Free Essay

Cdma

In:

Submitted By sadiqur
Words 5829
Pages 24
CDMA Tutorial

1

Intuitive Guide to Principles of Communications www.complextoreal.com

Code Division Multiple Access (CDMA)
The Concept of signal spreading and its uses in communications Let’s take a stright forward binary signal of symbol rate 2.

Figure 1 – A binary information signal To modulate this signal, we would multiply this sequence with a sinusoid and its spectrum would look like as In figure 2. The main lobe of its spectrum is 2 Hz wide. The larger the symbol rate the larger the bandwidth of the signal.

Figure 2 – Spectrum of a binary signal of rate 2 bps Now we take an another binary sequence of data rate 8 times larger than of sequence shown in Fig. 1.

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

2

Figure 3 – A new binary sequence which will be used to modulate the information sequence Instead of modulating with a sinusoid, we will modulate the sequence 1 with this new binary sequence which we will call the code sequence for sequence 1. The resulting signal looks like Fig. 4. Since the bit rate is larger now, we can guess that the spectrum of this sequence will have a larger main lobe.

Figure 4 – Each bit of sequence 1 is replaced by the code sequence The spectrum of this signal has now spread over a larger bandwidth. The main lobe bandwidth is 16 Hz instead of 2 Hz it was before spreading. The process of multiplying the information sequence with the code sequence has caused the information sequence to inherit the spectrum of the code sequence (also called the spreading sequence).

Figure 5 – The spectrum of the spread signal is as wide as the code sequence The spectrum has spread from 2 Hz to 16 Hz, by a factor of 8. This number is called the the spreading factor or the processing gain (in dBs) of the system. This process can also

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

3

be called a form of binary modulation. Both the Data signal and the modulating sequence in this case are binary signals. If original signal is x(t) of power Ps, and the code sequence is given by g(t), the resultant modulated signal is s (t ) = 2 Ps d (t ) g (t )

The multiplication of the data sequence with the spreading sequence is the first modulation. Then the signal is multiplied by the carrier which is the second modulation. The carrier here is analog. s (t ) = 2 Ps d (t ) g (t ) sin(2πf c t ) On the receive side, we multiply this signal again with the carrier. What we get is this. rcv(t ) = 2 Ps d (t ) g (t ) sin 2 (2πf c t ) By the trigonometric identity sin 2 (2πf c t ) = 1 − cos(4πf c t ) we get rcv (t ) = 2 Ps d (t ) g (t )(1 − cos(4π fc t ))

Where the underlined part is the double frequency extraneous term, which we filter out and we are left with just the signal. rcv(t ) = 2 Ps d (t ) g (t ) Now we multiply this remaining signal with g(t), the code sequence and we get rcv(t ) = 2 Ps d (t ) g (t ) g (t ) Now from having used a very special kind of sequence, we say that correlatation of g(t) with itself (only when perfectly aligned) is a certain scalar number which can be removed, and we get the original signal back. rcv(t ) = 2 Ps d (t )

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

4

In CDMA we do modulation twice. First with a binary sequence g(t), the properties of which we will discuss below and then by a carrier. The binary sequence modulation ahead of the carrier modulation accomplishes two functions, 1. It spread the signal and 2. It introduces a form of encryption because the same sequence is needed at the receiver to demodulate the signal. In IS-95 and CDMA 2000 we do this three times, once with a code called Walsh, then with a code called Short Code and then with one called Long code.

Properties of spreading codes Multiplication with the code sequence which is of a higher bit rate, results in a much wider spectrum. The ratio of the code rate to the information bit rate is called both the spreading factor and the processing gain of the CDMA system. In IS-95, the chipping rate is 1.2288 and the spreading factor is 64. Processing gain is usually given in dBs. To distinguish the information bit rate from the code rate, we call the code rate, chipping rate. In effect, we take each data bit and convert it into k chips, which is the code sequence. We call it the chipping rate because the code sequence applied to each bit is as you can imagine it chipping the original bit into many smaller bits. For CDMA spreading code, we need a random sequence that passes certain “quality” criterion for randomness. These criterion are 1. The number of runs of 0’s and 1’s is equal. We want equal number of two 0’s and 1’s, a length of three 0’s and 1’s and four 0’s and 1’s etc. This property gives us a perfectly random sequence. 2. There are equal number of runs of 0’s and 1’s. This ensures that the sequence is balanced. 3. The periodic autocorrelation function (ACF) is nearly two valued with peaks at 0 shift and is zero elsewhere. This allows us to encrypt the signal effectively and using the ACF peak to demodulate quicklt. Binary sequences that can meet these properties are called optimal binary sequences, or pseudo-random sequences. There are many classes of sequences that mostly meet these requirements, with m-sequences the only ones that meet all three requirements strictly. These sequences can be created using a shift-registers with feedback-taps. By using a single shift-register, maximum length sequences can be created and called often by their shorter name of m-sequence, where m stands for maximum. m-sequences and the Linear Feed Shift-Register

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

5

1

2

3

3 stage LFSR generating m-sequence of period 7., using taps 1 and 3.

1

2

3

Another 3 stage LFSR generating m-sequence of period 7, using taps 2 and 3 Figure 6 – The structure of linear feedback registers (LFSR) from which m-sequences can be created m–sequences are created using linear feedback registers (LFSR). Figure 6 shows a three register LFSR with two different tap connection arrangements. The tap connections are based on primitive polynomials on the order of the number of registers and unless the polynomial is irreducible, the sequence will not be a m-sequence and will not have the desired properties. Each configuration of N registers produces one sequence of length 2N. If taps are changed, a new sequence is produced of the same length. There are only a limited number of m-sequences of a particular size. The cross correlation between an m-sequences and noise is low which is very useful in filtering out noise at the receiver. The cross correlation between any two different msequences is also low and is useful in providing both encryption and spreading. The low amount of cross-correlation is used by the receiver to discriminate among user signals generated by different m-sequences. Think of m-sequence as a code applied to each message. Each letter (bit) of the message is changed by the code sequence. The spreading quality of the sequence is an added dimensionality and benefit in CDMA systems. Gold sequences Combining two m-sequences creates Gold codes. These codes are used in asynchronous CDMA systems.

