21IT1701 - MCMAD - Unit I Notes
21IT1701 - MCMAD - Unit I Notes
                                       INTRODUCTION
Mobile network is a network set up by using radio signal frequency to communicate among
computers and other network devices.
Mobile communication
Mobile communication is the use of technology that allows us to communicate with others in
different locations without the use of any physical connection (wires or cables). Mobile
communication makes our life easier, and it saves time and effort.
Two aspects of mobility:
     user mobility: users communicate (wireless) “anytime, anywhere, with anyone”
     device portability: devices can be connected anytime, anywhere to the network
Characterization of communication devices
        (i) Fixed and wired Eg. Desktop Computer in an Office
        (ii) Mobile and wired Eg. Laptops
        (iii)Fixed and wireless Eg. wireless LANs in historic buildings
        (iv) Mobile and wireless Eg. Personal Digital Assistant (PDA) with roaming in
             different wireless networks
Mobile computing
Mobile computing refers to the ability to access and utilize data and applications on portable
devices such as smartphones and tablets.
                        APPLICATIONS OF MOBILE COMPUTING
Applications of wireless networks and Mobile Communications
     Vehicles (GPS)
     Digital Audio Broadcasting (DAB)
     GSM
     Emergencies
     Business
     Replacement of Wired Networks
     Infotainment
     Location dependent Services
                                              1
                          ELECTROMAGNETIC SPECTRUM
The electromagnetic spectrum is the entire range of electromagnetic radiation according to the
wavelength or frequencies. It has a range of frequencies from 1Hz to Hz. The waves in order
of increasing frequencies are radio waves, microwaves, infrared rays, visible light, UV rays,
X-rays and gamma rays. Among these range, the frequencies between Hz to Hz are used for
communication.
The following diagram shows the electromagnetic spectrum. The first figure gives the full
range of frequency spectrum while the second figure elaborates that part of the spectrum which
can be used for data communication −
The section of the spectrum in the range of radio waves and microwaves has been divided into
a number of frequency bands as officially referred by ITU (International Telecommunication
Union). These bands are rated from VLF (Very Low Frequency) to EHF (Extremely High
Frequency).
The frequency bands and their uses in communication is tabulated as follows −
 Band       Full Forms        Frequency           Propagation   Uses
 Name                         Range
                                              2
 VHF        Very High         30 – 300 MHz         Sky and Line   FM radio, TV
            Frequency                              – of - Sight
 Visible    Visible Light     400 THz – 900        Line – of -    Fiber optic communications
 Light      rays              THz                  Sight
                                            ANTENNA
An antenna is a metallic structure that is used to transmit radio EM waves. We can define it
as the launching of waves or radiations in space, which is efficiently accomplished with
dielectric structures called antennas.
Antennas: isotropic radiator
Radiation and reception of electromagnetic waves, coupling ofwires to space for radio
transmission
Isotropic radiator: equal radiation in all directions (threedimensional) - only a theoretical
reference antenna
Real antennas always have directive effects (vertically and/orhorizontally)
Radiation pattern: measurement of radiation around an antenna
                                               3
      Example: Radiation pattern of a simple Hertzian dipole
      Gain: maximum power in the direction of the main lobe compared to the power of an
       isotropic radiator (with the same average power)
Antennas: directed and sectorized
Often used for microwave connections or base stations for mobile phones (e.g., radio
coverage of a valley)
Directed Antennas
Sectorized Antennas
Antennas: diversity
    Grouping of 2 or more antennas
          o multi-element antenna arrays
    Antenna diversity
          o switched diversity, selection diversity
                  receiver chooses antenna with largest output
          o diversity combining
                  combine output power to produce gain
                  cophasing needed to avoid cancellation
                                            4
                     PROPAGATION RANGES AND EFFECTS
Transmission range
     communication possible
     low error rate
Detection range
     detection of the signalpossible
     no communicationpossible
Interference range
     signal may not bedetected
     signal adds to thebackground noise
                                                5
Multipath propagation
 Signal can take many different paths between sender and receiver due toreflection,
  scattering, diffraction
                                                6
                                    SPREAD SPECTRUM
Spread spectrum is a method of transmitting radio signals over a wide range of frequencies.
It spreads the signal over a broader bandwidth than the minimum required to send the
information, which provides advantages such as increased resistance to interference,
improved security, and enhanced privacy.
Characteristics of the Spread Spectrum are:
     Higher channel capacity.
     Ability to resist multipath propagation.
     They cannot easily intercept any unauthorized person.
     They are resistant to jamming.
     The spread spectrum provides immunity to distortion due to multipath propagation.
     The spread spectrum offers multiple access capabilities.
Two types of techniques for Spread Spectrum are:
     Frequency Hopping Spread Spectrum (FHSS)
     Direct Sequence Spread Spectrum (DSSS)
Direct Sequence Spread Spectrum (DSSS):
     In DSSS, the bandwidth of the original signal is also expanded by a different
        technique. Here, each data bit is replaced with n bits using a spreading code
        called chips, and the bit rate of the chip is called as chip-rate.
     XOR of the signal with pseudo-random number (chipping sequence)
            o many chips per bit (e.g., 128) result in higher bandwidth of the signal
                                             7
                                      Fig: DSSS Receiver
Advantages of DSSS:
 The DSSS System combats the jamming most effectively.
 The performance of DSSS in presence of noise is superior to FHSS.
 Interference is minimized against the signals.
Disadvantages of DSSS:
 Processing Gain is lower than FHSS.
 Channel Bandwidth is less than FHSS.
 Synchronization is affected by the variable distance between the transmitter and
   receiver.
Frequency Hopping Spread Spectrum (FHSS):
    In Frequency Hopping Spread Spectrum (FHSS), different carrier frequencies are
       modulated by the source signal i.e. M carrier frequencies are modulated by the signal.
       At one moment signal modulates one carrier frequency and at the subsequent
       moments, it modulates other carrier frequencies.
