Professional Documents
Culture Documents
7/4/2007
TDMA (Time Division Multiple Access ) CDMA (Code Division Multiple Access )
7/4/2007 UTL Technologies Ltd
FDMA
Frequency Division Multiple Access
(FDMA)
7/4/2007
FDMA
c f
7/4/2007
AMPS (Analog Mobile Phone Service) TACS (Total Access Communication System) NMTS (Nordic Mobile Telephone System)
7/4/2007
TDMA
Time division multiple access (TDMA)
7/4/2007
TDMA
c f
7/4/2007
2.17.1
TDMA/FDD
c f
7/4/2007
2.18.1
CDMA
Code Division Multiple Access (CDMA)
7/4/2007
CDMA
c
7/4/2007
CDMA
Spreading and De-Spreading
7/4/2007
Defining Spread Spectrum A complete definition to Spread Spectrum, is the one given by Haykins.. Spread Spectrum is a means of transmission in which the data sequences occupy a minimum bandwidth necessary to send it on bandwidth which is excess to it. Spread Spectrum is accomplished before transmission through the use of a code that is independent of data sequences . The same code is used at the receiver to despread the received signal so that the original data sequence may be recovered
7/4/2007 UTL Technologies Ltd
7/4/2007
Input Data
Output Data
7/4/2007
DSSS: Transmitter
Modulator (BPSK) Spread Spectrum Signal
Spreader
7/4/2007
1 0 1 1
B
0 1 0 1 0 0 0 0 1 1 1 1 0 0 0 1 0 1 0 0 1 1 0 0 0 1 1 1 0
C
0 A = Data Input B = PN Bit Stream C= A + B
7/4/2007
0 0 1 0101 1010
0 0 01 01
0 0 1
0 0 0 00 00 1
0 0
0 0 1
0 0
0001 1110
0101 1010
01 01 0100 01 01 01 1011 01
DSSS:Receiver
Spread Spectrum Signal Demodulator (BPSK)
7/4/2007
C
0 1 0 0 1 1 0 1 0 0 0 1 0 0 1 1 0 1 0 1 0
B
0 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0
1010 0101 1
01 01 0
1110 0001 1
00 00 0
1010 0101 1
01 01 1011 01 01 01 0100 01 0 0 1 0
7/4/2007
7/4/2007
Point A : Binary input Data Stream at the rate of R=1/Tb, where Tb is the duration of an individual data bit. Point B and C : The serial input is converted into two channels with alternate bits going to B and C respectively. Thus the data rate is halved. B and C are known as in-phase and Quadrature phase channels respectively. The Data bit 1 is represented by a level +1 and the bit 0 represented by -1. Point D : The data bits from B are multiplied on one part of the carrier. Sin(Wct). Point E : The data bits from C are multiplied (modulated) on the other part of the carrier, which is shifted in phase by pi/2.
7/4/2007 UTL Technologies Ltd
For example, if two adjacent bits are represented by +1, -1. The output at D will be [+1][SinWct] and that at E will be[-1][SinWct+pi/2] and the summer output at F will be [Sin(Wct)]+[Sin(Wct)+(pi/2)-(pi)]= Sin (Wct)+Sin[(Wct)-pi/2]= 2 sin[(Wct)-(pi/4)]Cos(pi/4). i.e., the two adjacent bits 1, 0 represented by (1,1) now combined and denoted as a phase shift of the carrier by pi/4. The following table gives all the phase shift values for a combination of two bits taken at a time.
7/4/2007 UTL Technologies Ltd
B 1 0 0 1
QPSK
C 1 1 0 0
01 State
Phase Shift of the Carrier Pi/4 3Pi/4 -3Pi/4 -Pi/4 (as per example above)
Q 11 State
I 10 State
UTL Technologies Ltd
00 State
7/4/2007
7/4/2007
7/4/2007
7/4/2007
7/4/2007
7/4/2007
7/4/2007
7/4/2007
7/4/2007
7/4/2007
7/4/2007
7/4/2007
ps
Wss
Receiver
Bit Rate = Rb
pj
Jammer Wss = Bandwidth of the spread signal Rb= Bit rate of base band signal Ps = Signal power Pj = Jammer power
7/4/2007
M = [PG] * [E b/No]
-1
* (1/v)*f*s.
Ex: If Rb=9600 bps, Rc=1.2288Mcps, v=40%, f=0.65 and s=2.55, find the capacity?
7/4/2007 UTL Technologies Ltd
Features of CDMA
1. High Capacity :
More channels per carrier as against 8 in GSM. Better Traffic Handling capacity Use of vocoders increases capacity Simpler frequency planning / frequency re-use.
7/4/2007
2. Lower Transmit Power : The reduction in required Eb/No means that the MS has to Transmit less power. This means that the cost of the MS comes down and the battery life increases. This also results in minimum interference, which means more users can talk simultaneously. Hence, more capacity. 3. Improved privacy : The PN sequence operation, wide band signalling and certain addressee specific protection features provide very good security to the users. 7/4/2007 UTL Technologies Ltd
4. Better performance in Fading/ interference prone environment : This is derived from the basic concept of spread spectrum technique which separates signals based on specific PN sequences. The system has inherent multipath diversity features. 5. Improved capabilities:
Variable rate vocoders for different grades of
service. Interfaces to ISDN /Wireless PBXS/PCN/Cellular. Local loop applications in the PSTN.
7/4/2007 UTL Technologies Ltd
7/4/2007
GSM
CDMA
Models of Spread Spectrum CDMA Systems There are basically 4 models of SS-CDMA Systems: One User One path One User Many paths Many Users One path Many Users Many paths
1. 2. 3. 4.
7/4/2007
7. If the local delay T is equal to the propagation delay Tj, then the receiver output becomes: Bj(t-Tj) X Cj(t-Tj)X Cj(t-Tj)= Bj(t-Tj) i.e. at the receiver output we get back the base band delayed by Tj. 8. If the delay T generated locally at the receiver is not equal to Tj, then the receiver output becomes : Bj(t-Tj) X Cj(t-Tj)X Cj(t-T)= Bj(t-Tj) Cj(t-Tq). This means that the receive output is still a SPREAD data. 9. Thus, all other signals arriving at the receiver appear as spread data, excepting the desired data which got decoded as Bj(t-Tj). The other signals appear as noise. 10. Here, we have taken that there is only one direct path between the transmitter and the receiver and the effects of multipath are not considered.
