DB4----FINAL
-
Upload
raj-hakani -
Category
Documents
-
view
218 -
download
0
Transcript of DB4----FINAL
-
8/6/2019 DB4----FINAL
1/49
Introduction to CDMA
What is CDMA? Code Division Multiple Access (CDMA) is a digital technology pioneered byQUALCOMM that provides crystal clear voice quality in a new generation of wireless
communications products and services. Bandwidth of CDMA is 824MHz to 849MHz for
uplink and 869MHz to 894MHz for downlink. Using digital encoding and "spreadspectrum" Radio Frequency (RF) techniques, CDMA provides better and more cost
effective:
Voice quality
Privacy
System capacity
Flexibility
than other wireless technologies. CDMA also provides enhanced services such as:
Short messaging
E-mail
Internet access
CDMA and other wireless communication have become very popular in the last few
years, but people have been trying to accomplish the goals of wireless telecomm. Sinceshortly after the invention of the telephone.
While designing communication system, the main points to be considered are:
Capacity Delay
Error detection/correction.
Capacity concerns how much information you can deliver from the source to the
destination. Delay issues are those involving delivery of information in the shortest time.Error detection/correction is a method to reduce errors in the delivery of information.
Think about problems you may have experienced due to these issues. For example, there
may be a capacity problem in your carrier's system if you experience trouble placing acall.
Multiple Access Systems: -
Wireless telecommunications has dramatically increased in popularity, resulting in the
need for technologies that allow multiple users to share the same frequency. These arecalled "multiple access systems." The three types of multiple access system are:
1) Frequency Division Multiple Access (FDMA)
2) Time Division Multiple Access (TDMA)
3) Code Division Multiple Access (CDMA)
1
-
8/6/2019 DB4----FINAL
2/49
Frequency Division Multiple Access (FDMA)Each FDMA subscriber is assigned a specific frequency channel. No one else in the same
cell or a neighboring cell can use the frequency channel while it is assigned to a user.
This reduces interference, but severely limits the number of users.
Time
Division Multiple
Access (TDMA)TDMA users share a
common frequencychannel, but use the
channel for only a very
short time. They are each given a time slot and only allowed to transmit during that timeslot. When all available time slots in a given frequency are used, the next user must be
assigned a time slot on another frequency. These time slices are so small that the human
ear does not perceive the time slicing.
Code Division Multiple Access (CDMA)CDMA users share a common frequency channel. All users are on the same freq.
at the same time. However, each pair of users is assigned a special code thatreduces interference while increasing privacy.
2
-
8/6/2019 DB4----FINAL
3/49
Features of CDMA: -
The following features are unique to CDMA technology:
Universal frequency reuse
Fast and accurate power control
Rake receiver
Different types of handoff
Frequency reuseThe frequency spectrum is a limited resource. Therefore, wireless telephony,
like radio, must reuse frequency assignments. For example, two radio stations might
transmit at 91.3 FM. There is no interference as long as the radio stations are far enough
apart.
Cell interference: -
Cell A and B of a conventional, analog system are using the same frequency.The area of overlap, area C, has a frequency conflict and interference. This is similar to
what you experience when you are driving between the broadcast zones of two radio
stations transmitting at the same frequency.
FDMA and TDMA frequency reuse planning
3
-
8/6/2019 DB4----FINAL
4/49
A frequency (channel) can be used again within an FDMA or TDMA
network, but an appropriate distance must separate cells using the same frequency.
Adjacent cells must be assigned a different set of frequencies. For example, a cell usingfrequency A must not be adjacent to another cell using frequency A. As a result, each cell
site in the site is able to use only 1/7 of the possible frequencies.
CDMA frequency reuse planning
Each BTS in a CDMA network can use all available frequencies. Adjacent
cells can transmit at the same frequency because code channels, not frequency channels,separate users. This feature of CDMA, called "frequency reuse of one, eliminates the
need for frequency planning.
Power control
4
-
8/6/2019 DB4----FINAL
5/49
Power control is a CDMA feature that enables mobiles to adjust the power
at which they transmit. This ensures that the base station receives all signals at the
appropriate power. The CDMA network independently controls the power at which eachmobile transmits. Both forward and reverse links use power control techniques.
Why power control is neededIf all mobiles transmitted at the same power level, the base station would
receive unnecessarily strong signals from mobiles nearby and extremely weak signals
from mobiles that are far away. This would reduce the capacity of the system. Thisproblem is called the near-far problem.
Reverse link power control
Reverse link power control consists of two processes: Open loop
Closed loop
Open loop is an initial estimate of the power the mobile needs to transmit to the BTS.
Closed loop is a refinement of the open loop estimate.
Open loop power control
5
-
8/6/2019 DB4----FINAL
6/49
Open loop is the mobile's estimate of the power at which it should transmit.
The open loop estimate is based on the strength of the pilot signal the mobile receives. As
the pilot signal gets weaker or stronger, the mobile adjusts its transmission strengthupwards or downwards. Open loop is used any time the mobile transmits
Closed loop power control
In closed loop, the BTS sends a command to the mobile to increase or
decrease the strength at which it is transmitting. The BTS determines this commandbased on the quality of the signal it receives from the mobile. Closed loop is only used
during a call. Closed loop commands are sent on the forward traffic channel.
Forward link power controlThe BTS independently adjusts the power for each forward traffic channel
based on the information it receives from the mobile.
Rake ReceiverThe rake receiver is a CDMA feature that turns what is a problem in other
technologies into an advantage for CDMA. Signals sent over the air can take a direct path
to the receiver, or they can bounce off objects and then travel to the receiver. Thesedifferent paths, called multi-paths, can result in the receiver getting several versions of
the same signal but at slightly different times. Multi-paths can cause a loss of signal
through cancellation in other technologies.
6
-
8/6/2019 DB4----FINAL
7/49
CDMA's rake receiver is a multiple receiver in one. The rake receiver identifies the three
strongest multi-path signals and combines them to produce one very strong signal. The
rake receiver therefore uses multipath to reduce the power the transmitter must send.Both the mobile and the BTS use rake receivers.
Handoff in CDMAHandoff is the process of transferring a call from one cell to another. This is
necessary to continue the call as the phone travels. CDMA is unique in how it handles
handoff. CDMA has three primary types of handoff: 1)Hard,(2) Soft (3) IdleThe type of handoff depends on the handoff situation.
Soft handoffA soft handoff establishes a connection with the new BTS prior to breaking
the connection with the old one. This is possible because CDMA cells use the same
frequency and because the mobile uses a rake receiver. The CDMA mobile assists thenetwork in the handoff. The mobile detects a new pilot as it travels to the next coverage
area. The new base station then establishes a connection with the mobile. This newcommunication link is established while the mobile maintains the link with the old BTS.
Soft handoffs are also called "make-before-break."
Variations of the soft handoff: -
There are two variations of soft handoffs involving handoffs betweensectors within a BTS:
Softer
Soft-softer
7
-
8/6/2019 DB4----FINAL
8/49
The softer handoff occurs between two sectors of the same BTS. The BTS
decodes and combines the voice signal from each sector and forwards the combined
voice frame to the BSC. The soft-softer handoff is combination handoff involvingmultiple cells and multiple sectors within one of the cells.
CDMA hard handoff
A hard handoff requires the mobile to break the connection with the old BTS
prior to making the connection with the new one. CDMA phones use a hard handoffwhen moving from a CDMA system to an analog system because soft handoffs are not
possible in analog systems. A Pilot Beacon Unit (PBU) at the analog cell site alerts the
phone that it is reaching the edge of CDMA coverage. The phone switches from digital to
analog mode as during the hard handoff. Hard handoffs are also called "break-before-make."
The CDMA hard handoff may be used when moving from a CDMA network
to an analog one. It may also be used when moving to a different:
RF channel
MTSO (Mobile Telephone Switching Office)
Carrier
Market
Analog to CDMA handoff is not available due to the limitations of analog technology.
