BHS UNIT 1 Notes
BHS UNIT 1 Notes
Buil C
150
location dependent information
t
B
• ad-hoc networks for
multi user games
Mobile Devices
Pager PDA Laptop
• receive only • simple graphical displays • fully functional
• tiny displays • character recognition • standard applications
• simple text • simplified WWW
messages
Sensors,
embedded
controllers
performance
Impact of Portability on Device Design / Functionality
• Power consumption
• battery capacity - limited computing power, low quality/smaller displays, smaller
disks, fewer options (I/O, CD/DVD)
• CPU: power consumption ~ CV2f
• C: internal capacity, reduced by integration
• V: supply voltage, can be reduced to a certain limit
• f: clock frequency, can be reduced dynamically based on usage
• Device vulnerability
• more rugged design required to withstand bumps, weather conditions, etc.
• theft
• Limited/Simpler User Interfaces
• display size
• compromise between comfort/usability and portability (keyboard size)
• integration of character/voice recognition, abstract symbols
• Limited memory
• memory limited by size and power
• flash-memory or ? as alternative
Wireless Networks Compared to Fixed
Networks
• Higher loss-rates due to interference
• other EM signals, objects in path (multi-path, scattering)
• Limited availability of useful spectrum
• frequencies have to be coordinated, useful frequencies are almost all occupied
• Low transmission rates
• local area: 2 – 11 Mbit/s, wide area: 9.6 – 19.2 kbit/s
• Higher delays, higher jitter
• connection setup time for cellular in the second range, several hundred milliseconds for wireless LAN systems
• Lower security, simpler active attacking
• radio interface accessible for everyone
• base station can be simulated, thus attracting calls from mobile phones
• Always shared medium
• secure access mechanisms important
Location Dependent Services
• Location aware services
• what services, e.g., printer, fax, phone, server etc. exist in the local
environment that can be used by the user (security and authentication)
• Follow-on services
• automatic call-forwarding, transmission of the actual workspace to the
current location
• Information services
• push: e.g., current special offers in the supermarket
• pull: e.g., where is the Sarah Lee New York Cheese Cake?
• Support services
• caches, intermediate results, state information, etc., follow the mobile
device through the fixed network
• Privacy
• who should gain knowledge about the location of the user/device
History & Development – Theoretical Foundations
• Electro Magnetic (EM) waves
• 1678 Huygens work on the phenomena of light reflection
and refraction
• 1819 Fresnel demonstrates the wavelike nature of light
• 1831 Faraday demonstrates electromagnetic induction
• 1864 J. Maxwell introduces the theory of electromagnetic
fields, wave equations
• 1886 H. Hertz demonstrates experimentally the
transmission and detection of an EM wave between two
points a few meters apart
• 1896 Marconi recognized that longer waves propagate
over larger distances and demonstrates a communication
set-up over 3km
History & Development: Development & Applications
Ubiquitous Computing
Impressive Wireless Infrastructure!
Global
Satellite
Suburban
Urban
In-Building
Micro-Cell Pico-Cell
Macro-Cell
dik ©
In-Room
(BlueTooth)
Mobile Computing
• Using:
• small size portable computers, hand-helds, MNC, and
other small wearable devices,
• To run stand-alone applications (or access remote
applications) via:
• wireless networks: IR, BlueTooth, W-LANs, Cellular, W-
Packet Data networks, SAT. etc.
• By:
• nomadic and mobile users (animals, agents, trains,
cars, cell phones, ….)
MOBILE COMPUTING
• Mobile computing can be defined as a computing
environment over physical mobility.
• The user of a mobile computing environment will be able to
access data, information or other logical objects from any
device in any network while on the move.
MOBILE COMPUTING Cont.
• Mobile computing system allows a user to perform a
task from anywhere using a computing device in the
public (the Web), corporate (business information) and
personal information spaces (medical record, address
book).
MOBILE COMPUTING Cont.
• Network Mobility:
• User should be able to move from one network to another
network and use the same service.
• Example could be a user moves from Hong Kong to New Delhi
and uses the same GSM phone to access the corporate
application through WAP (Wireless Application Protocol). In
home network he uses this service over GPRS (General Packet
Radio Service) whereas in Delhi he accesses it over the GSM
network.