7/4/2007
Suppose, the locally generated PN Sequence (at the receiver) is delayed by Tj. Let us look at the receiver now: Receiver input : Bj(t-T jm) X Cj(t-Tjm). Locally generated PN Code: Cj(t-Tj). Receiver output : Direct path component + Multipath component . = [ Bj(t-Tj) X Cj(t-Tj) + Bj(t-T jm) X Cj(t-Tjm)] . Cj(t-Tj). = Bj(t-Tj) + [ Bj(t-T jm) X Cj(t-Tjm) X Cj(t-Tj) ] The term inside the bracket is the interference signal appearing as a spread multipath signal.
7/4/2007 UTL Technologies Ltd
The spread interference or the multipath signal has a (t-Tjm) component. If (t-Tjm) is less than one chip (one bit ) duration of Cj, the multipath component cannot be resolved and the demodulated output is distorted. However, if (t-Tjm) is greater than one chip period, then it could be resolved. This could be done by introducing a second receiver which has its local PN generator delayed by Tjm. i.e., the second receiver is synchronized with the multipath component. One of the most popular type of such receivers is RAKE receiver.
7/4/2007 UTL Technologies Ltd
7/4/2007
However, for each user, there would be additional interference signals in the form of signals from other users operating at the same frequency. If there are 3 users p, q and r. Then for user p, the receiver will have : A direct path component given by Bp(t-Tp) Spread interference signals pertaining to pq and pr. Components pq and pr are interfering signals from users q and r received at p. In other words, pq and pr are the co channel interference for the desired signals. i.e., Bp(t-Tp).
7/4/2007 UTL Technologies Ltd
Rake Receiver
The rake receiver is a technique which uses several base band correlators to individually process multi path signal components. The outputs from the different correlators are combined to achieve improved reliability and performance.
7/4/2007
7/4/2007
CDMA ARCHITECTURE
7/4/2007
7/4/2007
AUX
IWF
PSPDN
TE2
TE1
Sm
WPT1 Um
P L Ai D
W
BSC
A E
MSC
PSTN
DCE
R
TE2
TE2
Rm
TAP MSC
C
HLR
B
D
Mi
ISDN
S
TA
TE1
TE2
Rm
WPT 2
TE2
I I
DMH
VLR
PLMN
H EIR
External network G
Other VLR
AC
Daisy chaining reduces the amount of cabling required to set up a network as a BTS can be connected to its nearest BTS rather than all the way to the BSC. Problems may arise when chaining BTSs, due to the transmission delay through the chain. The length of the chain must, therefore, be kept sufficiently short to prevent the round trip speech delay becoming too long.
7/4/2007 UTL Technologies Ltd
7/4/2007
4. Directing an incoming a call towards MS. 5. Currently providing service to a call. 6. Providing only trunk connections 7. Selected for Handoff 8. Providing service to MS.
7/4/2007
Home Location Register (HLR): It manages mobile subscribers information by maintaining all subscribers information. The information is like ESN, IMSI, User Profiles, and current location etc. It can be co-located or placed independently. One HLR servers multiple MSCs. Visitor Location Register (VLR): It is linked to one or more MSC. It dynamically stores subscribers information (ESN, User profiles)
7/4/2007 UTL Technologies Ltd
Authentication Center :
It manages the information associated with the individual subscriber. It can be located with in an HLR, or MSC or located independently of both.
7/4/2007 UTL Technologies Ltd
External Networks:
They can be PSTN, ISDN, PLMN, PSPDN.
7/4/2007 UTL Technologies Ltd
7/4/2007
BS to MSC (A-interface) :
This interface between the base station and the MSC, supports signalling and traffic (both voice and data). A-interface protocols have been defined using SS 7, ISDN BRI/PRI and frame relay transport (TIA IS-634).
7/4/2007
7/4/2007
7/4/2007
Transmitter Section
Source Encode Channel Encode Multiple Access
Modulate
Transmitter
Speech
Receiver Section
Source Decode Channel Decode Multiple Access
Demodulate
Receiver
Reconstructed Speech
7/4/2007
Voice Coding:
Variable Rate Coding : Codecs used in CDMA systems are CELP (Code Excited Linear Predictor) EVRC (Enhanced Variable Rate Codec) (20 msec of speech is taken at a time for voice coding). Vocoders are source dependent coding systems. They analyse the voice signal at the transmitter end, and transmit parameters derived from the analysis. The receiver then synthesizes the voice signals according to the parameters received.
7/4/2007 UTL Technologies Ltd
Channel coding : Channel coding maps the input data into coded symbols containing more number of bits than the original signal. Different types of Channel coding are 1. Block coding , as the name implies, code an information sequence one block at a time. 2. Convolution coding has a memory property. 3. Turbo Coding is the most recent coding system which is used in 3G systems. The principle used is based on convolution coding but, the method is used for high speed wireless communication requirements.
7/4/2007
After this coding, bit output from the vocoder is grouped in terms of their probability to errors and are appropriately treated with FEC codes. The output coded symbols are then spread over several data frames by the method of interleaving the data along with the FEC codes. This is done to minimize the loss of data during transmission.
7/4/2007
CODES IN CDMA
7/4/2007
EX-OR FUNCTION
EX-OR Function A
Truth Table
B 0 1 0 1
Y=A B 0 1 1 0
A B
0 0 1 1
EX-OR gate produces HIGH output, if odd number of inputs or HIGH, in all other cases, the output will be LOW.
7/4/2007 UTL Technologies Ltd
PN SEQUENCE
PN SEQUENCE : A Pseudo Random Noise sequence is one in which the bits appear in a random manner with a specified length and the pattern is repeated for subsequent sequences. PN sequence is the best choice as it appears as noise to all other users excepting the desired receiver.
7/4/2007
Requirements of a PN sequence:
Be easy to generate Have random properties Have long periods Be difficult to reconstruct from a short segment.
7/4/2007
PN SEQUENCE GENERATION
Example : Suppose we have 4 digit words.
The natural sequence is from 0000 to 1111. Purely random sequence could be a series of 15 word sets, with the combination of words in each set being random The PN sequence is important because, the receiver needs a replica of the transmitted sequence to de spread the signals. The PN sequence has a random set of words which repeat after a specific sequence length.
