Unit - Iv
Unit - Iv
Wireless Communication
HO_MARGIN
MS MS
BTSold BTSnew
UK
890 MHz 915 935 960
US
825 845 870 890
Japan
870 885 925 940
HANDOFFS
Types of Handoff
•Hard Handoff
•Soft Handoff
Hard Handoff
1G 2G 3G
• AMPT (Advanced Mobile Phone System): North America
• NMT (Nordic Mobile Telephony): North Europe
• TACS (Total Access Communication Service): Europe, China
• HCMTS (High Capacity Mobile Telephone System): Japan
• GSM : Global System of Mobilephone / Global System for Mobile Communications
• GPRS : General Packet Radio Service
f3
f5 f2
f4 f6 f5
f1 f4
f3 f7 f1
f2
Most stations use air as the medium for communication, stations must be able to
share the medium without an interception and without being subject to jamming from
a malicious intruder. To achieve this, spread-spectrum techniques add redundancy
means it uses extended bandwidth to accommodate signals in a protective envelope
so that more secure transmission is possible. The spread code is a series of numbers
that looks random but are actually a pattern. The original bandwidth of the signal
gets enlarged (spread) through the spread code as shown in the figure.
Spread Spectrum
Principles of Spread Spectrum process:
1.To allow redundancy, it is necessary that the bandwidth allocated to each station
should be much larger than needed.
2.The spreading process occurs after the signal is created by the source.
Conditions of Spread Spectrum are:
1.The spread spectrum is a type of modulation where modulated signal BW is much
larger than the baseband signal BW i.e. spread spectrum is a wide band scheme.
2.A special code (pseudo noise) is used for spectrum spreading and the same code is
to be used to despread the signal at the receiver.
Characteristics of the Spread Spectrum are:
1.Higher channel capacity.
2.They cannot easily intercept any unauthorized person.
3.They are resistant to jamming.
4.The spread spectrum provides immunity to distortion due to multipath propagation.
5.The spread spectrum offers multiple access capabilities.
Spread Spectrum
Two types of techniques for Spread Spectrum are:
1.Frequency Hopping Spread Spectrum (FHSS)
2.Direct Sequence Spread Spectrum (DSSS)
Frequency Hopping Spread Spectrum (FHSS)
In DSSS, the bandwidth of the original signal is also expanded by a different technique.
Here, each data bit is replaced with n bits using a spreading code called chips, and the
bit rate of the chip is called as chip-rate. The chip rate is n times the bit rate of the
original signal. The above Figure shows the DSSS block diagram.. In wireless LAN,
the sequence with n = 11 is used. The original data is multiplied by chips (spreading
code) to get the spread signal. The required bandwidth of the spread signal is 11 times
larger than the bandwidth of the original signal.
Characteristics FHSS DSSS
FHSS signal transmission DSSS signal transmission
Signal Transmission Speed speed is slow. speed is high.
The size of the FHSS Size of DSSS network is
Size of Network network is small to medium. large
The third generation, or 3G, systems were initially deployed in 2001 and offer both
digital voice and broadband digital data services. 3G is loosely defined by the ITU (an
international standards body we will discuss in the next section) as providing rates of
at least 2 Mbps for stationary or walking users and 384 kbps in a moving vehicle.
UMTS (Universal Mobile Telecommunications System), also called WCDMA
(Wideband Code Division Multiple Access), is the main 3G system that is being
rapidly deployed worldwide. It can provide up to 14 Mbps on the downlink and
almost 6 Mbps on the uplink
Architecture of the UMTS 3G mobile
phone network
Simplified version of the UMTS architecture is presented in the
Fig.. First, there is the air interface. This term is a fancy name for
the radio communication protocol that is used over the air between
the mobile device (e.g., the cell phone) and the cellular base
station. Advances in the air interface over the past decades have
greatly increased wireless data rates. The UMTS air interface is
based on Code Division Multiple Access (CDMA),
The cellular base station together with its
controller forms the radio access network.
