Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
69%
(13)
69% found this document useful (13 votes)
6K views
206 pages
IT8602-MOBILE COMMUNICATION - Book
Technical Publications
Uploaded by
gotha
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save IT8602-MOBILE COMMUNICATION_Book For Later
Share
69%
69% found this document useful, undefined
31%
, undefined
Print
Embed
Report
69%
(13)
69% found this document useful (13 votes)
6K views
206 pages
IT8602-MOBILE COMMUNICATION - Book
Technical Publications
Uploaded by
gotha
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save IT8602-MOBILE COMMUNICATION_Book For Later
Share
69%
69% found this document useful, undefined
31%
, undefined
Print
Embed
Report
Download
Save IT8602-MOBILE COMMUNICATION_Book For Later
You are on page 1
/ 206
Search
Fullscreen
6 -Svualeehmi SUBIECT CODE : T8602 ‘Siricily As Per Revised Syllabus of ANNA UNIVERSITY MOBILE COMMUNICATION V, Jeyasri Arokiamary ME, PGDBA, MI Femary Acie Pros Kumoragu Cobege of ‘Cointoore «£41 005 AMMINADU => TECHNICAL 2 PUBLICATIONS cei Aa Up Thus for KoowiedgeMOBILE COMMUNICATION Subject Code : 78602 ‘Semester - VI (Information Technology) Fist Eon : Jenwory 2020 PREFACE The Importance of Mobile Communication is well known in various engineering flelds. Overwhelming response to my books on various subjects Inspired me to write this book. The book is structured to cover the Rey aspects of the subject Mobile Communication. The book uses plain, fucid language to explain fundamentals of this subject. The book provides logical method of expl rious complicated concepts and stepuse ‘methods to explain the important topl chapter is well supported with necessary Ifustrations, practical examples and solved problems. All the chapters in the book are arranged in a proper sequence that permits each topic to build upon earler studies. All care has been taken to make students comfortable in understanding the Basic concepts ofthe subject. Representative questions have been added at the end of each Chapter to help the students In picking important points from that Chapter. The book not only covers the entire scope of the subject but explains the philosophy Of the subject. This makes the understanding of clear and makes it more interesting. The book will be very useful not only to the students but also to the subject teachers. The students have to omit nothing and possibly have to cover nothing ‘more. I wish to express my profound thanks to all those who helped in making this book a reality. Much needed moral support and encouragement was provided on numerous occasions by my whole family. I wish to thank the Publisher and the entire team of Technical Publications who have taken Immense pain to get this book in time with quality printing. Any suggestion for the improvement of the book will be acknowledged and well appreciated. Author D. egasn ArotiamaryACKNOWLEDGEMENT ‘What shall { render to the LORD for all his benefits towards me ? { will take up the ccup of salvation and call upon the name of the LORD. PSALM : 116 : 12, 13. 1am grateful to the Lord Jesus Christ for strengthing me to write this book. I wish to thank my husband D. Anthony and loving son Richie Immanual for their patience and understanding while writing this tenth book. | aso thank the Publishers, and the staff team of Technical Publications for bringing out this book with quality printing. Finally I thank all the readers who are very much supportive of my books. Anchor D. Degasn Arotiamary Darren to the Lord (Jesus Chyist o SYLLABUS Mobile Communication - (IT8602) UNIT-I INTRODUCTION Introduction to Mobile Computing - Applications of Mobile Computing- Generations of “Mobile Communication Technologies - MAC Protocols - SDMA- TDMA- FDMA- CDMA. UNIT-II MOBILE TELECOMMUNICATION SYSTEM. GSM - Architecture - Protocols - Connection Establishment - Frequency Allocation - Routing - Mobility Management - Security -GPRS- UMTS- Architecture. UNIT - III WIRELESS NETWORKS ‘Wireless LANs and PANS - IEEE 808.11 Standard - Architecture - Services -Blue Tooth- Wi-Fi = WIMAX. UNIT-IV MOBILE NETWORK LAYER Mobile IP - DHCP - AdHoc- Proactive and Reactive Routing Protocols - Multicast Routing - Vehicular Ad Hoc networks ( VANET) -MANET Vs VANET - Security. UNIT-V MOBILE TRANSPORT AND APPLICATION LAYER Mobile TCP-WAP - Architecture - WDP - WILS-WTP -WSP -WAE-WTA Architecture-WML.TABLE OF CONTENTS Unit -1 Introduction 1:1 Introduction to Mobile Comput 1.2 Applications of Mobile Comput 1.3 Mobile Computing-Structural Vi 1.4 Architecture of Mobile Computi 11.4.1 Message-Oriented Middleware (MO! 4144.2 Transaction Processing Middleware 11.443 Database Middleware (DM)... 1144.4 Communication Middleware (CM) 114.5 Distributed Object and Components (D0C) . 11.4.6 Transcoding Middleware (TM) 15 Functions of Mobile Computing 4.6 Mobile Computing Vs Wireless Networki 18 Generations of Mobile Communication Techni 11.8.1 Second Generation and Third Generation Wireless Networks and Standards ... 118.11 Organization of26 and 36 Standards 11.833 Plot channel. 7 118.34 Trac Channel 11.85: Forward Trafic Chen 41.8.6 Data Scrambler Unit... 1.8.7 Walsh Hadamard Transform 1.8.8 Quadrature Modulation. 41.8.9 Reverse CDMA Channels .. 1.8.10 Convolutional Encoder and Symbol Repetition Unit. 1.8.11 Block interleaver Unit....-.---200ss000 418.11: Orthogonal Modulation « 118.11. Variables Data Rate Transmission 1.31.3 Direct Sequence Spreadh 1.8.12 Quadrature Modulation. 19 Third Generation (36) Standards and Networks. 1.9.1 Relation between User, Services and Application 41.9.2 bifferent Physical Channels in eda 2000. 119.3 W-CDMA (UMTS) - Third Generation Cellular System. 1.931 UMTS-AnOverview » 49.32UMTS-Architecture . «+ 1.933 UTRA-TOD Mode 1.10 Introduction to 46 [Fourth Generatior 1.10.1 46 Vision 7 1.10.2 Comparison of 46 and 3 1.10.3 46 Features and Challenges 1.104.146 Technolog! 1.11 MAC Protocols. 112.1 Hidden and Exposed Terr Raasees ase1.11.2 Random Assignment Schemes. 1.11.3 Reservation-Based Schemes . L114 MACA Scheme 1.12 Multiple Access Techniques ... 1.12.1 Multiple Access Schemes-FDMA, TOMA, COMA and SDMA. 1.12.2 Wide Band system - Advantages .. 1.12.4 Comparison of SDMA, TDMA, FDMA and COMA Techni Review Questions. ‘Mobile Telecommunication System 2.1 Global System for Mobile (GSM)... 2.2.1 GSM Architecture . 2.1.11 GSM Phone - Functional Diagram 2.1.1.2 Network and Switching Subsystem 2.1.1.3 Radio Subsystem (RSS) 2.1.1.4 Operation Subsystem (05S) 2.1.15 Handover Procedurein GSM. 24.2 Channels ... 2.1.2.1 Broadeast Control Channel 2.1.3 Mobility Management . 2.4.4 Security in GSM, 2.4.5 Mobile Number Portability (MNP) 2.1.6 Teleservices in GSM. . 2.2 General Packet Radio Service (GPRS). 2.2.1 PDP Context Procedure . Seer 2.2.2 Combined RA// LA Update Procedures. 2.3 Universal Mobile Telecommunication System (UMTS 2.3.1 W-CDMA (UMTS) - Third Generation Cellular System 23.1:1 UMTS -An Overview 23..2UMTS- Architecture. . 23.3 UTRA-1DD Mode 7 2.3.2 Protocl Structure of W-COMA (UMTS) 2.3.3 Communication between Layers and Sublayer piece ee eee nit - Wireless Networks (B= 1) to (3-34) 3.1 Network Taxanomy.. 3.1.1 Local Area Network (LA 3.1.2 Metropolitan Area Network (MAN) 3.1.3 Wide Area Network (WAN). 3.1.4 Wireless Local Area Networ 3.1.5 Wireless Local Area Networks (WLAN) Applications eduction .. 3.2 Wireless PAN :.. 43,3 IEEE 802.11 Standard Protocol Entity. 3.3.1 802.11 Standard-Security Issues. 3.3.1: Authentication 7 3.3.1.2 Procedure of shared Key Authentication. ane aeid 3.3.13 Deauthentication . 3.3.2 IEEE 802.11- MAC Contr 3.3.3 Sequence Contra. 3.3.4 802.11 Standard-Ar 3.3.5 IEEE 802.11 Services . 33.5.1 Authentication, tecture 3.3.5.2 Privacy area B yiaas vice tla MO, 3.5. Deauthentcat 3.4 Bluetooth Technology... 3.4. Vertical Antenna 3.4.2 Dipole Antenna 3.43 Antenna Parameters ... 3.4.3, Voltage Standing Wave Ratio VSWR) oe ee eee BRR 343.2 Bandwidth... Grits ttre a ares aaaseffceny. eee p = 302 343.4 Return Loss asime a2 34.3.5 Polarization. 3-2 2.4: Poine-o-Port Connection (P2P) sees BB 3-24 3.4.5 Scatternet ro)3.4.6 Bluetooth Device Address....... 3.4.7 Bluetooth Connectionmode Relations 3.4.8 Some of the Advantages of Bluetooth 3.4.9 Three Classes of Bluetooth Protocol 3.4.20 Topology of Bluetooth. 3.4.11 Frame Format in Bluetooth 2 3.4.12 Connection Management in Bluetooth 13 Comparison of Wireless LAN and Bluetooth Technology. (4-1) to (4- 4.3.2 BOOTP Protocol 3 mie 4.3.3 Significance of Dynamic Host Configuration Protoc 43.4 Components of Dynamic Hest Configuration Protocol ‘4.4 Mobile Ad-hoc Networks : Concep! 4.4.1 Characteristics of Ad-hoc Networks (MANi 44.2 Advar 4.4.3 Properties of Ad-hoc Networks. of Adshoe Networks . 45 Routing in MANET 45.1 Fundamental Steps in Routing. 45.2 MANET Vs Traditional Routing @ 4.5.3 Types of MANET Routing...» 45 Destination Sequence Distance Vector 050") ‘4.55 Dynamic Source Routing (DSR) 4.5.6 Multicast Protocols for MANET's... 45.6. Multicast AODV Protocol... 45.7 Vehicular Ad-hoc Networks (VANET) .. 45.7. architecture of VANET. « 45,72 Routing Protocols in VANET 145.723 Securtyin VANET, 4.5.8 MANET Vs VANET 435. Security In MANET’. 45.9.1 Mutiflence Securit Solin « 45.9.2 Network Layer Security 1459.3 Message Authentication Prriives 5.2.2 TCP/IP - Operation . 5.3 Applications of TCP/IP 5.43 Snooping TCP 5.4.3.4 Demerits of Snooping TC? - @(A-1) to (A- 106) Introduction Syllabus Introduction to Mobile Computing Applications of Mobile Computing- Generations of Mobile Communication Technologies - MAC Protocols - SDMA- TDMA- FDMA- CDMA. Contents 4.1. Introduction to Moble Computing 1.2 Applations of Moble Computing. 1.3. Moble Computing Srutural View 18 Architecture of Moble Computing 41.8. Functions of Mobile Computing... 1.6 Mobile Computing Ve Wireless Networking. 17° Cherateritie of Moblo Computing. 1.8 Generations of Mobile Communietion Techniques Dec16 May-4718, Doc -18.17 Juno-t8, Dec-16, May-18 1.9. Third Generation (96) Standards and Networks 1.40 lnroduction to 46 [Fourth Generation] 141 uae Protcl en @- 1) to (B-62) 1.42 Mute Acnss Tectia Solved University Question Papers aes | ‘Solved Model Question Papers (S - 5) to (S- 8) CoO}Mobi Communication al EEE introduction to Mobile Computing ‘AU It is the computation made over physical mobility. Mobile computing system permits the user to perform a task from a distant place from the device. The mobile computing is also known by different names according to its role in that context few examples are listed below. 