7/4/2007 UTL Technologies Ltd
Example of a PN sequence :
Consider a 4 bit sequence.. 0001.
0 1 2 0 3 0 4 1
EX-OR
The first 4 bit sequence is 0001. The next 4 bit sequence will be 1000, 1100, 1110, 1111, 0111, 1011, 0101, 1010, 1101, 0110, 0011, 1001, 0100, 0010. The next 4 bit after this again starts with 0001.
7/4/2007 UTL Technologies Ltd
7/4/2007
Properties of PN sequences:
PN Sequences exhibit the following properties: The maximal length of the sequence is 2n-1, where n is the number of stages in the shift register. The number of 1s will be 2(n-1) and that of 0s will be 2(n-1) -1. i.e., the number of 1s will be one more than the number of 0s. If a maximal SRG sequence is added to a phase shift (time shift) of it, then the resulting sequence is another phase shift of the original sequence. This is called the shift and add property of SSRGs. 7/4/2007 UTL Technologies Ltd
There are 8 ones and 7 zeroes In any period, half the run of continuous 1s or 0s are of length1. One fourth run are of length 2, one eighth are of length 3, and so on. Shift and Add property : If the PN sequence is shifted in time, the resulting sequence is another shift of the original sequence itself if the shift is by one bit/chip, then the original pattern repeats after 2n-1 sequence
7/4/2007 UTL Technologies Ltd
Example :
Code : 100011110101100 100011110101100 100011110101100 Shift 1: 000111101011001 000111101011001 000111101011001 .. XOR : 100100011110101 100100011110101 100100011110101 The original code is marked with white digits in the result of XOR. By shifting the sequence successively by one bit, it can be verified that the original sequence repeats after 15 sequences (2n-1). Example 2: For the same tappings, change the initial seeding of the shift register or feedback points and obtain the output sequence. What are your observations, on the new sequence?
7/4/2007 UTL Technologies Ltd
EX-OR
7/4/2007
0001
Auto Correlation
This describes the extent of likeness between a
random variable and its time shifted version, it can be defined by a simplified formula: Auto Correlation =x(t) * x(t-T) dT For PN sequences this could be written as : Auto correlation = 0T C J (t) * C J(t-T)dT. The Auto correlation function of the PN sequence has a positive value = 2n -1 for zero time shift instances and has a small negative value at other instances, when the shift in time is equal to or more than one chip duration. 7/4/2007 UTL Technologies Ltd
Cross Correlation
Cross Correlation defines the likeness between
two different random variables and could be described by : Cross Correlation =x(t) * y(t-T) dT For a PN sequence, this could be re written as : Cross correlation = 0T C J (t) * C k(t-T)dT. The cross correlation function will have very small negative values.
7/4/2007
7/4/2007
A u t o
15 14
C o r r e l a t i o n
13 12 11 10
9 8 7 6 5 4
v a 3 l 2 u 1 e -1
7/4/2007
0 1 2 3 4 5 6 7 8 9
TS 0 TS 1 TS 2 TS 3 TS 4 TS 5 TS 6 TS 7
-1 -1 -1 -5 -5 +1 -5 +2
7/4/2007
TS 08 : 010110010001111 +1 TS 09 : 101100100011110 -1 TS 10 : 011001000111101 -5 TS 11 : 110010001111010 +1 TS 12 : 100100011110101 +7 TS 13 : 001000111101011 -1 TS 14 : 010001111010110 -1 ------------------------------------------------------TS 0 : 100011110101100 -1 Note that the cross correlation values vary from -5 to +7.
7/4/2007 UTL Technologies Ltd
c r o s 8 s 7 C o r r e l a t i o n v a l u e 6 5 4 3 2 1 0
-1 -2 -3 -4 -5 -6
7/4/2007 UTL Technologies Ltd 10 11 12 13 14 0 1
0 1 2 3 4 5 6 7 8 9
2 3 4
Classification of PN Codes :
PN codes are classified into 2 types. 1. PN Long code 2. PN Short code PN Long Code : It is used for Mobile Identification in reverse link and data scrambling in forward link PN short code : It is used for base station identification in forward link and orthogonal modification in reverse link.
7/4/2007 UTL Technologies Ltd
7/4/2007
PN short code :
This sequence uses 15 bits and code is
generated at 1.2288 Mcps. The code repeats with a period of 26.67 m sec. 215 = 32.768X103 Chip duration = 1/(1.2288X106) = 0.8138 Sec Hence, the code duration = 32.768X103X 0.8138X10-6 = 26.67 m sec.
7/4/2007 UTL Technologies Ltd
ORTHOGONAL CODES
Two codes are said to be orthogonal, if the
product (Ex-or) of the two codes produces equal number of 1s and 0s. Ex : if A= 111010 and B=011001, then Xoring A and B gives the answer as 100011, which has three number of 1s and three number of 0s. Conventionally, 1 is mapped as +1 and 0 as -1. Example for orthogonal codes are WALSH CODES.
7/4/2007 UTL Technologies Ltd
WALSH CODES
Most commonly used orthogonal codes in
CDMA systems A set of length n consists of n rows of nXn Walsh matrix. W1= (0). In general, W2n= [ Wn, Wn, Wn, Wn ], where n is the dimension of the matrix. The over score denotes the logical NOT of the bits in the matrix.
7/4/2007 UTL Technologies Ltd
W4x4 =
7/4/2007
W2nx2n =
wn wn wn wn
0 0 0 0
7/4/2007
0 1 0 1
1 1 1 1
1 0 1 0
1 1 0 0
1 0 0 1
7/4/2007
7/4/2007
7/4/2007
v e R
e s r e
rd a orw
Network Interface
7/4/2007 UTL Technologies Ltd
Handoff
Base Station
Cell Boundary
Base Station
7/4/2007
7/4/2007
7/4/2007
7/4/2007
7/4/2007
1. Active Set : The pilots associated with the forward traffic channels assigned to the mobile station. 2. Candidate Set : These pilots which are NOT in the current Active Set but have sufficient signal strength to qualify for hand-off.