Mobile Computing Functions Cont.
• Bearer Mobility:
• User should be able to move from one bearer to another and use
the same service.
• Example could be a user was using a service through WAP bearer
in his home network in Bangalore. He moves to Coimbatore,
where WAP is not supported, he switch over to voice or SMS(Short
Message Service) bearer to access the same application.
Mobile Computing Functions Cont.
• Device Mobility:
• User should be able to move from one device to another and use
the same service.
• Example could be sales representatives using their desktop
computer in home office. During the day while they are on the
street they would like to use their Palmtop to access the
application.
Mobile Computing Functions Cont.
• Session Mobility:
• A user session should be able to move from one user-agent
environment to another.
• Example could be a user was using his service through a CDMA
(Code Division Multiple Access) IX network. The user entered
into the basement to park the car and got disconnected from his
CDMA network. User goes to home office and starts using the
desktop. The unfinished session in the CDMA device moves from
the mobile device to the desktop computer.
Mobile Computing Functions Cont.
• Service Mobility:
• User should be able to move from one service to another.
• Example could be a user is writing a mail. To complete the mail
user needs to refer to some other information. In a desktop PC,
user simply opens another service (browser) and moves
between them using the task bar. User should be able to switch
amongst services in small footprint wireless devices like in the
desktop.
Mobile Computing Functions Cont.
• Host Mobility:
• The user device can be either a client or server.
• When it is a server or host, some of the complexities change.
• In case of host mobility the mobility of IP needs to be taken care
of.
Logical Functions of Mobile Computing
• The mobile computing functions can be logically divided
into following major segments:
1. User with device:
• The user device, this could be a fixed device like desktop computer in
office or a portable device like mobile phone.
• Example: laptop computers, desktop computers, fixed telephone,
mobile phones, digital TV with set-top box, palmtop computers, pocket
PCs, two way pagers, handheld terminals, etc.
Mobile Computing Functions
Logical Functions of Mobile Computing
2. Network:
• Whenever a user is mobile, he will be using different networks at different places at
different time.
• Example: GSM, CDMA, iMode, Ethernet, Wireless LAN, Bluetooth etc.
Logical Functions of Mobile Computing
3. Gateway:
• This is required to interface different transport bearers.
• These gateways convert one specific transport bearer to another
transport bearer.
• Example: From a fixed phone (with voice interface) we access a service
by pressing different keys on the telephone. These keys generate DTMF
(Dual Tone Multi Frequency) signals.
• These analog signals are converted into digital data by the IVR
(Interactive Voice Response) gateway to interface with a computer
application.
• Other examples will be WAP gateway, SMS gateway etc.
Logical Functions of Mobile Computing
4. Middleware:
• This is more of a function rather than a separate visible node.
• In the present context middleware handles the presentation and rendering of the
content on a particular device.
• It will also handle the security and personalization for different users
Logical Functions of Mobile Computing
5. Content:
• This is the domain where the origin server and content is.
• This could be an application, system, or even an aggregation of systems.
• The content can be mass market, personal or corporate content.
• Origin server will have some means to accessing the database and the storage devices
Issues in Mobile Computing
• Or
R
R
R
Cell
R R
(a) Ideal cell (b) Actual cell (c) Different cell models
Impact of Cell Shape and Radius on
Service Characteristics
THE CELLULAR CONCEPT
Cluster of 7 cells
Cells
F7 F2
F7 F2 F6 F1
F1 F3
F6 F1
F1 F3 F5 F4 F7 F2
F5 F4 F7 F2 F6 F1
F1 F3
F6 F1
F1 F3 F5 F4
Re
u
se
F5 F4
d ist
R Cluster
• For hexagonal cells, the reuse
distance is given by
F7 F2
D 3N R
F6 F1
F1 F3
where R is cell radius and N is the
reuse pattern (the cluster size or the
F5 F4 F7 F2 number of cells per cluster).
