Beruflich Dokumente
Kultur Dokumente
Contents
[hide]
7 See also
available, and the sequence in use for a particular cell is continually broadcast by that cell
so that it is known to the handsets.
A TRX transmits and receives according to the GSM standards, which specify eight
TDMA timeslots per radio frequency. A TRX may lose some of this capacity as some
information is required to be broadcast to handsets in the area that the BTS serves. This
information allows the handsets to identify the network and gain access to it. This
signalling makes use of a channel known as the BCCH (Broadcast Control Channel).
[edit] Sectorisation
By using directional antennas on a base station, each pointing in different directions, it is
possible to sectorise the base station so that several different cells are served from the
same location. Typically these directional antennas have a beamwidth of 65 to 85
degrees. This increases the traffic capacity of the base station (each frequency can carry
eight voice channels) whilst not greatly increasing the interference caused to neighboring
cells (in any given direction, only a small number of frequencies are being broadcast).
Typically two antennas are used per sector, at spacing of ten or more wavelengths apart.
This allows the operator to overcome the effects of fading due to physical phenomena
such as multipath reception. Some amplification of the received signal as it leaves the
antenna is often used to preserve the balance between uplink and downlink signal.
The databases for all the sites, including information such as carrier frequencies,
frequency hopping lists, power reduction levels, receiving levels for cell border
calculation, are stored in the BSC. This data is obtained directly from radio planning
engineering which involves modelling of the signal propagation as well as traffic
projections.
[edit] Transcoder
between voice and data is controlled by the base station, but once a channel is allocated
to the PCU, the PCU takes full control over that channel.
The PCU can be built into the base station, built into the BSC or even, in some proposed
architectures, it can be at the SGSN site.
Image of the GSM network, showing the BSS interfaces to the MS, NSS and GPRS Core
Network
Um - The air interface between the MS (Mobile Station) and the BTS. This
interface uses LAPDm protocol for signaling, to conduct call control,
measurement reporting, Handover, Power control, Authentication, Authorization,
Location Update and so on. Traffic and Signaling are sent in bursts of 0.577 ms at
intervals of 4.615 ms, to form data blocks each 20 ms.
Abis - The interface between the Base Transceiver Station and Base Station
Controller. Generally carried by a DS-1, ES-1, or E1 TDM circuit. Uses TDM
subchannels for traffic (TCH), LAPD protocol for BTS supervision and telecom
signaling, and carries synchronization from the BSC to the BTS and MS.
A - The interface between the BSC and Mobile Switching Center. It is used for
carrying Traffic channels and the BSSAP user part of the SS7 stack. Although
there are usually transcoding units between BSC and MSC, the signaling
communication takes place between these two ending points and the transcoder
unit doesn't touch the SS7 information, only the voice or CS data are transcoded
or rate adapted.
Ater - The interface between the Base Station Controller and Transcoder. It is a
proprietary interface whose name depends on the vendor (for example Ater by
Nokia), it carries the A interface information from the BSC leaving it untouched.
Gb - Connects the BSS to the Serving GPRS Support Node (SGSN) in the GPRS
Core Network.
Penjelasan :
A cellular network is a radio network made up of a number of radio cells (or just cells)
each served by a fixed transmitter, known as a cell site or base station. These cells are
used to cover different areas in order to provide radio coverage over a wider area than the
area of one cell. Cellular networks are inherently asymmetric with a set of fixed main
transceivers each serving a cell and a set of distributed (generally, but not always, mobile)
transceivers which provide services to the network's users.
Cellular networks offer a number of advantages over alternative solutions:
increased capacity
reduced power usage
better coverage
A good (and simple) example of a cellular system is an old taxi driver's radio system
where the taxi company will have several transmitters based around a city each operated
by an individual operator.
Contents
[hide]
1 General characteristics
2 Broadcast messages and paging
3 Frequency reuse
4 Movement from cell to cell and handover
5 Cellular telephony
6 See also
7 External Links
The principle of CDMA is more complex, but achieves the same result; the distributed
transceivers can select one cell and listen to it. Other available methods of multiplexing
such as polarization division multiple access (PDMA) and time division multiple access
(TDMA) cannot be used to separate signals from one cell to the next since the effects of
both vary with position and this would make signal separation practically impossible.
Time division multiple access, however, is used in combination with either FDMA or
CDMA in a number of systems to give multiple channels within the coverage area of a
single cell.
In the case of the aforementioned taxi company, each radio has a knob. The knob acts as a
channel selector and allows the radio to tune to different frequencies. As the drivers move
around, they change from channel to channel. The drivers know which frequency covers
approximately what area, when they don't get a signal from the transmitter, they also try
other channels until they find one which works. The taxi drivers only speak one at a time,
as invited by the operator (in a sense TDMA).
users are separated by codes rather than frequencies. Frequency division is in this case
typically only used to separate cells (sector antennas) at the same base station site.
Depending on the size of the city, a taxi system may not have any frequency-reuse in its
own city, but certainly in other nearby cities, the same frequency can be used. In a big
city, on the other hand, frequency-reuse could certainly be in use.
coverage. GSM 900 (900 MHz) is a suitable solution for light urban coverage. GSM 1800
(1.8 GHz) starts to be limited by structural walls. This is a disadvantage when it comes to
coverage, but it is a decided advantage when it comes to capacity. Pico cells, covering
e.g. one floor of a building, become possible, and the same frequency can be used for
cells which are practically neighbours. UMTS, at 2.1 GHz is quite similar in coverage to
GSM 1800. At 5 GHz, 802.11a Wireless LANs already have very limited ability to
penetrate walls and may be limited to a single room in some buildings. At the same time,
5 GHz can easily penetrate windows and goes through thin walls so corporate WLAN
systems often give coverage to areas well beyond that which is intended.
Moving beyond these ranges, network capacity generally increases (more bandwidth is
available) but the coverage becomes limited to line of sight. Infra-red links have been
considered for cellular network usage, but as of 2004 they remain restricted to limited
point-to-point applications.
Cell service area may also vary due to interference from transmitting systems, both
within and around that cell. This is true especially in CDMA based systems. The receiver
requires a certain signal-to-noise ratio. As the receiver moves away from the transmitter,
the power transmitted is reduced. As the interference (noise) rises above the received
power from the transmitter, and the power of the transmitter cannot be increased any
more, the signal becomes corrupted and eventually unusable. In CDMA-based systems,
the effect of interference from other mobile transmitters in the same cell on coverage area
is very marked and has a special name, cell breathing.
Old fashioned taxi radio systems, such as the one we have been studying, generally use
low frequencies and high sited transmitters, probably based where the local radio station
has its mast. This gives a very wide area coverage in a roughly circular area surrounding
each mast. Since only one user can talk at any given time, coverage area doesn't change
with number of users. The reduced signal to noise ratio at the edge of the cell is heard by
the user as crackling and hissing on the radio.
To see real examples of cell coverage look at some of the coverage maps provided by real
operators on their web sites; in certain cases they may mark the site of the transmitter, in
others it can be located by working out the point of strongest coverage.
Cell site
The most common example of a cellular network is a mobile phone (cell phone) network.
A mobile phone is a portable telephone which receives or makes calls through a cell site
(base station), or transmitting tower. Radio waves are used to transfer signals to and from
the cell phone. Large geographic areas (representing the coverage range of a service
provider) are split up into smaller cells to deal with line-of-sight signal loss and the large
number of active phones in an area. In cities, each cell site has a range of up to
approximately mile, while in rural areas, the range is approximately 5 miles. Many
times in clear open areas, a user may receive signal from a cell 25 miles away. Each cell
overlaps other cell sites. All of the cell sites are connected to cellular telephone
exchanges "switches", which in turn connect to the public telephone network or another
switch of the cellular company.
As the phone user moves from one cell area to another, the switch automatically
commands the handset and a cell site with a stronger signal (reported by the handset) to
go to a new radio channel (frequency). When the handset responds through the new cell
site, the exchange switches the connection to the new cell site.
With CDMA, multiple CDMA handsets share a specific radio channel; the signals are
separated by using a pseudonoise code (PN code) specific to each phone. As the user
moves from one cell to another, the handset sets up radio links with multiple cell sites (or
sectors of the same site) simultaneously. This is known as "soft handoff" because, unlike
with traditional cellular technology, there is no one defined point where the phone
switches to the new cell.
Modern mobile phones use cells because radio frequencies are a limited, shared resource.
Cell-sites and handsets change frequency under computer control and use low power
transmitters so that a limited number of radio frequencies can be reused by many callers
with less interference. CDMA handsets, in particular, must have strict power controls to
avoid interference with each other. An incidental benefit is that the batteries in the
handsets need less power.
Since almost all mobile phones use cellular technology, including GSM, CDMA, and
AMPS (analog), the term "cell phone" is used interchangeably with "mobile phone";
however, an exception of mobile phones not using cellular technology is satellite phones.
Old systems predating the cellular principle may still be in use in places. The most
notable real hold-out is used by many amateur radio operators who maintain phone
patches in their clubs' VHF repeaters.
There are a number of different digital cellular technologies, including: Global System
for Mobile Communications (GSM), General Packet Radio Service (GPRS), Code
Division Multiple Access (CDMA), Evolution-Data Optimized (EV-DO), Enhanced Data
Rates for GSM Evolution (EDGE), 3GSM, Digital Enhanced Cordless
Telecommunications (DECT), Digital AMPS (IS-136/TDMA), and Integrated Digital
Enhanced Network (iDEN).
