Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cellular Wireless Networks Chapter 10. Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells Each.

Similar presentations


Presentation on theme: "Cellular Wireless Networks Chapter 10. Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells Each."— Presentation transcript:

1 Cellular Wireless Networks Chapter 10

2 Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of transmitter, receiver, and control unit Band of frequencies allocated Cells set up such that antennas of all neighbors are equidistant (hexagonal pattern)

3 Frequency Reuse

4 Adjacent cells assigned different frequencies to avoid interference or crosstalk Objective is to reuse frequency in nearby cells 10 to 50 frequencies assigned to each cell Transmission power controlled to limit power at that frequency escaping to adjacent cells The issue is to determine how many cells must intervene between two cells using the same frequency

5 Frequency Reuse

6

7 It is not practical to attempt to use the same frequency band in two adjacent cells. Instead, the objective is to use the same frequency band in multiple cells at some distance from one another. This allows the same frequency band to be used for multiple simultaneous conversations in different cells. Within a given cell, multiple frequency bands are assigned, the number of bands depending on the traffic expected. Frequency Reuse

8 Approaches to Cope with Increasing Capacity In time, as more customers use the system, traffic may build up so that there are not enough frequency bands assigned to a cell to handle its calls. Solutions: 1. Adding new channels 2. Frequency borrowing – frequencies are taken from adjacent cells by congested cells 3. Cell splitting – cells in areas of high usage can be split into smaller cells, radiate small power so that less users see the station, and to keep the power within the small cell (handoff). 4. Cell sectoring – cells are divided into a number of wedge- shaped sectors, each with their own set of channels, and use directional antennas. 5. Microcells – antennas move to high buildings, hills to low ones to make very small radius cell

9

10

11 Cellular System Overview

12 Cellular Systems Terms Base Station (BS) – includes an antenna, a controller, and a number of transceivers, Mobile telecommunications switching office (MTSO) – connects calls between mobile units and also connect mobile calls with fixed phones Two types of channels available between mobile unit and BS Control channels – used to exchange information having to do with setting up and maintaining calls Traffic channels – carry voice or data connection between users

13 Steps in an MTSO Controlled Call between Mobile Users Mobile unit initialization Mobile-originated call Paging Call accepted Ongoing call Handoff

14

15 Additional Functions in an MTSO Controlled Call Call blocking If all channels are busy Call termination After mobile units finish their call Call drop Due to weak signals Calls to/from fixed and remote mobile subscriber

16 Mobile Radio Propagation Effects/Concerns Signal strength Must be strong enough between base station and mobile unit to maintain signal quality at the receiver Must not be so strong as to create too much cochannel interference with channels in another cell using the same frequency band Fading Signal propagation effects may disrupt the signal and cause errors

17 Losses Estimation Hata's model is an empirical formulation that takes into account a variety of environments and conditions. For an urban environment, predicted path loss is

18 Losses Estimation To estimate the path loss in a suburban area, the formula for urban path loss in Equation (10.1) is modified as

19 Handoff Performance Metrics used to make the decision. Handoff is the procedure for changing the assignment of a mobile unit from one BS to another as the mobile unit moves from one cell to another. Cell blocking probability – probability of a new call being blocked Call dropping probability – probability that a call is terminated due to a handoff. Call completion probability – probability that an admitted call is not dropped before it terminates Probability of unsuccessful handoff – probability that a handoff is executed while the reception conditions are insufficient

20 Handoff Performance Metrics Handoff blocking probability – probability that a handoff cannot be successfully completed Handoff probability – probability that a handoff occurs before call termination Rate of handoff – number of handoffs per unit time Interruption duration – duration of time during a handoff in which a mobile is not connected to either base station Handoff delay – distance the mobile moves from the point at which the handoff should occur to the point at which it does occur

21 Handoff Strategies Used to Determine Instant of Handoff Relative signal strength (at L1) Relative signal strength with threshold Th2 (at L2), Th3 (at L4) Relative signal strength with hysteresis Relative signal strength with hysteresis and threshold Prediction techniques

