Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
CHAPTER
by-
10
BtItlT. Dhaka
1000.
Mobile telecommunication is one of the fastest grorving and most demanding of all
telecommunications technologies. Currently, it represents an increasingly high percentage of
all nerv telephone subscriptions worldwide. In many cases, cellular solutions successfully
compete with traditional rvireline networks and cordless telephones. In the future, cellular
systems employing digital technology rvill become the universal method of
telecommunication.
In
automatic channel trunking \yas introduced and implemented under the label IMTS
(lmproved Mobile Telephone Service) and with IMTS telephone companies.,began offering
full duplex, auto-dial, auto-trunking phone systems. Horvever, IMTS quickly became
saturated in major markets. By 1976, the Bell Mobile phone service for the New York City
market had only t',velve channels and could serve only 543 paying custonters. The
govemment regulatory agencies could not make new spectrum allocations in proportion to
the increasing demand for mobile services. So it becomes imperative to restructure lhe
radiotelephone system to achieve high capacity rvith large coverage area.
During the 1960s and 1970s, AT&T Bell laboiatories and other teiecommunications
companies throughout the rvorld developed the theory and techniques of cellular
radiotelephony - the concept of breaking a coverage zone into small cells, each of which
reuse the portions of the spectrum to increase the spectrum usage with $eater capacity at the
cxpense of greater system infrastructure. In 1983, the FCC allocated 666 duplex channels (40
MHz of spectmm in the 800 MHz band, each channel having a one-way bandwidth of 30 kHz
for a total specfmm occupancy of 60 kHz for each duplex channel) for the U. S. Advanced
N'lobile Phone System (AMPS). AMPS is an analog system that uses FDN1A to maximize
caDaclry.
The world's first cellular system was implemented by the Nippon Tglephone and Telegrjrph
conrplny (NTT).in.lapan. fhc system deployed in 1979, uses 600 FM duplex channels (25
one-"aj tink'; in the 800 MHz band. In Europe, the Nordic Mobile Telephone
Rfz-6r e-each
sysrem 0\i\{T 450) *,as clereloped in 1981 for the 450 MHz band ildZ5 kHz ch-anneK-Ifie
A"..ss
Cornnrunicatron Syslem
(t:lACIIof
154
(
i.
\,4
system but use 900 MHz band and smaller. bandtvidth channei. These :..::e::: ::: -:.,r bcine
replaced by
(Globrl S:.::-- ,:: l.irbile),
Dy the
tne Pan
Han European
tiuropean digital
dlgltal cellular standard 9Sltl
GJ]{ liGlobal
which was first deployed in 1990. A cellular system bas6d on code drrrs:tr-. :*]ll--3,s
@I
supports variable
by
Qualcomm,
as an |JrLeriq
dire-tsequ:::: ::::::
spectrum.
The origins of mobile communications follorved quickly behind the invention of radio j; i:.:
late 1800s. The first applications of mobile radio were related to the navigation and safeq c;
ships at sea. As radio concepts developed, so did it's use as a communications tool. The
major milestones in the development of rvireless communications are summarized in the
followine table.
able l: The Maior Milestones in the Developmeot of Wireless Communications
Date
Activity
r 906
Reginald Fesseden successfully transmits human voice over radio. Up until thal time,
radio communications consisted of transmissions of Morse Code
1915
J. A. Flemming invents the vacuum tube making it possible to build mobile radios.
t92t The Detroit Police Department (US) used a 2 MHz frequency in the departmenr's
first vehicular mobilc radio. The system was only one way and police had to find a
rvireline phone to respond to one way messages.
1930s Amplitude Modulation {AM\ two-way mobile systems werc in place in the U.S. that
took advantage of newly developed mobile transmitters and utilized a "Push-to-Talk"
or half-duplex transmission. By the cnd of the decadc, channel allocation gren' fronr
1lto40.
1935
1940s
need for large AM transmitters and resulted in radio equipment rvhich required less
power to operate. This made the use of transmitters in vehicles more practical.
The Federal Communications Commission (FCC) recognized a comnrunication
service it classified as Domestic Pubiic Land Mobile (DPLM) radio service. The first
DPI-M systcm rvas estffid
the 150 MHzband.
'the following year, a "highway" system was developed along'the Nerv York
1947
r
948
1949,
1958
t964
1968
1
969
T! u=:. ne8glb.
Th e FC
C
authorize
trr@H,"r
*a
*;i;a;m
*o
.
.'
,yrt.n.,,
Nlobile Standards
Standards play a major role in telecommunications
bv
o
o
o
ol the lbllowing:
.
e
o
.
.
156
PrcparcJ b1
Prot-.
i\ld Srifur
Rahman
rVain Stald
ain Nlarkets of Cellular llobilc Comnrunicatiou
Year Standard
Nlobile Telephona Svstenr
Tcc hnologr
Printar)'NIarkets
I 981
NMT 450 r\orolc t\40blle I eleDhonv
Analog
Eurgpe, lt tidd Ie Erst
l98l AMPS
Aovanceo NloDlte Phone system
Analog
North and
Iable,2_i
Sourh
198s
Total Access
TACS
Amenca
Communicatton
Anaiog
Analog
System
986
NMT
t99t
GSM
9OO
Mobile
Communication
i 991
1992
D.AMPS
Digiral-AMpS
1800
World-rvide
North and
Digital
GSM
Digital
Mobrle
Digital
Europe
Digital
Digital
l.{orth Anterica
Communication
1994
Dna
1995
LC!900
South
Amenca
Japan
t9821985
oOf GSNI
Activity
..:-
S:":lfiT:e;|llopi"
!@in thc 900 Muz frcqucncy blnrr. Tiis
drgrlal rcrccomrrunrcations sta'dard
E'uropean
standard later became known o. Gl:bnl
1986
1987
1988
1989
SI:r!.,,fT yo
n technolosy to use.
A Combination of TDMA
una
noun@
for GSM
Operators from l2 countries signed a M
themselves to introducing GSM bv 1991 .
CEPT began prodr.rcing CSM s
five countries signed the MoU.
Il.,-^-
^--
f-1-
UJLU
SDeCI I
MoU
tClrtlon.
1990
cqurnment.
I 991
1992
@wingoutside
Phase I specifications were completed.
CEPT to siga.
The MoU norv had a total of 70 signatories, GSM networks rvere launched in
t994
At th. b"gr""Gg
tgqg the \4oU has a total of 253 members in over 100 countries
"f
and there are over 70 million GSM subscribers world-wide. GSM subscribers account
for 31% of the world's mobile market.
Because GSM provides a common standard, cellular subscribers can use their telephonqs
over the entire GSM service area which includes all the countries around the world rvhere the
GSM system is used.
as high sPeed data communication, facsimile
and a Short Message Service (SMS). The GSM technlcal specltlcatlons ale also desrgneo to
work with other standards as it guarantees standard interfaces.
