 Cost
PART- 12
Wireless Channel and Radio Communication.
Wireless & Mobile Communication 1-25A (EC-Sem-7)
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1. Awireless channel is a dielectric unguided medium that
can be analysed
in the following different ways:
By using the fundamentals of electromagnetic (EM) wave
as phase velocity, phase propagation constant, theory, such
and phase. amplitude, frequency,
By using ray theory, refractive index dependence, reflection, refraction
and diffraction of EM waves (rays).
ii. By using the fundamentals of digital signal
processing (DSP) such as
channel transfer function, spectrum, channel impulse response (CIR)
and convolution with transmitting signal.
2 The channel can act as a low-pass or band-pass filter in certain
conditions.
3 The channel characteristic is of a random nature and depends upon the
situation; hence, probability theory and the concept of probability
distribution function (PDF)can be applied to wireless channels.
Que 1.24. Discuss in brief the radio wave propagation.
Answer
1 The mechanisms behind electromagneticwave propagation can
be attributed to reflection, diffraction and scattering.
generally
2. Most cellular radio systems operate in urban areas where there is no
direct line-of-sight path between the transmitter and receiver, and where
the presence of high-rise buildings causes severe diffraction loss.
3. Due to multiple reflections from various objects, the electromagnetic
waves travel along different paths of varying lengths.
4. The interaction between these waves causes multipath fading at a specific
location and the strengths of the waves decreases as the distance
between the transmitter and receiver increases.
5 Propagation models that predict the mean signal strength for an arbitrary
transmitter receiver (T-R) separation distance are useful in estimating
the radio coverage area of transmitter and are called large scale
propagation models,since they characterize signal strength over large
T-R separation distances.
1-26 A (EC-Sem-7) Wireless Communication Fundamentals
PART- 13
Free Space Propagation Model.
Questions-Answers
Answer
A Free space propagation model :
1. The free space propagation model is used to predict received signal
strength when transmitter and receiver have a clear, unobstructed
line-of-sight path between them.
2. The free space model predicts that received power decays as a function
of the T-R separation distance raised to some power (i.e., a power law
function).
3. The free space power received by a receiver antenna which is separated
from radiating transmitter antenna by a distance d, is given by the Friüs
free space equation.
Pd) =P(d,)
7. IfP is in units of dBm, the received power is given by
P.(d,)
P(d) dBm =10 log 0.001W + 20 log :dzd, 2d,
where P(d) is in units of watts.
Que 1.27.A transmitter has a power output of 150 watt at a carrier
frequency of 32.5 MHz. It is connected to an antenna with gain of
12 dBi. The receiving antenna is 10 km away and has gain of 5dBi.
Caleulate the power delivered tothe receiver, assuming free space
propagation. Assume also that there are no losses or mismatches in
the system. AKTU2018-19, Marks 10
Answer
Given: Transmitter power, P, = 150 W, Carrier frequency,
f=32.5 MHz, Transmitter antenna gain, G, = 12 dBi= 15.85
Receiving antenna gain, G, =5 dBi = 3.16, d = 10 km
To Find: Power delivered to receiver P.(d).
P(d) = 10 log
(4n d?
= 10 log
150 x15.85 x 3.16 x(3 x 102
(4n) x (10 x10°} x(32.5 x 105
= 10log 4.06 x 10-5
P(d) = 43.9 dBW
Answer
PART- 14
Channel Noise and Losses.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
i Free space loss:
1. The free space loss occurs as the signal travels through space without
any other effects attenuating the signal it will still diminish as it spreads
out.
Wireless & Mobile Communication 1-31A (EC-Sem-7)
2. This can be thought of as the radio communications signal spreading out
as an ever increasing sphere.
3. As the signal has to cover a wider area, conservation of energy tells us
that the energy in any given area will reduce as the area covered becomes
larger.
ii. Ground reflection loss:
1. In multi-hop refraction each time the radio wave is reflected from the
earth, RF energy is lost.
2. The amount of RF energy lost depends upon the angle of incidence,
frequency of the wave, surface irregularities and electrical characteristics
of earth.
iüi. Diffraction loss:
1. If direct LOS is obstructed by a single knife-edge type of obstacle, with
height h mas shown in Fig. 1.30.1, then the diffraction parameter v can
be defined as,
V= ...(1.30.1)
hm
T7
Answer
1. The two ray ground reflection model shown in Fig. 1.31.1 is a useful
propagation model that is based on geometric optics, and considers both
1-32A (EC-Sem-7) Wireless Communication Fundamentals
Eos
Enor =ELos +Eg
R (receiver)
h,
E, =E h,
ELoS d
h,- h,
h,
h,
h, - h,
h.
Fig. 1.31.2. The method of images used to find the path difference
between the line-of-sight and the ground reflected paths.
Wireless & Mobile Communication 1-33A (EC-Sem-7)
PART- 15
Fading in Land Mobile System, Multipath Fading, Fading Efects
on Signal and Frequency.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
A Fading :
1.
The phenomenon of time variation of the received signal power caused
by changes in the transmission medium or path is generally referred to
as fading.
2. It is essentially caused by the reception of multiple reflections of the
transmitted signal.
3 Fading is a key inherent problem of wireless channels.
down into the
B. Types : The mechanism of fading is normally broken relative to
following two categories based on the position of the receiver
the transmitter :
a. Large-scale fading:
1. Large-scale fading occurs due to the following major reasons :
Attenuation in free space : Power degrades with the increase in
i.
distance.
ii. Shadows : Signals are blocked by obstructing structures.
attenuation of
2. Large-scale fading essentially represents the average
wireless signal as it travels a long distance.
3. Mathematically, large-scale fading can be realized by a log-normally
distributed fluctuation superimposed on a mean path loss that is distance
dependent.
b. Small-scale fading:
1.
Small-scale fading occurs due to the following major reasons :
1-34 A (EC-Sem-7) Wireless Communication Fundamentals
T,
t
T.S +t
t<<T,
S() H) R()
-f
and T, >> 0,
where, T is the reciprocal bandwidth (e. g., symbol period)
B, is the bandwidth of the transmitted modulation
o, the rms delay spread and
B. is the coherence bandwidth of the channel.
ii. Frequency selective fading:
1. Frequency selective fading is due to time dispersion of the transmitted
symbols within the channel. Thus the channel induces intersymbol
irterference (ISI).
2. Fig.1.34.2, illustrates the characteristics of a frequency selective fading
channel.
3. For frequency selective fading, the spectrum S() of the transmitted
signal has a bandwidth which is greater than the coherence bandwidth
B, of the channel.
4. Frequency selective fading is caused by multipath delays which approach
or exceed the symbol period of the transmitted symbol.
s(t) r(t)
h(t ,t)
s(t) h(t ,t) r(t)
t
T,
T
0 T, T, +
S() H) R()
f -f
f
Answer
multipath time delay
A Types of small scale fading based on
spread: Refer Q. 1.34, Page 1-34A, Unit-1.
B. Difference :
Frequency selective fading
S.No. Flat fading
bandwidth of
1. The coherence bandwidth of The coherence
smaller than the
channel is
channel is larger than the bandwidth ofthe signal.
bandwidth of the signal.
Different frequency
2 All frequency components of componentsof signal
signal experience the same
experience decorrelated fading.
magnitude of fading.
3. The channel gain is equal for The channel gain may vary for
different frequencies of
all frequency components of the transmitted signal.
transmitted signal.
power delay
Que 1.36. Explain various important parameters of
AKTU 2015-16, Marks 05
profile of multipath channel.
Answer
excess delay spread
1 The mean excess delay, rms delay spread, and
be determined from
(X dB) are multipath channel parameters that can characterize the
are used to
a power delay profile. These parameters
channel in time domain.
profile
2. The mean excess delay is the first moment of the power delay
and is defined as:
T=
...(1.36. 1)
EP()
moment of
3. The rms delay spread is the square root of the second central
the power delay profile and is defined to be
...(1.36.2)
where
k ...(1.36.3)
P(r,)
4. The maximum excess delay (X dB) of the power delay profile is defined
tobe the time delay during which multipath energy falls to XdB below
the maximum.
1-38A (EC-Sem-7) Wireless Communication Fundamentals
PART- 16
Shadowing.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1 Shadowing is the effect that causes the received signal power to fluctuate
because of the objects obstructing the propagation path between the
transmitter and receiver.
2 These fluctuations are experienced on local mean power that is short
term average of fluctuations due to multipath fading.
3 Shadowing complicates practical cell planning. To fully predict local
shadow attenuation, up-to-date and highly detailed terrain databases
are needed.
4. If one extends the distinction between large area and small area
shadowing, the definition of shadowing covers any statistical fluctuation
of the received local mean power about a certain area mean power, with
the latter determined by large-scale mechanisms.
5. Multipath propagation is separated from shadow fluctuations by
considering the local mean powers.
6. With shadowing, the interference power accumulates more rapidly than
"roportional to the number of signals. The accumulation of multiple
signals with shadowing is a relevant factor in the planning of cellular
networks.
PART- 17
Wireless Channel Modelling, AWGN Channel.
Questions-Answers
Long Answer Type and Medium Answ r Type Questions
Wireless & Mobile Communication 1-39 A (EC-Sem-7)
Answer
1. The simplest mathematical model of the radio channel is the additive
white Gaussian noise (AWGN) channel. It is a very good model for
physical reality as long as the thermal noise at the receiver is the only
source of disturbance.
2. The AWGN channel model can be characterized as follows :
The noise is additive:
1. The received signal equals the transmit signal plus some noise, where
the noise is statistically independent of the signal.
2. The noise w(t) is an additive random disturbance of the useful signal
s(t); that is, the received signal is given by
r(t) = s(t) + wt)
ii. The noise is white :
1. It has constant PSD. Therefore, the autocorrelation of the noise in time
domain is zero for any non-zero time offset.
2. The one-sided PSD is usually denoted by N,. Thus, N/2 is the two-sided
PSD and WN, is the noise inside the noise bandwidth W.
3. The unit ofN, is W/IHz,. Usually, N, is written as dBm/Hz.
iii. The noise samples have a Gaussian distribution.
1 The Gaussian PDF with variance o² is given by
1 -p-i-m)'/22
px) =
Py(f)
W KW Gaussian or 'normal'
distribution
N2
-fo (a)
P,) A
-36-26 -o 0X 2o 3o
(b) (c)
PART-18|
Rayleigh Fading Channel Model.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1 The basic model of Rayleigh fading assurnes a received multipath signal
to consist of a large number of reflected waves with independent and
identically distributed (ILID) in phase and quadrature amplitudes.
2 Rayleigh distribution is a good model for channel propagation there is
no strong LOS path from the transmitter to the receiver and where the
base station is hidden behind a building several blocks away and the
arriving signal is bouncing off many scattering objects in the local area.
3 In the time domain, Rayleigh fading looks like periodic peaks of 10 dB or
less interspersed between deep troughs of 40 dB or more. These deep
fades (nulls in signal power) will typically occur at separations of half a
wavelength.
Non-fade period Non-fade period
Signal
amplitude
Threshold
amplitude
Cumulative
R)
< -0.1
(r 0.1
probability
0.01 0.01
LIE.3
1E.3
1E.4 -1E.4
40 30 -20 -10 0 10
PART- 19
Rician Fading Channel Model.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
E = Eo+E,e0,
n =1
142A(EC-Sem-7) Wireless Communication Fundamentals
where ,the constant term represents the direct path and the summation
represents the collection of reflected paths. This model is referred to as
a Rician fading model.
2 The analysis proceeds in a manner similar to that of the Rayleigh fading
case, but with the addition of a constant term.
3. Akey factor in the analysis is the ratio of the power in the direct path to
the power in the reflected paths. This ratio is referred to as the Rician
K-factor, defined as
K= N
n=1
fpr) =
ge-bts'/2d, 20
R
<
((r/s)
Pr 0.1
distribution
K-5 dB
0.01
Amplitude K= 10 dB
K= 13 dB
1E.3
1E.4LLT
-20 -18 -16 -14 -12 -10 -8 6 4 0 2 4 6
PART-20
Nakagami Fading Channel Model.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1 Besides Rayleigh and Rician fading, a refined model suggested for the
PDF of signal amplitude exposed to mobile fading is the Nakagami fading
model. The distribution of the amplitude and signal power can be used to
findthe probabilities on signal outages.
2 In wireless communication the main role of the Nakagamimodel can be
summarized as follows:
It describes the amplitude of the received signal after maximum ratio
diversity combining.
The sum of multiple I.I.D. Rayleigh fading signals has a Nakagami
distributed signal amplitude.
ii. Nakagamidistribution matches some empirical data better than the
other models.
iv. Nakagami fading occurs for multipath scattering with relatively large
delay time spreads and with different clusters of reflected waves.