22 Handoff Strategies Used to Determine Instant of Handoff Relative signal strength (at L1) Relative signal strength with threshold Th2 (at L2), Th3 (at L4) Prediction techniques

23 Power Control Design issues making it desirable to include dynamic power control in a cellular system Received power must be sufficiently above the background noise for effective communication Desirable to minimize power in the transmitted signal from the mobile Reduce cochannel interference, alleviate health concerns, save battery power In CDMA systems, it’s desirable to equalize the received power level from all mobile units at the BS

24 Types of Power Control Open-loop power control Depends solely on mobile unit No feedback from BS Not as accurate as closed-loop, but can react quicker to fluctuations in signal strength Closed-loop power control Adjusts signal strength in reverse channel based on metric of performance BS makes power adjustment decision and communicates to mobile on control channel

25 Open-loop power control Depends solely on the mobile unit, with no feedback from the BS, and is used in some CDMA systems. In CDMA systems, the BS continuously transmits an unmodulated signal, known as a pilot. The pilot allows a mobile unit to acquire the timing of the forward (BS to mobile) CDMA channel and provides a phase reference for demodulation (for synchronization). It can also be used for power control. The mobile unit monitors the received power level of the pilot and sets the transmitted power in the reverse (mobile to BS) channel inversely proportional to it. This approach assumes that the forward and reverse link signal strengths are closely correlated, which is generally the case. The open-loop approach is not as accurate as the closed-loop approach. However, the open-loop scheme can react more quickly to rapid fluctuations in signal strength, such as when a mobile unit emerges from behind a large building. This fast action is required in the reverse link of a CDMA system where the sudden increase in received strength at the BS may suppress all other signals.

26 Closed-loop power control Adjusts signal strength in the reverse (mobile to BS) channel based on some metric of performance in that reverse channel, such as received signal power level, received signal-to-noise ratio, or received bit error rate. The BS makes the power adjustment decision and communicates a power adjustment command to the mobile unit on a control channel. Closed-loop power control is also used to adjust power in the forward channel. In this case, the mobile unit provides information about received signal quality to the BS, which then adjusts transmitted power.

27 Traffic Engineering Ideally, available channels would equal number of subscribers active at one time In practice, not feasible to have capacity handle all possible load For N simultaneous user capacity and L subscribers L < N – nonblocking system L > N – blocking system

28 Blocking System Performance Questions Probability that call request is blocked? What capacity is needed to achieve a certain upper bound on probability of blocking? What is the average delay? What capacity is needed to achieve a certain average delay?

29 Traffic Intensity Load presented to a system: = mean rate of calls attempted per unit time h = mean holding time per successful call A = average number of calls arriving during average holding period, for normalized (Traffic Intensity)

30 λh = pN, where p is server utilization, or the fraction of time that a server is busy. Therefore, A = pN and is a measure of the average number of channels required.

31

32 Blocking System Typically, a blocking system is sized to deal with some upper limit of traffic intensity. The common practice is to size the system to meet the average rate encountered during a busy hour. The busy hour is the 60-minute period during the day when the traffic is highest, in the long run. ITU-T recommends taking the average of the busy hour traffic on the 30 busiest days of the year, called the "mean busy-hour traffic," and using that quantity to size the system. The North American practice is to take the average over the 10 busiest days. These are typically measurements of carried rather than offered traffic and can only be used to estimate the true load.

33 Factors that Determine the Nature of the Traffic Model Manner in which blocked calls are handled Lost calls delayed (LCD) – blocked calls put in a queue awaiting a free channel Blocked calls rejected and dropped Lost calls cleared (LCC) – The user hangs up and waits some random time interval before another call attempt Lost calls held (LCH) – user repeatedly attempts calling Number of traffic sources Whether number of users is assumed to be finite or infinite

34 Number of traffic sources The second key element of a traffic model is whether the number of users is assumed to be finite or infinite. For an infinite source model, there is assumed to be a fixed arrival rate. For the finite source case, the arrival rate will depend on the number of sources already engaged. In particular, if the total pool of users is L, each of which generates calls at an average rate of λ /L, then, when the cell is totally idle, the arrival rate is λ (λ= λ/L*L). However, if there are K users occupied at time t, then the instantaneous arrival rate at that time is λ.(L - K)/L. Infinite source models are analytically easier to deal with. The infinite source assumption is reasonable when the number of sources is at least 5 to 10 times the capacity of the system.

