Mob Comp
Mob Comp
Malande
2G Cellular Systems
Second-generation (2G) digital cellular systems constitute the majority of cellular
communication infrastructures deployed today. 2G systems such as GSM, whose rollout started
in 1987, signaled a major shift in the way mobile communications is used worldwide. In part
they helped fuel the transition of a mobile phone from luxury to necessity and helped to drive
subscriber costs down by more efficient utilization of air interface and volume deployment of
infrastructure components and handsets.
Major geographical regions adopted different 2G systems, namely TDMA and CDMA in North
America, GSM in Europe, and Personal Digital Cellular (PDC) in Japan. Figure 3.3 depicts the
worldwide subscriber numbers for major 2G cellular systems. It effectively shows how the GSM
system has been successful and why it is now being adopted in geographical areas other than
Europe (such as North America, China, the Asia-Pacific region, and more recently, South
America). CDMA, which originated in North America, has also proliferated in South America
and later in the Asia-Pacific region. TDMA remains to be widely deployed in North and South
America regions, but it is expected to decline mostly because of the decisions taken by few
major North American carriers to convert their TDMA networks to GSM.
This second-generation system, widely deployed in the United States, Canada, and South
America, goes by many names, including North American TDMA, IS-136, and D-AMPS
(Digital AMPS). For the sake of clarity, we will refer to it as North American TDMA, as well as
simply TDMA, when the context makes it clear. TDMA has been used in North America since
1992 and was the first digital technology to be commercially deployed there. As its name
indicates, it is based on Time Division Multiple Access. In TDMA the resources are shared in
time, combined with frequency-division multiplexing (that is, when multiple frequencies are
used). As a result, TDMA offers multiple digital channels using different time slots on a shared
frequency carrier. Each mobile station is assigned both a specific frequency and a time slot
during which it can communicate with the base station, as shown in Figure 3.4.
Figure 3.4: Time Division Multiple Access.
The TDMA transmitter is active during the assigned time slot and inactive during other time slots, which
allows for power-saving terminal designs, among other advantages. North American TDMA supports
three time slots, at 30 kHz each, further divided into three or six channels to maximize air interface
utilization. A sequence of time-division multiplexed time slots in TDMA makes up frames, which are 40
ms long. The TDMA traffic channel total bit rate is 48.6 Kbps. Control overhead and number of users per
channel, which is greater than one, decrease the effective throughput of a channel available for user
traffic to 13 Kbps. TDMA is a dual-band technology, which means it can be deployed in 800-MHz and
1900-MHz frequency bands. In regions where both AMPS and TDMA are deployed, TDMA phones are
often designed to operate in dual mode, analog and digital, in order to offer customers the ability to
utilize coverage of the existing analog infrastructure.
There are still some analog cellular systems in operations in Europe, but their number is
declining, and some regional networks are being completely shut down or converted to Global
System for Mobile Communications. The GSM cellular system initiative was initiated in 1982 by
the Conference of European Posts and Telecommunications Administrations (CEPT) and is
currently governed by European Telecommunications Standards Institute (ETSI), which in turn
has delegated GSM specifications maintenance and evolution to 3GPP (reviewed in part in
Chapter 1). The intent behind GSM introduction was to have a common approach to the creation
of digital systems across European countries, to allow—among other advantages of a common
standard—easy international roaming and better economies of scale by decreasing handset and
infrastructure components costs through mass production. In hindsight, this was a smart political
decision, which contributed to the worldwide success of European cellular infrastructure
providers and equipment manufacturers.
Let's look at some details of the GSM air interface technology. The GSM standard, similarly to
North American TDMA, is based on the use of two simultaneous multiplexing technologies,
TDMA and FDMA. Each radio frequency (RF) channel in GSM supports eight time slots
(compared to three for North American TDMA) grouped into TDMA frames, which are in turn
grouped into multiframes consisting of 26 TDMA frames carrying traffic and control channels.
Multiframes are built into superframes and hyperframes. This yields an 8-to-1 capacity increase
over NMT or TACS in the same RF spectrum. The allocation of the time slots is essentially static
on a short-term basis; for instance, the eighth time slot of a given RF channel is assigned to the
same user each time it comes around, whether or not the user has voice or data to send.
The GSM system, emphasizing not only physical properties but also service definitions (unlike
some 1G systems), supports three major types of services: bearer services, tele-services, and
supplementary services. GSM bearer services allow for transparent or acknowledged user data
transfer and define access attributes, information transfer attributes, and general attributes with
specific roles. Access attributes define access channel properties and parameters such as bit rate;
transfer attributes define data transfer mode (bidirectional, unidirectional), information type
(speech or data), and call setup mode; general attributes define network-specific services such as
QoS and internetworking options. Tele-services are what GSM subscribers actually use. They are
based on the foundation provided by bearer services and govern user-to-user communications for
voice or data applications. Examples of tele-services include Group 3 Fax, telephony, Short
Message Service (SMS), and circuit data IP and X.25 communications. GSM supplementary
services provide additional value-added features such as call waiting, call forwarding, call
barring, and conference calling used by wireless operators to further differentiate their offerings.
Further information about GSM can be obtained from a variety of sources such as [Eberspacher
2001].
Wireless carriers can achieve the migration to HSCSD by upgrading GSM Mobile Switching
Center (MSC) and Base Transceiver Station (BTS) software. Wireless carriers also have to
distribute handsets capable of receiving HSCSD transmission or firmware upgrades for the GSM
mobiles based on Personal Computer Memory Card International Association (PCMCIA) and
CompactFlash (CF) cards (such as those produced by Nokia). HSCSD can be supported within
the existing GSM mobility management infrastructure, which also enables roaming and other
familiar GSM services at higher data rates.
cdmaOne
Code Division Multiple Access (CDMA) IS-95—or cdmaOne—is one of the popular 2G
technologies being used in the Americas, Asia, and Eastern Europe. CDMA is based on the
technique in which each subscriber is assigned a unique code, also known as pseudorandom code
that is used by the system to distinguish that user from all other users transmitting
simultaneously in the same frequency band. CDMA belongs to the class of systems called spread
spectrum systems, and more specifically to the Direct Sequence Spread Spectrum (DSSS) family.
Physical channels in CDMA are defined in terms of radio frequency of the carrier and a code—
that is, a sequence of bits. The digital signal resulting from the encoding of voice or data, after
the application of appropriate framing (or radio link layers), is digitally scrambled before it
modulates the carrier frequency. This is accomplished by digitally (base 2) adding the signal to
the pseudorandom code that is used to distinguish the user. The entire carrier spectrum is
available to each single user, hence the name spread spectrum.
The receiver, which has a pseudorandom signal decoder, reproduces the original signal by
demodulating the RF and adding (base 2) the same pseudorandom signal used by the transmitter,
thus obtaining the original signal. CDMA is an interference-limited system, meaning that
anytime a user is not transmitting and thereby not interfering with other users sharing the same
spectrum, the effective bandwidth, and hence signal-to-noise ratio, available to other users will
increase to some degree. CDMA properties are as follows:
To better visualize the CDMA concept, imagine a room filled with pairs of people talking to
each other, each couple in their own language. They would only be able to understand their
counterparts but not the rest of the conversations in the room. As the number of pairs with unique
language increases, the noise level will reach its maximum, after which no conversations will be
possible (not unlike in some trendy restaurants and pubs).
The CDMA cellular technology also comes with soft handoff capability— that is, the system
specifies a receiver (RAKE receiver) capable of receiving up to three signals related to the same
channel, because of multipath effects or to multiple sources transmitting the same signal. The
system allows the mobile station to send and receive simultaneously with three base stations,
which are defined as belonging to the "active set" of base stations. This allows for the avoidance
of handoff Ping-Pong effects and also allows for improved performance against multipath or
adverse radio conditions.
CDMA was originally deployed under the commercial name cdmaOne based on TIA [IS95], a
mobile-to-base-station compatibility standard for wideband spread-spectrum systems. It is a
direct sequence CDMA scheme in which users are differentiated by unique codes known to both
transmitter and receiver. The IS-95A version of the standard allows for circuit-switched data
service up to 14.4 Kbps. The next generation of IS-95, called IS-95B, requires software and
hardware change in CDMA system elements and mobile stations but will support packet data at a
sustained bit rate of 64 to 115 Kbps. This is achieved mostly through the use of advanced
channel and code aggregation techniques and other modifications to IS-95A. In IS-95B, up to
eight CDMA traffic channels can be aggregated for use by a single subscriber—not unlike
HSCSD used in GSM.
2013MIT002
PIMPLE MANDAKINI H.
Department of Information Technology
SGGSIE&T
The main function of the mobile switching center is to manage and co-ordinate to
setup calls between GSM mobile and PSTN users. The Mobile Switching Centre or
MSC is a sophisticated telephone exchange which provides circuit-switched
calling, mobility management, and GSM services to the mobile phones roaming
within the area that it serves. This means voice, data and faxservices, as well
asSMSand call divert.In the GSM mobile phone system, in contrast with earlier
analogueservices, fax and data information is sent directly digitally encodedto the
MSC. Only at the MSC is this re-coded into an "analogue"signal (although actually
this will almost certainly mean soundencoded digitally asPCMsignal in a 64-kbit/s
timeslot, known as aDS0in America).There are various different names for MSCs
in different contextswhich reflects their complex role in the network, all of these
termsthough could refer to the same MSC, but doing different things atdifferent
times.A Gateway MSC is the MSC that determines which visited MSC
thesubscriber who is being called is currently located. It also interfaceswith
thePublic Switched Telephone Network. All mobile to mobilecalls and PSTN to
mobile calls are routed through a GMSC. The termis only valid in the context of
one call since any MSC may provideboth the gateway function and the Visited
MSC function; however,some manufacturers design dedicated high capacity MSCs
which donot have anyBSSesconnected to them. These MSCs will then bethe
Gateway MSC for many of the calls they handle.The Visited MSC is the MSC
where a customer is currently located.The VLR associated with this MSC will have
the subscriber's data init.The Anchor MSC is the MSC from which ahandoverhas
beeninitiated. The Target MSC is the MSC toward which a Handovershould take
place
1. Define a cell. What is frequency reuse?
Most of you might be familiar with the concept of frequency reuse. We often come across this
term in Mobile Computing. Quite a straightforward and simple concept, but still it requires a
detailed explanation. This is one of the most common terms used in the world of Cellular
Telephony (Wireless Communication). Most cellular systems use frequency reuse scheme to
improve capacity and coverage. Let us understand what exactly a cell mean and how they are
related to frequencies.
In a cellular system, each mobile station (MS) is connected with its base station (BS) via a radio
link. The BS is responsible for sending the calls to and from the MS, which lie in the coverage
area of that BS. The coverage area of a base station or a sector of a base station is known as a
cell. Each BS consists of a number of frequency channels, which serve as a link between the MS
and the BS. Every time, a call propagates through a channel which is currently idle and receiving
the best signal. As the coverage area of a BS can be termed as a cell, we can also say that a cell
uses the frequency channels for call forwarding. These cells are usually of hexagonal shape (this
explanation is certainly not in the scope of our discussion here). The Fig 1-1 shows a typical
structure of a cell.
A PCS (Personal Communication System) is a combination of many such cells. So, a cell may
be surrounded by a large number of adjacent cells. This is shown in Fig 1-2.
Fig 1-2. Cells adjacent to each other (Cluster).
Now, let us look at a more general term used for the above structure- a cluster. A number of cells
are grouped to form a cluster. So, a cluster is a collection of various cells. Now, after
understanding the concepts of cells and cluster, let us move into the actual concept of frequency
reuse.
As we have seen, cells use frequencies. But imagine two or more cells in a single cluster using
the same frequency. Obviously, there is a wide scope of interference. So, it is always a better
option to avoid two cells in a cluster using the same frequencies. That is, inside a cluster, all the
cells must use different frequencies. A 3-cell cluster with all the adjacent cells using different
frequencies (F1, F2 and F3) is shown in Fig 1-3.
But this will definitely lead to a new problem. As the network grows, if every cell in a system
uses different frequencies, the frequency spectrum will be heavily utilized. A large amount of
frequencies will be utilized by these cells. A solution to this problem is the Frequency Reuse. All
the cells in a cluster must still have different frequencies, but these frequencies can be reused by
the cells in other clusters. This is the concept of frequency reuse. That is, if frequencies A, B, C,
D, E, F and G are used by the cells in a 7-cell cluster, these same frequencies A, B, C, D, E, F
and G can be used by the cells in other clusters. See Fig 1-4.
Fig 1-4. Frequency Reuse.
In the above figure, three different clusters are shown with three different colors. Each of the 7
cells in each clusters use different frequencies (A through G). But, the same frequencies (A
through G) are reused by the seven cells of each of the other clusters. Thus, the problems of
interfering frequencies as well as over-utilization of frequencies are overcome using the concept
of frequency reuse.
Que: Mention the basic propagation mechanisms, which impact propagation in mobile
communication.