F6 F1 F3 • Reuse factor is
F1
D
Re
q 3N
us
ed
F5 F4
R
ist
an
ce
D
Reuse Distance (Cont’d)
j=1
j=1 i=2
i=2 j=1
j direction
i=2
60° i=2
i direction j=1
j=1
1 2 3… i i=2 i=2
j=1
(a) Finding the center of an adjacent cluster (b) Formation of a cluster for N = 7
using integers i and j (direction of i and j can with i=2 and j=1
be interchanged).
Reuse Distance (Cont’d)
j=2
(c) A cluster with N =12 with i=2 and j=2 (d) A Cluster with N = 19 cells with i=3
and j=2
CELLULAR NETWORK
cell
Cell i Cell j
-60 -60
-70 -70
-80 -80
-90
-90 -100
-100
Cell i Cell j
-60
-70
-60
-80
-70
-90
-80
-90 -100
-100 Signal strength contours indicating actual cell tiling.
This happens because of terrain, presence of obstacles
and signal attenuation in the atmosphere.
Handoff Region
Signal strength Signal strength
due to BSi due to BSj
Pi(x) Pj(x)
Pmin
BSi MS BSj
X1 X3 X5 Xth X4 X2
P ( n, t )
t n
e t
n!
Assuming to be the service rate, probability of each call
to terminate during interval t is given by t.
Thus, probability of a given call requires service for time t
or less is given by
S (t ) 1 e t
Erlang B and Erlang C
• Probability of an arriving call being blocked is
aS 1
B S , a S k
, Erlang B formula
S! a
k 0 k !
F7 F2
F1 F2 F1 F2
F6 F1 F3
F1 F2 F3
F3 F3 F4
F5 F4
R
D6
D5
D1
D4 Mobile Station
D2
D3
D6
R
D5
D1
D4
Mobile Station
D2
D3
Large cell
(low density)
Small cell
(high
density)
Smaller cell
(higher density)
c
c
120o 120o
a
b a
b
d f
90o e 60o a
a
c
d b
b c
C
X
A
Worst Case for Forward Channel Interference in
Three-sectors
BS
D + 0.7R
BS
MS
R
BS
D
BS
C C
I q q 0.7
q D/R
Worst Case for Forward Channel Interference in
Three-sectors (Cont’d)
BS
D
D’ BS
MS
R
BS
D
BS
C C
I q q 0.7
q D/ R
Worst Case for Forward Channel
Interference in Six-sectors
MS
BS
R
D +0.7R
C C
I q 0.7
BS
q D/R
Channel Assignment Strategies
• Frequency reuse scheme
– increases capacity
– minimize interference
• Channel assignment strategy
– fixed channel assignment
– dynamic channel assignment
• Fixed channel assignment
– each cell is allocated a predetermined set of voice channel
– any new call attempt can only be served by the unused channels
– the call will be blocked if all channels in that cell are occupied
• Dynamic channel assignment
– channels are not allocated to cells permanently.
– allocate channels based on request.
– reduce the likelihood of blocking, increase capacity.
GSM
• One of the most popular standards for mobile phones in the
world.
• Formerly: Groupe Spéciale Mobile (founded 1982)
• Now: Global System for Mobile Communication
• European standard, moving to North America
• More than one billion people use GSM phones as of 2005,
making GSM the dominant mobile phone system worldwide
with about 70% of the world's market.
• GSM is a cellular network, which means that mobile phones
connect to it by searching for cells in the immediate vicinity.
• One of the key features of GSM is the Subscriber Identity
Module (SIM), commonly known as a SIM card. The SIM is a
detachable smartcard containing the user's subscription
information and phonebook.
GSM
• More than 800 million end users in 190 countries and
representing over 70% of today's digital wireless
market.
• source: GSM Association
• Israel
• Orange uses GSM
• Pelephone and Cellcom are about to use GSM
Network Structure
• Cell
A cell is the basic unit of a cellular system and is
defined as the radio coverage given by one BTS.
89
Network Structure
LOCATION AREA
A LA is defined as a group of cells.Within the
network, a subsriber’s location is known by the LA
which they are in.
The identity of the LA in which an MS is currently
located is stored in the VLR. (LAI)
Network Structure
Location
CellArea
Location Area
MSC Service Area
PLMN Service Area
GSM Service Area
Into the architecture
• Mobile phone is identified by SIM card.
