Advanced Communication Systems Module 6
Advanced Communication Systems Module 6
MODULE 6
Introduction to new data services like High Speed Circuit Switched Data
(HSCSD), General Packet Radio Service (GPRS), Digital Enhanced Cordless
Telecommunications (DECT) , Enhanced Data Rate for Global Evolution
(EDGE), Ultra wideband systems (UWB), Push To Talk (PTT) technology,
Mobile IP
1
Advanced Communication Systems Module 6
Multiple access schemes are used to allow many mobile users to share
simultaneously a finite amount of radio spectrum.
The sharing of spectrum is required to achieve high capacity by simultaneously
allocating the available bandwidth to multiple users.
In wireless communications systems, it is often desirable to allow the subscriber to
send simultaneously information to the base station while receiving information
from the base station. Fm example, in conventional telephone systems, it is possible
to talk and listen simultaneously, and this effect, called duplexing.
Duplexing may be done using frequency or time domain techniques.
Frequency division duplexing (FDD)
o It provides two distinct bands of frequencies for every user.
o The forward band provides traffic from the base station to the mobile, and
the reverse band provides traffic from the mobile to the base.
o In FDD, any duplex channel actually consists of two simplex channels, and
a device called a duplexer is used inside each subscriber unit and base
station to allow simultaneous radio transmission and reception on the
duplex channel pair.
o The frequency split between the forward and reverse channel is constant
throughout the system, regardless of the particular channel being used.
Time division duplexing (TDD)
o It uses time instead of frequency to provide both a forward and reverse
link.
o If the time split between the forward and reverse time slot is small, then
the transmission and reception of data appiars simultaneous to the user.
o TDD allows communication on a single channel (as opposed to requiring
two simplex or dedicated channels) and simplifies the subscriber
equipment since a duplexer is not required.
2
Advanced Communication Systems Module 6
Narrowband Systems
The term narrowband is used to relate the bandwidth of a single channel to the
expected coherence bandwidth of the channel.
In a narrowband multiple access system, the available radio spectrum is divided
into a large number of narrowband channels.
The channels are usually operated using FDD.
To minimize interference between forward and reverse links on each channel, the
frequency split is made as great as possible within the frequency spectrum, while
still allowing inexpensive duplexers and a common transceiver antenna to be used
in each subscriber unit.
In narrowband FDMA, a user is assigned a particular channel which is not shared by
other users in the vicinity, and if FDD is used (that is, each channel has a forward
and reverse link), then the system is called FDMA/FDD.
Narrowband TDMA allows users to share the same channel but allocates a unique
time slot to each user in a cyclical fashion on the channel, thus separating a small
number of users in time on a single channel.
For narrowband TDMA, there generally are a large number of channels allocated
using either FDD or TDD, and each channel is shared using TDMA.
Such systems are called TDMA/FDD or TDMA/TDD access systems.
Wideband systems
In wideband systems, the transmission bandwidth of a single channel is much
larger than the coherence bandwidth of the channel.
Thus, multipath fading does not greatly affect the received signal within a wideband
channel, and frequency selective fades occur in only a small fraction of the signal
bandwidth.
In wideband multiple access systems, the users are allowed to transmit in a large
part of the spectrum.
A large number of transmitters are also allowed to transmit on the same channel.
TDMA allocates time slots to the many transmitters on the same channel and allows
only one transmitter to access the channel at any instant of time, whereas spread
spectrum CDMA allows all of the transmitters to access the channel at the same
time.
TDMA and CDMA systems may use either FDD or TDD multiplexing techniques.
In addition to FDMA, TDMA, and CDMA, two other multiple access schemes are used
for wireless communications
o packet radio (PR)
o space division multiple access (SDMA).
3
Advanced Communication Systems Module 6
It can be seen from Figure 8.2 that each user is allocated a unique frequency band or
channel. These channels are assigned on demand to users who request service.
During the period of the call, no other user can share the same frequency band.
In FDD systems, the users are assigned a channel as a pair of frequencies; one
frequency is used for the forward channel, while the other frequency is used for the
reverse channel.
The features of FDMA are as follows:
1. The FDMA channel carries only one phone circuit at a time.
2. If an FDMA channel is not in use, then it sits idle and cannot be used by other
users to increase or share capacity. It is essentially a wasted resource.
3. After the assignment of a voice channel, the base station and the mobile
transmit simultaneously and continuously.
4. The bandwidths of FDMA channels are relatively narrow as each channel
supports only one circuit per carrier
5. The symbol time is large as compared to the average delay spread.
6. The complexity of FDMA mobile systems is lower when compared to TDMA
systems
7. Since FDMA is a continuous transmission scheme, fewer bits are needed for
overhead purposes (such as synchronization and framing bits) as compared
to TDMA.
8. FDMA systems have higher cell site system costs as compared to TDMA
systems and the need to use costly bandpass filters to eliminate spurious
radiation at the base station.
9. The FDMA mobile unit uses duplexers since both the transmitter and receiver
operate at the same time. This results in an increase in the cost of FDMA
subscriber units and base stations.
