cellularnetworks for cse [compatibility mode].pdf

Upload: muhammad-mahadi-hasan

Post on 05-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    1/11

    7/25/2012

    1

    Cellular Networks

    Cellular Network Organization

    Use multiple low-power transmitters (100W or less)

    Areas divided into cells

    o Each served by its own antenna

    o Served by base station consisting oftransmitter, receiver, and control unit

    o Band of frequencies allocated

    o Cells set up such that antennas of all neighborsare equidistant (hexagonal pattern)

    3 Core Principles

    Small cells tessellate overall coveragearea.

    Users handoff as they move from one cell

    to another.

    Frequency reuse.

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    2/11

    7/25/2012

    2

    Frequency Reuse

    Adjacent cells assigned different

    frequencies to avoid interference orcrosstalk

    Objective is to reuse frequency in nearbycells

    o 10 to 50 frequencies assigned to each cell

    o Transmission power controlled to limit power atthat frequency escaping to adjacent cells

    o The issue is to determine how many cells must

    intervene between two cells using the samefrequency

    Cellular Concept

    Several small cells instead of a single transmitter=> frequency reuse: better efficiency

    Fixed Channel Allocation:

    Cluster of size N= i2+ij+j2; and D= sqrt(3N)R

    Rcell radius and

    Ddistance at which a frequency can be reused with acceptable interference

    Examples

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    3/11

    7/25/2012

    3

    Approaches to Cope withIncreasing Capacity Adding new channels

    Frequency borrowing frequencies are takenfrom adjacent cells by congested cells

    Cell splitting cells in areas of high usage can besplit into smaller cells

    Cell sectoring cells are divided into a number ofwedge-shaped sectors, each with their own set of

    channels

    Microcells antennas move to buildings, hills, andlamp posts

    Cellular System Overview

    Cellular Systems Terms

    Base Station (BS) includes an antenna, acontroller, and a number of receivers

    Mobile telecommunications switching office(MTSO) connects calls between mobile units

    Two types of channels available between mobileunit and BS

    o Control channels used to exchange information having

    to do with setting up and maintaining calls

    o Traffic channels carry voice or data connection betweenusers

    Steps in an MTSO Controlled Callbetween Mobile UsersMobile unit initialization

    Mobile-originated call

    Paging

    Call accepted

    Ongoing call

    Handoff

    Additional Functions in an MTSOControlled CallCall blocking

    Call termination

    Call drop

    Calls to/from fixed and remote mobile

    subscriber

    Mobile Radio Propagation Effects

    Signal strength

    o Must be strong enough between base stationand mobile unit to maintain signal quality at

    the receiver

    o Must not be so strong as to create too much

    cochannel interference with channels in anothercell using the same frequency band

    Fading

    o Signal propagation effects may disrupt thesignal and cause errors

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    4/11

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    5/11

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    6/11

    7/25/2012

    6

    Base Station Subsystem (BSS)

    BSS consists of base station controller andone or more base transceiver stations(BTS)

    Each BTS defines a single cell

    o Includes radio antenna, radio transceiver and alink to a base station controller (BSC)

    BSC reserves radio frequencies, manageshandoff of mobile unit from one cell toanother within BSS, and controls paging

    Network and switching subsystem

    Components

    MSC(Mobile Services Switching Center):

    IWF(Interworking Functions)

    ISDN(Integrated Services Digital Network)

    PSTN(Public Switched Telephone Network)

    PSPDN(Packet Switched Public Data Net.)

    CSPDN(Circuit Switched Public Data Net.)