V. The Rician and Nakagami models behave approximately equivalently
near their mean value.
PART-21
Okumura and Hata Path L08s Model.
Questions-Answers
5. This model is well suited for large cell mobile systems, but not for personal
communications systems (PCS) which have cells of the order of 1 km
radius.
6. This model predicts the median path loss in three types of environment:
urban, suburban and rural areas. The median path loss in dB for these
three environments are given by,
L =A +B log,d (dB) Urban
Ls =A +B log, d-C (dB) Suburban
L =A+ B log,od-D (dB) Open
where d is the range in kilometers from BS to MS.
C. Durkin's model :
1. This model was developed by Durkin and Edward.
2. This model consists of acomputer simulator, for predicting field strength
over irregular terrain.
3. This was adopted by joint radio committee (JRC) in the U.K for the
estimation of mobile coverage area.
4. The simulator predicts large scale phenomena (i.e., path loss) and the
losses caused by obstacles in a radio path.
5. The execution of path loss simulator consists two parts :
i. The first part accesses the topographic data base of a proposed service
area and reconstructs the ground profile information.
ii. The second part calculates the expected path loss along the radial.
PART-22
Questions-Answers
Answer
1 A channel can be modeled by two approaches: physical and statistical.
Reflection, multipath, attenuation, and so on are considered in the
physical approach, whereas input-output elements and transaction
probabilities are considered in the statistical approach.
146A (EC-Sem-7) Wireless Communication Fundamentals
PART-23
Flat Channel Modeling.
Questions-Answers
a Zm - I
m
pdf, (a) = exp
T(m) 2
m=
(a'-9
7. Nakagami and Rice distribution are quite similar and each can be
approximately converted to the other for m>1:
(K +1)² m- m
m= and K=
(2 K+1) m -m'-m
8. The movement of the mobile station leads to a frequency shift of the
arriving waves (Doppler effect). If the sinusoidal wave of frequency f, is
transmitted, the spectrum of the received signal is
1
Y()« pdf, () G() +pdf, (- y)G(-)
--f
Here, f is the variable for the frequency, f.
C
is the extreme new
frequency due to Doppler effect as other than f, and it varies in the
range - f.<f <fe
C C
and 0 elsewhere, v isthe velocity or speed of
movement, y is the angle between the directions of incidence of the
move and the direction of movement, and G (y) is the antenna pattern.
9 For the case when the waves are all incident horizontally and are
uniformly distributed in azimuth and the antenna has a uniform pattern
in azimuth, we get
1
vlf)
-(f- f
Wireless & Mobile Communication 1-49 A (EC-Sem-7)
10. The Rayleigh or Rice fading is small-scale fading since it describes the
variation of the amplitude within an area of about ten wavelengths.
PART-24
Wideband Time-Dispersive Channel Modeling.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
CONTENTS
.2-2A to 2-3A
Part-1 : Theory of Vocoders
...... 2-3A to 2-5A
Part-2 : Types of Vocoders
Part-3: Spread Spectrum Modulation 2-5A to 2-6A
2-1 A (EC-Sem-7)
2-2 A (EC-Sem-7) Spread Spectrum and Diversity
PART-1
Theory of Vocoders.
Questions-Answers
Answer
Vocoders are a class of speech coding systems that analyze the voice
signal at the transmitter, transmit parameters derived from the analysis,
and then synthesize the voice at the receiver using those parameters.
Speech generation model:
1. Fig. 2.1.1 shows the speech generation model that is the basis of all
vocoding systems.
2.
The sound generating mechanism forms the source and the vocal tract
filter forms the system.
Second source
Noise source Vocal
Speech
Tract output
Filter
Pulse source
Speech
input |Analyzer
Transmission
5. When the speech is unvoiced, the output of the filter is asmaller voltage
than we encounter for voiced speech. Using a detector we can then
determine by noting the output of filter at detector side whether the
speech is voiced or unvoiced.
6. At the vocoder receiver, the signal is demultiplexed and decoded and
converted back into analog form. Corresponding to each filter-rectifier
combination at the encoder,abalanced amplitude modulator and band
pass filter is provided at the decoder.
PART-2
Types of Vocoders.
Questions-Answers
Pitch
analysis
Encoder Decoder
Excitation
PART-3
Spread Spectrum Modulation.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1. Spread spectrum techniques were based on signalling schemes (code or
sequence) that greatly expand the transmitted spectrum relative to the
data rate.
2-6A (EC-Sem-7) Spread Spectrum and Diversity
PART-4
Questions-Answers
Answer
A. PN sequence (code) :
In a DS spread spectrum (DSSS) system, a unique code is used to spread
and despread the signal. This unique code in the DS is known as the
pseudo-noise (PN) sequence code. The PN sequence code, while
concatenated, appears as a random sequence to an unauthentic user.
B. PN sequence generator:
1 In the case of FH or TH, the PN sequence is used to generate the
hopping frequency or the hopping time slots.
Wireless & Mobile Communication 2-7A (EC-Sem-7)
Output
Fig. 2.5.1. Six-stage generator of a maximum length PN sequence.
2 APN code is periodic. Adigital shift register cireuit with output feedback
can generate a sequence with long period and low susceptibility to
structural identification by an outsider.
3 The bit rate of aPN code is called the chip rate (1/t,ehip2, the smallest time
increment in the sequences of certain period or duration is thip and is
known as a time chip. The total period consists of N,timechips.
4 The most widely known binary PN sequences are the maximum length
shift register sequences (m-sequences). Such a sequence which can be
generated by an m-stage shift register with suitable feedback connection,
has a length L=2m 1bits, Fig. 2.5.1 shows a shift register for m=6and
L=63.
C. Properties of PN code :
i. Autocorrelation :
1 The autocorrelation should be maximal for the DS or PN codes so that
correct PN signal can be identified at the receiver from the numerous
coexisting signals. The autocorrelation function of a typical PN sequence
is shown in Fig. 2.5.2.
R,(t)
Nçtehip
1/N,
Autocorrelation of PN code
-tehip chip
Fig, 2.5.2. Autocorrelation function (normalized)
for the codes with respect to time.
2 The autocorrelation of the spreading waveform (PN signal) c(t) is
represented mathematically as
Questions-Answers
Que 2.6. What are the different types of vocoders and describe
PN code Carrier fo
Fig. 2.6.1. Transmitter simplified diagram for biphase modulation.
2. While using quadriphase modulation, two MOD 2adders are used with
two alternate chips available from the PN code generator.
Wireless & Mobile Communication 2-9A (EC-Sem-7)
3 Two balanced modulators are fed with 90 phase shifted carriers. Adding
both the signals, the SSM RF output is obtained.
Receiver:
1 The diagram of a receiver is shown in Fig. 2.6.2. The receiver for a
spread signal must perform three distinct functions: detection of the
presence of a signal, carrier removal and despreading or demodulation
using a PN sequence.
2 Detection of signal and despreading operations can be either active or
passive.
Que 2.7. With the help of block diagram and suitable expressions
explain the generation and reception of direct sequence spread
spectrum (DSSS) signal using BPSK modulation.
AKTU2017-18, Marks 10
Answer
1 Adirect sequence spread spectrum (DSSS) system spreads the baseband
data by directly multiplying the baseband data pulses with a
pseudo-noise sequence that is produced by a pseudo-noise code
generator.
2. Asingle pulse or symbol of the PN waveform is called a chip.
3 Fig. 2.7.1 shows a functional block diagram of a DS system with binary
phase modulation.
4. Synchronized data symbols, which may be information bits or binary
channel code symbols, are added in modulo-2 fashion to the chips before
being phase modulated.
5 A coherent or differentially coherent phase-shift keying (PSK)
demodulation may be used in the receiver.
6. The received spread spectrum signal for a single user can be represented
as
Baseband S(t)
Message Transmitted
BPF signal
Oscillator
PN code
generator
Chip clock
(a)
Coherent Phase
Shift Keying or Received
Received Differential Phase data
Direct Sequence IF Wideband Shift Keying
Spread Spectrum Filter Demodulator
Signal at IF
IF Narrowband
Signal s, (t) Synchronization
System
PN Code
Generator
(b)
Answer
1 Near-far problem in a spread spectrum system relates to the problem of
very strong signals at the receiver swamping out the effects of weaker
signals.
2 Consider one transmitter is near the receiver; the other is far away
from the receiver. If both the transmitters transmit simultaneously
with equal powers, then the receiver will receive more power from the
nearer transmitter. This creates a difficulty in detecting the signal from
the farther transmitter.
3 As one transmission's signal is the other's noise, the SNR for the farther
transmitter must be much higher.
4 If the nearer transmitter transmits a signal that is orders of magnitude
higher than the farther transmitter, then the SNR for the farther
transmitter may be below the required value, making the signal
undetectable and the farther transmitter may just as well not transmit.
This effectively jams the communication channel.
5. The near-far problem is one of detecting and receiving a weaker signal
among the stronger signals. In order to maintain the strength of the
received signal level at the base station, power control is employed in
CDMA systems.
C- 1 bits
PN code
generator
Clock
Fig. 2.9.1. FHSS generator diagram.
3 As shown in Fig. 2.9.1, one bit comes from the message andc-1 bit
come from the PN code generator. The c - 1 bit from the PN code
generator then hop this FSK signal over the range of possible
frequencies.
4 There is a frequency multiplier K at the output of the system. It is to
increase the bandwidth and thereby increase the processing gain.
5. Considering again the fast hopping case, if Mfrequencies are separated
by f, = tin = k/t, then the signal bandwidth is given by
KM
B, =KM{, = tchip
6. Hence, the processing gain is calculated as
PG = B, KMI thip kKM Im
kKM
Bm 1/tm 1/tm
Wireless & Mobile Communication 2-13 A (EC-Sem-7)
PART-6
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Time
-M slots =2 intervals
c= length of PN code Transmitted bursts in which k
message bits are transmitted
Fig. 2.11.1. TH Concept.
2. The time axis is divided into intervals known as frames, and each frame
is subdivided into Mtime slots as shown in Fig. 2.11.1. The slots and
length of the m-sequence are related to each other by the relation
M= 2°.
3. During each frame, one and only one time slot is modulated with a
message by any reasonable modulation method.
4. The particular time slot chosen fora given frame is selected by means of
a PN code generator. Allthe message bits accumulated in the previous
frame are transmitted in a burst during the selected time slot.
5. The frame duration T, the number of message bits k, and the message
bit duration t, are related to each other by
T,=ktm
6. The width of each time slot in a frame is T,/M and the width of each bit
in the time slot is T/kM or simply t /M.
Processing gain :
PG = B, / B,, = 2t, /(tm / M) = 2M ; for biphase modulation
tm tm M) = M ; for quadriphase modulation
7. This indicates that the transmitted signal bandwidth is 2M times the
message bandwidth, and hence, the processing gain ofthe TH system is
twice the number of time slots in each frame when biphase modulation
is used and half this when quadriphase modulation is used.
8. Interference among simultaneous users in a TH system can be minimized
by coordinating the times at which each user can transmit a signal. This
also avoids the near-far problem. The acquisition time is similar to that
of DS systems for a given bandwidth. Implementation is simpler than in
an FH system.
Answer
1. The use of hybrid techniques attempt to capitalize upon the advantages
of a particular method while avoiding the disadvantages.
Wireless & Mobile Communication 2-15 A (EC-Sem-7)
2. DS, on one hand, suffers heavily from the near-far effect, which makes
this technique hard to apply to systems without the ability of power
control. On the other hand, its implementation is inexpensive.
3. The PN code generators are easy to implement and the spreading
operation itself can be simply performed by XOR ports.
4. FH effectively suppresses the near-far effect and reduces the need for
power control. However, implementation ofthe (fast) hopping frequency
synthesizer required for a reasonable spreading gain is more problematic
in terms of higher silicon cost and increased power consumption.
5. Applying both techniques allows for combining their advantages while
reducing the disadvantages. This results in a reasonable near-far
resistance at an acceptable hardware cost.
6.
Many different hybrid combinations are possible, some of which are
PN/FH, PN/TH, FH/TH and PN/FH/TH.
7. While designing a hybrid system, the designer should decide FFH or
SFH is to be applied. FFH increases the cost of the frequency synthesizer
but provides more protection against the near-far effect.
8 SFH combines a less expensive synthesizer with a poor near-far rejection
and the need for a more powerful error-correction scheme (several
symbols are lost during a hit jamming).
PART-7
Questions-Answers
Questions-Answers
Answer
1 Nyquist was the first to solve the problem of overcoming intersymbol
interference while keeping the transmission bandwidth low.
2 He observed that the effect of ISI could be completely nullified if the
overall response of the communication system is designed so that at
every sampling instant at the receiver, the response due to all symbols
except the current symbol is equal to zero.
