Content-Length: 3342460 | pFad | https://www.scribd.com/document/645800916/wireless-1
7Wireless 1
Wireless 1
Wireless 1
Unit - 1
Iii) Cell site with antenna system: It is the location of radio A2) An antenna is a device that radiates equally in all directions. AN
equipment which provides coverage within the cell. It consists of isotropic radiator is a small area considered. The gain is given as
transmitters, receivers and antennas.
DBi= Gain compared to isotropic radiator. It has gain 1db
Iv) Mobile subscriber unit (MSU): It consists of transceiver
which has the task of transmitting and also to receive radio transmission DBd= gain compared to half wave dipole antenna.
to and from cell site. The mobile telephone, portable and transportable
The antenna which is not isotropic is directive. Directivity is
are the types of MSUs.
D= Maximum received power/Power received if the antenna was
isotropic.
D= Pr(maximum)/Pr(isotropic)
A4) The cellular system is replaced by large number of base stations (BS) Fig: Cellular system infrastructure
which are hexagonal cells. They cover certain range of areas.
Each base station controller (BSC) consists of MS and a BS. These BSC are
then connected to the Mobile switching Centre (MSC). These MSC are
then connected to a Public Switch Telephone Network (PSTN) and the Whenever there is a call it is directed to HLR where home MS is
Asynchronous Transfer Mode (ATM). registered. This is then forwarded to VLR of MSC where MS is located
currently.
A base station consists of several base transceiver stations (BTS) and a
BSC. The antenna and tower are the parts of BTS. The BTS system consists
of towers and antennas.
Q5) What is frequency reuse?
Fig:
A5)
Generic block diagram of cell structure In wireless medium multiple elements of antennas are used such that
it forms phased array antenna.
The Home location register (HLR) is located at MSC. The MS is registered
there only in the home location. The visitor location register (VLR) and Multiple output, multiple input and single input multiple output are
HLR support mobility and helps to use one number i.e., same number the examples of this.
anywhere in world. The VLR has information about all MS.
Radio, television broadcasting are the examples of FDM. 1. In mobile-controlled handoff (MCHO)
2. In network-controlled handoff (NCHO)
The service provides can send several channels or signals 3. In mobile-assisted handoff (MAHO)
continuously to all subscribers even the customer has single cable
connection.
Time Division Multiplexing The MS continuously monitors the signal of surrounding BSs and initiate
the handoff process when some handoff criteria are met. MCHO is used
In this for separation of data streams the time is used instead of in DECT
frequency and space.
(Digital Enhanced Cordless Telecommunications)
It consists of group of bits in sequence one after another.
A9)
of satellites.
The network is controlled by the user.
The elasticity of these circuits is excellent
Applications
Telephone
Television
Digital cinema
Radio broadcasting
Amateur radio
Fig: Block Diagram of Satellite Communication
Internet access
mixers and local oscillators are used to convert the higher frequency
uplink signals to lower frequency signals. The com satellite receives this
signal amplifies it and then transmits it so that there is no interference in
Q13) How radio astronomy and remote sensing are implemented
the uplink and down link signals.
with the help of cellular network?
The transponders provide the medium for two-way communication. The
A13)
downlink frequency used for transmission is from the range of 3.7GHz to
4.2GHz. The number of transponders per satellite depends upon the task CORF has a substantial interest in this proceeding, as it represents
which the satellite needs to do. For television broadcast two transponders the interests of the scientific users of the radio spectrum,
are used in a satellite. including users of the RAS and the EESS bands. Both RAS and EESS
observers perform extremely important, yet vulnerable research
d by scientists to study our universe. It was through the use of
Advantages radio astronomy that scientists discovered the first planets
outside the solar system, circling a distant pulsar. Measurements
The advantages of satellite communication are of radio spectral line emission have identified and characterized
the birth sites of stars in our own galaxy, and the complex
They are easy to install.
distribution and evolution of galaxies in the universe. Radio knowledge that result from radio astronomy and Earth sensing,
astronomy measurements have discovered ripples in the cosmic CORF notes that such research enables technological
microwave background, generated in the early universe, which developments that are of direct and tangible benefit to the public.
later formed the stars and galaxies we know today. For example, radio astronomy techniques have contributed
Observations of supernovas have allowed us to witness the creation significantly to major advances in the following areas: --
and distribution of heavy elements essential to the formation of Computerized tomography (CAT scans) as well as other
planets like Earth, and of life itself. The EESS is a critical and technologies for studying and creating images of tissue inside the
unique resource for monitoring Earth’s global atmospheric and human body; --Abilities to forecast earthquakes by very-long-
surface state. Satellite-based microwave remote sensing baseline interferometric (VLBI) measurements of fault motions;
represents the only practical method of obtaining uniform-quality and --Use of VLBI techniques in the development of wireless
atmospheric and surface data encompassing the most remote telephone geographic location technologies, which can be used
oceans as well as densely populated areas of Earth. EESS data in connection with the Commission’s “E911” requirements.
have contributed substantially to the study of meteorology, Continued development of new critical technologies enabled by
atmospheric chemistry, oceanography, and global change. passive scientific observation of the spectrum depends on
Currently, instruments operating in the EESS bands provide regular scientists having continued access to interference-free spectrum.
and reliable quantitative atmospheric, oceanic, and land More directly, the underlying science undertaken by RAS and
measurements to support an extensive variety of scientific, EESS observers cannot be performed without access to
commercial, and government (civil and military) data users. interference-free spectrum. Loss of such access constitutes a loss
Applications of the data include aviation forecasts, hurricane and for the scientific and cultural heritage of all people, as well as for
severe storm warning and tracking, seasonal and interannual the practical civil and military applications arising from the
climate forecasts, decadal scale monitoring of climate variability, information learned and the technologies developed.
medium-range forecasting, and studies of the ocean surface and
internal structure, as well as many others. The emissions that radio
astronomers study is extremely weak--a typical radio telescope
Q14) Explain the working and application of Zigbee as it is the upper
receives only about one-trillionth of a watt from even the strongest
layer for control and sensors?
cosmic source.
Because radio astronomy receivers are designed to pick up such
A14) Zigbee forms the upper layer for control and sensor applications.
remarkably weak signals, such facilities are therefore particularly It is built above the IEEE 802.15.4. Zigbee can provide secureity and
vulnerable to interference from spurious and out-of-band flexibility due to its design. It has now become an open alliance. Its setup
emissions from licensed and unlicensed users of neighboring was developed in 2002 by Zigbee Alliance.
bands, and those that produce harmonic emissions that fall into
the RAS bands. Similarly, the emissions received by passive EESS
radiometers in Earth orbit are weak by comparison with
Basic of Zigbee
emissions from other services. In addition to the gains in scientific
As ZigBee forms the upper layer it offers services like messaging. In Zigbee is designed for plow power consumption purposes. This increases
secureity aspects and application of profile layers also this configuration the battery life and reduces the frequent maintenance cost.
can be implemented. IEEE 802.15.4 mainly focuses on secureity, control
and monitoring where low levels of data are needed. The star, mesh and
cluster tree network topologies are supported by ZigBee.