Penjelasan :
Mobile phone
From Wikipedia, the free encyclopedia
Contents
[hide]
1 History
2 Manufacturers
3 Subscriptions
4 Culture and customs
o 4.1 Etiquette
o 4.2 Use in disaster response
o 4.3 Use by drivers
o 4.4 Applications
5 Power
6 Features
7 Forensics and evidence
8 Human health impacts
9 Environmental impacts
10 Technology
11 Books about mobile communication
12 Terminology
o 12.1 Related non-mobile-phone systems
o 12.2 Terms in various countries
13 See also
14 References
15 External links
[edit] History
Main article: History of mobile phones
The first commercial cellular network was launched in Japan by NTT in 1979. Fully
automatic cellular networks were first introduced in the early to mid 1980s (the 1G
generation) with the Nordic Mobile Telephone (NMT) system in 1981. This was followed
by a boom in mobile telephone usage, particularly in Northern Europe.[citation needed]
The first "modern" network technology on digital 2G (second generation) cellular
technology was launched by Radiolinja (now part of Elisa Group) in 1991 in Finland on
the GSM standard which also marked the introduction of competition in mobile telecoms
when Radiolinja challenged incumbent Telecom Finland (now part of TeliaSonera) who
ran a 1G NMT network. A decade later, the first commercial launch of 3G (Third
Generation) was again in Japan by NTT DoCoMo on the WCDMA standard.[citation needed]
Until the early 1990s, most mobile phones were too large to be carried in a jacket pocket,
so they were typically installed in vehicles as car phones. With the miniaturization of
digital components, mobile phones have become increasingly handy over the years.[citation
needed]
[edit] Manufacturers
The mobile phone manufacturers can be grouped into two. The top five are available in
practically all countries and comprise about 75% of all phones sold. A second tier of
small manufacturers exists with phones mostly sold only in specific regions or for niche
markets. The top five in order of market share are Nokia, Motorola, Samsung,
SonyEricsson and LG.
Nokia Corporation is currently the world's largest manufacturer of mobile telephones,
with a global device market share of approximately 36% in Q1 of 2007.[3] Other mobile
phone manufacturers include Apple Inc., Audiovox (now UT Starcom), Benefon, BenQSiemens, High Tech Computer Corporation (HTC), Fujitsu, Kyocera, LG Mobile,
Mitsubishi, Motorola, NEC, Neonode, Panasonic (Matsushita Electric), Pantech Curitel,
Philips, Research In Motion, Sagem, Samsung, Sanyo, Sharp, Siemens, Sierra Wireless,
SK Teletech, Sonim Technologies, Sony Ericsson, T&A Alcatel,Toshiba, and Verizon.
There are also specialist communication systems related to (but distinct from) mobile
phones, such as Professional Mobile Radio.[citation needed]
[edit] Subscriptions
mobile phone coverage as of 2006. This figure is expected to increase to 90% by the year
2010.[8]
At present, Africa has the largest growth rate of cellular subscribers in the world,[9] its
markets expanding nearly twice as fast as Asian markets.[10] The availability of prepaid or
'pay as you go' services, where the subscriber is not committed to a long term contract,
has helped fuel this growth to a monumental scale in Africa as well as in other continents.
On a numerical basis, India is the largest growth market, adding about 6 million cell
phones every month.[11] With 156.31 million cell phones, market penetration in the
country is still low at 17.45% India expects to reach 500 million subscribers by end of
2010.
There are three major technical standards for the current generation of mobile phones and
networks, and two major standards for the next generation 3G phones and networks. All
European countries and African countries and many Asian countries have adopted a
single system, GSM, which is the only technology available on all continents and in most
countries and covers over 74% of all subscribers on mobile networks. In many countries,
such as the United States, Australia, Brazil, India, Japan, and South Korea GSM co-exists
with other internationally adopted standards such as CDMA and TDMA, as well as
national standards such as iDEN in the USA and PDC in Japan. Over the past five years
several dozen mobile operators (carriers) have abandoned networks on TDMA and
CDMA technologies switching over to GSM. None have switched away from GSM.
With third generation (3G) networks which are also known as IMT-2000 networks, about
three out of four networks are on WCDMA (also known as UMTS) standard, usually seen
as the natural evolution path for GSM and TDMA networks. One in four 3G networks is
on the CDMA2000 1x EV-DO technology. Some analysts count a previous stage in
CDMA evolution, CDMA2000 1x RTT, as a 3G technology whereas most standardization
experts count only CDMA2000 1x EV-DO as a true 3G technology. Because of this
difference in interpreting what is 3G, there is a wide variety in subscriber counts. As of
June 2007, on the narrow definition there are 200 million subscribers on 3G networks. By
using the more broad definition, the total subscriber count of 3G phone users is 475
million.
While some systems of payment are 'pay as you go' where conversation time is purchased
and added to a phone unit via an Internet account or in shops or ATMs, other systems are
more traditional ones where bills are paid by regular intervals.[citation needed] Pay as you go
(also known as "pre-pay") accounts were invented simultaneously in Portugal and Italy
and today form more than half of all mobile phone subscriptions. USA, Canada, Japan
and Finland are among the rare countries left where most phones are still contract-based.
In many countries, mobile phones now outnumber land-line telephones, with most adults
and many children using mobile phones. In the United States, 50% of children are using
mobile phones.[12] In many young adults' households the mobile phone has supplanted
land-line telephones. In some areas in developing countries with scarce fixed-line
infrastructure, the mobile phone has introduced telephony as such. It has given poor
people in isolated communities access to services such as medical and legal advice.
However, the mobile phone is also banned in some countries like North Korea.[13]
With high levels of mobile telephone penetration, mobile culture has evolved where the
phone is a key social tool with people relying on their mobile phone address book to keep
in touch with friends, not least by SMS, and a whole culture of "texting" has developed
from this.[citation needed] Since the first person-to-person SMS text message was sent in
Finland in December 1993, today "texting" has become the most widely used data service
on the planet, with 1.8 billion people as active users of SMS texting and the service
generated 80 billion dollars of service revenues in 2006 (source ITU). Many phones offer
Instant Messenger services to increase the simplicity and ease of texting on phones.
Mobile phones in Japan, offering Internet capabilities such as NTT DoCoMo's i-mode,
offer text messaging via standard e-mail. In several countries internet access from mobile
phones has become used by more internet users than access from PCs. Japan was first,
followed by South Korea, China and India. In Europe several countries have proportions
of 30%40% of all internet users now accessing via mobile phones. Most mobile internet
access is significantly different from PC based internet access, with services such as
alerts, weather information, e-mail, search, IM and downloads of games and music
favored over classic "web browsing". Most mobile internet use is of short duration and in
a hurry.
The mobile phone itself has also become a fashion object of totemic value, with users
decorating, customizing, and accessorizing their mobile phones to reflect their
personality. This has emerged as its own industry. The sale of commercial ringtones
exceeded 5 billion in 2006 according to Informa.[citation needed]
[edit] Etiquette
houses of worship posting signs prohibiting the use of mobile phones, and in some places
installing signal-jamming equipment to prevent usage (although in many countries
including the United States, such equipment is currently illegal). Some new buildings
such as auditoriums have installed wire mesh in the walls (turning the building into a
Faraday cage) which prevents any signal getting through, but does not contravene the
jamming laws.
Trains, particularly those involving long-distance services, often offer a "quiet car" where
phone use is prohibited, much like the designated non-smoking car in the past. However
many users tend to ignore this as it is rarely enforced, especially if the other cars are
crowded and they have no choice but to go in the "quiet car". Mobile phone use on
aircraft is also prohibited and many airlines claim in their in-plane announcements that
this prohibition is due to possible interference with aircraft radio communications even
though this has been proven to be completely untrue.[citation needed] There is no interference
from mobile phones that remain turned to aircraft avionics, as the airline safety staff well
know as a typical airliner has dozens of phones that were forgotten to be turned off, on
every flight. The real nuisance of phones that are on while planes take off and land, is that
they disrupt the mobile phone networks on the ground.[citation needed] With busy airports
landing jumbo jets every few minutes, the ground based mobile phone networks would
experience continuous peaks in brief traffic overloads as hundreds of passenger phones
would attempt to connect to the ground base stations.
As customers want to be connected on planes, now several airlines are experimenting
with tiny base stations and antenna systems installed into the cabin of the airplane,
allowing low power short range connection of any phones onboard to maintain a
connection to the base station in the plane.[citation needed] In this way they would not attempt
to find connection to the ground base stations as the planes take off and land.[citation needed] At
the same time the airlines could offer phone services to their travelling passengers either
as full voice and data servies, or initially only as SMS text messaging and similar
services. Qantas the Australian airline is the first airline to run a test airplane in this
configuration in the Autumn of 2007.[citation needed] Emirates have announced plans to allow
limited mobile phone usage on some flights.[citation needed]
In any case, there are inconsistencies between practices allowed by different airlines and
even on the same airline in different countries. For example, Northwest Airlines may
allow the use of mobile phones immediately after landing on a domestic flight within the
US, whereas they may state "not until the doors are open" on an international flight
arriving in the Netherlands. In April 2007 the US Federal Communications Commission
officially grounded the idea of allowing passengers to use phones during a flight.[14]
In a similar vein signs are put up in UK petrol stations prohibiting the use of mobile
phones due to possible safety issues. Most schools in the United States have prohibited
mobile phones in the classroom due to the large number of class disruptions that result
from their use, the potential for cheating via text messaging, and the possibility of
photographing someone without consent.[citation needed] In the UK, possession of a mobile
technology is permitted. However some countries like Japan ban mobile phone use while
driving completely. Similar laws exist in six U.S. states with legislation proposed in 40
other states. The United States Department of Defense has outlawed the use of all mobile
phones while driving on any DOD installation, unless a hands-free device is used. In
Israel, it is common practice to pull over to the side of the road where possible to answer
a mobile phone. In Croatia law prohibits usage of mobile phones while crossing the road
as a pedestrian.
[edit] Applications
Mobile news services are expanding with many organizations providing "on-demand"
news services by SMS. Some also provide "instant" news pushed out by SMS. Mobile
telephony also facilitates activism and public journalism being explored by Reuters and
Yahoo[16] and small independent news companies such as Jasmine News in Sri Lanka.
Also companies like Monster[17] are starting to offer mobile services such as job search
and career advice.
The total value of mobile data services exceeds the value of paid services on the internet,
and was worth 31 billion dollars in 2006 (source Informa).[citation needed] The largest
categories of mobile services are music, picture downloads, videogaming, adult
entertainment, gambling, video/TV.