Finally, a key aspect of GSM is that the specifications are open ended and can be built upon
to meet fuhrre requirements
GSM Specifications and GSM Phases
GSM rvas designed to be platfom-independent. The GSM specifications do not specif-v the
actual hardware requirements, but instead specifu the netwolk functions and interfaces to be
creative in how they provide the actual functionalify, but at the same time makes it possible
for operators to buy equipment from different suppliers
The GSM recommendations consist of twelve series which are listed in the table below.
groups A
These series rvere written by different working parties and a number of expert
permanent nucleus was established in order to coordinate the working parties and to manlge
ihe editine of the recommendations. All these groups were organized by ETSI'
Table 4: GSM Recommendations
Content
Series
01
General
0z
Sewice aspects
Network aspects
MS-BSS interface and Protocol
Physical layer on the ra4io Path
Speech coding speci!gq!9!
Terminal adapter for MS
BSS- MSC interface
Network interworking
Service interworking
Equipment and ry?e app1qyql JP9!ifi99!9n
03
04
05
06
01
08
09
l0
1l
t2
158
P:el::ei :r - prof
* *,
lld
Sarfur Rahnran
."*,nrn**or.s.
',,
"i? has
oo o,n, e00 s based on
iT';"11i*::::,:
been
i:y::t.f:*j9d;,,
iffi
i""'ii',il."il#.:1".:ifiiiglf:::l::lJ1"r?1",$J;
"a"pi.a
:"'#"li:'and
e:Ti
[1%
GSM Phases
l;'hlil:,
J.1?:;il',ffiTi,l:":il".1d:,:"#::ml'.".1
::jxn.*:,'Jdnfr
;j,*,tru:*ff
;;ffi
::,:ffJ ffi::1 ".,
j:i1.,
*li,,l;:U*
jtt."ixl;T#
J1i:it*l
Phsse 2
1989
E
Phase
Phase
Slandardizalion
ldplehsnrario^/t/sa9.
Voice telephony
Internationalroaming
Basic faxldata services (p to
9.6 kbits/s)
Call forwarding
Call barring
.'
.
r
o
o
r
o
Additionaldatacommunicationscapabilities
Phase 2+
and a
*n.,,
"ii,rf,X.rr?;:"ffilffii-
Prepared by
Rahman
r
o
.
o
Interworking with GS 1800, GSM lg00 and the Digital Enhanced cordless
Priorities and the time schedules for new features and functions depend primarily on the
interest shown by operating companies and manufacturers and technical develoDments in
related areas.
o
o
In
addition, as with
all
il
L:;--2
Switching System
l:Rff
lAU.o l
--,ugt
J
/'q\
- - - - Signaling kansmission
Call connections and
signaling transmission
,,,
/
\*
Figure: GSM Slstem model
Abbreviations:
160
J
r:
l-
\ld
Slrtirr
Rahm.rn
because
these
CELL
A cell is the basic unit of a cellular system and is defined as the area of radio coverage given
by one BS antenna system. Each cell is assigned a unique number called cell Global ldJnriry
(cGI). In a complete network covering an entire country, the number of cells can be quile
hieh.
/r)
l-*
t\,A
/q\'&
'\
Figure: A cell
An MSC service area is made up of a number of Las and represents the geographical part of
the netrvork controlled by one MSC. In order to be able to route a call to an NiS, the
sr.rbscriber's MSC sen'ice area is also recorded and monitored. The subscriber's lv{SC senice
area is stored in the FILR.
Prco.rrcrl
PI-}I}-.
IJE
iI.VICE ARiiA
US\1 nctrrork. lhc ('sl\l srrri.c rrrer inercirsc.' iis nlorc opr'rit(or:\ "iFn contrr(t5 ltrcclng
t() work togcthcr. CLrrrcntly, thc GSlvl scrvicc arca spirns dozcns of counlries lcross thc *'orld
from Ircland to Australia and South Africa
N'IS
Location A
@
[:igLrrc Rclation bciwccn arcas in CS]\l
162.
Prcpared
b;
Prof.
i\ld
Sarfirr Rahman
0.8
9OO
GSM
0.9
t800
GSM 19oO
1.6
GSM
9OO
GSNI
18OO
tE;;;
ha!.;
l::l'i'::i,:il""1","'.*:s'i:"1i0"1""Y-"'5fl
:ll.turroperationlli'-"'qdeqslui&;
Digital Cellular Syste4 (Q9!_)_l!!gJ4IIg. In 1997
it was ienamed cSM I 800.
By granting licenses lor GSM 1800 in addition to GSM 900, a counrry can
rncrease the
number of operators. In this way, due to increased competition, the
serviie to subscribers
is
rmproved.
GSN| 1900
In
9"rr""t.
KEY TERMS
During the development of mobile systems, many terms arose which are used
to describe the
call cases and situations involving MSs. The primary terms used are described below.
Ann MS can have one of the follorving states:
I'rcpllctl
bl
R.rhnrun
Tlre foilorving table defines the key terms used to describe GSM mobile traffic cases (There
Table
Mode
Idle
attached
Roaming
Location
Updating
Paging
Activc
I'landover
-ifrat
itG
Intemational
Roaming
informii nEtwo
loamlns.
when an MS is powered off, it is detached from the network. when the subscriber srvitches
power oN, the MS scans the GSM fiequencies for special channels called control channels.
When it finds a control channel, the MS measures the signal strength it receives on that
channel and records it. When all control channels have been measured, the MS tunes to the
strongest one.
When the MS has just been powered ON, the MS mr.tst register rvith the netrvork rvhich rvill
then update the MS's status to idle. If the location of the MS is noticed to be different fiom
the cunently stored location then a location update will also take place.
As the MS moves through the netlvork, it continues to scan the control channels to ensure
that it is tuned to the strongest possible channel. If the MS finds one which is stronger, then
the MS returns to this nerv control channel. Q.lote: In idle mode, it is the MS rvhich decides
lrhich cell to move into. In active mode, the network makes this decision.) If the nerv
control channel belongs to a nerv LA, the MS will also inform the network of its new
location.
I64
Prepared by
@A
Figure:Roaming
NETWORK COMPONENTS
It has the following components or sub-systems.
o
.
.
.
An MSC performs the telephony switching switching functions for the mobile net\r,ork. It
controls calls to and from other telephony and data systems, such as the Public Switched
Telephone Network (PSTN), Integrated Services Digital Network (ISDN), public data
networks, private networks and other mobile networks.
An MSC can become a Gateway MSC (GMS) by integration of the appropriate software.
This enables an MSC to interrogate a network's HLR in order to route a call to a mobile
station (MS). For example,
if
mobile subscriber, then the PSTN exchange will access the GSM netrvork by first connecting
the call to a GMSC. The same is true of a call from an MS to another MS.
vLR
The VLR database contains information about all the mobile subscribers currently located in
an MSC service area. Thus, there is one VLR for each MSC in a netrvork. The VLR
temporarily stores subscription information so that the MSC can provide service to all the
165
Prcpared
b!
regarded as
area The VLR can be
service
MSC
that
vistttng .,r-^ rrr D i.fnrnreii.n stored lbout
subscribcr'
---rbout the s.bscribcr'
subscribers currently
---
--t:"
ll,t,,.J,:til#il:,lirJillli"iTl,'lli*i*i"i"*"ii"n
rnto
when a subscriber roams
a,newi4SC.:lll$,i,il1;.i;:."riJil?H?tl::il::T"t;
:.:ill"'fi'ff :i:iHiq,l+'::::i::l*;'**1}:'H:;;::'xilT1ll:;:JJ
ff
ror can set-up'
fl;rumll'l"",X"""iti::',':;'#nl[*1i:*;'i,':?H:f,i,]l1'"asubscribcr
inro""ution'"quired
stores
nenvork database that
The HLR is a centralized
":9
T:f?:; "tt-'"btl:tt::;:lj;;:;
iix;uiffi l':hT:T,[:,1;'s"i:':.'P'"ffi:il"i'"'i"'"*oincrudes:
itffi
.
