Sie sind auf Seite 1von 43

2006

Confidential and Proprietary


Integrated Wireless Solutions Pvt. Ltd
Module 2
CDMA Introduction
Integrated Wireless Solutions Pvt. Ltd.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA Basics
- Introduction
- Multiple Access
- Codes
- Synchronization
- Power Control
- Handoff
- CDMA Channels
- CDMA Benefits
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Introduction
O Global Mobile Users - 1.52 billion
O Global GSM users - 1.25 billion
O Global CDMA Users - 202m
O Global TDMA users - 120m
O Total 3G users - 130m
O #1 Mobile Country - China (300m)
O #1 GSM Country - China (282m)
O #1 Network In Africa - Vodacom(11m)
O #1 Network In Asia - Unicom (153m)
O #1 Network In Japan - DoCoMo
O #1 Network In Europe - T-Mobil (28m)
O Number of mobile users in India 44.5m(Nov
04)
O #1 In Infrastructure - Ericsson
O #1 in Handsets 2Q04 - Nokia(35.5%)
O Global monthly SMS - 36/user
O SMS Sent Global 1Q04 - 135 billion
O Increased capacity within their existing spectrum
allocation and easy deployment of technology
O Higher capacities and lower system design costs (plus
lower infrastructure costs) which will lead to a lower
cost per subscriber.
O A lower cost per subscriber, combined with new
subscriber features, which will help the operators to
increase their market penetration.
O An increased market penetration, which will lead to an
increase in number of subscribers and a system which
offers support for that increased capacity.
O High quality calls must be maintained during the change
to or migration to any new digital technology.
O One of the most exciting of the
new digital technologies, CDMA
will offer all of this to the
operators, and more.
Some Facts.
Operator Drivers.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Bandwidth B
Frequency
Multiple users attempt to Access B
Multiple Access Problems
Multiple Access Problems
O Consider a given
Bandwidth (B) from a
Frequency Spectrum
(f).
O The Multiple Access
(MA) problem is the
process which
attempts to allow
several users (N) to
share a common
bandwidth B
simultaneously.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Multiple Access Technologies
Several solutions to the Multiple
Access Problem exist. Here, we will
define and review three strategies
Frequency Division
Multiple Access (FDMA)
Time Division Multiple
Access (TDMA)
Code Division Multiple
Access (CDMA)
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Multiple Access Comparison - FDMA
O Used for Analog cellular
O Each user assigned a discreet slice of
RF spectrum
O Number of users is limited to number
of channels
O In Frequency Division Multiple Access
or FDMA strategies, the focus is on
the Frequency dimension.
O Here, we divide the bandwidth (B)
into N Narrow band frequency slices.
O So, several users are allowed to
communicate simultaneously by
assigning Narrowband frequency
slices to the users:
On a Dedicated or Pre-assigned basis
where a fixed frequency slice is
assigned to a designated user at all
times. Examples of Dedicated FDMA
applications include AM Radio, FM
Radio and Television Broadcasts.
On a Demand-Assigned Multiple
Access (DAMA) basis where an
available frequency slice, or Channel,
is assigned to a designated user for
one call or one transaction only. An
example of DAMA FDMA applications is
the Analog cellular system.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Multiple Access Comparison - TDMA
O Each user assigned a discreet slice of
RF spectrum
O Multiple users share the carrier on a
time slot basis
O Number of Users per channel is
dependent upon number of timeslots
O Used for GSM and IS-54
O In Time Division Multiple Access or TDMA
strategies, we create, in addition to the
Frequency Dimension (f), a new
Dimension: Time (t).
O Given a slice of the total bandwidth B,
the focus is now placed on the Time
Dimension: Here, several users are
allowed to take turns in the Time
domain in order to share a given
Narrowband frequency slice (Fi).
O Here, the time Dimension is organized or
subdivided into multiple time slices. So,
several users are allowed to
communicate simultaneously by
assigning time slices to the users.
O The period of time during which a user
gets the chance to transmit (or receive)
on the channel is referred to as Time
Slot (TS). The information contained in a
Time Slot is called a Burst.
O The interval of time during which all the
assigned users get the chance to use
their respective Time Slots is referred to
as the TDMA Frame.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Multiple Access Comparison - CDMA
Codes
Codes
O In Code Division Multiple Access
or CDMA strategies, we create yet
another Dimension (in addition to
the Frequency and Time
dimensions). This new, orthogonal
dimension is referred to as the
Code Dimension .
O Given a wideband slice of the total
bandwidth B, our focus will now
be placed on the newly created
Code Dimension: Here several
users are allowed, at all times,
to access the broadband
Frequency slice. However, each
user must employ a unique Code.
O Since co-users are isolated by
codes rather than Frequencies,
the ability to reuse frequencies is
very high. This further enhances
the overall spectral efficiency.
O If these codes are orthogonal,
they will isolate the users in the
Code Dimension. (Just like
different frequencies and different
Time-Slots do in the Frequency
and Time Dimensions
respectively.)
Time
Frequency
Code
Spectral Efficiency is further Enhanced !
Frequency
Time
Codes Codes
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Multiple Access Comparison - CDMA
O No time division multiplexing
O Each user is assigned a code during call setup
O This code is spread using a Wideband Pseudorandom
Noise (PN) Sequence
O Wideband signal reduces interference and allow one-cell
frequency re-use
O Used for IS95 based standards
Time
F
i
Code
C
i
(t)
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Codes Codes
Codes
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Why Use Codes?
O Gives each user a unique identity
User data is mixed with user
identity and is transmitted to Base
Station
Base Station uses the unique
identity to extract data
O Used for SPREADING the user data
over a large bandwidth
Base data at 9.6Kb/s needs to be
spread over 1.23 MHz bandwidth
Spreading provides multiple
benefits
O Reduces power transmitted
O Reduces Interference
O Increases Capacity
O More immune to fading and
interference
O More resistant to jamming
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
How Codes are Used - Transmitter
O Let us consider the following
steps or activities at a given
transmitter location:
an arbitrary data sequence d
i
(t)
generated by a digital source.
g Now generate an arbitrary Code
sequence c
i
(t).
@ Add these two sequences Modulo-2
(Exclusive-OR gate)
-1 +1 -1 +1 +1 -1 -1
+1 +1 -1 -1 -1 +1 -1
+1
-1
-1 -1 +1 +1 -1 -1 -1 +1