    Discrete changes of carrier frequency
          o sequence of frequency changes determined via pseudo random
             numbersequence
    Two versions
             Fast Hopping: Several frequencies per user bit
             Slow Hopping: Several user bits per frequency
                                               8
                                    Fig: FHSS transmitter
      -   Under the simplest conditions, a medium can carry only one signal at any moment
          in time. For multiple signals to share one medium, the medium must somehow be
          divided, giving each signal a portion of the total bandwidth.
      -   Multiplexing enables several user to share a medium with minimum interference or
          no interference.
                                              9
In case of wireless communication, there can be four types of multiplexing.
    1. Space - Division Multiplexing (SDM)
    2. Frequency - Division Multiplexing (FDM)
    3. Time-Division Multiplexing (TDM)
    4. Code Division Multiplexing (CDM)
1. Space Division Multiplexing:
    - In this, physical space is separated for each of the user so that the interference is
        minimum or nil as shown below:
  -  S1…S3 are the space segments where each pair of the user has separate space for
     communication in his own channel. As the space is separated there is likely to be no
     interference among each pair. The transmitter power controls the radius of action. This
     is similar to the FM radio station that use the same frequency at different location without
     interference.
  - However, if several frequencies (pair of user )are to be used, this may need to be
     modified with other multiplexing techniques. Using SDM, obvious problems arise if two
     or more channels were established within the same space, for example, if several radio
     stations want to broadcast in the same city. Then, one of the following multiplexing
     schemes must be used (frequency, time, or code division multiplexing).
2. Frequency Division Multiplexing:
   - In this the frequency is divided into several bands that are not overlapping. Each user
       can use the allotted band of frequency without causing interference to other user.
   - Guard band is provided to minimize the adjacent channel interference.
   - The drawback of this system is that the frequency remains allocated to the user even
       during those times when there is no communication.
                                               10
   -   It is not an efficient method as it ties up one channel to a user and also limits the
       number of users.
                                             11
   -  One important advantage is that the system has better immunity to frequency selective
      interference. Also, this system provides protection against channel tapping.
    - The disadvantage is that there needs to be proper coordination between different
      senders and receivers both in frequency and time domain.
4. Code Division Multiplexing:
    - Code division multiplexing (CDM) is a networking technique in which multiple data
      signals are combined for simultaneous transmission over a common frequency band.
    - When CDM is used to allow multiple users to share a single communications channel,
      the technology is called code division multiple access (CDMA).
   -   In this all the users trans receive the messages at the same frequency and at the same
       time. This is made possible when the digital transmitted codes modulates a pseudo
       random codes that are different for each user.
   -   Similar to FDM and TDM, to avoid interference due to codes that are closer to each
       other, codes are allotted to the user with a specific code space by using orthogonal
       code selection.
   -   This technique facilitates a large number of user to share the same frequency
       spectrum. Each user having a separate code when communicates adds to the
       background noise.
                                             12
   -   As large users use the system, the noise increases thereby limiting its performance.
       However it provides good protection against interference and tapping.
    - The main disadvantage of the system, is it is relatively quite complex.
MEDIUM ACCESS CONTROL (MAC) FOR MOBILE COMPUTING
       The medium access control mechanisms provided by the MAC layer are also known as
a multiple access protocol. This makes it possible for several stations connected to the same
medium to share it. The medium access protocol may detect or avoid data packet collisions.
       In a fixed networks, MAC works effectively. For an example, CSMA/CD - Carrier
Sense Multiple Access with Collision Detection, send as soon as the medium is free, listen into
the medium if a collision occurs retransmit the data.
But exactly this cannot be applied to wireless networks. since,
    o signal strength decreases proportional to the square of the distance
    o the sender would apply CS and CD, but the collisions happen at the receiver
    o it might be the case that a sender cannot “hear” the collision, i.e., CD does not work
    o furthermore, CS might not work if, e.g., a terminal is “hidden”
MAC for wired network never solves the “hidden terminal” and exposed terminal problems.
1. Hidden terminals
    o A sends to B, C cannot receive A
    o C wants to send to B, C senses a “free” medium (CS fails)
    o collision at B, A cannot receive the collision (CD fails)
    o A is “hidden” for C
2. Exposed terminals
        o B sends to A, C wants to send to another terminal (not A or B)
        o C has to wait, CS signals a medium in use
        o but A is outside the radio range of C, therefore waiting is not necessary
        o C is “exposed” to B
The near-far problem is a condition in which a strong signal captures a receiver making it
impossible for the receiver to detect a weaker signal
3. Near and far terminals
Terminals A and B send, C receives
      o signal strength decreases proportional to the square of the distance
      o the signal of terminal B therefore drowns out A’s signal
      o C cannot receive A
If C for example was an arbiter for sending rights, terminal B would drown out terminal A
already on the physical layer
                                              13
   The multiplexing schemes are now used to control medium access
         - Wireless channel is a shared medium. MAC coordinates transmission between
             users sharing the spectrum.
         - Goals of the MAC protocol are to prevent collisions while maximizing throughput
             and minimizing delay
   MAC Protocols has three broad classes:
      • Channel Partitioning
             – divide channel into smaller “pieces” (time slots, frequency)
             – allocate piece to node for exclusive use
      • Random Access
             – allow collisions
             – “recover” from collisions
      • “Taking turns”
             – tightly coordinate shared access to avoid collisions
                                                   14
   3. TDMA (Time Division Multiple Access)
   - Assign the fixed sending frequency to a transmission channel between a sender and a
       receiver for a certain amount of time. Receivers can always listen on the same channel
       frequency.
   - TDMA contains various algorithms to allocate the time for various channels. It may be
       fixed time or dynamic allocation.
Examples for fixed and dynamic scheme.
Fixed TDM
   - This method Allocate time slots for channel in a fixed pattern. This results in fixed
       bandwidth in wireless phone systems.
   - Fixed pattern will be assigned by the Base station. Each MS knows it turn and no
       interference. There will be a fixed delay.
   - It implements multiple access and a duplex channel between a base station and a mobile
       station called Time Division Duplex (TDD)
                                             15
   -Base station uses 1 out of 12 slots for downlink. Mobile station uses 1 out of 12 different
    slots for uplink. Both uplink and downlink are separated in time.