1 Virtual home environment It is denoted as * VHE". Its possible under VHE to operate a device like heater in a person's home though he is away from his place. He has a virtually available feeling at his home 2) Nomadic computing The entize mobile computing environment is nomadic in nature and it moves with the roaming use. It is possible for both remote and local services. 3) Wearable computer ‘The wearable computers are used like wearable accessories like shoes, clothes etc ‘by human beings. A person can wear it provided these computers have extra atiributes than conventional mobile computers. Actually the wearable computers are those which can be adomed by a person like an accessory hat, shoe etc EEA plications of Mobile Computing Ha Mobile computing provides several plications and they are user friendly. Some of the applications include; 4) Vehicular mobile computing Vehicles will incude weather forecasting, road conditions, along with news, music te. Mobile computing enables many user friendly facilites. For personal system ‘communications GSM phones might be available offering the voice and data connectivity with 384 Kbits per second. Mobile computing will be useful in emergency situations in wirelessly contacting the nearest hospitals and help in patient assistance ete 48) Business environments : Mobile computing is useful where a simple device is represented by sensors transmitting state information. Also pagers, mobile, phones with full colour graphic delay will be useful in business applications. The PDA's, Palmtop /pocket computer ete are user friendly as it simplifies several calculations. Thus mobile computing is useful in different fields and many applications are made possible TECHNICAL PLBLCATENS- 49 ait rine ‘ rm on he The peettion lye coneemed about utr nero. Is aplationrin on un a ths lyr aloo incite wed boven, and the cstomied chew pores fa The applsion Seri alo known as miler which ke an “engine” 0 the sues ty wal len nde LAN appltons. It proms the peeing aera tt opeinng inoenton and then making decors. THS layer indus ogy ie Jar, NET" services, cn fasion we lp, slant, end ee 1 Sans independent TECHRICAL PUBLICATIONS. An wo Ot er omeMobile Communication 14 Introduction ‘The middleware also covers a wide range of software systems, mobile application support etc. The two independent open objects can be connected through this middleware 2s a software gateway. There are many classifications available under middleware. EE] Architecture of Mobile Computing ‘The mobile computing architecture is given in figure shown above. They are simple and efficient. One example of this network is three-tier architecture as in the diagram. It mainly consists of user interface (tier-1), access network, middle tier (lier-2) are data tier (ier). ERI Message-Oriented Middleware (MOM) ‘The message oriented middleware is generally asynchronous, peer to peer which ‘works in a subscribe method. One or many objects may subscribe to a particular event. When an event occurs it will be subscribed or published by asynchronous loosely coupled object. The MOM monitors the occurrence of events, The Request/Response scheme is more flexible with MOM method. Hence the message oriented middle is more appropriate for event driven applications. An example for MOM under Java is known as Java Message Service (MS). TECHNICAL FUBUCATONS”- Anup it kone Mobile Communication 1-5 Irion [EEE] Transaction Processing Middleware (TP) It is suited for developing transaction based distributed applications. ‘The number of client requests are properly mapped to different application tasks ‘through application service routines. (See Fig. 142) In an ideal TP system, the device for input and output can be different. The transaction processing is independent of database architecture. The TP middleware helps to reduce the resources by multiplexing technique, which in tum may reduce the response time. Fig. 1.42 Transaction processing (TP) middleware EEE] Database midcloware (DM) ‘The database middleware is responsible for maintaining the entire data involved in communication. In data tier their aze database management and data store facilities. User {interface can interact with data ter through access network and middle ter. EES communication Middleware (CM) 1 is used to connect one application to another application through communication middleware. In telecommunication field there are numerous elements inthe core and the ‘user interface is via the telnet. The communication between nodes are finally established ECHUCA PUBLICATIONS An wp rt oweMobite Communication Intrtuction KEEG vistributed object and Components (D0C) “The Common Object Request Broker Architecture termed as CORBA is on of the best ‘example for distributed objects and components. Many network programming tasks like framing, error handling ete. are simplified using CORBA. Many number of clients can be handled with high reliability and hit rates. [EEG transcoding Middleware (TM) To attend the request or need of the user/client, the transcoding middleware is used to transform one format of data to another format. Actually content adaptation is done by transcoding to meet the requirement of each device. ‘The application tier or the so called middleware has to play role in mobile computing architecture. The reliability of the entire system is enhanced by the performance of middleware. Ed Functions of Mobile Computing Ca ‘A computing environment is said to be mobile if t supports few of the characteristics mentioned below. 1. User mobility : Though the user roams from one place to another he should be able to use the same service. Tis sevice may be a remote network or home network. 2. Bearer mobility In this case the user may move from one bearer to another bearer but use the 3. Host mobility : In host mobility the user device can be either a server or a client. If itis a host ‘mobility the mobility of that IP should be given more care. But if itis server or hhost mobility, some complexities will change. 4. Service mobility : Though the user changes from one service to another service it should remain enabled and if a user is sending a mail and he refers some information in his PC stored file for adding in his mail he should be allowed to do so. EEA Mobile Computing Vs Wireless Networking EI * Mobile computing denotes collecting information and computational services in its mobile environment. + But the wireless networking provides fundamental communication infrastructure, TECHNICAL PUBLICATIONS". Anup nt one ki Mobie Cemmunication 7. Intreducton The mobile computing is based on the wireless networking environment and enables accessing data in mobile status. ‘8 Wireless networking needs low investments and low setup time for setting up a network. © Wireless local area network, Personal area network, Ad-hoe networks are some of the types of wireless networks. ‘© The wireless networks are of two types namely, 4) Extension of the wired networks and ii) Ad-hoc networks. + An Ad:hoc networks needs no infrastructure, «+ Ik is based on the multi-hop wireless communications. ‘+ On the other hand an example of wireless network is Wireless LAN (WLAN). EEA Characteristics of Mobile Computing EUEETSTATATSSC ‘Adaptation : In mobile computing environment adaptation refers to bandwidth management. It has to adjust with bandwidth fuctuations if any without the knowledge of the subscriber. ‘There are several factors like handoff, noise etc. that influences the adaptation of computing environment. Porsonalization : In mobile computing scenerio the services can be personalized using the subscriber's profile. Hence they can avail thir information with their handheld devices. Ubiquity = ‘The word ubiquity in mobile computing is the ability of subscriber to compute {informations from anywhere at anytime For example a sales representative can do his transactions from anywhere. Location Awareness : In mobile computing a handheld device equiped with Global Positioning System (GPS) can track the position of subscriber and inform it to the tracking station. ‘There are several applications that provide value added services by informing pposition-based services. Some of the important applications are traffic control, emergency services where the computing environment dynamically monitor and the location informations to reduce ‘congestion. TECHNICAL PUBLICATIONS Anup a neiceMobie Communication 1-8 Introduction Broadcast : In mobile computing environment data is efficiently transmitted to several subscribers simultaneously. For example a common advertising information is being sent to many users ata time. EEA Generations of Mobile Communication Techniques [EDIE ‘The different generations are 1G, 2G, 2.5G, 3G, 4G, 5G etc. has been evolved under the mobile communication. The evolution of these standards took place in various times. Evolution of Mobile Communication : ‘The wireless communication has developed worldwide from the year 1897 by means of radio and the development of the technology is due to revolution in the fields like 4) RF circuit fabrication ii) Lange scale circuit integration. iit) Digital circuit design 4v) Miniaturization technologies. ‘The impact of development of mobile communication is personal communication services. The cellular concepts emerged appreciably and slowly developed by Bell Laboratories in the period between 1960 and 1970. An exponential growth of wireless ‘communication was observed. While comparing wireless technologies with other communications the penetration of wireless application is more in our day-to-day life. ‘The cellular 2s well as personal communication services have revolutionized the communication field. The drastic growth of mobile communication is compared here with other technologies in a graph. The cellular mobile communication technology emerged slowly and developed ‘worldwide. At the same time it has penetrated into the market for long time with high demand than other technologies. It has an appreciable growth rate as seen in the graph. Jn the year 1934 the police radio systems used the Amplitude