• Key feature of the GSM
• Has the “secret” for authentication
Into the architecture(2)
• BTS – houses the radiotransceivers of the cell and handles the radio-
link protocols with the mobile
• BSC – manages radio resources (channel setup, handover) for one or
more BTSs
Into the architecture(3)
• MSC – Mobile Switching Center
• The central component of the network
• Like a telephony switch plus everything for a mobile subscriber:
registration, authentication, handovers, call routing, connection to
fixed networks.
• Each switch handles dozens of cells
Into the architecture(4)
• HLR – database of all users + current location. One per network
• VLR – database of users + roamers in some geographic area. Caches
the HLR
• EIR – database of valid equipment
• AuC – Database of users’ secret keys
Mobile Station
99
Functions of Mobile Station
• Voice and data transmission & receipt
• Frequency and time synchronization
• Monitoring of power and signal quality of the
surrounding cells
• Provision of location updates even during inactive
state
Mobile Station
MSC/VLR
BSC BSC
BSC
BSS
BSS
n BTS n BTS
FUNCTIONS OF BTS (Base Transceiver Station)
• Radio resources
• Signal Processing
• Signaling link management
• Synchronization
• Local maintenance handling
• Functional supervision and Testing
FUNCTIONS OF BSC
A BTS
MSC BSS A-bis BTS BTS
BTS
Switching System (SS)
SS7 Signalling
Traffic Path VLR D
C HLR AUC
F
E
Other
EIR A
MSC MSC
(PSTN)
(BSS)
MSC Functions
• Switcing and call routing
• Charging
• Service provisioning
• Communication with HLR
• Communication with VLR
• Communication with other MSCs
• Control of connected BSCs
MSC Functions
• Echo canceller operation control
• MSRN
• This data base stores IMEI for all registered mobile equipments and is unique to
every ME.
2. SRES(Signed response)
3. Kc(ciphering key)
Operations and Maintenance Centre
OMC
The centralized operation of the various units in
the system and functions needed to maintain the
subsystems.
-Configuration management
-Performance supervision/management
BSC
BSC
RSS (Radio Subsystem)
NSS (Network and switching subsystem)
OSS (Operation Subsystem)
MS (Mobile Station)
BTS (Base Transceiver Station)
RSS MS BSC (Base Station Controller)
MS MSC (Mobile Services Switching Center)
GMSC (Gateway MSC)
HLR (Home Location Register)
BTS VLR (Visitor Location Register)
EIR (Equipment Identity Register)
AUC (Authentication Center )
OMC (Operation and Maintenance Center )
GSM System Architecture
GSM System Architecture
Channels on Air Interface
The GSM radio interface
• Modulation used
Gaussian Minimum Shift Keying (GMSK)
Definition of Channels
Logical Channel
Type of information to be transmitted e.g., traffic or control logical channels.
Transport Channel
How and with what format data is transmitted through physical links.
Physical Channel
Unit of radio resource of a radio system e.g., frequency band, time slot, code, etc.
RF Channel
Fixed frequency band of a radio system.
The MAC sub-layer is responsible for mapping logical channels onto transport
channels.
The physical layer is responsible for mapping transport channels onto physical
Channels.
GSM Physical Channel
c y
en
qu
890-915 MHz
fre
124 channels (200 kHz)
uplink
higher GSM frame structures
time
1 2 3 4 5 6 7 8
4.615 ms
superframe
0 1 2 ... 48 49 50
6.12 s
0 1 ... 24 25
multiframe
0 1 ... 24 25 120 ms
0 1 2 ... 48 49 50 235.4 ms
frame
0 1 ... 6 7 4.615 ms
slot
burst 577 µs
The process of hand-over
• When a mobile moves into a different cell while a conversation is in
progress, the MSC automatically transfers the call to a new channel
belonging to the new base station.
• This handoff operation not only involves identifying a new base
station, but also requires that the voice and control signals be
allocated to channels associated with the new base station.
• Processing handoffs is an important task in any cellular radio system.
• Many handoff strategies prioritize handoff requests over call initiation
requests when allocating unused channels in a cell site.