[edit] Power
Mobile phones generally obtain power from batteries which can be recharged from mains
power, a USB port or a cigarette lighter socket in a car. Formerly, the most common form
of cell phone batteries were nickel metal-hydride, as they have a low size and weight.
Lithium-Ion batteries are sometimes used, as they are lighter and do not have the voltage
depression that nickel metal-hydride batteries do. Many mobile phone manufacturers
have now switched to using lithium-Polymer batteries as opposed to the older LithiumIon, the main advantages of this being even lower weight and the possibility to make the
battery a shape other than strict cuboid. Cell phone manufacturers have been
experimenting with alternate power sources.
This short section requires expansion.
[edit] Features
Main article: Mobile phone features
There are significant questions as to who first invented the camera phone, as numerous
other people received patents filed in the early 1990s for the device, including David M.
Britz of AT&T Research in March of 1994 and Phillipe Kahn, who claims to have first
invented it in 1997.[citation needed] The camera phone now holds 85% of the mobile phone
market[citation needed]. Mobile phones often have features beyond sending text messages and
making voice calls, including Internet browsing, music (MP3) playback, memo
recording, personal organizer functions, e-mail, instant messaging, built-in cameras and
camcorders, ringtones, games, radio, Push-to-Talk (PTT), infrared and Bluetooth
connectivity, call registers, ability to watch streaming video or download video for later
viewing, video calling and serve as a wireless modem for a PC, and soon will also serve
as a console of sorts to online games and other high quality games (e.g. Final Fantasy
Agito).[citation needed]
When cellular telecoms services were launched, phones and calls were very expensive
and early mobile operators (carriers) decided to charge for all air time consumed by the
mobile phone user. This resulted in the concept of charging callers for outbound calls and
also for receiving calls. As mobile phone call charges diminished and phone adoption
rates skyrocketed, more modern operators decided not to charge for incoming calls. Thus
some markets have "Receiving Party Pays" models, in which both outbound and received
calls are charged, and other markets have "Calling Party Pays" models, by which only
making calls produces costs, and receiving calls is free. An exception to this is
international roaming, by which also receiving calls is normally also charged.[citation needed]
The European market adopted a "Calling Party Pays" model throughout the GSM
environment and soon various other GSM markets also started to emulate this model. As
Receiving Party Pays systems have the undesired effect of phone owners keeping their
phones turned off to avoid receiving unwanted calls, the total voice usage rates (and
profits) in Calling Party Pays countries outperform those in Receiving Party Pays
countries. Consequently, most countries previously with Receiving Party Pays models
have either abandoned them or employed alternative marketing methods, such as massive
voice call buckets, to avoid the problem of phone users keeping phones turned off.[citation
needed]
In most countries today, including European nations, Kazakhstan, Romania, Turkey, New
Zealand, Korea, Japan, Pakistan, Australia, Bulgaria, Brazil, Chile, Colombia, India,[18]
Maldives, Peru, South Africa, Israel, Lebanon and Jordan the person receiving a mobile
phone call pays nothing. However, in Hong Kong, Canada, and the United States, one can
be charged per minute. In the United States, a few carriers are beginning to offer
unlimited received phone calls. For the Chinese mainland, it was reported that both of its
two operators will adopt the caller-pays approach as early as January 2007.[18]
digital information present on cell phones can be found under the NIST Publication
SP800-101.[21]
An example of criminal investigations using mobile phones is the initial location and
ultimate identification of the terrorists of the 2004 Madrid train bombings. In the attacks,
mobile phones had been used to detonate the bombs. However, one of the bombs failed to
detonate, and the SIM card in the corresponding mobile phone gave the first serious lead
about the terrorists to investigators. By tracking the whereabouts of the SIM card and
correlating other mobile phones that had been registered in those areas, police were able
to locate the terrorists.[citation needed]
and created "a horror story".[28][29][30] It should be pointed out that if this CCD would be
caused by mobile phones, then beekeepers in countries with advanced use of mobile
phones such as those in Scandinavia, Italy, Portugal, Austria etc should have seen these
effects years earlier than the USA. But this finding was uniformly and globally dismissed
by all from the telecoms industry to animal safety experts and even beekeepers
worldwide. While the initial claim of damage to bees was widely reported, the corrections
to the story were almost non-existent in the media.
[edit] Technology
See also: Cellular frequencies
switch when there is an incoming telephone call. The handset constantly listens for the
strongest signal being received from the surrounding base stations. As the user moves
around the network, the mobile device will "handoff" to various cell sites during calls, or
while waiting (idle) between calls it will reselect cell sites.
Cell sites have relatively low-power (often only one or two watts) radio transmitters
which broadcast their presence and relay communications between the mobile handsets
and the switch. The switch in turn connects the call to another subscriber of the same
wireless service provider or to the public telephone network, which includes the networks
of other wireless carriers. Many of these sites are camouflaged to blend with existing
environments, particularly in scenic areas.
The dialogue between the handset and the cell site is a stream of digital data that includes
digitized audio (except for the first generation analog networks). The technology that
achieves this depends on the system which the mobile phone operator has adopted. The
technologies are grouped by generation. The first generation systems started in 1979 with
Japan, are all analog and include AMPS and NMT. Second generation systems started in
1991 in Finland are all digital and include GSM, CDMA and TDMA. Third generation
networks are still being deployed, started with Japan in 2001, are all digital and offer high
speed data access in addition to voice services and include WCDMA known also as
UMTS, and CDMA2000 EV-DO. China will launch a third 3G technlogy on the TDSCDMA standard. Each network operator has a unique radio frequency band.[citation needed]
Penjelasan :
Network Switching Subsystem, or NSS, is the component of a GSM system that carries
out switching functions and manages the communications between mobile phones and
the Public Switched Telephone Network. It is owned and deployed by mobile phone
operators and allows mobile phones to communicate with each other and telephones in
the wider telecommunications network. The architecture closely resembles a telephone
exchange, but there are additional functions which are needed because the phones are not
fixed in one location. Each of these functions handle different aspects of mobility
management and are described in more detail below.
The Network Switching Subsystem, also referred to as the GSM core network, usually
refers to the circuit-switched core network, used for traditional GSM services such as
voice calls, SMS, and Circuit Switched Data calls.
There is also an overlay architecture on the GSM core network to provide packetswitched data services and is known as the GPRS core network. This allows mobile
phones to have access to services such as WAP, MMS, and Internet access.
All mobile phones manufactured today have both circuit and packet based services, so
most operators have a GPRS network in addition to the standard GSM core network.
Penjelasan :
For terminal pagers, see more (Unix) or less (Unix).
It has been suggested that Radio paging be merged into this article or section. (Discuss)
A pager (sometimes referred as a Beeper) is a personal telecommunications device used
to request a phone call from a pager subscriber and/or receive simple text
communications in the form of e-mail and SMS. Pagers exist as one-way numeric and
alphanumeric models that only receive incoming communications and two-way
alphanumeric models capable of sending e-mails and SMS messaging.
Until the popular adoption of mobile phones in the late 1990s, pagers fulfilled the role of
common personal and mobile communications. As of 2007, pagers have fallen into
obsolescence and preserved only by niche markets of emergency service personnel and
information technology support.
Penjelasan :
In telecommunications, transmission is the forwarding of signal traffic over distances
that are too great to be simply connected by a twisted pair wires. Techniques available
now may be microwave link, satellite link, coaxial cable or fibre optic cable. All modern
transmission is digital.
In general information theory transmission is taken to mean the complete process of
communication of information via a channel.
Penjelasan :
Telecommunication
From Wikipedia, the free encyclopedia
Copy of the original phone of Alexander Graham Bell at the Muse des Arts et Mtiers in
Paris
Telecommunication is the transmission of signals over a distance for the purpose of
communication. In modern times, this process typically involves the sending of
electromagnetic waves by electronic transmitters, but in earlier times telecommunication
may have involved the use of smoke signals, drums or semaphore. Today,
telecommunication is widespread and devices that assist the process, such as the
television, radio and telephone, are common in many parts of the world. There are also
many networks that connect these devices, including computer networks, public
telephone networks, radio networks and television networks. Computer communication
across the Internet is one of many examples of telecommunication.
Telecommunication systems are generally designed by telecommunication engineers.
Early inventors in the field include Alexander Graham Bell, Guglielmo Marconi and John
Logie Baird. Telecommunication is an important part of the world economy with the
telecommunication industry's revenue being placed at just under 3 percent of the gross
world product.
Penjelasan :
In mobile communication, the air interface is the radio-based communication link
between the mobile station and the active base station. In GSM/UMTS, the various
UTRA standards are air interfaces, and are also (but not exclusively) referred to as
"access modes".[1]
In the OSI model, the air interface comprises layers 1 and 2 of the mobile
communications system, establishing a point-to-point link between the mobile station and
the base station.
[edit] References
1. ^ Vocabulary for 3GPP Specifications, ETSI TR 21.905 V7.2.0
This article related to telecommunications is a stub. You can help Wikipedia by
expanding it.
Retrieved from "http://en.wikipedia.org/wiki/Air_interface"
A typical BTS tower which holds the antenna. The tower is quite widely misinterpreted as
the BTS itself. The shelter which houses the actual BTS can also be seen.
Base Transceiver Station (BTS) is the equipment which facilitates the wireless
communication between user equipments and the network. User equipments are devices
like mobile phones (handsets), WLL phones, computers with wireless internet
connectivity, WiFi and WiMAX gadgets etc. The network can be that of any of the
wireless communication technologies like GSM, CDMA, WLL , WAN, WiFi, WiMAX
etc. BTS is also referred to as RBS (Radio Base Station), Node B (in 3G Networks) or
simply BS (Base Station).
manages operational states of each TRX, as well as software handling and alarm
collection. The basic structure and functions of the BTS remains the same regardless of
the wireless technologies.
If not sectorised, the cell will be served by a unidirectional antenna, which radiates in all
directions. Bisectored cells are also implemented with the antennas serving sectors of
180 separation to one another. This is the base of a BTS.