D
i
(t) C
i
(t)
D
i
(t)

C
i
(t)
g gg g
@ @@ @

d
i
(t)
c
i
(t)
d
i
(t)
c
i
(t)
Transmitter Transmitter Transmitter Transmitter
O Lets transmit
the output of the
Exclusive-OR
gate to a distant
receiver
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
How Codes are Used - Receiver
O Lets transmit the output of the
multiplier to a distant receiver.
j At the distant location, the resulting sequence is
picked up by the receiver
) If the code c
i
(t) used at the transmitting location is
available at the receiver, then the original data
sequence d
i
(t) can be recovered exactly.
g This is done by Multiplying the received sequence
with the locally available code c
i
(t).
g Receive the original sequence of data
g gg g
a a
a
a
a -1 +1 -1 +1 +1 -1 -1 +1 -1 -1 +1 +1 -1 -1 -1 +1

D
i
(t)
C
i
(t)
D
i
(t) C
i
(t)
+1 +1 -1 -1 -1 +1 -1 -1

@ @@ @
d
i
(t
i
)
c
i
(t)

d
i
(t
i
)
c
i
(t
i
) c
i
(t
i
)
d
i
(t
i
)
c
i
(t
i
)
Receiver Receiver Receiver Receiver
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
How Codes are Used - Summary
d
i
(t) is the data sequence
g c
i
(t) is the code sequence
@ d
i
(t) c
i
(t) is resulting
sequence. This is the
sequence which is actually
sent to the receiver.
O In order for the output of the receiver
to be identical to the original data, the
following relationship must be true:
d(t).c(t).c(t) = d(t)
O In other words, c(t).c(t) must be equal
to unity. Note that c(t) is a binary
sequence made up of +1s and -1s.
Therefore:
If c(t) is +1, c(t).c(t) is equal to +1
If c(t) is -1, c(t).c(t) is also equal to +1.
This is the Exclusive OR function
O Since c(t).c(t) is equal to +1, the
condition d(t).c(t).c(t) =d(t) is met.
Therefore the output of our simple
receiver is the recovered original data
d(t).
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Spreading Codes
O In order to spread the data
sequence (Direct Sequence Spread
Spectrum), the code sequence
must be :
Much faster than the data sequence.
Exhibit some Randomness properties
O Note that the data sequence has a
slower speed (less transitions)
than the Code sequence.
By Multiplying the data sequence
with the faster code sequence, the
resulting product yields a sequence
with more transitions than the
original data. (Faster speed).
O Furthermore, in order to provide
good isolation between users
(Code Division Multiple Access),
a set of orthogonal codes must
be used.
O The codes used in practice are
not perfectly orthogonal.
However, they exhibit very good
isolation characteristics.
O Linear Shift Registers are used to
generate the kind of spreading
codes utilized in CDMA-based IS-
95 systems.
They are referred to as Pseudo-
random Noise (PN) codes or
sequences.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Codes used in CDMA
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Synchronization Synchronization
Synchronization
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Synchronization Concept
O So far, we are assuming that
there is no propagation delay
and/or other processing
delays incurred between the
transmitter and the receiver
input
O Therefore, the code copy
used at the receiver is
perfectly lined-up with the
initial code used at the
transmitter. These two codes
are said to be in phase or in
sync. (synchronization).
O In practice however, a propagation
delay and other processing delays (
i
)
are incurred between the transmitter
and the receiver input
O Therefore, the code copy used at the
receiver may be time-shifted relative
to the initial code used at the
transmitter. The two codes are no
longer in sync or in phase. As the
result, the output of the receiver will
no longer be identical to the original
data d(t).
O In order to recover the original data,
we must tune the receiver code
sequence to that of the incoming code
from the transmitter. In other words,
we must deliberately and artificially
time-shift the receiver code in order to
line it up with the incoming code. (At
the receiver, we are artificially
compensating or making-up for the
delays incurred during transmission.)
This process is referred to
as synchronization.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Synchronization ConceptCont
O In the final stages of the encoding of the radio link from the base