What are the various types of wireless network topologies?
1.star topologies.
2.mesh topolodies.
1.star topologies……
Fig:star topologies
The devices in a mesh topology can also communicate with other nodes in
the network (point-to-multipoint) using a capability called multi-hopping.
A message can “hop” from node to node to node until it reaches the
assigned gateway. The advantages of mesh over star topology includes a
longer range distance and a decrease in loss of data or transmission
3.Point-to-point—
Bluetooth products (as well as Wi-Fi products in the ad hoc mode) use the point-to-point topology.
These devices connect directly with each other and require no access point or other hub-like device to
communicate with each other, although shared Internet access does require that all computers connect
to a common wireless gateway. The point-to-point topology is much less expensive per unit than a star
topology. It is, however, best suited for temporary data sharing with another device (Bluetooth) and is
csurrently much slower than 100BASE-TX networks.
It can be argued that the current cellular data network still employs circuit–like transport for user
traffic, albeit running on packet transports, through the use of constructs such as APN and GTP.
Future network architecture should be a truly packet network that does not involve semi–
permanent per–service tunnels and heavy reliance on network intelligence. Any protocol or
service that is not proven necessary for the operation of a commercially viable IP network should
have to satisfy a very high threshold for its necessity in order to be included in the basic
architecture.
B. Endpoint–centric protocols
With multiple radio interfaces available on user devices and the reality of many different
generations of radio networks under different administrative control, it should be clear that most
network protocols should be controlled primarily by the endpoint devices, since they have the
most accurate view of their radio connectivity and characteristics of applications and services on
them. The current architecture strives very hard to handle this reality from the network side and
is sometimes failing to meet real needs in terms of scale, cost, performance, and manageability.
An example is the prolonged activity around creating network–based selective IP flow mobility
between cellular and Wi–Fi networks, i.e., Local IP Access and Selected IP Traffic Offload .
With the advent of smartphones, the increased complexity of endpoint devices is a foregone
conclusion. Thus the cellular mobile network should follow the principle that was proven
successful in the Internet: most intelligence should be at the network edges and host devices.
C. Simplicity
The current cellular network architecture employs many protocols that involve four or more
parties and numerous round trips. The initial entry and connection establishment involves a
mobile device, base station, RNC, SGSN, GGSN, and HLR, as described in the standards. In
addition, firewalls, NAPTs, accounting systems, and QoS policy servers are often involved.
There are 10s of roundtrips depending on previous states required to complete this process. It is
doubtful that this is an ideal or unavoidable situation, yet some aspects appear inherent in the
current architecture. Also, the messages carried in these signaling flows are complex, overloaded
and/or nested in multiple layers, so that the correctness of any implementation is doubtful at best.
It also presents a rich target for hacking or DoS attacks. Thus, simplicity of protocols should be
one of the prime objectives of any new protocol design, along with modularity of protocols and
soft–failure under errors.
Most of 3GPPs recent activities, such as latency reduction, local traffic off–loading, flattening
the network architecture, and peak rate improvements, have been in reaction to seemingly
unexpected growth of demands from reality: Web centric content, Smartphones, push
applications, etc. It should be obvious that the basic network architecture standards should be
designed for uncertainty and flexibility , rather than specific service scenarios. Also, considering
the long delays in responding to market demands through the standard–setting process, the basic
standards should be independent of the details of features and services, even if such a separation
sacrifices some of the benefits of tight integration. The use of host–centric protocols is also
consistent with this principle, since new services or features can typically be implemented on
host devices and servers, and should not involve changes deep inside networks.
As mentioned earlier, 3GPP standards rely heavily on hard–state multi–party protocols for most
operations, such as mobility, paging, network entry, sleep/idle modes, and routing. These
protocols often require that three or more parties remain synchronized in their protocol states for
correct operation. Perhaps not surprisingly, these complex protocols are rarely verified for
correctness and race conditions. They fail hard, recover slowly, require large memories and
processing power, and are difficult to interoperate and debug. Most of them could well be
replaced with soft–state, soft–fail protocols with better results.
Each new generation of the cellular air interface has been accompanied by a large overhaul of the
wired core and RAN. That approach appears no longer sustainable for keeping pace with
different rates of innovation in wired networking, mobile computing, and wireless link
technologies. Arguably, innovations and changes in the network and application layers are more
rapid and unpredictable, as evidenced by the rapid rise of the smartphone ecosystem, compared
to wireless link layer evolution that proceeds more slowly and requires industry–wide
coordination. This separation also widens the market for air interface technology beyond cellular
mobile technologies into fixed wireless access, indoor private networks, etc. without being
burdened by the necessary network elements dictated by the current standards. The current tight
integration of standards for the air interface and the wired network should be separated, with
clear interfaces to allow their separate evolution.
What is co-channel interference? What is adjacent channel
intereference?
Co-channel interference or CCI is crosstalk from two different radio transmitters using the
same frequency. There can be several causes of co-channel radio interference; four examples
are listed here.
Cellular Mobile Networks: In cellular mobile communication (GSM & LTE Systems, for
instance), frequency spectrum is a precious resource which is divided into non-overlapping
spectrum bands which are assigned to different cells (In cellular communications, a cell
refers to the hexagonal/circular area around the base station antenna). However, after
certain geographical distance, the frequency bands are re-used, i.e. the same spectrum
bands are re-assigned to other distant cells. The co-channel interference arises in the
cellular mobile networks owing to this phenomenon of Frequency reuse. Thus, besides the
intended signal from within the cell, signals at the same frequencies (co-channel signals)
arrive at the receiver from the undesired transmitters located (far away) in some other cells
and lead to deterioration in receiver performance.
Poor frequency planning: Poor planning of frequencies by broadcasters can cause CCI,
although this is rare. A very localised example is Listowel in the south-west of Ireland.
The 2RN UHF television transmitter systems in Listowel and Knockmoyle (near Tralee) are
on the same frequencies but with opposite polarisation. However in some outskirts of
Listowel town, both transmitters can be picked up causing heavy CCI. This problem forces
residents in these areas to use alternative transmitters to receive RTÉ programming.
Another example is the surrounding area of viewers that can receive mainly Gunung
Ledang transmitter in Malaysia. Examples are TV1 and TV2 from Bukit Tinggi and Bukit
Tampin, who are using both Channel 6 and Channel 9. Moreover, Negeri FM from Bukit
Tampin and Asyik FM from Gunung Ledang, which frequencies are 95.7MHz and 95.6MHz
respectively. TV3 and TV1 from Gunung Ledang and Suria and Channel U from Singapore
also using same frequency, who are using both Channel 12 and Channel 28. That Channel
12 and 28 from Ledang transmits in high TX power, causing interference in most of Johor
area, but viewers are still able to receive TV station from Gunung Pulai (Johor Bahru) well.
This causing difficulty for viewers who watching using analogue TV, and needs to using
alternate transmitter or even using better antenna for better reception, or force them to
subscribe Astro/buying NJOI satellite or Unifi Fibre service. In addition, Minnal FM from
Gunung Kledang, Ipoh which transmits to Central Perak and 988FM from Gunung Ulu Kali
which transmits to Klang Valley and South Perak, which are on 98.9 MHz and 98.8 MHz
respectively. The 98.9MHz can transmits to most of Perak area, causing interference in
most of Perak area, but listeners are still able to tune to Minnal FM on 96.3 MHz from
Gunung Ulu Kali (Klang Valley, South Perak and Tapah) or 107.9 MHz from Maxwell Hill,
Taiping, and 988 on 99.8 MHz from Gunung Kledang, Ipoh.
Overly-crowded radio spectrum: In many populated areas, there just isn't much room in
the radio spectrum. Stations will be jam-packed in, sometimes to the point that one can hear
loud and clear two, three, or more stations on the same frequency, at once. In the USA, the
FCC propagation models used to space stations on the same frequency are not always
accurate in prediction of signals and interference. An example of this situation is in some
parts of Fayetteville, Arkansas the local 99.5 FM KAKS is displaced by KXBL 99.5 FM in
Tulsa, particularly on the west side of significant hills. Another example would be
of Cleveland's WKKY 104.7 having interference from Toledo's WIOT 104.7 FM on
the Ontario shore of Lake Erie, as well as Woodstock's CIHR-FM (on rare occasions), which
is also on 104.7 FM, due to the signals travelling very far across Lake Erie. The interference
to WIOT from the operation of W284BQ, translator, has been resolved by the FCC. Effective
October 18, 2011 it must cease operation.
Daytime vs Nighttime: In the Medium frequency portion of the radio spectrum where
most AM broadcasting is allocated, signals propagate full-time via groundwave and, at
nighttime, via skywave as well. This means that during the nighttime hours, co-channel
interference exists on many AM radio frequencies due to the medium waves reflecting off
the ionosphere and being bounced back down to earth. In the United
States, Canada, Mexico, and the Bahamas, there are international agreements on certain
frequencies which allocate "clear-channel" broadcasting for certain stations to either have
their respective frequencies to themselves at night, or to share their respective frequencies
with other stations located over hundreds or even thousands of miles away. On other
frequencies, there are "Regional Channels" where most stations on these frequencies either
reduce power or change to a directional antenna system at nighttime to help reduce co-
channel interference to each other's signals. In the United States, there are six "Local
Channel" frequencies, also known as "graveyarders" where nearly every station on those
frequencies has the same power and antenna pattern both day and night and, as a result of
skywave propagation, there is normally massive co-channel interference in rural areas on
these frequencies, often making it difficult, if not impossible, to understand what's being said
on the nearest local station on the respective channel, or the other distant stations which
are bouncing on the same channel, during the nighttime hours. Skywave has been used for
long distance AM radio reception since radio's inception and should not be construed as a
negative aspect of AM radio. FCC deregulation allowed many new AM radio stations on the
former clear and regional channel designations; this is the principal cause of overcrowding
on the AM band at night. A new source of interference on the AM broadcast band is the new
digital broadcast system called HD, any AM station that broadcasts HD superimposes digital
"hash" on its adjacent channels. This is especially apparent at night as some stations, for
example WBZ transmits its 30 kHz wide signal for hundreds of miles at night causing
documented interference and covering another station on an adjoining frequency (WYSL
1040) as far as 400 miles away, The FCC refuses to do anything about interference to the
AM band ignoring HD and many other man made causes of interference to AM radio
including many electronic devices. Although there are FCC rules against interference they
routinely ignore them.
Cancellation of signal: In addition, many AM stations, including but not limited to the clear
channel stations, often experience cancellation of their own signals within the inner and
outer fringes of their normal groundwave coverage areas at nighttime due to the stations'
individual skywave signals reaching the listeners' receivers at or near equal strength to the
stations' individual groundwave signals; this phenomenon is very similar to the multipath
interference experienced on FM Radio in the VHF band within mountainous regions and
urban areas due to signals bouncing off of mountains, buildings, and other structures,
except that the groundwave-skywave cancellation occurs almost exclusively at nighttime
when skywave propagation is present.
Adjacent-channel interference (ACI) is interference caused by extraneous power from
a signal in an adjacent channel. ACI may be caused by inadequate filtering (such as incomplete
filtering of unwanted modulation products in FM systems), improper tuning or poor frequency
control (in the reference channel, the interfering channel or both).
Broadcast regulators frequently manage the broadcast spectrum in order to minimize adjacent-
channel interference. For example, in North America, FM radio stations in a single region cannot
be licensed on adjacent frequencies — that is, if a station is licensed on 99.5 MHz in a city, the
frequencies of 99.3 MHz and 99.7 MHz cannot be used anywhere within a certain distance of
that station's transmitter, and the second-adjacent frequencies of 99.1 MHz and 99.9 MHz are
restricted to specialized usages such as low-power stations. Similar restrictions formerly applied
to third-adjacent frequencies as well (i.e. 98.9 MHz and 100.1 MHz in the example above), but
these are no longer observed.
The adjacent-channel interference which receiver A experiences from a transmitter B is the sum
of the power that B emits into A's channel—known as the "unwanted emission", and
represented by the ACLR (Adjacent Channel Leakage Ratio)—and the power that A picks up
from B's channel, which is represented by the ACS (Adjacent Channel Selectivity). B emitting
power into A's channel is called adjacent-channel leakage (unwanted emissions). It occurs
because RF filters require a roll-off, and do not eliminate a signal completely. Therefore, B emits
some power in the adjacent channel which is picked up by A. A receives some emissions from
B's channel due to the roll off of the selectivity filters. Selectivity filters are designed to "select" a
channel.