Modulation (AM) systems for transmission purposes. In early cellular the major problem faced was vehicular ignition noise. It is also interesting that in 1960's the majority of mobile users ‘were not linked through PSTN and they were not capable to dial the telephone numbers dizeally. In the year 1995 the number of mobile users in US wes 37 % of the total population. The growth of cellular mobile users was approximately from 25000 to 25 million and this took roughly one decade. (From 1984 to 1993). TECHNCAL PLBLCATONS"- Aa wo tet ownage ‘The mumber of consumers in wireless communications increases every year worldwide. In ery days the FM pushvtotalk telephone systems were popu. tn tn pod of 1940 this system used frequency of 120 kHz, such that only one person can a time. It was known as half duplex mode. But the FCC increased the number of channels in each mazket and at the same tine it does not need an extra spectrum allocation. Tt was possible with new technologies enabling reducation in bandwith from 120 Kix to i isted to have ‘duopoly’ in Phone System (AMPS) It is also worth noting that FCC insisted to cach city, Tat is in each city/market only two service providers were allowed to have @ healthy competition in the mazket. An additional 166 channels of 10 MHz frequency ‘were permitted in US cellular system to meet the demand scenario. ee TECHNICAL UBLCATIONS'= An at robeUS cellular radio service : aa [seam Toa [aT] [—— seers —— ‘Some of the main problems the cellular mobile system faced are ‘i) Interference i) Less encryption techniques USDC Standard or Electronic Industry Aeron Ina Suda St catled fe sr mible was dh vs he UDC epi! gn 4) § differential quadrature phase shift keying. i) Speech coding. fil) Time division multiple access. Later a better cellular mobile system using Code Division Multiple Access (CDMA) ‘was developed by the Qualcomm, Inc which was then standardized by the respective ‘Telecommunications Industry Association (TIA) and the system was named as Interim Standard (1S-95). The 15-5 allowed many number of mobile users by Direct Sequence Spread Spectrum (S56) technique. The CDMA cellular phone systems were independent of interference problems and provided better call quality than the first generation (1G) AMPS cellular system. NIT - Nippon Telephone and Telegraph Company. TECHNCAL PUBLCATENS- Anup tit erin “TECINICAL PUBLICATIONS Anup tr oweMable Communication 1-12 Introduction PHS - Personal Handy Phone System. ETACS - European Total Access Cellular System. GSM - Global System for Mobile. CT2 - Cordless Telephone. (CT2) DECT - Digital European Cordless Telephone. Ih the examples of cellular, cordless and PCS systems each one of them has unique advantages and facilities with respect to mobile comunication technology. Thus the transition from analog mobile phones to digital mobile phones was made along a umber of years and today digital cellular telephony is very popular worldwide due to its several technical advantages, including cellular coverage capability. HERI second Generation and Third Generation Wireless Networks and Standards ‘The second generation (2G) cellular systems provide more facilites and tractive ‘Some of the important advantages of 2G standards are listed below : ‘a. Error correction and encryption : ‘While comparing to analog 1G standards the digitised 2G standards are less prone to possible only with digital systems. In 2G standards they provide 4) Better speech quality. ii) High speed data applications. iit) Efficient spectrum usage and compatible with TDMA. access schemes. iv) Supports multiple users. b, TDMA and CDMA-Maltiple access techniques : In 2G systems TDMA and CDMA techniques are applied. In rare cases their ‘combination with FDMA scheme is also used. The TDMA technique is used by 2G standards that includes Global system for mobile (GSM), Interim standard-54 (IS - 54) and Digital European cordless standard (DECT). Here the spectral band is sub divided into many time slots and they form TDMA frames. Thus every subscriber will be assigned time slots in which transmission would Mobi Communication 1-19 Introsucton take place. Cellular trafic congestion is highly minimized with this technology. The ‘TDMA schemes use half duplex method. Other TDMA features include, ‘+ Good Synchronization. «For better operations it possesses guard intervals. Bificont spectrum utilization. © Operates with faster data rates. With CDMA technique every subscriber is assigned a n-bit code, and it guarantees high degree of security than other access techniques. The transmission of several users is differentiated by a code word which has been assigned to every subscriber. Thus TDMA and CDMA in 2G standards provide less design complexity, more security, faster speeds of transmissions and high reliability etc, than 1G systems. ‘A simple comparison with, respect to growth of number of mobile users as the technology moves from 1G to 2G is shown in the following chart. There is a better reception for GSM - 2G standard as a high number of users were observed in the year (Obeervaton inthe your 2001) o nso TES = A wm Y q [haa 1 oo Ee Sh eee aie Fig. 1.8.2 Growth of number of users Vs growth of technology In this chapter we will discuss some of the important 2G and 3G mobile standards and networks in detail, TECHIGAL PUBLICATIONS An at rege TECHIMCAL PUBLCATIONS= Anup tat or oneMobie Communication 1-15 Inbocucton 3) EDGE 4) 1S - 958 (cdma two) I) Third generation (9G) standards include 43) IMT 2000 and UMTS 2) cdma 2000 HERES features of usoc «USDC supports three full-rate or sit-half rate subscribers on every AMPS channel ‘It provides high celular capacity. Te accommodates many users. + There was a smooth transition from analog cellular systems to digital celular system, by which USDC became popular. Since USDC was installed in North America it was Fig, 1.83 Some of the 26 to 36 tachnology mobile standards-path upgrade view ERED organization of 26 and 36 Standards ‘Second generation (2G) standards include : D 4) TDMA standards like 1) Interim standards 136 QS - 136) 2) Global system for mobile (GSM) 3) Pacific digital cellular (PDC) ) CDMA standards like 1) IS - 95 (cdma one). 1) Importance of 25 standards 1) Hsp rare estat 2) GPRS Fig. 1.84 Structures of 1S - 136 standards TECHIWCAL PUBLICATIONS An vp Pt x one TEGHCAL PUBLICATIONS Ap at eaeiaaiesackad 118 in ote conmncaton Bitton be conmnicaton 10 ton ‘Te 1-196 supports muliple USDC subscribers on every AMPS chance. It wed the same frequency and adequate channel spacing 2 that of the AMPS. Many digital control channels were created with IS - 54 and its upgraded so called standard is IS - 136 whose network architecture is shown here. It is also known as + ele: D-AMPS and also in a way it is compatible with 1G, AMPS system. ‘b. Frame. “The network architecture of IS - 136 resembles the structure of GSM. Uplink slot. — ‘mt ent ‘This IS - 136 standard operates in the frequency of 800 MHz band which could be : ee ° upgraded even upto 1900 MHz band and was planned to bring out many user services ‘© Bs channel bandwidth is 30 KElz. ‘by this frequency spectrum upgradation. IS - 136 also has some similarities with 2G © The TDMA frame with 40 msec in 6 time slots is being used in it. GSM standard to an extent. It includes coding scheme, interleaving and convolution etc. A simple air interface structure of IS - 136 is shown above. It consists of a sultiframe, and in a frame the slots used for up and down links are also seen. Their individual fields including guard bits, control bits training bits, data bits and so on are also shown. There is a reserved bits field which was assigned in downlink slot with 12 bits for downlink purpose. + On the other hand the network layer allows, 1) Eotablishments 4i) Maintaining (Sustaining) ii) Digital trafic channel (DTH) ‘It provides the data services namely teleservice and analog circuit switched data service. ‘+ Tr uses three data rates namely 9.6, 192 and 28. kb/sec. ‘Teleservices : Eg.: 1) SMS through the DCCH channels. 2) Operator services. ‘Analog circuit switched data services : Eg. 1) tis capable of providing data rate of 9.6 kb/sec. pases SaPURTEnARET = end Sn eRESSEERINEEEAPRenESSReEyneneerense ee TEOHMCAL PUBLICATIONS Anup tat nongeIntroduction : ‘The Code Division Multiple Access (CDMA) scheme came into existence in 1989 and it proved that it is a best technique suitable for digital cellular system by various tests. In CDMA, the main advantages are, {) It can tolerate interference with spread spectrum technique, ii) It provides high security. il) It helps in achieving high capacity land mobile communication systems. ‘The spread spectrum technology was mainly used in CDMA for enhancing security of data transmitted. Thus in applications where high security is in demand this technique can be opted. CDMA has several advantages when compared to FDMA and TDMA. ‘A united States digital cellular system that is based on CDMA technique that reduce the data rates upto 1200 b/sec in the silent periods. 