35 Infinite Sources, Lost Calls Cleared For an infinite source LCC model, the key parameter of interest is the probability of loss, or grade of service. Thus a grade of service of 0.01 means that, during a busy hour, the probability that an attempted call is blocked is 0.01. Values in the range 0.01 to 0.001 are generally considered quite good.

36

37 First-Generation Analog Advanced Mobile Phone Service (AMPS) (80’s) In North America, two 25-MHz bands allocated to AMPS One for transmission from base to mobile unit One for transmission from mobile unit to base Each band split in two to encourage competition Frequency reuse exploited (broken)

38 AMPS-Spectral Allocation In North America, two 25-MHz bands are allocated to AMPS, one for transmission from the base station to the mobile unit (869-894 MHz) the other for transmission from the mobile unit to the base station (824-849 MHz). Each of these bands is split in two to encourage competition (i.e., so that in each market two operators can be accommodated). An operator is allocated only 12.5 MHz in each direction for its system. The channels are spaced 30 kHz apart, which allows a total of 416 channels per operator. Twenty-one channels are allocated for control, leaving 395 to carry calls. The control channels are data channels operating at 10 kbps. The conversation channels carry the conversations in analog using frequency modulation. Control information is also sent on the conversation channels in bursts as data. This number of channels is inadequate for most major markets, so some way must be found either to use less bandwidth per conversation or to reuse frequencies. Both approaches have been taken in the various approaches to mobile telephony. For AMPS, frequency reuse is exploited.

39

40 AMPS Operation 1. Subscriber initiates call by keying in phone number and presses send key 2. MTSO (mobile telecommunications switching office) verifies number and authorizes user 3. MTSO issues message to user’s cell phone indicating send and receive traffic channels 4. MTSO sends ringing signal to called party 5. Party answers; MTSO establishes circuit and initiates billing information 6. Either party hangs up; MTSO releases circuit, frees channels, completes billing

41 Differences Between First and Second Generation Systems Digital traffic channels – first-generation systems are almost purely analog; second-generation systems are digital Encryption – all second generation systems provide encryption to prevent eavesdropping Error detection and correction – second- generation digital traffic allows for detection and correction, giving clear voice reception Channel access – second-generation systems allow channels to be dynamically shared by a number of users

42

43 Mobile Wireless TDMA Design Considerations Number of logical channels (number of time slots in TDMA frame): 8 Maximum cell radius (R): 35 km Frequency: region around 900 MHz Maximum vehicle speed (V m ):250 km/hr Maximum coding delay: approx. 20 ms Maximum delay spread (  m ): 10  s (in mountainous regions); this is the difference in propagation delay among different multipath signals arriving at the same antenna. Bandwidth: Not to exceed 200 kHz (25 kHz per channel)

44 Steps in Design of TDMA Timeslot

45 GSM Network Architecture

46 Mobile Station Mobile station communicates across Um interface (air interface) with base station transceiver in same cell as mobile unit located Mobile equipment (ME) – physical terminal, such as a telephone ME includes radio transceiver, digital signal processors and subscriber identity module (SIM) GSM subscriber units are generic until SIM is inserted, it stores: the subscriber's identification number, the networks the subscriber is authorized to use, encryption keys, and other information specific to the subscriber.