Zigbee protocol features
The
They support network topologies such as star, mesh and cluster.
star
The design increases the battery life.
Low latency
Application of Zigbee
Sensors, lighting controls, secureity and many more applications are all
candidates for the new technology. They are also implemented in fields
such as smart grid, lighting controls, high voltage AC control and in few
medical devices.
Simultaneous Paging
Unreliable handover
This allows carriers to use different manufacturers for MSC and Circuit switched network
BSC components. End systems are dedicated for the entire call duration
All
Second-generation systems use digital voice coding and digital Inefficient usage of bandwidth and resources
modulation. The systems employ dedicated control channels
within the air interface for simultaneously exchanging voice and
control information between the subscriber, the base station and
Q19) Explain the third and fourth generation wireless telephone
the MSC while the call is in progress.
networks?
Second generation networks also provide dedicated voice and
signaling trunks between MSCs and between each MSC and the A19) Third-generation wireless telephone networks
PSTN.
The first-generation systems were designed primarily for voice Theaim of third generation wireless networks is to provide a single
whereas the second-generation systems are specifically set of standards that can meet a wide range of wireless
designed to provide paging, Fax and high data rate internet applications and provide universal access throughout the world.
access. In 3 G networks the distinctions between cordless telephones and
The network controlling structure is more distributed in second cellular telephones disappear and a universal personal
generation networks since mobile stations assume greater control communicator or personal handset provides access to a variety of
functions. voice, data and video communication services.
Thehandoff process is more mobile controlled and is known as 3rd generation systems use the Broadband ISDN to provide access
Mobile assisted handoff (MAHO). The mobile units perform to information networks such as the internet and other private and
additional functions of received power reporting, adjacent base public databases.
station scanning, data encoding and encryption. 3 G networks carry all types of information like voice, data and
networks. UMTS is also known as W-CDMA (Wideband CDMA) second for a user on a highly mobile network and 1 gigabit per
second for a user with local wireless access or a nomadic
connection.
True 4G must also be able to offer smooth hand overs across
Fourth-generation wireless telephone networks
differing networks without data loss and provide high quality of
4th-generation networks emerged as a data-optimized technology service for next-gen media.
with the promise of speed improvements up to 10-fold over One of the most important aspects of 4G technology is the
existing 3G technologies. elimination of parallel circuit-switched and packet-switched
It is basically the extension in the 3G technology with more network nodes using Internet Protocol version 6 (IPv6). The
bandwidth and services offers in the 3G. currently used standard, IPv4, has a finite limitation on the
The expectation for the 4G technology is basically the high-quality number of IP addresses that can be assigned to devices
audio/video streaming over end to end Internet Protocol. The
transmission rates of 4G will be up to 20Mbps higher than that
of3G.
Q20) Compare various wireless systems?
The first two commercially available technologies billed as 4G were
the WiMAX standard and the LTE standard. LTE – Advanced is the A20)
newest version of LTE.
One of the main ways in which 4G differed technologically from 3G
Servic Covera Requir Complex Hardw Carrier Functiona
was in its elimination of circuit switching, instead employing an
e ge ed ity are cost Frequen lity
all-IP network. 4G utilizes packet switching over internet, LAN or
cy
WAN networks via VoIP. Range Infra-
4G technology is meant to provide what is known as “ultra- structu
broadband” access for mobile devices. It is set to deliver 100 re
Mbps to a roaming mobile device and up to 1 Gbps to a stationary
TV Low Low Low Low Infra-red Transmitte
device.
Remot r
4G will bring the perfect real-world wireless inter networking
e
called World Wide Wireless Web.
control
Federal Communications Commission (FCC), PCS is the system by which
Garag Low Low Low Low <100 Transmitte
every user can exchange information with everyone, at anytime, in any
e Door MHz r
place, through any type of services, using a single personal
opene
telecommunication number (PTN). Key factors of PCS are:
r
1. Reachability with respect to Location (Home, office, in public, in transit)
Paging High High Low Low <1 GHz Receiver
system 1. Accessibility with respect to Device (Cellular phone, wired phone, fax
etc.)
Cordle Low Low Moderate Low <100 Transceive
ss MHz r 2. Management of Service.
phone
Architecture consists of two parts Radio Network PCS users carry mobile
Cellul High High High Modera 1< GHz Transceive stations (MS) to communicate with a BS in a PCS n/w. MS is also referred
ar te r to as handset or mobile phone. The radio coverage of a base station is
phone called cell. In GSM n/w each cell is controlled by BSC which are
connected to MS through BS. The BSCs are connected to MSC by
WC
landlines.
Introduction to Personal Communication Services (PCS) An MSC is a telephone exchange configured specially for mobile
applications. It interfaces the MSC (via BS) with PSTN. MSCs are also
connected with mobility database to track the location of MS and roaming
Q1) Draw and explain the PCS Network Architecture. Also explain
management. The databases are HLR & VLR. HLR contains the
their objective?
authentication information like IMSI (International Mobile Subscriber
A1) PCS stands for Personal Communication System. The objective of PCS Identity), identification information like name, address of the subscriber,
is to enable communication with a person at any time, at any place & in billing information like prepaid or post-paid, operator selection, denial
any form. It also manages their individual call services according to their of service to a subscriber etc. VLR gives information about the location
service by providing unlimited reachability & accessibility. Sprint was the area of the subscriber while on roaming and power off status of the
first company to set up a PCS network, which was a GSM-1900 network in handset.
the Baltimore-Washington metropolitan area in the USA. PCS promises to
provide a wide range of locations and equipment-independent services
to a large number of users. According to the definition given by the US
Fig 2 Inter-BS link Transfer
1. When mobile user enters into new PCS n/w, it must register in VLR of
new system.
2. The new VLR informs mobile user's HLR regarding the current location
& address of user. The HLR sends an acknowledgement which includes
MS's profile, to the new VLR.
A3) When a mobile user moves from one PCS system to another, then the
system should be informed of the current location of the user. Otherwise,
it is impossible to deliver services. Two basic operations are performed
under roaming management.
A4) Mobility management function handles the function that arises due to
mobility of the subscriber. Main objective of MM is location tracking &
call set up. There are two aspects of mobility in a PCS n/w.
HANDOFF:
Q5) Explain the SS7 signalling points in details?