CDMA idle handoff
An idle handoff occurs when the phone is in idle mode. The mobile will
detect a pilot signal that is stronger than the current pilot. The mobile is always searching
for the pilots from any neighboring BTS. When it finds a stronger signal, the mobilesimply begins attending to the new pilot. An idle handoff occurs without any assistance
from the BTS.
8
-
8/6/2019 DB4----FINAL
9/49
TDMA and FDMA handoffTDMA and FDMA systems use a hard handoff when the mobile is moving
from one cell site to another. These technologies do not allow for any type of make-
before-break handoff. A hard handoff can increase the likelihood of a dropped call.
Advantages of CDMA
CDMA technology has numerous advantages including:
Coverage
Capacity
Clarity Cost
Customer satisfaction
Coverage CDMA's features result in coverage that is between 1.7 and 3 times that of TDMA:
Power control helps the network dynamically expand the coverage area. Coding andinterleaving provide the ability to cover a larger area for the same amount of available
power used in other systems.
Capacity: -CDMA capacity is ten to twenty times that of analog systems, andit is up to four times that of TDMA. Reasons for this include:
9
-
8/6/2019 DB4----FINAL
10/49
CDMA's universal frequency reuse
CDMA users are separated by codes, not frequencies
Power control minimizes interference, resulting in maximized capacity. CDMA's soft handoff also helps increase capacity. This is because a soft handoff
requires less power.
Clarity: -Often CDMA systems can achieve "Wire line" clarity because ofCDMAs strong digital processing. Specifically:
The rake receiver reduces errors
The variable rate vocoder reduces the amount of data transmitted per person,reducing interference.
The soft handoff also reduces power requirements and interference.
Power control reduces errors by keeping power at an optimal level.
CDMA's wide band signal reduces fading.
Encoding and interleaving reduce errors that result from fading.
Cost: - CDMAs better coverage and capacity result in cost benefits: Increased coverage per BTS means fewer are needed to cover a given area. This
reduces infrastructure costs for the providers.Increased capacity increases the service provider's revenue potential.
CDMA costs per subscriber has steadily declined since 1995 for both cellular and
PCS applications.
Customer satisfaction: -CDMA results in greater customer satisfaction because CDMA provides better:
Voice quality
Longer battery life due to reduced power requirements
No cross-talk because of CDMA's unique coding
Privacy--again, because of coding.
Security because of coding.
10
-
8/6/2019 DB4----FINAL
11/49
Difference between CDMA and GSM: -
Topic CDMA GSM
CapacityHigher spectral efficiency than
GSM/TDMA/analog
Higher spectral efficiency than
analog
CoverageInherently sensitive receiver implies
excellent cell range
Limited by lesser receiver
sensitivity
Fraud Very secure network Secure network
Frequency
Planning
N=1 frequency reuse pattern nearly
eliminates frequency planning
N=7 frequency reuse patternrequires standard frequency
planning
Spectral
EfficiencyVery High Low
PrivacyAir interface security prevents
eavesdropping
Air interface security prevents
eavesdropping
Frequency
Diversity
Spread spectrum provides frequency
diversity
Possible through slow frequency
hopping
PathDiversity
Favorably utilizes multi-path to enhanceoverall signal quality (via rake receivers)
Susceptible to signal degradationdue to multi path interference
Call Stability-
Handovers
Hard, Soft and Softer Handovers Hard handovers
Make before break for soft/softer
handoversBreak before make
Power
Control
Key to achieving multi-fold capacity
gains over other tech.
Key to extending life of mobiles
battery
Technique of Spreading: -
11
-
8/6/2019 DB4----FINAL
12/49
CDMA is a digital wireless air interface and networking standard based on the
principle of spread-spectrum techniques, which allow multiple users to access thesystem simultaneously on the same carrier frequency.
CDMA is a method in which users occupy the same time and frequency
allocations, and are channelized by unique assigned codes. The signals are separated
at the receiver by using a correlator that accepts only signal energy from the desired
channel. Undesired signals contribute only to noise. The technique of spreading theuser waveform with code is called Spread spectrum.
Why Spreading? Spread spectrum multiple access transmits the entire signal over a bandwidth that
is much greater than that required for standard narrow band transmissions in order to
gain signal-to-noise (S/N) performance.
In channels with narrowband noise, increasing the transmitted signal bandwidth
results in an increased probability that the received information will be correct.Because each signal is a compilation of many smaller signals at the fundamentalfrequency and its harmonics, increasing the frequency results in a more accurate
reconstruction of the original signal.
The effective drawback of narrowband data communications is the limitation of
bandwidth; thus signals must be transmitted with enough power so the corruption bygaussian noise isn't as effective and the probability that the data received is correct
will remain low. This means that the effective SNR must be high enough so that the
receiver can recover the transmitted code without error.
From a system viewpoint, the performance increase for very wideband systems is
referred to as "process gain". This term is used to describe the received signal fidelity
gained at the cost of bandwidth. The signal may be spread over a large bandwidthwith smaller spectral power levels and still achieve the required data rate.
Two Types of spread spectrum technique:
Frequency Hopping (FH)
Direct Sequence (DS)
In frequency hopping, the carrier frequency in frequency hopping is changed very
rapidly. The frequency is changed rapidly, in a pseudorandom sequence.
In Direct Sequence the narrowband signal is spread and we're going to spread that signal
using a wide bandwidth pseudonoise sequence, or a code sequence. Also known as PNcodes, pseudonoise codes.
Tata Tele Services uses Direct Sequence Spread Spectrum technique for spreading the
signal.
DS-SS: -
12
-
8/6/2019 DB4----FINAL
13/49
CDMA technology focuses primarily on the "direct sequence" method of spread
spectrum. Direct sequence is spread spectrum technique in which the bandwidth of asignal is increased by artificially increasing the bit data rate. This is done by breaking
each bit into a number of sub-bits called "chips".
Assuming this number is 10, each bit of the original signal would be divided up
into 10 separate bits, or "chips." This results in an increase in the data rate by 10. Byincreasing the data rate by 10, we also increase the bandwidth by 10.
The signal is divided up into smaller bits by multiplying it by a Pseudo-Noise
code, PN-code. A PN-code is a sequence of high data rate bits ("chips").
Spread the narrowband signal with a code; (that code must be known by the
receiver). And with the receiver knowing that code, the original information cane be
extracted.
Methods for spreading the bandwidth of the transmitted signal over a spectrum, or
band of frequencies, much wider than the minimum bandwidth required to transmitthe signal.
Spreading is often used to:-Reduce the effect of jamming (intentional interference)
-Reduce effect from other interference.e.g narrow band transmitter, other spreadspectrum transmitters.
Traditional technologies try to squeeze signal into minimum required bandwidth.
Direct Sequence Spread Spectrum: -
CDMA is a multiple access scheme where users are identified by codes. Commercial
CDMA systems use Direct Sequence Spread Spectrum (DS-SS)
13
-
8/6/2019 DB4----FINAL
14/49
In DS-SS, the transmitter spreads the signal power over a wide bandwidth using a
unique code. The receiver de-spreads the signal using a synchronized version of thespreading code
During the spreading of a signal, it is multiplied by a random Pseudorandom Noise
signal (sequence) at a rate higher than the source data rate. As it is well known that
when the transmission data rate is increased in time domain that means the bitduration is decreased, which is equivalent to an increase of bandwidth in the
frequency domain.
The main parameter in spread spectrum systems is the processing gain: the ratioof transmission and information bandwidth. The processing gain defines how much
spreading is applied to the signal.
Spreading: Source signal is multiplied by a PN signalProcessing Gain: Chip Rate / Data Rate.
Despreading: Spread signal is multiplied by the spreading code
In digital systems the energy per bit needs to be a certain level above the totalinterference density in order to detect the transmitted bit. This is referred to as Eb/Io.
The receiver performance depends on Eb/No. The effective noise, No, is theresidual interference caused by other users at the de-spreader output. No fluctuates
with time depending on who is transmitting during the frame. Different users canoperate at different data rates with different frame activities.