Subscriber identitY
servtces
Subscriber supplementary
informatton
Subscriber location
.
.
. iuit.tiu"t authentication informatton
:*l'fitl:
:n#il;ilJillifT:Ti'l,:T.::[""1"'y'T]'l':ff "?:li:#"'"'#:'x"ff
maY be added'
Itj"t""tkt"g L"t"ttt
(rLR)
rhe rnterworking Lorction.register
'*:*f
,A
il"hi*"
:,"i
:iy.,#.,il1""-"
(Auc) atd
Authentication centre
exists
ii)lJL]'"lY;^l
J c s *,
i,'ti.',
iill,: ; ,'T',ff
" "
1
SY'?l.i3
l!tii};;
\'
0
E@
AUC
anemtii8
l::tffi""::T:,jj}:i
;;i;
$l,j ;l$*.:+",:'"u: t";rr:"i:il'"""i:Hll"#'ff
the sub.scriber
rs to authenticate
The funcrion of rhe AUC
EIR
$:n:T;':"",*:::[''j#]1:t5:1;Jig:iJ"i1l,''.tr[{*Ilflil:"llit
'"::#:::j#Hilll'"
"K"no*
lnterface (DTI)
Data Transmission
the Drr
which imprcments
is a hrTdwsre pratfomr
lT':i,y"::T:1J5{i:-il'i':'T'L:""'"..:
qXE
!'Jl*,flil*::
:H il?"{ilt*$t';rJ*;1"'r"':"t
and m
operation
DTI does not needieparate
olrtform. the
in'lo
',:n*t
'lhe
Prrp,rrcrl br,-
Il.rhrrt.tn
'fhc purpose of a TI{C is to mLlltiplex network tralfic channels from multiple BSCs onto one
6.{ Kbits/s PCM channel which reduces network transmission costs. The TRC can be
combined with the BSC or exist as a stand-alon node.
Base Station Controller (BSC)
'Ihc BSC manages all the radio-related frinctions of a GSM network. It is a high capaciry
su'itch that provides functions such as MS handover, radio channel assignntent and the
collection ofcell configuration data. A number ofBSCs may be conkoiled by each NISC.
Base Transceiver Station (BTS)
The BTS confiols the radio interface of the MS. The BTS comprises the radio equipment
such as transceivers and antenna which are needed to sewe each cell in the netrvork. A group
of BTSs are controlled by a BSC.
Network Monitorins Centres
Operation and Maintcnanc( C.'ntre
(oMrl
ork
components such as MSCS and BSCs via X.25 data nehvork links. [n the OMC, staff are
presented with information about the status of the nefwork and can nronitor and control a
variety of system parameters. There may be one or several OMCs rvithin a nenl ork
depending on the network size.
Network Management Cenfi'e (NMC)
Centralized control of a network is done at a Network Management Centre Q'{MC). Only one
NMC is required for a network and this controls the subordinate OMCs The advantage of
this hierarchical approach is that staff at the NMC can concentrate on long term system-wide
issues, rvheras local personnel at each OMC can concentrate on short term, regional issucs
OMC and NMC functionality can be combined in the same physical network node or
implemented at different locations.
Several
tlpes of MSs exist, each allorving the subscriber to make and receive calls. Manufacturers of
MSs offer a vanety of designs and features to meet the needs of different markets.
The range or coverage area of an MS depends on the output power of thc N{S. Diffcrcnt tlpcs
of MSs have different output power capabilities and conscquently diffcrent rangcs. For
example, hand-held MSs have a lower output powel and shorter lange than car-installed MSs
with a roof-mounted antenna.
t67
Prepared bv
o
r
Unlike other standards, in GSM the subscriber is separated from the mobile terminal. Each
subscriber's information is stored as a "smart card" SIM. The SIM can be plugged into any
GSM mobile terminal. This brings the advantages of security and portability for subscribers.
For example, subscriber A's mobile terminal might have been stolen. However, subscriber
A's own SIM can be used in another person's mobile terminal and the calls wil'l be charged to
subscriber A.
168
i4
lt.3
ir'
b,s
r,
trits lrirnlc
Mic
I
8KHz
(20 ms speech
Sampling
segment)
260 bits/frame
and l3kb/s
l3bits/sample
( t 3Bir PCM)
456
I'r frame
G]V{SK
(20ms)
I
l,l
MOD
2nd frame
(20ms)
1,
Rh
= 8000 samplc/s
ll
T, = l/8000 = 0.125 ms
20
20000
No of sample
20
0.125 l2i
ms
hirs _
ll
sample -semple
^^
= 270.3
fru.e
kbi s
TI
Rb=33.85x=
ls
bits
= 2080
fr"."
J.60 ms
\ :-;::u.l /tms
= 1i.85 )r
^ sec
li bitst 160 samples
= s"mple
l-1.85
.
o
l..tplirk
Dori nlink
Bandrvidih
Duplex Disiance
Carrier Separation
Radio Channels
Transm ission Rate
890 9t5lvlHz
93i - 960 irti l.r
25 Mi{z
45 MHz
200 kHz
880
!,:i-
Ii
915
!160
MHz
t'ilir
I\{Hz
l7l0
l8C-l
1735 lvlHz
1850
iz
l()10
i3tiO
ir il
l9l0
60 lvlflz
95 lvlllz
200 kHz
80 lviHz
200 kHz
lli
45 MHz
200 kHz
r75
210 kbitsis
270 kbitsis
270 kbitsis
,15
NlHz
lq90 Nlllz
Illtz
75
GSN4
300
270 kbitVs
Prepired
by
indicates one oscillation per second, Radio frequencies are used for many applications in the
rvorld today. Some common uses include:
30C N{Ilz approx.
Television
FIll radio
- 100 l\{liz appiox.
Police Radio
- Country dependent
N'lobile Networks - 300 - 2000 MHz approx.
The frequencies used by mobile networks vary according to the standard being used. (As
these frequencies are used to carry information, they are often referred to as carrier
frequencies). An operator applies for the available frequencies or, as in the United States, the
operator bids for frequency bands at an auction. The following diagram displays the
frequencies used by the major mobile standards.
l"1fl? 0
450
NIIT.tso
800
AMPS
DA|VJPS
800
900
GSM 9OO
NMT 900
1800'19C0
1500
PDC
1500
GSN1
1800 oAMirs
1300
GSM 19C0
Note: Due to frequency, a BTS transmitting information at 1800 MHz with an output power
of l0 Watts (W) will covcr only half'thc arcn of n similar B'lS transnritting at 900 Nlllz. To
counteract this, BTSs using 1800 MHz may use a higher output power.
Bandwidth
Bandwidth is the term used to describe the amount of frequency range allocated to one
application. The bandrvidth given to an application depends on the amount of available
frecluency spectrum. The amount ofbandwidth available is an important factor in determining
the capacity ofa mobile system, i.e. the number ofcalls rvhich can be handled.