10. FDMA requires tight RF filtering to minimize adjacent channel interference.
4
Advanced Communication Systems Module 6
TDMA systems divide the radio spectrum into time slots, and in each slot only one
user is allowed to either transmit or receive.
It can be seen from Figure 8.3 that each user occupies a cyclically repeating time
slot, so a channel may be thought of as particular time slot that reoccurs every
frame, where N time slots comprise a frame.
TDMA systems transmit data in a buffer-and-burst method, thus the transmission
for any user is noncontinuous.
5
Advanced Communication Systems Module 6
This implies that, unlike in FDMA systems which accommodate analog FM, digital
data and digital modulation must be used with TDMA. The transmission from
various users is interlaced into a repeating frame structure as shown in Figure 8.4.
It can be seen that a frame consists of a number of slots. Each frame is made up of a
preamble, an information message, and tail bits.
In TDMA/TDD, half of the time slots in the frame information message would be
used for TDMA/FDD systems, an identical or similar frame structure would be used
solely for either forward or reverse transmission, but the carrier frequencies would
be different for the forward and reverse links.
In general, TDMA/FDD systems intentionally induce several time slots of delay
between the forward and reverse time slots of a particular user, so that duplexers
are not required in the subscriber unit.
In a TDMA frame, the preamble contains the address and synchronization
information that both the base station and the subscribers use to identify each
other.
Guard times are utilized to allow synchronization of the receivers between different
slots and frames.
Different TDMA wireless standards have different TDMA frame structures.
The features of TDMA include the following:
1. TDMA shares a single carrier frequency with several users, where each
user makes use of nonoverlapping time slots. The number of time slots
per frame depends on several factors, such as modulation technique,
available bandwidth, etc.
2. Data transmission for users of a TDMA system is not continuous, but
occurs in bursts. This results in low battery consumption, since the
subscriber transmitter can be turned off when not in use (which is most
of the time).
3. Because of discontinuous transmissions in TDMA, the handoff process is
much simpler for a subscriber unit.
6
Advanced Communication Systems Module 6
4. TDMA uses different time slots for transmission and reception, thus
duplexers are not required.
5. Adaptive equalization is usually necessary in TDMA systems, since the
transmission rates are generally very high as compared to FDMA
channels.
6. In TDMA, the guard time should be minimized. If the transmitted signal at
the edges of a time slot are suppressed sharply in order to shorten the
guard time, the transmitted spectrum will expand and cause interference
to adjacent channels.
7. High synchronization overhead is required in TDMA systems because of
burst transmissions. TDMA transmissions are slotted, and this requires
the receivers to be synchronized for each data burst. In addition, guard
slots are necessary to separate users and this result in the TDMA systems
having larger overheads as compared to FDMA.
8. In TDMA, it is possible to allocate different numbers of time slots per
frame to different users.
Efficiency of TDMA:
o The efficiency of a TDMA system is a measure of the percentage of
transmitted data that contains information as opposed to providing
overhead for the access scheme.
o The frame efficiency ηf, is the percentage of bits per frame which contain
transmitted data
7
Advanced Communication Systems Module 6
Number of channels in TDMA system — The number of TDMA channel slots that can
be provided in a TDMA system is found by multiplying the number of TDMA slots per
channel by the number of channels available and is given by
where m is the maximum number of TDMA users supported on each radio channel.
SSMA uses signals which have a transmission bandwidth that is several orders of
magnitude greater than the minimum required RF bandwidth.
A pseudo-noise (PN) sequence converts a narrowband signal to a wideband noise-
like signal before transmission.
SSMA
o Provides immunity to multipath interference and robust multiple access
capability.
o Is not very bandwidth efficient when used by a single user.
o Since many users can share the same spread spectrum bandwidth
without interfering with one another, spread spectrum systems become
bandwidth efficient in a multiple user environment.
There are two main types of spread spectrum multiple access techniques
o frequency hopped multiple access (FH)
o Direct sequence multiple access (DS)(also called CDMA).
8
Advanced Communication Systems Module 6
If the rate of change of the carrier frequency is greater than the symbol rate then
the system is referred to as a fast frequency hopping system. If the channel changes
at a rate less than or equal to the symbol rate, it is called slow frequency hopping.
A fast frequency hopper may thus be thought of as an FDMA system which employs
frequency diversity.
FHMA systems often employ energy efficient constant envelope modulation.
Inexpensive receivers may be built to provide noncoherent detection of FHMA. This
implies that linearity is not an issue, and the power of multiple users at the receiver
does not degrade FHMA performance.
A frequency hopped system
o provides a level of security
o is somewhat immune to fading
In code division multiple access (CDMA) systems, the narrowband message signal is
multiplied by a very large bandwidth signal called the spreading signal.
The spreading signal is a pseudo-noise code sequence that has a chip rate which is
orders of magnitudes greater than the data rate of the message.
All users in a CDMA system, as seen from Figure 8.5, use the same carrier frequency
and may transmit simultaneously.
