Monday 1 August 2016

ASSIGNMENT OF WIRELESS AND MOBILE COMMUNICATION


Question No.1 Describe Wireless Communication. Explain its advantages.
Wireless Communication:-
A telecommunication system or communication system is a collection of interconnected equipment’s or communication devices. The prime objective of the communication system is to exchange data or information among these devices. The data or information may be a voice data like human conversation of any electronic data like a web data. The devices associated in a communication system may generate data; consume data or forward data from one device to another. Some examples of devices that generate and consume data are a mobile phone or a computer terminal. A relay station on the other hand is an example of device that forwards data. In a communication system transmission media plays a vital role to transferring data from one device to another device. These transmission media may be a wire connecting two devices or a radio wave used for transferring data without any physical cable. In information technology, a computer network, or simply a network, is a collection of computers and devices interconnected by communications media to facilitate information exchange. It also can be used to share resources like printer, storage devices, data etc. In the earlier days the computer networks were used only by large companies due to high cost of network installation but now it is affordable even for individuals. computer networking it requires at least two computers, a protocol and the transmission media (say cable) hardware to connect them. Businesses aren't the only ones that can benefit from creating a network. Home users can enjoy sharing music, movies and printers from any computer. Home users can enjoy sharing music, movies and printers from any computer. Few major use of network is listed below.
1.   File sharing
2.  Printers
3.  Sharing storage media
4.  Media Centre server
5.  Video games

Advantages of wireless communication systems:-

Although the benefits of a communication system are very large, however the setting up of a communication system or a computer network using wired links is comparatively difficult. These difficulties are arises from the requirement of Ethernet cables to connect computers to a Digital Subscriber Link (DSL) cable modem. Because, the lay down of cables for connecting devices is often quite hazy. Most people do not prefer cables to be laid down throughout their home. Compared to wired system, wireless networks have many advantages. Few of them are listed below. The wireless network can be configured without the use of physical cable to connect computers and other networked devices. So it is the preferred way to setup a network without using cables. If the users of the network ever have to move then it is as easy to install in your next place by simply relocating the wireless devices in the new place. It is quite common however for people to use a mix of wired and wireless solutions on their home networks. It is possible as almost all wireless routers also have normal network ports to add wired computers to the network. For an already existing wired network a wireless router is the cheapest way to add wireless connections to extend the network segment. Wireless Networks can help make connecting to the internet much more convenient. Wireless network can be set-up on demand.

Question No.2 Describe any five GSM PLMN basic services.

Basic services:-

All activities that may be done in the GSM network, such as establishing a voice call, establishing a data call, sending a short message, etc., are classified as basic services. In order for a subscriber to use a GSM basic service, the subscriber must have a subscription to that service. These tele services in details are discussed briefly below.


1. Dual-Tone multi frequency (DTMF):
The automatic answering machines used in wireless telephone network needs a controlling mechanism. For this purpose the GSM PLMN uses a tone signaling service called Dual-Tone Multi frequency. It facilitates subscribers with
automatic answering capability whenever necessary.

2. Facsimile group III:
Standard fax machines need to be connected to a telephone using analog signals, so a special fax converter needs to be installed in the GSM system. This will help the fax to be connected to the GSM and thus communicate with any other analog fax in the
network.

3. Short message services (SMS):
The SMS allows subscribers to send a message consisting of a fixed maximum length of alphanumeric characters among mobile stations. It also facilitates the subscriber by taking care of the message delivery in case of user’s temporary absence from the network. If the user’s mobile is switched off or out of coverage area, the message is stored and offered back to the user when the mobile is powered on or re-entered the coverage area of the network.

4. Cell broadcast:
A message whose maximum length is 93 characters can be broadcasted to all the users who are in particular geographical region. This facility is primarily used for network management especially when traffic congestion is reported. The broadcasted messages may be used to warn different controlling devices about the congestion and any failure in the network.

5. Voice mail:
This service is provides a method of answering unattended calls automatically. These answering machines are located within the network and calls are forwarded to the subscriber’s voice-mail box if it is not attended during a stipulated time. When the subscriber checks for
messages via a personal security code he can here the voice recorded in the voice-mail box.