Channels
Another important factor in determining the capacity of a mobile systenr is the channel. A
channel is a frequency or sct of l'requencies lvhich can be allocated for thc transmission, and
possible reception of information. Communication channels of any form can be one of the
following tlpes:
Tlpe
Simplex
Half duplex
Full duplex
Description
Examples
FM radio, television
Police radio
Mobile systems
A simplex channel, such as an FM radio music station, uses a single frequency in a single
direction only. A duplex channel, such as that used during a mobile call, uses frvo
frequencies: one to the MS and one from the MS. The direction from the Iv{S to the net\.\'ork
is refened to as uplink. The direction from the network to the MS is refened to as downlinh.
frcparcd
try IfoI
ru
a radio channel
Figure: Uplink and dorvnlink on
to transmit
Because it requires less power
frequencies in mobi'le tytt"*t
battery Porver of the MSs
"'"Ti*;;;
a lower frequency
trt"
i"**
ti,ra
"i
Duplex Distance
il.r *o'.1:,r::":lH'"'ll
in frequency bY a mtntmum. ot
rhe use of
;;;;ii;';;:q;;";ies
Hil\Jlf"d;;;]j:-,xH1:\;nHi.'iliK'i::
otn"
:.r, eacn
^^^L ^+L6,
^ with
would interfere
, - ---
915
935
Carrier SeParation
separation (Camer
mobile system includes a carrier
every
distance'
duplex
the
"to
'iunO*iAtftl This is the distance on the
ln addition to
separation
is
sometimes
t"tn"Jl
'it"""J"'
:l'*tT?J#'"::jffi il"jiil;i'*1;f;
lli:lln{ll*::*,:#:l;ffi
fr:Ji:'T.";iTn:*:lJ;'xff"T,:"trn?:Llt{?:*#:ll:'ff
#il m"" gr"ui"' ttt" amount of separation required'
MHz
Carrier Separation (200
895
895'6
KHz) t---'
171
;requiredin
il:T;:'i;*mlt
Prcparcd br
Ruhnr.rn
From the Figure above, it can be seen that it can be scen that the infomration to be sent is
modulated around the carrier frequency of 895.4 MHz. The same is tme of the information to
be sent on 895.6 MHz. To avoid interference between the flvo sets of information, a
separation distance of 200 kHz is required, If less separation rvere used, they rvould interfere
and a callet on 895.4 MHz may experience crosstalk or noise fiom the caller on 895.6 MHz.
It is the number of frequencies in a cell which determines the cell's capacity. Each company
with a license to operate a mobile network is allocated a limited number of frequencies.
These are distnbuted throughout the cells in their network. Dcpending on the traffic load and
the availability of frequcncies, a cell may have one or more frequencies allocated to it.
These frequency-reuse patterns ensure that any frequencies being re-used are located at a
sufficient distance apart to ensure that there is liftle interference betrveen them. The temt
"frequency re-use distance" is used to describe the distance between two identical frequencies
in a re-use pattern. The lower frequency re-use distance, the more capacity available in the
network.
172
Prcparcd
by
clustcr. th!- llrgcr thc numbct of channels per cell, thus thc traffic canied
Der cell is hiehcr.
ic Cel ILtlar
sys tenr
'
\t5(
Figure above shows the cellular systems with connections. Radio links and hich-speed data
links using coaxial cable or optical fiber connect different subsystems, say, BS t-o nasc, usc
to land telephone network etc.
cells arc ar-tificial and such a shape cannot be generated in the real rlorld. The real cell shapes
along with ideal ones are sholvn in the follolving figure.
|1e^aaOnAiCeliS
:'i
.\-
,'\
:'!ii
'\/
,.
lii
t.'l
'\-'^'-',t-
\+/
jl
'-."--.\
l
l.'-,'/\'-'./
---
Sigoal coverage
Figure:
groups that contain completely different channels than neighboring cells. The base station
int.nnu. are specified to achieve the desired covefage within the particular cell. By limiting
the coverage area within the boundaries of a cell, the same group of channels may be used to
cover different cells that are separated from one another by distances large enough to keep
interference levels within tolerable limits. The design process of selccting and allocating
channel groups for all of the cellular base stations within a system is called frequencl'
planninglUsi of same frequency in a number ofcells lvithin the area to be covered is called
frequency reuse.
111
TPrcpaIcd
by
S=lN
The N cells which collectively use the complete set of available frequencies is callcd a
cluster. lf a cluster is replicated M times within the system, the totnl number of duplex
channels, C, can be used as a measure of capacity and is given by
C=MkN=MS
As seen from the above equation, the capacity of a cellular system is directly proportional to
the number of times a clustcr is replicated in a fixed service area. The factor N is callcd the
cluster size and is typically equal to 4, 7 , 12, 19 etc.If the cluster size N is reduced rvhile the
cell size is kept constant, more clusters are required to cover a given area and hence a more
capacity (a larger value of Q is achieved. A large cluster size indicates that the latio between
the cell radius and the distance between co-channels D is small. Converscly, a snlall clustel
size indicates that co-channel cells are located much closer together, thereby incteases the cochannel interference. From a design viewpoint, the smallest possible value ofly' is desirable in
order to maximize capacity over a given coverage area (i e., to maximize Q The frequency
rertse factor is given by l/N , since each cell within a cluster may only lrse up to l/N of the
total available radio channels in the system.
In order to connect the cells without gaps between adjacent cells - the geometry of hexagons
is such that the number of cells per cluster, N, can only has values, which satisfy the
follorving equation
N =i, +ij + j,
u,here / and j are non-negative integers. To find the nearest co-channel neighbors of a
particular cell, one must do the following:
I
/)
Prcpared by
(r)
(ii)
J:lrn
t16
Preparcd
by
Prof
Ild
Srrfur Rahman
Jixcd chunnel assignntc t stt'(ucg)', each cell is allocated a predefined set of yoice
channels. Any call attempt rvithin the cell cln only be sen'ed by unused channels in that
particular cell. If the all the channels in that cell are occupied, the call is blocked and the
subscriber does not receive any service. Several variations of the fixed assignment strategy
exist. In one approach, called borror.ving strategy, a cell is allowed to borrorv channels from a
neighboring cell if all its orvn channels are already occupied. The N{SC supewises such
borrorving procedures and ensures that the borrowing of a channel does not disrupt or
interfere rvith any of the calls in progress in the donor cell.
In
the
In a dl,namic channel assignment strategy, voice channels are not allocated to different cells
pemlanently. Instead, each time a call request is made, the serving base station requests a
channel from the MSC. The l'4SC then allocates a channel to the requested cell following an
algorithm that takes into account likelihood of future blocking within the cell, the frequency
of use of the candidate channel, the reuse distance, and other cost fr:nctions. Accordingly, the
MSC only allocates a given frequency if it is not in use in the cell or any other cells, rvhich
Ltl
f'rcparccl
by
,.,*"l
,.r.t.
vi
il
,L the carrier separation is 200kHz and 8 time slots are used per camer.