Each user has its own pseudorandom codeword which is approximately orthogonal
to all other codewords.
The receiver performs a time correlation operation to detect only the specific
desired codeword.
All other codewords appear as noise due to decorrelation.
For detection of the message signal, the receiver needs to know the codeword used
by the transmitter.
Each user operates independently with no knowledge of the other users.
9
Advanced Communication Systems Module 6
In CDMA, the power of multiple users at a receiver determines the noise floor after
de-correlation.
If the power of each user within a cell is not controlled such that they do not appear
equal at the base station receiver, then the near-far problem occurs.
The near-far problem occurs when many mobile users share the same channel. In
general, the strongest received mobile signal will capture the demodulator at a base
station.
In CDMA, stronger received signal levels raise the noise floor at the base station
demodulators for the weaker signals, thereby decreasing the probability that
weaker signals will be received.
To combat the near-far problem, power control is used in most CDMA
implementations.
Power control is provided by each base station in a cellular system and assures that
each mobile within the base station coverage area provides the same signal level to
the base station receiver.
This solves the problem of a nearby subscriber overpowering the base station
receiver and drowning out the signals of far away subscribers.
Power control is implemented at the base station by rapidly sampling the radio
signal strength indicator (RSSI) levels of each mobile and then sending a power
change command over the forward radio link.
Despite the use of power control within each cell, out-of-cell mobiles provide
interference which is not under the control of the receiving base station.
10
Advanced Communication Systems Module 6
The MSC may chose the best version of the signal at any time without
switching frequencies.
o Self-jamming is a problem in CDMA system. Self-jamming arises from the fact
that the spreading sequences of different users are not exactly orthogonal,
Hence in the despreading of a particular PN code, non-zero contributions to
the receiver decision statistic for a desired user arise from the transmissions
of other users in the system.
o The near-far problem occurs at a CDMA receiver if an undesired user has a
high detected power as compared to the desired user.
In addition to the frequency hopped and direct sequence, spread spectrum multiple
access techniques, there are certain other hybrid combinations that provide certain
advantages. These hybrid techniques are described below.
11
Advanced Communication Systems Module 6
12
Advanced Communication Systems Module 6
13
Advanced Communication Systems Module 6
In the limiting case of infinitesimal beamwidth and infinitely fast tracking ability,
adaptive antennas implement optimal SDMA, thereby providing a unique channel
that is free from the interference of all other users in the cell.
With SDMA, all users within the system would be able to communicate at the same
time using the same channel.
a perfect adaptive antenna system would be able to track individual multipath
components for each user and combine them in an optimal manner to collect all of
the available signal energy from each user. The perfect adaptive antenna system is
not feasible since it requires infinitely large antennas.
OFDM
Orthogonal Frequency Division Multiplexing (OFDM) is a digital multi-carrier
modulation scheme that extends the concept of single subcarrier modulation by
using multiple subcarriers within the same single channel.
Rather than transmit a high-rate stream of data with a single subcarrier, OFDM
makes use of a large number of closely spaced orthogonal subcarriers that are
transmitted in parallel.
Each subcarrier is modulated with a conventional digital modulation scheme (such
as QPSK, 16QAM, etc.) at low symbol rate.
However, the combination of many subcarriers enables data rates similar to
conventional single-carrier modulation schemes within equivalent bandwidths.
In FDM different streams of information are mapped onto separate parallel
frequency channels.
Each FDM channel is separated from the others by a frequency guard band to reduce
interference between adjacent channels.
The OFDM scheme differs from traditional FDM in the following interrelated ways:
1. Multiple carriers (called subcarriers) carry the information stream,
2. The subcarriers are orthogonal to each other, and
3. A guard interval is added to each symbol to minimize the channel delay spread
and intersymbol interference.
ADVANTAGES
1. OFDM is an efficient way to deal with delay spread.
2. OFDM is robust against narrowband interference.
3. In single carrier system, a single fade or interferer can cause the entire link to
fail, but in multicarrier system, only a small percentage of the sub-carriers will be
affected.
4. OFDM is possible to significantly enhance the capacity by adapting the data rate
per subcarrier according to the SNR of that particular subcarrier.
5. OFDM makes single - frequency networks possible, which is especially attractive
for broadcasting applications.
DISADVANTAGES
1. OFDM is sensitive to frequency offset and phase noise.
14
Advanced Communication Systems Module 6
2. OFDM has a relative large peak- to - average power ratio , which tends to reduce
the power efficiency of the RF amplifier.
15
Advanced Communication Systems Module 6
16
Advanced Communication Systems Module 6
17
Advanced Communication Systems Module 6
WIRELESS NETWORKING
The demand for personal communications is driving the development of new
networking techniques that accommodate mobile voice and data users who move
throughout buildings, cities, or countries.
Consider the cellular telephone system shown in Figure 9.1. The cellular telephone
system is responsible for providing coverage throughout a particular territory,
called a coverage region or market.
The interconnection of many such systems defines a wireless network capable of
providing service to mobile users throughout a country or continent.