Major factors that impact Eb/No values are as follows:
Desired FER performance, Subscriber Speed, Delay spread, TX and Rx DiversityMethods.
Introduction to CDMA signal
The words Code and Division are important parts of how CDMA works.CDMA uses codes to convert between analog voice signals and digital signals. CDMA
also uses codes to separate (or divide) voice and control data into data streams called
Channels. These digital data streams channels should not be confused with frequency
channels.
Generating a CDMA signal Analog to Digital conversion.
Vocoding
Encoding and interleaving.
Channelizing the signal.
Conversion of the digital signal to RF signal.
The use of codes is the key part of this process. The block diagram and the required
components for generating the CDMA signal are as shown in figure 1.
14
-
8/6/2019 DB4----FINAL
15/49
1. Analog to Digital Conversion: -The first step of CDMA signalgeneration is analog to digital conversion. CDMA uses a technique called pulse code
modulation (PCM) to accomplish A/D conversion.
2. Vocoder: -The second step of CDMA signal generation is voice compression.CDMA uses a device called a vocoder to accomplish voice compression. The term
Vocoder is a contraction of the words voice and code.
Vocoder is located at the BSC and in the phone. People pause between syllables and
words when they talk. Thus CDMA takes advantage of these pauses in speech activity byusing a variable rate vocoder.
Variable Rate Vocoder:A CDMA vocoder varies compression of the voice signal into one of four data
rates based on the rate of the users speech activity. The four rates are:
Full 9.6Kbps
4.8Kbps
2.4Kbps1/8 1.2Kbps
The vocoder uses its full rate when a person is talking very fast. It uses the 1/8 rate whenthe person is silent.
3. Encoding and Interleaving: -Encoders and interleavers are built into theBTS and the phones. The purpose of the encoding and interleaving is to build a
redundancy into the signal so that information lost in transmission can be recovered.The type of encoding done at this stage is called Convolutional Encoding. A
simplified encoding scheme is shown below:
15
-
8/6/2019 DB4----FINAL
16/49
Bit A B C D
Encoded Symbol A A A B B B C C C D D D
Error A A A B B ? ? ? C D D D
Decoded Bits A B ? D
A digital message consists of four bits (A, B, C, D) of vocoded data. Each bit is repeated
three times. These encoded bits are called symbol.. The decoder at the receiver uses amajority logic rules.
4. Interleaving: Interleaving is a simple but powerful method of reducing theeffect of burst errors and recovering lost bits. In this example shown here the symbolsfrom each group are interleaved in a pattern that the receivers know.
Bit A B C D
Symbol AAA BBB CCC DDD
Interleaved ABC DAB CDA BCD
Symbol
Errors ABC D?? ??A BCD
Deinterleaved A?A B?B C?C D?D
Decoded bits A B C D
5. Channelizing: - The encoded voice data is further encoded to separate it fromother encoded voice data. The encoded symbols are then spread over the entire
bandwidth of the CDMA channel. This process is called Channelization.
CDMA Channels: -
16
-
8/6/2019 DB4----FINAL
17/49
CDMA Physical Channel: -
CDMA physical channel is 1.25MHz wide. All users in a cell share same physical
channel. All cells in a CDMA system may use the same frequency. Forward and reversechannels are separated by 45MHz.
CDMA Logical Channels: -CDMA logical channels are uniquely identified by digital codes. All logical channelsshare same physical channel
Different Channels: -
Forward Link
Channels:
The forward link usesfour types of channels
to transmit voice and
control data to themobile. The types of
forward link channels
are:
1) Pilot Channel:
The BTS
constantly transmitsthe pilot channel. The mobile uses the pilot signal to acquire the system. It then uses the
pilot signal to monitor and adjust the power needed in order to transmit back to the BTS.Provide a reference signal for all MSs that provides the phase reference for COHERENT
demodulation 4-6 dB stronger than all other channels. Walsh code 0 is used for pilotchannel. It provides unique reference clock, which is attained by GPS from satellite.
2) Sync Channel:
The BTS constantly transmits over the sync channel so the mobile cansynchronize with the BTS. It provides the mobile with the system time and the
identification number of the cell site. The mobile ignores the sync channel after it is
synchronized. Synchronization is provided by phase locked loop.Used to acquire initialtime synchronization Synch message includes system ID (SID), network ID (NID), the
offset of the PN short code, the state of the PN-long code, and the paging channel datarate (4.8/9.6 Kbps). W32 is used for Sync channel.
3) Paging Channel:
CDMA uses up to seven paging channels. The paging channel transmits overheadinformation such as commands and pages to the mobile. The paging channel also sends
commands and traffic channel assignment during call setup. The mobile ignores the
paging channel after a traffic channel is established. Used to page the MS in case of an
17
-
8/6/2019 DB4----FINAL
18/49
incoming call, or to carry the control messages for set up Uses W1-W7 There is no power
control Additionally scrambled by PN long code, which is generated by LFSR of length
42 The rate 4.8 Kbps or 9.6Kbps. One paging channel can give signaling to 32 users.
4) Forward Link Traffic Channels:
CDMA uses between 55 and 61 forward traffic channels to send both voice andoverhead control data during a call. Once the call is completed, the mobile tunes back in
to the paging channel for commands and pages. Also carry power control bits for the
reverse channel.
Reverse Link Channels:The reverse link uses two types of channels to transmit voice and control data to
the BTS. The types of reverse link channels are:1) Access Channel:
The mobile uses the access channel when not assigned to a traffic channel. The
mobile uses the access channel to:
Originate the calls Respond to pages and commands from the base station
Transmit overhead messages to the base station.
2) Reverse Link Traffic Channel:
The reverse traffic channel is only used when there is a call. The reverse traffic
channel transmits voice data to the BTS. It also transmits the overhead controlinformation during the call.
Call Processing Stages: -
There are four stages or modes in CDMA call processing:
1) Initialization Mode: During initialization, the mobile:- Acquires the system via the Pilot Code Channel
- Synchronizes with the system via the Sync Code Channel.
2) Idle Mode: The mobile is not involved in a call during idle mode, but it must stayin communication with the base station:
- The mobile and the base station communicate over the access and pagingcode channels.
The mobile obtains overhead information via the paging code channel.
3) Access Mode: The mobile accesses the network via the Access code channelduring call origination. The Access channel and Paging channel carry the required
call setup
communication between the mobile phone and the BTS until a traffic channel isestablished.
4) Traffic Mode: During a Land To Mobile (LTM) call:
The mobile receives a page on the paging channel
18
-
8/6/2019 DB4----FINAL
19/49
The mobile responds on the access channel.
The traffic channel is established and maintained throughout the call.
During a Mobile To Land (MTL) call:
The call is placed using the Access channel.
The base station responds on the paging channel.
The traffic channel is established.
Codes Used in CDMA system: -
CDMA uses three different Codes:(i) Walsh Codes
(ii) PN Short Codes and
(iii) PN Long Codes
1.Walsh Codes: -This type of coding is used in forward link. Walsh codes provide a means touniquely identify each user on the forward link. Walsh codes have a unique mathematicalproperty they are orthogonal. In other words, Walsh codes are unique enough that the
voice data can only be recovered by a receiver applying the same Walsh code. All other
signals are discarded as background noise. The Walsh code is 64 chips long; it's asequence of 64 chips, 1s and 0s, that repeats after every 64 chips.
Generation of Walsh codes: - Starting with a seed of 0 and same bit in horizontally and same bit vertically
while complements in diagonally generates orthogonal codes. This process is to be
continued with newly generated block until the desired codes with proper length aregenerated. So in this way we will get total 64-walsh codes each have 64 bit long. Walsh
codes are used in the forward CDMA link to separate users. In any given sector, each
forward code channel is assigned a distinct Walsh code. The process is shown on next
page.