Handoff
• When a mobile user is engaged in conversation, the MS is connected
to a BS via a radio link.
• If the mobile user moves to the coverage area of another BS, the radio
link to the old BS is eventually disconnected, and a radio link to the
new BS should be established to continue the conversation.
• This process is variously referred to as automatic link transfer,
handover, or handoff.
Handover / Handoff
• Occurs as a mobile moves into a different cell during an existing call,
or when going from one cellular system into another.
• It must be user transparent, successful and not too frequent.
• Not only involves identifying a new BS, but also requires that the voice and
control signals be allocated to channels associated with the new BS.
Hard handoff between the MS and BSs.
Hard handover
• The definition of a hard handover or handoff is one where an existing
connection must be broken before the new one is established.
• One example of hard handover is when frequencies are changed.
• As the mobile will normally only be able to transmit on one frequency at a
time, the connection must be broken before it can move to the new
channel where the connection is re-established. This is often termed and
inter-frequency hard handover. While this is the most common form of
hard handoff, it is not the only one.
• It is also possible to have intra-frequency hard handovers where the
frequency channel remains the same.
• Although there is generally a short break in transmission, this is normally
short enough not to be noticed by the user.
Soft handover
• The new 3G technologies use CDMA where it is possible to have
neighbouring cells on the same frequency and this opens the
possibility of having a form of handover or handoff where it is not
necessary to break the connection.
• This is called soft handover or soft handoff, and it is defined as a
handover where a new connection is established before the old one is
released.
• In UMTS most of the handovers that are performed are intra-
frequency soft handovers.
Softer handover
• The third type of hand over is termed a softer handover, or handoff. In
this instance a new signal is either added to or deleted from the
active set of signals.
• It may also occur when a signal is replaced by a stronger signal from a
different sector under the same base station.
• This type of handover or handoff is available within UMTS as well as
CDMA2000.
Handoffs
• GSM uses mobile assisted hand-off (MAHO). Signal strength
measurements are sent to the BS from the mobile.
• The MSC decides when to do a handoff and it informs the new BS and
the mobile.
• When a mobile switches to a new BS it sends a series of shortened
bursts to adjust its timing (giving the bS time to calculate it and send
it) and allow the new BS to synchronize its receiver to the arrival time
of the messages
4 types of handover
1
2 3 4
MS MS MS MS
MSC MSC
GSM handoffs
• Intra-BSS: if old and new BTSs are attached to same base station
• MSC is not involved
• Intra-cell handover: Within a cell, narrow-band interference could make transmission at a certain frequency
impossible. The BSC could then decide to change the carrier frequency (scenario 1).
Inter-cell, intra-BSC handover: This is a typical handover scenario. The mobile station moves from one cell to
another, but stays within the control of the same BSC. The BSC then performs a handover, assigns a new radio
channel in the new cell and releases the old one (scenario 2).
• Intra-MSC: if old and new BTSs are attached to different base stations but within same MSC
• As a BSC only controls a limited number of cells; GSM also has to perform handovers between cells controlled by
different BSCs. This handover then has to be controlled by the MSC (scenario 3).