1) Tt uses specific modulation and spread spectrum techniques in its forward as well as reverse links. {v)It is compatible with IS - 41 networking standard. ‘Channels and frequencies used in IS - 95 standard : In the IS - 95 the frequency range used for its forwards link operation is 869 - 894 MHz, For reverse link operation the frequency range used is 824 - 849 MHz. AA Version of IS - 95 (PCS) is designed to use the operating frequency in the range 1800 - 2000 MHz band, Mobo Communication 1-19 Introduction For cllular band operations the forward and reverse channel pair is 18-95 are separated by a frequency of 45 MEz. The total spreading factor of user data in IS - 95 is 128 (chip rate of 1.228 M Chips/Sec:) The spreading process is different for forward and reverse links. They are given below : ER] Protocol Architecture of IS - 95 Standard In the cdma One standard’ protocol architecture the lower two layers and the corresponding layers of OSI model are shown below : Bigime out S eS Fig, 1.8.6 MAC states In cdma One (1S - 95) standard The functions of layer 1 are 4) Frequency use 4i) Radio transmission The functions of layer 1 are related to 4) Effective delivery of voice and the data packets. Under layer 2, the Medium Access Control (MAC) sublayer takes care of the channel ‘management. This MAC sublayer follows a finite state machine that is two states. The status of packet data in transmissions is shown as a finite state machine of two cycles, and each transmission different state machine is maintained Whenever Mobile Station (MS) is idle it is considered as "big time period”. In the active state the channels are assigned to the mobile. In dormant state the ‘mobile units do not maintain any sequence of channels. Since they do not maintain any sequence in channels there is no strict mechanism for transmitting user data when itis fn dormant state. After the idle period (that is MS is idle) or bit period the mobile channels go to the dormant state. Thus the data from various sources are being multiplexed at first and then handed over for transmission. TECHNICAL PUBLICATIONS Aa wp rt once TECHNICAL PUBLICATIONS. A vp at ceFusetie ostiayer 4 Fig, 1.8.7 ‘Protocol architecture’ of 18 - 95 (cdma One) - standard Important terms related to channels of IS - 95 are detalled below : The forward channels are known as downlink channels. They carry the data traffic from the base stations to mobile stations effectively. It consists of 64 channels. The respective logical channels are differentiated from one another by using various CDMA spreading codes and_it is called as orthogonal code or walsh function (0 to 63). Some of the dedicated and common control trafic channels are as follows. HEEB] sync channel It is an optional channel used to send synchronization information to mobile stations. It is present in many cases and itis not considered in rate cells. The mobile channel will ‘operate at a data rate of 1200 b/sec « TEGHINCAL PUBLICATIONS Arve mat er owe Mebte Communication 124 Introduction IEEE Paging Channel Tt is also an optional channel. There are four types of messages sent through this forward CDMA channel. They are 4) Paging 5) Overhead 1H) Order fv) Channel assignment Upto seven paging channels are used and it operates at one of the data rates namely 2400, 4800 or 9600 b/see. EEE Pict channel ‘The pilot channel gives the timings related information to be mobile station with respect to forward CDMA channels and it compares the signal strengths of base stations, The data rate is 192 Kb/sec and the channel isa stream of ('s without discontinuity. EEEEI traffic channet “The traffic channels are used to carry the user data at data rates of 1200, 2400, 4800 or 9600 b /sec. These traffic channels are actually spread by a PN sequence code (long, code) and it helps to differentiate mobile stations. ‘All the channels are properly coded and then interleaved except the pilot channel IEEE] Reverse COMA Channels ‘The reverse CDMA channels aze also known as uplink channel. The main types of reverse CDMA channels are, ii) Traffic channels. ‘The access channels are used by the mobile stations for call initiation and to provide responses to paging messages mentioned previously. These access channels can be upto ‘32 channels and they operate at a data rate of 4800 b /sec i) Traffic channel : The traffic channels are intended for carrying user data. Four data rates possible with ‘which these channels can operate are 1200, 2400, 4800 and 9600 b/sec. Also the pay load of traffic channels are from a variable rate vocoder unit with the output date rates The forward and reverse CDMA channels are discussed in much more detail in the following chapter. TECHICAL PLBUCATIONS'- Anu rete towneMobite Communication 1-23 Irrouction [EEE Forward Link In forward link each mobile unit in a particular cell is assigned different spreading sequence providing enough separations between signals of different users. This holds ood, even for the situation where there are no multipath of problems. ‘The user data stream is also encoded, interleaved and spread by one of 64 orthogonal spreading sequences known as walsh functions. All the signals of a cell are first scrambled by applying a pseudorandom sequence (length 215 chips) because many users make use of the same spreading sequence in diferent cells. Due to proper scrambling of signals in a cell the orthogonality of entire forward channel subscribers is well preserved. In the reverse link a special spreading strategy is applied, because the mobile signals function. Every block of the six encoded symbols are properly mapped to corresponding sixty four orthogonal walsh function (W). It is provided with sixty four - ary orthogonal signalling method. Thus a four fold spreading is achieved providing a rate of 1.228 M chips/sec. In reverse link there is enough power control of the transmitted signal. This leads to minimizing near-far problems which mainly generates from different received powers. ‘The forward and reverse CDMA channels are discussed in detail in next section. [EET Forward CDMA Channel AAs discussed previously the forward CDMA channel comprises of synchronization channel, pilot channel, paging channel and traffic channel. The paging channels can be ‘upto seven in number and it can be upto sixty three forward traffic channels. The functionality of each channel is explained already. EEESI Forward Tratfic Channel Modulation ‘The basic forward traffic channel modulation process is shown in the diagram below. ‘The data is grouped as 20 msec frames on the forward traffic channel. The user data has to be coded convolutionally and should be formatted. This process has to be followed by interleaving for adjusting with user data rate that would change. ‘This interleaved signal is spread with a walsh code and then in a sequence at a rate ‘of 1.228 M chips/sec. ‘The data rate of speech signal applied to transmitter is in the range of 1200 b/see and 9600 b/sec. TECHNGAL PUBLICATIONS An wr onogea 4-26 Inecucton 41) Convolutional Encoder and Repetition Block : ‘The user data is encoded in this block with a half rate convolutional encoder with length 6: This encoding process is being represented by generator vectors say Gy and Ge that is 561 (octal) and 753 (octal). The constant baseband symbol rate is 19.2 kb/sec land in order to maintain it, when the user data rate is lesser than 960 b/sec, the symbol ‘coming from convolution encoder is repeated particularly before block interleaving process. Repetition concept is like 4) isfomationsate] devon [7 E&chcode symbol willberepentedone time yy information rat i ) esidoh cee f? EaChcode symbol willbe repeated thre times infomation) sh code é eIDIUD sce | 7 Extheode symbol will repeated seven times ‘This repetition will result in constant rate (coded rate) of 19,200 symbols/sec for all the information data rates possible. The second block in the schematic namely the block intezaver follows this encoding end repetition crt In 3 95 fhe slgals encoded 1 at a rate and if itis encoded in 3 rate in respective forward and reverse link and it has to be mapped to Walsh functions then the level of interference will be greatly reduced. 2) Block Interleaver : It is primarily a 24 by 16 array in its arrangement, This block interleaving is done after convolutional encoding and repetition processes. “The IS - 95 standard uses variable rate CELP code at a rate of 1.2 to 144 kb/sec. 3) Long PN Sequence : In forward channel for data scrambling purpose direct sequence is being used. For each user a long FN sequence i assigned and itis long code with time pesiod 242 ~ 1 chipe. This long PN code is represented in a characteristics polynomial and it is denoted a5 PO, ‘The private long PN sequence is mentioned as Mgy and Myo will be set to 0, 1 and Mgp through My as My Mag Maz .-Mg — It is set by a private method. Mo Mo EL romeo | i Mg eT 5 ia (¢) Public code mask TL | May Meo Mo (0) Private code mask Fig. 4.89 Long PN code mask formats in 1S - 95 standard In this assignment of a long sequence to each user, each PN chip of this long sequence is produced using modulo-2 inner product of the 42 bit mask and the state vector of the PN sequence generator. ‘The first state of the generator is defined mainly whenever the output of the sequence generator becomes 1 following the 41 consecutive ‘' output bits. (Since it is considered as 0 to él (42 bits). In this case in the MSB we have the bit as ‘7. ‘There are fwo types of masks that can be used in this entire procedure, They are, 1) Private mask 2) Public mask “The private mask in long code generation is for mobile station's identification number purpose (MIN). ‘The public mask in long code generation is for mobile stations electronic serial ‘number (ESN). Tt is important to note that all the CDMA calls are initiated with the help of public mask After authentication process there will be transition from public to private mask. ‘There two masks are specified as follows. 4) Public long PN code is specified with Mg, (M stands for masking) through Mz 45, Ma May May Mgg «»- Maz =1100011000 and My May May Mag nMp > Tt is sot to a permutation of the reapective mobile station's ESN bits value TECHNICAL UBUCATIONS- Ano st oooEEX Data scrambler Unit ‘The data scrambling operation is performed following the interleaving process. The PN sequence of 1.228 MHz is sent to decimator block and it will keep out the chip 1 out ‘of the every sixty-four PN chips. Also these PN chips are consecutive. For performing ata scrambling operation modulo-2 addition of the two blocks namely interleaver and ecimator outputs [19.2 kb/sec and 1.228 M chips/sec] is employed as available in the block diagram of CDMA channel modulation process. Power control subchannel At the base station receiver end, a unique power level is tried to be maintained for all the subscribers in IS - 95 standard so as to reduce bit error rate (BER level). For every mobile station the signal strength and interference is being measured and it is, attended and responded by its base station reverse traffic channel receiver unit. It is also worth noting that for about every 1.25 msec the power control updated results are transmitted by the base station because in real time mobile environment the signal strength and interference varies continuously The necessary power controlling instructions are transmitted to every user on the forward control subchannel which commands the mobile unit to increase or decrease its Orthogonal Covering : ‘The orthogonal covering process follows the data