7/4/2007 UTL Technologies Ltd
3. Neighbour Set : This contains a list of neighbouring pilots whose signal strengths are strong enough to make them candidate pilots. This list is entered through the data base. Even if a pilot from an adjoining cell is very strong, the mobile will not look at if it is NOT mentioned in the neighbor list. 4. Remaining Set : The set of all pilots other than the three types mentioned above.
7/4/2007 UTL Technologies Ltd
ACTIVE SET
Candidate Set
Neighbour Set
Remaining Set
7/4/2007
2. T_COMPs : Suggested Value : 2.5 dB ( Range : 0 to 7.5 dB ) This is the ACTIVE SET Vs CANDIDATE SET COMPARISION THRESHOLD.
7/4/2007
3. T_DROPs : Suggested Value : -15 dB ( Range : -31.5 to 0 dB) This is the PILOT DROP THRESHOLD. 4. T_TDROPs : Suggested Value : 2 seconds ( Range : 0 to 15 seconds ) This is the PILOT DROP TIMER VALUE.
7/4/2007 UTL Technologies Ltd
Neighbour Set
Remaining Set
No P exceeds T_ADD yes 1. Move the pilot to candidate set 2. Send Measurement report to base station
No
YES
Send measurement report Receive H/O Direction message
7/4/2007
Near-Far Effect
PT 1 PT 2 PT 2
MS1
PT 1
MS1
MS2 MS2
d/2 d P P d
PR 2 =
PR1 PR2
1.25 MHz
PR1 = PR 2
f
1 P (d / 2 )4 R 1
C PR1 = =1 I PR 2
PR2 = 16PR1
1.25 MHz
PR 1
f
1 PR 2 16 C P 1 = R1 = I PR 2 16
7/4/2007
7/4/2007
Power control is essential to the smooth operation of a CDMA system. Because all users share the same RF band through the use of PN codes, each user looks like random noise to other users. The power of each individual user, therefore, must be carefully controlled so that no one user is unnecessarily interfering with others who are sharing the same band.
7/4/2007 UTL Technologies Ltd
Power control is implemented to overcome the near-far problem and to improve the quality and reduce the interference. Power control is where the transmit power from each user is controlled such that the received power of each user at the base station is equal to one another.
7/4/2007 UTL Technologies Ltd
pr1 pt
pr2 pt
User 1 User 2
A base station with two users, each user is transmitting to the base station a fixed amount 7/4/2007 of power pt UTL Technologies Ltd
pr1 pt1
pr2
pt2
User 1 User 2
A base station with two users, each user is transmitting to the base station with different the distance Ltd from 7/4/2007 powers, depending on UTL Technologies the base station. (power control)
The second option is that the mobile can request access from the base station with a low transmit power. such low power decreases the probability that the base station will receive the mobiles access request. But, the advantage is that the mobile wont cause much interference to other users.
7/4/2007 UTL Technologies Ltd
ACCESS PROBES
Access probes are a series of transmissions of progressively higher power. The mobile transmits its first access probe at a relatively low power, then it will wait for a response back from the base station. If after a random time interval the mobile does not receive an acknowledgement from the base station, then the mobile transmits a second access probe at a slightly higher power.
7/4/2007 UTL Technologies Ltd
The process repeats until the mobile receives an acknowledgement back from the base station. The power difference between the current access probe and the previous access probe is called an access probe correction. The step size for a single access probe correction is specified by the system parameter PWR_STEP. Pt initial = -Pr -73 +NOM_PWR + INIT_PWR Where NOM_PWR = normal power INIT_PWR = Initial power.
7/4/2007 UTL Technologies Ltd
Mobile Transmit Power Second access Probe correction First access Probe correction
Time
UTL Technologies Ltd : A series of access probes by the mobile to access the system.
As a result the received power at mobile will change and open loop power control will continue to monitor mobile received power and adjusts the mobile transmit power according to the following equation. Pt initial= - Pr -73 +NOM_PWR + INIT_PWR +sum of all access probes correction.
7/4/2007
2. closed loop power control : This involves both base station and the mobile unit and gives a closed loop power correction. BS continuously monitors Eb/No on reverse link. If Eb/No is very high, the BS commands the mobile to decrease the transmit power of mobile. If Eb/No is low, i.e., below a threshold value, it commands the mobile to increase transmit power of mobile.
7/4/2007 UTL Technologies Ltd
The mobile should use the power level it receives from the base station to estimate how much to initially transmit. In other words, if the mobile sees a strong signal from the base station, then it assumes that the base station is nearby and thus transmits initially at a relatively low level. If the mobile sees a weak signal from the base station, then it assumes that the base station is far away and thus transmits initially at a relatively high level.
7/4/2007 UTL Technologies Ltd
CHANNELS IN CDMA
7/4/2007
IS-95 Standard
Forward Link
Pilot Channel Sync Channel Paging Channels (max. 7) Traffic Channels
Reverse Link
Access Channels Traffic Channels
7/4/2007 UTL Technologies Ltd
Walsh functions
Pilot Chan W0
...
Up to
Paging Traffic Ch 7 Ch 1 W7 W8
...
Traffic Ch N
...
Up to
...
Up to
Traffic Ch 55 W63
Traffic Data
7/4/2007
0- Pilot Channel Paging Channel Paging Channel Traffic Channel Traffic Channel
W0 W1
W7 W8
31 32 33
7/4/2007
63
W63
Pilot Channel
Unmodulated signal Unique per sector/cell Signal level is 4~6 dB higher than traffic
channel Perfect phase/time/signal strength reference for MS
7/4/2007
7/4/2007
PILOT CHANNEL
I- Pilot PN Sequence @1.2288MCPS
Walsh Function W0 @ 1.2288Mcps (All 0s)
BBF
A To QPSK Modulator
BBF
7/4/2007
QPSK MODULATOR
C A Sin Wc t
carrier
SUMMER E
Pi/2 Cos Wc t B D
7/4/2007
SYNC CHANNEL
I- Pilot PN Sequence @1.2288MCPS
Walsh Function W32 @ 1.2288Mcps
Sync channel bits Convolutional Encoder R=1/2
1.2kbps 2.4kbps
BBF
Symbol Repetition
4,8kbps
A To QPSK Modulator
Block interleaver
4,8kbps 1.2288 Mcps
BBF
7/4/2007
QPSK MODULATOR
C A Sin Wc t
carrier
SUMMER E
Pi/2 Cos Wc t B D
7/4/2007
Sync Channel
Sync channel operates at a fixed bit rate
of 1200 bps. Used for the mobile to get timing and long code references. It is not scrambled It does not carry the power control bits Uses the same pilot PN offset as the pilot channel
7/4/2007
7/4/2007
26.66 msec
Sync ch frame
Sync ch frame
Sync ch frame
------
Sync ch frame
Sync ch frame
Sync ch frame
1 S O M
---
0 S O M
0 S O M
0 S O M
Sync channel message capsule = 96 X Ns, Ns is the no of super frames needed., Sync channel message MSG_LENGTH
7/4/2007
8 bits
7/4/2007
7/4/2007
Message
adjusts its timing to normal system timing begins monitoring its Paging Channel
7/4/2007
Paging Channel
Data rate: 4800, 9600 bps One 9600 bps Paging Channel can support
180 pages/sec. Does not carry power control sub channels Use the same PN sequence offset as the pilot channel Up to 7 paging channels are possible, the first one taking Walsh code number W1
7/4/2007 UTL Technologies Ltd
Overhead Messages
System Parameter Message:
configuration of the Paging Channel registration parameters parameters to aid pilot acquisition
7/4/2007
Order Message:
a broad class of messages used to control a particular MS.