  - This method used in many digital mobile phone systems like IS 54, IS-136, GSM, PHS
    and PACS.
ALOHA
  - With Pure Aloha, stations are allowed access to the channel whenever they have data
    to transmit.
  - Because the threat of data collision exists, each station must either monitor its
    transmission on the rebroadcast or await an acknowledgment from the destination
    station.
  - By comparing the transmitted packet with the received packet or by the lack of an
    acknowledgement, the transmitting station can determine the success of the transmitted
    packet.
  - If the transmission was unsuccessful it is resent after a random amount of time to reduce
    the probability of re-collision.
Advantages: Superior to fixed assignment when there is a large number of bursty stations.
Adapts to varying number of stations.
                                              16
Advantages:
   - Doubles the efficiency of Aloha.
   - Adaptable to a changing station population.
Disadvantages:
   - Theoretically proven throughput maximum of 36.8%.
   - Requires queueing buffers for retransmission of packets.
   - Synchronization required.
CSMA - Carrier Sense Multiple Access
   - The chance of collision can be reduced if a station senses the medium before trying to
       use it. CDMA algorithm, will sense the medium before sending.
   - If the Medium is free, will transmit data else will for the availability of the medium.
Types of CSMA protocols:
    1-persistent
        - When a station has data to send, it transmits with a probability of 1 whenever it
            finds the channel idle. If the channel is busy, the station waits until it becomes
            idle (greedy approach).
    nonpersistent
        - It differs from 1-persistent w.r.t. the case where the channel is busy. Then, the
           station deliberately waits a random period of time before sensing the channel
           again.
                                              18
DAMA combined with dynamic TDMA – Reservation TDMA
Reservation without collision for a fixed number of N stations:
   - each frame consists of N reservation slots and x = N * k data-slots
   - each station has its own mini-slot and can reserve up to k data-slots (guaranteed)
   - all other stations can send data in not reserved data-slots according to some method,
       e.g. ALOHA (random) or round-robin (fixed) sending scheme (best-effort)
   -   RTS (request to send): a sender request the right to send from a receiver with a short
       RTS packet before it sends a data packet
   -   CTS (clear to send): the receiver grants the right to send as soon as it isready to receive
                                               19
MACA avoids the problem of hidden stations
A and later C want to send to B
   1. A sends RTS first
   2. B sends CTS to A and B
   3. C waits after receiving CTS from B
Polling Mechanism
   - If one station can be heard by all others, this master station (e.g. satellite, base station)
       can poll all other slave stations according to a certain scheme
Example: Randomly Addressed Polling
   - master signals readiness to all (mobile) slaves
   - slaves ready to send can now transmit a random number without collision with the help
       of CDMA or FDMA (the random number can be seen as dynamic address)
   - master now chooses one address for polling from the list of all random numbers
       (collision if two slaves choose the same address)
   - master acknowledges correct packets and continues polling the next slaves
   - this cycle starts again after all slaves have been polled
                                               20
ISMA (Inhibit Sense Multiple Access)
Current state of the medium is signaled via a “busy tone”. the base station signals on the
downlink (base station to terminals) if the medium is free or not. terminals must not send if the
medium is busy. terminals can access the medium as soon as the busy tone stops. the base
station signals collisions and successful transmissions via the busy tone and
acknowledgements, respectively (media access is not coordinated within this approach)
    - mechanism used, e.g., for CDPD (USA, integrated into AMPS)
As = Ad*Ak = +1*(–1, +1, –1, –1, +1, +1) = (–1, +1, –1, –1, +1, +1)
Sender B
Bs = Bd*Bk = –1*(+1, +1, –1, +1, –1, +1) = (–1, –1, +1, –1, +1, –1).
                                               21
C= As + Bs = (–2, 0, 0, –2, +2, 0)
C*Ak = (–2, 0, 0, –2, +2, 0)*(–1, +1, –1, –1, +1, +1) = 2 + 0 + 0 + 2 + 2 + 0 = 6.
Tuning in to sender B,
Applying B’s code gives C*Bk = (–2, 0, 0, –2, +2, 0)* (+1, +1, –1, +1, –1, +1) = –2 + 0 + 0 –
Example
sender A that wants to transmit the bits 101. The key of A is shown as signal and binary key
sequence Ak. In this example, the binary “0” is assigned a positive signal value, the binary “1”
a negative signal value. After spreading, i.e., XOR ing Ad and Ak, the resulting signal is As.
                                                22
Coding and spreading of data from sender B
                                        23
Reconstruction of B’s data
                                        24
SAMA - Spread Aloha Multiple Access
  - This method combines the advantages of ALOHA and CDMA. Aloha has only a very
    low efficiency, CDMA needs complex receivers to be able to receive different senders
    with individual codes at the same time
  - Idea: use spread spectrum with only one single code (chipping sequence) for spreading
    for all senders accessing according to aloha
-   Cell breathing is the constant change of the range of the geographical area covered by a
    cellular telephone transmitter based on the amount of traffic currently using that
    transmitter.
-   When a cell becomes heavily loaded, it shrinks. Subscriber traffic is then redirected to a
    neighboring cell that is more lightly loaded, which is called load balancing.
-   Cell breathing is a common phenomenon of 2G and 3G wireless systems including code-
    division multiple access (CDMA). CDMA2000 and wideband code-division multiple
    access (WCDMA) are designed to manage cell breathing.
                                             25
Comparison of SDMA, TDMA, FDMA, and CDMA mechanisms
                                               26
Performance in Multipath Environments: OFDMA, like its predecessor OFDM, effectively
handles multipath propagation, a common issue in wireless communication where signals
arrive at different times, causing interference. This is achieved by breaking the signal into
slower sub-signals, thus reducing the impact of multipath interference, which is vital for
maintaining the robustness of Wi-Fi 6 connections.
Enhanced Wi-Fi 6 Performance: In the context of Wi-Fi 6 (802.11ax), OFDMA is a central
technology enabling more efficient and faster data transmission. It supports a higher density of
users and is capable of handling high-data-rate applications, making it ideal for environments
with many connected devices, such as smart homes, offices, and public hotspots.