HO_MARGIN
MS MS
BTSold BTSnew
Handover procedure
MS BTSold BSCold MSC BSCnew BTSnew
measurement measurement
report result
HO decision
HO required HO request
resource allocation
ch. activation
HO complete HO complete
clear command clear command
clear complete clear complete
GSM Intra-MSC handoff
1. Mobile station monitors signal quality and determines
handoff is required, sends signal measurements to
serving BSS
2. Serving BSS sends handoff request to MSC with ranked
list of qualified target BSSs
3. MSC determines that best candidate BSS is under its
control
4. MSC reserves a trunk to target BSS
5. Target BSS selects and reserves radio channels for new
connection, sends Ack to MSC
6. MSC notifies serving BSS to begin handoff, including new
radio channel assignment
GSM Intra-MSC handoff
7. Serving BSS forwards new radio channel assignment
to mobile station
8. Mobile station retunes to new radio channel, notifies
target BSS on new channel
9. Target BSS notifies MSC that handoff is detected
10.Target BSS and mobile station exchange messages to
synchronize transmission in proper timeslot
11.MSC switches voice connection to target BSS, which
responds when handoff is complete
12.MSC notifies serving BSS to release old radio traffic
channel
GSM Inter-MSC handoff
1. MS sends signal measurements to serving BSS
2. Serving BSS sends handoff request to MSC
3. Serving MSC determines that best candidate BSS is under
control of a target MSC and calls target MSC
4. Target MSC notifies its VLR to assign a TMSI
5. Target VLR returns TMSI
6. Target MSC reserves a trunk to target BSS
7. Target BSS selects and reserves radio channels for new
connection, sends Ack to target MSC
8. Target MSC notifies serving MSC that it is ready for
handoff
GSM Inter-MSC handoff
9. Serving MSC notifies serving BSS to begin handoff, including
new radio channel assignment
10.Serving BSS forwards new radio channel assignment to
mobile station
11.Mobile station retunes to new radio channel, notifies target
BSS on new channel
12.Target BSS notifies target MSC that handoff is detected
13.Target BSS and mobile station synchronize timeslot
14.Voice connection is switched to target BSS, which responds
when handoff is complete
15.Target MSC notifies serving MSC
16.Old network resources are released
Advantages of GSM
• GSM is mature, this maturity means a more stable network with
robust features.
• Less signal deterioration inside buildings.
• Ability to use repeaters
• The availability of Subscriber Identity Modules allows users to switch
networks and handsets at will.
• GSM covers virtually all parts of world so international roaming is not
a problem.
Disadvantages of GSM
• Pulse nature of transmission interferes with some electronics,
especially certain audio amplifiers.
• Intellectual property is concentrated among a few industry
participants, creating barriers to entry for new entrants and limiting
competition among phone manufacturers.
• GSM has a fixed maximum cell site range of 35 km, which is imposed
by technical limitations.
IS-95 / CDMA
Outline
• CDMA Definition
• IS95 – CDMA One
• WCDMA - UMTS
• Who uses it
• Sprint
• PN sequences / Orthogonal Vectors Example
• CDMA Benefits
CDMA
• CDMA – Code Division Multiple Access
• Fully digital wireless data transmission system
• Not designed for voice at all
• Uses special random numbers to encode bits of
information.
• Allows multiple access by assigning different users different
random numbers on the same channel.
• Users have control of a very wide channel bandwidth 1.5 to 5 MHz
• The only limit to the system is the computing prowess of
the base station and it’s ability to separate noise from
actual data.
• Shannon’s Theorem / SQR
IS-95
• CDMA is an access method.
• IS-95 was the first ‘operating system’ to use CDMA
• Invented by Qualcomm
• Began production in 1995.
• At this point, this is still called 2G wireless.
• Known as a narrowband system.
• Being supplanted by CDMA2000 (WCDMA) and
UMTS, fully 3G systems.
• They both use CDMA.
• Known as wideband systems.
How IS-95 Works
• Operates in the same bandwidth as GSM:
• 1850 to 1910 MHz Mobile to Base
• 1930 – 1990 MHz Base to Mobile
• Channels are 1.25 MHz
• 3.75 MHz in CDMA 2000, 5 MHZ in UMTS
• Results in approximately only 48 forward/reverse channel pairs in IS-95.
• Adjacent cell phone towers use the exact same channels as all other
towers.
• This is a major difference.
• Allows for much better frequency reuse and makes setting up a cellular
network much easier.
How IS-95 Works
• When a phone is turned on, it scans one of the
forward channels to find a base station identifier.
• Camps on the strongest signal.
• The phone sends out an encrypted pass key and gains
access to the network.
• It can then send and receive calls.
• It is assigned a 1.25 MHz wide frequency to operate on.
• It listens for pages on the forward channel to let it
know it has a call incoming.
• This is all very similar to how GSM operates so far.
IS-95 Vocoders
• IS-95 uses extremely advanced vocoders that use variable encoding
rates just like GSM.
• They operate at variable rates, up to a maximum of 9600 bps.
• At a minimum, it encodes 1200 bps, so that the phone doesn’t seem
dead.
• The quality, though less than AMPS, is much higher than GSM, on
average.