6. Fax mail:
The user can receive fax messages at any fax machine. The messages are stored in a service Centre from which they can be retrieved by the subscriber via a personal security code to the desired fax number.




Question No. 3 Explain the use of control channels in GSM network.

Common control channels:-
Control channels are communication channels which are used only for sending and receiving command messages between communication devices in a system. In GSM network the control channels are used to send messages for alerting a device about a incoming call, for accessing control and transmitting broadcast information to all devices. There are several control channels available for the GSM architecture. The Paging Channel (PCH), the Access Grant Channel (AGCH) and the Random Access Channel (RACH). The PCH transmits a paging message at certain time intervals to indicate an MS listens to the PCH. The paging message contains the subscriber identity number and the mobile station that matches the identity responds. The message in PCH indicates that the mobile station whose identity appears in the PCH is informed that the network wishes to contact. The base station than receives a response from the mobile station through RACH. The mobile station receives an reply through the RACH channel from the base station.

Dedicated control channels:-
The dedicated control channels are communication channels that transfer signaling messages to specific devices in a GSM network. There are three dedicated control channels found in GSM network. They are the Standalone Dedicated Control Channel (SDCCH), the slow associated control channel (SACCH) and the fast associated control channel (FACCH). The GSM SDCCH is used for signaling between base station and mobile station during call setup. The GSM slow associated control channel (SACCH) is used to measure the signal strength periodically. If the mobile station detects a change in current signal strength then it initiates a handover to any nearby cell. The GSM fast associated control channel (FACCH) is also used for the same purpose as the SDCCH, but it makes use of the unused capacity of a traffic channel.



Question No. 4 What is CDMA? Explain the history of CDMA.

CDMA (CDMA stands for Code Division):-

CDMA stands for Code Division Multiple Access and in the cellular world, CDMA technology was originally known as IS-95. Basically CDMA is a "spread spectrum" technology that has been used in digital cellular radio communications and advanced wireless technologies, and allows many users to occupy the same time and frequency allocations in a given band. In
CDMA unique codes are assigned to each communication in order to differentiate each others in the same spectrum. Also note that CDMA does not assign a specific frequency, but the full available spectrum to each user and a unique code is used for each signal, so that they can be differentiated. In other words, all users can use the same frequency and transmit at the same time but the users are separated by unique code. This allows a large number of users to share the same frequency band at the same time, without any interference. The receiving device is such that it uses the code to extract the data out of the received signal. The services available to CDMA users are: m-commerce such as paying bills, purchasing, MMS (multimedia messaging services), web browsing, entertainment (streaming video, games), email, video conferencing and file download.
                       
History of CDMA:-

CDMA was first used in the military during World War 2. Digital cellular applications based on CDMA were developed with the collaboration of several carrier and equipment manufacturers, such as Motorola, P.C.S., and NOKIA. The first generation of cellular systems, was introduced in the early 1980s.This include the Advanced Mobile Phone Systems (AMPS).These systems used analog frequency modulation (FM) and have a frequency division multiple access (FDMA) based media access control (MAC) architecture. Within a few years, market demands and capacity requirements began to grow hitting the practical limitations. These limitations motivated the development of the second generation cellular systems, which improved compatibility and accommodated higher capacity than the first generation systems. These systems use digital modulation and processing techniques. TDMA (Time Division Multiple Access), GSM (Global System for Mobile Communication) and (narrowband). CDMA belong to the second generation
systems. CDMA was introduced in 1994, by Qualcomm, Inc. and later enhanced by Ericsson. CDMA is characterized by high capacity and small cell radius, employing spread-spectrum technology and a special coding scheme. The world is demanding more from wireless communication technologies than ever before as more people around the world are subscribing to wireless. Add in exciting Third-Generation (3G) wireless data services and applications – such as wireless email, web, digital picture taking/sending, assisted-GPS position location applications, video and audio streaming and TV broadcasting – and wireless networks are doing much more than just a few years ago. This is where CDMA technology fits in. 2G CDMA standards are branded cdma one and include IS-95A and IS-95B. CDMA consistently provides better capacity for voice and data communications than other commercial mobile technologies. This allows more and more subscribers to connect at any given time and today, CDMA is the basis to the third generation market in the United States and other places in the world. The two dominant IMT-2000 standards, CDMA2000 and WCDMA, are based on CDMA. The CDMA air interface is used in both 2G and 3G networks.