scrambling and is done in the forward link in IS - 95. The channels transmitted (traffic channels) on forward CDMA Mobi Communication t.27 Introduction i 125 maoo 24 motatonaymtls —————e} : Power contl bts sent A) {eestnkesn ee | Za scameat 012945678 o10N92191095 Fig 1.8.10 Example of random power control bit postion Fie 18ithg a5 etancardeforard wae channel For every period of 52083 usec the walsh binary sequence gets repeated and it is equal to single coded data symbol. It can be simply said as “the data symbol is actually spread by the 64 Walsh chips (c)” ‘The Walsh matrix is also known as Hadamard matrix (H) and the 64 Hadamard aatrix in this case is generated by recursive process. [ERA Waish Hadamard Transform The 1 dimensional (D) Walsh Hadamard transform can be 1p "Em given as Hw) = 5 2 f) (- 0 = in which case N = 2° and u will ake values between 0 to N~ 1. Jn a 2D case, this transform becomes 1a) 09 Emacs bie + bib) Hayes DY fencnee s Nt yo ‘The Hadamard matrix is of a lowest order. Considering N = 2, (2 x 2 matrix) can be given as 1a Hp = [i A Supply H, will be as Hy = 0. i Hy represents the matrix of order N then it can be denoted as Hayy and represented as below : Hy, = [BN Hw ™ * [Hn -Hw, ‘The Hadamard ordering has a demerit of successive doubling processes. TECHACAL PUBLICATIONS. Ap tr on TECHIUCAL PUBLICATIONS An wo tr opeMobi Communication 1-28 Introtucton For N x N case the matrixes are related with each other by = Lay where N = matrix onder. A= GH where order. Summarizing Hadamard matrix or Walsh function matrix, we write nis = [te 2] Hy -Hy. Using these matrices and by recursive procedure 64 by 64 Walsh matrix can be generated. In IS - 95 standards orthogonal covering we consider 64 by 64 Walsh matrix which corresponds to the channel number 'n\ ‘The channel number n = 0 corresponds to the pilot channel and from n= 1 onwards | 4s assigned for other channels since n = 0 is assigned to pilot channel, it is a blank’ walsh code in this case, which contains quadrature pseudo noise sequence code. Also | the channel number 32 (n = 32) is assigned for the important synchronization channel. EEE] auadrature Modulation From the block diagram of CDMA channel modulation process we consider the quadrature modulation Brctend Output 1 channel PN sequence A simple and short binary PNY
Last coded bit out of six bits ‘Walsh chip transmission] __(28.8kb/sec)- (64 Walsh chips) rate ( g) Tkeoded bis W pp = 3072 Kblsec TECHNCAL PLEUCATIONG- An wp rt nonceHERIED Variables Data Rate Transmission Im the reverse CDMA channel various data rates are being trensmitted. Whenever the data rate is ebout 9600 b/sec the interlever output bits will be transmitted. It is worth nothing then when the data rate is less than 9600 b/sec, the code symbol repetition process will produce redundancy. As shown in the table given below, when the rate is 4800 b/sec then only half of the inteleaver input bits would be transmited. ao m2 2 ‘Table 1.8.2 Some ofthe resorve trafic channel modulation parameters lst The process that involves various data rales are shown in a simple diagram given below for reverse CDMA channel in IS - 95 standard. Im this example the data is sent for every 20 msec frame duration and it is subdivided into sixteen power control groups as shown, in data rate 9600 b/sec. Each power control group is of 1.25 msec period. The power control group can be either sgated on or gated off depending upon transmission requirement. Usually every repeated code symbol has to be tvansmitted only once. The mobile station will reduce PG Equivalent leotropic Radiated Power (EIRP) and it may lead to reduction in interference to other mobile stations operating on same channel TECHNMEAL UBLCATCNS- Anup at rine ‘Mobile Communication 1-33 Introduction Fig, 1.8.13 Variable data rate transmission In IS - 95 in reverse GDMA channel “The 64 - ary orthogonal modulator is followed by data burst randomnizer block that © is used to produce a masking bit pattern which consists of O's and 1's which will mask | the redundant data in random, generated code repetition procedure. |A block of bits say 14 bits taken from long code will decide the masking pattern. This masking is actually done to differentiate mobiles and to reduce interference bp — earliest bit. ‘The data randomnizer algorithm is given below : 4) If the subseriber data is 9600 b/sec transmission will occur on 16 power control groups. EEE Eee eee ete eSee-ce ee ee een TECHNICAL PUBLICATIONS- Anup rt orionMobile Communication 1-4 Introduction ) If the subscriber data is about 4800 b/see then transmission will occur on a 8 power control groups. ©) Ifthe subseriber data is about 2400 b/sec then transmission occurs on 4 power control groups. 4) If the subscriber data is about 1200 b/sec then transmission occurs on 2 power control groups. ERIE] direct sequence Spreading Block In IS - 95 standard the reverse CDMA channel is spread by long code pseudonoise sequence and it operates with a data rate of 1228 Mchips/sec. The long code mask format discussed previously for generation of long codes is applied and long codes are obtained. Each walsh chip is spread by using four long code pseudonoise chips. This process is followed by quadrature modulation. HERE] Quadrature Modulation Before transmission of signal in IS - 95 reverse CDMA channel the traific channel is pilot pseudoncise sequence corresponding to inphase () pilot pseudonoise sequence. The purpose of introducing such delays is for improving, 4) Synchronization and. ii) Spectral shape. ‘According to the mapping table in forward CDMA channel for I and Q signal states, here the I and Q data are properly mapped into corresponding phase value. (GEDA raise rate’ speech coder” (QCELFY is ised in the 15 = 95 standard the compatible with higher data rate channel. In order achieve good speech qualiity the smuctuse: of 1595 i slighty modified so esto make i fecble with Personal ‘Communication Systems (PCS). A special procedure is opted to change the convolutional code rate on forward and reverse CDMA channels. That is by puncturing two symbols out of every six symbol representation of original encoded symbol stream G change of convolutional cxte rats from 2 9 2 on foward tk and fom 3 to 2 rate in case reve respectively. In IS - 95 standard a better system capacity is achieved with average data rates, TECHNICAL PUBLICATIONS. Ae pat fr rope Medio Communication 1-38 Introduction [EBD Third Generation (3G) Standards and Networks The third generation (9G) cellular systems have the goal to fulfil the demands of several services. The 3G systems provide global mobile multimedia communication GSM etc. has led to wide band CDMA (W - CDMA) standard. It is also known as Universal Mobile Telecommunication Service (UMTS). ‘The 3G systems guarantee an efficent wireless access with high performance quality. ‘They adopt intelligent new protocols to meet the cellular needs of the modem world. Some of the important characteristics of 3G systems are sumunarized below © 3G system supports packet-switched and circuit switched services like Intemet traffic and voice services. ‘© Te supports roaming. «It provides backward compatability and inter operatibility. ‘© It supports symmetric and asymmetric traffic. It is compatible with running many servicess simultaneously in same terminal It can create ‘Virtual Home Environment’ (VHE), that is creating a personalized set of services for a user and also when the user is in movement it can be maintained as such. ‘These 3G systems were standardized and it was initiated in the year 1992 by the _ International Telecommunication Union (ITU). As a result of this 3G standardization the Intemational Mobile Telecommunication 2000 (IMT - 2000) was introduced which has _ different 3G standards in it. Also a smooth beginning 3G standard with a better backward compatibility with 2G standards was the aim of IMT - 2000. The 3G systems tries to converge several applications including telephony, multimedia services and internet etc in an effective manner. It is also worth noting that a combination of different networks like 3G, ATM, Ethernet and X.25 will serve effectively if used for a single multimedia session. The 3G data service requires novel protocols to serve better and it is sure that if efficient ‘middleware protocols are used it will help 3G system to provide improved applications. TECHNICAL PUBLICATIONS" An vp nat oteMobile Communication 1:36 Intron Motil Communication 1-37 Introduction Some ofthe notable features of 3G system are The ITU has mentioned that the minimum requirement for cellular system + Provision for multirate services. performance of a 3G system includes both the packet-switched data and circuit switched ‘+ For a coherent uplink, user-dedicated pilot is allowed. data. ‘+ Multiuser detection is possible. Three popular data rates used are as follows : ‘* Intercarrier handover. 