station to the mobile, CDMA adds a special "pseudo-random code" to
the signal that repeats itself after a finite amount of time.
O Base stations in the system distinguish themselves from each other
by transmitting different portions of the code at a given time.
In other words, the base stations transmit time offset versions of the same
pseudo-random code.
In order to assure that the time offsets used remain unique from each
other, CDMA stations must remain synchronized to a common time
reference.
O The primary source of the very precise synchronization signals
required by CDMA systems is the Global Positioning System (GPS).
GPS is a radio navigation system based on a constellation of orbiting
satellites. Since the GPS system covers the entire surface of the earth, it
provides a readily available method for determining position and time to as
many receivers as are required.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Power Control Power Control
Power Control
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA Power Control
O The fundamental purpose of power control is to
maintain a satisfactory voice quality
maximizing system capacity and
minimizing power consumption.
O Power Control is applied to:
Mobile Power on initial access
Mobile Power while on the traffic channel
Base Station Power
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA Handoff CDMA Handoff
CDMA Handoff
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA Soft Handoff (SHO)
O SHO reduces the average transmit power of mobiles in the
handoff area
A mobile in soft handoff powers up only if all BSs involved in soft
handoff ask for more power and
it powers down as soon as one of BSs ask him to power down.
O Therefore statistically mobiles transmitted power is reduced and
so it contributes less to interference level in the system.
O A high call quality by providing a make before break connection
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Handoff
O The different kinds of
handoffs possible in a
cellular system are:
Hard handoff
Soft handoff
Softer handoff
Idle Handoff
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Hard Handoff
O Hard handoff is a break-before-make method,
where a new link is set up after the link to the
original base station has been disconnected.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Soft Handoff
O A soft handoff establishes a connection with the new
base station before breaking the connection with the old
one.
O The CDMA handset assists the network in the handoff
using a rake receiver.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Softer Handoff
O A softer handoff occurs when a user travels from one
sector to another sector of the same base station.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Idle Handoff
O Idle handoff in CDMA happens when the handset
moves from one cell to another while not in a call.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA Channels CDMA Channels
CDMA Channels
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Forward Link/Downlink
O The wireless connection over which information is
sent from a cellular base station to a handset is
known as the forward link or downlink.
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
O The types of forward link
channels are:
Pilot channel
O Used by mobile to obtain initial
system synchronization and
provide time, frequency and
phase tracking of signals from
cells
Synchronization channel
O Provide cell ID, pilot transmit
power and cell PN phase offset
information. Mobile uses this to
establish system time and
initial transmit level
Paging Channel
O Mobile gets paged on this
channel
Traffic Channel
O Carries the actual traffic data
Forward Link/Downlink
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Reverse Link/Uplink
O The wireless connection over which information is sent
from a handset to a cellular base station is known as
the reverse link or uplink.
Traffic
Channel
Access
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
O The types of Reverse link
channels are:
O Access Channel
Used by mobile to
communicate to the base
station.
O Registration requests,
responses to pages, and