PHP is a server-side scripting language designed for web development but also used as
a general-purpose programming language. PHP is now installed on more than 244
million websites and 2.1 million web servers.[2] Originally created byRasmus Lerdorf in 1995,
the reference implementation of PHP is now produced by The PHP Group.[3] While PHP
originally stood for Personal Home Page,[4] it now stands for PHP: Hypertext Preprocessor,
a recursive acronym.[5]
PHP code is interpreted by a web server with a PHP processor module, which generates the
resulting web page: PHP commands can be embedded directly into an HTML source document
rather than calling an external file to process data. It has also evolved to include a command-
line interface capability and can be used in standalone graphical applications.[6]
PHP is free software released under the PHP License, which is incompatible with the GNU
General Public License (GPL) due to restrictions on the usage of the term PHP.[7] PHP can be
deployed on most web servers and also as a standaloneshell on almost every operating
system and platform, free of charge.[8]
PHP development began in 1994 when the developer Rasmus Lerdorf wrote a series
of Common Gateway Interface (CGI) Perl scripts, which he used to maintain his personal
homepage. The tools performed tasks such as displaying his résumé and recording his web
traffic.[3][9][10] He rewrote these scripts in C for performance reasons, extending them to add the
ability to work with web forms and to communicate with databases, and called this
implementation "Personal Home Page/Forms Interpreter" or PHP/FI. PHP/FI could be used to
build simple, dynamic web applications. Lerdorf initially announced the release of PHP/FI as
"Personal Home Page Tools (PHP Tools) version 1.0" publicly to accelerate bug location and
improve the code, on the comp.infosystems.www.authoring.cgi Usenet discussion group on
June 8, 1995.[11][12] This release already had the basic functionality that PHP has as of 2013.
This included Perl-like variables, form handling, and the ability to embed HTML.
The syntax resembled that of Perl but was more limited and simpler, although less
consistent.[3] A development team began to form and, after months of work and beta testing,
officially released PHP/FI 2 in November 1997.
Zeev Suraski and Andi Gutmans rewrote the parser in 1997 and formed the base of PHP 3,
changing the language's name to the recursive acronym PHP: Hypertext
[3]
Preprocessor. Afterward, public testing of PHP 3 began, and the official launch came in June
1998. Suraski and Gutmans then started a new rewrite of PHP's core, producing the Zend
Engine in 1999.[13] They also founded Zend Technologies in Ramat Gan, Israel.[3]
On May 22, 2000, PHP 4, powered by the Zend Engine 1.0, was released.[3] As of August 2008
this branch reached version 4.4.9. PHP 4 is no longer under development nor will any security
updates be released.[14][15]
On July 13, 2004, PHP 5 was released, powered by the new Zend Engine II.[3] PHP 5 included
new features such as improved support for object-oriented programming, the PHP Data Objects
(PDO) extension (which defines a lightweight and consistent interface for accessing databases),
and numerous performance enhancements.[16] In 2008 PHP 5 became the only stable version
under development. Late static binding had been missing from PHP and was added in version
5.3.[17][18]
A new major version has been under development alongside PHP 5 for several years. This
version was originally planned to be released as PHP 6 as a result of its significant changes,
which included plans for full Unicode support. However, Unicode support took developers much
longer to implement than originally thought, and the decision was made in March 2010[19] to
move the project to a branch, with features still under development moved to trunk.
Changes in the new code include the removal of register_globals,[20] magic quotes, and safe
mode.[14][21] The reason for the removals was that register_globals had opened security holes by
intentionally allowing runtime data injection, and the use of magic quotes had an unpredictable
nature. Instead, to escape characters, magic quotes may be replaced with
the addslashes() function, or more appropriately an escape mechanism specific to the database
vendor itself like mysql_real_escape_string() for MySQL. Functions that will be removed in
future versions and have been deprecated in PHP 5.3 will produce a warning if used.[22]
Many high-profile open-source projects ceased to support PHP 4 in new code as of February 5,
2008, because of the GoPHP5 initiative,[23] provided by a consortium of PHP developers
promoting the transition from PHP 4 to PHP 5.[24][25]
PHP interpreters are available on both 32-bit and 64-bit operating systems, but on Microsoft
Windows the only official distribution is a 32-bit implementation, requiring Windows 32-bit
compatibility mode while using Internet Information Services (IIS) on a 64-bit Windows platform.
Experimental 64-bit versions of PHP 5.3.0 were briefly available for Microsoft Windows, but
have since been removed.[26]
PHP can preform calculations - PHP can preform all types of calculations. From figuring
outwhat day it is, or what day of the week March 18, 2046 is, to preforming all different types
ofmathematical equations.
PHP can collect user information - By this I mean, you can let your user directly interact with
the script. This can be something really simple, like collecting the temperature from the user that
they want to convert from degrees to another format, or it can be more extensive information,
like adding their information to an address book, or letting them post on a forum.
PHP can interact with MySQL databases - And in doing this, the possibilities are endless. You
canwrite users information to the database and you can retrieve information from the database.
This allows you to create pages on the fly using the contents of the database. You can even do
more complex things like setting up a login system, creating a website search feature, or keep
your store's product catalogue and inventory online.
PHP and GD Library can create graphics - You can use PHP to create simple graphics on the
fly. You can also use it to edit existing graphics. You might want to do this to resize images,
rotate them, or greyscale them. Some practical applications for this are allowing users to edit
their avatars or creating CAPTCHA verifications. You can also create dynamic graphics that are
always changing, my favorite example being dynamic twitter signatures.
This list of what PHP can do could go on for pages and pages, but if you're new to PHP, hopeful
this gives you a taste of the type of things this dynamic language can bring to your website.
Want to learn? Start with the beginners tutorial!
Introduction
Almost all large PHP applications, as well as many small ones, have a notion of user accounts,
and, whether we like it or not, they typically use passwords (or at best passphrases) to
authenticate the users. How do they store the passwords (to authenticate against)? Reasonable
applications don't. Instead, they store password hashes. There have been many short articles,
blog posts, even book chapters that try/claim to show you how to properly compute and use
password hashes. Older ones will tell you to use the md5() function. Newer ones will tell you to
use sha1() or hash() (SHA-256, etc.), add salting (but "forget" to add stretching, which is equally
important), and use mysql_real_escape_string() on the username. Unfortunately, while some of
these recommendations are steps in the right direction (although not all are), none of the articles
on password security in PHP that I saw were "quite it".
Finally, some of the more recent blog posts, forum comments, and the like have started to
recommend phpass, the password/passphrase hashing framework for PHP that I wrote, and
which has already been integrated into many popular "web applications" including phpBB3,
WordPress, and Drupal 7. Obviously, I fully agree with this recommendation. However, I was
not aware of an existing step-by-step guide on integrating phpass into a PHP application, and
password security is not only about password hashing anyway.
In this article/tutorial, I will guide you through the steps needed to introduce proper (in my
opinion at least) user/password management into a new PHP application. I will start by briefly
explaining password/passphrase hashing and how to access the database safely. Then we will
proceed through several revisions of the sample program. We'll start with a very simple PHP
program capable of creating new users only and having some subtle issues. We will gradually
improve this program adding functionality (logging in to existing user accounts, changing user
passwords, and enforcing a password policy) and "discovering" and dealing with the issues.
We will also briefly touch many related topics. Sub-headings have been chosen such that
you may skip or skim over the topics you think you're already familiar with... or better
read those sections anyway. Let's get started.
Password/passphrase hashing
Decent systems/applications do not actually store users' passwords. Instead, they transform
new passwords being set/changed into password hashes with cryptographic (one-way) hash
functions, and they store those hashes. They should preferably use hash functions intended for
password hashing. Direct/naive use of other cryptographic hash functions, such as PHP's
md5(), sha1(), or hash('sha256', ...) for that matter, has dire consequences.
When a user authenticates to the application with a username and a previously-set password,
the application looks up some auxiliary information (such as the hash type, the salt, and the
iteration count - all of which are described below) for the provided username, transforms the
provided password into its hash, and compares this hash against the one stored for the user. If
the two hashes match, authentication succeeds (otherwise it fails).
- "Why bother with password hashing when I use (or don't use) SSL (https URLs) anyway?"
(Surprisingly, this question is really being asked both ways. More often, people would make an
incorrect statement that you don't need password hashing, or don't need to do it right, because
you do or because you don't use SSL.)
- Password hashing, if done right, reduces the risk impact of having the hashes stolen or
leaked - an attacker will recover fewer plaintext passwords from the hashes. Also, the cost of
recovery from an incident like this may be reduced - rather than change all passwords at once,
which may be costly or prohibitive to do, a system's administrator may audit the password
hashes with a tool such as John the Ripper and only have the weak passwords changed. With
proper password hashing and password policy enforcement in place, the majority of the
passwords could be considered "strong enough" and would not need to be changed
immediately even after a known and otherwise-resolved security compromise. The use of SSL
mitigates the risk of having some plaintext passwords captured while in transit. Clearly,
these risks are different. An attacker capable of capturing some of the network traffic is not
necessarily capable of getting a copy of the database, and vice versa. Thus, it makes perfect
sense to use one of these countermeasures - password hashing and SSL - without the other
(which does not address "the other" risk then), and it also makes sense to use both of them
together.
Salting
Salts are likely-unique values that are entered into a password hashing method along with the
password, which results in the same password hashing into completely different hash values
given different salts. Proper use of salts may defeat a number of attacks, including:
Ability to try candidate passwords against multiple hashes at the price of one
Use of pre-hashed lists (or the smarter "rainbow tables") of candidate passwords
Ability to determine whether two users (or two accounts of one user) have the same or
different passwords without actually having to guess one of the passwords
Salts are normally stored along with the hashes. They are not secret.
Stretching
Offline password cracking (given stolen or leaked password hashes) involves computing hashes
of large numbers of candidate passwords. Thus, in order to slow those attacks down, the
computational complexity of a good password hashing method must be high - but of course not
too high as to render it impractical.
Typical cryptographic hash functions not intended for password hashing were designed for
speed. If these are directly misused for password hashing, then offline password cracking
attacks may run at speeds of many million of candidate passwords per second.
These cryptographic hash functions (or even block ciphers) - let's call them "cryptographic
primitives" - may be used as building blocks to construct a decent password hashing method,
which would use thousands or millions of iterations of the underlying cryptographic primitive.
This is called password (or key) stretching (or strengthening). Preferably, the number of
iterations should not be hard-coded, but rather it should be configurable by an administrator for
use when a new password is set (hashed), and it should be getting saved along with the hash
(to allow the administrator to change the iteration count for newly set/changed passwords, yet
not break support for previously-generated password hashes).
- "My web application must be fast. I can't afford to use a slow hash function!"
- Actually, you can. No one said it should be taking an entire second to compute a password
hash. Is 10 milliseconds fast enough for you? Perhaps it is, but if not you can make it 1 ms or
less (which is likely way below other per-request "overhead" that your application incurs
anyway) and still benefit from password stretching a lot. Please note that without any stretching
a cryptographic primitive could be taking as little as some microseconds or even nanoseconds
to compute (at least during an offline attack, which would use an optimal implementation) . If
you go from one microsecond to one millisecond, which is clearly affordable, you make offline
attacks (against stolen or leaked hashes) run 1000 times slower, or you effectively stretch your
users' passwords or passphrases by about 10 bits of entropy each. That's significant - it is
roughly equivalent to each passphrase containing one additional word, without actually adding
that extra word and having the users memorize it. Besides, the password hash is typically only
computed when a user logs in (or when a new user is registered or a password is changed),
which occurs relatively infrequently (compared to the frequency of other requests). Subsequent
requests by the logged in user will use a session ID instead.
The choice of the underlying cryptographic primitive - such as MD5, SHA-1, SHA-256, or even
Blowfish or DES (which are block ciphers, yet they may be used to construct one-way hashes) -
does not matter all that much. It's the higher-level password hashing method, employing
salting and stretching, that makes a difference.
- "I heard that MD5 has been "broken". Shouldn't we use SHA-1 instead?"
- It is true that MD5 has been broken as it relates to certain attacks (practical). SHA-1 has also
been broken in certain other ways (mostly theoretical). However, neither break has anything to
do with the uses of these functions for password hashing, especially not as building blocks in a
higher-level hashing method. Thus, any possible reasons to move off MD5 or SHA-1 as
underlying cryptographic primitives for password hashing "because of the break" are purely
"political" rather than technical. (It may be easier to just phase out MD5 and SHA-1 rather than
differentiate their affected vs. unaffected uses.)
phpass provides an easy to use abstraction layer on top of PHP's cryptographic hash functions
suitable for password hashing. As of this writing, it supports three password hashing methods,
including two via PHP's crypt() function - these are known in PHP as CRYPT_BLOWFISH and
CRYPT_EXT_DES - and one implemented in phpass itself on top of MD5. All three employ
salting, stretching, and variable iteration counts (configurable by an administrator,
encoded/stored along with the hashes).
PHP 5.3.0 and above is guaranteed to support all three of these hashing methods due to
code included into the PHP interpreter itself. Specific builds/installs of older versions of PHP
may or may not support the CRYPT_BLOWFISH and CRYPT_EXT_DES methods - this is
system-specific. For example, the Suhosin PHP security hardening patch, included into many
distributions' packages of PHP, has been adding support for CRYPT_BLOWFISH for years,
many operating systems - such as *BSD's, Solaris 10, SUSE Linux, ALT Linux, and indeed
Openwall GNU/*/Linux - are also providing support for CRYPT_BLOWFISH via the system
libraries (which PHP uses), and some operating systems - *BSD's, Openwall GNU/*/Linux - also
provide support for CRYPT_EXT_DES.