4 i) For pedestrian environment the data rate is 384 kb/sec. maT 2000 i) For vehicular environment the data rate is 144 kb/sec. iii) For fixed indoor and the picocell environment the data rate is 2 Mb/sec. router ee EEEI Relation between User, Services and Applications In the year 1992 the Intemational Telecommunication Union (ITU) initiated the 3G activities. The services, user and applications are related to each other but they are Bencid SMH SMH) ‘ ifferent ew) " SMH 125 Miz tente |! i eae ipa hiprate Menipetsec or ae jzamerpstec | | 120 ncheased common oe om oo om Fig. 1.9.2 Relation botwoon services, user and applications in 3G systems, It is better to list out the terms user applications and services to understand in what way they are related. © An user will subscribe and pay for services provided to him, © These services are provided to users through applications that can deliver the required service content to the user. ‘© The devices are meant for executing these applications required for delivering service content. ‘© Finally the service providers offer different services with the help of applications that is nunning on devices. ‘The 3G networks provide higher mobile performances at acceptable cost ratios to subscribers. Some of the service classes of 3G standards and networks are, 4) Voloe and audio service. ii) Effective wireless messaging service. ii) Switched data service. TEOHIMGAL PLBLCATIONS- Anup at nontpeBy these services 3G offer services to meet high speeds, bandwidth requirements, faster internet services accesses, web browsing, better faxing and dial-up accesses with networking set-ups Also there are several applications possible with 3G along with advanced services mentioned above. The 9G standards were initiated and standardized by Intemational Telecommunication Union (ITU) and it was released in the year of 1990. A project titled ‘Future Public Land Mobile Telecommunications System’ (FPLMTS) was developed by It was named as IMT - 2000 standard due to the reason that it is operational at a data rate of 2000 kb/sec speed. Thus its operating frequency is 2000 MHz that is part of IMT - 2000 was developed to combine several wireless technologies like wireless LANs (WLANS), fixed wireless links and satellite communications into one standard. interface (RAN) Af Nebwor 1 vetwor eiertece Some Fig. 4.9.3 IMT - 2000 Standard specification TECNICA, PUBLICATIONS Anup at one ‘Mobo Communication 1-99 Introduction a In above Fig. 1.93 different components of IMT - 2000 standard specification are shown. The RAN block consists of a group of interconnected base station controllers and ia tw Gori Cth ai Sia as ecu ota | various networks respectively. Some of the third generation cellular standards and networks are dealt in this section in detail. ‘The 3G systems we account for consideration are namely, 1) cdma 2000. 2) WCDMA. D cdma 2000 - 3G system : The cdma 2000 is a 3G standard. It has a smooth tages efor} PRE ot Ss Hee sped eee Sak t corresponds to layer 1 of OSI model. The terms used in protocol stack block diagram are, ‘upgradation fom 26 to 36, Thus has backward compatability. The cdma 2000 is thus an advancement of CDMA technology developed by the Qualcomm and meant for high data rate (HDR) packet standard. The standard also uses the adjacent three 125 MHz channels that can be used together for providing packet deta ought ant it will rely on vehicle speed, cell traffic loading and propagation TECHNICAL PUBLICATIONS". Anup tr inowsPhysical layer : Jin the cdma 2000 physical layer, originally two spreading modes were made use of namely Multicarier (MC) and Direct Spread (DS) techniques. There are two non direct spread modes in cdma 2000 known as 1X and SX. That is under the 1X mode it uses @ cdma one carrier whereas the 3X is the popular multicartier system. The simplest ‘version of the cdma 2000 standard is the IX mode. ‘The uplink and downlink characteristics are summarized for the stake of understanding the future enhancements. TECHNICAL PUBLICATIONS Aap rt enn | Mobile Cemmurication tat Introouton Uplink Characteristics = 4) Using open or closed power control : ‘The uplink is permitted to opt both the open loop power control and fast closed loop power control which is derived from 2G cdma one, and a good development is observed in CDMA technology in 3G systems. 4) Pllot-based coherent detection : In uplink performance of cdma 2000 is enhanced by the usage of Reverse Pilot Channel (R - PICH) and it provides a way for the base station to do the required coherent demodulation ofthe traffic received. Downlink Characteristics : Fast power control : ‘The closed-loop fast power control is used in cima 2000. The power of the downlink traffic is measured by the mobile stations. Then according to the observation they give a high speed transfers is seen in a low-mobility environment. ‘Transmit diversity : ‘Transmit diversity is used at the base station, and it is required that diversity has to have better spreading of code, orthogonality between the two streams of data is maintained, Synchronized base station operation : ‘Synchronization between the base stations is done, since it leads to faster handovers between the 2G and 3G systems that is cdma one and cdma 2000 respectively: Pilot Signals : There are two important pilot signals which are called as 4) Common Pilot i) Auxiliary Pilot. ‘A common code multiplexed pilot signal for all the users on the downlink is used. The information regarding multipath fading and channel conditions will be shared by the mobile nodes through these channels. The ausiliary pilot signals are basically optional and they are intended to support the smart antenna systems, TECHIUCAL PUBLCATIONS"= Anup rt onopeThe cdma 2000 standard uses turbo codes for its coding for the supplemental channels. It is applied to increase robusiness in case of high n-speed data service applications. Double number of Walsh codes : It is possible to use even upto 128 Walsh codes in cdma 2000 for variable spreading procedure The car cpecy sth incened twice when compared fo cima one Peet There are two types of physical data channels which are used. They are @ fundamental channels (FCH'), (ii) supplemental channels (SCH's). They are coded separately and then interleaved. High data rate services are possible with the SCHs. ‘5 msec frame options : ‘The common frames have frame uration of 20 msec. A latency of 5 msec is also ‘The chiprates used in cdma 2000 are actually multiples of the chiprates used in edma one standard. This is one of the simplified mode of chiprates adapted in cdma 2000 by its backward compatability. [EEA Different Physical Channels in cdma 2000 i) Uplink physical channel. ii) Downlink physical channel. 1) Data trafic physical channet There are two data traffic channels namely supplemental and fundamental (SCH and specified regarding backward compatability with the cdma one. TECHNICAL PUBLESTIONS- Amp rt ee ‘Mob Communication 1-43 Introduction i) Uplink (Reverse link) physical channel Using this R-PICH channel the base station detects a mobile's transmission. It is an ‘unmodulated spread spectrum signal channel. The R-PICH is used to send the power control signals to the respective base stations. RACH: For initiating communication, the mobile stations use R-ACH channels and itis done as a response to the paging messages. REACH: This channel is used to initiate communication with base stations, and it is used by ‘mobile stations. RCCCH: This signal is intented for conveying user and signalling informations to base station whenever the reverse traffic channels are not in use. Along with these channels the reverse data traffic channels are also used. (Forward 1ink) Physical channel : tl) Downlink ‘The downlink physical channels are, + Forward pilot channel (FPICH) + Forward ausiliary pilot channel (F-APICH) + Transmit diversity pilot channel (F-TDFICH) ‘* Forward common control channel (F-CCCH) + Forward syne channel (SYNCH)Mobile Communication te Introduction Mobile Communeation 1245 Introduction * Forward common assignment channel (F-CACH) + Forward data traffic channel. ) FPICH: ‘This channel is used to get the multipath fading and the channel conditions. This channel is shared by the mobile nodes to obtain the above mentioned information. i) EAPICH: ‘The numberof these channels can be many. These FAPICH channels aze used along channels. Each APICH channel is assigned a unique Walsh code under code multiplexed scheme in downlink. FADPICH: ‘These channels are intended for synchronization by the mobile within « particular cell CCH : It is used to send high-layer messages (eg. MAC layer) to the mobile units. The F-CCCH channel is used by the base station. SYNCH: Eb aerate ted a {poten syaciceti l The wideband sychonizatin chal is compatible with both the noncveray and ‘overiay configurations. The shared synchronization channel is compatible with overlay configuration and itis used in both cdma 2000 and 15-95 channels. PCH: This channel is used by base stations. The channel is intended to transmit the mobile station specific messages and the overhead messages. Here also two types of channels ‘The wideband paging channel is compatible with both the overlay and non-overlay | configurations. It is modulated across the 3G cdma 2000 wideband channel completly. |The shared paging channel is compatible with overlay configuration of the 3G cdma 2000 standard over the 2G 15-95 standard. It is also used for both cdma 2000 and IS-95 | channels. BCH: ‘This channel is intended to transmit control information to the respective mobile stations effectively which have not been alloted a traffic channel. FQPCH: This quick paging channel is used by the paging channel for providing control information to the mobile stations. E-CPCCH : ‘The necessary power control information of uplink common control channels are conveyed by base stations using this channel. FCACH: ‘The quick assignments of reverse common control (uplink) channel is done by base station using this channel. Jn addition to these channels the forward data traffic channels sre also used in downlink (forward) physical channels in cdma 200 standard. EEE] W-CDMA (UMTS) - Third Generation Cellular System ‘The third generation cellular system, Universal Mobile Telecommunications System a ‘upto 2.048 Mb/sec for single user. There are many other features for W-CDM such as, {) It provides private and public network features. TECHNICAL PUBLICATIONS Aap ar opeMobile Communication 146 Introduction 4i) The W-CDMA. needs allocation of 5 MHz frequency spectrum and it is a significant difference when compared to other standards. 1) It has interoperability for all GSM, GPRS, 1S-136 (PDC) and EDGE applications. 59) applies direct sequence spread spectrum chip rate more tan 16 megachips/sec for single user. ¥) This system provides atleast six times the spectrum efficiency than a GSM standard. EER] unrrs - An overviow The European proposal for IMT-2000 is called as Universal Mobile (W-CDMA) with direct sequence spread spectrum (DSSS) scheme. Hence the up and downlinks under FDD uses different frequencies. The uplink carrier is around 1920 to 1980 MHz. GSM also fits itself into ETSI and termed as global multimedia mobility (GMM). UMTS provides different services. 