    Databases

    HLR(Home LocationRegister)

    VLR(Visitor Location Register)

    EIR(Equipment Identity Register)

    networksubsystem

    MSC

    MSC

    fixed partnernetworks

    IWF

    ISDNPSTN

    PSPDNCSPD

    N

    SS7

    EIR

    HLR

    VLR

    ISDNPSTN

    Network Subsystem (NS)

    Provides link between cellular network andPSTNs

    Controls handoffs between cells in differentBSSs

    Authenticates users and validates accountsEnables worldwide roaming of mobile users

    Central element of NS is the mobileswitching center (MSC)

    Mobile Switching Center (MSC)Databases Home location register (HLR) database stores

    information about each subscriber that belongs to it

    Visitor location register (VLR) database maintainsinformation about subscribers currently physically inthe region

    Authentication center database (AuC) used forauthentication activities, holds encryption keys

    Equipment identity register database (EIR) keepstrack of the type of equipment that exists at themobile station

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    7/11

    7/25/2012

    7

    TDMA Format Time Slot Fields

    GSM uses a complex TDMA frames to define logical channels. Each 200 kHzfrequency band is divided into 8 logical channels.

    With a bitrate of 270.84kbps, each time slot has a length of 156.25 bits withduration of 0.5777 ms.

    Trail bits allow synchronization of transmissions from mobile units located atdifferent distances

    Encrypted bits encrypted data

    Stealing bit - indicates whether block contains data or is "stolen"

    Training sequence used to adapt parameters of receiver to the current pathpropagation characteristics

    o Strongest signal selected in case of multipath propagation

    Guard bits used to avoid overlapping with other bursts

    GSM Speech Processing

    Speech coding:

    The speech signal is compressed using an algorithm Regular Pulse Excited-Linear Predictive Coder (RPE-LPC)

    260 bits in every 20 ms (13kbps)

    260 bit divided into three classes

    Class 1a: 50 bits, most sensitive t o bit errors

    Class2b: 132 bits: moderately sensitive to bi t errors

    Class3c: 78 bits: least sensitive to bit errors.

    50 bits are protected by 3 bit CRC, if error detected then discard (53)

    53+132=185 bits +4 bi t trail sequence=189 bits. 2 convolution error correcting code 189*2= 378 bits

    378+78=456 bits / 20 ms = 22.8 kbps (GSM traffic data rate)

    To add protection againt burst errors, each 456 bit s are divided into 8 57bitblocks. Carries data from dirrent speech samples.

    Data encripted 114 bits at a time. Assembled into time slot (burst assembly)

    Modulation (GMSK)

    GSM Speech Processing Steps

    Speech compressed using a predictivecoding scheme

    Divided into blocks, each of which isprotected partly by CRC and partly by aconvolutional code

    Interleaving to protect against burst errors

    Encryption for providing privacy

    Assembled into time slots

    Modulated for analog transmission usingFSK

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    8/11

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    9/11

    7/25/2012

    9

    Handover decision

    receive levelBTSoldreceive levelBTSold

    MS MS

    HO_MARGIN

    BTSold BTSnew

    Security in GSM Security services

    o access control/authentication u ser SIM (Subscriber Identity Module): secret PIN (personal identification

    number)

    SIM network: challenge response method

    o confidentiality

    voice and signaling encrypted on the wireless link (after successfulauthentication)

    o anonymity

    temporary identity TMSI(Temporary Mobile Subscriber I dentity)

    newly assigned at each new location update (LUP)

    encrypted transmission

    3 algorithms specified in GSM

    o A3 for authentication (secret, open interface)

    o A5 for encryption (standardized)

    o A8 for key generation (secret, open interface)

    secret:A3 and A8

    available via theInternet

    network providerscan use stronger

    mechanisms

    GSM - authentication

    A3

    RANDKi

    128 bit 128 bit

    SRES* 32 bit

    A3

    RAND Ki

    128 bit 128 bit

    SRES 32 bit

    SRES* =? SRES SRES

    RAND

    SRES

    32 bit

    mobile network SIM

    AC

    MSC

    SIM

    Ki: individual subscriber authentication key SRES: signed response

    GSM - key generation andencryption

    A8

    RANDKi

    128 bit 128 bit

    Kc64 bit

    A8

    RAND Ki

    128 bit 128 bit

    SRES

    RAND

    encrypteddata

    mobile network (BTS) MS with SIM

    AC

    BTS

    SIM

    A5

    Kc64 bit

    A5

    MS

    data data

    cipherkey

    IS-95 (CdmaOne)