3. Consider the impulse response
hkt) = sin (nt /T,) ...(2.14.1)
(rt ) /T.
This impulse response satisfies the Nyquist condition for ISI cancellation.
4 Therefore if the overall communication system can be modelled as a
filter with the impulse response of eq.(2.14.1), it is possible to eliminate
the effect of ISI.
5. The transfer function of the filter is given by
1 ..(2.14.2)
H,) = rect
-T 0 2T 3T 4T
-4T 31 -2T
Fig. 2.14.1. Nyquist ideal pulse shape for zero intersymbol interference.
6. Nyquist also proved that any filter with a transfer function having a
rectangular filter of bandwidth fo 1/s , convolved with any arbitrary
passband of the
even function Z(f) with zero magnitude outside the
rectangular filter, satisfies the zero ISI condition.
7 Mathematically,the transfer function of the filter which satisfies the
zero ISI condition can be expressed as
H = rect
fo
where,Z) =Z-D and Z(f) =0 for ffo 1/2T,.
2-18A (EC-Sem-7) Spread Spectrum and Diversity
8. Expressed in terms of the impulse response, the Nyquist criterion states
that any filter with an impulse response
sin (Tt /T) -z(t)
h_t) = t
can achieve ISI cancellation. Filters which satisfy the Nyquist criterion
are called Nyquist filters.
Hyolf)
1 0s|f| s (1- a)
27,
1 |f27T, -1+ (1-a) (1+ a)
HRe= 1+ cos s|f|s
2 2a 2T, 21,
(1+ a)
2
2T
where, a is the rolloff factor which ranges between 0 and 1.
4. When a =0, the raised cosine rolloff filter corresponds to a rectangular
flter of minimum bandwidth. The corresponding impulse response of
the filter is given by
TLat
sin sin
T
hnclt) = Tt 4at
1
Wireless & Mobile Communication 2-19 A (EC-Sem-7)
5. The impulse response of the cosine rolloff filter at baseband is plotted
in Fig. 2. 15.1, for various values of a.
6. As seen from Fig. 2.15.1 as the rolloff factor a increases, the bandwidth
of the filter also increases, and the time sidelobe levels decrease in
adjacent symbol slots. This implies that increasing a decreases the
sensitivity to timingjitter, but increases the occupied bandwidth.
7 The symbol rate R, that can be passed through a baseband raised cosine
rolloff filter is given by
1 2B
R, =
1+
where, B is the absolute filter bandwidth.
8 For RF systems, the RF passband bandwidth doubles and
B
R,= 1+
hRc(1)
-0 = 0
a= 0.5
a =1
het) = exp
6 Fig. 2.16.1 shows the impulse response of the baseband Gaussian filter
for various values of 3-dB bandwidth-symbol time product (BT).
a = 0.5
a = 0.75
a = 1.0
a = 2.0
PART-9
Detection Strategies.
Questions-Answers
Answer
1. The expected signal must be detected from among the various coexisting
signals at the receiving end.
2. Detection theory, or signal detection theory, is well established and is a
bearing
means to quantify the ability to differentiate between information
as noise) that distract
energy patterns and random energy patterns (such
from the information.
3. The basis for the signal detection theory is that nearly all reasoning and
decision-making takes place in the presence of some uncertainty.
4. Mostly, the threshold-based detection method is used but according to
of how a
the theory of detection, there are a number of determiners
level will
detecting system will detect a signal and where its threshold
be.Changing the threshold level will affect the ability todiscern between
useful and non-useful signal.
a
5 The aim of the detection problem is to determine whether there exists
signal or not.
6. Suppose there are two states H,and H, at detection hypothetically,
the required signal
level, only two states are possible-the presence ofmathematically this
within noise or only noise with no desired signal;
can be represented as follows :
k=0, 1,... N-1
H,:=s, +n, ; k= 0, 1, ...N-1
noise (AWGN)
where, the noise is assumed to be additive white Gaussian
at
with known or unknown variance, r, is the received signal sample
time instant k, n, is the noise process sample, and s, is the known signal
wavefornm.
arrival
7. The signal can be deterministic with unknown parameters such asT of the
function
time, phase and amplitude. Detection is based on some threshold is
received samples, which is compared to a threshold y. Ifthe
exceeded, it is decided that H, is true.
2-22 A (EC-Sem-7) Spread Spectrum and Diversity
Signal
Present Absent
Response
No Miss Correct rejection
PART- 10
Diversity Combining Techniques : Selection Combining Threshold
Combining, Equal Gain Combining, Maximum Ratio Combining.
Questions-Answers
2 Switching logic
Or
-Output
demodulators
m
Antenna
Variable gain
Fig. 2.19.1. Selection combining.
2 The receiver branch having the highest instantaneous SNR is connected
to the demodulator.
3. The antenna signals themselves could be sampled and the best one sent
to a single demodulator. In practice, the branch with the largest
(S +/Nis used, since it is difficult to measure SNR alone.
b. Feedback or scanning or threshold combining :
1. Ablock diagram of threshold combining method is shown in Fig. 2.19.2.
Antenna
Contro! Preset
Comparator threshold
Short-Term
Receiver
average
1
1
G
12 YM
Co-phase Detector >Output
G and sum
Ym
Gm
Antenna
Adaptive control
Fig. 2.19.3. Maxim um ratio combiner.
2 All the individual signals must be co-phased before being summed which
generally requires an individual receiver and phasing circuit for each
antenna element.
3. Maximum ratio combining produces an output SNR equal to the sum of
the individual SNRs. Thus, it has the advantage of producing an output
with an acceptable SNR even when none of the individual signals are
themselves acceptable.
4 This technique gives the best statistical reduction of fading of any known
linear diversity combiner.
d. Equal gain combining :
1 Equal gain combining (EGC) is better than selection diversity and is
almost as good as maximum ratio combining (MRC), but is less complex
in terms of the signal processing and feedback part.
2 In EGC, the branch weights are all set to unity that is, the adaptively
controlled amplifiers or attenuators are not needed.
3. The signals from each branch are co-phased to provide equal gain
combining. This allows the receiver to exploit signals that are
simultaneously received on each branch.
4. Thus, EGC is simpler to implement than MRC.
Answer
1 Consider Mindependent Rayleigh fading channels available at a receiver.
Each channel is called a diversity branch. Further, assume that each
branch has the same average SNR given by
SNR= T= ..(2.20.1)
N,
where we assume a =1.
2 If each branch has an instantaneous SNR = Y,, then the pdf of y, is
p(y) = ...(2.20.2)
where is the mean SNR of each branch.
3 The probability that a single branch has an instantaneous SNR less than
some threshold y is
...(2.20.7)
where x =y/T. Note that I' is the average SNR for a single branch (when
no diversity is used).
Wireless & Mobile Communication 2-27A (EC-Sem-7)
PART-11
Spatial Diversity and Multiplexing in MIMO Systems.
Questions-Answers
Tx 1 Rx 1
Transmitter Receiver
Tx 2 Rx 2
Fig. 2.22.1. MIMO using multiple transmitting and
receiving antennas to send multiple signals over
the same channel, multiplying spectral efficiency.
2 The information transmitted by both the antennas is different.
3. The underlying mathematical nature of spatial multiplexed MIMO, where
data is transmitted over a matrix rather than a vector channel, creates
new and enormous opportunities beyond just the added diversity or
array gain benefits the spectrum efficiency.
4 As such, this type of MIMO systems can be viewed as an extension of the
smart antennas.
5 Astrong analogy can be made with CDMA transmission in which multiple
user's share the same time offrequency channel, which are mixed upon
transmission and recovered through their unique codes.
PART- 12
Channel Estimation.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Wireless & Mobile Communication 2-29 A (EC-Sem-7)
CONTENTS
Part-1: Equalization Techniques : .3-2A to 3-11A
Transversal Filters,
Adaptive Equalizers, Zero
Forcing Equalizers, Decision
Feedback Equalizers and
Related algorithm
Part-2 : Multiplexing and Multiple .3-11Ato 3-17A
Access : FDMA, TDMA,
CDMA, OFDMA
3-1 A (EC-Sem-7)
3-2A (EC-Sem-7) Equalization and Multiple Access
PART- 1
Questions-Answers
4. Assume that n,(t) = 0. Then, in order toforce dt) =x(t) in eq. (3.1.2),
gt)must be equal to
g(t) =f (t) h (t) =8t) ...(3.1.4)
5. The goal of equalization is to satisfy eq. (3.1.4) so that the combination of
the transmitter, channel and receiver appear to be an all-pass channel.
6. In the frequency domain,eq. (3.1.4) can be expressed as
H)F* -) = 1 ...(3.1.5)
where, H() and F() are Fourier transforms of h(t) and f(t)
respectively.
7. Eq. (3.1.5) indicates that an equalizer is actually an inverse filter of the
channel.
Answer
S. No. Parameter Equalization Diversity
1. Compensation Equalization is used to Diversity is used to
factor compensate intersymbol compensate fading
interference (ISI) which which occurs due to
exists when modulation multi-path reception.
bandwidth exceeds the
coherence bandwidth.
2. Improvement Equalization improves Diversity improves the
in the received signal quality of a wireless
performance quality and link link without increasing
performance over small-the transmitted power
scale time and distances. or bandwidth.
3. Reduction Equalization is used to Diversity is used to
factor reduce the effects of time reduce the depth and
dispersion. duration of the fades.
4. Requirement An equalizer within a Diversity techniques
receiver compensates for are employed at both
the average range of|base station and mobile
expected channel resources.
amplitude and delay
|characteristics.
Answer
1. Equalization techniques can be subdivided into two general categories -
linear and non-linear equalization.
34 A (EC-Sem-7) Equalization and Multiple Access
2. These categories are determined from how the output of an adaptive
equalizer is used for subsequent control (feedback) of the equalizer.
3. In general, the analog signal ) is processed by the decision making
device in the receiver.
4. The decision maker determines the value of the digital data bit being
received and applies athresholding operation in order to determine the
value of dt).
5 If dt) is not used in the feedback path to adapt the equalizer, the
equalization is linear. On the other hand, if d(t) is feedback to change
the subsequent outputs of the equalizer, the equalization is non-linear.
Equalizer
Linear Non-linear
Types
DFE
ML symbol MLSE
detector
Structures
Transversal
Lattice Transversal Lattice
Transversal channel Est.
Answer
transversal equalizer
1 The most common equalizer structure is a linear
the transfer
(LTE). The simplest LTE uses only feed forward taps and
function of the equalizer filter is a polynomial in z-,
called a finite
2. This filter has many zeros but poles only at z=0, and is
impulse response (FIR) flter, or simply a transversal filter.
Wireless & Mobile Communication 3-5A (EC-Sem-7)
'k+N,-1 'k N, +1 Vk N,
Input 7-1
signals
Co eN,1
d,
Threshold
detector
...(3.4.1)
n=-N,
Answer
1 An adaptive equalizer is a time-varying filter which must constantly be
re-tuned. The basic structure of an adaptive equalizer is shown in
Fig. 3.5.1, where the subscript k is used to denote a discrete time index.
2. There is a single input y, into the equalizer at any time instant. The
value of y, depends upon the instantaneous state of the radio channel
and the specific value of the noise. As such y, is a random process.
3-6A (EC-Sem-7)
Equalization and Multiple Access
3. The adaptive equalizer structure is called a
case have N delay elements, N + 1taps, transversal filter, and in the
and N+1 tunable complex
multipliers, called weights.
4. The adaptive algorithm is controlled by the error
5
signale,.
The adaptive algorithm usese, to minimize a cost function and
the equalizer weights in a updates
manner that iteratively reduces the cost
function.
Input signal
Yk-1 | Vk-2 Yk-N
d, output
of equalizer
error ek
Adaptive algorithm that updates each weight wnk d, is set to
X7 Or represents a known
property of the transmitted signal
Fig. 3.5.1. A basic linear equalizer during training.
6 The most commnon cost function is the mean square error (MSE) between
the desired signal and the output of the equalizer.
7 The MSE is denoted by E<e(k) e*(k)), and a
known training sequence
must be periodically transmitted whena replica of thetransmitted signal
is required at the output of the equalizer.
8 by detecting the training sequence, the adaptive algorithm in the receiver
is able to compute and minimize the cost function by driving the tap
weights until the next training sequence is sent.
9. The input signal to the equalizer as a vector y,
where, ...(3.5.1)
1C. The output of the adaptive equalizer is a scalar given by
N
d; =WnkYk -n ...(3.5.2)
n=0
a weight vector can be written as
W,= lWok Wk Wek ...(3.5.3)
Answer
1. This kind of equalization can be accomplished by equalizers using the
transversal filter structure encountered earlier. Transversal filter
equalizers are easily adjustable to compensate against different channels
or even slowly time-varying channels.