1. Real time services 3. Non real time services 4. Circuit and packet switched methods of transmissions EER] unts - architecture ‘The UTRA network called as ‘UTRAN’ enables cell level mobilities and it has many radio network subsystems (RNS). The main functions of RNS is lised below. UE, User Equipment Fig, 1.9.5 UMTS - architecture - Basle block diagram 1. Call handover control 2. Channel ciphering and deciphering 3. Radio resource management TECHNICAL PUSUCATIONS An wp tr once Motie Communication ta snreducton In the architecture of UMTS, the user equipment (UE) is connected to core network “CNT via UTRAN Block. Functions like 1. Gateways to other (external) networks 2. Inter system handover are handled by core network ‘There are two types of modes compatible with UTRA system. a. UIRA FD mode b. UTRA TDD mode The wideband CDMA namely W-CDMA is used for UTRA FDD and up and ‘The control data from mobile station is carried by physical random access channel (PRACH) for random access purposes. Jn downlink case the user data/information and control data from layer one are carried by downlink dedicated physical channel (DPCH downlink). The chip rate may be 4.096 Mchip/sec and it may be extended for different applications in future upto 16.384 Mehip/see. ‘The modulation scheme used is QPSK. CDMA technique which is compatible with UTRA has many features lke, 4) Localization of mobile stations. i) Soft handovers. ii) High degree of accuracy. CDMA scheme has a drawback of “complex power control” during a “call progress”. TEGHIMEAL PUELEATIONS'- Amp at eweMobile Communication 148 Introduction EEE] ura -100 todo The time division duplexing mode of the UTRA technology makes use of wideband | TDMA/CDMA for the medium access and the up/down links uses the same frequency. The data rate is 2 Mbit/sec for about 120 channels (approx) in case of the user traffic. ‘The direct sequence (DSS) type of spreading code is applied and the modulation scheme used is QPSK. In TDD the power controlling can be slower than the FDD because the umber of power controlling cycles in one second are less. It is worth noting that the frame structures of FDD and TDD are same and hence both the schemes can coexist in ‘The WCDMA-UMIS is aso called as UTRA-FDD. The physical layer ofthis standard respective MAC layer through the tenspoct channels. Physical channels in W-CDMA. In W-CDMA some of the physica channels carry information on the downlink The fst wo cannes CPICH and SCH have to be wanemited by every bate saon ‘The various transport channels are mapped on different physical channels. A few physical and transport channels ae identical. Let this group be X. TEOHUCAL UBLICATONE". An opt ious Controt Control q DFCCH (Dedicated Physical Control Channel) LE orton nya nece | "Tus the warsport Gane ae mapped onto the pyseal unl eH TECHNICAL PUBLCATIONS- An tr oweoeMobie Canmuniceton 1-60 Ietectucton ‘Then the important transmission characteristics of W-CDMA includes, After spreading and scrambling it forms the CDMA signal The Walsh codes are used in WCDMA. The spreading codes in WCDMA are known 2s orthogonal variable spreading factor (OVSF) codes. Then spreading factor can vary from 4 to 512, This standard uses 384 megachips/sec chip rate and maintained as F197 Tanmaasion characteristics 8) W-CDMA (UMTS) uplink spreading, scrambling and modulati rat 8) Spreading and scrambling gna a eee TECHICAL PUBLICATIONS. An hat ct odie Cemmunication 1-51 Intretution constant. By using shorter spreading codes higher data rates and by using longer be supported. The reason is fewer codes are onl avalable in case of shorter opreaing factor. In case of demodulation pilot symbols are used. The channels DPCH, CCPCH and the PRACH carriers pilot symbols. In spreading at the transmitter end, the channelization code is capable of identifying the physical data channels DPDCH and control channels (DPCCH) with the code length. The process of scrambling follows the spreading. It uses gold code that has a pseudorandom characteristics. The long code has 10 msec frame and used at rake receiver in base station. The short code is used when the base station applies multiuser detection techniques. Jin modulation combine Inphase-Quadrature, code multiplexing is used (.e. dual channel QPSK scheme). ‘The transmission power can be reduced by having faster power control in the uplinks. In downlink channel characteristics the same functions dealt under uplink are done and at first the DPCH serial bits are converted to parallel bits so as to have correctobte Conmuntoaton 1:8 Introduction In spreading that is based on OVSF codes operating limit is upto 512 chips. The scrambling uses gold codes for a time frame of 10 msec (Le. 38400 chips). Under channels SCH, the primary and secondary SCH are used. The primary SCH consists of a code of 256 chips and in secondary SCH it can generate upto 64 various code words, for Identifying common channels having continuous transmission. In modulation quadrature phase shift Keying with relevant time-multiplexed data and control system are used. ‘Transport channels : ‘The main characteristics of information that the transport channels can provide is sumunarized below : §) The shared information for up or downlink, 4i) The control information for up or downlink. it) Power control characteristics. iv) Managing the collision risk. ¥v) Mobile station identification. vi) Beam forming information. vii) Data rate variation ‘TEI Transport Famet neater ‘TG Taneper Formal Coban Inctor Fig. 1.9.9 Higher layers and physical layers (W-CDMA (UMTS) TECHOICAL PUBUCATIONS- Arp rt ote ebile Communioaton 1-53 Introavotion ‘The interaction between physical and higher layers are shown in the diagram. Every the Transport Format Combination Indicator denoted as TECI. This TECI is useful as it {informs the mobile equipment about availability of active transport channel, in the current frame. ‘The TL is added to each TC such that (TF + TC} is done where {TC} + Coding and multiplexing in bank of transport channels. and {TFl) + Physical control channel (CEH) It is possible to divide the transport channels into common channel and dedicated channel for a specific operation. Hence the transport channel has common and dedicated channels and uses them according to the nature of the operational requirement, in transport channels of W-CDMA(UMIS). TECHIUGAL PUBLGATONS'- Any rat know2500 chips (10 its) g “2 See Se ‘ e > —— ooo Radio Fame = 10 move [DPOCH - Dedicated Physical Data Cnannel [DPCCH - Dedicated Physical Contol Channel Fig, 1.910 The uplink DPDCH and DPCCH frame and slot structures User data transmission : In the user data transmission it makes use of slot structure of radio frame with 15 slots in 10 msec time period. The duration of a slot is about 2560 chips. It has a chip rate of 3.84 megachips/sec. The parallel code channels are being used for handling higher data rates. The user data transmission when combined with Random Access Channel (RACH) has a particular future preamble and it is sent before the data transmission. The uplink frame and slot structure is shown in the diagram above where one radio frame period is 10 msec. For fast power control the uplink common packet channel is used. In case of downlink the bit rates and symbol rates are same as the uplink, The downlink channel is of dedicated physical channel (DPCH) and (DPDCH) type. The bit rate in DPDCH is not fixed and it varies. It also uses time multiplexing for physical control information and also the user data information respectively. ‘Also there are three classes of frames in RLP. They are 4) New data frame ‘They are transmitted with lowest priority. 41) Control frames ‘They are used to carry control information and it is given top priority Mebte Communication 1-55 Introduction ‘i)Retransmitted data frame : They are meant for retransmitting the old data frame according to instructions given. Thus the radio layer protocol does important functionalities in MAC layer under cedima 2000 ‘Communication between layers and sublayor Structures : Establishing communication between the respective layers and sub layers is done using primitives. That is the MAC, LAC and layer 3 (upper layers) uses the primitives for passing the data and control information between intended layers. Also the actual data unit is considered as a parameter of the respective primitive. Consider that a PDU has to be sent from LAC sublayer. Now the LAC sublayer will invoke the service data unit (SDU) primitive to request the service from the MAC layer. ‘There are four different primitives which are effectively used for communication. It is shown in the diagrams below for both the transmit and receive side, E.g. : Transmit side : 4) Consider layer 3 wants to send a PDU. It makes a request for service from the next LAC sublayer by using the L2-data primitive as shown. ii) If the SAR or LAC sublayer need to transmit PDU ic. from layer 3 then the LAC sublayer will invoke the SDU ready primitive thus requesting a service from respective MAC layer. {iin case if enough space is available for bearing data transfer function over physical channels then the MAC layer transmits the "Availability-Primitive” to express the ‘event occured, as an indication to the service requester. iv)Once the ‘Availability Primitive’ is received, the LAC sublayer transmits MAC-Data primitive to that of the MAC, for requesting data transport service effectively ‘On the other hand there are two important primitives which are used at receive end. Receive side : 4) The MAC layer makes use of the MAC-Data primitive to the LAC sublayer. 