The MD5-based salted and stretched hashing implemented in phpass itself is supported
on all systems - starting with the ancient PHP 3. phpass provides a way for you (the
application developer or administrator) to force the use of these "portable" hashes - this is a
Boolean parameter to the PasswordHash constructor function.
Unless you force the use of "portable" hashes, phpass' preferred hashing method is
CRYPT_BLOWFISH, with a fallback to CRYPT_EXT_DES, and then a final fallback to the
"portable" hashes. CRYPT_BLOWFISH and CRYPT_EXT_DES are preferred primarily for the
efficiency of the underlying implementations (in C and on some systems in assembly),
compared to phpass' own code around MD5 (in PHP, even though the underlying MD5 code is
in C). This greater code efficiency allows for more extensive and thus more effective use of
password stretching (higher iteration counts). (It is assumed that an attacker would have a near-
optimal implementation of any of these hashing methods anyway.)
Besides the actual hashing, phpass transparently generates random salts when a new
password or passphrase is hashed, and it encodes the hash type, the salt, and the
password stretching iteration count into the "hash encoding string" that it returns. When
phpass authenticates a password or passphrase against a stored hash, it similarly
transparently extracts and uses the hash type identifier, the salt, and the iteration count
out of the "hash encoding string". Thus, you do not need to bother with salting and
stretching on your own - phpass takes care of these for you.
SQL injections
In many cases, we will need to pass pieces of untrusted user input into SQL queries. Even with
our trivial database and the initial revision of our user management program (which we'll create
soon), there will be untrusted user input: the username and password (or passphrase), at least
before we've verified them. If we blindly embed the target username string obtained via a
website form into an SQL query string, we might alter the SQL query. Since the username is
under a potential attacker's control, the attacker may be able to alter our SQL query in a way
such that another valid SQL query of the attacker's choice is formed. This may allow not only to
circumvent our program's intended behavior (e.g., have it change another user's password with
that altered query), but also to mount all sorts of attacks on the SQL server, as well as on our
program (such as via query results that would suddenly become fully untrusted input as well).
How to deal with SQL injections
"- Can't we just enclose the user inputs in single quotes when embedding them in an SQL query
string? Wouldn't that do the trick?"
- No. One of the input values can simply close the quotes, braces, etc., do its dirty deed, then
provide additional SQL statements (or whatever) to make the rest of the original query
"complete" (avoiding a syntax error). Thus, this naive approach alone does not work at all.
There are several real ways to combat SQL injections, of varying effectiveness and with
different pros and cons. Most of these can be used together for greater assurance.
Filtering - sanitize the input values rejecting or modifying "bad" ones (preferably using a
whitelist of known-safe input values rather than a blacklist of known-unsafe ones)
Escaping - prefix any special characters (most notably the single quote character) with
an escape character (preferably using the API functions specific to the target SQL server
type)
Encoding - turn any input strings into other strings consisting of safe characters only -
e.g., an application may introduce '%' as its own escape character, then URL-encode all
characters not from a known-safe set (the '%' character has a special meaning in certain
contexts, though, so you might choose another or you might only use this technique
along with escaping)
Prepared statements - rather than form SQL query strings with inputs embedded into
them (in one way or another), an application may use advanced APIs to pass SQL
queries with placeholders to the SQL server and then pass the input values to the SQL
server "separately"
In the sample program that we'll be writing during the rest of this article, we'll use filtering (the
"rejection" kind of it) and prepared statements in such a way that if any one of these
techniques fails to provide its security, the application will nevertheless remain secure.
As of this writing, PHP offers three main interfaces to MySQL: PHP's MySQL Extension
(obsolete, not recommended for new projects - but still widely used), PHP's mysqli (MySQL
Improved) Extension ("preferred" for new projects), and PHP Data Objects (PDO)
(recommended, but not "preferred" for new projects). The last two of these support prepared
statements. Both require PHP 5+. We'll use mysqli.
The separation of code and data achieved with the mysqli PHP extension, the underlying
MySQL APIs that it uses, and the (relatively) new MySQL protocol revision can't be perfect -
everything is sent over the same socket connection anyway - but it does appear to be way
better (simpler, and hence less error-prone) than what could be achieved by escaping.
Specifically, in the MySQL binary protocol, the input values are preceded by binary
representations of their lengths in bytes and then are sent verbatim.
Besides avoiding SQL injections, it makes sense to mitigate any that would potentially occur
anyway, as well as possibly some other attacks carried out against or via the database. To this
end, it is a good idea to have your PHP application use an SQL server account with the
minimum privileges required - not an administrative account and not an account that can also
access another database.
This also helps in case your PHP application is somehow fully compromised, such that the
attacker gains direct access to the database with the application's access privileges, yet you
care not to let this compromise directly "propagate" onto other databases that your application
does not use.
Schema
For our sample program, we'll start with just one table in a brand new MySQL database.
Connect to the MySQL server (such as with the command-line mysql client program) and issue
the following:
(We will need to revise this a little bit to deal with an issue that we'll "discover" further down this
article.)
The user column will hold usernames, and the pass column will hold password hashes.
Currently, phpass produces hash encoding strings that are at most 60 characters long.
The code snippets included in this article generally assume that you're familiar with creating
HTML web pages and PHP scripts. Thus, any opening and closing tags (such as <html> and
<?php), etc. are omitted from here, to keep the article from growing too long. However, the
sample files in the archive provided with the article do include all of those essential bits.
First, we need to put the phpass code in place. (We will use it to hash the new password.) We
place the PasswordHash.php file from the phpass distribution tarball somewhere within our web
"virtual host" "document root" directory and we set proper permissions for the file to be loaded
by the web server's PHP setup (typically, the Unix permission bits will need to be 600 or 644
depending on web server setup).
Then we create a subdirectory for our sample program (this is how multiple revisions of the
program are included in the archive accompanying this article - in separate subdirectories). Let's
call the directory demo (and set its Unix permissions to 711). We'll place two files into this
directory: user-man.html (with permissions set to 644) containing the HTML form below, and
user-man.php (with permissions set the same as we did for PasswordHash.php).
require '../PasswordHash.php';
To actually use phpass, we need to decide on and specify the extent of password stretching and
whether we want to force the use of "portable" hashes or not (both of these matters were briefly
discussed above). Let's place those constants into PHP variables:
(In a real application, these should be in a configuration file included from the actual program
code files instead. Alternatively, they may be configurable via the application itself, by an
administrative user.)
$user = $_POST['user'];
// Should validate the username length and syntax here
$pass = $_POST['pass'];
Note that we don't bother producing proper HTML output in fail(). For our sample program, it is
simpler to produce plain text output. Let's set the HTTP header accordingly such that the web
browser does not attempt to parse our script's output as HTML:
header('Content-Type: text/plain');
Indeed, we need to do this before our script possibly produces any output. (In a real PHP
application, you would likely be producing HTML output instead, which requires more code and
extra safety measures.)
Let's also place our database access credentials into PHP variables. For example:
Finally, let's try to create the user by inserting the username and the password hash encoding
string (which includes the salt, etc.) into the database table using the prepared statements API:
If we got this far, we must have successfully created the user. Let's close the database
connection:
$stmt->close();
$db->close();
In fact, it would be nice to do this on failure as well, but that would make the code more
complicated (the cleanups to perform would vary depending on where the failure occurs).
Instead, we rely on the web server setup to perform any cleanups for terminating PHP scripts,
which it needs to do anyway because scripts may sometimes terminate abnormally.
So that's it. Please find the HTML file and the demo program we've just created, complete with
all details and with the snippets in the proper order (unlike in this article), in the demo1
subdirectory in the accompanying archive (tar.gz, ZIP).
Let's test the program. Go to the URL for the user-man.html HTML page in a web browser, enter
myuser for the username and mypass for the password. If the script completes without error, we
should be able to see the new user account in the users table:
Q- What are the various channel allocation techniques used in cellular
communication?
Ans:-
1.Fixed
2.Dynamic:
3.Spread spectrum
FCA
DCA and DFS eliminate the tedious manual frequency planning work. DCA also
handles bursty cell traffic and utilizes the cellular radio resources more efficiently.
DCA allows the number of channels in a cell to vary with the traffic load, hence
increasing channel capacity with little costs.
Spread spectrum
1) Radio subsystem
As the name implies, the radio subsystem (RSS) comprises all radio specific
entities, i.e., the mobile stations (MS) and the base station subsystem (BSS).
Figure shows the connection between the RSS and the NSS via the A interface
(solid lines) and the connection to the OSS via the O interface (dashed
lines). The A interface is typically based on circuit-switched PCM-30 systems
(2.048 Mbit/s), carrying up to 30 64 kbit/s connections, whereas the O interface
uses the Signalling System No. 7 (SS7) based on X.25 carrying management data
to/from the RSS
● Base station subsystem (BSS): A GSM network comprises many BSSs, each
controlled by a base station controller (BSC). The BSS performs all functions
necessary to maintain radio connections to an MS, coding/decoding of
voice, and rate adaptation to/from the wireless network part. Besides a BSC,
the BSS contains several BTSs.
.
Functional architecture of a GSM system
● Base transceiver station (BTS): A BTS comprises all radio equipment, i.e.,
antennas, signal processing, amplifiers necessary for radio transmission. A BTS can
form a radio cell or, using sectorized antennas, several cells , and is connected to MS
via the Um interface (ISDN U interface for mobile use), and to the BSC via the Abis
interface. The Um interface contains all the mechanisms necessary for wireless
transmission (TDMA, FDMA etc.) and will be discussed in more detail below. The Abis
interface consists of 16 or 64 kbit/s connections. A GSM cell can measure between
some 100 m and 35 km depending on the environment (buildings, open space,
mountains etc.) but also expected traffic.
● Base station controller (BSC): The BSC basically manages the BTSs. It
reserves radio frequencies, handles the handover from one BTS to another
within the BSS, and performs paging of the MS. The BSC also multiplexes
the radio channels onto the fixed network connections at the A interface
● Mobile station (MS): The MS comprises all user equipment and software
needed for communication with a GSM network. An MS consists of user independent
hard- and software and of the subscriber identity module (SIM), which stores all user-
specific data that is relevant to GSM.3 While an MS can be identified via the
international mobile equipment identity (IMEI), a user can personalize any MS using
his or her SIM, i.e., user-specific mechanisms like charging and authentication are
based on the SIM, not on the device itself. Device-specific mechanisms, e.g., theft
protection, use the device specific IMEI. Without the SIM, only emergency calls are
possible. The SIM card contains many identifiers and tables, such as card-type, serial
number, a list of subscribed services, a personal identity number (PIN), a PIN
unblocking key (PUK), an authentication key (Ki), and the international mobile
subscriber identity (IMSI) (ETSI, 1991c). The PIN is used to unlock the MS. Using the
wrong PIN three times will lock the SIM. In such cases, the PUK is needed to unlock
the SIM. The MS stores dynamic information while logged onto the GSM system, such
as, e.g., the cipher key Kc and the location information consisting of a temporary
mobile subscriber identity (TMSI) and the location area identification (LAI). Typical
MSs for GSM 900 have a transmit power of up to 2 W, whereas for GSM 1800 1 W is
enough due to the smaller cell size. Apart from the telephone interface, an MS can
also offer other types of interfaces to users with display, loudspeaker, microphone, and
programmable soft keys. Further interfaces comprise computer modems, IrDA, or
Bluetooth. Typical MSs, e.g., mobile phones,comprise many more vendor-specific
functions and components, such as
cameras, fingerprint sensors, calendars, address books, games, and Internet browsers.
Personal digital assistants (PDA) with mobile phone functions are also available. The
reader should be aware that an MS could also be integrated into a car or be used for
location tracking of a container.
2) Network and switching subsystem
The “heart” of the GSM system is formed by the network and switching subsystem
(NSS). The NSS connects the wireless network with standard public
networks, performs handovers between different BSSs, comprises functions for
worldwide localization of users and supports charging, accounting, and roaming
of users between different providers in different countries. The NSS consists of
the following switches and databases:
● Mobile services switching center (MSC): MSCs are high-performance digital
ISDN switches. They set up connections to other MSCs and to the BSCs
via the A interface, and form the fixed backbone network of a GSM system.
Typically, an MSC manages several BSCs in a geographical region. A gateway
MSC (GMSC) has additional connections to other fixed networks, such as
PSTN and ISDN. Using additional interworking functions (IWF), an MSCcan also
connect to public data networks (PDN) such as X.25. An MSC
handles all signaling needed for connection setup, connection release and
handover of connections to other MSCs. The standard signaling system
No. 7 (SS7) is used for this purpose. SS7 covers all aspects of control signaling
for digital networks (reliable routing and delivery of control messages,
establishing and monitoring of calls). Features of SS7 are number portability,
free phone/toll/collect/credit calls, call forwarding, three-way calling etc. An
MSC also performs all functions needed for supplementary services such as
call forwarding, multi-party calls, reverse charging etc.