47 Base Station Subsystem (BSS) BSS consists of base station controller and one or more base transceiver stations (BTS) Each BTS defines a single cell Includes radio antenna, radio transceiver and a link to a base station controller (BSC) BSC may be collocated with a BTS or may control multiple BTS units and hence multiple cells. reserves radio frequencies, manages handoff of mobile unit from one cell to another within BSS, and controls paging

48 Network Subsystem (NS) NS provides link between cellular network and public switched telecommunications networks Controls handoffs between cells in different BSSs Authenticates users and validates accounts Enables worldwide roaming of mobile users Central element of NS is the mobile switching center (MSC)

49 Mobile Switching Center (MSC) 4-Databases 1. Home location register (HLR) database – stores information about each subscriber that belongs to it 2. Visitor location register (VLR) database – maintains information about visiting subscribers currently physically in the region covered by the switching center 3. Authentication center database (AuC) – used for authentication activities, holds encryption keys Equipment identity register database (EIR) – keeps track of the type of equipment that exists at the mobile station, It also plays a role in security (e.g., blocking calls from stolen mobile stations and preventing use of the network by stations that have not been approved).

50 Visitor location register (VLR) database One important, temporary piece of information is the location of the subscriber. The location is determined by the VLR into which the subscriber is entered. The VLR maintains information about subscribers that are currently physically in the region covered by the switching center. It records whether or not the subscriber is active and other parameters associated with the subscriber. For a call coming to the subscriber, the system uses the telephone number associated with the subscriber to identify the home switching center of the subscriber. This switching center can find in its HLR the switching center in which the subscriber is currently physically located. For a call coming from the subscriber, the VLR is used to initiate the call. Even if the subscriber is in the area covered by its home switching center, it is also represented in the switching center's VLR, for consistency.

51 TDMA Format – Time Slot Fields Trail bits – allow synchronization of transmissions from mobile units (3bits) Encrypted bits – encrypted data (57+57 bits) Stealing bit - indicates whether block contains data or is "stolen“ (3+3 bits) Training sequence – used to adapt parameters of receiver to the current path propagation characteristics (26 bits) It enables the mobile units and base stations to determine that the received signal is from the correct transmitter and not a strong interfering transmitter. In addition, the training sequence is used for multipath equalization, which is used to extract the desired signal from unwanted reflections. Guard bits – used to avoid overlapping with other bursts (8.25bits duration)

52

53 GSM Speech Signal Processing

54 GSM Signaling Protocol Architecture

55 GSM Signaling Protocols Radio resource management (RRM): Controls the setup, maintenance, and termination of radio channels, including handoffs Mobility management (MM): Manages the location updating and registration procedures, as well as security and authentication Connection management (CM): Handles the setup, maintenance, and termination of calls (connections between end users) Mobile application part (MAP): Handles most of the signaling between different entities in the fixed part of the network, such as between the HLR and VLR BTS management: Performs various management and administrative functions at the base transceiver station, under the control of the base station controller

56 Functions Provided by Protocols Protocols above the link layer of the GSM signaling protocol architecture provide specific functions: Radio resource management Mobility management Connection management Mobile application part (MAP) BTS management

57 Code Division Multiple Access (CDMA) used in several wireless broadcast channels (cellular, satellite, etc) standards unique “code” assigned to each user; i.e., code set partitioning all users share same frequency, but each user has own “chipping” sequence (i.e., code) to encode data encoded signal = (original data) X (chipping sequence) decoding: inner-product of encoded signal and chipping sequence allows multiple users to “coexist” and transmit simultaneously with minimal interference (if codes are “orthogonal”)

58 CDMA Encode/Decode slot 1 slot 0 d 1 = -1 111 1 1 - 1 - 1 -1 - Z i,m = d i. c m d 0 = 1 111 1 1 - 1 - 1 - 1 - 111 1 1 - 1 - 1 -1 - 111 1 1 - 1 - 1 -1 - slot 0 channel output slot 1 channel output channel output Z i,m sender code data bits slot 1 slot 0 d 1 = -1 d 0 = 1 111 1 1 - 1 - 1 -1 - 111 1 1 - 1 - 1 - 1 - 111 1 1 - 1 - 1 -1 - 111 1 1 - 1 - 1 -1 - slot 0 channel output slot 1 channel output receiver code received input D i =  Z i,m. c m m=1 M M