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

6

Gold sequences are an important class of sequences that allow construction of long sequences with three valued Auto Correlation Function ACFs. Gold sequences are constructed from pairs of preferred m-sequences by modulo-2 addition of two maximal sequences of the same length. Gold sequences are in useful in non-orthogonal CDMA. (CDMA 2000 is mostly an orthogonal CDMA system) Gold sequences have only three cross-correlation peaks, which tend to get less important as the length of the code increases. They also have a single auto-correlation peak at zero, just like ordinary PN sequences. The use of Gold sequences permits the transmission to be asynchronous. The receiver can synchronize using the auto-correlation property of the Gold sequence. .

1

2

3 EX-OR

1

2

3

Figure 7 – Generating Gold codes by combining two preferred pairs of m-sequences More codes IS-95 and IS-2000 use two particular codes that are really m-sequences but have special names and uses. These are called long codes and short codes. Long code The Long Codes are 242 bits (created from a LFSR of 42 registers) long and run at 1.2288 Mb/s. The time it takes to recycle this length of code at this speed is 41.2 days. It is used to both spread the signal and to encrypt it. A cyclically shifted version of the long code is generated by the cell phone during call setup. The shift is called the Long Code Mask and is unique to each phone call. CDMA networks have a security protocol called CAVE that requires a 64-bit authentication key, called A-key and the unique ESN (Electronic Serial Number, assigned to mobile based on the phone number). The network uses both of these to create a random number that is then used to create a mask for the long code used to encrypt and spread each phone call. This number, the long code mask is not fixed but changes each time a connection is created.

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

7

There is a Public long code and a Private long code. The Public long code is used by the mobile to communicate with the base during the call setup phase. The private long code is one generated for each call then abandoned after the call is completed. Short code The short code used in CDMA system is based on a m-sequence (created from a LFSR of 15 registers) of length 215 – 1 = 32,767 codes. These codes are used for synchronization in the forward and reverse links and for cell/base station identification in the forward link The short code repeats every 26.666 milliseconds. The sequences repeat exactly 75 times in every 2 seconds. We want this sequence to be fairly short because during call setup, the mobile is looking for a short code and needs to be able find it fairly quickly. Two seconds is the maximum time that a mobile will need to find a base station, if one is present because in 2 seconds the mobile has checked each of the allowed base stations in its database against the network signal it is receiving. Each base station is assigned one of these codes. Since short code is only one sequence, how do we assign it to all the stations? We cyclically shift it. Each station gets the same sequence but it is shifted. From properties of the m-sequences, the shifted version of a m-sequences has a very small cross correlation and so each shifted code is an independent code. For CDMA this shift is 512 chips for each adjacent station. Different cells and cell sectors all use the same short code, but use different phases or shifts, which is how the mobile differentiates one base station from another. The phase shift is known as the PN Offset. The moment when the Short code wraps around and begins again is called a PN Roll. If I call the word “please” a short code, then I can assign, “leasep” to one user, “easepl” to another and so on. The shift by one letter would be my PN Offset. So if I say your ID is 3, then you would use the code “aseple”. A mobile is assigned a short code PN offset by the base station to which it is transmitting. The mobile adds the short code at the specified PN offset to its traffic message, so that the base station in the region knows that the particular message is meant for it and not to the adjacent base station. This is essentially the way the primary base station is identified in a phone call. The base station maintains a list of nearby base stations and during handoff, the mobile is notified of the change in the short code. There are actually two short codes per base station. One for each I and Q channels to be used in the quadrature spreading and despreading of CDMA signals. Walsh codes In addition to the above two codes, another special code, called Walsh is also used in CDMA. Walsh codes do not have the properties of m-sequences regarding cross correlation.. IS-95 uses 64 Walsh codes and these allow the creation of 64 channels from

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

8

the base station. In other words, a base station can talk to a maximum of 64 (this number is actually only 54 because some codes are used for pilot and synch channels) mobiles at the same time. CDMA 2000 used 256 of these codes. Walsh codes are created out of Haddamard matrices and Transform. Haddamard is the matrix type from which Walsh created these codes. Walsh codes have just one outstanding quality. In a family of Walsh codes, all codes are orthogonal to each other and are used to create channelization within the 1.25 MHz band. Here are first four Hadamard matrices. The code length is the size of the matrix. Each row is one Walsh code of size N. The first matrix gives us two codes; 00, 01. The second matrix gives: 0000, 0101, 0011, 0110 and so on.

⎛0 H1 = ⎜ ⎜0 ⎝
⎛0 ⎜ ⎜0 H2 = ⎜ 0 ⎜ ⎜0 ⎝ 0 1 0 1 0 0 1 1

0⎞ ⎟ 1⎟ ⎠
0⎞ ⎟ 1⎟ 1⎟ ⎟ 0⎟ ⎠

⎛0 ⎜ ⎜0 ⎜0 ⎜ ⎜0 H3 = ⎜ ⎜0 ⎜0 ⎜ ⎜0 ⎜0 ⎝

0 1 0 1 0 1 0 1

0 0 1 1 0 0 1 1

0 1 1 0 0 1 1 0

0 0 0 0 1 1 1 1

0 1 0 1 1 0 1 0

0 0 1 1 1 1 0 0

0⎞ ⎟ 1⎟ 1⎟ ⎟ 0⎟ 1⎟ ⎟ 0⎟ ⎟ 0⎟ 1⎟ ⎠

In general each higher level of Hadamard matrix is generated from the previous by the Hadamard transform

⎛H H N +1 = ⎜ N ⎜H ⎝ N

HN ⎞ ⎟ HN ⎟ ⎠

Where H N is the inverse of H N .

