Académique Documents
Professionnel Documents
Culture Documents
In the late 1800's, a Scottish physicist named James Clerk Maxwell formulated a
principle that would forever change our world. Maxwell was able to show that the
generalized forms of the laws of electricity and magnetism (the laws of Coulomb,
Gauss, Biot-Savart, Ampere, and Faraday) suggested the existence
electromagnetic (EM) waves. Electromagnetic waves have both an electric and
magnetic field component that propagate through space, similar to how a sound
wave propagates through air or water. Maxwell's theory has since proven true
and has been put to great use. His work catalyzed the development of EM wave
transmitters and receivers, eventually leading to the creation of mobile phones.
Today, there are two major systems which play an important role in both current
and future mobile technologies. Those systems are the Global System for Mobile
Communications (GSM), originated in Europe and the Code Division Multiple
Access (CDMA) Scheme, developed in the United States.
CDMA became commercially available only in the mid-1990s. However, the
origin of CDMA can be traced back to 1940. The roots of CDMA technology are in
the military field and navigation systems. Originally developed to counteract
intentional radio jamming, it was later proved to be suitable for cellular
communications.
CDMA has its roots in pre World War 2 America. In 1940, Hollywood actress
turned inventor Hedy Lamer and co-inventor George Antheil, with WW2 looming,
co-patented a way for torpedoes to be controlled by sending signals over
multiple radio frequencies.
In 1949, John Pierce wrote a technical memorandum that described a multiple
access system that used a common medium that carries a coded signal that
didn't need to be synchronized. Later that year, Claude Shannon and Robert
Pierce developed the basic operational ideas for the CDMA scheme.
Despite all efforts by inventors to advance this technology from experiment to
implementation, the US Navy discarded their work as architecturally unfeasible.
The idea which was known as frequency hopping and later as frequency hopping
spread spectrum technique remained dormant until 1957 when engineers at the
Sylvania Electronic Systems Division in Buffalo, NY took up the idea and the
Lamarr-Antheil patent expired, used it to secure communication for the US
during 1962 Cuban missile crisis.
After becoming an integral part of government security technology, the US
military, in the mids-80, declassified what's has now become CDMA technology,
a technique based on Spread Spectrum technology.
But CDMA's road was not a simple one. In fact, a panel of the world's leading
engineers reportedly met in Japan in the early 1990s to discuss the development
of wireless CDMA technology as a standard. They concluded, however, that it
was impossible.
To the founders of Qualcomm, however, "impossible" simply meant that several
thorny technical issues needed to be overcome. With unstoppable
entrepreneurial spirit, Qualcomm's team solved them all, establishing CDMA as a
legitimate wireless communications standard (and patenting it to ensure their
ownership).
Following these developments, other theoretical and technological discoveries
were made that led to Qualcomm's investigation into the use of CDMA
techniques, beginning with the introduction of narrow band CDMA IS-95
standards in July of 1993
Launched commercially in 1995, the first CDMA networks provided roughly ten
times more capacity than analog networks, and far more than TDMA or GSM.
Besides supporting more traffic, CDMA brought mobile carriers and consumers
better voice quality, broader coverage and stronger security, among other
benefits.
CDMA EV OLUTION
CDMAOne
This describes a complete wireless system based on the TIA/EIA IS-95 CDMA
standard, including IS-95A and IS-95B revisions. It represents the end-to-end
wireless system and all the necessary specifications that govern its operation.
CdmaOne provides a family of related services including cellular, PCS and fixed
wireless.
IS-95A: TIA/EIA IS-95 (Telecommunications Industry Association / Electronic
Industries Association Interim Standard - 95) was first published in July 1993.
The IS-95A revision was published in May 1995 and is the basis for many of
the commercial 2G CDMA systems around the world. IS-95A describes the
structure of the wideband 1.25 MHz CDMA channels, power control, call
processing, hand-offs, and registration techniques for system operation. In
addition to voice services, many IS-95A operators provide circuit-switched
data connections at 14.4 kbps. IS-95A was first deployed in September 1995
by Hutchison
IS-95B: The IS-95B revision, also termed TIA/EIA-95, combines IS-95A, ANSI-J-
STD-008 and TSB-74 into a single document. The ANSI-J-STD-008
specification, published in 1995, defines a compatibility standard for 1.8 to
2.0 GHz CDMA PCS systems. TSB-74 describes interaction between IS-95A
and CDMA PCS systems that conform to ANSI-J-STD-008.