4i) Once the processing is over, then it is informed to layer 3 as follows. The LAC sublayer sends a PDU using ‘L2-Data primitive’ to the layer 3 to express the ‘reception of signalling data. Tecrawea, PuBUCATONS”- An pert er ope ‘TEOAMCAL PURUCATIONS- Ani at er oweMobi Cammuniston 1-55 Introduction a ee Upper layer in the structure : ‘The operation of the entire 15-2000 system is controlled effectively by the signalling ‘entity, There aze four main states available, namely, 4) Mobile station initialization 4i) Mobile station idle ‘ai)System access iv) Mobile station control on traffic channel All these four states have similarity with the IS-95 standard as backward compatability. ‘Also the packet data transmission involved has three modes when the mobile is in traffic channel substate. The modes are a. Active mode ». Control hold mode «. Dormant mode reso Teo aire ar rar wmoce = Sapp Lass beta snd Fig, 1.9.11 Packet data transmission with three modes In the active mode there is exchange of user packet data and the respective dedicated signalling data between base station (BTS) and the mobile station (MS). Then the control mode in packet data transmission helps to maintain the MAC control and the power control functions using dedicated control channel in the system. Finally the dormant mode is mainly applied in ‘mobile station idle state’ to keep the etiectiey handed bythe signaling entity in the system. Power control It is very important to have proper power control in forward and receive end under Meble Communication 1-87 Introduction ‘The main types of power control used are 4) Power control in reverse link ‘This type mainly makes sure that al the received link signals are at same power level (nearly). Hence interference can be minimized among all the mobile signals, in reverse link. By using open loop and closed loop setups the power control is implemented. ii) Closed loop power control in forward link. ‘The closed loop power control is used in forward link and it is used to reduce the received power level from various transmitters at the mobile end. Then the EC/NO (Energy to noise) and the FER error rate of the signal received is measured by the ‘mobile continuously with respect to the forward link. Link Access Contel (LAC) The four entities of MAC layer Radio Link Protocol (RLP), Signalling Radio Burst Protocol (SRBP), dedicated channel multiplex sublayer and common channel multiplex sublayer is shown in the protocol architecture in 15-2000 (ema 2000).Mobi Communication 1-88 Intrcucton Mobie Communication 1-50 Invecuction EDD introduction to 4G [Fourth Generation] EERERE 4c vision Some of the difficulties of SG networks are being overcome by 4G networks. The sero Gdn, + High-quality voice ‘+ High - definition video to the high data rate wireless channels. Jn 4G Informations can be received anywhere, anytime with connection to a wide range of informations and services. Also a large volume of information pictures, data video etc can be received with 4G ‘A simple 4G Visions Scenario is shown here. A subscriber to that of pplication End are included. Further developments of 4G Systems would include several networks Jn WLAN the IEEE 802.11 standards extend its performances to public domains. feces pee ee poe The 4G sytem are compatble and introperble with 2G and 9G stars and the bronder Bandit broadcasting systems. This is turn integrates to the wireless local loop (WLI), wireless personal area networks (WPAN'). ‘= Smoother and faster handoffs ‘Thus 4G technology has brought a communication revclution in wireless scanario to sis lighes: ain zak, greater extent, An enhanced services across multiple of wireless networks and wireless systems. TECHIOCAL PLBUCATIONS™. Ang hat er moe TECHNCAL PUBUCATIONS™. Anup totesebie Connon 1-60 recon bie Conmanaton Inrcten EETEY Comparison of 4G and 3G Fully EEE com ae ‘A simple comparison of 4G with the 3G with respect to some of their parameters are tabulated below. ia a sot“ 8 __Top speed of mobile EERTED 4c Features and challenges ‘The Fourth Generation Networks or 4G are mainly designed to facilitate better wireless capabilites, improved technologies and Networks operating speeds etc. The virtual objective of 4G is allowing every subscriber to access the Interet at anytime and from everywhere. Unlike 3G the 4G is a IP based network where every substiber connected to Internet {s provided with an IP address. A key features of 4G networks is its higher level of user - level customization. By this feature every subscriber can select their preferred level of quality of services (QoS) Wireless radio environment and s0 on. Independency Fig. 4.103 Some 46 features (Other key features of 4G networks includes ; ‘Anytime, Anywhere with any other device, enables higher usability ‘© Personalized communication facilities ‘© Integrated Services + Supporting multimedia service at lesser cost. Sag Marck at tony RN Sea hagas oc ‘They provide anytime anywhere services. Fig. 1,104 46 = cca to nara from anywbar unng any wile deve Hence the features of 4G are more attractive and it has captured the mobile market replacing the bottolenecks of 3G Networks. ‘Accessing Internet from, Anywhere, Anytime with Any device is a popular feature of 4G standard. TECHNCAL PUBLICATIONS Anup rt x one TECHNICAL PUBLCATINS Anup nat orion
You might also like
Cellular Networks For SPPU 19 Course (TE-SEM6)
PDF
No ratings yet
Cellular Networks For SPPU 19 Course (TE-SEM6)
196 pages
Wireless Communications - T. L. Singal
PDF
67% (6)
Wireless Communications - T. L. Singal
694 pages
Techmax of Computer Networks
PDF
80% (10)
Techmax of Computer Networks
368 pages
Satellite Communication Cec-352, Suchitra Publications, Gopinath.l, Reg-2021
PDF
0% (2)
Satellite Communication Cec-352, Suchitra Publications, Gopinath.l, Reg-2021
393 pages
Cryptography and Network Security
PDF
80% (10)
Cryptography and Network Security
156 pages
Iii Bca and CS Iot Notes 2023 PDF
PDF
No ratings yet
Iii Bca and CS Iot Notes 2023 PDF
105 pages
CCS Technical Publication Notes
PDF
No ratings yet
CCS Technical Publication Notes
279 pages
GE8076 - Professional Ethics in Engineering (Ripped From Amazon Kindle Ebooks by Sai Seena)
PDF
80% (5)
GE8076 - Professional Ethics in Engineering (Ripped From Amazon Kindle Ebooks by Sai Seena)
184 pages
Iot Tech Neo
PDF
100% (1)
Iot Tech Neo
177 pages
5 Unit Notes
PDF
100% (1)
5 Unit Notes
166 pages
Digital Image Processing Notes Vtu
PDF
No ratings yet
Digital Image Processing Notes Vtu
72 pages
Iot Raj Kamal PDF
PDF
100% (5)
Iot Raj Kamal PDF
188 pages
AI Technical Book (3161608)
PDF
100% (10)
AI Technical Book (3161608)
351 pages
Big Data Analytics Mumbai University
PDF
100% (1)
Big Data Analytics Mumbai University
95 pages
Information Retrieval Techniques by Iresh Dhotre
PDF
100% (3)
Information Retrieval Techniques by Iresh Dhotre
168 pages
UNIT-3 Part 2 Cloud Computing
PDF
0% (1)
UNIT-3 Part 2 Cloud Computing
10 pages
Cloud Computing Quantum Koe 081
PDF
100% (1)
Cloud Computing Quantum Koe 081
79 pages
ML Techmax
PDF
100% (1)
ML Techmax
202 pages
Indexing: 1. Static and Dynamic Inverted Index
PDF
50% (2)
Indexing: 1. Static and Dynamic Inverted Index
55 pages
Wireless Communication Handwritten Notes PDF
PDF
100% (1)
Wireless Communication Handwritten Notes PDF
97 pages
IOT Notes AllUnits PDF
PDF
100% (1)
IOT Notes AllUnits PDF
50 pages
Distributed Computing Tech Knowledge
PDF
100% (1)
Distributed Computing Tech Knowledge
149 pages
Soft Computing Quantum
PDF
80% (5)
Soft Computing Quantum
84 pages
Project Management and Entrepreneurship by KK
PDF
No ratings yet
Project Management and Entrepreneurship by KK
62 pages
WiFi Technology
PDF
No ratings yet
WiFi Technology
35 pages
IT8075-UNIT-5-Best-methods-of-staff-selection-Motivation SPM
PDF
No ratings yet
IT8075-UNIT-5-Best-methods-of-staff-selection-Motivation SPM
35 pages
MCC Searchable
PDF
No ratings yet
MCC Searchable
212 pages
Iot Systems Management With Netconf-Yang: by J.Ann Roseela Ap/Ece
PDF
No ratings yet
Iot Systems Management With Netconf-Yang: by J.Ann Roseela Ap/Ece
32 pages
Message-Oriented Communication: Presented By: Ms. Punam S. Pawar
PDF
100% (2)
Message-Oriented Communication: Presented By: Ms. Punam S. Pawar
25 pages
Cloud Techmax
PDF
No ratings yet
Cloud Techmax
125 pages
Lect6-IoT-Cloud Storage Models and Communication APIs1
PDF
100% (1)
Lect6-IoT-Cloud Storage Models and Communication APIs1
25 pages
AI Unit 1 Handwritten Notes
PDF
100% (2)
AI Unit 1 Handwritten Notes
40 pages
Jntu SL Lab Manual
PDF
No ratings yet
Jntu SL Lab Manual
33 pages
IR Question Bank
PDF
100% (2)
IR Question Bank
29 pages
Jntuh r18 DM Gunshot ? Very Important ??? Questions and Answers
PDF
No ratings yet
Jntuh r18 DM Gunshot ? Very Important ??? Questions and Answers
95 pages
MC Notes Unit-1
PDF
No ratings yet
MC Notes Unit-1
27 pages
Machine Learning UNIT 1 PDF
PDF
100% (1)
Machine Learning UNIT 1 PDF
33 pages
CN Decode
PDF
No ratings yet
CN Decode
67 pages
Case Studies - N-Body Solvers - Tree Search - Openmp and Mpi Implementations and Comparison
PDF
100% (1)
Case Studies - N-Body Solvers - Tree Search - Openmp and Mpi Implementations and Comparison
12 pages
CNS Lab Manual
PDF
No ratings yet
CNS Lab Manual
32 pages
CNS Unit 1 (1) Spectrum Jntuh
PDF
100% (1)
CNS Unit 1 (1) Spectrum Jntuh
35 pages
Wireless Techhnology
PDF
0% (2)
Wireless Techhnology
16 pages
Embedded Systems: Technical Publications
PDF
100% (1)
Embedded Systems: Technical Publications
16 pages
EX - NO:1 Write A Code Simulating ARP /RARP Protocols: Aim: Algorithm: Server
PDF
100% (1)
EX - NO:1 Write A Code Simulating ARP /RARP Protocols: Aim: Algorithm: Server
25 pages
Daa Lab Manual Kcs553 2022-23
PDF
No ratings yet
Daa Lab Manual Kcs553 2022-23
89 pages
Localization and Calling: Mobile Station International ISDN Number (MSISDN) : The Only Important Number
PDF
100% (1)
Localization and Calling: Mobile Station International ISDN Number (MSISDN) : The Only Important Number
3 pages
DC Techmax Everything You Need To Prepare For Distributed Computing Subject in The Final
PDF
No ratings yet
DC Techmax Everything You Need To Prepare For Distributed Computing Subject in The Final
193 pages
HS8581 - Professional Communication - Lab Record
PDF
100% (2)
HS8581 - Professional Communication - Lab Record
10 pages
GSM Channel Types
PDF
100% (1)
GSM Channel Types
3 pages
EX - NO:1 Date: Implementation of Stop and Wait Protocol and Sliding Window Protocol Aim
PDF
No ratings yet
EX - NO:1 Date: Implementation of Stop and Wait Protocol and Sliding Window Protocol Aim
12 pages
cs8601 Mobile Computing Notes
PDF
No ratings yet
cs8601 Mobile Computing Notes
109 pages
Model QP Programs
PDF
89% (9)
Model QP Programs
11 pages
Wireless Technology Viva Questions and Answer Mca Sem5
PDF
100% (5)
Wireless Technology Viva Questions and Answer Mca Sem5
12 pages
Unit III Iot
PDF
100% (2)
Unit III Iot
51 pages
Technical Publications Book 1
PDF
No ratings yet
Technical Publications Book 1
2 pages
Evolution of Analytical Scalability
PDF
100% (1)
Evolution of Analytical Scalability
11 pages
Time Out Freezing, Selective Retransmission
PDF
0% (1)
Time Out Freezing, Selective Retransmission
3 pages
Iot Question Bank: For Module 2,3,4,5 Scroll Down
PDF
100% (1)
Iot Question Bank: For Module 2,3,4,5 Scroll Down
7 pages
MUltimedia Compression Techniques Question Paper
PDF
100% (2)
MUltimedia Compression Techniques Question Paper
2 pages
Mcunit 1
PDF
No ratings yet
Mcunit 1
22 pages