59 CDMA: two-sender interference

60 CDMA Cellular Advantages: 1. Frequency diversity – frequency-dependent transmission impairments have less effect on signal 2. Multipath resistance – chipping codes used for CDMA exhibit low cross correlation and low autocorrelation 3. Privacy – privacy is inherent since spread spectrum is obtained by use of noise-like signals 4. Graceful degradation – system only gradually degrades as more users access the system

61 Drawbacks of CDMA Cellular Self-jamming – arriving transmissions from multiple users not aligned on chip boundaries unless users are perfectly synchronized Near-far problem – Given the lack of complete orthogonality, the transmissions from the more remote mobile units may be more difficult to recover. Thus, power control techniques are very important in a CDMA system. Soft handoff – requires that the mobile acquires the new cell before it turns down the old; this is more complex than hard handoff used in FDMA and TDMA schemes

62 Mobile Wireless CDMA Design Considerations RAKE receiver – when multiple versions of a signal arrive more than one chip interval apart, RAKE receiver attempts to recover signals from multiple paths and combine them This method achieves better performance than simply recovering dominant signal and treating remaining signals as noise Soft Handoff – mobile station temporarily connected to more than one base station simultaneously

63 Principle of RAKE Receiver

64 Types of Channels Supported by Forward Link (From BS to Mobile Unite) Pilot (channel 0) - allows the mobile unit to acquire timing information, provides phase reference and provides means for signal strength comparison Synchronization (channel 32) - used by mobile station to obtain identification information about cellular system Paging (channels 1 to 7) - contain messages for one or more mobile stations (between BS) Traffic (channels 8 to 31 and 33 to 63) (two sets) – the forward channel supports 55 traffic channels

65

66 Forward Traffic Channel Processing Steps Speech is encoded at a rate of 8550 bps Additional bits added for error detection Data transmitted in 2-ms blocks with forward error correction provided by a convolutional encoder Data interleaved in blocks to reduce effects of errors Data bits are scrambled, serving as a privacy mask

67 Forward Traffic Channel Processing Steps (cont.) Power control information inserted into traffic channel DS-SS function spreads the 19.2 kbps to a rate of 1.2288 Mbps using one row of 64 x 64 Walsh matrix Digital bit stream modulated onto the carrier using QPSK modulation scheme

68 Types of Channels Supported by Reverse Link (From Mobile Unite to BS) The reverse link consists of up to 94 logical CDMA channels each occupying the same 1228-kHz bandwidth The reverse link supports up to 32 access channels and up to 62 traffic channels. The traffic channels in the reverse link are unique to each mobile unit. Each mobile unit has a unique long code mask based on its electronic serial number. The long code mask is a 42-bit number, so there are 2^42 - 1 different masks. The access channel is used by a mobile unit to initiate a call, to respond to a paging channel message from the base station, and for a location update.

69 Types of Channels Supported by Reverse Link (From Mobile Unite to BS)

70 ITU’s View of Third-Generation Capabilities Voice quality comparable to the public switched telephone network 144 kbps data rate available to users in high-speed motor vehicles over large areas 384 kbps available to pedestrians standing or moving slowly over small areas Support for 2.048 Mbps for office use Symmetrical / asymmetrical data transmission rates Support for both packet switched and circuit switched data services

71 ITU’s View of Third-Generation Capabilities An adaptive interface to the Internet to reflect efficiently the common asymmetry between inbound and outbound traffic More efficient use of the available spectrum in general Support for a wide variety of mobile equipment Flexibility to allow the introduction of new services and technologies

72 Alternative Interfaces

73 CDMA Design Considerations Bandwidth – limit channel usage to 5 MHz Chip rate – depends on desired data rate, need for error control, and bandwidth limitations; 3 Mcps (Chip per Second) or more is reasonable Multirate – advantage is that the system can flexibly support multiple simultaneous applications from a given user and can efficiently use available capacity by only providing the capacity required for each service


Download ppt "Cellular Wireless Networks Chapter 10. Cellular Network Organization Use multiple low-power transmitters (100 W or less) Areas divided into cells Each."

Similar presentations


Ads by Google