PAGING CHANNEL
BBF
Convolutional Encoder R=1/2
4.8kbps 9.6 kbps
Symbol Repetition
19.2ksps
Block interleaver
19.2ksps 1.2288 Mcps
BBF
Decimator 64:1
7/4/2007
QPSK MODULATOR
C A Sin Wc t
carrier
SUMMER E
Pi/2 Cos Wc t B D
7/4/2007
PCH slot 0
PCH slot 1
PCH slot 3
----------------------------------------------
PCH frame
PCH frame
PCH frame
S C I
S C I
S C I
S C I
S C I
S C I
S C I
S C I
7/4/2007
Message contains:
system parameters access parameter (for access channel) channel assignment TMSI (temporary MS identification) assignment
7/4/2007
BBF
mux
Symbol Repetition
19.2ksps
Block interleaver
19.2ksps
BBF
1.2288 Mcps
Decimator 64:1
Decimator 24:1
19.2ksps
1.2288 MCps
7/4/2007 UTL Technologies Ltd
7/4/2007
7/4/2007
9600 bps frame structure 192 bits (20 m sec) 172 4800 bps frame structure 96 bits (20 m sec) 80 2400 bps frame structure 48 bits (20 m sec) 40 1200 bps frame structure 24 bits (20 m sec) 16 F : Frame quality indicator (CRC)
7/4/2007
12 F
8 T
8 F
8 T
8 T
Sync
1200 2 4800 256 1024
Paging
4800 2 9600 1 1200 8
Traffic
2400 4 4800 9600 bps 2 1
19,200 19,200 19,200 19,200 19,200 19,200 sps 64 256 64 128 64 1024 64 512 64 256 64 128
7/4/2007
32 1 2 3
7/4/2007
62
Access Ch 1
...
n 32
Access Ch n
Traffic Ch 1
m 62
Traffic Ch m
7/4/2007
Access Channel
Access Channel provides communications
from MS to BS when MS is not using a Traffic Channel. All Access Channel use 4800 bps mode Access Channel Message:
call origination response to pages orders registrations
7/4/2007 UTL Technologies Ltd
Access Channels
To access the system, respond the page,
make call origination and process other messages between the MS and the BS 4.8 kbps slotted random access channel MS is identified by orthogonal long code
7/4/2007
ACCESS CHANNEL
BBF
Convolutional Encoder R=1/3
4.8kbps
A To QPSK Modulator
Symbol Repetition
14.4 kbps
Block interleaver
28.8ksps
28.8ksps
D
1.2288 Mcps
BBF
7/4/2007
7/4/2007
BBF
Convolutional Encoder R=1/3
1.2kbps 2.4 kbps 4.8kbps 9.6kbps
Symbol Repetition
Block interleaver
28.8ksps
28.8ksps
7/4/2007
7/4/2007
To process a call, MS goes through the following stages to get traffic channel.
SYSTEM INITIALISATION STATE SYSTEM IDLE STATE SYSTEM ACCESS STATE TRAFFIC CHANNEL STATE
7/4/2007
CALL PROCESSING Tune to CDMA Carrier System initialization state Mobile acquires pilot channel and sync channel Idle state Mobile acquires paging channel and monitors for messages Access State Mobile sends messages on access channel, BS sends messages on paging channel. Traffic channel state Speech communication on forward and reverse traffic channel, Power control on forward link
7/4/2007 UTL Technologies Ltd
CALL PROCESSING STATE: In system initialization state the mobile acquires a pilot channel by searching the PN off sets and selects the strongest pilot signal. Then it acquires synchronization channel using W32 and detecting timing offset of pilot channel. Then mobile acquires the system configuration and timing information. Then the MS enters the system idle state where it monitors the paging channel. Now the mobile can receive necessary message to initiate or receive a call.
7/4/2007 UTL Technologies Ltd
Analog initialization
7/4/2007
Idle State
CDMA initialization
monitors paging channel Authentication Idle hand off Page Response Mobile origination Receives an incoming call Registration
7/4/2007 UTL Technologies Ltd
Idle State : Mobile monitors paging channel. Mobile can receive messages from base station to initiate or receive a call. It can also initiate a registration process, message transmission. After entering idle state, mobile sets its Walsh code to the primary paging channel and sets its rate to the rate obtained from sync message. Paging channel is subdivided into 80 msec slots are called paging channel slots.
7/4/2007 UTL Technologies Ltd
7/4/2007
SYSTEM ACCESS STATE: It includes following sub states. 1. Update overhead information 2. Mobile State origination Attempt 3. Page Response 4. Registration Access sub state 5. Mobile Station Transmission
7/4/2007
3. Waiting for MS answer sub state: In this state, the MS waits for user to answer the call. 4. Conversation sub state: Here, the MS exchange primary traffic data packets with base station. 5. Release Sub state: In this case, MS disconnects a call.
7/4/2007
CDMA REGISTRATION
Registration is a process in which the MS tells the base station about the whereabouts. It notifies base station of its location status, identification, slot cycle and other characteristics. Purpose of registration is to enable the base station to page the mobile in case of an incoming call.