TRX : Transceiver
PA : Power Amplifier
Combiner
- Combines feeds from several DRXs so that they could be sent out through a single
antenna
- For reduction of number of antenna used
Duplexer
Antenna
- Collects working status alarms of various units in BTS and extends them to Operations
and Maintenance (O&M) monitoring stations
Control Function
Contents
[hide]
1 Computer networks
2 Radio technology
3 Telephony
4 Sources
5 External articles
Transceivers known as Medium Attachment Units were widely used in 10base2 and
10base5 Ethernet networks. Fibre-optic gigabit and 10 gigabit Ethernet utilize
transceivers known as GBIC, SFP, XFP and XAUI.
[edit] Telephony
On a wired telephone, the handset contains the transmitter and receiver for the audio.
The whole unit is colloquially referred to as a "receiver." On a mobile telephone or other
radiotelephone, the entire unit is a transceiver, for both audio and radio.
A cordless telephone uses an audio and radio transceiver for the handset, and a radio
transceiver for the base station. If a speakerphone is included in a wired telephone base or
in a cordless base station (less common), the base also becomes an audio transceiver in
addition to the handset.
Penjelasan :
Encrypt redirects here. For the film, see Encrypt (film).
Cipher redirects here. For other uses, see Cipher (disambiguation).
This article is about algorithms for encryption and decryption. For an overview of
cryptographic technology in general, see Cryptography.
In cryptography, encryption is the process of transforming information (referred to as
plaintext) to make it unreadable to anyone except those possessing special knowledge,
usually referred to as a key. The result of the process is encrypted information (in
cryptography, referred to as ciphertext). In many contexts, the word encryption also
implicitly refers to the reverse process, decryption (e.g. software for encryption can
typically also perform decryption), to make the encrypted information readable again (i.e.
to make it unencrypted).
Encryption has long been used by militaries and governments to facilitate secret
communication. Encryption is now used in protecting information within many kinds of
civilian systems, such as computers, networks (e.g. the Internet e-commerce), mobile
telephones, and bank automatic teller machines. Encryption is also used in digital rights
management to restrict the use of copyrighted material and in software copy protection to
protect against reverse engineering and software piracy.
Encryption, by itself, can protect the confidentiality of messages, but other techniques are
still needed to verify the integrity and authenticity of a message; for example, a message
authentication code (MAC) or digital signatures. Standards and cryptographic software
and hardware to perform encryption are widely available, but successfully using
encryption to ensure security is a challenging problem. A single slip-up in system design
or execution can allow successful attacks. Sometimes an adversary can obtain
unencrypted information without directly undoing the encryption. See traffic analysis,
TEMPEST.
Contents
[hide]
1 History
2 Ciphers
o 2.1 Etymology of Cipher
3 Ciphers versus codes
4 Types of Cipher
5 Key Size and Vulnerability
6 References
7 See also
8 External links
[edit] History
Main article: History of cryptography
Encryption has been used to protect communications since ancient times, but only
organizations and individuals with extraordinary need for confidentiality had bothered to
exert the effort required to implement it. Encryption, and successful attacks on it, played
a vital role in World War II. Many of the encryption techniques developed then were
closely-guarded secrets (Kahn). In the mid-1970s, with the introduction of the U.S. Data
Encryption Standard and public key cryptography, strong encryption emerged from the
preserve of secretive government agencies into the public domain.
[edit] Ciphers
In cryptography, a cipher (or cypher) is an algorithm for performing encryption and
decryption a series of well-defined steps that can be followed as a procedure. An
alternative term is encipherment. In non-technical usage, a cipher is the same thing as
a code; however, the concepts are distinct in cryptography. In classical cryptography,
ciphers were distinguished from codes. Codes operated by substituting according to a
large codebook which linked a random string of characters or numbers to a word or
phrase. For example, UQJHSE could be the code for Proceed to the following
coordinates.
The original information is known as plaintext, and the encrypted form as ciphertext.
The ciphertext message contains all the information of the plaintext message, but is not in
a format readable by a human or computer without the proper mechanism to decrypt it; it
should resemble random gibberish to those not intended to read it.
The operation of a cipher usually depends on a piece of auxiliary information, called a
key or, in traditional NSA parlance, a cryptovariable. The encrypting procedure is varied
depending on the key, which changes the detailed operation of the algorithm. A key must
be selected before using a cipher to encrypt a message. Without knowledge of the key, it
should be difficult, if not impossible, to decrypt the resulting cipher into readable
plaintext.
Most modern ciphers can be categorized in several ways:
o
o
o
The French formed the word chiffre and adopted the Italian word
zero.
The English used zero for 0, and cipher from the word ciphering
as a means of computing.
The Germans used the words Ziffer (number, Zahl) and Chiffre.
Dr. Al-Kadi (ref-3) concluded that the Arabic word sifr, for the digit zero, developed into
the European technical term for encryption.
PLSX TWF where L, S, and W substitute for O. With even a small amount of
known or estimated plaintext, simple polyalphabetic substitution ciphers and letter
transposition ciphers designed for pen and paper encryption are easy to crack.
During the early twentieth century, electro-mechanical machines were invented to do
encryption and decryption using transposition, polyalphabetic substitution, and a kind of
additive substitution. In rotor machines, several rotor disks provided polyalphabetic
substitution, while plug boards provided another substitution. Keys were easily changed
by changing the rotor disks and the plugboard wires. Although these encryption methods
were more complex than previous schemes and required machines to encrypt and
decrypt, other machines such as the British Bombe were invented to crack these
encryption methods.
Modern encryption methods can be divided into symmetric key algorithms (Private-key
cryptography) and asymmetric key algorithms (Public-key cryptography). In a symmetric
key algorithm (e.g., DES and AES), the sender and receiver must have a shared key set
up in advance and kept secret from all other parties; the sender uses this key for
encryption, and the receiver uses the same key for decryption. In an asymmetric key
algorithm (e.g., RSA), there are two separate keys: a public key is published and enables
any sender to perform encryption, while a private key is kept secret by the receiver and
enables only him to perform correct decryption.
Symmetric key ciphers can be distinguished into two types, depending on whether they
work on blocks of symbols of fixed size (block ciphers), or on a continuous stream of
symbols (stream ciphers).
In a pure mathematical attack (i.e., lacking any other information to help break a cypher),
three factors above all, count:
Since the desired effect is computational difficulty, in theory one would choose an
algorithm and desired difficulty level, thus decide the key length accordingly.
An example of this process can be found at Key Length which uses multiple reports to
suggest that a symmetric cypher with 128 bits, an asymmetric cypher with 3072 bit keys,
and an elliptic curve cypher with 512 bits, all have similar difficulty at present.
Claude Shannon proved, using information theory considerations, that any theoretically
unbreakable cipher must have keys which are at least as long as the plaintext, and used
only once: one-time pad.
[edit] References
Penjelasan :
Picocell
From Wikipedia, the free encyclopedia
Frequency
From Wikipedia, the free encyclopedia
Have questions? Find out how to ask questions and get answers.
Sine waves of various frequencies; the bottom waves have higher frequencies than those
above.
Frequency is the measurement of the number of occurrences of a repeated event per unit
of time. It is also defined as the rate of change of phase of a sinusoidal waveform.
Contents
[hide]
1 Measurement
2 Frequency of waves
3 Examples
4 See also
5 External links
[edit] Measurement
To calculate the frequency of the event, the number of occurrences of the event within a
fixed time interval are counted, and then divided by the length of the time interval.
To calculate the frequency of an event in experimental work however (for example,
calculating the frequency of an oscillating pendulum) it is crucial that the time taken for a
fixed number of occurrences is recorded, rather than the number of occurrences within a
fixed time. This is because your random error is significantly increased performing the
experiment the other way around. It [the frequency] is still calculated by dividing the
number of occurrences by the time interval, however, the number of occurrences is fixed,
not the time interval.
In SI units, the result is measured in hertz (Hz), named after the German physicist
Heinrich Hertz. 1 Hz means that an event repeats once per second, 2 Hz is twice per
second, and so on. This unit was originally called a cycle per second (cps), which is still
sometimes used. Other units that are used to measure frequency include revolutions per
minute (rpm). Heart rate and musical tempo are measured in beats per minute (BPM).
Often, angular frequency is used instead of frequency, measured in radians per second
(rad/s).
where
T is the period.
A more accurate measurement takes many cycles into account and averages the period
between each.
In the special case of electromagnetic waves moving through a vacuum, then v = c, where
c is the speed of light in a vacuum, and this expression becomes:
When waves travel from one medium to another, their frequency remains exactly the
same only their wavelength and speed change.
Apart from being modified by the Doppler effect or any other nonlinear process,
frequency is an invariant quantity in the universe. That is, it cannot be changed by any
linearly physical process unlike velocity of propagation or wavelength.
[edit] Examples
The frequency of the standard pitch A above middle C is usually defined as 440
Hz, that is, 440 cycles per second (Listen (helpinfo)) and known as concert pitch,
to which an orchestra tunes.
A baby can hear tones with oscillations up to approximately 20,000 Hz, but these
frequencies become more difficult to hear as people age.
In Europe, the frequency of the alternating current in mains is 50 Hz (close to the
tone G), however, in North America, the frequency of the alternating current is 60
Hz (close to the tone B flat that is, a minor third above the European
frequency). The frequency of the 'hum' in an audio recording can show where the
recording was made in Europe, or in America.
Penjelasan :
Contents
[hide]
1 Military use
2 Technical considerations
3 Multiple Inventions
4 Variations
5 See also
6 External links
If the sequence of channel changes is not known to potential adversaries, spreadspectrum signals are highly resistant to deliberate jamming. Military radios use
cryptographic techniques to generate the channel sequence under the control of a secret
Transmission Security Key (TRANSEC) that the sender and receiver share. By itself,
frequency hopping provides only limited protection against eavesdropping, so military
frequency hopping radios often employ separate encryption devices such as the KY-57.
U.S. military radios that use frequency hopping include HAVE QUICK and SINCGARS.