To provide wireless communications within a particular geographic region (a city,
for example), an integrated network of base stations must be deployed to provide
sufficient radio coverage to all mobile users.
The base stations, in turn, must be connected to a central hub called the mobile
switching center (MSC).
The MSC provides connectivity between the public switched telephone network
(PSTN) and the numerous base stations, and ultimately between all of the wireless
subscribers in a system.
The PSTN forms the global telecommunications grid which connects conventional
(landline) telephone switching centers (called central offices) with MSCs
throughout the world.
Fibre optic transport architectures are used to connect radio ports, base stations,
and MSCs.
18
Advanced Communication Systems Module 6
To connect mobile subscribers to the base stations, radio links are established using
a carefully defined communication protocol called common air interface (CAI).
The CAI specifies exactly how mobile subscribers and base stations communicate
over radio frequencies and also defines the control channel signalling methods.
The CAI must provide a great deal of channel reliability to ensure that data is
properly sent and received between the mobile and the base station, and as such
specifies speech and channel coding.
At the base station, the air interface portion (i.e., signalling and synchronization
data) of the mobile transmission is discarded, and the remaining voice traffic is
passed along to the MSC on fixed networks.
The PSTN is a highly integrated communications network that connects over 70%
of the world's inhabitants. Every telephone in the world is given calling access over
the PSTN.
Each country is responsible for the regulation of the PSTN within its borders.
In the PSTN, each city or a geographic grouping of towns is called a local access and
transport area (LATA).
Surrounding LATAs are connected by a company called a local exchange carrier
(LEC).
A LEC is a company that provides intralata telephone service, and may be a local
telephone company, or may be a telephone company that is regional in scope.
19
Advanced Communication Systems Module 6
20
Advanced Communication Systems Module 6
21
Advanced Communication Systems Module 6
In first generation cellular networks, the system control for each market resides in
the MSC
MSC’s :
o maintains all mobile related information and controls each mobile
handoff.
o performs all of the network management functions, such as call handling
and processing, billing, and fraud detection within the market.
o is interconnected with the PSTN via landline trunked lines (trunks) and a
tandem switch.
o also are connected with other MSCs via dedicated signalling channels for
exchange of location, validation, and call signalling information.
In modern cellular telephone systems, long distance voice traffic is carried on the
PSTN, but the signalling information used to provide call set-up and to inform MSCs
about a particular user is carried on the SS7 network.
First generation wireless systems provide analog speech and inefficient, low-rate,
data transmission between the base station and the mobile user. However, the
speech signals are usually digitized using a standard, time division multiplex format
22
Advanced Communication Systems Module 6
for transmission between the base station and the MSC and are always digitized for
distribution from the MSC to the PSTN.
The global cellular network is required to keep track of all mobile users that are
registered in all markets throughout the network, so that it is possible to forward
incoming calls to roaming users at any location throughout the world. When a
mobile user's phone is activated but is not involved in a call, it monitors the
strongest control channel in the vicinity. When the user roams into a new market
covered by a different service provider, the wireless network must register the user
in the new area and cancel its registration with the previous service provider so
that calls may be routed to the roamer as it moves through the coverage areas of
different MSCs.
Second Generation Wireless Networks
Second generation wireless systems employ digital modulation and advanced call
processing capabilities. Examples of second generation wireless systems include the
Global System for Mobile (GSM), the TDMA and CDMA U.S. digital standards (the
Telecommunications Industry Association IS-54 and 15-95 standards), Second
Generation Cordless Telephone (CT2), the British standard for cordless telephony,
the Personal Access Communications System (PACS) local loop standard, and Digital
European Cordless Telephone (DECT), which is the European standard for cordless
and office telephony.
Second generation wireless networks have introduced new network architectures
that have reduced the computational burden of the MSC. GSM has introduced the
concept of a base station controller (BSC) which is inserted between several base
stations and the MSC. In PACS(WACS, the BSC is called a radio port control unit.
This architectural change has allowed the data interface between the base station
controller and the MSC to be standardized, thereby allowing carriers to use
different manufacturers for MSC and BSC components.
All second generation systems use digital voice coding and digital modulation.
The systems employ dedicated control channels within the air interface for
simultaneously exchanging voice and control information between the subscriber,
the base station, and the MSC while a call is in progress.
Second generation systems also provide dedicated voice and signaling trunks
between MSCs, and between each MSC and the PSTN.
In contrast to first generation systems, which were designed primarily for voice,
second generation wireless networks have been specifically designed to provide
paging, and other data services such as facsimile and high-data rate network access.
The network controlling structure is more distributed in second generation
wireless systems, since mobile stations assume greater control functions.
In second generation wireless networks, the handoff process are mobile-con trolled
and is known as mobile assisted handoff (MAHO).
The mobile units in these networks perform several other functions not performed
by first generation subscriber units, such as received power reporting, adjacent
base station scanning, data encoding, and encryption.