2. The design goal is to force the equalizer output pulse to have zero ISI
values at the sampling (decision-making) instant.
3 In other words, the equalizer output pulses satisfy the Nyquist or the
controlled ISI criterion.
4 The time delay Tbetween successive taps is chosen to be T; the interval
between pulses.
5. For a single pulse p, at the input of the transversal filter with the tap
setting the filter output p,(t) will be exactly p,(t - NT,), that is, p,(t)
delayed by NT,.
6. For the Nyquist criterion, the output pulse p,(t) must have zero values
at all the multiples of T,.
7. The output p, (t) is the sum of pulsesof the form Cp, t-*T). Thus,
N
C_N
Polt)
Fig. 3.6.I.
Answer
A Types of equalization techniques :
i. Linear (transversal) equalization:Refer Q. 3.4, Page 3-4A,
Unit-3.
3-8A (EC-Sem-7)
Equalization and Multiple Access
Non-linear (Decision feedback) equalization :
1 The basic idea behind decision feedback (DFE)equalization is that once
an information symbol has been detected and decided upon, the ISI that
it induces on future symbol can be estimated and subtracted out before
detection of subsequent symbols.
2. The DFE can be realized in either the direct transversal form or as a
lattice filter. The direct form is shown in Fig.3.7.1.
'k+N,
Input Yk-N,
signals
FN, F;
...(3.7.1)
n=-N i=l
where c andy, are tap gains and the inputs respectively, to the forward
filter, F* are tap gains for the feedback filter, and d(i<k) is the previous
decisions made on the detected signal.
5 Once d, is obtained using eq. (3.7.1),d, is decided from it. Then d, along
with previous decisions d, ,, d, , ..are fed back into the equalizer and
d,., is obtained using eq. (3.7.1).
Wireless & Mobile Communication 3-9A (EC-Sem-7)
Answer
1. In a zero forcing equalizer, the equalizer coefficients c, are chosen to
force the samples of the combined channel and equalizer impulse
response to zero at all but one of the NT spaced sample points in the
tapped delay line filter.
2. When each of the delay elements provide a time delay equal to the
symbol duration T, the frequency response H() of the equalizer is
periodic with a period equal to the symbol rate lVT.
3 According to Nyquist criterion, the combined response of the channel
with the equalizer must be
H,() H = 1 as |f| <12T ...(3.8.1)
Where, H,() is the folded frequency response of the channel.
4. So an infinite length, zero ISI equalizer is simply an inverse filter which
inverts the folded frequency of the channel.
Que 3.9. Write a short note on least squares (LS) algorithm.
Answer
1. Least squares (LS)means that the overall solution minimizes the sum
of the squares of the errors made in the results ofevery single equation.
2 The method of LS channel estimation is a standard approach to the
approximate solution of over-determined systems, that is, sets of
equations in which there are more equations than unknowns.
3. The LS regression process can be understood with the help of the
following mathematics.
4. Consider a noise-corrupted communication system through a fading
multipath channel h, after which the signal has memory of L symbols.
5. Moreover, n is the white Gaussian noise, which is sampled at the symbol
rate.
6. The demodulation problem here is todetect the transmitted bits x from
the received signal y, and hence; the estimation procedure is required.
For a general linear equation of the received signal,
y= hx +n
7. The complex CIR h during L training bits can be expressed as
3-10A EC-Sem-7) Equalization and Multiple Access
h= \h,h,..h,)"
8 Within each transmission burst, the transmitter sends aunique training
sequence, which is divided into a reference length of Pand guard period
of L bits and is denoted by
m=\m,m..M-'
having bipolar elements m, e (-1, +1).
9 For estimation during the training period, the equation for the received
signal can be rewritten as y =hm +n. The circulant training sequence
matrix can be formed as
m, m,
m
M=
mp mp-1
10. The vertical deviation can be calculated using the following formula :
d, =y,-y =y, - (hm, + n)
11. Ifthe square ofthe deviations is minimized, the best line can be calculated
as
Answer
1. Least mean squares (LMS) algorithms are a class of adaptive filters used
to mimic a desired filter by finding the filter coefficients that relate to
producing the LMS of the error signal.
2 It is astochastic gradient descent method in which the filter is adapted
based on the error at the current time.
3. Asimplified diagram explaining the algorithm is shown in Fig. 3.10.1.
Noise
Unknown w(n)
Input system channel
x(n) y(n)
h(n)
d(n)
h(n)
Adaptive filter
PART-2
Questions-Answers
Answer
1 Multiple access schemes allow many simultaneous users to share the
same available channel bandwidth or radio spectrum on an individual
basis.
2. Multiple access may be achieved by four different ways as follows :
a. Fixed assignment of resources in terms of carrier allotment, time slot
allocation, code allocation, or area allocation to specific users.
b. Demand assignment.
Random access, i.e., a dynamic assignment of spectrum resources in
C.
time or bandwidth to the users, according to their needs or on the basis
of demand.
Reservation-based access, where prior reservations intimate other users
d
about the request of a particular user.
3.
A detailed classification of the important multiple access schemes are
given in Fig. 3.12.1.
Wireless &Mobile Cormmunication 3-13A (EC-Sem-7)
Multiple
access
Random Carrier CSMA, busytone, or busy
control
access sensing channel MA CSMA/CD
protocols
No Polling
requests token passing
Contention
requests
PRMA
Fig. 3.12.1.
5. Random access mainly deals with packet radio and mostly storage data
is utilized.
6 Reservation-based access deals with channel reservation in advance
whenever data transmission is needed.
7 Demand-based channel assignment deals with the allocation of free
channel at the time of request.
Que 3.13. Explain Frequency Division Multiple Access (FDMA).
Answer
1. Frequency division multiple access deals with radio frequency (RF)
carriers.
3-14 A (EC-Sem-7) Equalization and Multiple Access
2. It is a technique whereby the spectrum is equally divided into frequencies
and then assigned to different users, as shown in Fig. 3.13.1.
Available
bandwidth
Ch Ch Ch Ch Ch
1 2 4 5
Frequency
Fig. 3.13.1. Another way torepresent FDMA compared.
3. Thus, the available bandwidth is subdivided into a number of narrower
band channels.
4. In FDMA, at any given time, only a single subscriber is assigned to a
channel. The channel therefore is closed for other conversations.
5. To avoid interference, FDMA transmission requires two one-way
channels,one for transmitting and the other for receiving.
6. Aful-duplex or frequency division duplex (FDD) FDMA has been used
since first-generation analog systems.
7 Each user is allocated aunique frequency band in which to transmit and
receive. Noother can use the same frequency band.
8. The channel bandwidth used in most FDMA systems is typically low, as
each channel needs to support only a single user and the associated
baseband.
Answer
1. Time division multiple access improves spectrum capacity by splitting
the spectrum's use into time slots.
2. It allows each user to access the entire RF channel for a short period.
Other users share the same frequency channel at different time slots.
3 Thus, TDMAdivides the available spectrum into multiple time slots, as
shown in ig. 3.14.1, by giving each user (or channel) a time slot in
which they can transmit or receive.
4 The Fig. 3.14.1 shows how the time slots are provided to users in a rond
robin manner making time frames, with each user being allotted one
time slot per frame.
5. The base station continually switches users on the channel. TDMA may
be asynchronous or synchronous, just like TDM. It is the dominant
technology in the second-generation mobile cellular network.
Wireless & Mobile Communication 3-15 A (EC-Sem-7)
Answer
A. Types of multiple access scheme :
i. FDMA :Refer Q.3.13, Page 3-13A, Unit-3.
ii. TDMA : Refer Q.3.14, Page 3-14A, Unit-3.
üi. CDMA:
1 Code division multiple access (CDMA) is wideband spread spectrum
technology. A unique code is assigned to all speech bits (signals).
3-16A (EC-Sem-7) Equalization and Multiple Access
2. Signals for all calls are spread across a broad frequency spectrum, hence
the term 'spread spectrum'.
3. This technique allows numerous users to transmit simultaneously on
one radio frequency. As a result, CDMA systems increase the system
capacity by 10 to 30 times over conventional cellular systems.
4. In CDMA technology, during transmission process the sound of the
user's voice is converted into a digital code.
5.
This digital signal is correlated with a code known as pseudorandom
noise (PN) code (also called Walsh' code).
6. Each user has its own pseudorandom codeword which is approximately
orthogonal to all other code words.
Code
Channel1
Channel2
Channel3
Frequency
ChannelN
Time
Fig. 3.16.1. Representation of CDMA (N users having N different codes).
7. The output of the correlator is an encrypted signal which is then spread
over a very wide frequency spectrum (1.25 MHz).
8 At the receiving terminal, the spread spectrum signal is demodulated
back to a narrow bandwidth using 'decorrelator.
9 Decorrelator uses the same PN code for detection of the signal that was
used in transmission of the signal.
10. A signal correlated with a give PN code and decorrelated with the same
PN code returns the original signal.
B. Frequency hopped multiple access :
1. Frequency hopped multiple access (FHMA) is a digital multiple access
system in which the carrier frequencies of the individual users are
varied in a pseudorandom fashion within a wideband channel.
2 FHMA allows multiple users to simultaneously occupy the same spectrum
at the same time, where each user dwells at a specific narrowband
channel at a particular instance of time, based on the particular PN code
of the user.
Wireless & Mobile Communication 3-17A (EC-Sem-7)
3. The digital data of each user is broken into uniform sized bursts which
are transmitted on different channels within the allocated spectrum
band.
4 The instantaneous bandwidth of any one transmission burst is much
smaller than the total spread bandwidth.
5 The pseudorandom change of the channel frequencies of the user
randomizes the occupancy of a specific channel at any given time, thereby
allowing for multiple access over a wide range of frequencies.
Que 3.17. Write a short note on OFDMA.
Answer
1. Orthogonal frequency division multiple access (OFDMA) is a hybrid
multiple access or multiplexing technique with multicarrier modulation,
which divides the available spectrum into many carriers, each one being
modulated by a low-rate data stream.
2. In OFDMA, information of different users is processed in combination
and then allocated to multiple carriers, whereas in OFDMA, out of the
total available bandwidth, each narrow channel can be accessed by
individual users.
3. Though OFDMA is similar to FDMA, it uses the spectrum much more
efficiently by spacing the channels much closer together.
4. This is achieved by making all the carriers orthogonal to one another,
thereby preventing interference between the closely spaced carriers.
PART-3
SC-FDMA, IDMA Schemes and Hybrid Method of Multiple
Access Schemes.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
1. Single-carrier FDMA (SC-FDMA) is a frequency-division multiple access
scheme. SC-FDMA utilises single-carrier modulation, DFT-spread
orthogonal frequency multiplexing, and frequency domain equalisation.
It has similar structure and performance to OFDMA.
3-18 A (EC-Sem-7) Equalization and Multiple Access
2. SC-FDMA is adopted as the uplink multiple access scheme in 3GPP and
a variant of SC-FDMA using code spreading is used in 3GPP2 uplink.
3. SC-FDMA is also called as a linéarly precoded OFDMA scheme (LP.
OFDMA).
4. In SC-FDMA, guard intervals with cyclic repetition are introduced
between blocks of symbols in view toefficiently eliminate time spreading
among the blocks, similar to that available in OFDM.
5. In SC-FDE, both FFT and IFFT are appied on the receiver side, but not
on the transmitter side, whereas in SC-FDMA, both FFT and IFFT are
applied on the transmitter side as well as on the receiver side.
6. In SC-FDMA, multiple access is made possible by inserting silent Fourier
coefficients on the transmitter side before the IFFT, and removing them
on the receiver side before the IFFT. Different users are assigned to
different Fourier-coefficients (sub-carriers).
7. In SC-FDMA, equalization is achieved on the receiver side after the FFT
caleulation, by multiplying each Fourier coefficient by acomplex number.
This operation is identical to that of in OFDM as well as SC-FDE.
combiner
Signal
Encoder(C) Spreader Interleaverl
Usert
Multiple
access
Coder and multipath
spreader channel
De-interleaver1
Signal decoder
(SDEC)
Useri Interleaverl
Elementary
Signal
Turbo Processor Estimator
Block Block
De-interleaverK
(ESEB)
Signal Decoder
(SDEC)
User}k Interleaver K
7. After the final iteration, the SDECs produce hard decisions on the
information bits. The complexity involved (mainly for solving a size
KxK correlationmatrix) is 0(K') per user by the well-known iterative
minimum mean square error (MMSE) technique in CDMA, while in
IDMA,it is independent of user.