● Home location register (HLR): The HLR is the most important database in a
GSM system as it stores all user-relevant information. This comprises static
information, such as the mobile subscriber ISDN number (MSISDN), subscribed
services (e.g., call forwarding, roaming restrictions, GPRS), and the
international mobile subscriber identity (IMSI). Dynamic information is
also needed, e.g., the current location area (LA) of the MS, the mobile subscriber
roaming number (MSRN), the current VLR and MSC. As soon as an
MS leaves its current LA, the information in the HLR is updated. This information
is necessary to localize a user in the worldwide GSM network. All these user-specific
information elements only exist once for each user in a single HLR, which also
supports charging and accounting. The parameters will be explained in more detail in
section 4.1.5. HLRs can manage data for several million customers and contain highly
specialized data bases which must fulfill certain real-time requirements to answer
requests within certain time-bounds.
● Visitor location register (VLR): The VLR associated to each MSC is a dynamic
database which stores all important information needed for the MS users currently in
the LA that is associated to the MSC (e.g., IMSI, MSISDN, HLR address). If a new MS
comes into an LA the VLR is responsible for, it copies all relevant information for this
user from the HLR. This hierarchy of VLR and HLR avoids frequent HLR updates and
long-distance signaling of user information. The typical use of HLR and VLR for user
localization will be described . Some VLRs in existence, are capable of managing up to
one million customers.
3) Operation subsystem
The third part of a GSM system, the operation subsystem (OSS), contains the
necessary functions for network operation and maintenance. The OSS possesses
network entities of its own and accesses other entities via SS7 signaling (see Figure).
The following entities have been defined:
● Operation and maintenance center (OMC): The OMC monitors and controls
all other network entities via the O interface (SS7 with X.25). Typical OMC
management functions are traffic monitoring, status reports of network entities,
subscriber and security management, or accounting and billing. OMCs use the concept
of telecommunication management network (TMN) as standardized by the ITU-T.
● Authentication centre (AuC): As the radio interface and mobile stations are
particularly vulnerable, a separate AuC has been defined to protect user identity and
data transmission. The AuC contains the algorithms for authentication as well as the
keys for encryption and generates the values needed for user authentication in the
HLR. The AuC may, in fact, be situated in a special protected part of the HLR.
● Equipment identity register (EIR): The EIR is a database for all IMEIs, i.e.,
it stores all device identifications registered for this network. As MSs are mobile, they
can be easily stolen. With a valid SIM, anyone could use the stolen MS. The EIR has a
blacklist of stolen (or locked) devices. In theory an MS is useless as soon as the owner
has reported a theft. Unfortunately, the blacklists of different providers are not usually
synchronized and the illegal use of a device in another operator’s network is possible
(the reader may speculate as to why this is the case). The EIR also contains a list of
valid IMEIs (white Slist), and a list of malfunctioning devices (gray list).
Mobile Computing Assignment
3G 4G
Network Architecture: Wide Area Cell Based Integration of wireless LAN and Wide
area.
Services And CDMA 2000, UMTS, EDGE etc Wimax2 and LTE-Advance
Applications:
Forward error 3G uses Turbo codes for error correction. Concatenated codes are used for error
correction (FEC): corrections in 4G.
Ans:-
Introduction:-
GSM is an acronym that stands for Global System for Mobile Communications
GSM is now an international standard for mobile service. It offers high mobility. Subscribers can easily
roam worldwide and access any GSM network.
GSM offers a number of services including voice communications, Short Message Service (SMS), fax,
voice mail, and other supplemental services such as call forwarding and caller ID
Currently there are several bands in use in GSM. 450 MHz, 850 MHZ, 900 MHz, 1800 MHz, and 1900
MHz are the most common one
GSM allows for use of duplex operation. Each band has a frequency range for the uplink (cell phone to
tower) and a separate range for the downlink (tower to the cell phone). The uplink is also known as
the Reverse and the downlink is also known as the Forward
Forward link: the link from the base station to the handset.
Reverse link: the link from the handset to the base station.
Uplink Frequency(Reverse):-
In a GSM network, the term uplink frequency is used for a band (or group) of frequencies
dedicated for transmitting data from mobile units (or cell phones) to the BTS towers. The uplink
frequency in a GSM network generally lies between a range of 890 and 915 megahertz (MHz), making it
a 25-MHz band. This band contains multiple frequencies from 890.1 MHz to 914.9 MHz, allotted rapidly
to different users to facilitate maximum number of mobile units under a single BTS.
Downlink Frequency(Forward):-
The downlink frequency in a GSM network refers to the transmitting frequency from BTS
antenna to a mobile unit on ground. This frequency lies within the range of 935 to 960 MHz, which
makes it a 25-MHz frequency band. In similarity to uplink frequency scenario, the downlink frequency
band also contains multiple frequencies (ranging from 935.1 MHz to 959.9 MHz) to facilitate multiple
mobile units on ground.
-----------------------------------------------------------------------------------------------------------------------------
In a cellular network, a service coverage area is divided into smaller areas of hexagonal shape, referred
to as cells. Each cell is served by a base station. The base station is fixed. It is able to communicate with
mobile stations such as cellular phones using its radio transceiver. The base station is connected to the
mobile switching center (MSC), which is, in turn, connected to the public switched telephone network
(PSTN).
Fig. illustrates a typical cellular network. (A base station is marked with a triangle.)
Location management deals with how to keep track of an active mobile station within the cellular
network. A mobile station is active if it is powered on. Since the exact location of a mobile station must
be known to the network during a call, location management usually means how to track an active
mobile station between two consecutive phone calls.
The continued growth of wireless communication systems, and expansion of network subscription rates,
signals increased demand for the efficient location management. A cellular communication system must
track the location of its users in order to forward calls to the relevant cell within a network. Cells within
a network are grouped into Location Areas (LAs). Users are free to move with a given location area
without updating their location, informing the network only when transitioning to a new LA. If a call is to
be forwarded to a user, the network must now page every cell within the location area to determine
their precise location. Network cost is incurred on location updates and paging, the balance of these
defining the field of Location Management (LM). So there are two basic operations involved with
location management:
• Location Updating: Informing the network of a devices location.
• Paging: Polling a group of cells to determine the precise location of a device
There are two basic operations involved with location management: location update and paging.
The paging operation is performed by the cellular network. When an incoming call arrives for a mobile
station, the cellular network will page the mobile station in all possible cells to find out the cell in which
the mobile station is located so the incoming call can be routed to the corresponding base station. This
process is called paging. The number of all possible cells to be paged is dependent on how the location
update operation is performed.
The location update operation is performed by an active mobile station. A location update scheme can
be classified as either global or local. A location update scheme is global if all subscribers update their
locations at the same set of cells, and a scheme is local if an individual subscriber is allowed to decide
when and where to perform location update. A local scheme is also called individualized or per-user
based.
From another point of view, a location update scheme can be classified as either static or dynamic. A
location update scheme is static if there is a predetermined set of cells at which location updates must
be generated by a mobile station regardless of it mobility. A scheme is dynamic if a location update can
be generated by a mobile station in any cell depending on its mobility. A global scheme is based on
aggregate statistics and traffic patterns, and it is usually static too. Location areas in and reporting
centers are two examples of global static schemes. A global scheme can be dynamic. For example, the
time varying location areas scheme is both global and dynamic. A per-user based scheme is based on the
statistics and/or mobility patterns of an individual subscriber, and it is usually dynamic. The time-based,
movement based and distance based schemes are three excellent examples of individualized dynamic
schemes. An individualized scheme is not necessary dynamic. For example, the individualized location
areas scheme is both individualized and static.
Location management involves signaling in both the wireline portion and the wireless portion of the
cellular network. However, most researchers only consider signaling in the wireless portion due to the
fact that the radio frequency bandwidth is limited while the bandwidth of the wireline network is always
expandable. This chapter will only discuss signaling in the wireless portion of the network. Location
update involves reverse control channels while paging involves forward control channels. The total
location management cost is the sum of the location update cost and the paging cost. There is a trade-
off between the location update cost and the paging cost. If a mobile station updates its location more
frequently (incurring higher location update cost), the network knows the location of the mobile station
better. Then the paging cost will be lower when an incoming call arrives for the mobile station.
Therefore both location update and paging costs can not be minimized at the same time. However, the
total cost can be minimized or one cost can be minimized by putting a bound on the other cost. For
example, many researchers try to minimize the location update cost subject to a constraint on the
paging cost. The cost of paging a mobile station over a set of cells or location areas has been
studied against the paging delay . There is a trade-off between the paging cost and the paging delay. If
there is no delay constraint, the cells can paged sequentially in order of decreasing probability, which
will result in the minimal paging cost. If all cells are paged simultaneously, the paging cost reaches the
maximum while the paging delay is the minimum. many researchers try to minimize the paging cost
under delay constraints.
Handoff Management –
Mobility is the most important feature of a wireless cellular communication system. Usually, continuous
service is achieved by supporting handoff (or handover) from one cell to another. Handoff is the process
of changing the channel (frequency, time slot, spreading code, or combination of them) associated with
the current connection while a call is in progress. It is often initiated either by crossing a cell boundary or
by a deterioration in quality of the signal in the current channel. Handoff is divided into two broad
categories— hard and soft handoffs. They are also characterized by “break before make” and “make
before break.”
In hard handoffs, current resources are released before new resources are used; in soft handoffs, both
existing and new resources are used during the handoff process. Poorly designed handoff schemes tend
to generate very heavy signaling traffic and, thereby, a dramatic decrease in quality of service (QoS). (In
this chapter, a handoff is assumed to occur only at the cell boundary.) The reason why handoffs are
critical in cellular communication systems is that neighboring cells are always using a disjoint subset of
frequency band , so negotiations must take place between the mobile station (MS), the current serving
base station (BS), and the next potential BS. Other related issues, such as decision making and priority
strategies during overloading, might influence the overall performance.
TYPES OF HANDOFFS
Handoffs are broadly classified into two categories—hard and soft handoffs. Usually, the hard handoff
can be further divided into two different types—intra- and intercellular handoffs. The soft handoff can
also be divided into two different types—multiway soft handoffs and softer handoffs.
A hard handoff is essentially a “break before make” connection. Under the control of the MSC, the BS
hands off the MS’s call to another cell and then drop the call. In a hard handoff, the link to the prior BS is
terminated before or as the user is transferred to the new cell’s BS; the MS is linked to no more than
one BS at any given time. Hard handoff is primarily used in FDMA (frequency division multiple access)
and TDMA (time division multiple access), where different frequency ranges are used in adjacent
channels in order to minimize channel interference. So when the MS moves from one BS to another BS,
it becomes impossible for it to communicate with both BSs (since different frequencies are used).
HANDOFF DECISION
There are numerous methods for performing handoff, at least as many as the kinds of state information
that have been defined for MSs, as well as the kinds of network entities that maintain the state
information. The decision-making process of handoff may be centralized or decentralized (i.e., the
handoff decision may be made at the MS or network). From the decision process point of view, one can
find at least three different kinds of handoff decisions.
Network-Controlled Handoff
In a network-controlled handoff protocol, the network makes a handoff decision based on the
measurements of the MSs at a number of BSs. In general, the handoff process (including data
transmission, channel switching, and network switching) takes 100–200 ms. Information about the
signal quality for all users is available at a single point in the network that facilitates appropriate
resource allocation. Network-controlled handoff is used in first-generation analog systems such as AMPS
(advanced mobile phone system), TACS (total access communication system), and NMT (advanced
mobile phone system).
Mobile-Assisted Handoff
In a mobile-assisted handoff process, the MS makes measurements and the network makes the
decision. In the circuit-switched GSM (global system mobile), the BS controller (BSC) is in charge of the
radio interface management. This mainly means allocation and release of radio channels and handoff
management. The handoff time between handoff decision and execution in such a circuit-switched GSM
is approximately 1 second.
Mobile-Controlled Handoff
In mobile-controlled handoff, each MS is completely in control of the handoff process. This type of
handoff has a short reaction time (on the order of 0.1 second). MS measures the signal strengths from
surrounding BSs and interference levels on all channels. A handoff can be initiated if the signal strength
of the serving BS is lower than that of another BS by a certain threshold.