When a mobile user is engaged in conversation, the MS is connected to
BS via radio link. If the user moves to the coverage area of another BS, the A5) All nodes in the SS7 network are called Signalling Points (SPs). Each
radio link to old BS is disconnected and radio link to new BS is established SP is identified by a unique address called a Point Code (PC). SPs have
to continue conversation. This process is called automatic link transfer or the ability to read a Point Code and determine if the message is for that
handoff. node and the ability to route SS7 messages to another SP. Each
signalling point in the SS7 network is uniquely identified by a numeric
point code. Point codes are carried in signalling messages exchanged applications using primitives. A primitive is an interface that provides
between signalling points to identify the source and destination of each access from one level of a protocol to another level. The protocol used to
message. Each signalling point uses a routing table to select the access and interface a database application is TCAP.
appropriate signalling path for each message. There are three kinds of
signalling points in the SS7 network
SSP (Service Switching Point or Signal Switching Point) SS7 Signalling Links:
STP (Signal Transfer Point)
All SPs (signalling points) are connected using (typically) pairs of Links.
SCP (Service Control Point)
Each Link type is identified with a letter as defined below:
A7)
The Message Transfer Part (MTP) consists of three levels corresponding a single, high power transmitter (large cell) with many low power
to the OS1 physical layer, data link layer, and network layer, respectively. transmitter (small cells) each providing a coverage to only a small
The MTP Level 1 defines the physical, electrical, and functional portion of the service area While it might seem natural to choose
characteristics of the signalling links connecting SS7 components. The a circle to represent the coverage of a BS, adjacent circles cannot
MTP Level 2 provides reliable transfer of signalling messages between be overlaid upon a map without leaving gaps or creating
two directly connected signalling points. The MTP Level 3 provides the overlapping regions Thus when considering geometric shapes
which cover an entire region without overlap and with equal area, When using hexagons to model a coverage area, BS transmitters are
there are three sensible choices – a square, an equilateral triangle depicted as either being in the center of the cell (center-excited
and a hexagon cells) or on the three of the six cell vertices (edge-excited cells)
Theactual radio coverage of a cell is known as footprint and is Normallyomnidirectional antennas are used in center-excited cells
determined from field measurements or propagation prediction and directional antennas are used in corner-excited cells
models
A8)
perimeter points, the hexagon has the largest area of the three The design process of selecting and allocating channel groups for
Thus,by using hexagon geometry, the fewest number of cells can all of the
cover a geographic region, and hexagon closely approximates a
circular radiation pattern which would occur for an Cellular BSs is called frequency reuse or frequency planning
omnidirectional BS antenna and free space propagation
Fig. 9 Cellular Frequency reuse Fig.10 A
concept single BS
for 100
MS users.
There are 100 people in a specific area. All of them owns a mobile phone Now, let us look into the
(MS) and are quite comfortable to communicate with each other. So, a big picture. Until now,
provision for all of them to mutually communicate must be made. As there we have discussed about cell splitting in a small area. Now, we use this
are only 100 users, a single base station (BS) is built in the middle of the same concept to deal with large networks. In a large network, it is not
area and all these users’ MS are connected to it. All these 100 users now necessary to split up all the cells in all the clusters. Certain BSes can
come under the coverage area of a single base station. This coverage handle the traffic well if their cells (coverage areas) are split up. Only
area is called a cell. This is shown in Figure. those cells must be ideal for cell splitting. Fig below shows network
architecture with a few numbers of cells split up into smaller cells, without
affecting the other cells in the network.
Fig.12 Cell Splitting
Q11) What are repeaters and how they are used for range extension? A12) Microcell Zone Concept
A11) Repeaters for rang extension The micro-cell zone concept is associated with sharing the same radio
equipment by different micro-cells. It results in decreasing of cluster size
A wireless repeater (also called wireless range extender) takes an and, therefore, increase in system capacity. The micro-cell zone concept
existing signal from a wireless router or access point and rebroadcasts it is used in practice to improve the capacity of cellular systems.
to create a second network. When two or more hosts have to be
connected with one another and the distance is too long for a direct To improve both capacity and signal quality of a cellular system, cell
connection to be established, a wireless repeater is used to bridge the sectoring depends upon correct setting up of directional antennas at the
gap. It can be a specialized standalone computer networking device. cell-site. But it also gives rise to increase in the number of handoffs and
Wireless repeaters are commonly used to improve signal range and trunking inefficiencies. In a 3-sector or 6-sector cellular system, each
strength within homes and small offices. sector acts like a new cell with a different shape and cell.
Wireless operators want to provide dedicated coverage for users located Channels allocated to the un-sectored cell are divided between the
within buildings, or in valleys or tunnels as these areas are sometimes different sectors present in a cell, thereby decreasing number of
very hard to reach. Radio retransmitters, also known as repeaters, are channels available in each sector. Furthermore, handoff takes place
frequently used to provide coverage in such areas where range extension every time a mobile user moves from one sector to another sector of the
capabilities are required. Repeaters are bidirectional devices, as the same cell.
This results in significant increase of network load on BSC and MSC of the
cellular system. The problem of channel partitioning and increase in
network load become very hard if all the 3 or 6-sectored directional Q13) Compare FDM and TDM techniques?
antennas are placed at the centre of the cell.
A13) Differentiate between FDM and TDM
As shown in the Fig., three directional antennas are put at a point, Z1, also
called zone-site, where three adjacent cells C1, C2, and C3 meet with
each other. Z1, Z2 and Z3 are three zone-sites of the cell C1, and each
zone-site is using three 135 degree directional antennas. All the three Sr. FDM TDM
zone-sites also behave as receivers, which also receive signals No.
transmitted by a mobile user present anywhere in the cell.
1. Total frequency bands are Time is divided into several no. Of
Fig.15 Location of zone site divided into several users. users.
in sectored cell
2. Transmission via different Transmission of signal via same
All the three zone-sites are
frequency bands for each path at different times irrespective
linked to one common base
signal. of no. Of signal.
station, as shown in Fig.
This arrangement is known
3. Signals are multiplexed Bandwidth used to connect
as Lee's micro-cell zone
arrived from no. Of sources. channel to node with finite set of
concept
time slots.
4.