OFDMA's role in modern wireless communication systems, especially in Wi-Fi 6, is pivotal.
It's instrumental in achieving high data rates, efficient spectrum use, and improved network
performance in environments with multiple users and devices.
                         DUPLEXING TECHNIQUES: FDD, TDD
The technologies of today enable speech and data transmission in both directions. Duplexing
is the name for this specific capability to permit simultaneous bidirectional data transport.
Duplexing is possible in both the time and frequency domains.
 Frequency Division Duplexing (FDD)
 Time Division Duplexing (TDD)
                                              27
reception since a frequency band divides the uplink and downlink communication channels.
Both cellular networks like 3G and 4G and satellite communication technologies typically use
this technique. FDD can be used for applications that require an even distribution of capacity
between the uplink and the downlink.
Time Division Duplexing (TDD)
This duplexing method employs the full frequency range for the period of the one-time slot for
transmission and the following slot for the reception. The time frame is kept brief enough to
give the user the impression that both uplink and downlink are occurring at the same time in
order to prevent interference and time delays. Time-division duplexing (TDD), a duplexing
technique, employs a single frequency band for both signal transmission and reception, but the
transmission and reception happen at different times. Since the uplink and downlink
communication channels use the same frequency range but are separated by time intervals,
TDD enables consecutive signal transmission and reception.
Comparison of FDD and TDD Duplexing Techniques
                      Two antennas are required, one for      One antenna is sufficient for
    Antenna
                        uplink and one for downlink            both uplink and downlink
  Requirement
                                transmission                         transmission
     Spectral
                              Lower than TDD                       Higher than FDD
    Efficiency
                                                                   More susceptible to
   Interference      Less susceptible to interference and
                                                               interference and delay than
    and Delay                 delay than TDD
                                                                          FDD
                                             28
                        Frequency Division Duplexing             Time Division Duplexing
      Criteria
                                  (FDD)                                  (TDD)
                                   CELLULAR NETWORKS
A Cellular Network is formed of some cells. The cell covers a geographical region and has a
base station analogous to 802.11 AP which helps mobile users attach to the network and there
is an air interface of physical and data link layer protocol between mobile and base station. All
these base stations are connected to the Mobile Switching Center which connects cells to a
wide-area net, manages call setup, and handles mobility.
There is a certain radio spectrum that is allocated to the base station and to a particular region
and that now needs to be shared. There are two techniques for sharing mobile-to-base station
radio spectrum:
 Combined FDMA/TDMA: It divides the spectrum into frequency channels and divides
    each channel into time slots.
 Code Division Multiple Access (CDMA): It allows the reuse of the same spectrum over
    all cells. Net capacity improvement. Two frequency bands are used one of which is for the
    forwarding channel (cell-site to subscriber) and one for the reverse channel (sub to cell-
    site).
Cell Fundamentals
In practice, cells are of arbitrary shape(close to a circle) because it has the same power on all
sides and has same sensitivity on all sides, but putting up two-three circles together may result
in interleaving gaps or may intersect each other so order to solve this problem we can use
equilateral triangle, square or a regular hexagon in which hexagonal cell is close to a circle
used for a system design. Co-channel reuse ratio is given by:
DL/RL = Square root of (3N)
Where,
DL = Distance between co-channel cells
RL = Cell Radius
N = Cluster Size
The number of cells in cluster N determines the amount of co-channel interference and also the
number of frequency channels available per cell.
Cell Splitting
When the number of subscribers in a given area increases allocation of more channels covered
by that channel is necessary, which is done by cell splitting. A single small cell midway
between two co-channel cells is introduced.
                                               29
                                        Cell Splitting
Need for Cellular Hierarchy
Extending the coverage to the areas that are difficult to cover by a large cell. Increasing the
capacity of the network for those areas that have a higher density of users. An increasing
number of wireless devices and the communication between them.
Cellular Hierarchy
 Femtocells: The smallest unit of the hierarchy, these cells need to cover only a few meters
    where all devices are in the physical range of the uses.
 Picocells: The size of these networks is in the range of a few tens of meters, e.g., WLANs.
 Microcells: Cover a range of hundreds of meters e.g. in urban areas to support PCS which
    is another kind of mobile technology.
 Macrocells: Cover areas in the order of several kilometers, e.g., cover metropolitan areas.
 Mega cells: Cover nationwide areas with ranges of hundreds of kilometers, e.g., used with
    satellites.
Fixed Channel Allocation
For a particular channel, the frequency band which is associated is fixed. The total number of
channels is given by
Nc = W/B
Where,
W = Bandwidth of the available spectrum,
B = Bandwidth needed by each channels per cell,
Cc = Nc/N where N is the cluster size
Adjacent radio frequency bands are assigned to different cells. In analog, each channel
corresponds to one user while in digital each RF channel carries several time slots or codes
(TDMA/CDMA). Simple to implement as traffic is uniform.
Global System for Mobile (GSM) Communications
GSM uses 124 frequency channels, each of which uses an 8-slot Time Division Multiplexing
(TDM) system. There is a frequency band that is also fixed. Transmitting and receiving do not
happen in the same time slot because the GSM radios cannot transmit and receive at the same
time and it takes time to switch from one to the other. A data frame is transmitted in 547
microseconds, but a transmitter is only allowed to send one data frame every 4.615
                                              30
microseconds since it is sharing the channel with seven other stations. The gross rate of each
channel is 270, 833 bps divided among eight users, which gives 33.854 kbps gross.
Control Channel (CC)
Apart from user channels, there are some control channels which is used to manage the system.
1. The broadcast control channel (BCC): It is a continuous stream of output from the base
    station’s identity and the channel status. All mobile stations monitor their signal strength
    to see when they move into a new cell.
2. The dedicated control channel (DCC): It is used for location updating, registration, and call
    setup. In particular, each base station maintains a database of mobile stations. Information
    needed to maintain this database is sent to the dedicated control channel.