99*?O= Eoo
eotiS;99
Transmission Rate
In GSM 900, the frequency that is used to transfer the information over the air interface is
around 900 MHz. Since this is not the frequency at which the infomration is generated Since
this is not the frequency at rvhich the information is gencrated, nodulation tcchniques arc
used to translate the information into the usable frequency band. Frequency translation is
implemented by modulating the carrier wave in accordance with the lvavefoml of thc input
signal (e.g. speech).
The modulation technique used in GSM is Gaussian Minimum Shift Keying (GMSK).
GMSK enables the transmission of 270 kbits/s within a 200 kHz channel.
Access Method: Time Division Multiple Access
(TDMA)'
Most digital cellular systems use the technique of Time Division Multiple Access (TDMA) to
transmit and receive speech signals. With TDMA, one canier is used to cany a nunrbcr of
cells, each cell using that carrier at designated periods in time. These periods of time are
referred to as time slots. Each MS on a ca'll is assigned one time s'lot on the uplink frequency
and one on the downlink frequency. The information sent during one time slot is called a
burst,
In GSM. a TDMA frame consists of 8 time slots. This means that a GSM radio carrier can
carrv 8 calls.
I'rcparcd by
Figure: TDMA
: TDMA
/ FDMA / FDD
fu
fd
B
N
N"
= t74
= 8 (Full Rate) , l6 (Half Rate)
=200 KHz
Tf
= 4.6 ms
= 40ms
GSMK 4149K
RPE - LTE convolutional
13 kb/s (full rate)
Bit Rate
Associated control ch
Extra
Hand of scheme
Mobile assorted
0.8 w, 2.5 w, 8w
MS power level
960
.)
Frame
(Dnlink)
935
I
4.6 ms = T1
t79
0.5 75
l)repafcd
Ilundu.idth
MHz
b)
=25 MIlz
:25 Ml.lz
25000
chrnnel
-lr=STr 4.6
g rs=0.575 ms
2.
3,
4.
5.
6.
7.
8.
IMSI Attach
Location Updating: Tlpe IMSI Attach
Changing Cells within an LA
Location Updating: Within the same MSC/VLR
l.ocation Updating: With a ncw MSC,^/LR
Location Updating: Type Periodic Registration
IMSI detach
Implicit detach
Prepared by
t
2
il:"YT:las
the
il"r[::,#-
,r/,
.//
" /,/V
If
If
MS,
;;;ih;
vLR
updates the
LAI of the
Jlln
MS
sends. the
l8l
l,rcprrcJ b)
- l'rol irltl
SJrlirr llJhnlrrr
l.TheMSlistenstothecontrolchannelinthenewcelltodeterminetheLAl.Thenerv
LAI is compared to the old one lf they differ, a location update is necessary'
2. The MS establishes a connection with the network and authentication of the
subscriber and MS is Performed'
3. lf
Request to the
authentication ts successful, the MS sends a Location Upfdating
system.
t ,"/
s
Figure: Location Updating: With a new lvlSC/VLR
1.
2.
:.
4.
f'r'cpared by
- i'rof \ld
Sartut Rrhnran
If the nenvork uses periodic registration, the MS will be informed, on the control channel of
lrorv oftcn periodic registration must be performed. Periodic registration has an
rcknorvlcdgcment mcssilgc. The MS trics to register until it receives this message.
IlvlSl detach enabies the MS to indicate to the netrvork that it is switched oft'. At porver off,
the MS sends an IMSI detach message to the nefwork. On reception, the VLR nrarks the
corresponding IMSI as detached. The HLR is not informed. No acknowledgement is sent
to the NIS.
Implicit Detach
If the MS sends an IMSI detach message to the System and the radio Link quality is poor, the
system nlight not be able to decode the information. Because no acknowledgement is sent to
the MS, no further attempt is made. In this case, the system stili regards the MS as anached.
lf periodic registration is in usc, the systcm rvill soon dctctlrinc llat thc NIS is dctlchcd. 'l hc
VLII then pcrforms an inrplicit dctach, rnarking tlrc MS as dctachcd.
Traffic
Cases:
An MS is in activc mode rvhen there is a call (speech, fax or data). or a call setup procedure
takins Dlace.
Figure: Cascs rvhich activate an N'lS and cascs when NIS is in active mode.
'fhis scction describcs wltat happens when a mobile subscriber wants to set up a voice call to
a sLrbscriber in the l'S'fN.
183
Prcpared by
1.ra
.;
\s,i
,/
,4/
ts
Figure: Call set-up MS to PSTN
.
.
o
2. The MSC/VLR instructs the BSC/TRC to allocate idle time siot on a TDMA frame in the
cell. The RBS and MS are told to tune this time slot.
3. '1 hc MSc/Vl-R {brwartls thc B-nunrber ro an exchange in rhc Fs't'N, which catobtishca
r
connectlon to the subscriber.
4.
If
Belorv is the description of the call sefup procedure for a call from a pSTN subscriber to a
mobile subscriber. A call from an MS to a mobile subscriber operates according to the same
process, the only difference being that the GMSC is contacted by another MSC/VLR instead
ofby a PSTN node.
/7
T
fl
ti
fl.1
8o
'\.
\ \\ {[
I 84
Pfcpared by
5.
The BSCs distribute the paging message to the RBSs in the desired LA. The SRBSs
transmit the message over the air.
6. When the MS detects the paging message, it responds and call sefup procedures are
executed. A time slot is allocated and tuned to.
7. The mobile phone rings. If the subscriber answers, the connection is eslablished.
Handover
The process of changing cells during a call is called handover. To choose the best tareet cell.
measurements are performed by the MS and the RBS.
Locatirrg
An MS continuously measures signal strength and quality on its own cell and siglal strength
on the control channel carries of the neighboring cells. The measurements are canietl on the
downlink while MS is in active mode. The measurement results are sent to the BSC at recular
intervals. The scrving RBS rneasures signal strcngth and quality on the uplink
RBS measums:
Signalslrngu and
transmlsslon qualitY
onTCH. uDllnk
S*
MS measurcst
Slgnalslronglh and
Signal str.nglh
transmisslon quaritY
onTCH.downlink
8TS
Based on these measurements, the BSC decides if a handover is necessary and to which cell.
This is called locating. As soon as a neighboring cell is considered to be bener than the
o
o
r
l'rcparcd by
If
I,4as,
finished.
"b_=
Figure: Handover: Cells controlled by the same BSC.
1.
2.
3.
4.
Handover between Cells Controlled by Different BSCs but the Same NISC/VLR
When another BSC is involved in a handover, the MSC/VLR must also be involved to
establish the connection between the two BSCs. Otherwise, the handover process is identical
to the nrevious handover traffic case.
Preparcd bv
Prof.
TheoldMSC,MSC-A,retainsmaincontrolofthecalluntilt|recalllscleartd.Thisis
b".uu,.itcontainstheinformationaboutthesubscriberandcalldetailsSuchaScharging'
never belongs to
After call release, the MS mr'rst perform location updating because an LA
by the VLR-B' and rvill in tum
more than one MSC/VLR service area The HLR is updated
tcll VLR A io delete all infornation about the mobile subscriber'
oneoftheprimaryfeaturcsofGsMisthcabilitytoperfonlllrrtcmationalroantittgandto
rvhilc
to bc ablc to makc calls
handle lntemational call cases. ln ordcr for a mobiic subscribcr
subscriber's
io".ing in a different GSM network, there must be an agreement between the
operator'
home network operator and the visited nenvork
1.