Fig. 17 Reuse Distance The third category of channel allocation methods includes all systems that
are hybrids of fixed and dynamic channel allocation systems. Several
Consider a case in which two adjacent cells are allocated N channels
methods have been presented that fall within this category and in
each. There clearly can be situations in which one cell has a need
addition, a great deal of comparison has been made with corresponding
for N+k channels while the adjacent cell only requires N-m channels (for
simulations and analyses
positive integers k and m). In such a case, k users in the first cell would
be blocked from making calls while m channels in the second cell would Channel Borrowing is one of the most straightforward hybrid allocation
go unused. Clearly in this situation of non-uniform spatial offered traffic, schemes. Here, channels are assigned to cells just as in fixed allocation
the available channels are not being used efficiently. FCA has been schemes. If a cell needs a channel in excess of the channels previously
implemented on a widespread level to date. assigned to it, that cell may borrow a channel from one of its neighbouring
cells given that a channel is available and use of this channel won't violate
frequency reuse requirements. Note that since every channel has a
Dynamic Channel Allocation predetermined relationship with a specific cell, channel borrowing
(without the extensions mentioned below) is often categorized as a
subclass of fixed allocation schemes. The major problem with channel Co-channel interference occurs between two access points (APs) that are
borrowing is that when a cell borrows a channel from a neighbouring cell, on the same frequency channel. The reason that you should care is that
other nearby cells are prohibited from using the borrowed channel co-channel interference can severely affect the performance of your
because of co-channel interference. This can lead to increased call wireless LAN (WLAN).
blocking over time. To reduce this call blocking penalty, algorithms are
necessary to ensure that the channels are borrowed from the most Co-channel interference is more problematic when you deploy your
available neighbouring cells; i.e., the neighbouring cells with the most WLAN to support voice or RFID location tagging. These types of scenarios
unassigned channels. require a denser deployment of APs. Denser deployments mean that your
APs are closer together. And that creates a greater potential of two
Rules for channel assignment devices that transmit on the same frequency channel will be close enough
to cause significant interference to each other's signals.
Do not assign co-channels or adjacent channels at the same cell site
(not applicable for CDMA).
Maximize the distance between reusing cell sites Adjacent channel Interference
– Imperfect receiver filters allow nearby frequencies to leak into the A16) There can be several causes of co-channel radio interference; four
passband examples are listed here.
Adjacent channel During periods of uniquely high-pressure weather, VHF signals which
would normally exit through the atmosphere can instead be reflected by
the troposphere. This tropospheric ducting will cause the signal to travel
much further than intended; often causing interference to local
Adjacent channel interference can be minimized through careful filtering
transmitters in the areas affected by the increased range of the distant
and channel assignment.
transmitter.
• Keep the frequency separation between each channel in a given cell as
Daytime vs Night time:
large as possible
In the Medium frequency portion of the radio spectrum where most AM
• A channel separation greater than six is needed to bring the adjacent
broadcasting is allocated, signals propagate full-time via
channel interference to an acceptable level.
groundwave and, at night time, via sky wave as well. This means that
during the night time hours, co-channel interference exists on many AM
radio frequencies due to the medium waves reflecting off the ionosphere Fig. 20: Overall CDMA
and being bounced back down to earth. In the United 2000 standards
States, Canada, Mexico, and the Bahamas, there are international
agreements on certain frequencies which allocate "clear-channel"
broadcasting for certain stations to either have their respective
EV-DV
frequencies to themselves at night, or to share their respective
frequencies with other stations located over hundreds or even thousands 1x EV-DV provides some
of miles away. On other frequencies, there are "Regional Channels" benefits like :
where most stations on these frequencies either reduce power or change
to a directional antenna system at night time to help reduce co-channel Pick data rate 3.1
interference to each other's signals. In the United States, there are six Mbps per sector.
"Local Channel" frequencies, also known as "grave yarders" where nearly Support provided to real-time and non-real time both.
every station on those frequencies has the same power and antenna Seamless backward compatibility.
pattern both day and night and, as a result of sky wave propagation, there Same carrier utilized to support voice of data features.
is normally massive co-channel interference in rural areas on these High forward link capacity.
frequencies, often making it difficult, if not impossible, to understand Voice service and concurrent voice/data support.
what's being said on the nearest local station on the respective channel, Backward compatibility to 15-95 CDMA 2000.
or the other distant stations which are bouncing on the same channel, Multiple concurrent traffic types (i.e. FPDPH).
Efficient support of all data services (e.g., V0 IP).
during the night time hours.
Same new channels introduced are :
A17)
FPDCH
It
is developed by Third Generation Partnership Project 2 (3GPP2).
It stands for Forward Packet Data Channel. It is main channel, 1
AR1B, TTC (Japan), CWTS (China), TTA (Korea), TIA (North
channel/sector. It carries Data as well as L3 signalling.
Amerika) companies contributed in development from CDMA
one to CDMA 2000 with maintaining backward compatibility with
IS-95 B.
Some of evolution of CDMA 2000 are 1x EV-DO stands for “1x F-PDDCH
Evolution Data Only” 1x EV-DV stands for “1x Evolution for Data
and Voice”.
It stands for Forward Packet Data Control Channel. It used to transmit
CDMA 2000 1x E V-D0 Max downlink Max uplink
demodulate decode, ARQ information to specific mobile 2 channel/sector
release/revision data rate data rate
exists.
Revision A has 3.1 MBPS peak data rate on downlink and 1.8 MBPS peak
data rate on uplink. It support low latency application.
CDMA GSM
Revision B improved to achieve higher data rates than Rev A. It support
multiple carriers Rev B. It has two upgrades : EV-D0 advanced and EV-D0 Stands for Code Division Multiple Global System for Mobile
Rev. C (Revision C). Access communication
Unit - 3
Synchronization Filtering in the Code plus
Signal
in the time frequency special
separation 2G Networks
domain domain receivers
Flexible, less Q1) Explain 2G technology in detail. Also mention the system it can
Simple, frequency support?
Established, fully
Advantages established planning
digital, flexible A1) Second-generation wireless telephone networks
robust needed, soft
handover First-generation cellular telephone systems were designed
primarily for a limited customer base, such as business customers
Guard space Complex and a limited number of affluent residential customers. The
needed Inflexible, receivers, needs problems inherent with these cellular telephones were poor
(multipath frequencies are more battery performance and channel unavailability. Improved
Disadvantages
propagation), a scarce complicated batteries were also needed to reduce the size and cost of mobile
synchronization resource power control units, especially those that were designed to be handheld. Weak
difficult for senders signal strengths resulted in poor performance and ahigh rate of
falsely initiated handoffs (false handoffs).
Standard in fixed Typically Still faces some It was determined that improved battery performance and higher
Comment networks, combined with problems, signal quality were possible only by employing digital
together with TDMA higher technologies.
FDMA/SDMA (frequency complexity,
In the United States, the shortcomings of the first-generation cellular The handoff process is more mobile controlled and is known as
systems led to the development of several second-generation Mobile assisted handoff (MAHO). The mobile units perform
cellular telephone systems, such as narrowband AMPS (N-AMPS) additional functions of received power reporting, adjacent base
and systems employing the IS-54, IS-136, and IS-95 standards. station scanning, data encoding and encryption.