Common Control Channel
Three logical sub-channels are:
1. Is the paging channel, that the base station uses to announce incoming calls. Each mobile
    station monitors it continuously to watch for calls it should answer.
2. Is the random access channel that allows the users to request a slot on the dedicated control
    channel. If two requests collide, they are garbled and have to be retried later.
3. Is the access grant channel which is the announced assigned slot.
Advantages of Cellular Networks
 Mobile and fixed users can connect using it. Voice and data services also provided.
 Has increased capacity & easy to maintain.
 Easy to upgrade the equipment & has consumes less power.
 It is used in place where cables can not be laid out because of its wireless existence.
 To use the features & functions of mainly all private and public networks.
 Can be distributed to the larger coverage of areas.
Disadvantages of Cellular Networks
 It provides a lower data rate than wired networks like fiber optics and DSL. The data rate
    changes depending on wireless technologies like GSM, CDMA, LTE, etc.
 Macrophage cells are impacted by multipath signal loss.
 To service customers, there is a limited capacity that depends on the channels and different
    access techniques.
 Due to the wireless nature of the connection, security issues exist.
 For the construction of antennas for cellular networks, a foundation tower and space are
    required. It takes a lot of time and labor to do this.
                                        TESSELLATION
• Some groups of small regions tessellate a large region if they over the large region without
any gaps or overlaps.
• There are only three regular polygons that tessellate any given region.
• Three regular polygons that always tessellate:
     Equilateral triangle
     Square
     Regular Hexagon
                                              31
                                     FREQUENCY REUSE
Frequency Reuse is the scheme in which allocation and reuse of channels throughout a
coverage region is done. Each cellular base station is allocated a group of radio channels or
Frequency sub-bands to be used within a small geographic area known as a cell. The shape of
the cell is Hexagonal. The process of selecting and allocating the frequency sub-bands for all
of the cellular base station within a system is called Frequency reuse or Frequency
Planning. Salient features of using Frequency Reuse:
 Frequency reuse improve the spectral efficiency and signal Quality (QoS).
 Frequency reuse classical scheme proposed for GSM systems offers a protection against
    interference.
 The number of times a frequency can be reused is depend on the tolerance capacity of the
    radio channel from the nearby transmitter that is using the same frequencies.
 In Frequency Reuse scheme, total bandwidth is divided into different sub-bands that are
    used by cells.
 Frequency reuse scheme allow WiMax system operators to reuse the same frequencies at
    different cell sites.
   Cell with the same letter uses the same set of channels group or frequencies sub-band. To
   find the total number of channel allocated to a cell: S = Total number of duplex channels
     available to use k = Channels allocated to each cell (k<S) N = Total number of cells or
                     Cluster Size Then Total number of channels (S) will be,
S = kN
Frequency Reuse Factor = 1/N
In the above diagram cluster size is 7 (A,B,C,D,E,F,G) thus frequency reuse factor is 1/7. N
is the number of cells which collectively use the complete set of available frequencies is
called a Cluster. The value of N is calculated by the following formula:
N = I2 + I*J + J2
Where I,J = 0,1,2,3… Hence, possible values of N are 1,3,4,7,9,12,13,16,19 and so on. If a
Cluster is replicated or repeated M times within the cellular system, then Capacity, C, will be,
                                              32
C = MkN = MS
In Frequency reuse there are several cells that use the same set of frequencies. These cells are
called Co-Channel Cells. These Co-Channel cells results in interference. So to avoid the
Interference cells that use the same set of channels or frequencies are separated from one
another by a larger distance. The distance between any two Co-Channels can be calculated by
the following formula:
 D = R * (3 * N)1/2
Where, R = Radius of a cell N = Number of cells in a given cluster
Advantages:
Improved Spectral Efficiency: By reusing the same frequency in different geographic areas,
spectral efficiency can be improved, enabling more efficient spectrum usage.
 Better Quality of Service: With the ability to reuse the same frequency in different cells,
    the interference between cells can be minimized, leading to better quality of service.
    Cost-Effective: Frequency reuse can reduce the cost of building a cellular network since
    fewer frequency bands are required.
    Scalability: Frequency reuse enables the network to be easily scaled by adding more cells
    as needed.
 Increased Network Capacity: Frequency reuse allows more cells to be served with the
    same amount of spectrum, resulting in increased network capacity.
 Scalability: Frequency reuse enables the network to be easily scaled by adding more cells
    as needed.
Disadvantages:
 Increased Interference: Frequency reuse can result in increased interference,
    particularly in areas where cells are closely spaced. This can reduce the quality of service
    and network capacity.
 Implementation Complexity: Frequency reuse requires careful planning to ensure that
    cells are appropriately spaced and that interference is minimized. This can make the
    implementation process more complex and time-consuming.
 Reduced Coverage: With the use of smaller cells to achieve higher capacity, the
    coverage area of each cell is reduced, requiring more base stations and infrastructure.
 Increased Power Consumption: Due to the use of smaller cells, more base stations are
    required, leading to higher power consumption and operational costs.
 Increased Network Cost: The cost of implementing a frequency reuse system may be
    higher due to the need for additional infrastructure and careful planning to ensure proper
    frequency reuse.
                                           HANDOFF
In cellular telecommunications, the terms handover or handoff refers to the process of
transferring an ongoing call or data connectivity from one Base Station to another Base
Station. When a mobile moves into a different cell while the conversation is in progress then
the MSC (Mobile Switching Center) transfers the call to a new channel belonging to the new
Base Station.
                                              33
When a mobile user A moves from one cell to another cell then BSC 1 signal strength loses
for the mobile User A and the signal strength of BSC 2 increases and thus ongoing calls or
data connectivity for mobile users goes on without interrupting.
Types of Handoff
 Hard Handoff
 Soft Handoff
 Delayed Handoff
 Mobile-Assisted Handoff
Hard Handoff
When there is an actual break in the connectivity while switching from one Base Station to
another Base Station. There is no burden on the Base Station and MSC because the switching
takes place so quickly that it can hardly be noticed by the users. The connection quality is
not that good. Hard Handoff adopted the ‘break before make’ policy.