0 0 0 00 00
01 010 1 00 11
01 10
0000 0000
0101 01010011 0011
0110 0110
19
-
8/6/2019 DB4----FINAL
20/49
0000 1111
0101 10100011 1100
0110 1001
00000000 00000000
01010101 01010101
00110011 00110011
01100110 0110011000001111 00001111
01011010 01011010
00111100 00111100
01101001 01101001
00000000 11111111
01010101 10101010
00110011 11001100
01100110 1001100100001111 11110000
01011010 10100101
00111100 1100001101101001 10010110
And so on up to 64 bits horizontally and vertically as shown in the Figure
64 bit Walsh codes (providing 64 bit orthogonal codes) are used to provide 64 channels
within each frequency band. They are used for spreading in the forward link. In thereverse link it is used to provide orthogonal modulation but not spreading to the full
1.2288 Mcps rate. The specific Walsh function on to which the data is modulated defines
the forward link channelization.1. Pilot Channel (always used Walsh code W0)
Mobile acquires phase, timing and signal strength via the pilot channel.
2. Paging Channel (use Walsh codes W1-W7)
Mobile gets system parameters via the paging channel.
3. Sync Channel (always uses Walsh code W32)Mobile synchronizes via the sync channel.
4. Traffic Channel (use Walsh codes W8-W31 and W33- W63)
Mobile and BTS communicate over the traffic channels during a connection.
20
-
8/6/2019 DB4----FINAL
21/49
Walsh sequences are also referred to as Wash Functions. These codes are
generated at 1.2288 Mbps (Mcps) with a period of approximately 52 s as illustrates
below. These are used to identify users on the forward link. For this reason they are alsoreferred to as either Walsh Channels or TCH. All base stations and mobile users have
knowledge of all Walsh codes.
Walsh Code generator Rate = 1.2288 Mcps
Time duration for the one Chip = 1/1.2288 Mcps= 0.813 micro second
Total 64 chips are in one Walsh code so time between two Walsh code generations
= 0.813* 10-6 * 64
= 52.08 * 10-6 Second
What is Correlation
Correlation is a Measure of how well a given signal matches a desired code.The desired code is compared to the given signal at various test times.
Orthogonal Spreading and De-Spreading: -
The principle behind spreading and de-spreading is that when a symbol is
XORed with a known pattern and the result is again XORed with the same pattern, theoriginal symbol is recovered. Hence, the effect of XOR operation if performed twice
using the same code is null. In orthogonal spreading, each encoded symbol is XORed
with 64 chips of the Walsh code.
Recovery of Spread Symbol
At the receiver side the signal is de-spreads using the same Walsh code used atthe transmitter side. Under no Noise conditions, the symbols or digits are completelyrecovered without any error. But, the channel is not noise free. So, cdmaOne systems
employ FEC (Forward Error Control) techniques to combat effects of noise and enhance
the performance of the systems. When the wrong Walsh sequence is used for dispreading,the resulting correlation yields an average of zero. This is a clear demonstration of the
advantage of the orthogonality property of the Walsh codes. Whether the wrong code is
by receiver or other users attempting to decode the received signal, the resultingcorrelation is always zero.
21
-
8/6/2019 DB4----FINAL
22/49
Figure 5
Recovering data using correct function
Rx Data 1001 0110 0110 1001 1001 XORFunction 0110 0110 0110 0110 0110
1111 0000 0000 1111 1111Recovered Data 1 0 0 1 1
Recovering data using incorrect function
Rx Data 1001 0110 0110 1001 1001 XOR
Function 0101 0101 0101 0101 0101
1100 0011 0011 1100 1100
Recovered Data ? ? ? ? ?
Pseudo random Noise (PN) code: - PN code has randomness properties. If the current state and the generating
function of the PN code are known, the Future state of the code can be predicted. InCDMAOne system each base stations and all mobile in that base station use same set of
three PN sequence (two short codes and one long code).
2. Short code: -Two short code I and Q are used in CDMAOne. We have total
215 = 32,768 codes.
22
Received
Tim
Correlation =
Correlation =
Correlation =
Correlation =
-
8/6/2019 DB4----FINAL
23/49
They are generated at the rate of 1.2288Mcps. So after
32768/1.2288* 106 =26.67ms
The code will repeat itself. Unique PN offset serve as identifiers for a cell or a sector. InCDMAOne there are 32768/64 = 512
Total offset each have 64 bits long. So total effective offset in one cell would be 512/3 =
170.
3. Long Code: -One long code of length 242 = 4400 billion are used in CDMAOne system. It is used forspreading and scrambling. They are generated at the rate of 1.2288Mcps. So after
4398046511104/1.2288*106 = 3579139.4133 second
or 42 days (35791.4133/24*60*60) the code will repeat itself.
Generation of PN codes: -
The most important element in the transmitter and receiver in a CDMA
system is the PN sequence generator, which is used for spreading and de-spreadingsignals.
The PN sequence has a random set of words, which repeat after a specificsequence length. Pure sequence is highly predictable and a pure random signal makes
it difficult even for the desired receiver to recover the signal. Hence, the PN sequenceis the best choice.
Masking is used to produce offsets in both the short codes and long code. Theoffsets of the short PN codes are used to uniquely identify the forward channels of the
individual sectors or cells. The offsets of the Long code are used to separate code
channels in the reverse direction.
PN Offset Masking: Masking provides the shift in time for
PN codes. Different masks correspond to different time shifts. In cdmaOne systems,ESN are used as masks for used on the Traffic code channel.
If the current state and the generating function of the PN code are known,
the Future state of the code PN codes mimic randomness properties can be
predicted. In cdmaOne system each base stations and all mobile in that base stationuse same set of three PN sequences (two short codes and one long code).
23
-
8/6/2019 DB4----FINAL
24/49
Forward Channel
Generation: -
The forward link uses the frequency spectrum 824-849 MHz. Each carrier in
forward link channel is of 1.25MHz wide. Each channel is separated using different
spreading codes. QPSK is the modulation scheme used in forward channel.
After orthogonal codes, they are further spread by short PN spreading codes.
Short PN spreading codes are of length 15 with a period of 32768 chips.
Why we have two spreading codes?
The orthogonal codes are used to differentiate between the transmissions within a
cell. The PN spreading codes are used to isolate different cells (BSs) that are
24
-
8/6/2019 DB4----FINAL
25/49
using the same frequencies. The same PN sequence is used in all BSs.The offset
for each BS is different. Of course, this requires synchronization Synchronizationis achieved by GPS.
Reverse Channel Generation: -
BASIC STRUCTURE OF CDMA NETWORK: -
25
-
8/6/2019 DB4----FINAL
26/49
The basic structure of the network is shown in the figure. The components are described
below:1) Microwave Antenna
2) ODU (Out Door Unit)
3) IDU (In Door Unit)4) MUX
5) DDF (Digital Distribution Frame)
6) BTS (Base station Transceiver Subsystem)
7) Sector antenna8) GPS antenna
1) Microwave antenna MW antenna is used to transmit MW signal in air. This antenna is a
directional antenna (DA). It means it will transmit in one direction only. This is used to
connect E1 link between two sites. Two MW antennas are there in each site to establish aring network. It sends traffic to BSC (Base Station Controller). The transmitting
frequency is in terms of GH. Parabolic types of antenna are used in TTL.
2) ODU (Out Door Unit)
26
-
8/6/2019 DB4----FINAL
27/49
ODU is attached to the MW antenna. Its function is to modulate the incoming
signal from IDU with higher carrier frequency signal. Means frequency up conversion is
performed here.
3) IDU (In Door Unit)IDU converts between RF (Radio Frequency) signal and optical signal. To
establish ring network more then one IDU can be required.MUX
Here MUX are used to carry E1 from one site to the other site. BTS is connectedto the MUX via DDF. Here MUX can carry both data and voice traffic. MUX uses SDH
(Synchronous Digital Hierarchy) technology. Different types are:
Type Capacity
STM 0 21E1
STM-1 63E1STM-4 4x63 E1
STM-16 16x63 E1STM-64 64x63 E1STM-256 256x63 E1
Single E1 has a capacity of 2.048 Mbps. MSH11c (STM-1) and MSH41c (STM-4) areused in TTL.