23
Advanced Communication Systems Module 6
24
Advanced Communication Systems Module 6
Typically, coaxial or fibre optic cable or wideband microwave links are used to
transmit data rates in excess of 10 Mbps, whereas inexpensive wire (twisted pair)
or coaxial cable may be used for slower data transfer.
When connecting base stations to a MSC, or distributing trunked voice channels
throughout a wireless network, T1 (DS1) or level 1 links are most commonly used
and utilize common-twisted pair wiring. DS-3 and higher rate circuits are used to
connect MSCs and COs to the PSTN.
25
Advanced Communication Systems Module 6
Circuit Switching
First generation cellular systems provide connection-oriented services for each
voice user.
Voice channels are dedicated for users at a serving base station, and network
resources are dedicated to the voice traffic upon initiation of a call.
That is, the MSC dedicates a voice channel connection between the base station and
the PSTN for the duration of a cellular telephone call.
A call initiation sequence is required to connect the called and calling parties on a
cellular system.
When used in conjunction with radio channels, connection-oriented services are
provided by a technique called circuit switching, since a physical radio channel is
dedicated ("switched in to use") for two-way traffic between the mobile user and
the MSC, and the PSTN dedicates a voice circuit between the MSC and the end-user.
As calls are initiated and completed, different radio circuits and dedicated PSTN
voice circuits are switched in and out to handle the traffic.
Circuit switching establishes a dedicated connection (a radio channel between the
base and mobile, and a dedicated phone line between the MSC and the PSTN) for the
entire duration of a call.
Despite the fact that a mobile user may hand off to different base stations, there is
always a dedicated radio channel to provide service to the user, and the MSC
dedicates a fixed, frill duplex phone connection to the PSTN.
Wireless data networks are not well supported by circuit switching, due to their
short, bursty transmissions which are often followed by periods of inactivity. Often,
the time required to establish a circuit exceeds the duration of the data
transmission.
Circuit switching is best suited for dedicated voice-only traffic, or for instances
where data is continuously sent over long periods of time.
Packet Switching
Connectionless services exploit the fact that dedicated resources are not required
for message transmission.
26
Advanced Communication Systems Module 6
Packet switching (also called virtual switching) is the most common technique used
to implement connectionless services and allows a large number of data users to
remain virtually connected to the same physical channel in the network.
Since all users may access the network randomly and at will, call set-up procedures
are not needed to dedicate specific circuits when a particular user needs to send
data.
Packet switching breaks each message into smaller units for transmission and
recovery.
When a message is broken into packets, a certain amount of control information is
added to each packet to provide source and destination identification, as well as
error recovery provisions.
27
Advanced Communication Systems Module 6
o The information field : contains the user data and may have variable
length.
o The frame check sequence field: or the CRC (Cyclic Redundancy Check)
that is used for error detection.
In contrast to circuit switching, packet switching provides excellent channel
efficiency for bursty data transmissions of short length.
An advantage of packet-switched data is that the channel is utilized only when
sending or receiving bursts of information. This benefit is valuable for the case of
mobile services where the available bandwidth is limited.
Figure 9.9 shows the hierarchy of X25 protocols in the OSI model.
o The Layer 1 protocol deals with the electrical, mechanical, procedural,
and functional interface between the subscriber (DTE). and the base
station (DCE).
o The Layer 2 protocol defines the data link on the common air-interface
between the subscriber and the base station.
o Layer 3 provides connection between the base station and the MSC, and is
called the packet layer protocol. A packet assembler disassembler (PAD)
is used at Layer 3 to connect networks using the X.25 interface with
devices that are not equipped with a standard X25 interface.
28
Advanced Communication Systems Module 6
The X.25 protocol does not specify particular data rates or how packet switched
networks are implemented.
X.25 provides a series of standard functions and formats which give structure to the
design of software that is used to provide packet data on a generic connectionless
network.
Circuit switching is inefficient for dedicated mobile data services such as facsimile
(fax), electronic mail (e-mail), and short messaging.
First generation cellular systems that provide data communications using circuit
switching have difficulty passing modem signals through the audio filters of
receivers designed for analog, FM, common air-interfaces. Inevitably, voice filtering
must be deactivated when data is transmitted over first generation cellular
networks, and a dedicated data link must be established over the common air-
interface.
The demand for packet data services has, until recently, been significantly less than
the demand for voice services, and first generation subscriber equipment design
has focused almost solely on voice-only cellular communications.
However, in 1993, the U.S. cellular industry developed the cellular digital packet
data (CDPD) standard to coexist with the conventional voice only cellular system.
In the 1980s, two other data-only mobile services called ABDIS and RMD were
developed to provide packet radio connectivity throughout a network.
29
Advanced Communication Systems Module 6
Note that the subscribers (the mobile end system, or M-ES) are able to connect
through the mobile data base stations (MDBS) to the Internet via intermediate
systems (MD-IS), which act as servers and routers for the subscribers. In this way,
mobile users are able to connect to the Internet r the PSTN.
30
Advanced Communication Systems Module 6
Through the I-interface, CDPD can carry either Internet protocol (IP) or OSI
connectionless protocol (CLNP) traffic.