    IS-95: standard for the radio interface

    IS-41: standard for the network part

    Operates in 800MHz and 1900MHz bands

    Uses DS-CDMA technology (1.2288 Mchips/s)

    Forward link (downlink): (2,1,9)-convolutional code,interleaved, 64 chips spreading sequence (Walsh-Hadamardfunctions)

    Pilot channel, synchronization channel, 7 paging channels, upto 63 traffic channels

    Reverse link (uplink): (3,1,9)-convolutional code,interleaved, 6 bits are mapped into a Walsh-Hadamardsequence, spreading using a user-specific code

    Tight power control (open-loop, fast closed loop)

    Advantages of CDMA Cellular

    Frequency diversity frequency-dependenttransmission impairments have less effect on

    signal

    Multipath resistance chipping codes used forCDMA exhibit low cross correlation and lowautocorrelation

    Privacy privacy is inherent since spread

    spectrum is obtained by use of noise-like signals

    Graceful degradation system only graduallydegrades as more users access the system

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    10/11

    7/25/2012

    10

    Drawbacks of CDMA Cellular

    Self-jamming arriving transmissions

    from multiple users not aligned on chipboundaries unless users are perfectlysynchronized

    Near-far problem signals closer to thereceiver are received with less attenuationthan signals farther away

    Soft handoff requires that the mobileacquires the new cell before it relinquishesthe old; this is more complex than hardhandoff used in FDMA and TDMA schemes

    CDMA Design Considerations

    RAKE receiver when multiple versions of

    a signal arrive more than one chip intervalapart, RAKE receiver attempts to recoversignals from multiple paths and combinethemo This method achieves better performance than

    simply recovering dominant signal and treatingremaining signals as noise

    Soft Handoff mobile station temporarilyconnected to more than one base stationsimultaneously

    Principle of RAKE Receiver Forward Link Channels

    Pilot: allows the mobile unit to acquire timinginformation, provides phase reference and

    provides means for signal strength comparison

    Synchronization: used by mobile station to obtainidentification information about cellular system

    Paging: contain messages for one or more mobilestations

    Traffic: the forward channel supports 55 trafficchannels

    Forward Traffic Processing Steps

    Speech is encoded at a rate of 8550 bps

    Additional bits added for error detection

    Data transmitted in 2-ms blocks withforward error correction provided by aconvolutional encoder

    Data interleaved in blocks to reduce effectsof errors

    Data bits are scrambled, serving as aprivacy masko Using a long code based on users electronic

    serial number

    Forward Traffic Processing Steps

    Power control information inserted into trafficchannel

    DS-SS function spreads the 19.2 kbps to a rate of1.2288 Mbps using one row of 64 x 64 Walshmatrix

    Digital bit stream modulated onto the carrierusing QPSK modulation scheme

  • 7/31/2019 CellularNetworks for CSE [Compatibility Mode].pdf

    11/11

    7/25/2012

    11

    Reverse Traffic Processing Steps

    Convolutional encoder at rate 1/3

    Spread the data using a Walsh matrixo Use a 6-bit piece of data as an index to the Walsh matrix

    o To improve reception at base station

    Data burst randomizer

    Spreading using the user-specific long code mask

    Third-Generation Capabilities

    Voice quality comparable to the public switchedtelephone network

    144 kbps data rate available to users in high-speed motor vehicles over large areas

    384 kbps available to pedestrians standing ormoving slowly over small areas

    Support for 2.048 Mbps for office use

    Symmetrical/asymmetrical data transmission rates

    Support for both packet switched and circuitswitched data services