It is generally implemented in Time Division Multiplexing and Frequency Division
Multiplexing when a user connects to the base station with a fluctuating radio frequency.
 Hard Handoff is cheaper in cost as compared to soft Handoff because only one channel
    needs to be active at a time.
 It is more efficient than soft handoff, that’s why hard handoffs are widely implemented.
 Sometimes, a delay can be experienced while switching base stations.
Soft Handoff
Soft Handoff is a mechanism in which the device gets connected with two or more base
stations at the same time. At least one of the links is kept when radio signals are added or
removed to the Base Station. Soft Handoff adopted the ‘make before break’ policy. If a
channel is in power loss then another channel will always be on standby mode so this makes
it best in terms of quality as compared to Hard handoff. Soft handoffs are used in devices
supporting CDMA/WDMA networks
 High Transmission speed as more than one repeater can transmit signals.
 It has a very low delay in signals.
 It can’t be implemented on devices supporting GSM or LTE networks.
                                            34
Delayed Handoff
Delayed handoff occurs when no base station is available for accepting the transfer. The call
continues until the signal strength reaches a threshold, and after that, the call is dropped.
Generally, it happens when the user is out of the network coverage area, or at some dead
spots where network reach is very low.
Mobile-Assisted Handoff
Mobile-Assisted handoff is generally used when a mobile phone helps a base station to
transfer the call to another base station with better-improvised connectivity and more signal
strength. This handoff is used in TDMA technique-based GSM devices.
                       GENERATIONS OF CELLULAR NETWORKS
The aim of wireless communication is to provide high quality, reliable communication just like
wired communication(optical fibre) and each new generation of services represents a big
step(a leap rather) in that direction.
   - This evolution journey was started in 1979 from 1G and it is still continuing to 5G. Each
      of the Generations has standards that must be met to officially use the G terminology.
   - There are institutions in charge of standardizing each generation of mobile technology.
   - Each generation has requirements that specify things like throughput, delay, etc. that
      need to be met to be considered part of that generation.
   - Each generation built upon the research and development which happened since the last
      generation.
   - 1G was not used to identify wireless technology until 2G, or the second generation, was
      released. That was a major jump in the technology when the wireless networks went
      from analog to digital.
1G - First Generation
    - This was the first generation of cell phone technology.
    - The very first generation of commercial cellular network was introduced in the late 70's
        with fully implemented standards being established throughout the 80's.
    - It was introduced in 1987 by Telecom (known today as Telstra), Australia received its
        first cellular mobile phone network utilizing a 1G analog system.
    - 1G is an analog technology and the phones generally had poor battery life and voice
        quality was large without much security, and would sometimes experience dropped
        calls.
    - These are the analog telecommunications standards that were introduced in the 1980s
        and continued until being replaced by 2G digital telecommunications. The maximum
        speed of 1G is 2.4 Kbps.
2G - Second Generation
    - Cell phones received their first major upgrade when they went from 1G to 2G.
    - The main difference between the two mobile telephone systems (1G and 2G), is that
        the radio signals used by 1G network are analog, while 2G networks are digital .
    - Main motive of this generation was to provide secure and reliable communication
        channel.
    - It implemented the concept of CDMA and GSM.
    - Provided small data service like sms and mms.
    - Second generation 2G cellular telecom networks were commercially launched on the
        GSM standard in Finland by Radiolinja (now part of Elisa Oyj) in 1991.
                                             35
   -   2G capabilities are achieved by allowing multiple users on a single channel via
       multiplexing.
   - During 2G Cellular phones are used for data also along with voice. The advance in
       technology from 1G to 2G introduced many of the fundamental services that we still
       use today, such as SMS, internal roaming, conference calls, call hold and billing based
       on services e.g. charges based on long distance calls and real time billing.
   - The max speed of 2G with General Packet Radio Service (GPRS) is 50 Kbps or 1 Mbps
       with Enhanced Data Rates for GSM Evolution (EDGE). Before making the major leap
       from 2G to 3G wireless networks, the lesser-known 2.5G and 2.75G was an interim
       standard that bridged the gap.
3G - Third Generation
   - This generation set the standards for most of the wireless technology we have come to
       know and love.
   - Web browsing, email, video downloading, picture sharing and other Smartphone
       technology were introduced in the third generation.
   - Introduced commercially in 2001, the goals set out for third generation mobile
       communication were to facilitate greater voice and data capacity, support a wider range
       of applications, and increase data transmission at a lower cost .
   - The 3G standard utilises a new technology called UMTS as its core network
       architecture - Universal Mobile Telecommunications System. This network combines
       aspects of the 2G network with some new technology and protocols to deliver a
       significantly faster data rate.
   - Based on a set of standards used for mobile devices and mobile telecommunications
       use services and networks that comply with the International Mobile
       Telecommunications-2000 (IMT-2000) specifications by the International
       Telecommunication Union. One of requirements set by IMT-2000 was that speed
       should be at least 200Kbps to call it as 3G service.
   - 3G has Multimedia services support along with streaming are more popular. In 3G,
       Universal access and portability across different device types are made possible
       (Telephones, PDA's, etc.).
   - 3G increased the efficiency of frequency spectrum by improving how audio
       is compressed during a call, so more simultaneous calls can happen in the same
       frequency range. The UN's International Telecommunications Union IMT-
       2000 standard requires stationary speeds of 2Mbps and mobile speeds of 384kbps for a
       "true" 3G. The theoretical max speed for HSPA+ is 21.6 Mbps.
   - Like 2G, 3G evolved into 3.5G and 3.75G as more features were introduced in order to
       bring about 4G. A 3G phone cannot communicate through a 4G network, but newer
       generations of phones are practically always designed to be backward compatible, so a
       4G phone can communicate through a 3G or even 2G network.
4G - Fourth Generation
   - 4G is a very different technology as compared to 3G and was made possible practically
       only because of the advancements in the technology in the last 10 years.
   - Its purpose is to provide high speed, high quality and high capacity to users while
       improving security and lower the cost of voice and data services, multimedia and
                                             36
       internet over IP. Potential and current applications include amended mobile web
       access, IP telephony, gaming services, high-definition mobile TV, video conferencing,
       3D television, and cloud computing.