4) DDF DDF stands for Digital Distribution Frame. DDF is a point where E1 isterminated. It provides only connectivity between two points.
5) BTSBTS stands for Base Station Transceiver Subsystem. BTS is connected with
GPS antenna via RF cable. The CDMA signal is processed by BTS. BTS include filters,
amplifier and other control module. BTS receive and transmit signal via sector antenna.
6) Sector antenna Sector antenna communicates with mobile. 360 Degree Is divided in to threeparts Alpha, Beta and Gamma. Also known as intra, metro and ultra. All three parts are
separated by maximum up to 120 degree. Here because of sector the coverage is increase.Sector antenna is a directional antenna.
7) GPS system A GPS stands for Global Positioning System. A GPS receiver is located in theBTS and is connected to antenna via RF cable. This provides synchronization signal and
timing signal to CDMA network for channel coding. This antenna communicates withsatellite continuously.
27
-
8/6/2019 DB4----FINAL
28/49
Introduction to E1 Link
What is E1?
E1 is a digital communication link that enables the transmission of voice,data, and video signals at the rate of 2.048 Mbps. It was introduced in the 1960s.
E1: -
Speech signal Fm=4 kHz. So from sampling theorem the freq = 2 * Fm= 8 kHzNow 1 byte is = 8 bit
Each channel have a rate of 8 kHz * 8 bit = 64 kbps
There are 32 channels - channel no 0 to 31. Channel no. 0 is used for synchronizationand channel 15 is used for signaling. Other 30 channels are used for communication.
So the total data rate is 32 * 64kbps = 2.048 Mbps
Communication Standard-Data Rates: -
Mainly there are two types of data rates:1.PDH: Plesiochronous data hierocracy (PDH) consists of E1, E2, E3, and E4communication standard. Mainly E1 is used.
2.SDH: Synchronous data hierocracy (SDH) consists of STM1, STM4, STM16,
and STM64. Mainly STM1 is used.
Why is E1 in demand?The current demand for E1 services can be linked to a number of tangible benefits.
1) Simplification
E1 simplifies the task of networking different types of communication equipment. To
illustrate, figure 1 shows what your companys communication network might be look
like without E1 and figure 2 shows companys communication network with E1 link.Figure shows that telephone, fax, and computer applications would all require separates
lines. Typically, voice and low speed data serviced by analogue line, while high-speed
data application like computer are serviced by digital line. In figure 2 same things isshown with E1 link installed.
E1 link carry both data and voice on a single digital communication link. In this way we
can reduce the task of managing many different network.
2) Quality of services
E1 also provides a signal, which is superior in quality, then the analogue signal
provides. In analogue signal, noise and distortion is also amplified so it degrades the
quality of signal. While, in E1 system because of signal regeneration we got exact signalat the receiver side.
28
-
8/6/2019 DB4----FINAL
29/49
-
8/6/2019 DB4----FINAL
30/49
How E1 works Making voice and data compatible: -Many benefits of E1 are attributable to the fact that voice and data
transmitted over a single digital communication link. Since computer data consists of
ones and zeros (the symbol of the binary system), it is already compatible with E1s
digital format. However, because voice signals are actually complex analogue waveform,they must be digitized to achieve compatibility with E1.
SDH-PDH: -
Introduction: - Traditionally, transmission systems have been asynchronous, with each terminal
in the network running on its own recovered clock timing. In digital transmission,timing is one of the most fundamental operations. Since these clocks are not
synchronized, large variations can occur in the clock rate and thus the signal bit rate.
So, synchronism is important in communication between two links.
To correctly understand the concepts and details of SDH, its important to be clearabout the meaning of Synchronous, Plesiochronous, and Asynchronous. In a set of
Synchronous signals, the digital transitions in the signals occur at exactly the same
rate. If two digital signals are Plesiochronous, their transitions occur at almost thesame rate, with any variation being constrained within tight limits. In the case of
Asynchronous signals, the transitions of the signals dont necessarily occur at the
same nominal rate. Asynchronous, in this case, means that the difference between twoclocks is much greater than a plesiochronous difference.
PDH (Plesiochronous Digital Hierarchy): - Traditionally, digital transmission systems and hierarchies have been
based on multiplexing signals, which are plesiochronous (running at almost the samespeed). Also, various parts of the world use different hierarchies which lead toproblems of international interworking; for example, between those countries using
1.544 Mbit/s systems (U.S.A. and Japan) and those using the 2.048 Mbit/s system.
To recover a 64 kbit/s channel from a 140 Mbit/s PDH signal, itsnecessary to demultiplex the signal all the way down to the 2 Mbit/s level before the
location of the 64 kbit/s channel can be identified. PDH requires steps (140-34, 34-
8, 8-2 demultiplex; 2-8, 8-34, 34-140 multiplex) to drop out or add an individual
speech or data channel (see Figure 1). This is due to the bit stuffing used at eachlevel.
PDH contains 16E1s and to drop any E1 at any site it was necessary todrop all the 16 E1s at the site and then required E1 is to be fetched from the mux
manually, and others are to be forwarded to further sites.
30
-
8/6/2019 DB4----FINAL
31/49
SDH (Synchronous Digital Hierarchy): - It is a standard for telecommunications transport formulated by the
International Telecommunication Union (ITU). Before SDH, the first generations of
fiber-optic systems in the public telephone network used proprietary architectures,
equipment line codes, multiplexing formats, and maintenance procedures. The usersof this equipment wanted standards so they could mix and match equipment from
different suppliers. The resulting international standard is known as (SDH).
Synchronizing SDH: The internal clock of an SDH terminal may derive itstiming signal from a Synchronization Supply Unit (SSU) used by switching systems
and other equipment. Thus, this terminal can serve as a master for other SDH nodes,
providing timing on its outgoing STM-N signal. Other SDH nodes will operate in a
slave mode with their internal clocks timed by the incoming STM -N signal.
To solve the problem, SDH is replacing PDH. SDH can contain up to 63
E1s for microwave and for fiber, it can be up to STM 256. In SDH, 63 lines fromODU comes to the add drop mux which drops required E1s to that exchange and
bypass other lines using software. It doesnt require dropping all lines, instead onlyrequired lines are taken.
SDH defines synchronous transport modules (STMs) for the fiber-opticbased transmission hierarchy.
31
-
8/6/2019 DB4----FINAL
32/49
CCS#7: -
Classification of Signalilng Systems: -1. Topological Classification: -In telecommunication network, two core functions can be found:
The information has to be transported in a cost efficient way from a source to
destination over a physical line = Transmission
In a telephone exchange, an inlet has to be through connected to the correctoutlet = Switching
This is shown in figure 1:
In order to be able to perform switching function, a communication will be
required between the calling subscriber and his own switching unit. This is the user
to network interface (UNI). A communication will also be required between each
switching unit and the next one in the call sequence. This is the network to network interface(NNI).
Thus, topologically, too large families of signaling systems can immediately beintroduced:
UNI Signaling System: - Analogue Subscriber Signaling System (ASSS)
Digital Subscriber Signaling System# 1 (DSS1)
Commonly Called ISDN Signaling or D- Channel protocol.
Digital Subscriber Signaling System # 2(DSS2)
The adoption of DSS1 for Broad band Purpose( ATM-Switching)
32
-
8/6/2019 DB4----FINAL
33/49
NNI Signaling system: - Channel Associated Signaling System (CAS)
Common Channel Signaling System # 7 (CCS#7)
2. Functional Classification: -At least two types of information will always have to be signaled between adjacent
points:
The intention to seize or to release a local line (for UNI) or a trunk circuit (for
NNI) = Line Signaling
The call destination will have to be passed from the register of previous step to
register of the next exchange = Register Signaling The line signals carry very simple information. Most of the signals used in CASare line signals, apart from the register signal, which carries the number information.