"
netrvork.
187
PreparcJ by
Prof.
Ild
Sarfur Rahnran
l. Il thr": MS docs not fincr a permittc<J nctwork, but rras idcntified a forbiddcn nctwork, il
4.
If thc MS finds
a pemrittecr
n"n"o.i, ii
Thc remaindcr of rhis traffic clse is i,icntrcll to thilt of thc rron.al INISI d[]ch casc,
u.'ith thc only differcnce being that thc subscribcr's FILR is locatcd in
anothcr corntry.
Call to an MS
Transmission Problems
\'lany' problcms may occur during the transmission of a radio signal. Sor.c
of thc nrost
conmon problems are describcd bclorv.
P
ath Loss
Path loss occurs r.vhen the received signal beconres r,veaker and rveaker due
to increasing
drstance behveen the I\4s and RTS, even ifthere are no obstacres bet\veen the
transmitter (Txl
and.ccei'ing (Rr) antcnna. The path loss problem serdom leads to a dropped car because
belbrc the problem becomes exlreme, a nerv transnrission path is estabrished via another
BTS,
l.
Shadowing
Shador.ving occurs rvhen there are physical obstacles including hiils and buildings betrveen
the BTS and the MS. The obstacles create a shadowing efibct rvhich can decrease the
recei'ed signal strength. when the MS moves, the signal strength fluctuates depending on the
dips.
Figurc: Shadorving
188
i\jd
Sir
r Rrhman
2. iVlulti-path Fading
fading
and
Rayleigh Fading
This occurs when a signal takes more than one path between
the MS and BTS antennas. In
is not received on a line or rigrtt puth iirectty fronr the Tx
a.tennd.
Ilather, it is reflected off buirdings, for exampre, ina'is .ec.ru.i
rron., ."u.rot Jrii"r.ii
indirect paths. Rayleigh rading occurs when the obsiacres
are crose to the receivins
antenna.
Time Dispersion
iliH
A\
"' -!*
Tr.
A''
A
m
-q
\
189
_!\
If the reflected signal arrives one bit time after the direct signal, then the receiver detects a I
from the rcflected wave at the same time it detects a 0 from the direct rlave Thc slmbol I
interferes rvith the symbol 0 and the MS does not knorv lvhich one is corrcct
3. Time
Alignmcnt
Each MS on a call is allocated a time slot on a TDMA fiame/ This is an amount of time
during which the MS transmits information to the BTS. The information must also arrive rt
rhe BTS rvithin tirat time slot. The time alignment problem occurs when parl of the
informatiorr transmitted by an MS does not arrive within the allocated time slot. Instead, that
part may arrive during the next time slot, and may interfere with information from another
lvlS using that other time slot.
,b
Time alignnent is caused by a large distance befween the MS and the BTS, Effectively, the
signal cannot travel over the large distance within thc given time
TDMA-framc
TS0
i rsl I
Ts2
B, Far away
from BTS
NN
B.WZ
A
E'IJ
A, Close to BTS
For example, an MS is close to a BTS and has been allocated time slot 3 (TS 3). During the
call, the MS moves away from the BTS causing the information sent flom the BTS to arrive
ar the lvIS later and later. The answet ftom the MS also arrives later at the BTS. If nothing is
done, the delay becomes so Iong that the transmission from the MS in time slot 3 overlaps
rr ith the information, which the BTS receives in time slot 4.
The signal strength as a global mean value decreases with the distance (path loss) and finally
results in a lost connection. Around this global mean, slow variations are plesent due to
shaclorvinq effects and fast variations are present due to Rayleigh fading
19t)
Prcpxrcd by
R.rhnran
=
.9
log (dislance)
Channel Coding
All
ln digital transmission, the quality ofthe transmitted signal is often expressed in terms
ofhorv
many of the received bits are incorrect. This is called Bit Error Rate (BER). BER defines
the
percentage ofthe total number ofreceived bits which are incorrectly detected.
bits
bits
Errors
Transmitted
Received
I I 01000I 10
I 00I 00I0I0
1
11
This percentage should be as low as possible, It is not possible to reduce the percentage to
zero because the transmission path is constantly changing. This means that thcre must be an
for a certain amount of errors and at the same time an ability to restore the
information, or at least detect errors so the incorrect information bits are not intemreted as
conect. This is especially important during transmission ofdatal rs opposed to speech, for
rvhich a higher BER is acceptable,
allorvance
channel coding is used to detect and co[ect errors in a received bit stream, It adds bits to
a
message. These bits enable a channel decoder to determine whether the message
has faulty
bits, and to potentillly couect the faulty bits.
191
I'rcpa|cd
by l'fof i\l(l
Srrlirr R.rl\rrlrn
Interleaving
In realit-v. bit errors often occur in sequence, as caused by long fading dips affecting several
consecutjle bits. Channel coding is most effective in detecting and correcting single errors
and short error sequences. It is not suitable for handling longer sequences ofbit errors.
For this reason, a process called interleaving is used o separate consecutive bits of a message
so rhrt these rre tr]nsmitted in a non-consccrrlire ury.
For example, a message block may consist of four bits (1234). If four message blocks must
be transmitted, and is lost in transmission, without interleaving there is a 25% BER overall,
but a 100% BER for that lost message block. It is not possible to recover an)'thing from the
lost block.
1
3 4
message blocks
iltedeaving
x$l
all 3 3
591
3 J
Inlerleaved
message blocks
Figurc: Intcrlcirvlng
If
interleaving is used, as shown in the above figure, thc bits of each block may be sent in a
non-consecutive manner. If one block is lost in transmission, again there is a 25% BER
overall. However, this time 25% is spread over the entire set of message blocks, giving a 259i'
BER for each. This is more rnanageable and there is a greater possibility that thc crrors cln be
conected by a channel decoder.
1
3 4
X 3 4
.\daptive Equalization
Adaptive equalization is a solution specifically designed to counteract the problem of time
dispersion. it works as follows:
L
2.
l.
the BTS. Horvever, due to the problems over the radio path, some bits may
be
distorlcd.
Thc BTS rcceives the transmission from the MS and examines the training sequence
u,rthin it. The BTS conpares the received training sequence rvith the training
sequence rvhich it had instructed the MS to use. If there are differences betleen the
192
Prepared by
4.
two, ir' can be assumed that the problems in the radio path affected these bits must
have had a similar affect on the non-training sequence biis.
The BTS begins a process in which it uses its knowledge of what happened
to the
training sequence to corect the other bits of the hansmission.
Because some assumptions are made about the radio path, adaptive cquarization
may not
result in a l00o/o perfect solution every time. However, "good enough" result rvill
be achie'ed
Frequency Hopping
It is possible for the BTS and MS to hop from frequency to frequency during a call. This
may
a void some Rayleigh fading.
rOMA
lr.rc F
Timing Advance
is a solution specifically designed to counteract the problem of time
alignment. It works by instructing the misaligned MS to transmit its burst earlier than it
normally would.
Timing advance
*ii.,
F-'|il1E;Ll
T
t
f ;i; l;i{lJT;f,:l
's.