   - The key technologies that have made this possible are MIMO (Multiple Input Multiple
       Output) and OFDM (Orthogonal Frequency Division Multiplexing). The two important
       4G standards are WiMAX (has now fizzled out) and LTE (has seen widespread
       deployment).
   - LTE (Long Term Evolution) is a series of upgrades to existing UMTS technology and
       will be rolled out on Telstra's existing 1800MHz frequency band. The max speed of a
       4G network when the device is moving is 100 Mbps or 1 Gbps for low mobility
       communication like when stationary or walking, latency reduced from around 300ms
       to less than 100ms, and significantly lower congestion. When 4G first became available,
       it was simply a little faster than 3G. 4G is not the same as 4G LTE which is very close
       to meeting the criteria of the standards. To download a new game or stream a TV show
       in HD, you can do it without buffering.
   - Newer generations of phones are usually designed to be backward-compatible , so a
       4G phone can communicate through a 3G or even 2G network. All carriers seem to
       agree that OFDM is one of the chief indicators that a service can be legitimately
       marketed as being 4G.
   - OFDM is a type of digital modulation in which a signal is split into several narrowband
       channels at different frequencies. There are a significant amount of infrastructure
       changes needed to be implemented by service providers in order to supply because
       voice calls in GSM, UMTS and CDMA2000 are circuit switched, so with the adoption
       of LTE, carriers will have to re-engineer their voice call network.
   - And again, we have the fractional parts: 4.5G and 4.9G marking the transition of LTE
       (in the stage called LTE-Advanced Pro) getting us more MIMO, more D2D on the way
       to IMT-2020 and the requirements of 5G.
5G - Fifth Generation
   - 5G is a generation currently under development, that's intended to improve on 4G.
   - 5G promises significantly faster data rates, higher connection density, much lower
       latency, among other improvements.
   - Some of the plans for 5G include device-to-device communication, better battery
       consumption, and improved overall wireless coverage.
   - The max speed of 5G is aimed at being as fast as 35.46 Gbps, which is over 35 times
       faster than 4G.
   - Key technologies to look out for: Massive MIMO, Millimeter Wave Mobile
       Communications etc. Massive MIMO, millimeter wave, small cells, Li-Fi all the new
       technologies from the previous decade could be used to give 10Gb/s to a user, with an
       unseen low latency, and allow connections for at least 100 billion devices .
   - Different estimations have been made for the date of commercial introduction of 5G
       networks. Next Generation Mobile Networks Alliance feel that 5G should be rolled out
       by 2020 to meet business and consumer demands.
                                             37
Generation    Definition   Throughput/ Speed        Technology    Time period                                      Features
                                                                          38
                                      2G SYSTEMS
2G is the second generation of cellular networks, based on the Global System for Mobile
Communication (GSM). Designed to accommodate the growing number of mobile phones, 2G
introduced cellular services like SMS, multimedia messaging, and digitally encrypted voice
conversations.
GSM System Overview
       Global System for Mobile Communications (GSM) is a digital wireless network
standard designed by standardization committees from major European telecommunications
operators and manufacturers. The GSM standard provides a common set of compatible services
and capabilities to all mobile users across Europe and several million customers worldwide.
Performance characteristics of GSM (with respect to analog systems)
     Communication
               mobile, wireless communication; support for voice and data services
     Total mobility
               international access, chip-card enables use of access points of different
providers
     Worldwide connectivity
               one number, the network handles localization
     High capacity
               better frequency efficiency, smaller cells, more customers per cell
     High transmission quality
               high audio quality and reliability for wireless, uninterrupted phone calls at
higher                  speeds (e.g., from cars, trains)
     Security functions
               access control, authentication via chip-card and PIN
                                          GSM Services
     GSM offers three types of services
        1. Tele Services (Telematic Services)
        2. Bearer services ( data services)
        3. Supplementary services
                                              39
 Non-Voice-Teleservices
     group 3 fax
     voice mailbox (implemented in the fixed network supporting the mobile terminals)
     electronic mail (MHS, Message Handling System, implemented in the fixed network)
     Short Message Service (SMS) - alphanumeric data transmission to/from the mobile
        terminal (160 characters) using the signaling channel, thus allowing simultaneous use
        of basic services and SMS.
     enhanced message service (EMS) - offers a larger message size (e.g., 760 characters,
        concatenating several SMs), formatted text, and the transmission of animated pictures,
        small images and ring tones in a standardized way
     multimedia message service (MMS) - offers the transmission of larger pictures (GIF,
        JPG, WBMP), short video clips etc. and comes with mobile phones that integrate small
        cameras.
2. Bearer Services
          GSM users can send and receive data, at rates from 3kbps to 9.6 bps. Typically data
transmission instead of voice. Fax is an example.
Bearer services permit transparent and non-transparent, synchronous or asynchronous data
transmission.
Transparent bearer services only use the functions of the physical layer (layer 1) to transmit
data. Data transmission has a constant delay and throughput if no transmission errors occur.
The only mechanism to increase transmission quality is the use of forward error correction
(FEC), which codes redundancy into the data stream and helps to reconstruct the original data
in case of transmission errors. Transparent bearer services do not try to recover lost data
shadowing or interruptions due to handover.
Non-transparent bearer services use protocols of layers two and three to implement error
correction and flow control. These services use the transparent bearer services, adding a radio
link protocol (RLP). This protocol comprises mechanisms of high-level data link control
(HDLC) and special selective-reject mechanisms to trigger retransmission of erroneous data.
The achieved bit error rate is less than 10–7, but now throughput and delay may vary depending
on transmission quality.
Different data rates for voice and data (original standard)
     data service (circuit switched)
              - synchronous: 2.4, 4.8 or 9.6 kbit/s
              - asynchronous: 300 - 1200 bit/s
     data service (packet switched)
              - synchronous: 2.4, 4.8 or 9.6 kbit/s
              - asynchronous: 300 - 9600 bit/s
3. Supplementary Services
         GSM supports a comprehensive set of supplementary services that complement and
support the telephony and data services described above. They are all defined in GSM
standards. A partial listing of supplementary services follows.