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

9

Their main purpose of Walsh codes in CDMA is to provide orthogonality among all the users in a cell. Each user traffic channel is assigned a different Walsh code by the base station. IS-95 has capability to use 64 codes, whereas CDMA 2000 can use up to 256 such codes. Walsh code 0 (which is itself all 0s) is reserved for pilot channels, 1 to 7 for synch and paging channels and rest for traffic channels. They are also used to create an orthogonal modulation on the forward link and are used for modulation and spreading on the reverse channel. Orthogonal means that cross correlation between Walsh codes is zero when aligned. However, the auto-correlation of Walsh-Hadamard codewords does not have good characteristics. It can have more than one peak and this makes it difficult for the receiver to detect the beginning of the codeword without an external synchronization. The partial sequence cross correlation can also be non-zero and un-synchronized users can interfere with each other particularly as the multipath environment will differentially delay the sequences. This is why Walsh-Hadamard codes are only used in synchronous CDMA and only by the base station which can maintain orthogonality between signals for its users.

Walsh code No. User 1

Long code

Short code
Channel with distortions Channel with distortions
Base Station 2

Short code

Walsh Long code code No. User 1

WS 1 User 2 WS 2 User 3 WS 3

Mask 1

BS 1 SC

BS2 SC

Mask 1

WS 1 User 2

Base Station 1

Mask 2

BS 1 SC

Base Station 3

BS 1 SC

Mask 2

WS 2 User 3

Mask 3

BS 1 SC

BS 3 SC

Mask 3

WS 3

Figure 8 – Relationship codes used in CDMA

The above is simplified look at the use of these codes. Assume there are three users in one cell. Each is trying to talk to someone else. User 1 wants to talk to someone who is outside its cell and is in cell 2. User 3 wants to talk to someone in cell 3. Let’s take User 1. Its data is first covered by a channel Wash code, which is any Walsh code from 8 to 63. It is assigned to the user by the base station 1 in whose cell the mobile is located. The Base Station has also assigned different Walsh codes to users 2 and 3. All three of these are different are assigned by base station 1 and are orthogonal to each other. This keeps the data apart at the base station. Now based on the random number assigned by the BS, the mobile generates a long code mask (which is just the starting point of the long code sequence and is a scalar number). It now multiplies the signal by

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

10

this long code starting at the mask ID. Now it multiplies it by the short code of the base station to whom it is directing the signal. When the base station receives this signal, it can read the long code and see that the message needs to be routed to base station 2. So it strips off 1st short code and adds on the short code of base station 2 which is then broadcast by the BS 1 to BS 2 or sent by landlines. BS2 then broadcasts this signal along to all mobiles in its cell. The users who is located in this cell, now does the reverse. It multiplies the signal by the BS 2 short code (it knows nothing about BS 1 where the message generated) then it multiplies the signal by the same long code as the generating mobile. How? During the call paging, the mobile was given the same random number from which it creates the same long code mask. After that it multiplies it by the Walsh code sequence (also relayed during call setup). So that’s about it with some additional bells and whistles, which we shall get to shortly. Channel waveform properties The communications between the mobile and the base station takes place using specific channels. Figure below shows the architecture of these channels. The forward channel (from base station to mobile) is made up of the following channels: Pilot channel (always uses Walsh code W0) (Beacon Signals) Paging channel(s) (use Walsh codes W1-W7) Sync channel (always uses Walsh code W32) Traffic channels (use Walsh codes W8-W31 and W33-W63) The reverse channel (from mobile to base station) is made up of the following channels: Access channel Traffic channel

Figure 9 – Forward channel Forward Channel description

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

11

A base station can communicate on up to 64 channels. It has one pilot signal, one synch channel and 8 paging channels. The remaining are used for traffic with individual mobiles.
Walsh 0 All 0's Pilot Channel

Sync Channel Synch data at 1.2 kb/s
Convolutional Encoder r = 1/2 Symbol Repetition Interleaver

Walsh 32 4.8 kb/s

Paging Channel Paging a mobile
Convolutional Encoder r = 1/2 Symbol Repetition Interleaver

Walsh 1-7

19.2 kb/s
1 to 64 Decimator

Paging channel mask

Long Code

Traffic Channel Data mobile
Convolutional Encoder r = 1/2 Symbol Repetition Interleaver MUX

Walsh x

Traffic Channel mask

Long Code

1 to 64 Decimator

Power Control Bits

Base Station Short Code for I channel
LPF I Q LPF

Cos(ωt)

Sin(ωt)

Base Station Short Code for Q channel

Figure 10 – Forward channel is the transmission of all traffic from the base station within its cell. All data is sent simultaneously.