\$
I
ff
A
Figure: Timing Advance
193
Appendix:
\
joql
9=?, (fu\
\a
ofdirect raY
Received power, Pr = pt
2
t-fl
., o, 1t+a"^ jlf
l2
4\
= phase difference between the direct ray and ground reflected ray.
1=
wavelength of carrier.
I
h:
_t_
I
I
_L
hr
f
h,
L
D
1*A.e
Prepared b]"
_L
h,
Tl.
n2
Received Power
Pr = Pt
( 1^
lr a".j0, -jA0 l,
d )' I
4\
Pt = Transmitted power
f=
)\
= wavelength
a complex reflcction
cocfficicnt.
A0 = Phase difference caused by path difference Ad berween direct wave and the
reflected wave
=p^d=t^d
Complex reflection coefficient can be represented as
;n
"
ilt'"-;*'qiD
Wt,
(A)
V9:
,0
Dl
Pr
5= -l , {, = 0
),
With effective antenna height of fr{ = nr +Hr and h{ = h: + H:, Ad can be found as
195
Prepared by
^d
=\(mr;4F
Since d>> h( r,
d>t
Ad-
n
u
,1.(
Ilrhz
----;'>-
h/z
.,./ .1.,
z /
(h'r+ h'z)'
(hi,,*
,
- _' h';)t
tr-r
217-
,t- r../ ./
rr
andAd=+Ad-r/rrr-r
'^d,\.
,o-*
'
Pr = Ps (2-2 cos A g)
Condition-l
Condition-2
Condition-3
Pr < po Then
lg<f
(2-2cosA{) <lor,
I .AA.}
- to - Mobile Transmission
over water
_F
;l
ul
h2
H2
_]There are always two equal strength reflected waves one from
the water surface and
one from the proximity ofthe mobile unit in addition to the direct
wave .
The total received power
196
Prepared by
Pr
I l-
(4)'
Dl
tar{ 1,
cos A$2
(AOr):
AOr , sin
cos (A0r)
sin
r'-
Then
Sarfur Rahnrar
-"ja0z l,
+jAOr
- prof Md
difference between
direct rav and the
^J:::nffath
i(
(Ag2):6g,
Pi
"=ll;
= po
-l
-j
( Aor
+^oz)i'z
-4-
(44),
AQ1
+ A0: < I
or
n.=roftb;,
Which provides a path
loss of40 dB/dec.
Problem
l:
Eansmitter power is
l w and ou)elved
of lmire(r.6km)
as at a distance
fansmifte and r(
1.6 dB. (b) what is path
,o.. ,n dB ? (c) what i, tr,"
t *..i.,;on:11il:".T"
2 : What is the coverage
t"'^ ""
froblem
197
Prcparccl by
if it were
- Prof
lr4rl.
Siltfur R.rhnrln
Appendix B
Why 800-MHz
spectrum is allotted?
.
r
.'
.
o
o
.
8.00
Multipath fading
Rain, storm etc.
:B:ed
198
Prep;rrcd b1
- Prof Nld
Slrfur Rahmln
third ty,pe of multiple access scheme is code division multiple access, rvhere each user
employs a parricular code address to spreacl the carrier bendb'idth over a much larger
bandrvidth so that the earth station community can transmit simultaneously without fre,rue;cv
or timc separation and with lorv interference. Before going to describc the operation of a
GDMA system into greater detail, we should first discuss about the spreacl sDcctrunl
technique.
Apart from occupying a very large bandu,idth, spread spectrum signals are pseudorandom
and han,e noise-like properties rvhen cornpared rvith the digital information data. The
sprcailing
is controlled by a pseudo-noise (PN) sequence or pseudo-noise code,
rvhich is a''avcfonn
binary scquence that appears random but can be reproduced in a detcrministic
manner by intended receivers. Spread spectrum signals are clcmodr.rlatcd at tlle receiver
through cross-correlation rvith a locally-gencrated version of the pseudorandom carrier.
cross-correlation with the correct PN sequence despreads the spread spectnlm signal and
restores the modulated message in the same nanow band as the odginal data, rvhereas crossconelating the signal from an undesired user results in a very small amount of lide band
noise at the receiver output.
Spread Spectrum: Spread spectrum is a means of transmission in rvhich the signal occupies
of the minimum necessary to send the information; the band spread is
accomplished by means of a code that is independent of the data, and a synchronized
reception r.vith the code at the receiver is used for dispreading and subsequent data recovery.
a band*'idth in excess
o
r
Dircct Sequence Spread Spectmm @S-SS): A direct sequence spread spectmm (DS-SS)
systcrr spreads the baseband data by directly multiplying the baseband data pulses rvith a
too
Pfcnrrc'd b)
- l,rol.
i;il;fi;::i"h_*
ir.ld.
Sailirr Rahnrn
"tl:i:::ii,::Ji
Transm ined
S
ignal
Tle received
l2E
where m(t1
*uu.for*i, uii.,
;i :::51'^:iT,;ffi,lii:i,i
il,;;;;";j,;;;;;i
i,
is the
bandwidth of s"(t) and B is the bandrvidth
oi--o
modulated signal
n(t)cos(znfcr), the spreading due to p(t) gives B* >>
"tn"u"n,,onalry
-8.
Spectral
Density
Dens
Frequency
ity
Frequency
(a)
(b)
200
I
Prcparcd br
- prof Md
Sarfrrr Rahmar
Figure : Spectra of
desircd recer
wilh interlercnce: (a)
wideband firrer ouput
lis"l
rul .,"I"to,,
and
outpui."ft;;il;::"J,i?
"Jll9
h,c _^-, ^r .,
pa
b i J i ry
i,
PG
*,r1::F:.*rrocess
=:=x. = 8,,
l;"
o11,".
'',,,
fr:l:"x? J:3fl.*,:x.aH
xn*".uffi *'*t*#*u'::l,;*m$+;.f
*"..1
,""rrI
Figure
F.ach
Stot
Stor 2
Slor 3
chrnnel is defined
AS
,,'; ;
.x
il;;
iilglto[]:,cJ
F, f
fr
-un#tr.,r,"^
[i
il;l
using conventional
nano[,band
$,.$#*;ffi **ffi#**g-.;3ffi *
201
Prcpared by
Itlodu lator
Figure : Block diagram of frequency hopping (FH) system with single channer
modulalion.
(DS_SS) Technique
Traditional rvays of separating signals in time (i.e. tirne division murtiple acccss,
TDMA). or
in frequency (i.e. frequency division multiple access, FDMA) are rcratively simpre u.a1s
of
making sure that the signals are orthogonal and noninterfering.