     Call Forwarding. This service gives the subscriber the ability to forward
        incoming calls to another number if the called mobile unit is not reachable, if it is busy,
        if there is no reply, or if call forwarding is allowed unconditionally.
     Barring of Outgoing Calls. This service makes it possible for a mobile subscriber to
        prevent all outgoing calls.
     Barring of Incoming Calls. This function allows the subscriber to prevent incoming
        calls. The following two conditions for incoming call barring exist: baring of all
        incoming calls and barring of incoming calls when roaming outside the home PLMN.
                                                40
      Advice of Charge (AoC). The AoC service provides the mobile subscriber with an
       estimate of the call charges. There are two types of AoC information: one that provides
       the subscriber with an estimate of the bill and one that can be used for immediate
       charging purposes. AoC for data calls is provided on the basis of time measurements.
      Call Hold. This service enables the subscriber to interrupt an ongoing call and then
       subsequently reestablish the call. The call hold service is only applicable to
       normal telephony.
      Call Waiting. This service enables the mobile subscriber to be notified of an incoming
       call during a conversation. The subscriber can answer, reject, or ignore the incoming
       call. Call waiting is applicable to all GSM telecommunications services using a circuit-
       switched connection.
      Multiparty service. The multiparty service enables a mobile subscriber to establish a
       multiparty conversation - that is, a simultaneous conversation between three and six
       subscribers. This service is only applicable to normal telephony.
      Calling Line Identification presentation/restriction. These services supply the
       called party with the integrated services digital network (ISDN) number of the calling
       party. The restriction service enables the calling party to restrict the presentation. The
       restriction overrides the presentation.
      Closed User Groups (CUGs). CUGs are generally comparable to a PBX. They are a
       group of subscribers who are capable of only calling themselves and certain numbers.
GSM Architecture
                                              41
A GSM system consists of three subsystems.
     1) Radio subsystem (RSS)
     2) Network and switching subsystem (NSS)
     3) operation subsystem (OSS).
1. Radio subsystem (RSS)
The radio subsystem (RSS) comprises all radio specific entities, i.e., the mobile stations (MS)
and the base station subsystem (BSS).
i. Mobile Station (MS): Mobile Station is made up of two entities.
     a) Mobile equipment (ME):
      It is a portable, vehicle mounted, hand held device.
      It is uniquely identified by an IMEI number.
      It is used for voice and data transmission. It also monitors power and signal quality of
         surrounding cells foe optimum handover. 160 characters long SMS can also be sent
         using Mobile Equipment.
     b) Subscriber Identity module (SIM):
      It is a smart card that contains the International Mobile Subscriber Identity (IMSI)
         number.
      It allows users to send and receive calls and receive other subscriber services. - It is
         protected by password or PIN.
      It contains encoded network identification details. it has key information to activate the
         phone.
      It can be moved from one mobile to another.
ii. Base Station Subsystem (BSS): It is also known as radio subsystem, provides and manages
radio transmission paths between the mobile station and the Mobile Switching Centre (MSC).
BSS also manages interface between the mobile station and all other subsystems of GSM. It
consists of two parts.
     a) Base Transceiver Station (BTS):
         It encodes, encrypts, multiplexes, modulates and feeds the RF signal to the antenna.
         It consists of transceiver units.
         It communicates with mobile stations via radio air interface and also communicates
            with BSC via Abis interface.
     b) B. Base Station Controller (BSC):
         It manages radio resources for BTS. It assigns frequency and time slots for all mobile
            stations in its area.
         It handles call set up, transcoding and adaptation functionality handover for each
            MS radio power control.
         It communicates with MSC via A interface and also with BTS.
2. Network Switching Subsystem (NSS): it manages the switching functions of the system
and allows MSCs to communicate with other networks such as PSTN and ISDN. It consist of
     a) Mobile switching Centre:
           It is a heart of the network. It manages communication between GSM and other
              networks.
           It manages call set up function, routing and basic switching.
           It performs mobility management including registration, location updating and
              inter BSS and inter MSC call handoff.
           It provides billing information.
           MSC does gateway function while its customers roam to other network by using
              HLR/VLR.
           Using additional interworking functions (IWF), an MSC can also connect to
              public data networks (PDN)
                                               42
    b) Home Location Registers (HLR): - It is a permanent database about mobile subscriber
        in a large service area. - Its database contains IMSI, IMSISDN, prepaid/post-paid,
        roaming restrictions, supplementary services.
    c) Visitor Location Registers (VLR): - It is a temporary database which updates
        whenever new MS enters its area by HLR database. - It controls mobiles roaming in its
        area. It reduces number of queries to HLR. - Its database contains IMSI, TMSI,
        IMSISDN, MSRN, location, area authentication key.
3. Operational Support Subsystem (OSS): It supports the operation and maintenance of
GSM and allows system engineers to monitor, diagnose and troubleshoot all aspects of GSM
system. It supports one or more Operation Maintenance Centres (OMC) which are used to
monitor the performance of each MS, Bs, BSC and MSC within a GSM system. It has three
main functions:
     To maintain all telecommunication hardware and network operations with a particular
        market.
     To manage all charging and billing procedures
     To manage all mobile equipment in the system.
 a) Authentication Centre: - It provides protection against intruders in air interface. - It
     maintains authentication keys and algorithms and provides security triplets (RAND,
     SRES, Ki).
 b) Equipment Identity Registry (EIR):
        It is a database that is used to track handset using the IMEI number.
        It is made up of three sub classes- the white list, the black list and the gray list.
             - Blacklist : stolen (or locked) devices
             - White list : contains a list of valid IMEI's devices
             - Gray list : a list of malfunctioning devices.
Interfaces used for GSM network :
    a) UM Interface –Used to communicate between BTS with MS
    b) Abis Interface— Used to communicate BSC TO BTS
    c) A Interface-- Used to communicate BSC and MSC
   O Interface - Singling protocol (SS 7)- Used to communicate MSC with other network .
43