1929. Several other patents were taken out in the 1930s, including one by Willem
Broertjes (Germany 1929, U.S. Patent No. 1,869,659 (issued Aug. 2, 1932)). During
WWII, the US Army Signal Corp was inventing a communication system called
SIGSALY, which incorporated spread spectrum, but as it was top secret, its existence did
not become known until the 1980s. The most celebrated invention of frequency hopping
was that of actress Hedy Lamarr and composer George Antheil, who in 1942 received
patent number 2,292,387 for their "Secret Communications System." This early version
of frequency hopping used a piano-roll to change between 88 frequencies, and was
intended to make radio-guided torpedoes harder for enemies to detect or to jam. The
patent was rediscovered in the 1950s during patent searches when private companies
independently developed Code Division Multiple Access, a civilian form of spreadspectrum.
[edit] Variations
Adaptive Frequency-hopping spread spectrum (AFH) (as used in Bluetooth) improves
resistance to radio frequency interference by avoiding using crowded frequencies in the
hopping sequence. This sort of adaptive modulation is easier to implement with FHSS
than with DSSS.
Chirp modulation can be seen as a form of frequency-hopping that simply scans through
the available frequencies in consecutive order.
Penjelasan :
GSM
From Wikipedia, the free encyclopedia
Learn more about using Wikipedia for research
2G
GSM
GPRS
HSCSD
EDGE (EGPRS)
W-CDMA
o UMTS (3GSM)
o FOMA
UMTS-TDD
o TD-CDMA
o TD-SCDMA
HSPA
o HSDPA
o HSUPA
3G
HSPA+
Pre-4G
UMTS Revision 8
o LTE
o
cdmaOne
CDMA2000
EV-DO
3G
Pre-4G
UMB
Other Technologies
0G
Contents
PTT
MTS
IMTS
AMTS
OLT
MTD
Autotel / PALM
ARP
NMT
AMPS / TACS / ETACS
1G
[hide]
1 History of GSM
2 Technical details
o 2.1 Interference with audio devices
o 2.2 Network structure
o 2.3 Subscriber identity module
o 2.4 GSM security
3 See also
4 References
5 Literature
6 External links
frequency channels, each spaced 200 kHz apart. Time division multiplexing is used to
allow eight full-rate or sixteen half-rate speech channels per radio frequency channel.
There are eight radio timeslots (giving eight burst periods) grouped into what is called a
TDMA frame. Half rate channels use alternate frames in the same timeslot. The channel
data rate is 270.833 kbit/s, and the frame duration is 4.615 ms.
The transmission power in the handset is limited to a maximum of 2 watts in
GSM850/900 and 1 watt in GSM1800/1900.
GSM has used a variety of voice codecs to squeeze 3.1 kHz audio into between 5.6 and
13 kbit/s. Originally, two codecs, named after the types of data channel they were
allocated, were used, called Half Rate (5.6 kbit/s) and Full Rate (13 kbit/s). These used a
system based upon linear predictive coding (LPC). In addition to being efficient with
bitrates, these codecs also made it easier to identify more important parts of the audio,
allowing the air interface layer to prioritize and better protect these parts of the signal.
GSM was further enhanced in 1997[7] with the Enhanced Full Rate (EFR) codec, a
12.2 kbit/s codec that uses a full rate channel. Finally, with the development of UMTS,
EFR was refactored into a variable-rate codec called AMR-Narrowband, which is high
quality and robust against interference when used on full rate channels, and less robust
but still relatively high quality when used in good radio conditions on half-rate channels.
There are four different cell sizes in a GSM networkmacro, micro, pico and umbrella
cells. The coverage area of each cell varies according to the implementation environment.
Macro cells can be regarded as cells where the base station antenna is installed on a mast
or a building above average roof top level. Micro cells are cells whose antenna height is
under average roof top level; they are typically used in urban areas. Picocells are small
cells whose coverage diameter is a few dozen meters; they are mainly used indoors.
Umbrella cells are used to cover shadowed regions of smaller cells and fill in gaps in
coverage between those cells.
Cell horizontal radius varies depending on antenna height, antenna gain and propagation
conditions from a couple of hundred meters to several tens of kilometers. The longest
distance the GSM specification supports in practical use is 35 kilometres (22 mi). There
are also several implementations of the concept of an extended cell, where the cell radius
could be double or even more, depending on the antenna system, the type of terrain and
the timing advance.
Indoor coverage is also supported by GSM and may be achieved by using an indoor
picocell base station, or an indoor repeater with distributed indoor antennas fed through
power splitters, to deliver the radio signals from an antenna outdoors to the separate
indoor distributed antenna system. These are typically deployed when a lot of call
capacity is needed indoors, for example in shopping centers or airports. However, this is
not a prerequisite, since indoor coverage is also provided by in-building penetration of
the radio signals from nearby cells.
the Base Station Subsystem (the base stations and their controllers).
the Network and Switching Subsystem (the part of the network most similar to a
fixed network). This is sometimes also just called the core network.
the GPRS Core Network (the optional part which allows packet based Internet
connections).
all of the elements in the system combine to produce many GSM services such as
voice calls and SMS.
In countries like Belgium, India, Indonesia and Pakistan, etc., all phones are sold
unlocked. However, in Belgium, it is unlawful for operators there to offer any form of
subsidy on the phone's price. This was also the case in Finland until April 1, 2006, when
selling subsidized combinations of handsets and accounts became legal, though operators
have to unlock phones free of charge after a certain period (at most 24 months).
TDMA
From Wikipedia, the free encyclopedia
Have questions? Find out how to ask questions and get answers.
Broadcasting
From Wikipedia, the free encyclopedia
Learn more about using Wikipedia for research
Broadcasters may rely on a combination of these business models. For example, National
Public Radio, a non-commercial network within the United States, receives grants from
the Corporation for Public Broadcasting (which in turn receives funding from the U.S.
government), by public membership, and by selling "extended credits" to corporations.
Contents
[hide]
6 Further reading
Audio broadcasting
called networks that are broadcast only via cable or satellite television. The term
"broadcast television" can refer to the programming of such networks.
Penjelasan :
Directional antenna
From Wikipedia, the free encyclopedia
Ten things you didn't know about images on Wikipedia
Interference
From Wikipedia, the free encyclopedia
Have questions? Find out how to ask questions and get answers.
Interference of two circular waves - Wavelength (decreasing bottom to top) and Wave
centers distance (increasing to the right). Absolute value snapshots of the (real-valued,
scalar) wave field. As time progresses, the wave fronts would move outwards from the
two centers, but the dark regions (destructive interference) stay fixed.
Interference is the addition (superposition) of two or more waves that results in a new
wave pattern.
As most commonly used, the term interference usually refers to the interaction of waves
which are correlated or coherent with each other, either because they come from the same
source or because they have the same or nearly the same frequency.
Two non-monochromatic waves are only fully coherent with each other if they both have
exactly the same range of wavelengths and the same phase differences at each of the
constituent wavelengths.
The total phase difference is derived from the sum of both the path difference and the
initial phase difference (if the waves are generated from 2 or more different sources). It
can then be concluded whether the waves reaching a point are in phase(constructive
interference) or out of phase (destructive interference).
Contents
[hide]
1 Theory
2 Experiments
3 Interference patterns
4 Constructive and destructive interference
5 General Quantum Interference
6 Examples
7 See also
8 References
9 External links
[edit] Theory
The principle of superposition of waves states that the resultant displacement at a point is
equal to the sum of the displacements of different waves at that point. If a crest of a wave
meets a crest of another wave at the same point then the crests interfere constructively
and the resultant wave amplitude is greater. If a crest of a wave meets a trough of another
wave then they interfere destructively, and the overall amplitude is decreased.
This form of interference can occur whenever a wave can propagate from a source to a
destination by two or more paths of different length. Two or more sources can only be
used to produce interference when there is a fixed phase relation between them, but in
this case the interference generated is the same as with a single source; see Huygens'
principle.
[edit] Experiments
Thomas Young's double-slit experiment showed interference phenomena where two
beams of light which are coherent interfere to produce a pattern.
The beams of light both have the same wavelength range and at the center of the
interference pattern. They have the same phases at each wavelength, as they both come
from the same source.
producing clear interference patterns, as it is a mix of a full spectrum of colours, that each
have different spacing of the interference fringes. Sodium light is close to monochromatic
and is thus more suitable for producing interference patterns. The most suitable is laser
light because it is almost perfectly monochromatic.
Interference pattern produced with a Michelson interferometer. Bright bands are the
result of constructive interference while the dark bands are the result of destructive
interference.
Consider two waves that are in phase,with amplitudes A1 and A2. Their troughs and peaks
line up and the resultant wave will have amplitude A = A1 + A2. This is known as
constructive interference.
If the two waves are pi radians, or 180, out of phase, then one wave's crests will coincide
with another wave's troughs and so will tend to cancel out. The resultant amplitude is A =
| A1 A2 | . If A1 = A2, the resultant amplitude will be zero. This is known as destructive
interference.
When two sinusoidal waves superimpose, the resulting waveform depends on the
frequency (or wavelength) amplitude and relative phase of the two waves. If the two
waves have the same amplitude A and wavelength the resultant waveform will have an
amplitude between 0 and 2A depending on whether the two waves are in phase or out of
phase.
combined
waveform
wave 1
wave 2
Two waves in phase
of phase
where the s specify the different quantum "alternatives" available (technically, they
form an eigenvector basis) and the i are the probability amplitude coefficients, which are
complex numbers.
The probability of observing the system making a transition or quantum leap from state
to a new state is the square of the modulus of the scalar or inner product of the two
states:
where
Now let's consider the situation classically and imagine that the system transited from
to
via an intermediate state . Then we would classically expect the probability of
the two-step transition to be the sum of all the possible intermediate steps. So we would
have
The classical and quantum derivations for the transition probability differ by the
presence, in the quantum case, of the extra terms
; these extra
quantum terms represent interference between the different
intermediate
"alternatives". These are consequently known as the quantum interference terms, or cross
terms. This is a purely quantum effect and is a consequence of the non-additivity of the
probabilities of quantum alternatives.