Que 3.20. Explain SC-FDMA, IDMA schemes and hybrid methodof
multiple access schemes. |AKTU 2017-18, Marks 10
Answer
A. SC-FDMA : Refer Q. 3.18, Page 3-17A, Unit-3.
B. IDMA : Refer Q.3.19, Page 3-18A, Unit-3.
C. Hybrid Methods of MultipleAccess:
The following are a few combinations of multiple access technique :
1. FDMA-CDMA : The spectrum is divided into channels and each channel
is a narrowband CDMA system with processing gain lower than the
original CDMA system.
2. DSSS-FHSS: The direct sequence modulates the signal and hops centre
frequency using a pseudo-random hopping pattern. The method avoids
near-far effect.
3-20A EC-Sem-7) Equalization and Multiple Access
3. TDMA-CDMA : Diffrent spreading codes are assigned to different
cells. One user per cellis allotted a particular time slot. Only one CDMA
user transmits in each cell at any given time. The method avoids severe
fades on the channel.
4. TDMA-FHSS:It involves ahop to anew frequency at the start of anew
TDMA frame. The method avoids severe fades on the channel. Hopping
sequences are predefined and unique per cell. It avoids co-channel
interference if other base stations transmit on different frequencies at
different times.
PART-4
RAKE Receiver.
Questions-Answers
Que 3.21. Draw and explain the RAKE receiver in detail using
proper block diagram. AKTU2016-17, Marks 10
OR
Explain the structure of RAKE receiver with the help of neat
diagram. What is M branch RAKE receiver ?
AKTU2017-18, Marks 10
OR
Draw and explain RAKE receiver using block diagram.
AKTU2018-19, Marks 10
Answer
1. ARAKE receiver collects the time shifted versions ofthe original signal
by providing a separate correlation receiver for each of the multipath
signals.
2 The main function of the RAKE receiver at both ends (mobile and base
station transceivers) is to aggregate the diversity received signals.
3. The direct signal at the RAKE receiver is the strongest signal that is
combined with multipath reflected signal from the other two or three
RAKE receivers to form the composite signals that are used to process
the mobile call.
4 The multipath signals are additives to the direct signals to obtain the
cleanest, strongest signal possible.
Wireless & Mobile Communication 3-21A (EC-Sem-7)
5. Therefore, we can conclude that the signal to noise ratio (SNR) gets
improved by using RAKE receivers. The RAKE receiver circuitry is
shown in Fig. 3.21.1.
Correlator 1
T m'(t)
Signal from
multipath Corelator 2 )dt
reception r(t)
Correlator 3
....3.21,.1)
m=l1
ay = M
m
...3.21.2)
m=1
PART-5
Questions-Answers
Answer
ALOHA:ALOHA is a multiple access protocol for transmission of data
A. station transmits
via a shared network channel. In ALOHA, each node or
transmission channel is
a frame without trying todetect whether the
idle or busy.
Wireless & Mobile Communication 3-23 A (EC-Sem-7)
i. Pure ALOHA:
1. The pure ALOHA protocol is a random access protocol used for data
transfer. Auser accesses a channel as soon as a message is ready to be
transmitted.
2 After a transmission the user waits for an acknowledgement on either
the same channel or a separate feedback channel.
In case of collisions, (i.e., when aNACK 0s received), the terminalwaits
for a random period of time and retransmits the message.
4.. As the number of users increase, a greater delay occurs because the
probability of collision increases.
5. For the ALOHA protocol, the vulnerable period is double the packet
duration.
6 Thus, the probability of no collision during the interval of 2r is found by
evaluating Pr (n) given as
(2R)e-2R
Pr (n) = at n = 0 ...(3.23.1)
n!
7. The probability of nocollision is Pr (0) =e -2R, The throughput of the
ALOHA protocol is given as
T= Re -2R ...3.23.2)
8. The anaximum through put achieved by using the ALOHA protocol is
given by
dT =e-2h_2Re - 2R-0
dR
1
2
Kmax =1
PART-6
CSMA and their Versions.
Questions-Answers
Que 3.24.| Give the basic principle of carrier sense multiple access
(CSMA) protocols.
Answer
1 To minimize the chance of collision, and therefore, increase the
performance, the CSMA method was developed.
2. The chance of collision can be reduced if a station senses the medium
before trying touse it.
3. Carrier sense multiple access (CSMA) requires that each station first
listen to the medium (or check the state ofthe medium) before sending.
4 In other words, CSMA is based on the principle "sense before transmit"
or "listen before talk".
5. CSMA can reduce the possibility of collision, but it cannot eliminate it.
The reason is due to possibility of collision still exists because of
propagation delay; when a station sends aframe, it stilltakes time for
the first bit to reach every station and for every station to sense it.
Wireless & Mobile Communication 3-25A EC-Sem-7)
6. In another words, a station may sense the medium and find it idle, only
because the first bit sent by another station has not yet been received.
7 Then the two signals willcollide and both frames are destroyed.
Que 3.25. What are the persistence methods ?
OR
Explain various versions of CSMA.
Answer
Persistence Methods :
1. If there is any channel found to be busy or idle, the station control the
channel by the following methods: the l-persistent method, the non
persistent method, and the p-persistent method.
2. Fig. 3.24.1shows, the behavior of three persistence methods when a
station finds a channel busy.
Sense and transmit
Continuously sense
Busy Time t
(a) 1-persistent
Sense and transmit
Sense Sense
Wait Wait
Busy Time t
(b) Non-persistent
Probability outcome
does not allow transmission
Time Time .TimeTransmit
slot slot slot
Time t
Busy (c) p-persistent
Fig. 3.25.1.Shows the behaviour of three persistence methods.
There are several variations of the CSMA strategy.
i. l-persistent CSMA: The terminal listens to the channel and waits for
transmission until it finds the channel idle. As soon as the channel is
idle, the terminal transmits its message with probability one.
3-26A (EC-Sem-7) Equalization and Multiple Access
ii. Non-persistent CSMA:
1. In this type of CSMA strategy, after receiving a negative,
acknowledgement the terminal waits a random time before
retransmission of the packet.
2. This is popular for wireless LAN applications, where the packet
transmission interval is much greater than the propagation delay to the
farthermost user.
ii. p-persistent CSMA :P-persistent CSMA is applied to slotted channels.
When a channel is found to be idle, the packet is transmitted in the first
available slot with probability p or in the next slot with probability 1-p.
iv. CSMA/CD:
1. In CSMA with collision detection (CD), a user monitors its transmission
for collisions.
2. Iftwo or more terminals start a transmission at the same time, collision
is detected, and the transmission is immediately aborted in midstream.
3. This is handled by auser having both atransmitter and receiver which
is able to support listen-while talk operation.
4. For a single radio channel, this is done by interrupting the transmission
in order to sense the channel.
V. CSMA/CA:In CSMA with collision avoidance (CSMA/CA), an attempt
is made to improve the performance of CSMA. CSMA/CA by default
uses the carrier sensing mechanism with exponential back-off.
PART-7
Packet and Pooling Reservation Based Multiple Access Schemes.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
for
In multiple access schemes based on reservation, there is a provision
then the
and
users to reserve their slot or resources in advance
transmission will be followed in that order. Such reservation times are
separately provided.
Wireless & Mobile Communication 3-27 A (EC-Sem-7)
CONTENTS
Part-1: GSM System for Mobile 4-2A to 4-7A
Telecommunication
4-1A(EC-Sem-7)
4-2A (EC-Sem-7) Cellular Networks
PART- 1
Questions-Answers
Que 4.1. What is GSM ? Mention the GSM services and features.
Answer
A. GSM:
1. Global system for mobile (GSM) is a second generation cellular system
standard that was developed to solve the fragmentation problems of the
first generation cellular systems in Europe.
2. GSM was the world's first cellular system to specify digital modulation
and network level architectures and services, and is the world's most
popular 2G technology.
3. GSM was originally developed to serve as the pan-European cellular
service and promised a wide range of network services through the use
of ISDN.
B. GSM services: GSM services are classified as :
i. Teleservices: Teleservices include standard mobile telephony and mobile
originated or base originated traffic.
ii. Data services : Data services include computer-to-computer
communication and packet switched trafic. User services may be divided
into three major categories :
a. Telephonic services.
b. Bearer service or data services.
C. Supplementary ISDN services.
C. Features of GSM:
Improved spectrum efficiency.
International roaming.
ii. Low-cost mobile sets and base stations (BSs).
iv. High-quality speech.
V Compatibility with Integrated Services
Digital Network (ISDN) and other
telephone company services.
Wireless & Mobile Communication 4-3A (EC-Sem-7)
Que 4.2. Draw the GSM architecture and also explain radio
subsystem in mobile radio communication.
AKTU2018-19, Marks 10
OR
Explain the term GSM in detail in mobile radio communication using
system architecture. AKTU 2016-17, Marks 10
Answer
1. Fig.4.2.1 shows the block diagram ofthe GSM system architecture. The
mobile stations (MSs) communicate with the base station subsystem
(BSS)over the radio air interface.
BTS
BTS BSC
HLR VLR AUC
MS BTS
PSTN
BTS
B8Ç
BTS BSC MSC ISDN
BTS Data
Inetworks
I|OMC
Operation support
MS subsystem
Base station subsystem Network switching Public
subsystem networks
Fig. 4.2.1. GSM system architecture.
2. The GSM system architecture consists of three major interconnected
subsystems :
a. Base station subsystem (BSS) :
1. The BSS, also known as the radio subsystem, provides and manages
radio transmission paths between the mobile stations and the mobile
switching center (MSC).
2 The BSS also manages the radio interface between the mobile stations
and all other subsystems of GSM.
3. Each BSS consists of many base station controllers (BSCs) which connect
the MS to the NSS via the MSCs.
4-4A (EC-Sem-7) Cellular Networks
4 The BSS consists of many BSCs which connect to a single MSC, and
each BSC typically controls upto several hundred base transceiver
stations (BTSs).
5 Mobile handoffs between two BTSs under the control of the same BSC
are handled by the BSC and not the MSC. This greatly reduces the
switching burden of the MSC.
b. Network and switching subsystem (NSS):
1 The NSS manages the switching functions of the system and allows the
MSCs to communicate with other networks such as the PSTN and
ISDN.
2 The NSS handles the switching of GSM calls between external networks
and the BSCs in the radio subsystem and is also responsible for managing
and providing external access to several customer databases.
3 In the NSS, there are three different databases :
i. HLR (Home Location Register):
1 The HLR is a database which contains subscriber information and
location information for each user who resides in the same city as the
MSC.
ii. VLR (Visitor Location Register):
1. The VLR is a database which temporarily stores the IMSI and customer
information for each roaming subscriber who is visiting the coverage
area of a particular MSC.
2 Once a roaming mobile is logged in the VLR, the MSC sends the necessary
information to the visiting subscribers HLR so that calls to the roaming
mobile can be appropriately routed over the PSTN by the roaming user's
HLR.
iiüi. AUC:
1 The authentication center (AUC) is a strongly protected database which
handles the authentication and encryption keys for every single
subscriber in the HLR and VLR.
C. Operation support subsystem (0SS) :
1. The OSS supports the operation and maintenance of GSM and allows
system engineers to monitor, diagnose and troubleshoot all aspects of
GSM system.
2 The OSS supports one or several Operation Maintenance Centers (OMC)
which is used tomonitor and maintain the performance of each MS, BS.
BSCand MSCwithin a GSM system.
3 The OSS has three main functions, which are:
i. To maintain all telecommunications hardware and network operations
with a particular market.
ii. Manage all charging and billing procedures, and
ii. Manage all mobile equipment in the system.
Wireless & Mobile Communication 4-5 A
(EC-Sem-7)
12^ ms
1Multiframe = .25 26 Frames
4.615 ms
1Frame = 0 12 3 4 5 6 7 8 Time slots
576.92 us
Channel Channel
coding decoding
Interleaving De-interleaving
Burst Burst
formatting formatting
Ciphering De-ciphering
Radio channel
Modulation Demodulation
PART-2
General Pachet Radio Service.
Questions-Answers
Answer
1. The GSM technology was developed for voice services, but it did not
have the capability to provide data services.
4-8A (EC-Sem-7) Cellular Networks
2. To develop a higher data rate capability and to enhance the services the
GPRS protocol was developed on the GSM platform. The scenario and
GPRS architecture are shown in Fig. 4.5.1.
MSCVLR HLR
D
Gs G.
A G,
MS BSS
G
H
SGSN
Gn
GGSN
PDN
Um G;
Gp
SGSN GGSN
8. This forms the gateway to the services within the network and then a
gateway GPRS support node (GGSN), which forms the gateway to the
outside world.
Answer
1. Network access : Network access supports standard point-to-point
data transfer and anonymous access (without authentication and
ciphering). The functions include the following :
i
Registration, which associates the MS identity with the PDPs.