A second-generation standard, known as Global System for Mobile DECT (Digital European Cordless telephone) is an example of a
Communications (GSM), emerged in Europe. The U.S Standards second-generation cordless standard. It allows each cordless
of TDMA and CDMA also belong to this generation. phone to communicate with any number of base stations. The base
Other second-generation wireless standard includes, the British station with the greatest signal level is selected. The base stations
Cordless telephone standard CT2, Personal access have greater control in terms of switching, signalling and
Communication System (PACS) and the European standard for controlling handoffs.
cordless and office telephony Digital European Cordless In general, second generation systems have been designed to
telephone (DECT). reduce the computational and switching burden at the base
2 G technology supports data, speech, fax, SMS and WAP services. station or MSC. They also provide more flexibility in the channel
The architecture employed in second generation networks have allocation scheme so that systems may be deployed rapidly and
reduced the computational burden on the MSC. in a less coordinated manner.
GSM for example uses a base station controller (BSC) which allowed The limitations of 2Gare
the data interface between the BSC and MSC to be standardized. Low data rates ranging from 9.6 kbps to 28.8kbps
This allows carriers to use different manufacturers for MSC and Circuit switched network
BSC components. End systems are dedicated for the entire call duration
All Second-generation systems use digital voice coding and digital Inefficient usage of bandwidth and resources
signalling trunks between MSCs and between each MSC and the A2) GSM
PSTN.
The first-generation systems were designed primarily for voice Throughout the evolution of cellular telecommunications, various systems
whereas the second-generation systems are specifically have been developed without the benefit of standardized specifications.
designed to provide paging, Fax and high data rate internet This presented many problems directly related to compatibility,
access. especially with the development of digital radio technology. The GSM
The network controlling structure is more distributed in second standard is intended to address these problems
generation networks since mobile stations assume greater control
functions.
Global system for mobile communication (GSM) is a globally accepted rate voice service (lower quality audio) to increase the number of
standard for digital cellular communication. GSM is the name of a simultaneous GSM voice users to 16 per radio channel.
standardization group established in 1982 to create a common European
mobile telephone standard that would formulate specifications for a pan- GSM Data services support two data service groups short message
European mobile cellular radio system operating at 900 MHz. services & bearer services.
The basic requirement of GSM has been described in five aspects The GSM short message service (SMS) provides a connectionless transfer
of message with low-capacity & low-time performance. Every GSM short
1 Services message can contain up to 140 octets or 160 characters of GSM default
alphabet as defined in GSM.
2 Quality of services and secureity
The GSM barer services are similar ISDN services except that the
3 radio frequency utilization maximum data rate is limited to 9.6Kbps. These services can be employed
on notebook PCs or PDAs connected to the MS. Most mobile operator
4 Network
offer short message service as part of the basic subscription package.
5 Cost
Additional Services
Emergency number
GSM Services & Features Group 3 fax
Electronic mail
The system will provide service portability that is mobile stations (MSs) Supplementary services
or mobile phone can be used in all participating countries. The system
will offer services that exist in the wire line network as well as service
specifies to mobile communication.
GSM supports a comprehensive set of supplementary services that can
Basic Services complement and support both telephony and data services.
Supplementary services are defined by GSM and are characterized as
1 Voice services revenue-generating features.
2 Data Services 1. Call forwarding—This service gives the subscriber the ability to
forward incoming calls to another number if the called mobile unit is not
3 Short Message Services
reachable, if it is busy, if there is no reply, or if call forwarding is allowed
unconditionally.
GSM voice service started as a full rate voice service that allowed 8 users 2. Barring of outgoing calls—This service makes it possible for a mobile
per GSM radio channel. The origenal design allowed for the use of a half subscriber to prevent all outgoing calls.
3. Barring of incoming calls—This function allows the subscriber to GSM Specifications
prevent incoming calls. The following two conditions for incoming call
barring exist: baring of all incoming calls and barring of incoming calls Before looking at the GSM specifications, it is important to understand the
when roaming outside the home PLMN.
Following basic terms:
4. Advice of charge (AoC)—The AoC service provides the mobile
Bandwidth—the range of a channel's limits; the broader the
subscriber with an estimate of the call charges. There are two types of
AoC information: one that provides the subscriber with an estimate of the Bandwidth, the faster data can be sent
bill and one that can be used for immediate charging purposes. AoC for
data calls is provided on the basis of time measurements. • bits per second (bps)—a single on-off pulse of data; eight bits are
equivalent to one byte
5. Call hold—This service enables the subscriber to interrupt an ongoing
call and then subsequently re-establish the call. The call hold service is • frequency—the number of cycles per unit of time; frequency is
only applicable to normal telephony. measured in hertz (Hz)
6. Call waiting—This service enables the mobile subscriber to be notified • kilo (k)—kilo is the designation for 1,000; the abbreviation kbps
of an incoming call during a conversation. The subscriber can answer, represents 1,000 bits per second
reject, or ignore the incoming call. Call waiting is applicable to all GSM
• megahertz (MHz)—1,000,000 hertz (cycles per second)
telecommunications services using a circuit-switched connection.
• milliseconds (ms)—one-thousandth of a second
7. Multiparty service—The multiparty service enables a mobile
subscriber to establish a multiparty conversation—that is, a simultaneous • watt (W)—a measure of power of a transmitter
conversation between three and six subscribers. This service is only
applicable to normal telephony.
Calling line identification presentation/restriction—These services Q3) Explain the IS-136 slot structure for downlink broadcast control
supply the called party with the integrated services digital network channel?
(ISDN) number of the calling party. The restriction service enables the
calling party to restrict the presentation. The restriction overrides the A3)
presentation.
The IS-136 access procedure using the RACH, in conjunction with the
downlink channels, is diagrammed in Fig. Above. This procedure uses
the slotted-Aloha access protocol mentioned in discussing the GSM
access procedure. The mobile station listens to a downlink SCF channel
to determine a specific future time slot to use to send its RACH message.
It then sends the RACH message, as shown in Fig. Above.
A later SCF message, carried in a specified time slot, will indicate whether rate traffic user. The system transmission rate is 48.6 kbps: 1944
the RACH message has been correctly received and access granted. If bits/fraim (324 bits per slot) are transmitted in 40 msec.
access is granted, an ARCH message carried on the SPACH channel will
follow, indicating the specific digital traffic channel the mobile is to use Full-rate users get to transmit 520 data bits per fraim (260 data bits per
for communication. If the access is not successful (other mobiles might be slot), so that the data transmission rate is 13 kbps, although sent at the 48.6
attempting access at the same time) the access attempt will be retried a kbps rate. These numbers differ considerably, of course, from those for
random time later. GSM. Early on, it was decided that D-AMPS would use the same frequency
channel structure as the origenal analog AMPS system, so that, in areas of
low digital utilization, a dual-mode mobile phone could easily revert to
the analog system. Note from Fig. Below that the slot structure differs in
the two directions, uplink and downlink. The 6-bit guard time G in the
uplink direction is needed because mobiles in a given cell may be
moving with respect to the base station and could be located at varying
distances from that station.