Line signals can be sent at any time during a call. By comparison, a register signal is
sent only once. Also, a register signal carries more complex information than a linesignal. Because of their differences, line and register signals are often handled by
different equipment. Line signalling equipment must be available for the entire
duration of a call. However, as a register signal is sent only once, register equipmentcan be freed quickly to deal with other calls.
33
-
8/6/2019 DB4----FINAL
34/49
Definition:
Signaling System 7 (SS7) is an architecture for performing out-of-band signaling
in support of the call-establishment, billing, routing, and information-exchange functions
of the public switched telephone network (PSTN). It identifies functions to be performedby a signaling-system network and a protocol to enable their performance.
What is Signaling?
Signaling refers to the exchange of information between call components required
to provide and maintain service.
As users of the PSTN, we exchange signaling with network elements all the time.
Examples of signaling between a telephone user and the telephone network include:
dialing digits, providing dial tone, accessing a voice mailbox, sending a call-waiting
tone, dialing *66 (to retry a busy number), etc.
SS7 is a means by which elements of the telephone network exchangeinformation. Information is conveyed in the form of messages. SS7 messages canconvey information. SS7 is characterized by high-speed packet data and out-of-band
signaling.
Signaling Network Architecture:
If signaling is to be carried on a different path from the voice and data traffic it
supports, then what should that path look like? The simplest design would be to allocate
one of the paths between each interconnected pair of switches as the signaling link.Subject to capacity constraints, all signaling traffic between the two switches could
traverse this link. This type of signaling is known as associated signaling, and is shown
below in Figure 1.
Figure 1. Associated Signaling
Associated signaling works well as long as a switchs only signalingrequirements are between itself and other switches to which it has trunks. If call setup and
management were the only application of SS7, associated signaling would meet that need
34
-
8/6/2019 DB4----FINAL
35/49
simply and efficiently. In fact, much of the out-of-band signaling deployed in Europe
today uses associated mode.
The North American implementers of SS7, however, wanted to design asignaling network that would enable any node to exchange signaling with any other SS7
capable node. Clearly, associated signaling becomes much more complicated when it is
used to exchange signaling between nodes which do not have a direct connection. Fromthis need, the North American SS7 architecture was born.
The North American Signaling Architecture:
The North American signaling architecture defines a completely new and
separate signaling network. The network is built out of the following three essentialcomponents, interconnected by signaling links:
Signal switching points (SSPs)SSPs are telephone switches (end officesor tandems) equipped with SS7-capable software and terminating signaling links.They generally originate, terminate, or switch calls.
Signal transfer points (STPs)STPs are the packet switches of the SS7network. They receive and route incoming signaling messages towards the properdestination. They also perform specialized routing functions.
Signal control points (SCPs)SCPs are databases that provide informationnecessary for advanced call-processing capabilities.
Once deployed, the availability of SS7 network is critical to call processing.
Unless SSPs can exchange signaling, they cannot complete any interswitch calls. For this
reason, the SS7 network is built using a highly redundant architecture. Each individualelement also must meet exacting requirements for availability. Finally, protocol has been
defined between interconnected elements to facilitate the routing of signaling traffic
around any difficulties that may arise in the signaling network.To enable signaling network architectures to be easily communicated and
understood, a standard set of symbols was adopted for depicting SS7 networks. Figure 2
shows the symbols that are used to depict these three key elements of any SS7 network.
Figure 2. Signaling Network Elements
STPs and SCPs are customarily deployed in pairs. While elements of a pair are not
generally co-located, they work redundantly to perform the same logical function. When
35
-
8/6/2019 DB4----FINAL
36/49
drawing complex network diagrams, these pairs may be depicted as a single element for
simplicity, as shown in Figure 3.
Figure 3. STP and SCP Pairs
Basic Signaling Architecture:
Figure 4 shows a small example of how the basic elements of an SS7 network are
deployed to form two interconnected networks.
Figure 4. Sample Network
The following points should be noted:
1. STPs W and X perform identical functions. They are redundant. Together, they are
referred to as a mated pair of STPs. Similarly, STPs Y and Z form a mated pair.
36
-
8/6/2019 DB4----FINAL
37/49
2. Each SSP has two links (or sets of links), one to each STP of a mated pair. All SS7
signaling to the rest of the world is sent out over these links. Because the STPs of a
mated pair are redundant, messages sent over either link (to either STP) will betreated equivalently.
3. The STPs of a mated pair are joined by a link (or set of links).
4. Two mated pairs of STPs are interconnected by four links (or sets of links). Theselinks are referred to as a quad.
5. SCPs are usually (though not always) deployed in pairs. As with STPs, the SCPs of a
pair are intended to function identically. Pairs of SCPs are also referred to as matedpairs of SCPs. Note that they are not directly joined by a pair of links.
6. Signaling architectures such as this, which provide indirect signaling paths between
network elements, are referred to as providing quasi-associated signaling.
SS7 Link Types:
SS7 signaling links are characterized according to their use in the signaling network.Virtually all links are identical in that they are 56kbps or 64kbps bi-directional datalinks that support the same lower layers of the protocol; what is different is their use
within a signaling network. The defined link types are shown in Figure 5 and defined asfollows:
Figure 5. Link Types
A Links:
A links interconnect an STP and either an SSP or an SCP, which are
collectively referred to as signaling end points ("A" stands for access). A links are usedfor the sole purpose of delivering signaling to or from the signaling end points (they
could just as well be referred to as signaling beginning points).Signaling that an SSP or SCP wishes to send to any other node is sent on
either of its A links to its home STP, which, in turn, processes or routes the messages.
Similarly, messages intended for an SSP or SCP will be routed to one of its home STPs,
which will forward them to the addressed node over its A links.B-Links:
37
-
8/6/2019 DB4----FINAL
38/49
The links between local STP pairs form a bridge over which messages can be
transferred from one local network to another. This links are called Bridge links or
simply B-links.
C Links:
C links are links that interconnect mated STPs. As will be seen later, they areused to enhance the reliability of the signaling network in instances where one or severallinks are unavailable. C stands for cross-links. Regardless of their name, their function
is to carry signaling messages beyond their initial point of entry to the signaling networktowards their intended destination.
D Links:The D denotes diagonal and describes the quad of links interconnecting
mated pairs of STPs at different hierarchical levels. Because there is no clear hierarchy
associated with a connection between networks, interconnecting links are referred to as
either B, D, or B/D links
E Links:
While an SSP is connected to its home STP pair by a set of A links, enhanced
reliability can be provided by deploying an additional set of links to a second STP pair.These links, called E (extended) links provide backup connectivity to the SS7 network in
the event that the home STPs cannot be reached via the A links. While all SS7 networks
include A, B/D, and C links, E links may or may not be deployed at the discretion of thenetwork provider. The decision of whether or not to deploy E links can be made by
comparing the cost of deployment with the improvement in reliability.
F Links:
F (fully associated) links are links which directly connect two signaling end
points. F links allow associated signaling only. Because they bypass the security featuresprovided by an STP, F links are not generally deployed between networks. Their use
within an individual network is at the discretion of the network provider.
Basic Call Setup Example:
Before going into much more detail, it might be helpful to look at several basiccalls and the way in which they use SS7 signaling (see Figure 6).
Figure 6. Call Setup Example
38
-
8/6/2019 DB4----FINAL
39/49
In this example, a subscriber on switch A places a call to a subscriber on switch B.
1. Switch A analyzes the dialed digits and determines that it needs to send the
call to switch B.2. Switch A selects an idle trunk between itself and switch B and formulates an
initial address message (IAM), the basic message necessary to initiate a call. TheIAM is addressed to switch B. It identifies the initiating switch (switch A), thedestination switch (switch B), the trunk selected, the calling and called numbers, as
well as other information beyond the scope of this example.
3. Switch A picks one of its A links (e.g., AW) and transmits the message overthe link for routing to switch B.
4. STP W receives a message, inspects its routing label, and determines that it is
to be routed to switch B. It transmits the message on link BW.