7/4/2007
CDMA supports 9 types of registration. 1. Power up registration : The mobile registers, when it powers up. 2. Power down registration : The mobile registers, when it powers down informing the system that it is no longer active. 3. Time based registration : the mobile registers at regular intervals of time. Its use also alerts the system to automatically deregister mobile stations that did not perform a successful power down registration. 4. Distance based registration : Mobile performs a registration when distance between current base station and the base station which it has previous registered exceeds the threshold.
7/4/2007 UTL Technologies Ltd
5. Zone based registration : Mobile registers when it enters a new zone. 6. Parameter changed registration : Mobile does a registration when it enters a new system or some of its stored parameters change. 7. Ordered registration : mobile registers when a base station asks for it. 8. Implicit registration : When a MS sends a successful origination message or page response message, base station can ask a mobile of its location. 9. Traffic channel registration : Base station tells the mobile, it is registered. Only power up, power down registrations are presently supported.
7/4/2007 UTL Technologies Ltd
BTS
Receives origination message Sets up Traffic Channel, starts sending null traffic data Acquires reverse traffic Ch Sends BS Acknowledgement Receives data from Mobile Receives the message Sends Alert with info msg Called subscriber answers, alert tone off. Conversation
Paging Channel Access Channel Paging Ch Rev traffic Ch Fwd traffic Ch Fwd traffic Ch Rev traffic Ch Fwd/Rev traffic Ch
MS Receives page message Sends paging Response message Receives traffic data frames Sets up reverse traffic ch, sends traffic channel preamble Process primary traffic data Starts ringing, user answers, stops ringing Sends connect order Conversation
Fwd Tfc Ch
7/4/2007
Fwd Tfc Ch
Rev Tfc Ch
7/4/2007
CALL PROCESSING DURING SOFT HAND OFF Mobile Station < User conversation using A > Pilot B level exceeds T_ADD sends pilot strength Measurement Report RTCH Base Station < User conversation using A > A receives measurement report, B starts sending data
Receives hand off direction FTCH message ( Starts using active set A&B) Sends hand off completion message Hand off drop timer for pilot A expires RTCH RTCH
acquires reverse traffic channel, A and B send hand off direction message to use A&B A&B receive completion message A&B receive measurement report Continued.
7/4/2007
CALL PROCESSING DURING SOFT HAND OFF Mobile Station Mobile sends measurement report Receives hand off direction message Sends hand off completion message RTCH FTCH Base Station
A&B send hand off direction message to use pilot B only A&B receive completion message A stops transmitting on fwd ch and receiving on rev traffic channel
RTCH
7/4/2007
AUTHENICATION
7/4/2007
Authentication is a process by which Base station confirms the identity of mobile station. There is 128 bit data called Shared Secret Data (SSD), which is stored in semi permanent memory of mobile. We can say authentication is successful only when MS and BS pocess same SSD.
7/4/2007
Authentication parameters
The parameters of Authentication are as follows: Random challenge number (RAND) Electronic Serial Number (ESN) Mobile Identification Number (MIN) Shared Secret Data (SSD) Call history parameters (count s.p)
1. 2. 3. 4. 5.
7/4/2007
1. Random challenge Number(RAND) : It is a 32 bit sequence send by Base Station. This is sent on access parameter in paging channel used along SSD and other parameters for authenticating mobile.
7/4/2007
2. Electronic serial Number (ESN) : It is a 32 bit sequence that uniquely defines mobile. Its bits (0 to 17) are for serial number. Bits (18 to 23) are reserved, and remaining bits (24 to 31) are manufacturer code.
31 24 23 Reserved 18 17 Serial number 0
Manufacturer code
7/4/2007
3. Mobile Identification Number (MIN) : It is a 34 bit sequence. First 24 bits (LSBs) are called MIN1 and remaining bits (MSBs) are called MIN2.
33 MIN 2
24
23 MIN 1
7/4/2007
4. Shared Secret Data (SSD) : It is 128 bit data stored in MS, similar to K i in GSM. The first subset of 64 bits are called SSD-A, and are used for authentication purpose. The next 64 bits are called SSD-B, and are used for supporting ciphering procedure.
SSD A (64 bits) SSD B (64 bits)
7/4/2007
5. Call History parameters (Count s.p): This is a modulo-64 count held in a semi permanent memory of mobile and is updated upon receipt of a parameter update order from Base Station.
7/4/2007
Authentication procedure
Field AUTH in the system parameter message is set to 1 for enabling standard Authentication mode. Mobile uses Random number (RAND), ESN, MIN, SSDA, MIN-1 data for AUC process. It runs Authentication procedure to generate an 18 bit long AUC signature, through the AUTHR field in registration message.
7/4/2007 UTL Technologies Ltd
The mobile sends AUTHR and RAND C (8 MSB) of RAND to Base Station. Base Station compares the RAND C received from mobile with its internally stored value of RAND, infact it is derived from RAND C coming from mobile. Base Station also retrieves the ESN & MIN of mobile from its data base based on count value received from mobile. It runs authentication process locally by using the internally stored SSD-A and generates its own AUTH R, AUTHRbase
7/4/2007 UTL Technologies Ltd
If AUC response AUTHRmobile matches AUC response of base AUTHRbase , then Authentication is successful. If AUC fails, then Base Station may either do a Unique Challenge response or initiate an SSD Update.
7/4/2007
MIN1
ESN
MIN1
SSD-A
Authentication algorithm
Authentication algorithm
AUTHRmobile
(18 Bits)
RANDC RANDC
AUTHRbase
(18 Bits)
NO
7/4/2007
Perform Unique Challenge response or SSD Update UTL Technologies Ltd Procedure
Unique Challenge response : Initiated by Base Station in the event of unsuccessful authentication attempt. This can be done either on paging or access or forward or reverse Traffic channel. The base Station sends to MS an Authentication Challenge message. It generates 24 bit data called RANDU and sends it on challenge message. The mobile sets AUC parameters using 24 MSBs of RANDU and 8 MSBs of MIN2 in its RAND field.
7/4/2007 UTL Technologies Ltd
The mobile performs an AUC procedure and returns AUTHR to Base Station. The base station also does a similar calculation using internal parameters including SSD-A. If comparison fails, then Base Station may either deny further access to mobile or drop the call in progress or initiates an SSD procedure.