Ans:
FDMA is one of the earliest multiple-access techniques for cellular systems when continuous
transmission is required for analog services. In this technique the bandwidth is divided into a number of
channels and distributed among users with a finite portion of bandwidth for permanent use as
illustrated in fig. The vertical axis that represents the code is shown here just to make a clear
comparison with CDMA (discussed later in this chapter). The channels are assigned only when
demanded by the users. Therefore when a channel is not in use it becomes a wasted resource. FDMA
channels have narrow bandwidth (30Khz) and therefore they are usually implemented in narrowband
systems. Since the user has his portion of the bandwidth all the time, FDMA does not require
synchronization or timing control, which makes it algorithmically simple. Even though no two users use
the same frequency band at the same time, guard bands are introduced between frequency bands to
minimize adjacent channel interference. Guard bands are unused frequency slots that separate
neighboring channels. This leads to a waste of bandwidth. When continuous transmission is not
required, bandwidth goes wasted since it is not being utilized for a portion of the time. In wireless
communications, FDMA achieves simultaneous transmission and reception by using Frequency division
duplexing (FDD). In order for both the transmitter and the receiver to operate at the same time, FDD
requires duplexers. The requirement of duplexers in the FDMA system makes it expensive.
Q. What is cell splitting? What is cell sectoring?
Answer:-
1. Cell Splitting :-
As the density of subscribers to a cellular system grows, there comes a time where the system
capacity is reached. At that point you cannot continue to add new customers without degrading
system performance for all your customers. You could simply refuse to add new users, but
that’s not a very good business plan. Another idea would be to add new channels. Assuming
you can’t get additional spectrum from the FCC, this would require new technology to squeeze
more voice channels into the same bandwidth
- Cell splitting is the process of subdividing a congested cellinto smaller cells.
- Each with its own base station and a correspondingreduction in antenna height and
transmitter power.
- Cell splitting increases the capacity of a cellular systemsince it increases the number of
times that channels arereused.
- By defining new cells which have a smaller radius than the original cells and by installing
these smaller cells (calledmicrocells) between the existing cells,
- Capacity increases due to the additional number of channelsper unit area.
Now, let us look into the big picture. Until now, we have discussed about cell splitting in a
small area. Now, we use this same concept to deal with large networks. In a large network, it is
not necessary to split up all the cells in all the clusters. Certain BSs can handle the traffic well if
their cells (coverage areas) are split up. Only those cells must be ideal for cell splitting. Fig 3
shows network architecture with a few number of cells split up into smaller cells, without
affecting the other cells in the network.
Here, the master cells which have been split up into smaller cells are known as macro cells.
The split up cells are known as micro cells. The innermost cells, split up by splitting the micro
cells are known as pico cells
2. Cell Sectoring :-
Sectoring is another way to increase capacity. In sectoring, a cell has the same coverage
space but instead of using a single omni-directional antenna that transmits in all directions,
either three or six directional antennas are used and each with beam-width of about 120° or
60° as shown
- Sectoring is another way to increase capacity is to keep the cell radius unchanged.
- It is the technique for decreasing co-channel interference and thus increasing system
capacity by replacing a single omnidirectional antenna at the base station by several
directional antennas, each radiating within a specified sector and transmit with only a
fraction of the available co-channel cells.
- Each sector uses a directional antenna at the BS and isassignedasetofchannels
- The factor by which the co-channel interference is reduced depends on the amount of
sectoring used.
- Sectoring uses directional antennas further
controltheinterference andfrequencyreuseofchannels.
- The number of channels in each sector is the number
of channelsinacelldividedbythenumberofsectors..
- TheamountofCCIisalsoreducedbythenumber ofsectors.
When sectoring is employed, the channels allocated to a particular cell are divided among the
different sectors. It is done in such a way that channels assigned to a particular sector are always
at the same direction in the different cells.
For example, group A of channels assigned to the sector S2, group B of channels are assigned
to the sector S1 at the top of all cells, and so on. Each sector causes interference to the cells that
are in its transmission angle only. Unlike the case of no sectoring where six interfering co-
channel cells from the first-tier co-channels cells cause interference, with 120° sectoring, two or
three co-channel cells cause interference and with 60° sectoring, one or two co-channel cells
cause interference. Fig.2 shows sectoring for a four-cell pattern.
PROS AND CONS:-
1. Much less costly than cell splitting, only require more antennas at base station.
2. Primary disadvantage is that the available channels in a cell are subdivided into sectored
groups.
3. There are more channels per cell, because of smaller cluster sizes, but those channels are
broken into sectors.
Name: Mr. Swapnil Khobragade
Blocked Call: Call which cannot be completed at time of request, due to congestion, Also
referred to as a lost call.
Load: Traffic intensity across the entire trunked radio system, measured in Erlangs.
Grade of Service (GOS): A measure of congestion which is specified as the probability of a call
being blocked (for Erlang B).
The AMPS cellular system is designed for a GOS of 2% blocking. This implies that the channel
allocations for cell sites are designed so that 2 out of 100 calls will be blocked due to channel
occupancy during the busiest hour.
Request Rate: The average number of call requests per unit time. Denoted by _.
There are two types of trunked systems which are commonly used.
(a) Blocked calls cleared.
(b) Blocked calls delayed
M/M/m/m Queue Assumption: We will assume blocked calls cleared trunking with several
further assumptions.
Blocked calls cleared
Offers no queuing for call requests,
For every user who requests service, it is assumed there is no setup time and the user is given
immediate access to a channel if one is available.
If no channels are available, the requesting user is blocked without access and is free to try again
later.
There is memory less arrivals of requests, implying that all users, including blocked users, may
request a channel at any time.
There are an infinite number of users (with infinite overall request rate).
Remark: While it is possible to model trunked systems with infinite users, the resulting
expressions are much more complicated than the Erlang B result below.
Furthermore, the Erlang B formula provides a conservative estimate of the GOS, as the infinite
user results always predict a smaller likelihood of blocking.
The duration of the time that a user occupies a channel is exponentially distributed, so that longer
calls are less likely to occur.
There are m channels available in the trunking pool.
Before frequency modulation, syllabic compounding, pre-emphasis, clipping, and band pass
filtering are used to enhance the voice signal quality
syllabic compandor After frequency discrimination, band pass filtering is first used to eliminate
the random phase effect of the narrowband fading channel. Then de-emphasis and syllabic
expanding are used to recover the original voice signal FM is adopted in the first generation
cellular system because itis simple and it is effective in combating the narrowband fading effect.
The terms slow and fast fading refer to the rate at which the magnitude and phase change
imposed by the channel on the signal changes. The coherence time is a measure of the minimum
time required for the magnitude change of the channel to become uncorrelated from its previous
value.
Slow fading arises when the coherence time of the channel is large relative to the delay
constraint of the channel. In this regime, the amplitude and phase change imposed by the
channel can be considered roughly constant over the period of use. Slow fading can be
caused by events such as shadowing, where a large obstruction such as a hill or large
building obscures the main signal path between the transmitter and the receiver. The
received power change caused by shadowing is often modeled using a log-normal
distribution with a standard deviation according to the log-distance path loss model
Fast fading occurs when the coherence time of the channel is small relative to the delay
constraint of the channel. In this regime, the amplitude and phase change imposed by the
channel varies considerably over the period of use.
In a fast-fading channel, the transmitter may take advantage of the variations in the channel
conditions using time diversity to help increase robustness of the communication to a temporary
deep fade. Although a deep fade may temporarily erase some of the information transmitted, use
of an error-correcting code coupled with successfully transmitted bits during other time instances
(interleaving) can allow for the erased bits to be recovered. In a slow-fading channel, it is not
possible to use time diversity because the transmitter sees only a single realization of the channel
within its delay constraint. A deep fade therefore lasts the entire duration of transmission and
cannot be mitigated using coding.
The coherence time of the channel is related to a quantity known as the Doppler spread of the
channel. When a user (or reflectors in its environment) is moving, the user's velocity causes a
shift in the frequency of the signal transmitted along each signal path. This phenomenon is
known as the Doppler shift. Signals traveling along different paths can have different Doppler
shifts, corresponding to different rates of change in phase. The difference in Doppler shifts
between different signal components contributing to a single fading channel tap is known as the
Doppler spread. Channels with a large Doppler spread have signal components that are each
changing independently in phase over time. Since fading depends on whether signal components
add constructively or destructively, such channels have a very short coherence time.
where is the coherence time, is the Doppler spread. This equation is just an
[1]
approximation, to be exact, see Coherence time.
Selective fading
Selective fading or frequency selective fading is a radio propagation anomaly caused by partial
cancellation of a radio signal by itself — the signal arrives at the receiver by two different paths,
and at least one of the paths is changing (lengthening or shortening). This typically happens in
the early evening or early morning as the various layers in the ionosphere move, separate, and
combine. The two paths can both be skywave or one be groundwave.
Selective fading manifests as a slow, cyclic disturbance; the cancellation effect, or "null", is
deepest at one particular frequency, which changes constantly, sweeping through the received
audio.
As the carrier frequency of a signal is varied, the magnitude of the change in amplitude will vary.
The coherence bandwidth measures the separation in frequency after which two signals will
experience uncorrelated fading.
In flat fading, the coherence bandwidth of the channel is larger than the bandwidth of the
signal. Therefore, all frequency components of the signal will experience the same
magnitude of fading.
In frequency-selective fading, the coherence bandwidth of the channel is smaller than
the bandwidth of the signal. Different frequency components of the signal therefore
experience uncorrelated fading.
Since different frequency components of the signal are affected independently, it is highly
unlikely that all parts of the signal will be simultaneously affected by a deep fade. Certain
modulation schemes such as orthogonal frequency-division multiplexing (OFDM) and code
division multiple access (CDMA) are well-suited to employing frequency diversity to provide
robustness to fading. OFDM divides the wideband signal into many slowly modulated
narrowband subcarriers, each exposed to flat fading rather than frequency selective fading. This
can be combated by means of error coding, simple equalization or adaptive bit loading. Inter-
symbol interference is avoided by introducing a guard interval between the symbols. CDMA
uses the rake receiver to deal with each echo separately.
Frequency-selective fading channels are also dispersive, in that the signal energy associated with
each symbol is spread out in time. This causes transmitted symbols that are adjacent in time to
interfere with each other. Equalizers are often deployed in such channels to compensate for the
effects of the intersymbol interference.
The echoes may also be exposed to Doppler shift, resulting in a time varying channel model.
The effect can be counteracted by applying some diversity scheme, for example OFDM (with
subcarrier interleaving and forward error correction), or by using two receivers with separate
antennas spaced a quarter-wavelength apart, or a specially-designed diversity receiver with two
antennas. Such a receiver continuously compares the signals arriving at the two antennas and
presents the better signal.
Fading models
Dispersive fading models, with several echoes, each exposed to different delay, gain and
phase shift, often constant. This results in frequency selective fading and inter-symbol
interference. The gains may be Rayleigh or Rician distributed. The echoes may also be
exposed to Doppler shift, resulting in a time varying channel model.
Nakagami fading
Log-normal shadow fading
Rayleigh fading
Rician fading
Weibull fading
Q- What are different types of handover
In cellular telecommunications, the term handover or handoff refers to the process of transferring an
ongoing call or data session from one channel connected to the core network to another. In satellite
communications it is the process of transferring satellite control responsibility from one earth station to
another without loss or interruption of service.
when the phone is moving away from the area covered by one cell and entering the area covered
by another cell the call is transferred to the second cell in order to avoid call termination when the
phone gets outside the range of the first cell;
when the capacity for connecting new calls of a given cell is used up and an existing or new call
from a phone, which is located in an area overlapped by another cell, is transferred to that cell in
order to free-up some capacity in the first cell for other users, who can only be connected to that cell;
in non-CDMA networks when the channel used by the phone becomes interfered by another
phone using the same channel in a different cell, the call is transferred to a different channel in the
same cell or to a different channel in another cell in order to avoid the interference;
again in non-CDMA networks when the user behaviour changes, e.g. when a fast-travelling user,
connected to a large, umbrella-type of cell, stops then the call may be transferred to a smaller macro
cell or even to a micro cell in order to free capacity on the umbrella cell for other fast-traveling users
and to reduce the potential interference to other cells or users (this works in reverse too, when a user
is detected to be moving faster than a certain threshold, the call can be transferred to a larger
umbrella-type of cell in order to minimize the frequency of the handovers due to this movement);
in CDMA networks a handover (see further down) may be induced in order to reduce the
interference to a smaller neighboring cell due to the "near-far" effect even when the phone still has an
excellent connection to its current cell;
The most basic form of handover is when a phone call in progress is redirected from its
current cell (called source) to a new cell (called target). In terrestrial networks the source and the target
cells may be served from two different cell sites or from one and the same cell site (in the latter case the
two cells are usually referred to as two sectors on that cell site). Such a handover, in which the source
and the target are different cells (even if they are on the same cell site) is called inter-cell handover. The
purpose of inter-cell handover is to maintain the call as the subscriber is moving out of the area covered
by the source cell and entering the area of the target cell.
A special case is possible, in which the source and the target are one and the same cell and only the
used channel is changed during the handover. Such a handover, in which the cell is not changed, is
called intra-cell handover. The purpose of intra-cell handover is to change one channel, which may be
interfered or fading with a new clearer or less fading channel.