The interference terms vanish, via the mechanism of quantum decoherence, if the
intermediate state is measured or coupled with the environment[1][2].
[edit] Examples
A conceptually simple case of interference is a small (compared to wavelength) source say, a small array of regularly spaced small sources (see diffraction grating).
Consider the case of a flat boundary (say, between two media with different or simply a
flat mirror, onto which the plane wave is incident at some angle. In this case of
continuous distribution of sources, constructive interference will only be in specular
direction - the direction at which angle with the normal is exactly the same as the angle of
incidence. Thus, this results in the law of reflection which is simply the result of
constructive interference of a plane wave on a plane surface.
Penjelasan :
Wavelength
From Wikipedia, the free encyclopedia
Find out more about navigating Wikipedia and finding information
Contents
[hide]
4 External links
where vw is the propagation velocity of the wave. In the case of electromagnetic radiation,
such as light, in a vacuum, this speed is the speed of light, 299,792,458 m/s or about 109
km/h. For sound waves in air, this is the speed of sound, 344 m/s (1238 km/h) in air at
room temperature. Usually, SI units are used, where the wavelength is expressed in
meters, the frequency in Hz, and the propagation velocity in meters per second.
where h is Planck's constant, and p is the momentum of the particle. This hypothesis was
at the basis of quantum mechanics. Nowadays, this wavelength is called the de Broglie
wavelength. For example, the electrons in a CRT display have a De Broglie wavelength
of about 10-13 m.
Penjelasan :
Fading
From Wikipedia, the free encyclopedia
Interested in contributing to Wikipedia?
Contents
[hide]
1 Key Concepts
2 Slow vs. Fast Fading
3 Flat vs. Frequency-selective Fading
4 Fading Models
5 Mitigation
6 See also
7 Literature
8 External links
A common example of multipath fading is the experience of stopping at a traffic light and
hearing an FM broadcast degenerate into static, while the signal is re-acquired if the
vehicle moves only a fraction of a meter. The loss of the broadcast is caused by the
vehicle stopping at a point where the signal experienced severe destructive interference.
Cellular phones can also exhibit similar momentary fades.
Fading channel models are often used to model the effects of electromagnetic
transmission of information over the air in cellular networks and broadcast
communication. Fading channel models are also used in underwater acoustic
communications to model the distortion caused by the water. Mathematically, fading is
usually modeled as a time-varying random change in the amplitude and phase of the
transmitted signal.
Slow fading arises when the coherence time of the channel is large relative to the
delay constraint of the channel. In this regime, the amplitude and phase change
imposed by the channel can be considered roughly constant over the period of
use. Slow fading can be caused by events such as shadowing, where a large
obstruction such as a hill or large building obscures the main signal path between
the transmitter and the receiver. The amplitude change caused by shadowing is
often modeled using a log-normal distribution with a standard deviation according
to the Log Distance Path Loss Model.
Fast Fading occurs when the coherence time of the channel is small relative to
the delay constraint of the channel. In this regime, the amplitude and phase
change imposed by the channel varies considerably over the period of use.
In a fast-fading channel, the transmitter may take advantage of the variations in the
channel conditions using time diversity to help increase robustness of the communication
to a temporary deep fade. Although a deep fade may temporarily erase some of the
information transmitted, use of an error-correcting code coupled with successfully
transmitted bits during other time instances can allow for the erased bits to be recovered.
In a slow-fading channel, it is not possible to use time diversity because the transmitter
sees only a single realization of the channel within its delay constraint. A deep fade
therefore lasts the entire duration of transmission and cannot be mitigated using coding.
The coherence time of the channel is related to a quantity known as the Doppler spread
of the channel. When a user (or reflectors in its environment) is moving, the user's
velocity causes a shift in the frequency of the signal transmitted along each signal path.
This phenomenon is known as the Doppler shift. Signals travelling along different paths
can have different Doppler shifts, corresponding to different rates of change in phase. The
difference in Doppler shifts between different signal components contributing to a single
fading channel tap is known as the Doppler spread. Channels with a large Doppler spread
have signal components that are each changing independently in phase over time. Since
fading depends on whether signal components add constructively or destructively, such
channels have a very short coherence time.
In general, coherence time is inversely related to Doppler spread, typically expressed as:
where Tc is the coherence time, Ds is the Doppler spread, and k is a constant taking on
values in the range of 0.25 to 0.5.
In flat fading, the coherence bandwidth of the channel is larger than the
bandwidth of the signal. Therefore, all frequency components of the signal will
experience the same magnitude of fading.
Nakagami fading
Weibull fading
Rayleigh fading
Rician fading
Dispersive fading models, with several echoes, each exposed to different delay,
gain and phase shift, often constant.This results in frequency selective fading and
inter-symbol interference. The gains may be Rayleigh or Rician distributed.The
echoes may also be exposed to doppler-shift, resulting in a time varying channel
model.
Log-normal shadow fading
[edit] Mitigation
Fundamentally, fading causes poor performance in traditional communication systems
because the quality of the communications link depends on a single path or channel, and
due to fading there is a significant probability that the channel will experience a deep
fade. The probability of experiencing a fade (and associated bit errors as the signal-tonoise ratio drops) on the channel becomes the limiting factor in the link's performance.
The effects of fading can be combated by using diversity to transmit the signal over
multiple channels that experience independent fading and coherently combining them at
the receiver. The probability of experiencing a fade in this composite channel is then
proportional to the probability that all the component channels simultaneously experience
a fade, a much more unlikely event.
Diversity can be achieved in time, frequency, or space. Common techniques used to
overcome signal fading include:
Penjelasan :
2G
GSM
GPRS
HSCSD
EDGE (EGPRS)
W-CDMA
o UMTS (3GSM)
o FOMA
UMTS-TDD
o TD-CDMA
o TD-SCDMA
HSPA
o HSDPA
o HSUPA
3G
HSPA+
Pre-4G
UMTS Revision 8
o LTE
o
Contents
cdmaOne
CDMA2000
EV-DO
3G
Pre-4G
UMB
Other Technologies
[hide]
0G
PTT
MTS
IMTS
AMTS
OLT
MTD
Autotel / PALM
ARP
NMT
AMPS / TACS / ETACS
1G
9 External links
the gateway function and the Visited MSC function, however, some manufacturers design
dedicated high capacity MSCs which do not have any BSSes connected to them. These
MSCs will then be the Gateway MSC for many of the calls they handle.
The Visited MSC is the MSC where a customer is currently located. The VLR associated
with this MSC will have the subscriber's data in it.
The Anchor MSC is the MSC from which a handover has been initiated. The Target
MSC is the MSC toward which a Handover should take place. An MSC Server is a part
of the redesigned MSC concept starting from 3GPP Release 5.
The HLR for obtaining data about the SIM and MSISDN
the Base Station Subsystem which handles the radio communication with 2G and
2.5G mobile phones.
the UTRAN which handles the radio communication with 3G mobile phones.
the VLR for determining where other mobile subscribers are located.
other MSCs for procedures such as handover.
delivering calls to subscribers as they arrive based on information from the VLR
connecting outgoing calls to other mobile subscribers or the PSTN.
delivering SMSs from subscribers to the SMSC and vice versa
The HLR data is stored for as long as a subscriber remains with the mobile phone
operator.
At first glance, the HLR seems to be just a database which is merely accessed by other
network elements which do the actual processing for mobile phone services. In fact the
HLR is a system which directly receives and processes MAP transactions and messages.
If the HLR fails, then the mobile network is effectively disabled as it is the HLR which
manages the Location Updates as mobile phones roam around.
As the number of mobile subscribers has grown in mobile phone operators the HLR has
become a more powerful computer server rather than the traditional telephone exchange
hardware in the early days of GSM.
The AUC does not engage directly in the authentication process, but instead generates
data known as triplets for the MSC to use during the procedure. The security of the
process depends upon a shared secret between the AUC and the SIM called the Ki. The
Ki is securely burned into the SIM during manufacture and is also securely replicated
onto the AUC. This Ki is never transmitted between the AUC and SIM, but is combined
with the IMSI to produce a challenge/response for identification purposes and an
encryption key called Kc for use in over the air communications.
the MSC which requests a new batch of triplet data for an IMSI after the previous
data have been used. This ensures that same keys and challenge responses are not
used twice for a particular mobile.
the Ki
Algorithm id (the standard algorithms are called A3 or A8, but an operator may
choose a proprietary one).
When the MSC asks the AUC for a new set of triplets for a particular IMSI, the AUC first
generates a random number known as RAND. This RAND is then combined with the Ki
to produce two numbers as follows:
The Ki and RAND are fed into the A3 algorithm and a number known as Signed
RESponse or SRES is calculated.
The Ki and RAND are fed into the A8 algorithm and a session key called Kc is
calculated.
The numbers (RAND, SRES, KC) form the triplet sent back to the MSC. When a
particular IMSI requests access to the GSM core network, the MSC sends the RAND part
of the triplet to the SIM. The SIM then feeds this number and the Ki (which is burned
onto the SIM) into the A3 algorithm as appropriate and an SRES is calculated and sent
back to the MSC. If this SRES matches with the SRES in the triplet (which it should if it
is a valid SIM), then the mobile is allowed to attach and proceed with GSM services.
After successful authentication, the MSC sends the encryption key Kc to the Base Station
Controller (BSC) so that all communications can be encrypted and decrypted. Of course,
the mobile phone can generate the Kc itself by feeding the same RAND supplied during
authentication and the Ki into the A8 algorithm.
The AUC is usually collocated with the HLR, although this is not necessary. Whilst the
procedure is secure for most everyday use, it is by no means crack proof. Therefore a new
set of security methods was designed for 3G phones.
the Visited MSC (V-MSC) to pass data needed by the V-MSC during its
procedures, e.g. authentication or call setup.
The HLR to request data for mobile phones attached to its serving area.