This part is the wireless side of the mobile
phone network. The controller node or RNC
(Radio Network Controller) controls how
the spectrum is used. The base station
implements the air interface. It is called Node
B, a temporary label that stuck. Each mobile
phone network has a HSS (Home Subscriber
Server)
in the core network that knows the location of
each subscriber, as well as other profile
information that is used for authentication and
authorization.
Architecture of the UMTS 3G mobile
phone network
Older mobile phone networks used a circuit-switched core in the style of the
traditional phone network to carry voice calls. This legacy is seen in the UMTS
network with the MSC (Mobile Switching Center), GMSC (Gateway Mobile
Switching Center), and MGW (Media Gateway) elements that set up connections
over a circuit-switched core network such as the PSTN (Public Switched Telephone
Network).
Newer mobile phone networks carry
packet data at rates of multiple
Mbps. To carry all this data, the
UMTS core network nodes connect
directly to a packet-switched
network. The SGSN (Serving GPRS
Support Node) and the GGSN
(Gateway GPRS Support Node)
deliver data packets to and from
mobiles and interface to external
packet networks such as the
Internet.
CDMA
• Direct sequence spread spectrum, uses a code sequence to spread the data signal over a wider frequency
band. It is widely used commercially as a spectrally efficient way to let multiple signals share the same
frequency band. These signals can be given different codes, a method called CDMA (Code Division Multiple
Access).
• CDMA allows each station to transmit over the entire frequency spectrum all the time. Multiple simultaneous
transmissions are separated using coding theory. Before getting into the algorithm, let us consider an analogy:
an airport lounge with many pairs of people conversing. TDM is comparable to pairs of people in the room
taking turns speaking. FDM is comparable to the pairs of people speaking at different pitches, some high-
pitched and some low-pitched such that each pair can hold its own conversation at the same time as but
independently of the others. CDMA is comparable to each pair of people talking at once, but in a different
language. The French-speaking couple just hones in on the French, rejecting everything that is not French as
noise. Thus, the key to CDMA is to be able to extract the desired signal while rejecting everything else as
random noise. A somewhat simplified description of CDMA follows.
• In CDMA, each bit time is subdivided into m short intervals called chips. Typically, there are 64 or 128 chips
per bit, but in the example given here we will use 8 chips/bit for simplicity. Each station is assigned a unique
m-bit code called a chip sequence.
S1.C=[1+1+1+1+1+1+1+1]/8=1
WCDMA
WCDMA:It uses a wider frequency band and provides
higher data rates than CDMA.
• Advantage:
• One major advantage of WCDMA is its ability to handle large
amounts of data, making it well-suited for applications such as
mobile internet browsing and streaming video. It also has good
coverage and reliability, as it is able to transmit signals over
long distances and through physical barriers such as walls and
buildings.
• Disadvantage:
• However, there are also some disadvantages to WCDMA. One
drawback is that it requires a more complex and expensive
infrastructure to support its wideband frequency bands. It is
also more susceptible to interference from other sources, such
as other wireless devices or electrical equipment. Additionally,
WCDMA has been superseded by newer, faster mobile
technologies such as 4G and 5G.
CDMA
Frequency Division Duplex (FDD)
Direct Sequence CDMA
"megachips per second"
(Mcps)
Guard intervals in OFDM are not used to achieve separation between subcarriers.
They are used to prevent co-channel interference and exist at the ends of the
channel.
OFDM
For example, the 802.11 standard, uses 20MHz wide channels. Each channel is
split into 64 subcarriers with 312.5 kHz spacing.
Of these 64 subcarriers, the first 6 are used to protect against co-channel
interference from the adjacent lower band and the last 5 are used to protect against
co-channel interference from the adjacent upper band.(the grey bands at the ends in
the figure below).
Modulation
Demodulation
%Receiver
outSym = ofdmdemod(y1,nfft,cplen) ;
iqamSig = qamdemod(outSym,M,'UnitAveragePower',true);
out=dataIn-iqamSig
LTE-Long Term Evolution-Architecture
Mobility Management Policy and Charging Rules Function
Entity
Packet Data
Network