7/4/2007
Authentication algorithm
Authentication algorithm
AUTHRmobile
(18 Bits)
AUTHRbase
(18 Bits)
NO
7/4/2007
SSD Update Procedure: When Authentication fails, initiated by Base station, as SSD update procedure is used along with mobile specific data and authentication key. The authentication key of mobile is 64 bits long and is unique to mobile. It is known only to mobile and HLR, similar to Ki in GSM. The Base Station sends an SSD Update message either on paging channel or forward traffic channel . It generates RAND, SSD number and sends it on SSD update message.
7/4/2007 UTL Technologies Ltd
Both mobile and B.S performs AUC procedure to get AUTH values and these are compared. For its comparison the BS sends its AUTHbs through a BS challenge confirmation order. If comparison match then mobile performs an SSD update procedure at end of which it sends an SSD update conformation order to BS. It also sets the SSD-A, SSD-B values to new values. Base Station also sets its corresponding new values.
7/4/2007 UTL Technologies Ltd
If comparison fails, then mobile discards the new values of SSD-A, SSD-B and sends an SSD update rejection order to Base Station. Again if Mobile doesnt receive Base Station confirmation order with in a time limit set by timer (10sec), new values are discarded and update procedure is terminated.
7/4/2007 UTL Technologies Ltd
Mobile Station End RANDSSD (56 bits) ESN A Key (64 bits)
Base Station End RANDSSD (56 bits) ESN A Key (64 bits)
SSD - Generation
SSD Generation
SSD A new
SSD A new
SSD B new
CDMA 2000
7/4/2007
CDMA2000 1xRTT, the core CDMA2000 wireless air interface standard, is known by many terms: 1x, 1xRTT, or IS-2000. The designation "1xRTT" (1 times Radio Transmission Technology) is used to identify the version of CDMA2000 radio technology that operates in a pair of 1.25-MHz radio channels (one times 1.25 MHz, as opposed to three times 1.25 MHz in 3xRTT). 1xRTT almost doubles voice capacity over IS-95 networks. Although capable of higher data rates, most deployments have limited the peak data rate to 144 kbit/s. While 1xRTT officially qualifies as 3G technology, 1xRTT is considered by some to be a 2.5G (or sometimes 2.75G) technology. This has allowed it to be deployed in 2G spectrum in some countries which limit 3G systems to certain bands.
7/4/2007 UTL Technologies Ltd
1xRTT:
CDMAone system enhancement with twice the number of Walsh Codes, coupled improved power control, voice codecs and other system improvements to give a effective data rate in the range of 4070kbps.
7/4/2007
1xEV-DO:
Enhancement to 1xRTT system that can support asymmetric non-real-time data packet services of up to 2.4Mbps in the forward link and 153.3Kbps in the reverse link. The system requires the network operator to dedicate a separate RF carrier for the data channel.
7/4/2007
1xEV-DV:
Enhancement to 1xRTT system that allows support of voice and packet-data services on the same 1.25MHz spectrum of a single RF carrier. Theoretically, providing a peak data rate of 5Mbps and an average throughput of 1.2Mbps.
7/4/2007
3xRTT:
Uses three 1x CDMA channels (of 1.25MHz) grouped together to provide data rates of 384Kbps with a peak of 2Mbps. As this is less than 1xEV-DV and uses much more spectrum, many have questioned whether 3xRTT will be developed, or may be modified to provide even higher data rate services.
7/4/2007
7/4/2007
7/4/2007
Changes Needed in CDMA2000 Compared to CDMA (IS-95) 1. The MSC-VLR and HLR (All the circuit switched Core networks) need to software upgrades in order to support the authentication and authorization of the packet data network. Note, that it is still the CS-CN (Circuit Switched Core Network), which authenticates and authorizes the wireless access of the user during packet session initiation. The MSCVLR/HLR are updated with the Packet data user profile information. The information is then downloaded from the HLR to the VLR of the associated network switch during the successful registration process.
7/4/2007 UTL Technologies Ltd
Chipset) that supports radio channels to carry voice, Circuit switched data along with the packet data services that requires low and high data rates. routing.
4. SW update in the BSC in order to support IP 5. Apart from routing the Time division multiplexing
(TDM) traffic to the circuit switched platform, the BSC routes the packet to and from the PDSN.
7/4/2007 UTL Technologies Ltd
7/4/2007
service. Charges for calls made or received while roaming shall be as levied by the foreign network selected by the customer per standard global roaming norms. The SIM will be issued free of charge and the RUlM card is already available with the customer. A roaming deposit will also be charged depending upon the creditworthiness of individual customers for availing International Roaming. "The facility will be initially offered through Reliance WebWorlds in top 9 cities which include Mumbai, Delhi, Kolkata, Chennai, Banga!ore, Hyderabad, Ahmedabad, Jaipur and Pune. Other major locations would be covered over the next few weeks," added Shukla.
UTL Technologies Ltd
7/4/2007
CDMA2000 1xRTT, the core CDMA2000 wireless air interface standard, is known by many terms: 1x, 1xRTT, or IS-2000. The designation "1xRTT" (1 times Radio Transmission Technology) is used to identify the version of CDMA2000 radio technology that operates in a pair of 1.25-MHz radio channels (one times 1.25 MHz, as opposed to three times 1.25 MHz in 3xRTT). 1xRTT almost doubles voice capacity over IS-95 networks. Although capable of higher data rates, most deployments have limited the peak data rate to 144 kbit/s. While 1xRTT officially qualifies as 3G technology, 1xRTT is considered by some to be a 2.5G (or sometimes 2.75G) technology. This has allowed it to be deployed in 2G spectrum in some countries which limit 3G systems to certain bands.
7/4/2007 UTL Technologies Ltd
The main differences between IS-95 and IS2000 signaling are: 64 more traffic channels on the forward link that are orthogonal to the original set. Some changes were also made to the data link layer to accommodate the greater use of data servicesIS-2000 has media and link access control protocols and QoS control. In IS-95, none of these were present, and the data link layer basically consisted of "best effort delivery" (which is still used for voice).
7/4/2007
7/4/2007
7/4/2007
CHANNELS
7/4/2007
7/4/2007
F_PICH : This channel is continuously broadcast through out the cell in order to provide timing and phase information. F_PICH is shared by all traffic channels and is used for detecting multipath rays so that RAKE fingers efficiently assigned to the strongest multi path, estimating channel gain and phase.