IS-95 Vocoders
• However, due to the nature of CDMA, a CRC code is automatically
appended in order to do error checking / error correcting.
How IS-95 Works
• The access method is what makes IS-95 different.
• The access method is called CDMA.
• CDMA is a transmission technique to pass information from the
mobile to the base station and from the base station back to the
mobile.
CDMA Analogy
• 10 people in a room.
• 5 speak English, 2 speak Spanish, 2 speak Chinese, and 1 speaks Russian.
• Everyone is talking at relatively the same time over the same medium
– the air.
• Who can listen to whom and why?
• Who can’t you understand?
• Who can’t speak to anyone else?
CDMA
• Spread Spectrum.
• A signal takes up 6 – 10 times the bandwidth that it needs
at a minimum.
• This seems deliberately inefficient.
• The military used spread spectrum communications
because the signal is:
• Difficult to block.
• Difficult to listen in on.
• Difficult to even identify from noise.
• Much more difficult to tune into a certain frequency.
CDMA
• In CDMA, all users share the same 1.25 MHz bandwidth.
• They all transmit a signal that’s the exact same size, 1.25 MHz
• There’s actually .02 MHz of a guard band, meaning that the actual
bandwidth is 1.23 MHz.
• This would be like 100 AM radio stations all transmitting on the exact
same frequency.
• However, with CDMA, unique digital codes are used to
separate each of the mobile phones.
• Essentially, this makes each mobile phone speak a different language.
• Also, it’s language is very unpredictable, it starts at a random language
and changes in random fashion with a given seed.
• Also, the base station can speak every language as long as it is
synchronized.
• Also, the languages are special in that they will be able to mathematically
never interfere with each other.
• Each bit of the conversation is encoded with this special code.
CDMA Codes Part 1
• In IS-95, the mobile and base station must be synchronized to a nearly
perfect time clock.
• CDMA actually uses GPS satellites to obtain a very accurate, system
wide clock.
• This clock is obtained by every cell phone tower and is used to seed the code
generation process.
CDMA Codes Part 2
• The base station and mobile phone have an algorithm for generating
pseudo random numbers.
• Uses something called Walsh Vectors.
• This mathematical function has a way to generate 128 bit random numbers that are
orthogonal to every other random number that is has generated.
• This random number generator has a very large period.
• When they both start at the same seed (the time), both the mobile and base
station should generate the same random numbers.
• The random number is actually only 32 bits.
CDMA Codes Part 3
• This random number is convoluted with the data.
• Also, a time stamp is added.
• And error codes are added.
• The result is 128 bits that represent only 1 bit of data.
• This is a very computationally intense process.
• But, modern cell phones have fast processors.
• So, the original 9600 bps of conversation has been multiplied to 1.23
Mbps.
CDMA Codes Example
• These codes are designed to never interfere with any other codes to a
very high probability.
• Example (on board)
• The base station, using the mobile’s known code, can convolute this
code with everything that it received.
• This convolution results in only what the mobile sent.
• The base station does have to be smart enough to recognize between
voice traffic and noise.
CDMA Handoffs
• A CDMA telephone gets to decide on the handoff.
• This is different than GSM
Handoff in CDMA System
• In GSM hard handoff occurs at the cell boundary
• Soft Handoff
• Mobile commences Communication with a new BS without interrupting communication with
old BS
• same frequency assignment between old and new BS
• provides different site selection diversity
• Softer Handoff
• Handoff between sectors in a cell
• CDMA to CDMA hard handoff
• Mobile transmits between two base stations with different frequency assignment
Soft Handoff- A unique feature of CDMA
Mobile
Advantages
• Contact with new base station is made before the call is
switched
• Diversity combining is used between multiple cell sites
• Diversity combining is the process of combining information from
multiple transmitted packets to increase the effective SNR of
received packets
• additional resistance to fading
• If the new cell is loaded to capacity, handoff can still be
performed for a small increase in BER
• Neither the mobile nor the base station is required to
change frequency
Advantages of CDMA
• Capacity is CDMA's biggest asset. It can accommodate more users per MHz
of bandwidth than any other technology.