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

12

Pilot Channel Let’s start with how the base station establishes contact with the mobiles within its cell. It is continually transmitting an all zero signal, which is covered by a Walsh code 0, a all 0’s code. So what we have here is a one very long bit of all zeros. For this reason, the pilot channel has very good SNR making it easy for mobiles to find it. This all zero signal is then multiplied by the base stations’ short code, which if you recall is the same short code that all base station use, but each with different PN offset. Pilot PN Offsets are always assigned to stations in multiples of 64 chips, giving a total of 512 possible assignments. The 9-bit number that identifies the pilot phase assignment is called the Pilot Offset. This signal is real so it only goes out on the I channel, and is up-converted to the carrier frequency which in the US is 845 MHz. On the receive side, the mobile picks up this signal and notes the base station that is transmitting it. Here is a question, if the short code is cyclical, how does the receiver know what the phase offset is. Do not all the signals from all the other nearby base stations look the same? Yes, and the mobile at this point does not know which base station it is talking to, only that it has found the network. To determine of all the possible base station and there can 256 of them, each using a 512 chip shifted short code, the network uses the GPS signal and timing. The zero offset base station aligns its pilot transmission with every even second time tick of GPS. So let’s say that your mobile is in the cell belonging to a base station with PN offset ID of 10. That means that is will start its transmission 10 x 512 chip = 5120 chips after every even second time tick. So when the mobile wakes up and looks at it time, it knows exactly where each base station short code should be. Then all it has to do is to do a correlation of the bits it is seeing with each of the 256 possible sequences. Of course, it tries the base station where it was last but if it has been moved then theoretical it will have to go through all 256 correlations to figure out where it is. But it does do it and at the end of the process, it knows exactly which of the base stations it is hearing.

100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110 100101110

100101110 100101110 100101110 100101110 100101110 100101110

100101110 100101110 100101110 100101110 100101110

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

13

Figure 11 – The mobile looks for the code that aligns with GPS timing. It picks off the code received at this time, does a correlation with stored data and knows which base station it has found. Synch Channel The Synch channel information includes the pilot offset of the pilot the mobile has acquired. This information allows the mobile to know where to search for the pilots in the neighbor list. It also includes system time, the time of day, based on Global Positioning Satellite (GPS) time. The system time is used to synchronize system functions. For instance, the PN generators on the reverse link use zero offset relative to the even numbered seconds in GPS time. However, the mobiles only know system time at the base stations plus an uncertainty due to the propagation delay from its base station to the mobile's location. The state of the long code generator at system time is also sent to the mobile in the Synchronization message. This allows the mobile to initialize and run its long code generator very closely in time synchronism with the long code generators in the base stations. The Synchronization message also notifies the mobile of the paging channel data rate, which may be either 4800 or 9600 bits/sec. The data rate of this channel is always 1200 bps. Paging Channel Now the mobile flashes the name of the network on its screen and is ready to receive and make calls. Your paging channel may now be full of data. It may include a ring tone or a “voicemail received” message. The data on the paging channel sent by the base station, includes mobile Electronic Serial Identification Number (ESIN), and is covered by a long code. How does the mobile figure out what this long code is? At the paging level, the system uses a public long code. This is because it is not talking to a specific mobile, it is paging and needs to reach all mobiles. When the correct mobile responds, a new private long code will be assigned at that time before the call will be connected. The mobile while scanning the paging channel recognizes its phone number and responds by ringing. When you pick up the call, an access message goes back to the base station. The mobile using Qualcomm CDMA generatse a 18-bit code. The mobile sends this authentication sequence to the base station during the sync part of the messaging protocol. The base station checks the authentication code before allowing call setup. It then issues a random number to the mobile, which the mobile uses in the CAVE algorithm to generate a call specific long code mask. At the same time, the base station, will also do exactly that. The two now have the same long code with which to cover the messages. Traffic Channel The base station can transmit traffic data to as many as 54 mobiles at the same time. It keeps these channel separate by using Walsh codes. This is a code division multiplexing rather than a frequency based channelization. Walsh codes are used only by the base

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

14

station and in this fashion, it is a synchronous CDMA on the forward link, whereas on the return link it is asynchronous CDMA, because there is no attempted separation between the various users. But the use of m-sequences for spreading, the quality of orthogonality although not perfect is very very good. The traffic channel construct starts with baseband data at 4.8 kbps. It is then convolutionally encoded at rate of ½, so the data rate now doubles to 9.6 kbps. Symbol repetition is used to get the data rate up to 19.2 kbps. All information rates are submultiples of this rate. Data is then interleaved. The interleaving does not change the data rate, only that the bits are reordered to provide protection against burst errors. Now at this point, we multiply the resulting data sequences with the long code, which starts at the point determined by the private random number generated by both the base station and the mobile jointly. This start point is call-based and changes every time. Mobiles do not have a fixed long code assigned to them. Reverse CDMA Channel can have up to 242-1 logical channels or the total number of calls that can be served are 17179869184. Now the data is multiplied by a specific Walsh codes which is the nth call that the base station is involved in. Mobile already knows this number from the paging channel. The base station then combines all its traffic channels (each covered by a different Walsh code) and all paging channels (just 8) and the one pilot channel and one synch channel adds them up, does serial to parallel conversion to I and Q channels. Each is then covered by a I and a Q short code and is QPSK modulated up to carrier frequencies and then transmitted in the cell. Reverse Channels In IS-95, there are just two channels on which the mobile transmits, and even that never simultaneously. It is either on the access channel or it is transmitting traffic. The channel structure is similar but simpler to the forward channel, with the addition of 64-ary modulation.