31
Advanced Communication Systems Module 6
Table 9.4 lists some characteristics of the RAM mobile data service.
WIRELESS STANDARDS
32
Advanced Communication Systems Module 6
33
Advanced Communication Systems Module 6
D. Authentication Centre:
It provides protection against intruders in air interface.
It maintains authentication keys and algorithms and provides security
triplets (RAND, SRES, Ki).
E. Equipment Identity Registry (EIR):
It is a database that is used to track handset using the IMEI number.
It is made up of three sub classes- the white list, the black list and the
gray list.
34
Advanced Communication Systems Module 6
Channel Structure
Each user transmits a burst of data during the time slot assigned to it.
These data bursts may have one of the formats given in figure below.
35
Advanced Communication Systems Module 6
The structure of most common time slot burst is shown in the figure below.
A total of 156.25 bits is transmitted in 0.577 milliseconds, giving a total bit rate of
270.833kbps.
There are three other types of bursts structure for frame and carrier
synchronization and frequency correction.
36
Advanced Communication Systems Module 6
Speech coding
37
Advanced Communication Systems Module 6
The GSM group studied several speech coding algorithms on the basis of subjective
speech quality and complexity before arriving at the choice of a Regular Pulse
Excited -- Linear Predictive Coder (RPE--LPC) with a Long Term Predictor loop.
Basically, information from previous samples, which does not change very quickly,
is used to predict the current sample.
The coefficients of the linear combination of the previous samples, plus an encoded
form of the residual, the difference between the predicted and actual sample,
represent the signal.
Speech is divided into 20 millisecond samples, each of which is encoded as 260 bits,
giving a total bit rate of 13 kbps. This is the so-called Full-Rate speech coding.
This provides improved speech quality using the existing 13 kbps bit rate.
38
Advanced Communication Systems Module 6
39
Advanced Communication Systems Module 6
Ensuring the transmission of voice or data of a given quality over the radio link is
only part of the function of a cellular mobile network.
A GSM mobile can seamlessly roam nationally and internationally, which requires
that registration, authentication, call routing and location updating functions exist
and are standardized in GSM networks.
In addition, the fact that the geographical area covered by the network is divided
into cells necessitates the implementation of a handover mechanism.
These functions are performed by the Network Subsystem, mainly using the Mobile
Application Part (MAP) built on top of the Signalling System No. 7 protocol.
40
Advanced Communication Systems Module 6
41
Advanced Communication Systems Module 6
A mobile station roaming number (MSRN) is allocated and sent to the mobile’s HLR
by the new VLR.
The MSRN is a regular telephone number that routes the call to the new VLR and is
subsequently translated to the TMSI of the mobile.
The HLR sends back the necessary call control parameters, and also send a cancel
message to the old VLR, so that the previous MSRN can be reallocated.
Finally, a new TMSI is allocated and sent to the mobile, to identify it in future paging
or call initiation requests.
Authentication and security
Since the radio medium can be accessed by anyone, authentication of users to prove
that they are who they claim to be, is a very important element of a mobile network.
Authentication involves two functional entities, the SIM card in the mobile, and
the Authentication Center (AC).
Each subscriber is given a secret key, one copy of which is stored in the SIM card
and the other in the (AC).
During authentication, the AC generates a random number that it sends to the
mobile.
Both the mobile and the AC then use the random number, in conjuction with the
subscriber's secret key and a ciphering algorithm, to generate a signed response
(SRES) that is sent back to the (AC).
If the number sent by the mobile is the same as the one calculated by the (AC), the
subscriber is authenticated.
GPRS architecture works on the same procedure like GSM network, but, has
additional entities that allow packet data transmission.
This data network overlaps a second-generation GSM network providing packet
data transport at the rates from 9.6 to 171 kbps.
Along with the packet data transport the GSM network accommodates multiple
users to share the same air interface resources concurrently.
Following is the GPRS Architecture diagram:
42
Advanced Communication Systems Module 6
GPRS attempts to reuse the existing GSM network elements as much as possible,
but to effectively build a packet-based mobile cellular network, some new network
elements, interfaces, and protocols for handling packet traffic are required.
Therefore, GPRS requires modifications to numerous GSM network elements as
summarized below:
GSM Network Element Modification or Upgrade Required for GPRS.
Mobile Station (MS) New Mobile Station is required to access GPRS
services. These new terminals will be backward
compatible with GSM for voice calls.
BTS A software upgrade is required in the existing Base
Transceiver Station(BTS).
BSC The Base Station Controller (BSC) requires a software
upgrade and the installation of new hardware called
the packet control unit (PCU). The PCU directs the data
traffic to the GPRS network and can be a separate
hardware element associated with the BSC.
GPRS Support Nodes (GSNs) The deployment of GPRS requires the installation of
new core network elements called the serving GPRS
support node (SGSN) and gateway GPRS support node
(GGSN).
Databases (HLR, VLR, etc.) All the databases involved in the network will require
software upgrades to handle the new call models and
functions introduced by GPRS.