CDMA2000
CDMA2000 represents a family of ITU-approved, IMT-2000 (3G) standards and
includes CDMA2000 1x and CDMA20001xEV technologies. They deliver increased
network capacity to meet growing demand for wireless services and high-speed
data services.
CDMA2000 is considered a 2.5G (or 2.75G) technology when the 1xRTT access
network is used and a 3G technology when the EV-DO access network is used.
CDMA2000 was the world's first 3G technology commercially deployed October
2000.
Spread Spectrum
A complete definition to Spread Spectrum is the one given by Haykins given
below.
His definition is in two parts.
1. Spread Spectrum is a means of transmission in which the data sequences
occupy a bandwidth in excess of the minimum bandwidth necessary to send it.
2. Spread Spectrum is accomplished before transmission through the use of a
code that is independent of data sequences .The same code is used at the
receiver to de-spread the received signal so that the original data sequence may
be recovered.
Synchronization
The success to a CDMA system is proper synchronization. To de-spread a spread
spectrum signal we need to use the same code used for spreading the signal.
The operation takes place in two stages acquisition and tracking. First we have
an acquisition or coarse synchronization is done, where we try to align the code
in chips away from each other. In tracking or fine synchronization we measure
the correlation and bring the receiver code in synchronism with the transmitted
code.
in Figure 1.4a.
Figure 1.4a Pseudo-Noise Spreading
Transmitting Data
The resultant coded signal next modulates an RF carrier for transmission using
Quadrature Phase Shift Keying (QPSK). QPSK uses four different states to encode
each symbol. The four states are phase shifts of the carrier spaced 90_ apart.
I(t) is called the real, or In-phase, component of the data, and Q(t) is called the
imaginary, or Quadrature-phase, component of the data. This will result in two
Binary PSK waves superimposed. These are easier to modulate and later
demodulate.
This is not only an algebraic identity, but also forms the basis for the actual
modulation/demodulation scheme. The transmitter generates two carrier waves of
the same frequency, a sine and cosine. I(t) and Q(t) are binary, modulating each
component by phase shifting it either 0 or 180 degrees. Both components are then
summed together. Since I(t) and Q(t) are binary, they will be denoted as simply I
and Q.
The receiver generates the two reference waves, and demodulates each
component. It is easier to detect 180_ phase shifts than 90_ phase shifts. The
following table summarizes this modulation scheme. Note that I and Q are
normalized to 1.
Symb I Q Phase
ol shift
00 + + 45°
1 1
01 + -1 315°
1
10 -1 + 135°
1
11 -1 -1 225°
Table 1.1 Modulation scheme
For Digital Signal Processing, the two-bit symbols are considered to be complex
numbers, I +jQ.
Since I and Q are no longer limited to 1 or -1, the phase shift of the composite
carrier is not limited to the four states; the phase and amplitude vary as
A2 = I 2 + Q2
Tan(Y) = Q/I
1. Cellular Band
45 MHz spacing for forward & reverse channel
Frequency assignments are on 30 kHz increments
2. PCS Band
80 MHz spacing for forward & reverse channel
Frequency assignments are on 50 kHz increments
This hierarchy of cells helps increasing capacity and easy of routing calls apart from
other operational advantages. But the final number of cells in an area is comprised
of factors like the density of calls ,number of BSs , size of each cell ,capacity, the
budget in hand etc.
In the case of FDMA/TDMA a given spectrum would be divided into smaller chunks,
each of these chunks uniquely assigned to a cell in a cluster. By repeating this
pattern (frequency re-use technique) a big city is serviced by the limited spectrum
as illustrated in figure 1.7. Smaller bandwidth for transmission compromises on
quality of signal. This planning of frequencies is called Frequency Planning. This
distribution of frequencies in a cluster is important to combat co-channel
interference and adjacent channel interference between repeating clusters.