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

15

Access Channel
Convolutional Encoder r = 1/3 Symbol Repetition Interleaver 64-ary Modulation

A Access Channel

Traffic Channel Data mobile
Convolutional Encoder r = 1/3 Symbol Repetition Interleaver 64-ary Modulation

Traffic Channel
Burst randomizer

T

Base Station Short Code for I channel
LPF

Cos(ωt)

Access Channel Traffic Channel
Long Code Generator

I Q LPF Half Sym delay

Sin(ωt)

Long Code Traffic Mask From Base Station

Base Station Short Code for Q channel

Figure 12 – Reverse Channel - from mobile to base station communication 64-ary modulation This block takes a group of six incoming bits (which makes 26 = 64 different bit sequences of 6 bits) and assigns a particular Walsh code to each. We know that each Walsh code sequence is orthogonal to all the others so in this way, a form of spreading has been forced on the arbitrarily created symbols of 6 bits. And this spreading also forces the symbols to be orthogonal. It is not really a modulation but is more of a spreading function because we still have not up converted this signal to the carrier frequency. After this, a randomization function is employed to make sure we do not get too many 0’s or 1’s in a row. This is because certain Walsh codes have a lot of consecutive 0’s. Next comes multiplication with the long code starting at a particular private start point. Then comes serial to parallel conversion, and application of baseband filtering which can be a Gaussian or a root cosine shaping. Then the Q channel (or I, it makes no difference) is delayed by half a symbol, as shown below. The reason this is done is to turn this into an offset QPSK modulated signal. The

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

16

offset modulated signal has a lower non-linearity susceptibility and is better suitable to being transmitted by a class C amplifier such as may be used in a CDMA cell phone. From there, each I and Q channel is multiplied by the rf carrier, (a sine and a cosine of frequency fc) and off the signal goes to the base station. On the demodulation side, the most notable item is the Rake receiver. Due to the presence of multipath, Rake receivers which allow maximal combining of delayed and attenuated signal, make the whole thing work within reasonable power requirements. Without Rake receivers, your cell phone would not be as small as it is. Power control Assume that there is only one user of the system. The carrier power C = SNR = Eb/Tb = R Eb If we define the transmit power equal to W and signal bandwidth equal to B, then the Interference power at the receiver is equal to I = W N0 Now we can write
E /N C R Eb = = b 0 I W N0 W /R

The quantity W/R is the processing gain of the system. Now let’s call M the number of users in this system. The total interference power is equal to

I = C ( M − 1)
Substituting this in the above equation, we get,

C C 1 = = I C ( M − 1) M − 1 and with one more substitution we get
C Eb / N0 1 = = I W /R M −1 W 1 M ≈ M −1 = R Eb / N 0

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

17

So we conclude that the system capacity is a direct function of the processing gain for a given Eb/N0. What you may not have noticed is that we made an assumption that all users have similar power level so the interferences are additive. No one user overwhelms all the others. If the power levels of all users are not equal then the system capacity is compromised and the C/I expression above is not valid. The CDMA systems manage the power levels of all mobiles so that the power level of each mobile is below a certain required level and is about the same whether the mobile is very close to the base station or far at the edge of the cell. Multipath and fading also attenuate power levels so the system maintains a power control loop. IS-95 has a open-loop and a closed loop power management system. The open loop is a quicker way to manage power levels. The forward and reverse links are at different frequencies so they fade differently and open loop power control allows the mobile to adjust its power without consulting with the base station. In closed loop power control the base station measures the power level of the access channel signal sent by the mobile and then commands with 1 in the synch channel if the power needs to be raised and with 0 if it is to be reduced by 1 dB at a time. The closed loop power control also uses an outer loop power control. This method measures the Frame Error Rate (FER) both by the mobile and the base station and then adjusts the power according to whether the FER is acceptable.

CDMA 2000 This is an evolution and extension of capabilities and builds on the IS-95 standard. One of the big ways in which CDMA 2000 differs from IS-95 is that it includes beam forming. Each base station cell is now divided in three sectors such that frequency is reused. This increases the gain at the mobile and allows better SNR and a larger number of users. The other significant way that IS-2000 differs from IS-95 is that it allows additional forward and reverse channels. Some of these channels are the same as IS-95 and others are new. Spreading codes are also changed to allow larger data rates. The 1.25 MHz channel with the 1.2288 mbps spreading rate called 1X can now be 3X 93 x 1.2288 mbs) or 5X (5 x 1.2288 mbps)

Copyright, 2006 Charan Langton All Rights reserved Other tutorials at www.complextoreal.com

Copyright 2002 Charan Langton

www.complextoreal.com

CDMA Tutorial

18

Copyright 2002 Charan Langton

www.complextoreal.com

Similar Documents

Free Essay

Gprs and Cdma

...MOBILE COMPUTING ASSIGNMENT NAME: SOPHIA EHINOMEN ATIVIE MATRIC NO: 2010/1336 DEPT: INFORMATION TECHNOLOGY 1. CDMA (CODE DIVISION MULTIPLE ACCESS). CDMA (Code-Division Multiple Access) is a channel access method used by various radio communication technologies. It is a form of multiplexing, which allows numerous signals to occupy a single transmission channel, optimizing the use of available bandwidth. The technology is used in ultra-high-frequency (UHF) cellular telephone systems in the 800-MHz and 1.9-GHz bands. CDMA employs analog-to-digital conversion (ADC) in combination with spread spectrum technology. Audio input is first digitized into binary elements. The frequency of the transmitted signal is then made to vary according to a defined pattern (code), so it can be intercepted only by a receiver whose frequency response is programmed with the same code, so it follows exactly along with the transmitter frequency. There are trillions of possible frequency-sequencing codes, which enhances privacy and makes cloning difficult. The original CDMA standard, also known as CDMA One and still common in cellular telephones in the U.S offers a transmission speed of only up to 14.4 Kbps in its single channel form and up to 115 Kbps in an eight-channel form. CDMA2000 and Wideband CDMA deliver data many times faster. Characteristics of CDMA: 1.   Spread spectrum techniques use a transmission bandwidth that is several orders of magnitude greater than the minimum...