AuthenticatiYn and authorization are for security purposes to avoid
anonymous access.
ii. Packet terminal adaptation, which adapts data transmission across the
GPRS network.
iv. Admission control, which determines the radio and network resources
tobe used for communication of MSs.
V.
Charging information collection for packet transmission in GPRS and
external networks.
2 Packet routing and transfer: Packet routing and transfer is used to
route the data between the MS and the destination through the SGSNS
and GGSNs. The functions include the following:
1. Relay function, which is used by the BSS to forward packets between
the MS and the SGSN and is also used by the SGSN to forward packets
E:
F: between the BSS and the SGSN or GGSN.
Routing which determines the destinations of packets.
ii. Address translation and mapping, which converts a GPRS network
address to an external data network address and vice-versa.
iv. Encapsulation and tunnelling, which encapsulate packets at the source
of a tunnel, deliver the packets through the tunnel, and decapsulate
them at the destination.
V.
Compression and ciphering, which reduce and protect the database.
3. Mobility management : Mobility management keeps track of the
current location of an MS which includes the following :
i. Cell update.
Routing area update.
ii. Combined routing area and location area update.
4 Logical link management :Logical link management maintains the
communication channel between the MS and the GSM network across
the radio interface, which includes the following:
i. Logical link establishment.
4-10 A (EC-Sem-7) Cellular Networks
Answer
A. GPRS device categories :
Class A: Mobile phones in this class can be connected to both GPRS and
GSM services at the same time.
Class B:Mobile phones in this class can be attached to both GPRS and
GSM services, but they can be used on only one service at a time.
Class C: Mobile phones in this class can be attached to either GPRS or
GSM services, but the user needs to switch manually between the two
different types.
B. Modes:
Initialization or idle:
1 When a mobile is turned ON, it must register with a network and
update the location register. It is referred to as location update.
2 When the mobile performs its location update, the network also performs
an authentication to ensure that it is allowed to access the network.
Like GSM, it accesses the HLR and VLR as necessary for the location
update and the AUCfor authentication.
3. The SGSN also maintains a record of the location of the mobile so that
data can be sent there if required.
ii. Stand by :
1. The mobile then enters a standby mode, periodically updating its position
as required.
2. It monitors to ensure that it has not changed BSs and also looks for
stronger BSCCHs. The mobile will also monitor the PPCH in case of an
incoming alert indicating that data is ready to be sent.
Wireless & Mobile Communication 4-11 A (EC-Sem-7)
ii. Ready:
1. In the ready mode, the mobile is attached to the system and virtual
connection is made with the SGSN and GGSN.
2. This connection enables the network to know where to route the packets
when they are sent and received.
PART-3
Edge Technology.
Questions-Answers
Answer
1 The EDGE technologv is applied to GSM networks where the
enhancements provided by GPRS have already been added.
2 GSM provides voice services based on circuit switching whereas GPRS
provides data services based on packet switching. Hence, the
infrastructure for both is to be adopted by EDGE.
3 In terms of implementation, EDGE is intended to build on the
enhancements provided by the addition of GPRS where packet switching
is applied to a network.
4 It enables a threefold increase in the speed at which data can be
transferred by adoptinga different form of modulation.
5. EDGE changes the modulation to 8PSK, which is a form of phase shift
keying (PSK) where eight phase states are used.
6 By using 8PSK, data can be transferred at 48 kbps per channel rather
than 9.6 kbps, the rate that is possible using GMSK. By allowing the use
of multiple channels, the technology allows the transfer of data at rates
up to 384 kbps.
PART-4
Questions-Answers
Que 4.9. Explain forward link and reverse link in IS-95 system.
Answer
A. Forward link (BS- MS) :
1 The IS-95 system specifies 869-894 MHz band for the forward link.
2 It consists of upto 64 logical CDMAchannels each occupying the same
1228 KHz bandwidth. The forward link supports four types of channels :
i. Pilot (Channel 0) : This channel allows the mobile unit to acquire
timing information, provide phase reference for the demodulation, and
provides ameans ofsignal strength comparison for the purpose of handoff
determination. The pilot channel consists of all zeros transmitted at
higher power then user channels.
ii. Synchronization (Channel 32): A1200 bps channel used by the MS
to obtain identification information about the cellular system.
iii. Paging (Channel 1 -7) : These channels contain messages for one or
more mobile stations.
iv. Traffic channel (Channel 8 -31 and 33- 63) : The forward channel
supports 55traffic channels. The original specification supported data
rates upto 9.6 kbps. All these channel use the same bandwidth. The
chipping code is used to distinguish among the different channels. For
the forward channel, the chipping codes are the 64 orthogonal 64 bit
codes derived from a 64 x 64 Walsh matrix.
B. Reverse link (MS - BS) :
1. The IS-95 system specifies 824-849 MHz band for the reverse channel.
1.2288 KHz code
long
distinct 1.2288 KHz
0 Pilot channel 1 Access channel
code
Walsh 7 Paging channel 32| Access channel
8 Traffic channel - 1 User
specific 1 Traffic channel
long
code 2 Traffic channel
Traffic channel 24 3 Traffic channel
31
32 Synchronisation ch.
33 Traffic channel 25
Fig. 4.9.1,
Wireless & Mobile Communication 4-13 A (EC-Sem-7)
1.2288 Mcps
1. For lower data rates, the encoder O/P bits are replicated to yield
19.2 kbps rate.
2. The data are then interleaved in blocks to reduce the effects of errors by
spreading them out.
3 Following the interleaver, the data bits are scrambled. The purpose of
this is to serve as privacy mask and also to prevent sending of repetitive
patterns.
4 The serambling is accomplished by means of a long code that is generated
as apseudo random number from a42-bit long shift register.
5 The shift register is initialised with the user's electronic serial number.
The output of long code generator is at a rate of 1.2288 Mcps.
6 The decimator keeps only the first chip out of every 64 consecutive PN
chips. The O/P of decimator is at 19.2 kbps.
4-14 A (EC-Sem-7) Cellular Networks
7. The data scrambling is performed by modulo-2 addition of the
interleaver O/P with the decimator O/P.
8. The next step in the processing inserts power control bits at a rate of
800bps by replacing some ofthe traffic channel bits, using the long code
generator to encode the bits.
9. The next step in the DSSS function spreads the 19.2 kbps to a rate of
1.2288 Mbps (Mcps) using one row of 64 x 64 Walsh matrix. One row of
the matrix is assigned to a MS during callset up.
10. After this bits are spread in quadrature. Two separate bit
stream
(I and Q), data are split in I and Q channels.
11. Data in each channel XORed with a unique short-code. The short
binary spreading sequence, period 215-1, chips is generated from a 15
bit long shift register. Thus, data is transmitted using QPSK modulation.
12. A pilot code on the forward link is also transmitted simultaneously and
at a higher power level thereby allowing all mobiles to use coherent
detection while estimating the channel conditions.
IS -95 reverse channel:
1.
First few steps are same as forward channel. Data rate tripled here to
28.8 kbps, then block interleaved. The next step is spreading of the data
using Walsh matrix. In the reverse channel, the data coming out of the
block interleaver are grouped into units of 6 bits.
2 Each 6 bit unit serves as a index to select a row of 64 x 64 Walsh matrix
(26 =64) and that row is substituted for the input. Thus, the data row is
expanded by a factor of 64/6 to 307.2 kbps.
3 The purpose of this encoding is to improve the reception at the BS,
because the 64 possible coding is orthogonal, the coding enhances
decision making at receiver.
4. We can view this Walsh modulation as a form of block error correcting
code with (n, k) = (64, 6) and di=32 (all distances are 32).
5 The data burst randomizer is used to help to reduce interference from
other mobile stations. The operation involves using the long code mask
to smooth the data out over each 20 ms frame.
6 The next step in the process is DSSS function in case of reverse channel,
the long code unique to mobile is XORed with the output of randomizer
toproduce 1.2288 Meps final data stream.
7. The digital bit stream is then modulated on to a corner using an offset
QPSK modulation.
8. The reason the modulators are different is that in forward channel, the
spreading codes are orthogonal, all coming from Walsh matrix, whereas
in reverse channel, orthgonality ofthe spreading code is not guaranteed.
Wireless & Mobile Communication 4-15 A (EC-Sem-7)
Zero-offscet pilot PN
sequence I-channel
Long code Long 12288 Meps
mask for code
generator PN
user n
chip Base I(t
band
Information filter
bit Convolutional
encoder and Block 64-ary Data bust PN
repetition interleaver Orthogonal randomizer
modulator chip
r= V3, K-9
9600 bps Base
Walsh band
4800 bps
28.8 keps chip filter Qt)
2400 bps 307.2 kcps
1200 bps 112 PN chip dealy
- 406.9 ns
Zero-offset pilot PN
sequence Qchannel
Fig. 4.10.2. Reverse IS-95 channel modulation process fora single user.
3 In the soft handoff case, as shown in Fig. 4.11.1(6), the handoff is between
two sectors of different cells.
PART-5
Questions-Answers
Que 4.12. Write a short note on wireless local loop (WLL) system.
Answer
1. AWLL is defined in the last-mile system category. WLL services may be
defined as fixed wireless services intended to provide access to the
telephone network.
2 In general local loop means exchange-to-exchange closed loop.
Conventionally, telephone local loops are unshielded twisted pair (UTP)
or shielded twisted pair (STP) based cables.
3 If we remove the wires used for communication, that is, establish an RF
link, it becomes a wireless local loop.
4. Wireless local loop systems will generally divide a geographical region
intomany similar sized cells. Each cell will be serviced by a BS, which
will communicate with all the WLL customers within the cell, as shown
in Fig. 4. 12.1 and 4.12.2.
Wireless & Mobile Communication 4-17A(EC-Sem-7)
Remote
Telephone subseriber unit
central office Typical subscriber location
Phone
WLL
Fig. 4.12.2.WLL access unit and their functions.
5. The BS may be as simple as a small omnidirectional antenna and control
box hanging fromn the overhead electrical lines. Each customer willbe
equipped with a transceiver and a small patch antenna.
6. The WANU(Wireless Access Network Unit) the interface between the
underlying telephone network and the wireless link, consists of the
following:
i. BTS
Radio port control unit (RPCU).
PART-6
Questions-Answers
Answer
A. IS-95: Refer Q. 4.9, Page 4-12A, Unit-5.
B. IMT-2000:
1. The global standard for 3G wireless communications is IMT-2000, defined
by a set of interdependent international telecommunication union (ITU)
recommendations.
2. IMT-2000 provides a framework for worldwide access by linking the
diverse systems of terrestrial and/or satellite networks.
3. In IMT-2000, 2000 stands for the year it was introduced and also the
spectrum used (around 2000 MHz).
C. UMTS:
1. UMTS represents an evolution from 2Gto 3G. It uses WCDMA to carry the
radio transmissions, and the system is often referred to by the name WCDMA.
2. In order to create and manage a system as complicated as UMTS or
WCDMA, it is necessary to develop and maintain a large number of
documents and specifications.
3. For UMTS, these are now managed by a group known as the
3GPP-third-generation partnership programme.
Que 4.14. Describe the network architecture of UMTSwith suitable
diagram.
Answer
1 The universal mobile telecommunication system (UMTS) is a system
that is capable of providing a variety of mobile services to a wide range
of global mobile communication standards.
2. To handle a mixed range of traffic, a mixed cell layout (shown in
Fig. 4.14.1), that would consist of macrocells overlaid on micro and picocells
is one of the architecture plans being considered.
3. This type of network distributes the traffic with the local traffic operating
on the micro and pico cells, while the highly mobile traffic is operated on
the macrocells, thus reducing the number of handoffs required for the
fast moving traffic.
4. Macrocells willalso be able to avoid the failures of the overlapped cells.
However the major disadvantage of the overlaid architecture is the
reduced spectrum efficiency.
Wireless & Mobile Communication 4-19 A (EC-Sem-7)
Macrocells
Macrocells
Answer
1 The network for UMTS can be split into three main constituents
as shown in Fig. 4. 15.1.
domain
kOE
USIM domain
-tCu
UE Mobile
equipment domain
. Uu Uu
-t- Iu ---Iu
|Core
domaln
network
Serving network |Zu
CN
domain
PART-7
Questions-Answers
Answer
1. Long-term evolution transits from the existing UMTS circuit and packet
switching combined network to an all-IP flat architecture system.
Fig. 4.16.1 shows the simplicity of the LTE architecture.
2 The network side of the evolved UMTSterrestrial radio access network
(E-UTRAN) is composed only of evolved Node Bs (eNode Bs or eNBs),
hence the simplified architecture.
3 LTE supports cell sizes from tens of meters radius to l00 km radius
macrocells.