• 3 to 5 times more than GSM
• CDMA has no built-in limit to the number of concurrent users.
• CDMA uses precise clocks that do not limit the distance a tower can cover.
• CDMA consumes less power and covers large areas so cell size in CDMA is
larger.
• CDMA is able to produce a reasonable call with lower signal (cell phone
reception) levels.
• CDMA uses Soft Handoff, reducing the likelihood of dropped calls.
• CDMA's variable rate voice coders reduce the rate being transmitted when
speaker is not talking, which allows the channel to be packed more
efficiently.
• Has a well-defined path to higher data rates.
Disadvantages of CDMA
• Most technologies are patented and must be licensed from
Qualcomm.
• Breathing of base stations, where coverage area shrinks under load.
As the number of subscribers using a particular site goes up, the
range of that site goes down.
• Currently CDMA covers a smaller portion of the world as compared to
GSM which has more subscribers and is in more countries overall
worldwide.
HSCD [High Speed Circuit Switched Data]
• HSCD: A straightforward improvement of GSM’s data transmission
capabilities is high speed circuit switched data (HSCSD) in which
higher data rates are achieved by bundling several TCHs. An MS
requests one or more TCHs from the GSM network, i.e., it allocates
several TDMA slots within a TDMA frame. This allocation can be
asymmetrical, i.e. more
slots can be allocated on the downlink than on the uplink, which fits
the typical user behaviour of downloading more data compared to
uploading. A major disadvantage of HSCD is that it still uses the
connection-oriented mechanisms of GSM, which is not efficient for
computer data traffic.
GPRS
• The next step toward more flexible and powerful data transmission avoids the
problems of HSCSD by being fully packet-oriented.
GPRS: General Packet Radio Service
• It is a mobile data service available to users of GSM mobile phones. It is often
described as "2.5G“.
• GPRS is packet-switched which means that multiple users share the same
transmission channel, only transmitting when they have data to send.
• GPRS provides moderate speed data transfer, by allocating unused cell bandwidth
to transmit data.
• Poor bit rate in busy cells
• Usually, GPRS data is billed per kilobytes of information transceived
• In 3G mobile systems like UMTS (Universal Mobile Telecommunication System),
voice and data services will be mixed in a normal communication.
The GPRS concept is independent of channel characteristics
and of the type of channel (traditional GSM traffic or control
channel), and does not limit the maximum data rate (only the
GSM transport system limits the rate). All GPRS services can be
used in parallel to conventional services. GPRS includes several
security services such as authentication, access control, user
identity confidentiality, and user information confidentiality.
• GPRS (General Packet Radio Service)
• packet switching
• using free slots only if data packets ready to send
(e.g., 115 kbit/s using 8 slots temporarily)
• standardization 1998
• advantage: one step towards UMTS, more flexible
• disadvantage: more investment needed
• GPRS network elements
• GSN (GPRS Support Nodes): GGSN and SGSN
• GGSN (Gateway GSN)
• interworking unit between GPRS and PDN (Packet Data Network)
• SGSN (Serving GSN)
• supports the MS (location, billing, security)
• GR (GPRS Register)
• user addresses
GPRS network elements
• The GPRS architecture introduces two new network elements, which are called GPRS
support nodes (GSN) and are in fact routers.
• All GSNs are integrated into the standard GSM architecture, and many new interfaces
have been defined.
• The gateway GPRS support node (GGSN) is the interworking unit between the GPRS
network and external packet data networks (PDN). This node contains routing information
for GPRS users, performs address conversion, and tunnels data to a user via encapsulation.
The GGSN is connected to external networks (e.g., IP or X.25) via the G i interface and
transfers packets to the SGSN via an IPbased GPRS backbone network (G n interface).
• The other new element is the serving GPRS support node (SGSN) which supports the MS
via the G b interface. The SGSN, for example, requests user addresses from the GPRS
register (GR).
• GPRS register (GR) keeps track of the individual MSs’ location, is responsible for collecting
billing information (e.g., counting bytes), and performs several security functions such as
access control.
GPRS architecture and interfaces
SGSN
Gn
Um Gb Gn Gi
MSC HLR/
GR
VLR EIR
THANK U