Words: 1028 - Pages: 5

Free Essay

Cdma Multiple Access

...Communication Technologies 10-2 Multiple Access Techniques • Multiple access schemes allow many mobile users to share simultaneously a finite amount of radio spectrum • Frequency Division: – Allocate part of the spectrum to each user • Time Division – Allocate a time slot within the spectrum to each user • Code Division (Spread Spectrum) – Allocate the whole spectrum to each user, but apply a spreading code so that other users’ communication will appear as (low level) noise Faculty of Information and Communication Technologies 10-3 Multiple Access Schemes Frequency Division: FDMA code time frequency Time Division: TDMA code time frequency Faculty of Information and Communication Technologies 10-4 Code Division: CDMA code/power time frequency Duplexing • Enable a user to talk and listen at the same time – Full Duplex communication • Frequency Division Duplexing (FDD) – Two distinct bands for each user • Forward band provides traffic from the base station to the user • Reverse band provides traffic from the user to the base station • Time Division Duplexing (TDD) – Users access the channel in assigned time slots – Usually limited to short range systems (cordless phones) Faculty of Information and Communication Technologies 10-5 Narrowband and Wideband • Narrowband and wideband – Defined in relation to coherence bandwidth • Narrowband the bandwidth of the channel similar to CB • Wideband bandwidth of channel much greater than...

Words: 2509 - Pages: 11

Free Essay

Advanced Contrast Between Gprs and Cdma Data One Packet

...Advanced Contrast between GPRS and CDMA One Packet Data Puneet Kumar and Arvind.S S.R.M Engineering College, Chennai, Tamil Nadu Abstract:- Proliferated needs of the growing market regarding better data packet and voice services is looking to be met by deploying packet data services. This feature involves a complete upgrade of the network. The path to achieve this greatly differs between GSM and CDMA networks. This paper gives an advanced comparison between the GSM and CDMA networks in the path to deploying packet data with essential features of cost implications, time, infrastructure and compatibility in various handsets, speed and implementation methods. Detailed procedure of CDMA to 3G CDMA path is mentioned along with critical comparison with GSM path at each and every stage. 1. INTRODUCTION Wireless operators around the globe are launching or preparing to launch packet data services over mobile networks. Deploying packet data is a cost-effective way for mobile carriers to balance the network resources required to sufficiently meet the needs of the growing market for voice services and the potentially large mobile data market. The path to high-speed packet data differs greatly, however, between GSM and CDMA networks. GSM operators require a new data backbone, base station upgrades and new handsets to offer packet data services. Packet data in CDMA One networks is standard and was built into the...

Words: 2954 - Pages: 12

Free Essay

Performance Analyses of a Multi-Carrier Cdma Wireless Communication System with Channel Impairment

...PERFORMANCE ANALYSES OF A MULTI-CARRIER CDMA WIRELESS COMMUNICATION SYSTEM WITH CHANNEL IMPAIRMENT Jobayer Anam Rana ID : 06110024 Nishi Rahman ID:06110021 A Thesis under Supervision of Dr.Satya Prasad Majumder In Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Electronics and Communication Engineering Department of Electrical and Electronic Engineering (Electronics and Communication Engineering Program) April -2010 BRAC University, Dhaka, Bangladesh i ii DECLARATION We hereby declare that this thesis is based on the results found by ourselves. Materials of work found by other researcher are mentioned by reference. This thesis, neither in whole nor in part, has been previously submitted for any degree. __________ Signature of Supervisor _________ Signature of Author iii ACKNOWLEDGEMENTS By the grace of God we have completed our thesis. We would like to thank our supervisor Dr. Satya Prasad Majumder for giving us the opportunity to work under his supervision. He has always help us by giving suggestions, ideas, advice and support to solve all our problems and guided us to developed this thesis for last two semester. We also thankful to Apurba Saha, Supriyo Shafkat Ahmed, Nazmus Saquib and Rumana Rahman for their inspiration and kind cooperation. We have worked hard and gave our best. Hopefully, our work will appreciated by our supervisor and respected faculties. iv ABSTRACT Analysis of the...

Words: 5839 - Pages: 24

Free Essay

Asdasda

...LTE/WiMax PATENT LICENSING STATEMENT (December 2008) Throughout its existence, Qualcomm has led the wireless industry in the research and development (R&D) required to move from analog technology into second and third generation digital wireless technologies and beyond. These advances have been largely based upon Qualcomm's patented enabling inventions making it possible to apply code division multiple access (CDMA) technology to commercial cellular wireless networks. More recently, Qualcomm has been a leading developer of the technology enabling high speed data extensions of 3G networks and orthogonal frequency division multiple access (OFDMA)-based 4G systems and standards. As a result, Qualcomm owns an extremely valuable patent portfolio that includes patents that are essential, and others that are commercially useful, to all commercial wireless standards based upon CDMA and OFDMA-based systems and standards currently under development. Qualcomm has had a long standing policy of broadly offering to license its standards essential patents for CDMA-based telecommunications standards on terms and conditions that are fair, reasonable, and free from unfair discrimination (FRAND), subject to reciprocity. FRAND is a well-established principle that appropriately balances the interests of patent holders to obtain a fair return on their innovations and those of implementers to obtain access to such innovations through good faith bilateral negotiations of licensing terms and conditions...

Words: 1173 - Pages: 5

Free Essay

Mother Teresa

...Positioning System (GPS) • Cordless computer peripherals • Cordless telephone sets • Home-entertainment-system control boxes -- the VCR control and the TV channel control are the most common examples • Remote garage-door openers • Two-way radios In this paper we will look at the following technologies used to provide wireless communication: • Code Division Multiple Access (CDMA) and Global System for Mobil Communications (GSM). • Satellites • 802.11X Wireless LAN • Bluetooth Wireless Technology • Microwave CDMA/GSM In cellular service there are two main competing network technologies: Global System for Mobile Communications (GSM) and Code Division Multiple Access (CDMA). Today, most major cellular carriers use either CDMA or GSM. There are camps on both sides that firmly believe either GSM or CDMA architecture is superior to the other. This section will explore the technical capabilities of CDMA and GSM; where and how they are used, how security is addressed, advantages and disadvantages, and what the future holds for each of these cellular technology standards. CDMA was derived as a proprietary standard designed by Qualcomm in the United States, has been the...