5. The new blocks specific to evolved UMTS evolution, LTE also known as
the evolved packet system (EPS) are the E-UTRAN and the evolved
packet core (EPC). The EPS is purely IP-based.
6. The LTE access network E-UTRAN is simply a network of BSs and
eNBs,generating aflat architecture. There is no centralized intelligent
controller and the eNBs are normally interconnected by the X2 interface
and towards the CN by the Sl interface.
MME/S-GW MME/S-GW
s1
x2 >E-utran
eNode B eNode B
eNode B
Elements of LTE-EPS:
1. E-UTRAN : The E-UTRAN is an orthogonal frequency division
multiplexing (OFDM)-based structure and is quite simple compared to
UTRAN. It is composed of only one network element the eNode B.
2. eNode B: The eNB interfaces with the UE. It supports all physical and
data link layer functions associated with the E-UTRAN OFDM physical
interface and eNBs are directly connected to network routers. It also
hosts radioresource control (RRC)functionality corresponding to the
control plane.
3. X2 interface: A new interface known as X2 has been defined between
eNode Bs, working in a meshed way to make them possible to be linked
together. The main purpose of this interface is to minimize packet loss
due to user mobility.
4. EPC: This is composed of several functional entities: the MME, the
home subscriber server (HSS), the serving gateway (8-GW), the packet
data network gateway (PDN-GW), and the policy and charging rules
function (PCRF) server.
5. MIME : The mobility management entity (MME) is charge of allthe
control plane functions related to subscriber and session management.
The MME supports the following :
i. Security procedures.
ii. Terminal to network session handling.
ii. Idle terminal location management.
6. HSS: The HSS is the concatenation of the HLR and the AUC-two
functions that are already present in GSM and UMTS networks. The
HLR part of the HSS is in charge of storing and updating when necessary.
The database containing allthe user subseription information, including
the following:
i User identification and addressing which corresponds to the IMSI and
MSISDN or mobile telephone number.
ii. User profile information which includes service subscription states and
user-subscribed QoS information.
7. S-GW:The S-GW is the termination point of the packet data interface
towards the E-UTRAN. The S-GW routes and forwards user data
packets.
8. PDN-GW: The PDN-GW is the termination point of the packet data
interface towards the packet data network (PDN). The PDN-GW provides
connectivity from the UE to external PDNs by being the point of exit
and entry of traffic for the UE.
9. PCRF server: It marages the service policy and sends the QoS setting
information for each user session and the accounting rule information.
Que 4.17. Explain the working of channels used in LTE.
Wireless & Mobile Communication 4-23 A (EC-Sem-7)
Answer
Long-term evolution channels are of three types :
1. Physical channels : The LTE physical channels are again grouped
into uplink (SC-FDMA based) and downlink (OFDMA based) channels
as each has different requirements and operates in a different manner.
Downlink channels: There are four downlink physical channels for
correspondence from eNode B to UE.
i. Physical broadcast channel (PBCH): This channel carries system
information for the UE requiring access to the network. It carries only
the master information block (MIB) messages. The modulation scheme
is always QPSK, and the information bits are coded and rate matched.
ii. Physical control format indicator channel (PCFICH) : This
channel informs the UE about the format of the signal being received. It
indicates the number of OFDM symbols used for the physical downlink
control channels (PDCCHs).
iüi. Physical downlink control channel (PDCCH) :The main purpose
of this channel is to carry mainly scheduling information of different
types, downlink resource scheduling uplink power control instructions
uplink resource grant,the indication for paging or system information.
iv. Physical hybrid automatic repeat request indicator channel
(PHICH): This channel is used to report the HARQ status. It carries
the HAEQ ACKNACK signal indicating whether a transport block has
been correctly received.
Uplink channels: The following three different channels are specified
as uplink physical channels :
i. Physical uplink control channel (PUCCH):This channel provides
the various control signalling requirements.
ii. Physical uplink shared channel (PUSCH):This physical channel
found on the LTE uplink is the uplink counterpart of the PDSCH.
iüi. Physical random access channel (PRACH) : The channel is used
for random access functions. This is the only non synchronized
transmission that the UE can make within LTE.
2.
Logical channels : The logical channels cover the data carried over
the radio interface. Logical channels are again grouped into TCHs and
CCHs, like in the GSN system.
i.
Traffic channels :The LTE TCHs carry the user plane data.
iü. Dedicated trafficchannel : This channel is used for the transmission
of user data.
iii. Multicast traffic channel (MTCH) : This channel is used for the
transmission of multicast data.
iv. Control channels: The LTE CCHs carry the control plane information.
4-24 A (EC-Sem-7)
Cellular Networks
V. Broadcast control channel (BCCH):The channel provides
information to all mobile terminals connected tosystem
the
eNode B.
vi. Common control channel
(CCCH):This channel is used for random
access information needed for multicast reception.
vii. Multicast control channel (MCCH) : This channel is used for
information needed for multicast reception.
viii. Dedicated control channel (DCCH):This channel is used for
carrying
user-specific control information, for example, for controlling actions
such as power control and handover.
3. LTE transport channels :The LTE transport channels are also defined
for the uplink and the downlink, as each has different
and operates in a different manner. requirements
Downlink: Four downlink transport channels are specified as follows:
i. Broadcast channel: This channel maps to the BCCH.
ii. Downlink shared channel (DL-SCH): This channel is the main
channel for downlink data transfer. It is used by many logical channels.
iii. Paging channel:This channel is used toconvey the PCCH information.
iv. Multicast channel (MCH):This channel is used to transmit MCCH
information to set up multicast transmissions.
Uplink: The following twotransport channels are specified for uplink:
i. Uplink shared channel (UL-SCH): This channel is the main channel
for uplink data transfer. It is used by many logical channels.
ii. Random access channel (RACH) :This channel is used for random
access requirements.
PART-8
Questions-Answers
3 Small satellite earth stations are used to send and receive the signals
from the satellite. These signals can be further routed to the MSC,
which will then take care of further routing of the signals.
4 The system offers communication services to mobile users operating
within a predefined service area. The users communicate with other
mobiles or with fixed users through one of the visible satellites.
5 Users in fixed network are accessed through large fixed stations called
gateways, which carry a large amount of traffic, whereas the mobiles
are small portable units that can support only a few channels.
6
There may be one or more space segments, which may consist of one
satellite or agroup of interlinked satellites. Depending on the service
area and application, the space segments can be utilized.
7. Telemetry and control ground stations, used for monitoring and
controlling satellites, constitute a part of the space segment.
CONTENTS
Part-1 : Introduction to Mobile 5-2A to 5-4A
Adhoc Networks
5-1 A (EC-Sem-7)
5-2 A (EC-Sem-7) Wireless Networks
PART- 1
Introduction to Mobile Adhoc Networks.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Que 5.1. What is basic concept of adhoc network ? Why and how
proper route is required to discuss in adhoc network ?
AKTU2015-16, Marks 05
OR
Explain mobile adhoc network in wireless communication.
|AKTU2016-17, Marks 10
Answer
1. Mobile adhoc networks (MANETs) are collections of mobile nodes
dynamically establishing short-lived networks in the absence of fixed
infrastructure.
2. Each mobile node is equipped with a wireless transmitter and a receiver
with an appropriate antenna.
3 These mobile nodes are connected by wireless links and act as routers
for all other mobile nodes in the network.
4 Nodes in mobile adhoc networks are free to move and organize
themselves in an arbitrary manner.
5. These features make MANETs very practical and easy to deploy in
places where existing infrastructure is not capable enough to allow
communication, for instance in disaster zones or infeasible to deploy
locations.
Answer
Features of MANET:
1. Mobile ad-hoc networks are formed dynamically by an autonomous
system of mobile nodes that are connected via wireless links.
54 A (EC-Sem-7) Wireless Networks
Questions-Answers
Answer
A. Bluetooth :
1 Bluetooth is a open wireless technology standard for exchanging data
over short distances from fixed and mobile devices, creating personal
area networks (PANs) with high levels of security.
2. Bluetooth represents a single-chip, low-cost radio-based wireless
technology. Bluetooth technology aims at adhoc piconets, with very
limited coverage (upto 100 m) and without the need for infrastructure.
B. Features of bluetooth:
i. Robustness.
Low complexity.
iü. Low power.
iv. Low cost.
C. Characteristics of bluetooth :
i. Bluetooth operates in unlicensed ISM band at 2.4 GHz .
: The range of bluetooth device is power class dependent : 1 meter, 10
meter, 100 meter.
ii. Devices connected using bluetooth frequency link forms a piconet.
Que 5.5.Explain bluetooth architecture.
Wireless & Mobile Communication 5-5 A (EC-Sem-7)
Answer
Bluetooth architecture : The architecture of a bluetooth device is
described by the two terminology:
i. Piconet :
1. A piconet is a collection of bluetooth devices connected in an adhoc
fashion.
2. One device in the piconet act as master (M) and all other devices
connected to the master act as slaves (S).
3
Each piconet has exactly one master and upto seven simultaneous slaves,
i.e., a master bluetooth device can communicate with upto seven devices.
4 The master determines the hopping pattern in the piconet and the
slaves has to synchronize to this pattern.
5 Each piconet has a unique hopping pattern.
6 At any given time,data can be transferred between the master and one
other device, however, the device can switch roles and the slave can
become the master at any time.
M = Master
S - Slave
P =Parked
P
M SB= Standby
(SB)
(SB)
PART-3
Wi-Fi Standards.
Questions-Answers
Long Answer Type and Medium Answer Type Questions
802.11 LAN
802.x LAN
BSS
Access Portal
point
Distribution system
ESS Access
point
BSS.
STA,
STA3
Fig. 5.6.1. Architecture of an infrastructure-based IEEE 802.11.
Wireless & Mobile Communication 5-7A (EC-Sem-7)
JBSS
d IBSS,
STAJ
Fig. 5.6.2. Architevture of IEEE 802.11 adhoc wireless LANs.
2 This type of network provides direct communication within a limited
range.
3. Here STA, can communicate with STA, and STA, but not with STA, and
STA, since these are in different IBSS.
Following are the components :
1. Station (STA) : Terminal with access mechanisms to wireless medium.
5-8A (EC-Sem-7) Wireless Networks
Answer
The following are the various 802.11 standards along with their main
features:
1 802.1la : Wireless network bearer operating in the 5 GHz ISM band
with data rate up to 54 Mbps.
2. 802.11b :Wireless network bearer operating in the 2.4 GHz ISM band
with data rates up to 11 Mbps
3 802.1le: QoS and prioritization (QoS extension).
4 802.11f: Handover.
5. 802.11g: Wireless network bearer operating in the 2.4 GHz ISM band
with data rates up to 54 Mbps.
6 802.11h: Power control.
7. 802.1li: Authentication and encryption (enhanced security).
8 802.11j: Interworking.
9 802.11k : Measurement reporting.
10. 802.11n: Wireless network bearer operating in the 2.4 GHz and 5 GHz
ISM bands with data rates up to 600 Mbps.
11. 802.11s :Mesh networking.
Answer
security
Wi-Fi security aspects: The requirements for Wi-Fi network
can be broken down into two primary components :
Authentication : Authentication is used to keep unauthorized users
off the network. This is of two types.
a.
User authentication :
user and verifying
1. User authentication is a process of identifying the
that heshe is allowed to access some service.
user are compared with the data
2 The username and password of the access to the service.
stored in the server before providing
b. Server authentication:
verified using a digital certificate.
1. The validity of aserver or website can be
automatically within the client
2. Validation of the digital certificate occurs
software.
Wireless & Mobile Communication 5-9 A (EC-Sem-7)
ii. Privacy:
1. Privacy involves addressing the failures of the originalwired equivalent
privacy (WEP) algorithm with a robust security network (RSN) and
transition security network (TSN).
2. Other security techniques are service set identifier (SSID), 802. 1X access
control, Wi-Fiprotected access (WPA), and IEEE 802.11i.
PART-4
WiMax Standards.
Questions-Answers
Answer
WiMAX:
1 WiMAX, which stands for worldwide interoperability for microwave
access, is a new broadband wireless data communications technology or
mobile internet based around the IEEE 802.16 standard that provides
high-speed data communications (70 Mbps) over a wide area.
2. It is a technology for P2MP wireless networking.
WiMAX is a standard for WMANs that has been developed by working
group number 16 of IEEE 802, specializing in broadband wireless access.
It is suitable for rural applications.
Architecture:
1 WiMAX has two important standards or usage models :
i. A
fixed usage model IEEE 802.16d-2004 for fixed wireless broadband
access (FWBA),
Aportable usage model IEEE 802. 16e-2005 for mobile wireless broadband
access (MWBA).