Figure 1.7: Frequency re-use pattern; FDMA/TDMA VS CDMA
In CDMA, frequency planning is minimal; the entire spectrum can be assigned to all
the cells in the cluster as shown in Figure 1.7. This is possible because of the
orthogonal property of the unique codes used for transmission. As a consequence,
usage of the entire spectrum enhances the quality of voice. Adjacent channel
interference is combated by power control (we will discuss this later) and planning
of Walsh codes in use at the BSC level.
Short PN Code: This is a 16 bit short PN Code used to identify the BS and hence
the cell. Distinguishing of the different BS is done by assigning an offset of this code
to a common time reference to each BS in the network. On the reverse link the
mobile uses the code for extra signal robustness, but without any offset. Services of
the GPS (Global Positing System) are used in synchronizing the various offsets of BS
in the network.
Long PN Code: This code on the reverse link is used for spreading, meaning
identifying the mobile station. It is 42-bit code. On the forward link it is used for data
scrambling
REVERSE LINK
42-1
Reverse CDMA Channel consists of 2 logical channels. One of the logical
channels is permanently and uniquely associated with each MS. The channel does
not change upon handoff.
The reverse CDMA Channel does not follow the strict orthogonal rule strictly uses a
very long period spreading code, in distinct phases. The correlations between
mobile stations are not zero, but they are acceptably small.
Access Channel: Access channels are used by mobiles not yet in a call; to
transmit registration requests, call setup requests, page responses, order
responses, and other signaling information. An access channel is really just a
public long code offset unique to the BTS sector. Access channels are paired
to Paging Channels. Each paging channel can have up to 32 access channels.
These channels operate at 4800 bps.
Reverse Traffic Channel: The reverse traffic channels are used by
individual users during their actual calls to transmit traffic to the BTS. A
reverse traffic channel is really just a user-specific public or private Long
Code mask
Generally the BS gets bombarded by signals from many different MS. Some of these
MS are close and their signals are much stronger than MS farther away. This results
in the Near/Far problem inherent in CDMA communications. System Capacity is also
dependent on the signal power. For these reasons, both the BS and MS measure the
received power and send signals to control the others transmit power.
Open Loop Power Control: The Open Loop Power Control is used during
access attempts. It increases the power during each attempt. The
Communication process is not affected by increasing power at the BS
receiver, since BS has already informed the power increment step on each
attempt to the MS on a broadcast mobile.
Closed Loop Power Control: In Closed Loop Power Control there is a feedback
procedure. This type of power control is used when the MS is using the traffic
channel resources i.e. when active. The BS is continuously monitoring the
reverse link. If it finds the quality of the reverse link poor, then it will instruct
the mobile to increase its power by inserting power control bits in traffic data.
This insertion of power bits for power control is called Bit Puncturing. The BS
does this every 800 b/s.
System Capacity
The capacity of a system is approximated by:
The capacity is directly proportional to the processing gain and also inversely
proportional to the signal to noise ratio of the received signal. Therefore the smaller
the transmitted signal, the larger the system capacity (as long as the receiver can
detect the signal in the noise). Both the BS and MS control the power transmitted by
the other so that the received signal is as small as possible while maintaining a
minimum signal to noise ratio. This maximizes system capacity
Ne ar / F ar Pr obl em
A user close to a cell would saturate the receiver and eliminate all users further
away, unless the power is controlled. This is referred to as Near /Far problem.
Because the cross-correlation between two PN codes is not exactly equal to zero,
the system must overcome the Near/Far problem.
Where:
Aj is the amplitude of the jth signal,
rjk is the cross-correlation between the kth and jth signal, and
S is the sum over all the j signals (excluding k).
Since the cross-correlation is small (ideally, it is zero), the sum of cross-correlation
terms should be much less than the amplitude of the desired signal. However, if the
desired signal is broadcast from far away, and undesired signals are broadcast from
much closer, the desired signal may be so small as to be drowned out by the cross-
correlation terms.
Note: This problem only exists in the reverse direction. The BS is receiving signals
from many MS at different distances, but the MS is receiving all signals from one BS.
The BS controls the power of each MS so that the signals received from all MS are
the same strength.