Words: 299 - Pages: 2

Premium Essay

Gprs Core Network

...------------------------------------------------- Technical overview See also: S Core NetworkGPR 2.5G and 3G systems rely on double core network infrastructures; traditional circuit-switched network nodes (switching points) for telephony, and packet-switched GPRS nodes for various data services. Dedicated nodes handle the SMS service. 4G systems are expected to be all-IP, meaning that the core network is based on IP routers.[citation needed] [edit]Services offered GPRS extends the GSM Packet circuit switched data capabilities and makes the following services possible: * SMS messaging and broadcasting * File manipulation functions * Active process block process * "Always on" internet access * Multimedia messaging service (MMS) * Push to talk over cellular (PoC) * Instant messaging and presence—wireless village * Internet applications for smart devices through wireless application protocol (WAP) * Point-to-point (P2P) service: inter-networking with the Internet (IP) * Point-to-Multipoint (P2M) service: point-to-multipoint multicast and point-to-multipoint group calls If SMS over GPRS is used, an SMS transmission speed of about 30 SMS messages per minute may be achieved. This is much faster than using the ordinary SMS over GSM, whose SMS transmission speed is about 6 to 10 SMS messages per minute. [edit]Protocols supported GPRS supports the following protocols:[citation needed] * Internet protocol (IP). In practice, built-in mobile...

Words: 9684 - Pages: 39

Premium Essay

Ntt Docomo

...Korea & Japan Trip Spring 2001 NTT DoCoMo and Japan’s Wireless Industry Anu Bhave Haakon Brown Will Chu Jose De Oteyza Mario Lewis Wendy Miller Luis Pintado NTT DoCoMo seems to have the elements of a successful global player. First, it is in a promising market. The wireless phone market is growing rapidly and industry forecasts predict more than half the world’s population will own a cellular phone by the year 2003, a much higher penetration rate than computers. Furthermore, based in Japan, DoCoMo has the advantage over American and European counterparts, like AT&T, Sprint and Vodafone AirTouch, of being closer to the 3.3 billion person Asian market. In addition, DoCoMo is at the leading edge of technology and is expected to be the first mobile operator to launch a 3rd Generation (3G) wireless network by Spring 2001. NTT DoCoMo Background In 1959 Nippon Telegraph and Telephone (NTT) entered the telephone industry in Japan with an offering of maritime telephone service. They added paging services in 1968, car telephone services in 1986, and in-flight public telephone service in 1987. In 1991 NTT established a separate company to provide wireless communication offerings, NTT Mobile Communications Network, Inc. This new company was then spun off by NTT in 1992, ultimately resulting in one of the biggest initial public offerings for the time in 1998, and is now 67.1% owned by NTT with the balance of shares owned by public investors. By 1993...

Words: 3322 - Pages: 14

Premium Essay

Docomo

...Korea & Japan Trip Spring 2001 NTT DoCoMo and Japan’s Wireless Industry Anu Bhave Haakon Brown Will Chu Jose De Oteyza Mario Lewis Wendy Miller Luis Pintado NTT DoCoMo seems to have the elements of a successful global player. First, it is in a promising market. The wireless phone market is growing rapidly and industry forecasts predict more than half the world’s population will own a cellular phone by the year 2003, a much higher penetration rate than computers. Furthermore, based in Japan, DoCoMo has the advantage over American and European counterparts, like AT&T, Sprint and Vodafone AirTouch, of being closer to the 3.3 billion person Asian market. In addition, DoCoMo is at the leading edge of technology and is expected to be the first mobile operator to launch a 3rd Generation (3G) wireless network by Spring 2001. NTT DoCoMo Background In 1959 Nippon Telegraph and Telephone (NTT) entered the telephone industry in Japan with an offering of maritime telephone service. They added paging services in 1968, car telephone services in 1986, and in-flight public telephone service in 1987. In 1991 NTT established a separate company to provide wireless communication offerings, NTT Mobile Communications Network, Inc. This new company was then spun off by NTT in 1992, ultimately resulting in one of the biggest initial public offerings for the time in 1998, and is now 67.1% owned...

Words: 3384 - Pages: 14

Premium Essay

English

...History of mobile phone Mobile phone being popular in modern era, in modern era most people in the world exactly have a mobile phone for communication to the other. Not only adult people even children and teenagers have mobile phone. In this era mobile phone become principle commodity. Not only for calling and sending massage but modern mobile phones have many other features such as: browsing internet, chatting or video call. Now I will explain about history of mobile phone The history of mobile phone was begun at 1947(colonial era) in America and Europe. In 1910 mobile phone invented by Lars Magnus Ericsson, he is the owner of Sony Ericsson Company. At first, he established the Ericsson Company for focus on telegraph, and his company is not too big at that time. In 1921 for the first time Detroit Michigan Police Department using mobile phone in all police cars by using 2 MHz frequency. In 1960, a company called Finnish Cable Works originally in cable business establishing an electronic company named Nokia as a mobile phone handset. In the 1970 the rapid development of the mobile phone became dominated by three large companies in Europe such as: Nokia, Sony Ericsson, and Motorola. In 1969, mobile phone marketed internationally. After 1970 mobile telecommunication became popular. Motorola introduces mobile phone three years later. Its size is quite large with a short antenna. There is also a mobile phone with a suitcase size. Dr. Cooper became the manager of Motorola company...