GPRS Mobile Stations
New Mobile Stations (MS) are required to use GPRS services because existing GSM
phones do not handle the enhanced air interface or packet data.
A variety of MS can exist, including a high-speed version of current phones to
support high-speed data access, a new PDA device with an embedded GSM phone,
and PC cards for laptop computers.
These mobile stations are backward compatible for making voice calls using GSM.
GPRS Base Station Subsystem
Each BSC requires the installation of one or more Packet Control Units (PCUs) and a
software upgrade.
The PCU provides a physical and logical data interface to the Base Station
Subsystem (BSS) for packet data traffic.
The BTS can also require a software upgrade but typically does not require
hardware enhancements.
When either voice or data traffic is originated at the subscriber mobile, it is
transported over the air interface to the BTS, and from the BTS to the BSC in the
same way as a standard GSM call.
However, at the output of the BSC, the traffic is separated; voice is sent to the
Mobile Switching Center (MSC) per standard GSM, and data is sent to a new device
called the SGSN via the PCU over a Frame Relay interface.
43
Advanced Communication Systems Module 6
44
Advanced Communication Systems Module 6
Distance coverage for DECT based system is between about 30-100 meters.
It operates at about 1.88GHz to 1.9GHz Radio frequency carrier band, providing a
bandwidth of about 20MHz.
The access technology for resource allocation here is TDD/TDMA/FDMA. For know
more on TDD,TDMA and FDMA refer following links.
Data transmission rate of about 1.152 Mbps is achieved.
45
Advanced Communication Systems Module 6
HSCSD operates across a GSM network, and therefore no extra hardware is required
by a mobile communications operator to offer the service, just a network software
upgrade.
In a GSM network single slots are allocated to each user, which has a standard data
transfer rate of 9.6Kbps.
In HSCSD, users are allocated multiple slots so that the transmission speed can be
drastically increased, with some service providers offering rates of up to 57.6Kbps.
This enables internet access at the same speed of many dial-up modem services
across fixed line networks.
It relaxes the error control coding algorithms originally specified in GSM standard
for data transmissions.
HSCSD bundles up to 8 GSM traffic channels into one high speed channel.
HSCSD is a circuit switching technology, i.e. very suitable for constantly high data
rates , but not for varying data rates.
Enhanced data for global evolution (EDGE) is a high-speed mobile data standard,
it is used to enable second-generation global system for mobile communication
(GSM) and time division multiple access (TDMA) networks to transmit data at up
to 384 kilobits per second (Kbps).
46
Advanced Communication Systems Module 6
EDGE is a technology that gives GSM Networks the capacity to handle services
for 3G.
EDGE was developed to enable the transmission of large amounts of data at peak
rates of up to 472kbps.
Users should experience average speeds of 80 kbps to 130 kbps.
EDGE devices are backwards compatible with GPRS.
Although EDGE reuses the GSM carrier bandwidth and time slot structure and
air interface for efficiently providing high bit rates,
EDGE uses the same TDMA (Time Division Multiple Access) frame structure,
logic channel and 200 kHz carrier bandwidth as today's GSM networks.
47
Advanced Communication Systems Module 6
Features
It was standardized by 3GPP as a part of GSM family and was deployed in GSM
networks in 2003.
The other names for EDGE are Enhanced GPRS (EGPRS) and IMT-Single Carrier
(IMT-SC).
It is compatible with any packet – switched application. It is also backward –
compatible, i.e. compatible with existing or older versions.
It enables data to be sent over a GSM TDMA systems at speeds of 384Kbps. GSM
uses the modulation technique called Gaussian Minimum Shift Keying (GMSK).
EDGE achieves increased bit rate by using 8PSK modulation scheme.
In order to shift from GSM to GSM EDGE, additional network elements are
incorporated to enable IP based data transfer. The two main additional nodes
required are −
Gateway GPRS Service Node (GGSN)
Serving GPRS Service Node (SGSN)
GSM EDGE compatible mobile handsets are required to avail the service.
As the name implies UWB, ultra wide band technology, is a form of transmission
that occupies a very wide bandwidth.
Typically this will be many Gigahertz, and it is this aspect that enables it to carry
data rates of Gigabits per second.
However the very high bandwidth used also allows the power spectral density to be
very low, and the power limits on UWB are being strictly limited by the regulatory
bodies.
Ultra-Wideband (UWB) provides an interesting new technology for shortrange
ultra-high speed communications in the frequency band 3.1 GHz to 10.6 GHz.
It supports a bit rate greater than 100 Mbps within a 10-meter radius for wireless
personal area communications.
48
Advanced Communication Systems Module 6
49
Advanced Communication Systems Module 6
50
Advanced Communication Systems Module 6
MOBILE IP
Mobile Node: A device such as a cell phone, personal digital assistant, or laptop
whose software enables network roaming capabilities.
51
Advanced Communication Systems Module 6
The Home Agent: A router on the home network serving as the anchor point for
communication with the mobile node; its tunnel packets from a device on the
Internet, called a correspondent node, to the roaming mobile node.