call origination
O Reverse traffic channel
Carries the actual traffic data
in the reverse link
Reverse Link/Uplink
Traffic
Channel
Access
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA Benefits CDMA Benefits
CDMA Benefits
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA Benefits
O Capacity
Can balance capacity against coverage and quality
O Cell planning
No frequency planning required
Complex optimization
O Sensitivity
Better sensitivity because of more sophisticated error
correction schemes
O Vocoder
Increases capacity through variable rate vocoding
O Power control
Reduction in interference by use of fast power control
O Keeps the transmit power to minimum
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA Benefits (Cont)
O Frequency diversity
Wideband signals are less
prone to fades than narrow
band signals
O Path diversity
Three receivers receive 3
strongest signals, time shifts
them and then adds them to
enhance the signal
O Soft Handoff
Signal from the mobile is
received by multiple base
stations
O Choose the best signal
from different paths
O Reduces the probability of
drop
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA 1X Overview CDMA 1X Overview
CDMA 1X Overview
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA Application Requirements
O CDMA2000 1X
Peak 153 kbps
circuit/packet data
Simultaneous Voice & Data
1xEV-DO
Peak 2.4 Mbps packet data
Data only services
Non real-time data services
1xEV-DV
Peak 3.1 Mbps circuit/packet
data
Multimedia 3G services
Simultaneous Voice & Data
Real-time services
DOWNLOAD
RINGERS
VOICE
TRANSACTIONS-
BASED APPS
EMAIL
SMS
Location
Specific
Services
S/W
DOWNLOAD
Internet
Access
MUSIC
DOWNLOAD
Non-Real
Time
Real
Time
VIDEO
CONFERENCE
Live Video
Broadcast
INTERACTIVE
GAMING
MULTIMEDIA
MESSAGING
Low Data Rate
High Data Rate
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA2000 1X Solution Objectives
OSupport of CDMA2000 1X Air Interface
Enable new revenue generating features
Enable high voice capacities
OOrderly Migration
Maximize re-use of existing equipment
Minimize risk to existing voice services
Simplify BTS upgrades
OIntroduce Packet Components
Packet CBSC
Packet Data Service Node
Authentication, Accounting, and Authorization Server
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA 1X Technical Characteristics
O Peak Data Rate = 153kbps; Throughput/Capacity = 150kbps
O Rel A: Peak Data Rate = 614kbps; Throughput/Capacity = 415kbps
Peak rate achieved through 2 channel concatenation
Concatenation technology has been proven in commercial IS-95B deployments
O Flexibility to Deploy Data Only Carriers to Maximize End-User Data Rates
O Backward Compatible with IS-95A/B
Supports handoffs between A/B/1X, carrier overlay, and overflow of both voice
and data through load management
O Supports Voice, Mixed Voice/Data, and Real-Time 2-Way Services on a
Single Carrier
O Dynamically Optimizes Data Capacity Based on Underlying Voice Utilization
Extension of IS-95B commercial deployments
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA2000 1X Highlights
O Technical Improvements
Support of MAC, QoS, and Turbo codes for data
Fast forward and reverse link power control
Backward compatible with IS-95A/B
Extended Battery life through QPCH
Forward link transmit diversity (G16.1)
O Benefits
Support of 153.6k bps data rate for new revenue
generating data applications
(Note: 153.6K = 144K + Overhead)
Up to 4-6X capacity increase for data applications
Up to 1.4-1.6X capacity increase for voice reduces
operating costs
Delivers a cost-effective migration strategy by leveraging
IS-95A/B investments
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
CDMA 2000 Evolution
Technology Maximum data rates Spectrum Services
IS-95 A/B 115.2Kbps 1.25MHz Voice and circuit
switched data
services
CDMA2000 1X Upto 614 Kbps 1.25MHz Voice, circuit
switched data and
packet data
CDMA2000 1X- EV-DO Upto 2.4 Mbps 1.25MHz Packet data service
CDMA2000 1X- EV-DV Upto 3 Mbps 1.25MHz Voice, circuit data,
packet data and
multimedia service
2006
Confidential and Proprietary
Integrated Wireless Solutions Pvt. Ltd.
Hope that you enjoyed this course
Thank you
for your participation

Das könnte Ihnen auch gefallen