Types of handover
A hard handover is one in which the channel in the source cell is released and only then the
channel in the target cell is engaged. Thus the connection to the source is broken before or 'as' the
connection to the target is made—for this reason such handovers are also known as break-before-
make. Hard handovers are intended to be instantaneous in order to minimize the disruption to the
call. A hard handover is perceived by network engineers as an event during the call. It requires the
least processing by the network providing service. When the mobile is between base stations, then
the mobile can switch with any of the base stations, so the base stations bounce the link with the
mobile back and forth. This is called ping-ponging.
A soft handover is one in which the channel in the source cell is retained and used for a while in
parallel with the channel in the target cell. In this case the connection to the target is established
before the connection to the source is broken, hence this handover is called make-before-break. The
interval, during which the two connections are used in parallel, may be brief or substantial. For this
reason the soft handover is perceived by network engineers as a state of the call, rather than a brief
event. Soft handovers may involve using connections to more than two cells: connections to three,
four or more cells can be maintained by one phone at the same time. When a call is in a state of soft
handover, the signal of the best of all used channels can be used for the call at a given moment or all
the signals can be combined to produce a clearer copy of the signal.
Q. Explain the channels in GSM.
. GSM uses a mix of Frequency Division Multiple Access (FDMA) and Time Division Multiple
Access (TDMA). FDMA parts involves the division by frequency of the 25 MHz bandwidth in to
124 carrier frequencies (Also called ARFCN) spaced 200 KHz for GSM-900. For GSM-1800
frequency spectrum of 75 MHz bandwidth is divided in to 374 carrier frequencies spaced 200
KHz. TDMA further divides each carrier frequencies in to 8 time slots such that each carrier
frequency is shared by 8 users. So in GSM, the basic radio resource is a time slot with duration
of 577 µs. 8 Time slots of 577 µs constitutes a 4.615 ms TDMA Frame. GSM uses Gaussian
Minimum Shift Keying (GMSK) modulation scheme to transmit information (data and signaling)
over Air Interface.
GSM uses number of channels to carry data over Air Interface; these channels are broadly
divided in to following two categories:
1. Physical Channels
2. Logical Channels
PHYSICAL CHANNELS
8 Time Slots (1 Time Slot = 1 Physical Channel) of 577 µs constitutes a 4.615 ms TDMA Frame.
In GSM standard data on a time slot transmitted in bursts, so time slot is often expressed in BP
(Burst Period). 1 BP represents 1 TS. TDMA frame (4.615 ms of 8 TS) further structured in to
multiframes. There are two types of multiframes in the system:
26 TDMA Multiframe: Consists 26 TDMA frames with duration of 120 ms and used to
carry the Logical Channels TCH, SACCH, FACCH etc.
51 TDMA Multiframe: Consists 51 TDMA frames with duration of 234.5 ms and used to
carry the Logical Channels FCCH, SCH, BCCH, CCCH, SDCCH, SACCH etc.
SUPERFRAME: Superframe consists of 51*26 TDMA frames with duration of 6.12 sec. This
is corresponding to the smallest cycle for which the organization of all channels is repeated.
The frame hierarchy is used for synchronization between BTS and MS.
Multiframes in GSM
LOGICAL CHANNELS
Logical Channels are determined by the information carried within the physical channel. Logical
channels used to carry data and signaling information. Different logical channels are mapped in
either direction on physical channels.
Traffic Channels
Signaling Channels
TRAFFIC CHANNELS(TCH): GSM uses a TCH to transmit user data (e.g., voice,fax). Two
basic categories of TCHs have been defined, i.e., full-rate TCH(TCH/F) and half-rate TCH
(TCH/H).
Full Rate Traffic Channels (TCH\F): This channel carries information at rate of 22.8
Kbps.
Half Rate Traffic Channels (TCH\H): This channel carries information at rate of 11.4
Kbps.
With the voice codecs available at the beginning of the GSM standardization, 13 Kbit/s were
required, whereas the remaining capacity of the TCH/F (22.8 Kbit/s) was used for error
correction (TCH/FS). Improved codes allow for better voice coding and can use aTCH/H. Using
these TCH/HSs double the capacity of the GSM system for voicetransmission. However, speech
quality decreases with the use of TCH/HS and manyproviders try to avoid using them. The
standard codecs for voice are called full rate (FR,13 Kbit/s) and half rate (HR, 5.6 Kbit/s). A
newer codec, enhanced full rate (EFR), provides better voice quality than FR as long as the
transmission error rate is low. The generated data rate is only 12.2 Kbit/s. New codecs, which
automatically choose the best mode of operation depending on the error rate (AMR, adaptive
multi-rate), will be used together with 3G systems. An additional increase in voice quality is
provided by the so-called tandem free operation (TFO). This mode can be used if two MSs
exchange voice data. In this case, coding to and from PCM encoded voice (standard in ISDN)
can be skipped and the GSM encoded voice data is directly exchanged. Data transmission in
GSM is possible at many different data rates, e.g., TCH/F4.8 for 4.8 Kbit/s, TCH/F9.6 for 9.6
Kbit/s, and, as a newer specification, TCH/F14.4 for 14.4 Kbit/s. These logical channels differ in
terms of their coding schemes and error correction capabilities.
SIGNALLING CHANNELS
Signaling channel carries control information to enable the system to operate correctly. There are
three main categories of signaling channels in GSM which are further divided in several
categories:
Broadcasts Network and Cell specific information required to identify the network and
gain access.
Broadcast parameters include Location Area Code (LAC), Mobile Network Code
(MNC), Control Channel Structures, BCCH frequencies of neighboring Cells and other
access parameters.
This channel contains frequency correction bursts, used by the mobiles for frequency
correction.
Bears information for frequency Synchronization.
This channel is used by the MS to learn the Base Station Information Code (BSIC) as
well as the TDMA frame number (FN).
6 bits of BSIC having two parts. 3 bits NCC and 3 bits BCC. NCC stands for Network
Colour Code and used to identify the BTS for which measurement is made. BCC stands
for Base-Station Colour Code and used for a better transmission in case of interference.
BICS avoids ambiguity or interference which can arise when a Mobile Station can
receive SCH from two cells using the same BCCH frequency.
This channel is used for alerting to Mobile Subscribers for incoming calls, SMS and other
mobility services.
Every MS in a cell periodically listen to this channel.
RANDOM ACCESS CHANNEL (RACH) – UPLINK
This channel is used by a MS seeking attention of the BTS. When MS wants to initiate
dialogue with network, this channel is used to send request to the network for a dedicated
resource.
The real dialogue between MS and Network will take place on the dedicated channel.
If the request is not granted within a specific time period by the network, the MS repeats
the request on the RACCH.
This channel is used by a BTS to notify the MS of the assignment of an initial SDCCH
for initial signaling.
In response to request from MS on RACH, the network allocates a specific dedicated
signaling channel (SDCCH) for further communication. This response is sent on AGCH.
This channel is always associated with TCH or SDDCH used for control and supervision
of signals associated with the traffic channels.
Used to convey the periodic carrier-signal strength measurements to the network transmit
power control and timing advance.
Name: Sapna Buddhapal Kamble
Reg No.: 2013MIT013
1) What is the necessity of Standards?
ans:-
Rather than asking why we need standards, we might usefully ask ourselves what the world
would be like without standards. Products might not work as expected. They may be of inferior
quality and incompatible with other equipment, in fact they may not even connect with them, and
in extreme cases; non-standardized products may even be dangerous. Standardized products and
services are valuable User 'confidence builders', being perceived as:
safe
healthy
secure
high quality
flexible
As a result, standardized goods and services are widely accepted, commonly trusted and
highly valued. Standards provide the foundation for many of the innovative communication
features and options we have come to take for granted, and they contribute to the enhancement of
our daily lives - often invisibly. We need look no further for evidence than the GSM™ standard
which facilitates mobile communication the world over between (for example): friends and
relations ,hospitals ,business ,schools ,industry, emergency services, airports ,governments.
Standardization brings important benefits to business including a solid foundation upon which to
develop new technologies and an opportunity to share and enhance existing practices.
Standardization also plays a pivotal role in assisting Governments, Administrations, Regulators
and the legal profession as legislation, regulation and policy initiatives are all supported by
standardization.
1G systems These are the analog systems such as AMPS that grew rapidly in the 1980s
and are still available today. Many metropolitan areas have a mix of 1G and 2G systems,
as well as emerging 3G systems. The systems use frequency division multiplexing to
divide the bandwidth into specific frequencies that are assigned to individual calls.
It is designed for use in both domestic and office environments. It is used to provide
telepoint services which allow a subscriber to use CT2 handsets at a public telepoint.
It’s a digital version of 1G analog,cordless telephone.
It offers good speech quality, is more resistant to interference, noise and fading and like
personal telephones,uses a handset with built-in antenna.The digital transmission
provides better security
Some more features:
Standardized on 864-868 MHz.
500 frames/second (alternately base station and handset).
100 kHz carriers.
32 kbit/s ADPCM voice channel compression.
10 mW maximum power output.
GFSK data encoding.
Up to 100 meter (300 ft) range.
DECT provides a cordless communication framework for high traffic density ,short range
telecommunication ,and covers a board range of application and environments.
It offers excellent quality and services for voice and data applications.The main function
of DECT is to provide local mobility to protable usres in an building private branch
exchange.
It provides low power radio acess between portable parts and fixed base station at range
of up to a few 100ms.
DECT is based on Time Division Duplex (TDD) and Time Division Multiple Access
(TDMA). It has a TDD/TDMA frame structure.
It is able to provide voice ,data,video images for indoor and microcell use.
The usage of a personal access communications system has become increasingly popular
as a way to either augment or replace some other form of communication with a work or
home environment. Because the system requires relatively little power to function and is
capable of interacting with several different devices in order to send and receive
transmissions, the cost savings involved with using this type of communication process
often pays for itself in a short period of time.
Formerly PHP Developed in Japan. For radio systems Debuted in 1995. Offered two-way
communications, data services and Internet access.
PHS is essentially a cordless telephone like DECT, with the capability to handover from
one cell to another. This makes PHS suitable for dense urban areas, but impractical for
rural areas, and the small cell size also makes it difficult if not impossible to make calls
from rapidly moving vehicles
Modern PHS phone support many value-added services such as high speed wireless data/
Internet connection (64 kbit/s and higher), WWW access, e-mailing, text messaging and
even color image transfer.
In spite of its low-cost base station, micro-cellular system and "Dynamic Cell
Assignment" system, PHS offers higher number-of-digits frequency use efficiency with
lower cost (throughput per area basis), compared with typical 3G cellular telephone
systems
Features:
o PHS cells are small
o With transmission power of base station a maximum of 500 mW
o Range typically measures in tens or at most hundreds of meters (some can range up to
about 2 kilometers in line-of-sight)
o Uses TDMA/TDD for its radio channel access method, and 32 kbit/s ADPCM for its
voice codec.
4G Systems On the horizon are 4G systems that may become available even
before 3G matures (3G is a confusing mix of standards). While 3G is important in
boosting the number of wireless calls, 4G will offer true high-speed data services. 4G
data rates will be in the 2-Mbit/sec to 156-Mbit/sec range, and possibly higher. 4G will
also fully support IP. High data rates are due to advances in signal processors, new
modulation techniques, and smart antennas that can focus signals directly at users.
OFDM (orthogonal frequency division multiplexing) is one scheme that can provide very
high wireless data rates.
All of the early And recommendations had been for a ―direct readout‖ satellite—one that
transmitted pictures to the ground electronically. many of the studies assumed a standard
television camera.the Air Force (aided by its rAnd think tank) had begun development of a
reconnaissance satellite,Weapon System 117l (WS-117l), on 16 march 1955. the program,
initially called Advanced reconnaissance Satellite (ArS), then Sentry, and finally Satellite and
missile observation System (SAmoS), was slow to mature. By 1957, members of the presidential
Science Advisory committee (pSAc) were dissatisfied with the Air Force program; they wanted a
―film return‖ satellite and they wanted the program managed by the central intelligence Agency
(ciA).the success of the u-2 seemed to indicate that the ciA was better at bringing new
technology into operation in a short period of time. on 7 February 1958, president eisenhower
authorized the ciA to proceed with coronA.
Navigation Satellites
In the days immediately following the launch of Sputnik in october 1957, scientists and
engineers worked to analyze the spacecraft’s signal and its orbit. Bill Guier and George
Weiffenbach of the Johns hopkins university Applied physics laboratory (Apl) listened to the
satellite’s signal and monitored the change in its frequency due to the doppler effect.they used
this doppler shift to compute an orbit for the russian satellite. Another Apl engineer, Frank
mclure (1916–1973), realized that if the orbit were known, the doppler information could be used
to determine the position of the radio receiver on the ground. in early 1958, mclure described the
potential for developing a space-based navigation system.Within a few weeks,Apl proposed a
navigation system to the navy.