5. Switch B receives the message. On analyzing the message, it determines thatit serves the called number and that the called number is idle.
6. Switch B formulates an address complete message (ACM), which indicates
that the IAM has reached its proper destination. The message identifies the recipientswitch (A), the sending switch (B), and the selected trunk.
7. Switch B picks one of its A links (e.g., BX) and transmits the ACM over the
link for routing to switch A. At the same time, it completes the call path in thebackwards direction (towards switch A), sends a ringing tone over that trunk towards
switch A, and rings the line of the called subscriber.
8. STP X receives the message, inspects its routing label, and determines that it
is to be routed to switch A. It transmits the message on link AX.9. On receiving the ACM, switch A connects the calling subscriber line to the
selected trunk in the backwards direction (so that the caller can hear the ringing sent
by switch B).10. When the called subscriber picks up the phone, switch B formulates an answer
message (ANM), identifying the intended recipient switch (A), the sending switch
(B), and the selected trunk.
11. Switch B selects the same A link it used to transmit the ACM (link BX) and
sends the ANM. By this time, the trunk also must be connected to the called line inboth directions (to allow conversation).
39
-
8/6/2019 DB4----FINAL
40/49
12. STP X recognizes that the ANM is addressed to switch A and forwards it over
link AX.
13. Switch A ensures that the calling subscriber is connected to the outgoing trunk(in both directions) and that conversation can take place.
14. If the calling subscriber hangs up first (following the conversation), switch A
will generate a release message (REL) addressed to switch B, identifying the trunkassociated with the call. It sends the message on link AW.
15. STP W receives the REL, determines that it is addressed to switch B, and
forwards it using link WB.16. Switch B receives the REL, disconnects the trunk from the subscriber line,
returns the trunk to idle status, generates a release complete message (RLC)
addressed back to switch A, and transmits it on link BX. The RLC identifies the trunk
used to carry the call.17. STP X receives the RLC, determines that it is addressed to switch A, and
forwards it over link AX.
18. On receiving the RLC, switch A idles the identified trunk.
Database Query Example:
People generally are familiar with the toll-free aspect of 800 (or 888) numbers,
but these numbers have significant additional capabilities made possible by the SS7
network. 800 numbers are virtual telephone numbers. Although they are used to point to
real telephone numbers, they are not assigned to the subscriber line itself.When a subscriber dials an 800 number, it is a signal to the switch to suspend
the call and seek further instructions from a database. The database will provide either a
real phone number to which the call should be directed, or it will identify anothernetwork (e.g., a long-distance carrier) to which the call should be routed for further
processing. While the response from the database could be the same for every call (as, forexample, if you have a personal 800 number), it can be made to vary based on the callingnumber, the time of day, the day of the week, or a number of other factors.
The following example shows how an 800 call is routed (see Figure 7).
40
-
8/6/2019 DB4----FINAL
41/49
Figure 7. Database Query Example
1. A subscriber served by switch A wants to reserve a rental car at a company's
nearest location. She dials the company's advertised 800 number.2. When the subscriber has finished dialing, switch A recognizes that this is an800 call and that it requires assistance to handle it properly.
3. Switch A formulates an 800 query message including the calling and called
number and forwards it to either of its STPs (e.g., X) over its A link to that STP (AX).4. STP X determines that the received query is an 800 query and selects a
database suitable to respond to the query (e.g., M).
5. STP X forwards the query to SCP M over the appropriate A link (MX). SCP
M receives the query, extracts the passed information, and (based on its storedrecords) selects either a real telephone number or a network (or both) to which the
call should be routed.
6. SCP M formulates a response message with the information necessary toproperly process the call, addresses it to switch A, picks an STP and an A link to use
(e.g., MW), and routes the response.
7. STP W receives the response message, recognizes that it is addressed toswitch A, and routes it to A over AW.
8. Switch A receives the response and uses the information to determine where
the call should be routed. It then picks a trunk to that destination, generates an IAM,and proceeds (as it did in the previous example) to set up the call.
Layers of the SS7 Protocol:
As the call-flow examples show, the SS7 network is an interconnected set of
network elements that is used to exchange messages in support of telecommunicationsfunctions. The SS7 protocol is designed to both facilitate these functions and to maintain
the network over which they are provided. Like most modern protocols, the SS7 protocolis layered.
41
-
8/6/2019 DB4----FINAL
42/49
1. Physical Layer:
2. Message Transfer PartLevel 2
3. Message Transfer PartLevel 3
4. Signaling Connection Control Part:
5. ISDN User Part (ISUP):
6. Transaction Capabilities Application Part (TCAP):
7. Operations, Maintenance, and Administration Part (OMAP):
What Goes Over the Signaling Link:
Signaling information is passed over the signaling link in messages, which arecalled signal units (SUs).
Three types of SUs are defined in the SS7 protocol.
message signal units (MSUs) link status signal units (LSSUs)
fill-in signal units (FISUs)
SUs are transmitted continuously in both directions on any link that is in
service. A signaling point that does not have MSUs or LSSUs to send will send FISUsover the link. The FISUs perform the function suggested by their name; they fill up the
signaling link until there is a need to send purposeful signaling. They also facilitate link
transmission monitoring and the acknowledgment of other SUs.
All transmission on the signaling link is broken up into 8-bit bytes, referred toas octets. SUs on a link are delimited by a unique 8-bit pattern known as a flag. The flag
is defined as the 8-bit pattern "01111110". Because of the possibility that data within an
SU would contain this pattern, bit manipulation techniques are used to ensure that thepattern does not occur within the message as it is transmitted over the link. (The SU is
reconstructed once it has been taken off the link, and any bit manipulation is reversed.)
Thus, any occurrence of the flag on the link indicates the end of one SU and thebeginning of another. While in theory two flags could be placed between SUs (one to
mark the end of the current message and one to mark the start of the next message), in
practice a single flag is used for both purposes.
SWITCH: -
Network department is basically divided into two sections:(1) Transmission
(2) Switch.
Transmission section deals with transmission media, RF planning, BTSinstallation, NMS, etc.
42
-
8/6/2019 DB4----FINAL
43/49
Switch section deals with switching of call in MSC, daily health check of
switch, customer complain, etc.
Basically, all the switches are stored program control (SPC) based. In switch to
see the backend activities (ROP Read Only Printer) occurring in switch. We take it
through RJ-45 connector or Ethernet LAN to the terminal. In the terminal mainly twowindow are there:
(1) Command window
(2) Output window
Command window: command window is used to give a command for the
particular activity. For example to see the any alarm occur in switch room, we
directly give the command.
Output window: output window is used to see to output of particular activity
for the given command on command window. Using particular command, we checkthe status of any mobile subscriber using VLR.
In TTSL, basically two type of switch are used: Wireline and wireless. The vendors are
Lucent, Ericsson, Alcatel and Siemens.
Wireline switch:-For wire line, we use Lucent switch, which is totally hardware based. Because ofmore hardware part, it is bulky.
Lucent is user-friendly switch, because it is easily operatable.
Wireline switchs computer has connection with switch by serial port.It contains status of signaling links, faults and alarms related to that switch on the
screen. By giving appropriate command, status of signaling link is known.
(2) Wireless Switch: - Wireless switch is software based and it is compact switch compared
to Lucent switch.
For wireless, we use Ericsson switch.
Digital Path Quality Supervision: In this, 3 types of soft errors
occur:
1. Quality Service (QSV): If one of the 32 frames is lost, than voice is broken and thisalarm is indicated.
2. SESL2 (severely errored seconds): When synchronism in 1 second out of 1000 seconds
is dropped, this error occurs.3. UNACC (Unacceptable Performance): This error occur due to incorrect parity bits.
There are 4 types of alarms in ERICSSON:1. APZ: Software error alarm
2. APT: Hardware fault alarm
3. POW: Power failure alarm4. EXT: Fire alarms and temperature control, etc.
43
-
8/6/2019 DB4----FINAL
44/49
All the activities done during the week is stored in hard DAT tape. It will containall call details record (CDR) occurring during the week. Capacity to store the data vary
from different types of switch. Lucent contain 4GB of memory to store the data while inEricsson it will contain 24GB of data.