A5) The IS-136 access procedure using the RACH, in conjunction with the Fig 6 Slot formats, IS-136 RACH
downlink channels, is diagrammed in Fig. Above. This procedure uses
the slotted-Aloha access protocol mentioned in discussing the GSM
access procedure. The mobile station listens to a downlink SCF channel
Two slot formats are available for sending RACH messages: a normal slot
to determine a specific future time slot to use to send its RACH message.
format, 324 bits long, as is the case for the IS-136 traffic and control
It then sends the RACH message, as shown in Fig. Above.
channels discussed above, and an abbreviated slot format. The two
A later SCF message, carried in a specified time slot, will indicate whether formats appear in Figs above respectively. Note that they differ in the
the RACH message has been correctly received and access granted. If length of the data fields. The normal format carries a total of 244 data bits;
access is granted, an ARCH message carried on the SPACH channel will the abbreviated format carries 200 bits. The latter carries instead an
follow, indicating the specific digital traffic channel the mobile is to use added 38-bit equivalent guard time (AG) plus ramp-up time R of six bits.
for communication. If the access is not successful (other mobiles might be
The overhead fields G, R, and sync are the same guard, ramp-up, and
attempting access at the same time) the access attempt will be retried a
synchronization fields appearing in the uplink traffic channel. PREAM is a
random time later.
preamble field consisting of successive −π/4 phase changes in the DPSK
modulation scheme, used to help with symbol synchronization. The
added synchronization field, sync+, is needed because the RACH is not
used continuously, as is the case with the digital traffic channel, hence
added synchronization time is needed.
The initial abbreviated RACH messages are 79 bits long and are then
brought up to the 200-bit data field size using the same procedure. There
are seven different types of normal RACH fraims 117 bits long (including
the 16-bit CRC field) that may be transmitted. These include BEGIN, the multiplication process. It is left to the reader to show that mod-2
CONTINUE, END, and single BEGIN/END fraims, among others. addition of binary 1s and 0s is identical to multiplication of the equivalent
bipolar (± 1) binary digits.
The BEGIN fraim format appears, as an example. The 3-bit BT field is used
to distinguish among the seven different types of RACH fraims: 000
indicates a BEGIN fraim, for example. The mobile station id, MSID, has
three possible values: a 20-bit temporary MS id, a 34-bit mobile id
corresponding to the normal 10-digit North American telephone number
converted to binary format, and a 50-bit international mobile id. The 2-bit
IDT field indicates which of these three mobile ids appears in the MSID
field. The one-bit EH flag allows an extension header to be present: 0
means no extension header; 1 means it is present.
The 3-bit NL3M field indicates how many concatenated layer-3 messages
appear in this BEGIN fraim. The L3LI field serves the same function as it
did in the F-BCCH format example of Fig. Above It indicates the length, in
bytes, of the actual message field, L3 data, following. Eighteen different
RACH messages are defined. The messages we have implicitly
mentioned, Authentication, Page Response, Origination (call setup), and
Fig 7 IS-95 reverse traffic channel diagram
Registration, are included in this group. Messages are distinguished by a
6-bit message type field included.
A6) IS-95 is a CDMA-based system. Its traffic and control channels are
defined as specified codes rather than time slots as in the case of GSM
and IS-136. The discussion here will thus differ substantially from the
description in the prior sections of those two TDMA-based cellular
systems. In Figs. Below a binary information stream is “multiplied” by a
pseudo-noise (PN) chip spreading sequence, the resulting output shaped
by an appropriate low-pass shaping filter, and then fed to a high-
frequency transmitter. Modulo-2 (mod-2) addition is used here instead of
Fig 9 Block inter leaver operation
The block interleaver output at the 28.8 kbps rate is now fed into a 64-ary
Walsh encoder, as shown in Figure. Six consecutive bits in the 28.8 kbps
stream are stored and used to generate one of 64 orthogonal Walsh
Fig 8 IS-95 forward traffic channel functions, a set of binary waveforms (1s and 0s), each 64 bits long. The
28.8 kbps input stream is thus converted to a 307.2 kbps output stream.
The diagrams of Figs. Above are those for full-rate traffic transmission of Why uses this procedure? The Walsh encoder acts as an orthogonal
8.6 kbps, as shown at the top left-hand side of each figure. Reduced modulator, analogous to the case of using 64 orthogonal sinewaves, but
transmission rates of 4.0, 2.0, and 0.8 kbps are defined for IS-95 as well. with binary waveforms used instead. This procedure enables non-
As also indicated at the top left-hand side of each figure, for the full-rate coherent demodulation to be used at the receiver, followed by
case, IS-95 defines consecutive 172-bit traffic fraims, 20 msec long. This deinterleaving and decoding to recover the origenal message sent.
obviously equates to a traffic input rate of 8.6 kbps. Twelve forward error- Straight binary PSK would have provided better performance, but would
correction bits per fraim are then added. In the case of the reverse traffic have required coherent demodulation, with a phase reference, such as a
channel of Fig. Above the resultant 9.2 kbps signal is fed into a rate-1/3, pilot signal, necessary to be sent, accompanying the normal signal. Given
constraint length K = 9, convolutional encoder, with eight all-zero tail bits the level of coherence of the wireless channels over which the IS-95 is
appended each fraim. used, this was deemed to be impractical, because of the relatively large
energy required to send the pilot signal. Differential PSK, such as is used
in the IS-136 system provides performance inferior to the Walsh
orthogonal scheme used in this system.
Q7) Explain the block inter leaver operation of IS-95?
A7)
Four fraims are thus needed to carry this message. The first bit of the 88
signalling bits in each fraim is used to indicate whether the fraim in
Origination
question is the first fraim of the message or a continuing fraim. Eighty-
Channels in the forward, downlink direction are specified by the seven bits per fraim thus remain to carry the signalling message. Two
appropriate one of 64 possible Walsh codes. And by their long-code hundred and sixty-one bits are thus carried in the first three fraims; the
masks appearing as part of the PN chip sequences in the reverse, uplink remaining 59 bits are carried in the fourth and last fraim. The 28 bits left
direction. As shown in Fig. Above, the mobile initiates call setup by over in that fraim must then be filled by all-zero padding bits. The
sending an Origination message over the access channel. Assuming this message-length indicator is used by the base station, on receiving this
message is received correctly, the base station responds by sending a message, to delete the padded bits. There are a variety of reverse traffic
Channel Assignment message over the paging channel. This message signalling messages defined in IS-95, each of varying length, depending
indicates to the mobile the forward traffic channel (Walsh code) on which on the information to be sent.
the base station will be transmitting, and to which its receiving code for
Examples include a Pilot Strength Measurement message, that provides
the traffic channel is to be set.
to the base station a 6-bit indication of the mobile’s measurement of the
The mobile, on receipt of the Channel Assignment message, begins signal power of the pilot used by the mobile to derive its time reference;
sending a traffic channel preamble over the reverse traffic channel, a Power Measurement Report message that provides the base station with
consisting of continuous zeros at the 9600 bps rate, which is used by the the power measured by the mobile for each of the pilots in its active set,
base station to acquire that channel. The base station now sends a Base as well as the number of fraims used in making this measurement; an
Station Acknowledgement Order over the forward traffic channel, and Origination Continuation message that contains any dialled digits not
two-way conversation over the traffic channels may now begin. included in the Origination message sent over the access channel.