Transit Satellites
The earliest transits were launched on the thor-Able and thor Able-Star rockets from cape
canaveral.T he very first of these occurred on 17 September 1959. the last two experimental
transit satellites demonstrated that precise navigation was possible using two frequency beacons
broadcasting the satellite ephemerides (orbits).this system was so robust that it was capable of
determining the harmonics of earth’s gravitational field and the effects of propagation through
the ionosphere. the last satellites were also able to demonstrate the availability of the satellites
when in a near-circular orbit at about 1,000 km and inclined about 66 degrees. After the poor
reliability of the naval Avionics Facility indianapolis (nAFi)builttransit satellites,rcA built the
rest.it was always clear thattransit had significant limitations. the accuracy was good enough for
nuclear weapons (<1 km) but not good enough for conventional weapons.the transit position
fixes took some time to obtain, making transit almost useless for moving objects. the navy
continued research—especially at naval research laboratory (nrl)—on improvements. in 1964,
the Air Force started a new navigation satellite program, project 621B.
Weather
By the 1950s, the idea of weather satellites was beginning to surface. in 1951, rAnd
published ―inquiry into the Feasibility of Weather reconnaissance from a Satellite vehicle‖ and
Arthur c. clarke depicted polar and geosynchronous ―metsats‖ in the endpapers of The
19
Exploration of Space. in 1954, a tropical storm was discovered accidentally when pictures
taken from an Aerobee sounding rocket were analyzed.Also in 1954,dr.harry Wexler,the
Weather Bureau’s chief scientist, presented a paper on ―observing the Weather from a Satellite
20
vehicle‖at the third Symposium on Space travel. in 1955, when the decision was made to
launch a satellite during the upcoming international Geophysical year (iGy), weather observation
and radiation balance payloads were considered and eventually were flown on vanguard and
explorer satellites.
Polar Satellites/tiroS
In spite of the influence of scientists such as Wexler and verner Suomi, the first weather
satellite was a product of the military. tiroS (television infra-red observation Satellite) was rcA’s
losing entry in theAir ForceWS-117l competition won by lockheed in 1956. the Army was
persuaded to support development of tiroS as a polar-orbiting weather satellite. the project was
transferred to ArpA and eventually to nASA in 1958.the first launch was on a delta on 1 April
1960. the satellite had two television cameras: one wide-angle and one narrow-angle (high-
resolution) on tiroS-1 and -2, and both wide-angle on succeeding tiroS satellites. tiroS-8
pioneered the Automatic picture transmission (Apt) camera system.tiroS satellites had the
cameras mounted on the base of the satellite, aligned with the spin axis.this meant that the
cameras were earth-pointing for only a small fraction of their orbits.tiroS-9 pioneered the
―cartwheel‖ configuration wherein the cameras were mounted on the sides of the spacecraft; the
spacecraft spin axis was aligned with orbit normal and pictures were taken continuously. All
launches were from cape canaveral into high-inclination (481)° orbits untiltiroS-9 and -10 were
launched into Sun-synchronous (SS) polar orbits. Sun-synchronous orbits allowed pictures to be
taken at the same local time every day (usually early morning).
Weather Forecasting:
Several satellites deliver pictures of the earth using e.g. infra red or visible light. without
help of satellites, the forecasting of hurricanes would be impossible.
Hundreds of radio and T.V programs are available via satellites. This technology
competes with cable in many places. as it is cheaper to install and in most case no extra fees have
to be paid for this services.
Military Services :
One of the earliest application of satellite was their use for espionage. Many communication
links are managed via satellites because they much safer from attack of enemy.
--------------------------------------------------------------------------------------------------
Dept. of Information Technology
1G systems These are the analog systems such as AMPS that grew rapidly in
the 1980s and are still available today. Many metropolitan areas have a mix of 1G
and 2G systems, as well as emerging 3G systems. The systems use frequency
division multiplexing to divide the bandwidth into specific frequencies that are
assigned to individual calls.
Interim Standard 95 (IS-95) is the first CDMA-based digital cellular standard by Qualcomm.
It is a 2G mobile telecommunications standard that uses CDMA, a multiple access scheme
for digital radio, to send voice, data and signaling data (such as a dialed telephone number)
between mobile telephones and cell sites.
It was designed to be compatible with existing US analog cellular system (AMPS) frequency
band, mobiles and base station can be economically produced for dual mode operation.
It allows each user within a cell to use the same radio channel,users in adjacent cells also use
the same radio channel .
Unlike other cellular standards, the user data rate changes in realtime,depending on the
voice activity and requirements in the network
It is designed for use in both domestic and office environments. It is used to provide
telepoint services which allow a subscriber to use CT2 handsets at a public telepoint.
It’s a digital version of 1G analog,cordless telephone.
It offers good speech quality, is more resistant to interference, noise and fading and like
personal telephones,uses a handset with built-in antenna.The digital transmission provides
better security
Some more features:
Standardized on 864-868 MHz.
500 frames/second (alternately base station and handset).
100 kHz carriers.
32 kbit/s ADPCM voice channel compression.
10 mW maximum power output.
GFSK data encoding.
Up to 100 meter (300 ft) range.
It is able to provide voice ,data,video images for indoor and microcell use.
PACS is designed to provide coverage within a 500ms range.The main
objective is to integrate all forms of wireless local loop communication into
one system with full telephone features ,in order to provide wireless
connectivity for local exchange
The usage of a personal access communications system has become increasingly
popular as a way to either augment or replace some other form of communication
with a work or home environment. Because the system requires relatively little
power to function and is capable of interacting with several different devices in
order to send and receive transmissions, the cost savings involved with using this
type of communication process often pays for itself in a short period of time.
Formerly PHP Developed in Japan. For radio systems Debuted in 1995. Offered
two-way communications, data services and Internet access.
PHS is essentially a cordless telephone like DECT, with the capability to handover
from one cell to another. This makes PHS suitable for dense urban areas, but
impractical for rural areas, and the small cell size also makes it difficult if not
impossible to make calls from rapidly moving vehicles
Modern PHS phone support many value-added services such as high speed
wireless data/ Internet connection (64 kbit/s and higher), WWW access, e-
mailing, text messaging and even color image transfer.
In spite of its low-cost base station, micro-cellular system and "Dynamic Cell
Assignment" system, PHS offers higher number-of-digits frequency use efficiency
with lower cost (throughput per area basis), compared with typical 3G cellular
telephone systems
Features:
o PHS cells are small
o With transmission power of base station a maximum of 500 mW
o Range typically measures in tens or at most hundreds of meters (some can range
up to about 2 kilometers in line-of-sight)
o Uses TDMA/TDD for its radio channel access method, and 32 kbit/s ADPCM for its
voice codec.
4G Systems On the horizon are 4G systems that may become available even
before 3G matures (3G is a confusing mix of standards). While 3G is important in
boosting the number of wireless calls, 4G will offer true high-speed data services.
4G data rates will be in the 2-Mbit/sec to 156-Mbit/sec range, and possibly
higher. 4G will also fully support IP. High data rates are due to advances in signal
processors, new modulation techniques, and smart antennas that can focus
signals directly at users. OFDM (orthogonal frequency division multiplexing) is
one scheme that can provide very high wireless data rates.
Q. What are the basic unit of cellular system?
There are various cellular systems in the world, such as the GSM and CDMA. The design of these cellular systems
are complicated but the architecture of most cellular systems can be broken down into six basic components.
There are six basic components that can be found in most cellular systems.
The architecture of most cellular systems can be broken down into the following six components:
A mobile station is basically a mobile/wireless device that contains a control unit, a transceiver and an antenna
system for data and voice transmission. For example, in GSM networks, the mobile station will consist of the mobile
There are three main air interface protocols or standards: frequency division multiple access (FDMA), time division
multiple access (TDMA) and code division multiple access (CDMA). These standards are basically the medium
access control (MAC) protocols that define the rules for entities to access the communication medium.
These air interface standards allow many mobile user to share simultaneously the finite amount of radio channels.
A base station is a fixed station in a mobile cellular system used for radio communications with mobile units. They
consist of radio channels and transmitter and receiver antenna mounted on a tower.
d) Databases
Another integral component of a cellular system is the databases. Databases are used to keep track of information
like billing, caller location, subscriber data, etc. There are two main databases called the Home Location Register
(HLR) and Visitor Location Register (VLR). The HLR contains the information of each subscriber who resides in the
same city as the mobile switching center (MSC). The VLR temporarily stores the information for each visiting
subscriber in the coverage area of a MSC. Thus, the VLR is the database that supports roaming capability.
e) Security Mechanism
The security mechanism is to confirm that a particular subscriber is allowed to access the network and also to
authenticate the billing.
There are two databases used for security mechanism: Equipment Identify Register (EIR) and Authentication Center
(AuC). The EIR identifies stolen or fraudulently altered phones that transmit identity data that does not match with
information contained in either the HLR or VLR. The AuC, on the other hand, manages the actual encryption and
f) Gateway
The final basic component of a cellular system is the Gateway. The gateway is the communication links between two
wireless systems or between wireless and wired systems. There are two logical components inside the Gateway:
The MSC connects the cellular base stations and the mobile stations to the public switched telephone network
The IWF connects the cellular base stations and the mobile stations to Internet and perform protocol translation if
needed.
(2013MIT0016)
Chetan Kadu(2013MIT017)
Computer networking is a very vast and advanced field which has been implemented on many
aspects of technology. In computer networking, there are so many devices which are used for
networking purposes. Wireless technologies really provide the convenient and easy approach to
communications between different areas that are far behind from the different types of the
modern and the latest technologies. Types of wireless technologies were designed by the
scientists because people who are away from their homes, they can avail such opportunity of
using the internet at very high speed and be in touch with others for the sake of their business
enhancement in the best possible ways of communication between two places.
Following are types of wireless technologies
Due to the easy approach to the networks and also in many appliances of the daily life wireless
technologies are of many types and almost all the technologies that are used in the present era for
the sake of better working are designed wirelessly. Some important types of wireless
technologies are as follows
Wifi Technology :
WiFi is commonly called as wireless LAN, it is one of those networks in which high frequency
radio waves are required for transmission of data from one place to another. WiFi operates on
several hundreds feet between two places of data transmission. This technology only works on
high frequency radio signals. Otherwise, it will not work properly. Nowadays this technology is
used as office or home network and in many electronic devices. Wireless LAN or WiFi is
divided into three main parts on which its whole working depends and all of its applications also
depend on these parts i.e. infrastructure mode, ad hoc network and mixed network.
Zigbee technology :
A type of low cost, low power and wireless technology which is used for the different purposes
at ultra low power is known as Zig bee technology. Low power radios on the basis of standard
personal wireless networking are used by a protocol to enhance the technology. It offers
excellent wireless control path network. It was not proposed or designed for the excellent or high
speed data transfer rate applications. But it was designed for working on excellent long battery
timings at low cost and also at ultra low power consumption. It is an ideal technology which
operates at low power and low cost and used for wireless monitoring and control.
Wimax technology :
One of the important wireless technologies another technology is present that is called as Wimax
technology. It is defined as a type of the wireless networking technology that is required to
transmit the information in the form of microwaves through different type of methods of wireless
networking from point to point or multi point access top the devices which are portable in nature.
Wimax technology is categorized into two types that are Fixed Wimax and the mobile Wimax.
Bluetooth technology :
Other important type of wireless technology is the Bluetooth technology that is used to transmit
the data from one device to another device with the help of mobile phone technology.
2012MIT018
Prashant Mandale
Question 1:State the two different types of fading. Define Rayleigh fading.
Answer:
1. In a wireless communication system the signals may travel through multiple
paths between a transmitter and a receiver. This effect is called multipath
propagation.
2. Due to the multiple paths, the receiver of the signal will observe variations
of amplitude, phase and angle of arrival of the transmitted signal.
3. These variations originate the phenomenon referred as multipath fading. The
variations are characterized by two main manifestations (types), large-scale
and small-scale fading.
4. Furthermore these manifestations give rise to specific types of degradations
of the signal. Based on figure 1 presents the fading manifestations and its
associated degradations.
Large-scale fading
Small-scale fading
SMALL-SCALE FADING:
STATISTICS AND MECHANISMS
Answer:
III. Table 1 gives some examples for frequencies used for analog and
digital communication like mobile phones, cordless telephones, wireless
LANs, and other radio frequency(RF) systems for countries in the three
regions representing the major economic power. As you can see, the
frequency bands are mostly used for the wireless communication like radio,
WLANs, some old mobile communication system like NMT. Under these
situations, for the mobile communication the most widely available band is
800 MHz band (850MHz to be precise) . So in US this band was allocated as
per the market requirement for mobile communication. When the same GSM
system was to be implemented in Europe, the European countries preferred
to allocate a standard band for mobile communication. They allocated the
900 MHz & 1800 MHz band for GSM. Our country & most of the countries
followed the European Standards later on. So we have the 900MHz &
1800MHz band allocated to GSM communication in INDIA.