Words: 1080 - Pages: 5

Premium Essay

3 Generation

...UK Essays: * ------------------------------------------------- About UK Essays * ------------------------------------------------- The UK Essays Team * ------------------------------------------------- Our Essay Writers * ------------------------------------------------- Contact UK Essays * ------------------------------------------------- Prices - Free Quote * ------------------------------------------------- FAQs * ------------------------------------------------- How This Works Resources: * ------------------------------------------------- Essay Help * ------------------------------------------------- Free Essays * ------------------------------------------------- Essay Examples * ------------------------------------------------- Dissertation Help * ------------------------------------------------- Dissertation examples ------------------------------------------------- Top of Form Bottom of Form The free essay examples that we publish on UK Essays have been submitted to us by students. These essays are not the work of our own expert essay writers. Thanks to all of the students that have submitted their work to us. READ MORE Share & download: Print Download Email Free Essays - Communications Essays 3G: Sophistication Guaranteed Telecommunications evolution is undergoing a rapid vamp to the future; the evolution is almost exponential, from the analog types to 2Gs and then finally the latest mobile...

Words: 1791 - Pages: 8

Premium Essay

Education

...was introduced in Kathmandu and with open wire trunk between Kathmandu and Raxual (Indian border town) in 1914. Evolving from such primitive practice to the present day telecom scenario, Nepal has become a progressive and competitive Telecom market. Till date there are Six Telecom operators with broad range of technologies(Landline / Mobile / WLL) like PSTN, ADSL, GSM, CDMA, WCDMA, EVDO, NGN, SIP. Nepal Telecom ( previously Nepal Telecommunication Corporation) is the incumbent operator, owned by government of Nepal being the only one landline operator and almost all services/technologies in all areas of the nation. Ncell (previously Spice Nepal), a Teliasonera associate is fast growing GSM operator of the nation, adopting new business strategies and approach to allure customers to their network. STM sanchar, an American invest is a rural basic telephony operator with satellite link, especially available in Mountainous Region where there is no option for other services. UTL, United Telecom is a joint venture of three Indian Telecom giants( MTNL, TCIL, TCL) with Nepal Ventures Private Limited (NVPL), operating in CDMA technology for WLL and Mobile. Among Others, Nepal satellite and Smart cell are two operators given GSM License and frequency operating in different Rural VDC (Village development Committee) and later to get the license to operate all over nation (including populous cities Kathmandu, Biratnagar, Pokhara etc). Here are some major milestones in the history of telecommunication...

Words: 1366 - Pages: 6

Premium Essay

Telecommunication Gsm

...Q1 Describe the sequence of events of a typical call from a GSM mobile unit to a fixed subscriber. Identify the network components involved and describe the message flow sequence between them. ANS1 |Network Components |Parts of network components |Function | |Mobile Station (MS) |Mobile Equipment (ME – The mobile phone). |The mobile phone and SIM card. | | |Subscriber Identity Module (SIM) – Smart | | | |card that holds the subscriber identity to | | | |be used by the network. | | |Base Station System (BSS) |Base Transceiver Station (BTS) – The |Includes all transceivers and controllers. | | |antennas in the field. Consists of radio | | | |transceiver that defines a cell and handles| | | |radio link protocol with the Mobile | | | |Station. ...

Words: 1201 - Pages: 5

Premium Essay

Iipm

...Technicalities Currently in Bangladesh, five mobile operators - GrameenPhone, Banglalink, AKTEL, Warid and Teletalk use the GSM (Global System for Mobile communications) technology and only CityCell uses the CDMAOne technology. GSM is a cellular network, which means that mobile phones connect to its network by searching for cells in the nearest surrounding area. GSM networks operate in four different frequency ranges namely 850/900/1800/1900 MHz. Most GSM networks operate in the 900/1800 MHz bands. Lets take a look at how the GSM network system works for 2G networks. The network can be divided into three sections. One is the Base Station Subsystem (BSS) which consists of Base Transceiver Station (BTS), Base Station Controller (BSC), and Packet Control Unit (PCU). The next section is Network Switching Subsystem (NSS) which consists of Mobile Switching Center (MSC), Home Location Register (HLR), Visitor Location Register (VLR), Authentication Center (AUC) and Equipment Identity Register (EIR). The last segment is the GPRS Core Network, which consists of Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN). All GSM operators more or less, have these common elements for its 2G/2.5G networks. Difference between 2G and 3G The basic difference between 2G and 3G networks is the Radio Network Controller (RNC), which works for 3G as the BSC of 2G, and the Node B, which works as the BTS. Compared to GSM, UMTS networks initially required a higher...

Words: 858 - Pages: 4

Premium Essay

Docomo

...Korea & Japan Trip Spring 2001 NTT DoCoMo and Japan’s Wireless Industry Anu Bhave Haakon Brown Will Chu Jose De Oteyza Mario Lewis Wendy Miller Luis Pintado NTT DoCoMo seems to have the elements of a successful global player. First, it is in a promising market. The wireless phone market is growing rapidly and industry forecasts predict more than half the world’s population will own a cellular phone by the year 2003, a much higher penetration rate than computers. Furthermore, based in Japan, DoCoMo has the advantage over American and European counterparts, like AT&T, Sprint and Vodafone AirTouch, of being closer to the 3.3 billion person Asian market. In addition, DoCoMo is at the leading edge of technology and is expected to be the first mobile operator to launch a 3rd Generation (3G) wireless network by Spring 2001. NTT DoCoMo Background In 1959 Nippon Telegraph and Telephone (NTT) entered the telephone industry in Japan with an offering of maritime telephone service. They added paging services in 1968, car telephone services in 1986, and in-flight public telephone service in 1987. In 1991 NTT established a separate company to provide wireless communication offerings, NTT Mobile Communications Network, Inc. This new company was then spun off by NTT in 1992, ultimately resulting in one of the biggest initial public offerings for the time in 1998, and is now 67.1% owned...

Words: 3384 - Pages: 14