Hou'ever, in cDMA different users occupy the same bandrvidth at
the same time, but are
scparated from each other via the use of a set of orthogonar waveforms,
sequences, ;,
Here' at first, rve summarize the properties of the set oi orthogonar codes
to !e used in DS-SS
.;d.,
multiple access:
Note;
**
and
R,r(0)
where
are orthogonal
: xry =lLtt
xiyl
onhogonal:
x,
=1_t _t
y1
=;-t tt-t1
11
202
-,1
Prcpared
b)'-
)+(-lXl
)+( l
Xl)+(lX- l)=0
The dot product is defined as a scalar obtained by multiplying the sequence by itself and
summing the individual terms; that is, the dot product of the code x is
R*(q=xrx=ti=t
xi xi
The two orthogonal codes in the previous example also satisi/ the second and the third
conditions. Both x and y have an equal number of ls and -ls and the scaled dot products are
xr x)t 4 =
(yr y)t 4=
Operating principle of a DS-SS CDMA Multiple Access Scheme: The follou'ing Figure
illustrates the principle of DS-SS multiple access scheme. Although these systems are often
used for digital communication, we have shown their continuous-time equivalent in order to
illustrate operating principles. We show two users simultaneouslv transmitting two separate
mcssages, m1(t) and m2(t), in the same frequency band at the same time
m,(t)c,(r)
r)
m,(r) cr(r)
Transminers
Channel
Receive r
Figure : An exanple showing thc operating principle of DS-SS multiplc access. Two users are sending two
scparate messages, m r(t) and mr(t), simultaneously through the same channel in the same frequency band and at
the same time. Through the use oforthogonal codes c1(t) and c1(t), the receiver rccovers the two messages
perfectly.
o
o
.
The two users are separated from each other via the multiplication of orthogonal
codes c1(t) and c2(t), which are the continuous-time versions of the t$'o orthogonal
codes x and y mentioned previously.
Messages m1(t) is multiplied by the code c1(t), and messaBe mz(t) is multiplied by the
code c2(t).
The resulting products are added together by the adder and transmitted through the
channel. In this case, we assume perfect synchronization of the codes at the receiver.
If there are negligible enors over the channel, the recovered messages ml(t) and mr(t)
will match the original messages m1(t) and mdt) perfectly.
203
Preparcd by
the
The next Figure shows the waveforms and spectra fol the two messages ml(t) and nlz(0,
trvo orthogo-nal codes cl(t) and c2(t), and the two spread messages m1(t)c1(t) and mdt)clt)'
It should be noted here that the bandwidth of a random digital waveform is limited to l/T,
where T is the bit interval of the random digital waveform. we further make the distinction
chip
betrveen Tr and T", where Tb is the bit interval (in seconds) of the message and T" is the
interval ofthe running orthogonal code.
rate
ln this example, the chip rate (1/T") of the orthogonal code is running at four tines the bit
(l/T6). Therifore, we have an effictive bandwidth expansion factor of four. Thc bandrvidth
i*p#rion factor is sometimes called the processing gain-or (W/R), where W is the final
Note that
bandwidth of the spread message and R is the bandwidth of the baseband message
processing gain
in this example, w is equivaleit to (l/T"), R is equivalent to (l/Tr), and the
(WR) is 4, or 6 dB. (Note that Tu=4Tc i.e., T6/T"=4)
Note that after spreading by the orthogonal codes, the spread messages mr(t)cr(t) and
m:(t)c:(t) now occupy a larger bandwidth than the original messages
l)rcprrcd
n,\!)
M,(t)
c,(t)
i l
tdt-
T.
m,(r)c,(1)
M\(tlc,(t)
m.(l)
M,(fYC,U)
1tT,
1/7,
an;mr0)c:(t).
:::.#.
205
Prcpared
Sarlirr Rahmrn
Figure : Time waveforrns and frequency spectra for the signals at different points of the
receiver.
The follorving Figure shows the signals at Cr and C2, the outputs ml and m2 of the decision
thresholds, and the recovered messages ml(t) and m2(t).
The integrator adds up the signal power over one bit interval T6 of the baseband message' and
the deciiion threshold decides, based on the output of the integator, whether or not the
particular bit is a +1 or-l.Ifthe output ofthe integrator is. greate! than 0, then the decision is
a +t; if the integrator output is less than 0, then the decision is a -1. The digital-to-analog
(D/A) converter iransforms the decision into the recovered waveforms ml(t) and mr(t)'
As one can see in this idealized example, the recovered messages m1(t) and m2(t) match
perfectly the original baseband messages ml(t) and m2(t).
Problems of CDMA
DS-SS
The example presented in the previous section only serves to illustlate the principle of
multiple access. We have just demonstrated that, using DS-Ss techniques' separate messages
and lhe
can be sent through the same channel in the same ftequency band at the same time'
world
real
are many
messages can be iuccessfully recoverecl at the receiver' However, there
phenotena, especially in a mobile communications environment, that degradc the
performance of such a DS-ss multiple access system. Thre ale two problcms: thc ear-far
problem, and the partial correlation problem
206
Prcparcd by
ml
+l
n,(t)
lrt,o
Figure : Tirne wavefofins at the output of the integrators and decision threshold.
ln mobile communications, each user is geographically dispersed but transmitting in the same
frequency spectrum using DS-sS. Some users are closer to thc base station thln others.
Thc
result is that powers received from those users that are close by are higher than powers
received from users that are farther away. Because all users are fansmitting in the saml
band,
the higher received powers from users nearby constitute an interference that desrades the
general performance of the system. In order to combat this near-far phenomenin, power
control is utilized to make sure that the powers received at the base statlon are the same for
all users ln the earlier example, we have assumed perfect power control by specifying that
mr(t)cr(t) and m2(t)cdt) both have the same amplitudes (i.e. ranging fiom +l to _l). ' The second problem is pdrt.al correlatiort. The problem comes rvhen there is no anemDt to
synchronize the transmitters sharing the same band. Even rvhen the rransmitters are
synchronized, there is still the problem of propagation delay, rvhich is inherent in a nobile
channel. For example, the trvo codes mentioned previously are orthogonal rvhen they arc
perfectly aligned:
-l
-1
-1
+l
+1 +l
+t -l
-1
-1
-l
+l
,fl
+l
+1
_1
201
I'rt-p.rrcd
Ilorvcvcr,
if yi suffcrs a dclay of
br
Prof irl,l
rrfur P.rhtnrn
of
f ,.t
-t
+l
-l +l
+1 -1
+l
-1
-1
+i
-l
+l
+1
-1
+i
-l
verify that these two sequences ale no longer orthogonal. If the codes are
not orthogonal due to synchronization or channel impairment, then multiple access messages
in the same band can no longer be separated fiom one another via code orthogonality. The
fssults are conelation crosstalk and mutual interference. ln essence, an additional condition
Readers can easily
is'
=0
x(t)IQ+r-T)dt-0
Therefore, simple orthogonality between trvo aligrred codes is not enough the above trvo
partial correlations must also be zero, or at least small, for any valLIe of r Iikelr encotlntered
in the s),stem.
Applications of DS-SS in Mobilc c.ommunication: Despite its difficulties, rvhich are easill'
solved rvith optimized systen design, CDMA does have its adlantages lvhen applied to
mobile communications.
First of all, a GDMA system can readily take advantage of the 'lorce oclil,i4' of nonlll
human spccch. In a twr-r-pcrson convcrslticrn, clch spcakcr is activq lcss than lrllf of thc tintc
During the quiet pcriod, the transmitiels could effectively turn off and reducc interfcrence
po*"iint odu""d into the channel. This reduction in interference can translale into crpllcil)
gain for the system.
The second advantage is that in CDMA, the physical RF channel can be reused in everl'cell.
thus giving a freqrtency reuse factor ofclose to 1. Therc is no necd to frequenncy plan in
CDMA, which may be one of the welcoming benefits for RF design engineers
208
rlkc
rt'ccir crs'