Question No. 5 Identify detailed implementation about A5 algorithm?

A5 Algorithm An A5 encryption algorithm scrambles the user's voice and data traffic between the handset and the base station to provide privacy. An A5 algorithm is implemented in both the handset and the base station subsystem (BSS). This algorithm is used to encipher and decipher the data that is being transmitted on the Um interface. The Kc (ciphering key) and the plaintext data are inputted into the A5 algorithm and the output is enciphered data. The A5 algorithm is a function of the Mobile Equipment (ME) and not a function of the SIM card. The BTS also makes use of the A5 algorithm. There are three versions of the A5 algorithm:

A5/1 it is a current standard for U.S. and European networks. A5/1 is a stream cipher.

A5/2 – This is a deliberately weakened version of A5/1 that is intended for export to non-western countries. A5/2 is a stream cipher.
A5/3 – it is a newly developed algorithm not yet in full use. A5/3 is a block cipher. The details of the implementation, as well as some documented facts about A5, are summarized below:
1.   A5 is a stream cipher involves three clock-controlled LFSRs of degree 19, 22, and 23.

2.  The clock control is a threshold function of the middle bits of each of the three shift registers.

3.  The sum of the degrees of the three shift registers is 64 (19+22+23). The 64-bit session key is used to initialize the contents of the shift registers.

4.  This shift registers contains a 22bit TDMA frame number.
5.  For each TDMA frame two 114-bit key streams can be produced, which are XOR-edwith the uplink and downlink traffic channels.

6.  A5 algorithm has an "effective" key length of 40 bits. The use of authentication, encryption, and temporary identification numbers ensures the privacy and secrecy of the system's users, as well as the protection of the system against fraudulent use. Even GSM systems with the
7.  A5/2 encryption algorithm are inherently more secure than analog systems due to their use of speech coding, digital modulation, and TDMA channel access.


Question No.6 List and explain the different path loss models?

Path Loss Models:-
Path loss models describe the signal attenuation between a transmit and a receive antenna as a function of the propagation distance and other parameters. Some models include many details of the topography profile to estimate the signal reduction, whereas others just consider carrier frequency and distance. Path loss is the reduction in power density of an electromagnetic wave as it propagates through space. It is a major component in the analysis and design of the link budget of a telecommunication system. It represents signal level attenuation caused by free space propagation, reflection, diffraction and scattering. There are basically 4 types of path loss models
1. Mega cell Path loss models
2. Macro cell Path loss models
3. Micro cell Path loss models
4. Pico cell Path loss models

1. Mega cell Path loss models: Mega cell path loss models are those where the communication is over extremely large cells spanning hundreds of kilometres. Mega cells are served mostly by mobile satellites. The path loss is usually the same as that of free space.

2. Macro cell Path loss models: Macro cell path loss models span a few kilometres to tens of kilometres, depending on the location. These are the traditional “cells” corresponding to the coverage area of a base station associated with traditional cellular telephony base stations. The frequency of operation is mostly around 900 MHz, though the emergence of PCS has resulted in frequencies around 1,800 to 1,900 MHz for such cells.

3. Micro cell Path loss models: Micro cells are cells that span hundreds of meters to a kilometre and are usually supported by below rooftop level base station antennas mounted on lampposts or utility poles. The shapes of the microcells are also no longer circular because they are deployed in streets in urban areas where tall buildings create urban canyons. There is little or no propagation of signals through buildings, and the shape of a microcell is more liked a cross or a rectangle, depending on the placement of base station antennas at the intersection of streets or in between intersection.

4. Pico cell Path loss models: In pico cell path loss model base station antenna located inside the building. Pico cells correspond to radio cells covering a building or parts of buildings. The span of pico cells is anywhere between 30m and 100m. Usually, Pico cells are employed for WLANs, wireless PBX (Private branch exchange) systems, and PCSs operating in indoor areas. In a pico-cell, the shorter transmission distance coupled with lower transmit power, enhances both capacity as well as the Signal to Interference Noise Ratio (SINR) achievable within the cell.

----------------------------------------------------------------------------------------------------------

No comments:

Post a Comment