In tata indicom, from the level-5 to level-6 migration is going on. In this we have
to give and take the test call from all the short distance coverage area (SDCA), long
distance coverage area (LDCA) No., for particular given region, to check the connectivity
between any two SDCA or LDCA.
FIG. Differentiate between LDCA & SDCA.
In above fig., we differentiate between LDCA & SDCA. If call is going in same SDCA
then it is not forwarded to LDCA but if call is for other SDCA then it is forwarded to
LDCA and again call is forwarded to particular SDCA. In India any state or district is
work as a LDCA or SDCA.
Daily activities at OMC: -1. Health Check: - It includes hardware failure check, software errors,
interconnectivity with different operators, trunk group status check, etc. REX(Regular Exercise) is also a part of health check, which includes hardware diagnosis.
44
GUJRAT
GUJRAT
-
8/6/2019 DB4----FINAL
45/49
2. Customer Complaints: - There is ORACLE software for complaints. These
complaints are analysed and checked that is it related to routing, level opening, etc.
and necessary steps are taken to solve these problems.
3.Augmentation: - It includes increasing no. of trunk groups as per therequirements and hence ASR is increased.
CDR (Call Detail Report): - CDR is for billing purpose. It contains call relatedinformation like start time, end time, duration, A number, B number.
Infrastructure equipment: -A CDMA system requires three pieces of infrastructure equipment. They are
Main Switching Centre (MSC)
Base Station Controller (BSC)
Base Station Transceiver Subsystem (BTS).
Description of Individual Components: - Mobile Switching Center (MSC)
The MSC coordinates traffic and signaling within the CCLN. It is responsible
for setup, routing and supervision of calls to and from mobile subscribers. Many other
functions are implemented in the MSC.
Gateway MSC (GMSC): - The GMSC is an MSC which contains the gatewayfunctionality, i.e. interrogating the HLR at the set-up of a mobile-terminating call. The
GMSC has two distinct functions:
Roaming Interrogation (requesting the HLR to send routing
information)
Roaming Rerouting or Call forwarding.
MSC IN THE NETWORK: -Mobile Switching Center (MSC) is the central unit of the network. Each and
every call must terminate at the MSC. It is an intelligent unit. It is used to route the calls.
MSC connects with the other network units as shown in the diagram.
45
-
8/6/2019 DB4----FINAL
46/49
BTS: Base Transreceiver Station
BSC: Base Station ControllerMSC: Mobile Switching Center
HLR: Home Location RegisterRLU: Remote Location Unit
WIRE LINE SW: Wire line SwitchThe signal from subscriber comes through BTS and BSC to MSC.MSC is connected to
the HLR, which contains the database of each and every subscriber. Every time HLR is
referred, whenever a mobile call is made, for authentication of the subscriber. At MSCthe routing is takes place. The incoming call is routed to desired BSC and BTS in case of
called party is another mobile. In case of called party is wire line phone, and then the
46
B
S
C
MSC
WIRE
LINE SW
HLR
MSC OF
OTHER
OPERATOR
MSC AND
WIRE LINE
SW OF
OTHER
OPERATOR
B
T
S
-
8/6/2019 DB4----FINAL
47/49
connection is transferred from MSC to the wire line switch. If the called party is near at
the switch, then the calledis transferred directly to the party over copper cable. In casecalled party is at far from switch then the call is transferred to RLU.RLU serve to thatparty. In case the called party belongs to the other service provider, then there isPOI,where different service providers interconnect through each other. The call is transferred
from one service provider to the other one
BSC: -The Base Station Controller (BSC) is part of the link between the BTS and the
MTSO. It
Performs vocoding of the voice signal
Routes calls to the MTSO
Handles call control processes
Maintains a database of subscribers
Maintains records of calls for billing
BTS: -Functions of BTS:
The BTS includes an antenna for transmitting and receiving
Radio frequency signals i.e. it caters to the traffic.
It also performs the CDMA processing of all signals.
The BTS attaches to an antenna. The antenna's three-sided design includesthree sectors called alpha, beta, and gamma, each of which can be further
subdivided.
Adding sectors to a BTS increases its capacity. Each sector operates like anindependent BTS.
BTS sectorization requires additional hardware within the BTS unit.
Home Location Register (HLR): -Each operator has a database with information about all subscribers
belonging to that specific service provider. It is used for the following purposes:
Registering subscribers MDN and IMSI numbers.
Storing subscribers categories and services.Keeping track of which MSC/VLR is serving the subscriber.
Ordering a serving MSC/VLR to delete its record about a subscriber.
Visitor Location Register (VLR): -The VLR is implemented in the same switch as the MSC, which is then
referred to as an MSC/VLR.
47
-
8/6/2019 DB4----FINAL
48/49
It contains temporary information about the mobile subscriber visiting this
specific MSC/VLR Service Area.
It also performs location updating of the HLR.
The VLR contains a copy of the subscriber information in the HLR, but also
more detailed information about the subscribers location (which Location Area
they are registered in). Since VLR has a set of information about the mobile subscriber in its Service
Area, the HLR does not need to be consulted about subscriber data very often.
This considerably reduces the signaling to HLR.
Switch Identification in CCS#7 network: - To identify particular switch, each switch has its own signaling point codewhich differentiates the specific switch.
When call is routing from one switch to other, the destination switch is identifiedby its signaling point code.
Switch to switch connection is identified with reference of number of E1s
between these two switches.
Each E1 has 32 time slots or trunk circuits. These trunk circuits are divided ingroups. There are two types of trunk groups: FWT and C-MO i.e. as per ex., 16 trunk
circuits are used for FWT and others for C-MO.
CIC (Circuit Identification Code): It is code used in software to check the 1-to-1
connection between two E1 circuits. Whenever new E1 between two points is added
1-to-1 connection must be there i.e. trunk circuit number 1 of one switch must beconnected to the trunk circuit number 1 of remote location of switch.
Point of Interconnection (POI): - It is connection unit between E1s of two switches at MSC.
Performance of POI: -
ASR (Answer to Seizure Ratio): - This ratio defines how many channels out of
occupied channels are actually used. Others, which are wasted, includes no. ofreasons like call failure because of no reply, wrong dialed no., busy no., destination
out of order, internetworking unspecified (CAS-CCS 7 conversion), etc.
Because of above reasons, the ASR is decreased. Through bifurcation, ASR ratio
can be increased. By analyzing the numbers through levels, like analysis on level 2,level 28, level 281, etc., minimizes the wastage occupation of lines and hence no. of
lines seized in actual communication are increased, and hence ASR is increased.
Forward Backward Hunting: - Whenever new E1s between any two service
providers are established, forward and backward hunting is provided. Suppose,
between TATA and AIRTEL, there are 60 trunk lines are provided, then it is decided
that when subscriber of TATA will initiate a call, he will be given a channel from no.60,59,etc. in descending order which is called backward hunting, and for AIRTEL
48
-
8/6/2019 DB4----FINAL
49/49
subscriber, channel no.s will be 1, 2, 3, etc. which is called forward hunting. So that
there is no clash in channel occupation and channels are easily assigned. TATA
prefers backward hunting.
Current activity at TTSL: - Recently main activity done at TTSL is level 5 to 6 migration for FWT. At
present, TATA is running on level 5, and because of no. of subscribers increasing,
they are changing their numbers for FWT to level 6 as per the information from TRAI(Telecom Regulatory Authority of India).
The subscribers numbers detail is stored in HLR based on the ESN number. In
migration, numbers are changed in HLR and routing is provided for calls.
At a time 10 no.s for particular subscriber in HLR can be created and only one
can be activated.
Test calls are done for checking that call is through between two lines of different
operators and TTSL. It is the process of routing. If the line is not through, we willhave to check the routing path for this line.