Other VLRs to transfer temporary data concerning the mobile when they roam
into new VLR areas (for example TMSI which is an ephemeral temporary IMSI
used in communication).
to inform the HLR that a subscriber has arrived in the particular area covered by
the VLR
to track where the subscriber is within the VLR area (location area) when no call
is ongoing
to allow or disallow which services the subscriber may use
to allocate roaming numbers during the processing of incoming calls
to purge the subscriber record if a subscriber becomes inactive whilst in the area
of a VLR. The VLR deletes the subscriber's data after a fixed time period of
inactivity and informs the HLR (e.g. when the phone has been switched off and
left off or when the subscriber has moved to an area with no coverage for a long
time).
to delete the subscriber record when a subscriber explicitly moves to another, as
instructed by the HLR
[edit] EIR
The EIR (Equipment Identity Register) is often integrated to the HLR. The EIR keeps a
list of mobile phones (identified by their IMEI) which are to be banned from the network
or monitored. This is designed to allow tracking of stolen mobile phones. In theory all
data about all stolen mobile phones should be distributed to all EIRs in the world through
a Central EIR. It is clear, however, that there are some countries where this is not in
operation. The EIR data does not have to change in real time, which means that this
function can be less distributed than the function of the HLR.
[edit] BC
The Billing Centre is responsible for processing the toll tickets generated by the VLRs
and HLRs and generating a bill for each subscriber. it is also responsible for to generate
billing data of roaming subscriber.
[edit] SMSC
The Short Message Service Centre supports the sending and reception of text
messages.
[edit] MMSC
The Multimedia Messaging System Centre supports the sending of multimedia
messages (e.g. Images, Audio, Video and their combinations) to (or from) MMS-enabled
Handsets.
[edit] VMS
Concentrator
From Wikipedia, the free encyclopedia
Ten things you didn't know about images on Wikipedia
2G
GSM
GPRS
HSCSD
EDGE (EGPRS)
W-CDMA
o UMTS (3GSM)
o FOMA
UMTS-TDD
o TD-CDMA
o TD-SCDMA
HSPA
o HSDPA
o HSUPA
3G
Pre-4G
cdmaOne
CDMA2000
EV-DO
3G
Pre-4G
Contents
0G
UMB
Other Technologies
[hide]
UMTS Revision 8
o LTE
o
HSPA+
PTT
MTS
IMTS
AMTS
OLT
MTD
Autotel / PALM
ARP
NMT
AMPS / TACS / ETACS
1G
2.1 Description
2.2 Other GSM Core Network Elements connected to the MSC
2.3 Procedures implemented
3 Home Location Register (HLR)
o 3.1 Description
o 3.2 Other GSM Core Network Elements connected to the HLR
o 3.3 Procedures implemented
4 Authentication Centre (AUC)
o 4.1 Description
o 4.2 Other GSM Core Network Elements connected to the AUC
o 4.3 Procedures implemented
5 Visitor Location Register (VLR)
o 5.1 Description
o 5.2 Other GSM Core Network Elements connected to the VLR
o 5.3 Procedures implemented
6 EIR
7 Other support functions
o 7.1 BC
o 7.2 SMSC
o 7.3 MMSC
o 7.4 VMS
o 7.5 Lawful interception functions
8 See also
9 External links
o
o
o
A Gateway MSC is the MSC that determines which visited MSC the subscriber who is
being called is currently located. It also interfaces with the Public Switched Telephone
Network. All mobile to mobile calls and PSTN to mobile calls are routed through a
GMSC. The term is only valid in the context of one call since any MSC may provide both
the gateway function and the Visited MSC function, however, some manufacturers design
dedicated high capacity MSCs which do not have any BSSes connected to them. These
MSCs will then be the Gateway MSC for many of the calls they handle.
The Visited MSC is the MSC where a customer is currently located. The VLR associated
with this MSC will have the subscriber's data in it.
The Anchor MSC is the MSC from which a handover has been initiated. The Target
MSC is the MSC toward which a Handover should take place. An MSC Server is a part
of the redesigned MSC concept starting from 3GPP Release 5.
The HLR for obtaining data about the SIM and MSISDN
the Base Station Subsystem which handles the radio communication with 2G and
2.5G mobile phones.
the UTRAN which handles the radio communication with 3G mobile phones.
the VLR for determining where other mobile subscribers are located.
other MSCs for procedures such as handover.
delivering calls to subscribers as they arrive based on information from the VLR
connecting outgoing calls to other mobile subscribers or the PSTN.
delivering SMSs from subscribers to the SMSC and vice versa
arranging handovers from BSC to BSC
carrying out handovers from this MSC to another
supporting supplementary services such as conference calls or call hold.
generating billing information.
The HLR data is stored for as long as a subscriber remains with the mobile phone
operator.
At first glance, the HLR seems to be just a database which is merely accessed by other
network elements which do the actual processing for mobile phone services. In fact the
HLR is a system which directly receives and processes MAP transactions and messages.
If the HLR fails, then the mobile network is effectively disabled as it is the HLR which
manages the Location Updates as mobile phones roam around.
As the number of mobile subscribers has grown in mobile phone operators the HLR has
become a more powerful computer server rather than the traditional telephone exchange
hardware in the early days of GSM.
Proper implementation of security in and around the AUC is a key part of an operator's
strategy to avoid SIM cloning.
The AUC does not engage directly in the authentication process, but instead generates
data known as triplets for the MSC to use during the procedure. The security of the
process depends upon a shared secret between the AUC and the SIM called the Ki. The
Ki is securely burned into the SIM during manufacture and is also securely replicated
onto the AUC. This Ki is never transmitted between the AUC and SIM, but is combined
with the IMSI to produce a challenge/response for identification purposes and an
encryption key called Kc for use in over the air communications.
the MSC which requests a new batch of triplet data for an IMSI after the previous
data have been used. This ensures that same keys and challenge responses are not
used twice for a particular mobile.
the Ki
Algorithm id (the standard algorithms are called A3 or A8, but an operator may
choose a proprietary one).
When the MSC asks the AUC for a new set of triplets for a particular IMSI, the AUC first
generates a random number known as RAND. This RAND is then combined with the Ki
to produce two numbers as follows:
The Ki and RAND are fed into the A3 algorithm and a number known as Signed
RESponse or SRES is calculated.
The Ki and RAND are fed into the A8 algorithm and a session key called Kc is
calculated.
The numbers (RAND, SRES, KC) form the triplet sent back to the MSC. When a
particular IMSI requests access to the GSM core network, the MSC sends the RAND part
of the triplet to the SIM. The SIM then feeds this number and the Ki (which is burned
onto the SIM) into the A3 algorithm as appropriate and an SRES is calculated and sent
back to the MSC. If this SRES matches with the SRES in the triplet (which it should if it
is a valid SIM), then the mobile is allowed to attach and proceed with GSM services.
After successful authentication, the MSC sends the encryption key Kc to the Base Station
Controller (BSC) so that all communications can be encrypted and decrypted. Of course,
the mobile phone can generate the Kc itself by feeding the same RAND supplied during
authentication and the Ki into the A8 algorithm.
The AUC is usually collocated with the HLR, although this is not necessary. Whilst the
procedure is secure for most everyday use, it is by no means crack proof. Therefore a new
set of security methods was designed for 3G phones.
the Visited MSC (V-MSC) to pass data needed by the V-MSC during its
procedures, e.g. authentication or call setup.
The HLR to request data for mobile phones attached to its serving area.
Other VLRs to transfer temporary data concerning the mobile when they roam
into new VLR areas (for example TMSI which is an ephemeral temporary IMSI
used in communication).
to inform the HLR that a subscriber has arrived in the particular area covered by
the VLR
to track where the subscriber is within the VLR area (location area) when no call
is ongoing
to allow or disallow which services the subscriber may use
to allocate roaming numbers during the processing of incoming calls
to purge the subscriber record if a subscriber becomes inactive whilst in the area
of a VLR. The VLR deletes the subscriber's data after a fixed time period of
inactivity and informs the HLR (e.g. when the phone has been switched off and
left off or when the subscriber has moved to an area with no coverage for a long
time).
to delete the subscriber record when a subscriber explicitly moves to another, as
instructed by the HLR
[edit] EIR
The EIR (Equipment Identity Register) is often integrated to the HLR. The EIR keeps a
list of mobile phones (identified by their IMEI) which are to be banned from the network
or monitored. This is designed to allow tracking of stolen mobile phones. In theory all
data about all stolen mobile phones should be distributed to all EIRs in the world through
a Central EIR. It is clear, however, that there are some countries where this is not in
operation. The EIR data does not have to change in real time, which means that this
function can be less distributed than the function of the HLR.
[edit] BC
The Billing Centre is responsible for processing the toll tickets generated by the VLRs
and HLRs and generating a bill for each subscriber. it is also responsible for to generate
billing data of roaming subscriber.
[edit] SMSC
The Short Message Service Centre supports the sending and reception of text
messages.
[edit] MMSC
The Multimedia Messaging System Centre supports the sending of multimedia
messages (e.g. Images, Audio, Video and their combinations) to (or from) MMS-enabled
Handsets.
[edit] VMS
The Voicemail System records and stores voicemails.
Contents
[hide]
7 External links
GTP-U: for transfer of user data in separated tunnels for each PDP context
GGSNs and SGSNs (collectively known as GSNs) listen for GTP-C messages on UDP
port 2123 and for GTP-U messages on port 2152. This communication happens within a
single network or may, in the case of international roaming, happen internationally,
probably across a GPRS Roaming Exchange (GRX).
The "Charging Gateway Function" (CGF) listens to GTP' messages sent from the GSNs
on UDP port 3386. The core network sends charging information to the CGF, typically
including PDP context activation times and the quantity of data which the end user has
transferred. However, this communication which occurs within one network is less
standardised and may, depending on the vendor and configuration options, use
proprietary encoding or even an entirely proprietary system.
and user profiles (e.g., IMSI, address(es) used in the packet data network) of all GPRS
users registered with this SGSN.