2. IEEE 802.16-2004 WiMAX is through LOS communications, which
incorporates a stationary transmitter and receiver and is less complicated,
but MWBA non-line-of-sight (NLOS) communication is much more
complicated.
3. For LOS, 802.16 protocol is used between two BSs (Base station). For
fixed wireless access Wi-Fi connection, 802.16d protocol is utilized,
whereas for mobile applications,802.16e is more suitable.
5-10A (EC-Sem-7) Wireless Networks
Answer
WiMax has two important standards :
i. IEEE 802.16d:The following are the spectrum and modulation features
of the IEEE 802.16d standard:
1. WiMAX 802.16d RF signals use OFDM techniques. The signal
incorporates 256 carriers in the total signal bandwidth, which may range
from 1.25 MHz to 20 MHz.
2, Of the 256 carriers, only 200 are actually used.
3 Of the 200 carriers, 192 are used for data payload and the remaining 8
are used as pilots. The pilot carriers are always BPSK modulated and
the data carriers are modulated with BPSK, QPSK, 16QAM, or 64QAM.
4. The IEEE 802.16 WiMAX standard allows data transmission using
multiple broadband frequency ranges.
ii.
: IEEE 802.16e: The following are the spectrum and modulation features
of the IEEE 802.16e standard:
Wireless & Mobile Communication 5-11A(EC-Sem-7)
1. The mobile WiMAX air interface adopts orthogonal frequency division
multiple access (OFDMA) for improved multipath performance in NLOS
environments.
2. Scalable OFDMA (SOFDMA) is introduced in the IEEE 802.16e
amendment to support scalable channel bandwidths from
1.25 MHz to20 MHz.
3. The 802. 16e supports TDD and full and half duplex frequency division
duplex (FDD) operations.
4. Hybrid automatic repeat request (HARQ) error control protocol and
fast channel feedback (CQICH) through channel quality index make
the system more reliable.
PART-5
Li-Fi Communication.
Questions-Answers
1. The PHY Iwas established for outdoor application and works from
11.67 kbit/s to 267.6 kbit/s.
The PHY II layer permits reaching data rates from 1.25 Mbit/s to
96 Mbit/s.
iii. The PHY IIIis used for many emissions sources with a particular
modulation method called colour shift keying (CSK). PHY III can deliver
rates from 12 Mbit/s to 96 Mbit/s.
8 The modulation formats recognized for PHY I and PHY II are on-off
keying (OOK)and variable pulse position modulation (VPPM).
9 The Manchester coding used for the PHY Iand PHY IIlayers includes
the clock inside the transmitted data by representing a logic Owith an
0OK symbol 01" and a logic1 with an 00K symbol "10", all with a DC
component. The DC component avoids light extinction in case of an
extended run of logic O's.
PART-6
Ultra-Wideband Communication.
Questions-Answers
Answer
1. Ultra-wideband (UWB) is for indoor and short-range outdoor
communication.
PART-7
Questions-Answers
Long Answer Type and Medium Answer Type Questions
Answer
A. Mobile Data Network:
1. By mobile data networks we refer to those services, technologies, and
standards that are related to data services over wide area coverage,
areasspanning more than the local area or campus.
2. In addition to traditional mobile data services, SMS services can also be
considered as a part of these systems.
3. As shown in Fig. 5.13.1 we can classify mobile data networks into three
categories :
Mobile data networks
3
licensed bands. Examples
The first group uses independent spectrum in historically they were the
of such networks are ARDIS and Mobitex and
first mobile data services that were introduced.
makes use of
4 The secondgroup of independent mobile data networks
unlicensed spectrum that is shared among a variety of applications and
users.
for
5 This service was deployed in airports and some metropolitan areas
wireless internet access.
ii. Shared mobile data:
1 These networks share the spectrum and part of the infrastructure with
operates
an already existing voice-oriented analog service. The servicehave their
in the same radio channels used for analog voice, but they
own air-interface and MAC protocols.
services
2 In addition to dedicated channels for data, these mobile data
can also use the available unused voice channels.
therefore the
3. These systems share an existing system infrastructure,
initial investment is not huge and it could be made as gradually as
possible.
subscriber
4. Initial deployment could be made in areas where there is
demand and subsequent penetration into other areas is considered as
the customer base enlarges.
5. The CDPD service, which shares spectrum and part of the infrastructure
with AMPS, is an example of such networks.
with
6 It does have an independent air-interface and MAC layer along
additional infrastructure required for operation of data services.
iii. Overlay mobile data:
1 The last group of mobile data networks in an overlay on existing networks
and services. This means that the data service willnot only make use
of
also the MAC frames and
the spectrum allocated for another service but
air-interface of an existing voice-oriented digital cellular system.
2
GPRS and GSM's SMS are examples of such overlays. They make use of
free time slots available within the trafficchannels and signaling channels
in GSM.
a
3 This way, the amount of new infrastructure required is reduced to
bare minimum. Most of the extra components required and implemented
in software, making it inexpensive and easy to deploy.
4 GPRS type of service uses computer keyboards tocommunicate longer
messages and SMS use the cellular phone dialing keypad to communicate
short messages.
B. Features of mobile Ad-Hoc networks: Refer Q. 5.3, Page 5-3A,
Unit-5.
Wireless & Mobile Communication 5-15A (EC-Sem-7)
PART-8
Questions-Answers
Answer
i Wireless standard IMT 2000:
1 The vision for an IMT-2000 system and its capabilities is summarized
which illustrates that IMT-2000 will provide capabilities constituting
significant improvements over the current mobile systems, especially in
terms of global mobility for the users and support of services like high
speed data, multimedia, and internet.
2. Since, however, it is generally accepted that these IMT-2000 capabilities
will to a large extent be achieved by evolving existing wireline and
wireless networks, IMT-2000 will be a family of systems rather than a
single,monolithic network.
Global
Basic terminal
PDA terminal
audiovisual
terminal
3 IMT-2000 vision:
i Common spectrum worldwide (1.8 - 2.2 GHz band).
i. Multiple radio environments (cellular, cordless, satellite, LANS).
üi. Wide range of telecommunication services (voice, data, multimedia,
internet).
iv. Flexible radio bearers for increased spectrum efficiency.
V. Data rates up to 2 Mb/s (phase 1) for indoor environments.
Vi. Maximum use of IN capabilities (for service provision and transport).
v. Global seamless roaming.
viü. Enhanced security and performance.
ix. Integration of satellite and terrestrial system.
4. Aglobal standard to satisfy market demand for mobile services in the
21st century.
5. In scope, IMT-2000 service environments will address the full range of
mobile and personal communication applications shown in Fig. 5.14.1:
in building (picocell), urban (microcell), suburban (macrocell), and global
(satellite), as well as communications types that include voice, data and
image.
6. Support communication needs for developing countries in the form of
fixed wireless access (FWA) application is also included in the scope of
IMT-2000.
AKTU2017-18, Marks 10
Answer
Realization of IMT-2000 networks: To construct IMT-2000 networks
of the
from conventional networks, network venders can use either
following two network construction methods :
1 New installation of IMT-2000 networks.
2 Construction of IMT-2000 networks through effective use of existing
networks.
: An
Necessary nodes for construction of IMT-2000 networks
IMT-2000 network basically consists of the RAN, CN, IN, and other
elements as shown in Fig. 5.15.1.
user terminal
1 RAN: The RAN is a wireless network located between the
Node
and the CN. It is composed of Radio Network Controllers (RNCs),
Bs, OMC-Rs, and other components.
Wireless & Mobile Communication 5-17A (EC-Sem-7)
2. CN:
i.
The CN is a network located between the RAN and another network
(e.g., a Public Switched Telephone Network (PSTN).
ii. It is composed of circuit switches,packet switches, subscriber databases,
address resolution servers for packet processing and the authentication
and security centers.
i. Voice Mail System (VMS) :This has voice recording and replay
functions such as an answer phone. There is also a component for
receiving and re-sending faxes.
i. Short Message Center (SMSC):This component is used for
transmitting and receiving character information.
ii. Group Call Register (GCR) :This is a database for group call services.
iv. Wireless Application Protocol (WAP) server: This is a server that
offers subscribers various information using the Wireless Application
Protocol.
Answer
IMT-2000 has the following key features :
1. Flexibility:
i With the large number of mergers and consolidations occurring in the
mobile industry, and the move intoforeign markets, operators wanted
5-18 A (EC-Sem-7)
Wireless Networks
to avoid having to support a wide range of different interfaces and
technologies. This would surely have hindered the growth of 3G
worldwide.
The IMT-2000 standard addresses this problem, by
providing a
flexible system, capable of supporting a wide range of serviceshighly
and
applications.
iii. The IMT-2000 standard accommodates five possible radio
interfaces
based on three different access technologies (FDMA, TDMA, and CDMA),
as shown in Fig. 5.16.1.
IMT-2000 terrestrial
radio interfaces
IM T
Paired spectrum
Unpaired spectrum
IMT-DS IMT-MC IMT-TC IMT-SC IMT-FT
W-CDMA CDMA2000 UTRA TDD UMO-136 DECT
(UTRA FDD) Multi TD-SCDMA Single Frequency
Direct spread carrier Time-code carrier time
PART-9
Questions-Answers
Answer
A 4G: Refer Q. 5.17, Page 5-19A, Unit-5.
B. NGN:
1 The IP telecommunication network architecture and software layer
architecture are shown in Fig. 5.19,1 in which bearer control layer and
logical bearer network perform network control together.
CM1 CM3
Bearer
control layer
CM2
. MA2, MA4'.
Logical
bearer MA3/
network
MAT
Physical EMA
MA2
network
E MA4,
V.
Management layer : It provides web-based GUI browser and wireless
connection information such as the data access using XML and web
based visualization for data presentation, monitoring, modification and
decision making in NGN.
Que 5.20. Why next generation network is important ? Explain
the next generation network in detail.
AKTU2016-17, Marks 10
Answer
A. NGN: Refer Q. 5.19, Page 5-21A, Unit-5.
B. Reason :
i. Very high-speed and high-quality transmission :
1. Next-generation mobile communication systems should be able to handle
a large volume of multimedia information like downloading an e-book
or sending a report file.
2 This would be possible by various means like transmitting data at 50-100
Mbps, having asymmetric speeds in up and down links with QoS
mechanisms (i.e., efficient encoding, error detection and correction
techniques, voice equalizer) at low, affordable and reasonable operating
costs.
2 This means that the user can freely select protocols, applications and
networkS.
3 Location and charging information can be shared among networks and
applications.
iii. Flexible and variable service functions :
1 Next-generation networks should be seamless with regard to the
medium, whether it is wireless or optical fiber or satellite link with
regard to corresponding hosts or service providers as well as have
interconnectivity with other networks like GSM and CDMA.
Que 5.21. Describe all network elements in network architecture
of NGN.
Answer
NGN network architecture: The detailed network architecture for
next-generation networks is shown in Fig. 5.21.1.
Access
Intelligent network gateway
app. servers
Softswitch media
N7 gateway controller
H.248
signalling
PSTN IP/XX*
PBX
network
Trunking Access
gateway H.248 gateway
Access H.248
gateway
11. CAC:
Call acceptance control function in order to accept/reject traffic in the
network that allows guarantee of QoS for services witha service level
agreement.
12. BGP:
Border gateway protocol to negotiate flow routing
procedures and
capacities across different NGN network domains.
service of next
Que 5.22. Explain various applications and
generation network (NGN). |AKTU 2015-16, Marks 7.5
Answer
A NGN application:
1 In Data Connectivity, it offers many value
added services such as
Connections (SVC),
bandwidth on demand, durable Switched Virtual
call admission control etc.
2
groupware and
In Multimedia, it enables collaborative computing andvoice,video, and/
supports interactivity among multiple parties sharing
or data.
3.
processing and
In Public Network Computing (PNC), it supports generic time reporting,
storage capabilities, Enterprise Resource Planning (ERP),
and miscellaneous consumer applications.
4. In Home Networking, it supports intelligent appliances, home security
systems, energy systems, and entertainment systems.
5. In Interactive gaming, it establishes interactive gaming sessions among
multiple users.
6. In Virtual Private Network (VPN), it offers uniform dialing capabilities
for data VPNs.
for voice VPNs and added security and network features
7. In E-commerce, it enables e-transactions, verification of payment
information, trading, home banking and shopping etc.
B. Service of NGN:
1 Specialized resource services (e.g., provision and management of
transcoders.
2 Processing and storage services (e.g., file servers.
3 Middleware services (e.g., brokering, security, licensing, etc.)
4 Application-specific services (e.g., business applications,
e-commerce applications, interactive video games, etc.).
5. Content provision services that provide or broker information content
(e.g., electronic training, information push services etc.).
6 Interworking services for interactions with other type of applications,
services, networks, protocols or formats (e.g., EDI translation).