7/4/2007
F_PCH : A CDMA 2000 system can have multiple paging channels per base station. This channel carries overhead messages, pages, acknowledgements, channel assignments, status requests and updates from the BTS to the MS. F_SYNC: Used by mobiles operating within the coverage area of the base station to acquire initial time synchronization.
7/4/2007 UTL Technologies Ltd
F_FCH : (Fundamental channel) Basic Low rate channel used for voice, low data rate, signaling, and power control. F_SCH : (supplemental channel) High rate data channel. F_QPCH : (quick paging channel) Used for alerting mobiles in standby mode that a page is coming on the paging channel.
7/4/2007 UTL Technologies Ltd
7/4/2007
R_PICH : Pilot Channel Pilot used for power control. R_ACH : Access Channel Access the channel R_DCCH : Dedicated Control Channel Signaling channel. R_FCH : Fundamental Channel basic low rate channel used for voice, low rate data, signaling and power control. R_SCH : Supplemental Channel High data channel.
7/4/2007 UTL Technologies Ltd
Additional CDMA 2000 feature Improved spreading: Hybrid QPSK, complex spreading method, used to improve power efficiency. Fast Power Control in Forward Link : Improved multipath resistance and orthogonality. Turbo codes: Variation of convolutional coding, supplemental channels for higher data rates. More Walsh codes : 128.
7/4/2007 UTL Technologies Ltd
Goals of IMT 2000 : Global Standard High speed packet data services. 2 Mbps for stationary use. 384 kbps for pedestrian use. 144 kbps for vehicular use. 3G applications enabled by cdma 2000.
Packet based services like, wireless internet, e-mail, e-commerce and multimedia. Location based services, longer battery life.
7/4/2007 UTL Technologies Ltd
7/4/2007
Outline
cdma2000 network architecture Call processing states and call flows CDMA evolution Essential elements in a CDMA system Power Control Mobility management
Handoffs Registration Roaming
UTL Technologies Ltd Radio Admission Control 7/4/2007
Network Architecture
PSTN PDSN MSC BSC Ericsson Packet Network Black Mountain
UCSD
7/4/2007 UTL Technologies Ltd
7/4/2007
Sync Ch
7/4/2007
Access Ch
7/4/2007
End of call
7/4/2007 UTL Technologies Ltd
IS-95B (2.5G)
Most analog information is removed Some technical corrections New Capabilities, such as higher data rate 64 kbps packet data
7/4/2007 UTL Technologies Ltd
Each user transmits at the same time, at the same frequency with a unique code Certain frequency, time-slotted
7/4/2007 UTL Technologies Ltd
vs.
CDMA
7/4/2007
Channelization
Channelization is provided by orthogonal
Walsh codes cdma2000 uses variable length Walsh codes for supplemental channel data services Walsh codes can be of length 8, 16, 32, 64, and 128
7/4/2007 UTL Technologies Ltd
Walsh Codes
Walsh codes are orthogonal to each other The shorter the code the higher the data
rate since the chip rate is kept constant
1 10 1001 1010 1100 11 1111
7/4/2007
1.2288 Mcps
19.2 ksps
800 Hz
Cell Separation
Walsh code spreading is followed by quadrature
spreading using PN chips with time offsets Adjacent cells have different PN offsets. This prevents interference since time shifted PN sequences are orthogonal to each other
I-PN Wt
Baseband Filter
cos wot
Baseband Filter
7/4/2007
Q-PN
sin wot
CDMA (wide-band)
can discriminate between the multipath arrivals Rake receivers are used to combine multipath signals to reduce error rate at the receiver
7/4/2007 UTL Technologies Ltd
A user near the base station would jam the user far from the base station
7/4/2007 UTL Technologies Ltd
Overcomes near-far problem CDMA wouldnt work without it Copes with path loss and fading
7/4/2007 UTL Technologies Ltd
Mobility management
A CDMA system provides mobility: Handoff continuity of the service across adjacent cells Registration locating the mobile user Roaming continuity of the service across different service providers
7/4/2007
Handoff
Handoffs between cells are supported while the
mobile is in traffic or idle MS continuously keeps searching for new cells as it moves across the network MS maintains active set, neighbor set, and remaining set as well as candidate set There are 4 types of handoffs:
7/4/2007
T_ADD T_DROP
T_TDROP
Time
7/4/2007
Soft Handoff
Both cells have the same frequency
MSC BSC Ericsson Black Mountain PDSN
UCSD
7/4/2007 UTL Technologies Ltd
Soft Handoff
Make-before-break Both cells are at the same frequency Reduces number of call drops Increases the overall capacity Mobile transmit power is reduced Voice quality near the cell boundaries are
improved MS reports the SNR of the candidate sets
7/4/2007 UTL Technologies Ltd
Distance
7/4/2007
Hard Handoff
Break-before-make Handoff between
different frequencies, non-synchronized or disjoint cells which are controlled by different BSCs
7/4/2007
Registration
It is sufficient to know the
cell or the region that a MS is active for routing purposes Mobile station identifier, desired paging slot cycle, and registration type is conveyed Cell/LAC based paging is preferred to flood paging
UTL Technologies Ltd
7/4/2007
Registration Types
Autonomous Registration: power-up,
power-down, timer-based, distance-based, zone-based registration. Parameter-change registration Ordered registration Implicit registration Traffic channel registration
UTL Technologies Ltd
7/4/2007
Roaming
Users that are outside their home area can
receive service from another system by paying some additional charges Mobile station can be:
Home state (not roaming) Network roaming System roaming
Network 2 Network 1 System
7/4/2007
Network 3
UTL Technologies Ltd
Summary (1/2)
cdma2000 supports both voice and data
services in the same carrier provides enhanced voice capacity
Forward link Fast power control in forward/reverse links Lower code rates New code channels Reverse Link Coherent detection
7/4/2007 UTL Technologies Ltd
Summary 2/2
Higher data rates: 1x up to 153.6 kbps
and 1x EV-DV up to 3.09 Mbps Battery life is improved Introduction of Turbo codes provides better link quality for supplemental channels
7/4/2007
THANK YOU..
7/4/2007