Carry up to about 60 kbit/s (150 kbit/s for Edge) traffic per subscriber
Connect via frame relay or IP to the PCU using the Gb protocol stack
Accept uplink data to form IP packets
Encrypt downlink data, decrypt uplink data
Carry out mobility management to the level of a cell for connected mode mobiles;
When a GPRS mobile phone sets up a PDP context, the access point is selected. At this
point an Access Point Name (APN) is determined
Example: flextronics.mnc012.mcc345.gprs.
Example: internet
Example: mywap.
This access point is then used in a DNS query to a private DNS network. This process
(called APN resolution) finally gives the IP address of the GGSN which should serve the
access point. At this point a PDP context can be activated..
Subscriber's IP address
Subscriber's IMSI
Subscriber's
o Tunnel ID (TEID) at the GGSN
o Tunnel ID (TEID) at the SGSN
The tunnel ID (TEID) is a number allocated by the GSN which identifies the tunnelled
data related to a particular PDP context.
There are two kinds of PDP contexts.
A total of 11 PDP contexts (with any combination of Primary and Secondary) can coexist.
Gb - Interface between the Base Station Subsystem and the SGSN the
transmission protocol could be Frame Relay or IP.
Gn - IP Based interface between SGSN and other SGSNs and (internal) GGSNs.
DNS also shares this interface. Uses the GTP Protocol.
Gp - IP Based interface between internal SGSN and external GGSNs. Between
the SGSN and the external GGSN, there is the Border Gateway (which is
essentially a firewall). Also uses the GTP Protocol.
Ga - The interface servers the CDRs (Accounting records) which are written in
the GSN and sent to the CG (Charging Gateway). This interface uses an GTP
Protocol, with extensions that supports CDRs (Called GTP' or GTP prime).
Gr - Interface between the SGSN and the HLR. Messages going through this
interface uses the MAP3 Protocol.
Gd - Interface between the SGSN and the SMS Gateway. Can use MAP1, MAP2
or MAP3.
Gs - Interface between the SGSN and the MSC (VLR). Uses the BSSAP+
Protocol. This interface allows paging and station availability when it performs
data transfer. When the station is attached to the GPRS network, the SGSN keeps
track of which RA (Routing Area) the station is attached to. An RA is a part of a
larger LA (Location Area). When a station is paged this information is used to
conserve network resources. When the station performs a PDP Context, the SGSN
has the exact BTS the station is using.
Gi - The interface between the GGSN and a PDN (Public Data Network) either
directly to the Internet or through a WAP gateway. Uses the IP protocol.
Ge - The interface between the SGSN and the SCP (Service Control Point). Uses
the CAP Protocol.
Gx - The on-line policy interface between the GGSN and the CRF (Charging
Rules Function). It is used for provisioning service data flow based charging
rules. Uses the Diameter Protocol.
Gy - The on-line charging interface between the GGSN and the OCS (Online
Charging System). Uses the Diameter Protocol (DCCA application).
Gz - The off-line charging interface between the GSN and the CG (Charging
Gateway). Uses the CDRs (Accounting records).
jhuu
Penjelasan :
Contents
1 Basics
o 1.1 Capability classes
1.1.1 Multislot classes
o 1.2 Coding scheme
2 Services and hardware
o 2.1 USB GPRS modem
3 Availability
4 See also
5 External links
GSM
GPRS
HSCSD
EDGE (EGPRS)
W-CDMA
o UMTS (3GSM)
o FOMA
UMTS-TDD
o TD-CDMA
o TD-SCDMA
HSPA
o HSDPA
o HSUPA
3G
HSPA+
Pre-4G
UMTS Revision 8
o LTE
o
cdmaOne
CDMA2000
EV-DO
3G
Pre-4G
[hide]
2G
UMB
Other Technologies
0G
PTT
MTS
IMTS
AMTS
OLT
MTD
Autotel / PALM
ARP
NMT
AMPS / TACS / ETACS
1G
[edit] Basics
GPRS is packet-switched, which means that multiple users share the same transmission
channel, only transmitting when they have data to send. Thus the total available
bandwidth can be immediately dedicated to those users who are actually sending at any
given moment, providing higher use where users only send or receive data intermittently.
Web browsing, receiving e-mails as they arrive and instant messaging are examples of
uses that require intermittent data transfers, which benefit from sharing the available
bandwidth. By contrast, in the older Circuit Switched Data (CSD) standard included in
GSM standards, a connection establishes a circuit, and reserves the full bandwidth of that
circuit during the lifetime of the connection.
Usually, GPRS data are billed per kilobyte of information transceived, while circuitswitched data connections are billed per second. The latter is because even when no data
are being transferred, the bandwidth is unavailable to other potential users.
The multiple access methods used in GSM with GPRS are based on frequency division
duplex (FDD) and FDMA. During a session, a user is assigned to one pair of up-link and
down-link frequency channels. This is combined with time domain statistical
multiplexing, i.e. packet mode communication, which makes it possible for several users
to share the same frequency channel. The packets have constant length, corresponding to
a GSM time slot. The down-link uses first-come first-served packet scheduling, while the
up-link uses a scheme very similar to reservation ALOHA. This means that slotted Aloha
(S-ALOHA) is used for reservation inquiries during a contention phase, and then the
actual data is transferred using dynamic TDMA with first-come first-served scheduling.
GPRS originally supported (in theory) Internet Protocol (IP), Point-to-Point Protocol
(PPP) and X.25 connections. The last has been typically used for applications like
wireless payment terminals, although it has been removed from the standard. X.25 can
still be supported over PPP, or even over IP, but doing this requires either a router to
perform encapsulation or intelligence built in to the end-device/terminal e.g. UE(User
Equipment). In practice, when the mobile built-in browser is used, IPv4 is being utilized.
In this mode PPP is often not supported by the mobile phone operator, while IPv6 is not
yet popular. But if the mobile is used as a modem to the connected computer, PPP is used
to tunnel IP to the phone. This allows DHCP to assign an IP Address and then the use of
IPv4 since IP addresses used by mobile equipment tend to be dynamic.
service is suspended, and then resumed automatically after the GSM service
(voice call or SMS) has concluded. Most GPRS mobile devices are Class B.
Class C
Are connected to either GPRS service or GSM service (voice, SMS). Must be
switched manually between one or the other service.
A true Class A device may be required to transmit on two different frequencies at the
same time, and thus will need two radios. To get around this expensive requirement, a
GPRS mobile may implement the dual transfer mode (DTM) feature. A DTM-capable
mobile may use simultaneous voice and packet data, with the network coordinating to
ensure that it is not required to transmit on two different frequencies at the same time.
Such mobiles are considered pseudo-Class A. Some networks are expected to support
DTM in 2007.
GPRS speed is a direct function of the number of TDMA time slots assigned, which is the
lesser of (a) what the particular cell supports and (b) the maximum capability of the
mobile device expressed as a GPRS Multislot Class.
Multislot Class
Downlink Slots
Uplink Slots
Active Slots
10
11
12
32
Coding Speed
scheme (kbit/s)
CS-1
8.0
CS-2
12.0
CS-3
14.4
CS-4
20.0
transceiver station (BTS), while the most robust coding scheme (CS-1) is used when the
mobile station (MS) is further away from a BTS.
Using the CS-4 it is possible to achieve a user speed of 20.0 kbit/s per time slot.
However, using this scheme the cell coverage is 25% of normal. CS-1 can achieve a user
speed of only 8.0 kbit/s per time slot, but has 98% of normal coverage. Newer network
Technology
Download
(kbit/s)
Upload (kbit/s)
Configuration
CSD
9.6
9.6
1+1
HSCSD
28.8
14.4
2+1
HSCSD
43.2
14.4
3+1
GPRS
80.0
4+1
GPRS
60.0
3+2
EGPRS
(EDGE)
236.8
4+1
EGPRS
(EDGE)
177.6
3+2
equipment can adapt the transfer speed automatically depending on the mobile location.
Like CSD, HSCSD establishes a circuit and is usually billed per minute. For an
application such as downloading, HSCSD may be preferred, since circuit-switched data
are usually given priority over packet-switched data on a mobile network, and there are
relatively few seconds when no data are being transferred.
GPRS is packet based. When TCP/IP is used, each phone can have one or more IP
addresses allocated. GPRS will store and forward the IP packets to the phone during cell
handover (when you move from one cell to another). A radio noise induced pause can be
interpreted by TCP as packet loss, and cause a temporary throttling in transmission speed.
[edit] Availability
In many areas, such as France, telephone operators have priced GPRS relatively cheaply
(compared to older GSM data transfer, CSD and HSCSD). Some mobile phone operators
offer flat rate access to the Internet, while others charge based on data transferred, usually
rounded up to 100 kilobytes.
During the heyday of GPRS in the developed countries, the mid 2000s, typical prices
varied from EUR 0,24 per megabyte to over 20 per megabyte. In developing countries,
prices vary widely, and change. Some operators gave free access while they decided
pricing, for example in Togocel.tg in Togo, West Africa, others were over-priced, such as
Tigo of Ghana at one US dollar per megabyte or Indonesia at $3 per megabyte. Mero
Mobile of Nepal charges users up to a set amount and then has unlimited Internet access.
Pre-Paid SIM Cards allow travelers to buy short term internet access. The mean price in
developing nations is US$1 per hour [citation needed].
The maximum speed of a GPRS connection offered in 2003 was similar to a modem
connection in an analog wire telephone network, about 32 to 40 kbit/s, depending on the
phone used. Latency is very high; a round-trip ping is typically about 600 to 700 ms and
often reaches 1s. GPRS is typically prioritized lower than speech, and thus the quality of
connection varies greatly.
In order to set up a GPRS connection for a wireless modem, a user must specify an access
point name (APN), optionally a user name and password, and very rarely an IP address,
all provided by the network operator.
Devices with latency/RTT improvements (via e.g. the extended UL TBF mode feature)
are widely available. Also, network upgrades of features are available with certain
operators. With these enhancements the active round-trip time can be reduced, resulting
in significant increase in application-level throughput speeds.
CDMA
EDGE
UMTS
GPRS Core Network
SNDCP
IP Multimedia Subsystem
HSDPA
Multiplayer Mobile games
List of device bandwidths
Penjelasan :