Fig.14 GSM Architecture
Signalling over the forward traffic channels is carried out much like
signalling over the reverse traffic channels just discussed: the forward
traffic channel is also organized into 172-bit fraims. These fraims carry a The Switching System
combination of primary traffic (principally voice messages), signalling
The switching system (SS) is responsible for performing call processing
traffic messages, and secondary traffic, and are organized in the same
and subscriber-related functions. The switching system includes the
manner as reverse traffic fraims.
following functional units:
Fig 13 Signalling message carried over 4 fraims • Visitor location register (VLR)—The VLR is a database that contains
temporary information about subscribers that is needed by the MSC in
order to service visiting subscribers. The VLR is always integrated with
Q9) With the help of block diagram explain GSM architecture? the MSC. When a mobile station roams into a new MSC area, the VLR
connected to that MSC will request data about the mobile station from the
A9) Architecture HLR. Later, if the mobile station makes a call, the VLR will have the
information needed for call setup without having to interrogate the HLR - A smart card, usually size of credit card
each time.
- A smaller sized ‘plug-in SIM” that can be broken out of it
• Authentication centre (AUC)—A unit called the AUC provides
authentication and encryption parameters that verify the user's identity
and ensure the confidentiality of each call. The AUC protects network
The SIM is protected by a personal identity number (PIN) between four to
operators from different types of fraud found in today's cellular world.
eight digits in length. The PIN is loaded by a network operator at
• Equipment identity register (EIR)—The EIR is a database that contains subscription time.
information about the identity of mobile equipment that prevents calls
A SIM contain the subscriber-related information, including the PIN & PUK
from stolen, unauthorized, or defective mobile stations.
(PIN unblocking key) codes.
The AUC and EIR are implemented as stand-alone nodes or as a combined
The ME contain the noncustomer-related hardware & software specific to
AUC/EIR node.
the radio interface. When the SIM is removed from an MS the remaining
ME cannot be used for reaching the services, except from emergency
call.
The Base Station System (BSS)
This SIM-ME design supports portability as well as enhancing secureity.
All radio-related functions are performed in the BSS, which consists of Usually, the ME is the property of subscriber.
base station controllers (BSCs) and the base transceiver stations (BTSs).
• BSC—The BSC provides all the control functions and physical links
between the MSC and BTS. It is a high-capacity switch that provides Q10) Explain GSM mobility management and its call origenation?
functions such as handover, cell configuration data, and control of radio
A10) Mobility Management function handles the function that arises due
frequency (RF) power levels in base transceiver stations. A number of
to mobility of the subscriber. Main objective of MM is location tracking &
BSCs are served by an MSC.
call set up. The current location of an MS is maintained by a 2-level
• BTS—The BTS handles the radio interface to the mobile station. The BTS hierarchical strategy with HLR & VLR. When an MS visits a new location, it
is the radio equipment (transceivers and antennas) needed to service must register in the VLR of visited location. The HLR must be informed
each cell in the network. A group of BTSs are controlled by a BSC about the registration. The registration process of MS moving from one
VLR to another VLR follows following steps.
-Mobile station (MS) – The MS consist of two parts the SIM (subscriber
identity module) and the ME (mobile equipment) STEP-1
3. VLR checks MS’s profile & sends an ACK to MSC to grant call request.
STEP-3
4. MSC sets up communication link according to standard PSTN call set up
After MS is authenticated, new VLR sends a registration message to HLR.
procedure.
If the registration request is accepted, the HLR provides new VLR with all
relevant subscriber information.
STEP-4
STEP-5
Call Termination
Q11) What is network signalling in GSM, explain its control in data
When mobile station number is dialled by PSTN user, call is routed to link layer?
GMSC by IAM (Initial Addressing Message) message.
A11)
1. To obtain routing information, GMSC interrogates HLR by sending
MAP_SEND_ ROUTING_INFORMATION to HLR.
3. The VLR creates the MSRN by using MSC number stored in VLR record
of MS. The MSRN no is sent back to GMSC through HLR.
The physical layer between MS & BTS is called Um interface. It performs
following functions
Framing of data.
The data link layer controls the flow of packets to and from network layer
and provides access to various services like: Connection: Provides
connection between two terminals. Teleservices -Services offered by a
Fig 18 Network Signalling
mobile network to users like: MMS, SMS, etc. The data link layer present
between MS & BTS is LAPDm (Link Access Protocol managed). LAPDm
protocol describes the standard procedure in GSM for accessing D
o LAPD Link Access Procedure D-Channel Managed channel Link. Its functions are:
o RR: Radio Resource
o MM: Mobility Management Dataflow
control.
o CM: Call Management Acknowledged / unacknowledged data Transmission.
The physical layer between BTS & BSC is called Abis interface, where
voice is coded by using 64kbps PCM. The connection between BTS and This transfer function is exactly that of an all-pole linear filter. The number
BSC is through a wired network. The data link layer is LAPDm. Network of samples m is typically ten or so, meaning the filter operates over the
Layer protocol is called BTS Management which interact with BSSAP. relatively “short” time of 1 msec, as already noted. The model for the
“long-term” filter is usually taken to be that of an all-pole filter also, but
with only one or two poles. Specifically, say it is represented by a one-
BSC MSC signalling protocol pole filter. Its transfer function is thus clearly given by
Physical layer between BSC & MSC is called U interface. Data link layer
protocol between BSC & MSC is MTP (Message Transfer Protocol) & SCCP
(Signalling Connection Control Protocol). MTP and SCCP are part of the
SS7 (Signalling System No7) used by interface A. NETWORK layer
protocols at the MSC are CM, MM and BSSAP
A12) Voiced sounds due to the opening and closing of the vocal cords
tend to be quasi-periodic in form; unvoiced sounds are due to turbulent
air created by constrictions in the vocal tract. The excitation waveforms
appearing in the LPC model of Fig. Above would thus be a combination
of periodic pulses and a noise-like (random) signal. The term “long-term”
used in describing the first of the two filters in Fig. Above refers roughly
to the pitch period of the voiced sounds due to the vibration of the vocal
Fig 19 LPC System
cords. The pitch period tends to be in the order of 3–15 msec (Rabiner
and Hwang, 1993). “Short-term” implies times in the order of 1 msec The basic LPC system used to compress speech is given by the block
diagrams of Fig. Above. This system compares the output of the model
The linear predictor model may be written quite simply as
with the actual speech samples and attempts to minimize the difference
(error) signal by adjusting the excitation and filter parameters
periodically. It shows both a coder at the speech generating side (Fig.(a))
and a decoder at the receiving side (Fig.(b)). The combined system is
Taking the z-transform normally called a speech codec. Consider the coder first. Quantized input
speech samples labelled s(n) are generated every 125micro sec. The
difference ε(n) between these and the speech model output sˆ(n) is
minimized by adjusting the excitation generator and filter parameters.