The Foreign Agent: A router that may function as the point of attachment for the
mobile node when it roams to a foreign network delivers packets from the home
agent to the mobile node.
52
Advanced Communication Systems Module 6
When the Mobile Node hears a Foreign Agent advertisement and detects that it has
moved outside of its home network, it begins registration.
Registration
The Mobile Node is configured with the IP address and mobility security association
(which includes the shared key) of its Home Agent.
In addition, the Mobile Node is configured with either its home IP address, or
another user identifier, such as a Network Access Identifier.
The Mobile Node uses this information along with the information that it learns
from the Foreign Agent advertisements to form a Mobile IP registration request.
It adds the registration request to its pending list and sends the registration request
to its Home Agent either through the Foreign Agent or directly if it is using a
colocated care-of address and is not required to register through the Foreign Agent.
If the registration request is sent through the Foreign Agent, the Foreign Agent
checks the validity of the registration request, which includes checking that the
requested lifetime does not exceed its limitations, the requested tunnel
encapsulation is available, and that reverse tunnel is supported.
If the registration request is valid, the Foreign Agent adds the visiting Mobile Node
to its pending list before relaying the request to the Home Agent.
If the registration request is not valid, the Foreign Agent sends a registration reply
with appropriate error code to the Mobile Node.
The Home Agent checks the validity of the registration request, which includes
authentication of the Mobile Node.
If the registration request is valid, the Home Agent creates a mobility binding (an
association of the Mobile Node with its care-of address), a tunnel to the care-of
address, and a routing entry for forwarding packets to the home address through
the tunnel.
The Home Agent then sends a registration reply to the Mobile Node through the
Foreign Agent (if the registration request was received via the Foreign Agent) or
directly to the Mobile Node.
If the registration request is not valid, the Home Agent rejects the request by
sending a registration reply with an appropriate error code.
The Foreign Agent checks the validity of the registration reply, including ensuring
that an associated registration request exists in its pending list.
If the registration reply is valid, the Foreign Agent adds the Mobile Node to its
visitor list, establishes a tunnel to the Home Agent, and creates a routing entry for
forwarding packets to the home address. It then relays the registration reply to the
Mobile Node.
Finally, the Mobile Node checks the validity of the registration reply, which includes
ensuring an associated request is in its pending list as well as proper authentication
of the Home Agent.
If the registration reply is not valid, the Mobile Node discards the reply.
If a valid registration reply specifies that the registration is accepted, the Mobile
Node is confirmed that the mobility agents are aware of its roaming.
53
Advanced Communication Systems Module 6
In the colocated care-of address case, it adds a tunnel to the Home Agent.
Subsequently, it sends all packets to the Foreign Agent.
The Mobile Node reregisters before its registration lifetime expires.
The Home Agent and Foreign Agent update their mobility binding and visitor entry,
respectively, during re-registration.
In the case where the registration is denied, the Mobile Node makes the necessary
adjustments and attempts to register again. For example, if the registration is
denied because of time mismatch and the Home Agent sends back its time stamp for
synchronization, the Mobile Node adjusts the time stamp in future registration
requests.
Thus, a successful Mobile IP registration sets up the routing mechanism for
transporting packets to and from the Mobile Node as it roams.
Tunneling
The Mobile Node sends packets using its home IP address, effectively maintaining
the appearance that it is always on its home network. Even while the Mobile Node is
roaming on foreign networks, its movements are transparent to correspondent
nodes.
Data packets addressed to the Mobile Node are routed to its home network, where
the Home Agent now intercepts and tunnels them to the care-of address toward the
Mobile Node.
Tunneling has two primary functions:
o encapsulation of the data packet to reach the tunnel endpoint,
o decapsulation when the packet is delivered at that endpoint.
The default tunnel mode is IP Encapsulation within IP Encapsulation.
Optionally, GRE and minimal encapsulation within IP may be used.
Typically, the Mobile Node sends packets to the Foreign Agent, which routes them
to their final destination, the Correspondent Node, as shown in Figure 2.
However, this data path is topologically incorrect because it does not reflect the true
IP network source for the data—rather, it reflects the home network of the Mobile
Node.
54
Advanced Communication Systems Module 6
Because the packets show the home network as their source inside a foreign
network, an access control list on routers in the network called ingress filtering
drops the packets instead of forwarding them.
A feature called reverse tunneling solves this problem by having the Foreign Agent
tunnel packets back to the Home Agent when it receives them from the Mobile Node.
See Figure 3.
Tunnel MTU discovery is a mechanism for a tunnel encapsulator such as the Home
Agent to participate in path MTU discovery to avoid any packet fragmentation in the
routing path between a Correspondent Node and Mobile Node.
For packets destined to the Mobile Node, the Home Agent maintains the MTU of the
tunnel to the care-of address and informs the Correspondent Node of the reduced
packet size.
This improves routing efficiency by avoiding fragmentation and reassembly at the
tunnel endpoints to ensure that packets reach the Mobile Node.
SECURITY
55
Advanced Communication Systems Module 6
56