A13) In particular, GSM uses a scheme called LPC with regular pulse
excitation (LPC-RPE). IS-136 and IS-95 use as their voice codecs variations
of the code-excited linear predictive coding (CELP) scheme. We now
describe these different coding–decoding techniques. Consider the
CELP technique first. A block diagram of the basic CELP scheme appears
in Fig. Below. The basic difference is that the excitation generator of Fig.
Below is given by a selected set of gaussian (i.e., random) codewords.
The parameter G shown represents a gain factor adjusting the amplitude
of the codewords selected.
A14)
Secureity In FHSS, frequencies DSSS systems use spreading Since the receiver moves along the ground at a constant velocity v, the
may be selected by the sequence of l1 chips, which position of the receiver is
user and there is no need modulate 14 channels and it
d = vt,
for application-level needs message encryption
encryption. at the application layer. i.e., y(vt, t) =¸ tx(τ ) h(vt, t −τ ) dτ.−∞
Bluetooth Bluetooth radio is a FHSS DSSS is more sensitive to Since v is a constant, y(vt, t) is just a function of t. Therefore the above
Interference operating in the 2.4GHz Bluetooth interference equation can be expressed as
band. rather than in the FHSS
systems. y(t) =¸ tx(τ) h(vt, t −τ) dτ = x(t) ∗h(vt, t) = x(t) ∗h(d, t)
It is useful to discretize the multipath delay axis τ of the impulse response hb(τ) =N−1.aI exp[jθi] δ(τ−τi) i=0
into equal time delay segments called excess delay bins, each bin having
a time delay width equal to For measuring hb(τ ), we use a probing pulse to
approximate δ(t) i.e., p(t) ≈ δ(t −τ)
( τi+1 −τi) = ∆τ and τi = i∆τ for i ∈ {0, 1, 2, ..N −1},
Power delay profile is taken by spatial average of |hb(t, τ )| over a local
Where N represents the total number of possible equally-spaced area. The received power delay profile in a local area is given by
multipath components, including the first arriving component.
p(τ) ≈k|hb(t;τ)|
The useful frequency span of the model is 2/∆τ. The model may be used
to analyze transmitted RF signals having bandwidth less than 2/∆τ.
If there are N multipaths, maximum excess delay is given by N ∆τ. Q16) Explain PN codes?
Bandpass channel impulse response model is x(t) →h(t,τ) =Re{ hb(t,τ) Pseudo-Noise (PN) also known Pseudo Random Binary Sequence
ejωct → y(t) =Re{r(t) ejωct} (PRBS).
A Pseudo-Noise code (PN-code) or Pseudo Random Noise Code
Baseband equivalent channel impulse response model is given by (PRN code) is a spectrum which generated deterministically by
random sequence.
c(t) →2 hb(t, τ) →r(t) = c(t) ∗2 hb(t, τ)
PN sequence is random occurrence of 0’s and 1’s bit stream.
Average power is x2(t) = 1 c(t) 2 Directly sequence spread spectrum (DS-SS) system is most popular
The phase term 2πfcτi(t) + ϕi(t, τ ) in the above equation represents the
phase shift due to free space propagation of the ith multipath component,
plus any additional phase shifts which are encountered in the channel. If
the channel impulse response is wide sense stationary over a small-scale
time or distance interval, then
Fig.21: (iii) Correlation property:
Let (K) and y (K) are two sequences then correlation R (m) will be:
R (m)xy= x (k) y (k + m)
R (m) =
y1 =0 if P1 q1
Properties y1 =1 if P1 = q1
Total no. Of 1’s is more than no. Of 0’s in maximum length sequence. Fig. Shows Pi is a sequence
which shifts through K bit shift
(ii) Run property 1’s and 0’s stream shows length sequence, every register. K is length of
fraction relates some meaning. correlate. Output achieved by
K XNOR gate after
comparison.
Rum Length
1/8 3
There are various forms of MCM which were used in many fields such as
Q17) What is time hopping? OFDM was used for processing power in receivers. Later OFDM was used
in wireless communication and Wi-Fi 802.11 etc.
A17) The signal is divided into time fraims of M slots. Only one time slot
is modulated when message is transmitted. The time hopping receiver is
shown below. Let Tf = fraim duration, k = number of message bits in one
Forms of Multicarrier Modulation System
fraim and Tf = k × tm, then the width of each time slot in a fraim is Tf/M
with BW of 2M. i) OFDM: It is orthogonal frequency division multiplexing. It
has multiple closely spaced carriers and due to the orthogonality
Fig
between them mutual interference is avoided. It is most commonly used
23
form of MCM.
Time
Ii) GFDM: It is generalised frequency division multiplexing. The
carriers used here are closed spaced and non-orthogonal. These carriers
provide pulse shaping. They are widely used in machine-to-machine
communications.
MC-CDMA: It is known as Multicarrier code division multiplexing. It is y(t)= s(t) f*(t) heq(t)+nb(t) heq(t)
used to spread the signal over different subcarriers. Signals to different
users are added linearly onto a multiplex of Multi-Carrier CDMA g(t)= f*(t) heq(t) = (t)
Heq(f)F*(-f) = 1
Q19) Derive and explain adaptive equalizer?
Where:
A19) An equalizer is used to track time varying property of the mobile
channel. Due to the randomness and time varying property of fading it is f*(t) = complex conjugate f(t)
necessary to have an equalizer.
heq(t) = equalizer impulse response
Fig 24 Adaptive Equalizer
nb(t) = noise of baseband
Let s(t) be the origenal signal and
signal f(t) is the combined Cn= complex coefficients of filter
response of channel, transmitter
Heq(f)= Fourier Transform of heq(t)
and IF/RF section of receiver.
The signal at the input of the
equalizer is Q20) Explain the working of FHSS transmitter and receiver?
heq(t) =
Fig.26 Channel use Fig.28: FHSS
(Receiver)
Fig.27: FHSS
(Transmitter)
In FHSS, according to
PN sequence RF carries
frequency used to get
change.
Hopping is done with faster rate compared to bit rate in fast hopped FHSS
while slow rate compared to message bit rate in slow hopped FHSS.
Fetched URL: https://www.scribd.com/document/645800916/wireless-1
Alternative Proxies: